Host Router Support for OSPFv2
draft-ietf-ospf-ospfv2-hbit-12
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-04-06
|
12 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2020-03-23
|
12 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2020-02-14
|
12 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2019-12-26
|
12 | (System) | IANA Action state changed to RFC-Ed-Ack from In Progress |
2019-12-26
|
12 | (System) | IANA Action state changed to In Progress from Waiting on RFC Editor |
2019-12-26
|
12 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2019-12-26
|
12 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2019-12-24
|
12 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2019-12-24
|
12 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Sean Turner was marked no-response |
2019-12-23
|
12 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2019-12-20
|
12 | (System) | RFC Editor state changed to EDIT |
2019-12-20
|
12 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2019-12-20
|
12 | (System) | Announcement was received by RFC Editor |
2019-12-20
|
12 | (System) | IANA Action state changed to In Progress |
2019-12-20
|
12 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2019-12-20
|
12 | Amy Vezza | IESG has approved the document |
2019-12-20
|
12 | Amy Vezza | Closed "Approve" ballot |
2019-12-19
|
12 | Alvaro Retana | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2019-12-19
|
12 | Alvaro Retana | Ballot approval text was generated |
2019-12-18
|
12 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-12-18
|
12 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-12.txt |
2019-12-18
|
12 | (System) | New version approved |
2019-12-18
|
12 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Padma Pillay-Esnault , Manish Bhardwaj , Keyur Patel |
2019-12-18
|
12 | Padma Pillay-Esnault | Uploaded new revision |
2019-12-05
|
11 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation |
2019-12-04
|
11 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2019-12-04
|
11 | Barry Leiba | [Ballot comment] I'm going to complain about some wording in Section 5 that Ben already called out, but I'll try to put in some specific … [Ballot comment] I'm going to complain about some wording in Section 5 that Ben already called out, but I'll try to put in some specific suggestions for corrections here: In normal operation, there is no guarantee that the RI LSA will reach all routers in an area in a timely manner, which may result in forwarding loops in partial deployments. This wording makes it sound exactly the opposite of what you mean, that if the RI LSA *does* reach all routers in a timely manner it can cause forwarding loops. I suggest this: NEW In normal operation, it is possible that the RI LSA will fail to reach all routers in an area in a timely manner. That can result in forwarding loops in partial deployments. END For example, if a new router joins an area, which previously had only H-bit capable routers with H-bit set then it may take some time for the RI to propagate to all routers. First, change "area, which" to "area that" (no comma). That fixes a usage problem. But second, Ben and I are both unsure whether you mean that the new router does or doesn't support the H bit, or whether it matters. Maybe the right approach here is to say a little more about what happens. Something like this (adjust as needed to make it correct): NEW For example, if a new router joins an area that previously had only H-bit capable routers with H-bit set then it may take some time for the RI to propagate to all routers. While it is propagating, the area as a whole is unsure of the status of the new router, and that can cause END o All routers, with the H-bit set, MUST advertise all of the router's non-stub links with a metric equal to MaxLinkMetric Both commas need to be removed here. o All routers supporting H-Bit MUST check all the RI LSAs of nodes in the area before actively running the modified SPF to account for the H-bit in order to verify that all routers are in routing capability. This is very awkwardly worded and is really hard to decipher. I *think* you mean to say this: NEW o All routers supporting the H-Bit MUST check the RI LSAs of all nodes in the area to verify that all nodes support the H-Bit before actively using the H-Bit feature. END Did I get that right? |
2019-12-04
|
11 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2019-12-04
|
11 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2019-12-04
|
11 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2019-12-04
|
11 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2019-12-03
|
11 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2019-12-03
|
11 | Benjamin Kaduk | [Ballot comment] Abstract The Open Shortest Path First Version 2 (OSPFv2) does not have a mechanism for a node to repel transit traffic … [Ballot comment] Abstract The Open Shortest Path First Version 2 (OSPFv2) does not have a mechanism for a node to repel transit traffic if it is on the shortest path. This document defines a bit (Host-bit) that enables a nit: I suggest to add "protocol" after "(OSPFv2)" to match the definite article "The". Section 1 The OSPFv2 specifies a Shortest Path First (SPF) algorithm that (same nit about adding "protocol") This functionality is particularly useful for a number of use cases: nit: "this functionality" seems to refer to "the SPF algorithm that identifies transit verticies based on their adjacencies", so I suggest rewording to "such functionality would be useful" or "A mechanism to move traffic away from the shortest path" or similar. Section 4 I suggest noting that the (lettered) sub-procedures of step (2) remain unchanged. Section 5 In normal operation, there is no guarantee that the RI LSA will reach all routers in an area in a timely manner, which may result in forwarding loops in partial deployments. For example, if a new router joins an area, which previously had only H-bit capable routers with H-bit set then it may take some time for the RI to propagate to all routers. It's currently only implicit that this new router does not support the H-bit; shall we make it explicit? o All routers supporting H-Bit MUST check all the RI LSAs of nodes in the area before actively running the modified SPF to account for the H-bit in order to verify that all routers are in routing capability. If any router does not advertise the Host Router nit: the grammar here is a little wonky, particularly for "all routers are in routing capability" but perhaps also for "to account for the H-bit". Section 6 When calculating the path to an OSPF AS-External-LSA or NSSA-LSA [RFC3101] with a Type-2 metric, [...] nit: is this saying "calculating the path to [an LSA]"? That's not a usage I'm familiar with; can the AS-External-LSA or NSSA-LSA really serve as a destination in this sense? Section 7 Thank you for phrasing this as "this document requests the IANA to assign", since until these specific values are officially assigned we are technically "squatting" on them. (The respective registration policies of Standards Action and IETF Review give us pretty good control that nothing else is going to swoop in on them, though.) |
2019-12-03
|
11 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2019-12-03
|
11 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2019-12-03
|
11 | Éric Vyncke | [Ballot comment] Thank you for the work put into this document. The short document is easy to read even if I wonder whether it is … [Ballot comment] Thank you for the work put into this document. The short document is easy to read even if I wonder whether it is useful to spend time on IPv4-only protocol ;-) The deployment issue (section 5) had raised a DISCUSS of mine and I appreciated your reply, so, I have cleared this DISCUSS. Feel free to ignore my COMMENTs and NIT. == COMMENTS == -- Generic -- Mentioning that the H-bit of OSPFv2 is the reverse of the R-bit of OSPFv3 would be useful. -- Section 1 -- A description of "Closet Switches" would be welcome. -- Section 3 -- Isn't the wording "host router" an oxymoron ? == NITS == -- Section 8 -- I recommend reading and following the suggestions of RFC 8126 (how to write the IANA considerations) |
2019-12-03
|
11 | Éric Vyncke | [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Discuss |
2019-12-02
|
11 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2019-12-02
|
11 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2019-12-02
|
11 | Mirja Kühlewind | [Ballot Position Update] Position for Mirja Kühlewind has been changed to No Objection from No Record |
2019-12-02
|
11 | Mirja Kühlewind | [Ballot comment] Three comments/questions: 1) This sentence in section 3: "An OSPFv2 router advertising a router-LSA with the H-bit set indicates that it MUST … [Ballot comment] Three comments/questions: 1) This sentence in section 3: "An OSPFv2 router advertising a router-LSA with the H-bit set indicates that it MUST NOT be used as a transit router (see Section 4) by other OSPFv2 routers in the area supporting the functionality." Isn't the MUST here too restrictive? What if the router is the part of the only path to a certain host? Or is the assumption that this host is some kind of endhost/deadend, but then it should never be on the shortest path anyway, or? Later on you say "When the H-bit is set, the OSPFv2 router is a Host (non-transit) router and is incapable of forwarding transit traffic." However, there might also be routers that don't understand the H bit and therefore will route traffic over this host anyway, no? 2) Shouldn't this document update RFC2328, given section 4 and this sentence in section 2: "If the H-bit is set then the calculation of the shortest- path tree for an area, as described in section 16.1 of [RFC2328], is modified by including a check to verify that transit vertices DO NOT have the H-bit set (see Section 4)." (And why is DO NOT in upper letters?) 3) Is there an attack that by spoofing the H-bit an attacker could influence the routing such that traffic is router over a malicious node instead? I guess there are multiple ways to impact the routing that way and this might not be specific to the H bit but maybe still worth thinking about it once more...? Nit: Section 5: "The RI LSA MUST be area-scoped. Bit:" -> I guess the "Bit:" should be removed. |
2019-12-02
|
11 | Mirja Kühlewind | Ballot comment text updated for Mirja Kühlewind |
2019-11-30
|
11 | Éric Vyncke | [Ballot discuss] Thank you for the work put into this document. The short document is easy to read even if I wonder whether it is … [Ballot discuss] Thank you for the work put into this document. The short document is easy to read even if I wonder whether it is useful to spend time on IPv4-only protocol ;-) The deployment issue (section 5) has raised a DISCUSS of mine and I would appreciate a reply on this DISCUSS. Regards, -éric == DISCUSS == -- Section 5 -- The risk of having inconsistent view of the topology with H-bit aware and unaware routers seems possible to me (albeit perhaps only transient). Has this feature been tested / simulated in large scale networks? |
2019-11-30
|
11 | Éric Vyncke | [Ballot comment] Feel free to ignore my COMMENTs and NIT. == COMMENTS == -- Generic -- Mentioning that the H-bit of OSPFv2 is the reverse … [Ballot comment] Feel free to ignore my COMMENTs and NIT. == COMMENTS == -- Generic -- Mentioning that the H-bit of OSPFv2 is the reverse of the R-bit of OSPFv3 would be useful. -- Section 1 -- A description of "Closet Switches" would be welcome. -- Section 3 -- Isn't the wording "host router" an oxymoron ? == NITS == -- Section 8 -- I recommend reading and following the suggestions of RFC 8126 (how to write the IANA considerations) |
2019-11-30
|
11 | Éric Vyncke | [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke |
2019-11-29
|
11 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2019-11-16
|
11 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2019-11-16
|
11 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-11.txt |
2019-11-16
|
11 | (System) | New version approved |
2019-11-16
|
11 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Padma Pillay-Esnault , Manish Bhardwaj , Keyur Patel |
2019-11-16
|
11 | Padma Pillay-Esnault | Uploaded new revision |
2019-11-07
|
10 | Tim Chown | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Tim Chown. Sent review to list. |
2019-11-07
|
10 | Amy Vezza | Placed on agenda for telechat - 2019-12-05 |
2019-11-07
|
10 | Alvaro Retana | IESG state changed to IESG Evaluation from Waiting for Writeup |
2019-11-07
|
10 | Alvaro Retana | Ballot has been issued |
2019-11-07
|
10 | Alvaro Retana | [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana |
2019-11-07
|
10 | Alvaro Retana | Created "Approve" ballot |
2019-11-07
|
10 | Alvaro Retana | Ballot writeup was changed |
2019-11-07
|
10 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2019-11-06
|
10 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2019-11-06
|
10 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-ospf-ospfv2-hbit-10. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-ospf-ospfv2-hbit-10. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there are two actions which we must complete. First, in the OSPFv2 Router Properties Registry on the Open Shortest Path First v2 (OSPFv2) Parameters registry page located at: https://www.iana.org/assignments/ospfv2-parameters/ a single, new value is to be registered as follows: Value: 0x80 Description: Host (H-bit) Reference: [ RFC-to-be ] Second, in the OSPF Router Informational Capability Bits registry on the Open Shortest Path First (OSPF) Parameters registry page located at: https://www.iana.org/assignments/ospf-parameters/ a single, new registration will be made as follows: Bit Number: 7 Capability Name: OSPF Host Router Reference: [ RFC-to-be ] The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2019-10-31
|
10 | Kyle Rose | Request for Last Call review by TSVART Completed: Ready with Nits. Reviewer: Kyle Rose. Sent review to list. |
2019-10-31
|
10 | Mohit Sethi | Request for Last Call review by GENART Completed: Ready. Reviewer: Mohit Sethi. Sent review to list. |
2019-10-28
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tim Chown |
2019-10-28
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tim Chown |
2019-10-27
|
10 | Wesley Eddy | Request for Last Call review by TSVART is assigned to Kyle Rose |
2019-10-27
|
10 | Wesley Eddy | Request for Last Call review by TSVART is assigned to Kyle Rose |
2019-10-25
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sean Turner |
2019-10-25
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sean Turner |
2019-10-24
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Mohit Sethi |
2019-10-24
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Mohit Sethi |
2019-10-24
|
10 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2019-10-24
|
10 | Amy Vezza | The following Last Call announcement was sent out (ends 2019-11-07): From: The IESG To: IETF-Announce CC: Yingzhen Qu , draft-ietf-ospf-ospfv2-hbit@ietf.org, aretana.ietf@gmail.com, lsr-chairs@ietf.org, … The following Last Call announcement was sent out (ends 2019-11-07): From: The IESG To: IETF-Announce CC: Yingzhen Qu , draft-ietf-ospf-ospfv2-hbit@ietf.org, aretana.ietf@gmail.com, lsr-chairs@ietf.org, yingzhen.ietf@gmail.com, lsr@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Host Router Support for OSPFv2) to Proposed Standard The IESG has received a request from the Link State Routing WG (lsr) to consider the following document: - 'Host Router Support for OSPFv2' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2019-11-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Open Shortest Path First Version 2 (OSPFv2) does not have a mechanism for a node to repel transit traffic if it is on the shortest path. This document defines a bit (Host-bit) that enables a router to advertise that it is a non-transit router." It also describes the changes needed to support the H-bit in the domain. In addition, this document updates RFC 6987 to advertise type-2 External and NSSA LSAs with a high cost in order to repel traffic effectively. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-ospf-ospfv2-hbit/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-ospf-ospfv2-hbit/ballot/ No IPR declarations have been submitted directly on this I-D. |
2019-10-24
|
10 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2019-10-24
|
10 | Alvaro Retana | Last call was requested |
2019-10-24
|
10 | Alvaro Retana | Ballot approval text was generated |
2019-10-24
|
10 | Alvaro Retana | Ballot writeup was generated |
2019-10-24
|
10 | Alvaro Retana | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2019-10-24
|
10 | Alvaro Retana | Last call announcement was generated |
2019-10-24
|
10 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-10-24
|
10 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-10.txt |
2019-10-24
|
10 | (System) | New version approved |
2019-10-24
|
10 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Padma Pillay-Esnault , Manish Bhardwaj , Keyur Patel |
2019-10-24
|
10 | Padma Pillay-Esnault | Uploaded new revision |
2019-10-07
|
09 | Min Ye | Request for Last Call review by RTGDIR Completed: Has Nits. Reviewer: He Jia. |
2019-09-20
|
09 | Alvaro Retana | === Review of -09 === https://mailarchive.ietf.org/arch/msg/lsr/zs4cfS9z7vXbK_sNHku4-66nEQg |
2019-09-20
|
09 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup |
2019-09-18
|
09 | Min Ye | Request for Last Call review by RTGDIR is assigned to He Jia |
2019-09-18
|
09 | Min Ye | Request for Last Call review by RTGDIR is assigned to He Jia |
2019-09-15
|
09 | Acee Lindem | Requested Last Call review by RTGDIR |
2019-09-13
|
09 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-09-13
|
09 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-09.txt |
2019-09-13
|
09 | (System) | New version approved |
2019-09-13
|
09 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Padma Pillay-Esnault , Manish Bhardwaj , Keyur Patel |
2019-09-13
|
09 | Padma Pillay-Esnault | Uploaded new revision |
2019-08-14
|
08 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::Point Raised - writeup needed |
2019-07-30
|
08 | Alvaro Retana | Waiting for the authors to reply to the AD Review. |
2019-07-30
|
08 | Alvaro Retana | IESG state changed to AD Evaluation::Point Raised - writeup needed from AD Evaluation::AD Followup |
2019-07-08
|
08 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-07-08
|
08 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-08.txt |
2019-07-08
|
08 | (System) | New version approved |
2019-07-08
|
08 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , lsr-chairs@ietf.org, Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel |
2019-07-08
|
08 | Padma Pillay-Esnault | Uploaded new revision |
2019-05-19
|
07 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup |
2019-05-19
|
07 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-05-19
|
07 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-07.txt |
2019-05-19
|
07 | (System) | New version approved |
2019-05-19
|
07 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel |
2019-05-19
|
07 | Padma Pillay-Esnault | Uploaded new revision |
2018-12-05
|
06 | Yingzhen Qu | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? A Standards Track RFC is being requested and is indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines a new router-LSA bit known as the Host Bit or the H-bit. An OSPFv2 router advertising a router-LSA with the H-bit set indicates to other OSPFv2 routers in the area supporting the functionality that it MUST NOT be used as a transit router. Working Group Summary: The Working Group has reached consensus that this document is useful and should be published. Document Quality: This is a straight forward draft, and similar function exists in ISIS and OSPFv3. Some nits to be fixed. There are review comments from AD to be addressed. Personnel: Yingzhen Qu is the Document Shepherd. Alvaro Retana is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has reviewed each revision of the document and followed the discussion on the OSPF/LSR mailing lists. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. None. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes, they all confirmed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is consensus from the WG that this document can progress. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Nits are all resolved. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Not applicable. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. RFC 6987 should be a Downward Normative References. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. When implementing this document, the SPF calculation defined in RFC 2328 needs to be changed. This needs to be clearly stated in the document. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document requires an allocation of Host(H-bit) in OSPF router-LSA bit registry. It also requires to define a new Router Functional Capability (RFC7770), the Host Support Functional Capability, from the Router Functional Capability Bits TLV. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable. |
2018-11-30
|
06 | Yingzhen Qu | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? A Standards Track RFC is being requested and is indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines a new router-LSA bit known as the Host Bit or the H-bit. An OSPFv2 router advertising a router-LSA with the H-bit set indicates to other OSPFv2 routers in the area supporting the functionality that it MUST NOT be used as a transit router. Working Group Summary: The Working Group has reached consensus that this document is useful and should be published. Document Quality: The document has been implemented by xxxx. Personnel: Yingzhen Qu is the Document Shepherd. Alvaro Retana is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has reviewed each revision of the document and followed the discussion on the OSPF/LSR mailing lists. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. None. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes, they all confirmed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is consensus from the WG that this document can progress. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Nits are all resolved. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Not applicable. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The publication of this document will update RFC 2328. This information has been listed on the title page header, the Abstract, and Introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document requires an allocation of Host(H-bit) in OSPF router-LSA bit registry. It also requires to define a new Router Functional Capability (RFC7770), the Host Support Functional Capability, from the Router Functional Capability Bits TLV. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable. |
2018-11-28
|
06 | Alvaro Retana | Internet Engineering Task Force Y. Fu Internet-Draft … Internet Engineering Task Force Y. Fu Internet-Draft CNNIC Intended status: Standards Track S. Jiang Expires: December 19, 2015 B. Liu Huawei Technologies Co., Ltd J. Dong Y. Chen Tsinghua University June 17, 2015 Definitions of Managed Objects for MAP-E draft-ietf-softwire-map-mib-04 Abstract This memo defines a portion of the Management Information Base (MIB) for using with network management protocols in the Internet community. In particular, it defines managed objects for MAP encapsulation mode. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on December 19, 2015. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect Fu, et al. Expires December 19, 2015 [Page 1] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. The Internet-Standard Management Framework . . . . . . . . . 3 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 4. Structure of the MIB Module . . . . . . . . . . . . . . . . . 3 4.1. The mapMIBObjects . . . . . . . . . . . . . . . . . . . . 3 4.1.1. The mapRule Subtree . . . . . . . . . . . . . . . . . 3 4.1.2. The mapSecurityCheck Subtree . . . . . . . . . . . . 3 4.2. The mapMIBConformance Subtree . . . . . . . . . . . . . . 4 5. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 4 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 7. Security Considerations . . . . . . . . . . . . . . . . . . . 11 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 11 9.1. Normative References . . . . . . . . . . . . . . . . . . 11 9.2. Informative References . . . . . . . . . . . . . . . . . 12 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12 1. Introduction MAP [I-D.ietf-softwire-map] is a stateless mechanism for running IPv4 over IPv6-only infrastructure. In particular, it includes two mode, translation mode or encapsulation mode. For the encapsulation mode, it provides an automatic tunnelling mechanism for providing IPv4 connectivity service to end users over a service provider's IPv6 network This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet Fu, et al. Expires December 19, 2015 [Page 2] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015] to support backward compatibility. The modified OSPFv2 125 router-LSA format is: [minor] "...MUST NOT be used as a transit router" Put a forward reference to §4. [nit] The text keeps making reference to the R-bit. Even though there is a relationship, the H-bit is an independent feature. IOW, I don't think there's a need to explain the relationship to OSPFv3. [minor] On the same topic: The comparison to OSPFv3 is made and the "reverse" bit setting is justified "to support backward compatibility", but that is not explained anywhere. I was hoping that §5 (Auto Discovery and Backward Compatibility) would say something, but it doesn't. 127 0 1 2 3 128 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 129 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 130 | LS age | Options | 1 | 131 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 132 | Link State ID | 133 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 134 | Advertising Router | 135 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 136 | LS sequence number | 137 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 138 | LS checksum | length | 139 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 140 |H|0|0|N|W|V|E|B| 0 | # links | 141 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 142 | Link ID | 143 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 144 | Link Data | 145 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 146 | Type | # TOS | metric | 147 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 148 | ... | 149 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 150 | TOS | 0 | TOS metric | 151 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 152 | Link ID | 153 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 154 | Link Data | 155 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 156 | ... | 158 bit H 159 When set, an OSPFv2 router is a non-transit router and is 160 incapable of forwarding transit traffic. [nit] Please label the figure: Figure 1... [minor] Even though it seems obvious from the figure, please be explicit in saying that the H-bit is the first bit (or however that bit is identified)... 162 When the H-bit is set, an OSPFv2 router is a non-transit router and 163 should not be used to forward transit traffic. In this mode, the 164 other OSPFv2 routers in the area SHOULD NOT use the originating 165 OSPFv2 router for transit traffic, but MAY use the OSPFv2 router for 166 local traffic destined to that OSPFv2 router. [minor] The first/second sentences seem redundant: "should not be used to forward transit traffic...SHOULD NOT use the originating OSPFv2 router for transit traffic". [major] When would the non-transit router be used for transit? IOW, why use "SHOULD NOT" and not "MUST NOT"? [major] "MAY use the OSPFv2 router for local traffic destined to that OSPFv2 router" I'm not sure what behavior is being specified here. The text sounds as if it was optional to even consider the router as a traffic destination. Is that the intent? Why? What would make a network operator decide one way or the other? 168 An OSPFv2 router originating a router-LSA with the H-bit set SHOULD 169 advertise all its non-local router links with a link cost of 170 MaxLinkMetric as defined in Section 3 of [RFC6987]. This is to 171 increase the applicability of the H-bit to partial deployments where 172 it is the responsibility of the operator to ensure that OSPFv2 173 routers not supporting the H-bit do not install routes causing 174 routing loops. [major] When would a router not advertise MaxLinkMetric? IOW, why use SHOULD and not MUST? [major] What are "non-local router links"? I always thought of links to be local to the router...what am I missing? [nit] s/advertise all its non-local router links with a link cost of MaxLinkMetric as defined in Section 3 of [RFC6987]/advertise all its non-local router links with a link cost of MaxLinkMetric [RFC6987] 176 When the H-bit is set, IPv4 prefixes associated with local interfaces 177 in other areas MAY be advertised in summary LSAs. Non-local IPv4 178 prefixes, e.g., those advertised by other routers and installed 179 during the SPF computation, MAY be advertised in summary-LSAs if 180 configured by policy. Likewise, when the H-bit is set, only IPv4 181 prefixes associated with local interfaces MAY be advertised in AS- 182 external LSAs. Non-local IPv4 prefixes, e.g., those exported from 183 other routing protocols, MUST NOT be advertised in AS-external-LSAs. 184 Finally, when the H-bit is set, an Area Border Router (ABR) MUST 185 advertise a consistent H-bit setting in its self-originated router- 186 LSAs for all attached areas. [minor] Some of the behavior specified in this paragraph may be non intuitive -- for example: "When the H-bit is set, IPv4 prefixes associated with local interfaces in other areas MAY be advertised in summary LSAs." During normal operation (aka rfc2328), these prefixes are always advertised (assuming normal areas, etc.)...and given that these are local to the router, it can be argued that one is not using the router as transit...on the other hand, going to a different area can be interpreted as transit. In either case, it would be nice if more was said about the optional nature of including these prefixes in the summary LSA. What are the operational considerations? [minor] The same comment for "prefixes associated with local interfaces MAY be advertised in AS-external LSAs". [major] "Non-local IPv4 prefixes...MAY be advertised in summary-LSAs if configured by policy." Doesn't advertising result in the router being transit? Doesn't it defeats the purpose of setting the H-bit? But there may be operational reasons to do so -- e.g. if the router is the only ABR... [major] "Non-local IPv4 prefixes...MUST NOT be advertised in AS-external-LSAs." This behavior seems consistent with the purpose of the H-bit, but not with the rest of the paragraph. Again, why is this different (operationally) than transiting for non-external inter-area prefixes. [major] "...an Area Border Router (ABR) MUST advertise a consistent H-bit setting in its self-originated router-LSAs for all attached areas." What do you mean by "consistent"? Do you mean "the same", i.e. be non-transit for all areas? Do you mean "compatible", i.e. so that the setting avoids potential loops or black holes? Please be specific. And please explain why -- again, what are the operational considerations? ... 214 5. Auto Discovery and Backward Compatibility 216 To avoid the possibility of any routing loops due to partial 217 deployment, this document defines a OSPF Router-Information LSA 218 functional capability bit known as the Host Support capability. [minor] A reference to rfc7770 would be nice. [mayor] I'm guessing that the RI LSA MUST be area-scoped, right? Please be specific. 220 Auto Discovery via announcement of the Host Support Functional 221 Capability ensures that the H-bit functionality and its associated 222 SPF changes SHOULD only take effect if all the routers in a given 223 OSPF area support this functionality. [major] When can the functionality take effect even if not all routers in the area support it? Or maybe it is that it won't take effect even if all routers support it... IOW, why SHOULD and not MUST? [major] There's no guarantee that the RI LSA will reach a router before the route-carrying LSAs -- which I think implies that SPF could be run before verifying full H-bit support. The result may be a loop...or a loop may exist until the lack of area-wide support is verified... IOW, it seems to me that this auto discovery mechanism may not work as expected. Migration is an important Deployment Consideration. [major] What is the process to verify area-wide support? Should the router build a tree...run SPF...inspect the LSAs...?? I'm assuming/hoping that this is a common enough operation that it is specified already somewhere else... 225 Implementations are encouraged to provide a configuration parameter 226 to manually override enforcement of the H-bit functionality in 227 partial deployments where the topology guarantees that OSPFv2 routers 228 not supporting the H-bit do not compute routes resulting in routing 229 loops. More precisely, the advertisement of MaxLinkMetric for the 230 router's non-local links will prevent OSPFv2 routers not supporting 231 the H-bit from attempting to use it for transit traffic. [minor] The text seems to indicate what the second sentence is a clarification of the first one: "Implementations are encouraged to... More precisely..." But in reality you are talking about two different things: the ability to consider the H-bit even in partial deployments, *and*, advertising MaxLinkMetric. Please consider rewording to clarify. 233 6. OSPF AS-External-LSAs/NSSA LSAs with Type 2 Metrics 235 When calculating the path to an OSPF AS-External-LSA or NSSA-LSA with 236 a Type-2 metric, the advertised Type-2 metric is taken as more 237 significant than the OSPF intra-area or inter-area path. Hence, 238 advertising the links with MaxLinkMetric as specified in [RFC6987] 239 does not discourage transit traffic when calculating AS external or 240 NSSA routes. Consequently, OSPF routers implementing [RFC6987] or 241 this specification should advertise a Type-2 metric of LSInfinity for 242 any self-originated AS-External-LSAs or NSSA-LSAs in situations when 243 the OSPF router is acting as a stub router [RFC6987] or implementing 244 this specification. [major] Should there be Normative language in this paragraph? [major] This paragraph talks about what a stub router (rfc6987) should do. In order to do that, this document should be tagged to Update rfc6987. Is that the intent? 246 7. IANA Considerations 248 IANA is requested to create the OSPF Router-LSA bit registry with the 249 following assignments: 251 Value Description Reference 252 0x01 Area Border Router (B-bit) [RFC2328] 253 0x02 AS Boundary Router (E-bit) [RFC2328] 254 0x04 Virtual Link Endpoint (V-bit) [RFC2328] 255 0x08 Historic (W-bit) [RFC1584] [major] Even though rfc1584 is classified as Historic, that doesn't mean that the bit is as well, or that it has been deprecated (at least I didn't see that in rfc5110). Please put a name to it -- "wild-card multicast"? 256 0x10 Unconditional NSSA Translator (Nt-bit) [RFC3101] 257 0x20 Unassigned 258 0x40 Unassigned 259 0x80 Host (H-bit) This Document [major] What should be the assignment policy (rfc8126)? [minor] Besides the 8 bits above, the Router-LSA (rfc2328) has another 8 bits (to the right) that seem unassigned...should they be included in this registry as well? [major nit] I couldn't find where rfc2328 talks about the value of these bits being 0 and what to do if they are not. By creating this new registry, you have the opportunity to (at least) clarify that. 261 This document also defines a new Router Functional Capability 262 [RFC7770] known as the Host Support Functional Capability. This 263 document requests IANA to allocate the value of this capability from 264 the Router Functional Capability Bits TLV. [minor] s/TLV/Registry 266 8. Security Considerations 268 This document introduces no new security considerations beyond those 269 already specified in [ community. This MIB module would be used for monitoring the devices in the MAP scenario, especially, for the encapsulation mode. 2. The Internet-Standard Management Framework For a detailed overview of the documents that describe the current Internet-Standard Management Framework, please refer to section 7 of [RFC3410]. Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. MIB objects are generally accessed through the Simple Network Management Protocol (SNMP). Objects in the MIB are defined using the mechanisms defined in the Structure of Management Information (SMI). This memo specifies a MIB module that is compliant to the SMIv2, which is described in [RFC2578], [RFC2579] and [RFC2580]. 3. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 4. Structure of the MIB Module The MAP-E MIB provides a way to configure and monitor the devices in MAP encapsulation mode through SNMP. MAP-E MIB is configurable on a per-interface basis. It depends on several parts of the IF-MIB[RFC2863]. 4.1. The mapMIBObjects 4.1.1. The mapRule Subtree The mapRule subtree describes managed objects used for managing the multiple mapping rules in the MAP encapsulation mode. According to the MAP specification, the mapping rules are divided into two categories, which are BMR (Basic Mapping Rule), and FMR (Forwarding Mapping Rule). 4.1.2. The mapSecurityCheck Subtree The mapSecurityCheck subtree is to statistic the number of invalid packets that have been identified. There are two kind of invalid packets which are defined in the MAP specification as the following. Fu, et al. Expires December 19, 2015 [Page 3] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 - The BR MUST perform a validation of the consistency of the source IPv6 address and source port number for the packet using BMR. - The CE SHOULD check that MAP received packets' transport-layer destination port number is in the range configured by MAP for the CE. 4.2. The mapMIBConformance Subtree The mapMIBConformance subtree provides conformance information of MIB objects. 5. Definitions MAP-E-MIB DEFINITIONS ::= BEGIN IMPORTS MODULE-IDENTITY, OBJECT-TYPE, transmission, Integer32, Unsigned32, Counter64 FROM SNMPv2-SMI ifIndex FROM IF-MIB InetAddressType, InetAddress, InetAddressPrefixLength FROM INET-ADDRESS-MIB OBJECT-GROUP, MODULE-COMPLIANCE FROM SNMPv2-CONF; mapMIB MODULE-IDENTITY LAST-UPDATED "201506170000Z" ORGANIZATION "IETF Softwire Working Group" CONTACT-INFO "Yu Fu CNNIC No.4 South 4th Street, Zhongguancun Beijing, P.R. China 100190 EMail: fuyu@cnnic.cn Sheng Jiang Huawei Technologies Co., Ltd Huawei Building, 156 Beiqing Rd., Hai-Dian District Beijing, P.R. China 100095 EMail: jiangsheng@huawei.com Bing Liu Huawei Technologies Co., Ltd Huawei Building, 156 Beiqing Rd., Hai-Dian District Beijing, P.R. China 100095 Fu, et al. Expires December 19, 2015 [Page 4] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 EMail: leo.liubing@huawei.com Jiang Dong Tsinghua University Department of Computer Science, Tsinghua University Beijing 100084 P.R. China Email: knight.dongjiang@gmail.com Yuchi Chen Tsinghua University Department of Computer Science, Tsinghua University Beijing 100084 P.R. China Email: chenycmx@gmail.com" DESCRIPTION "The MIB module is defined for management of objects in the MAP-E BRs or CEs." REVISION "201506170000Z" DESCRIPTION "Initial version. Published as RFC xxxx." --RFC Ed.: RFC-edtitor pls fill in xxxx ::= { transmission xxx } --xxx to be replaced withIANA-assigned value mapMIBObjects OBJECT IDENTIFIER ::= {mapMIB 1} mapRule OBJECT IDENTIFIER ::= { mapMIBObjects 1 } mapSecurityCheck OBJECT IDENTIFIER ::= { mapMIBObjects 2 } mapRuleTable OBJECT-TYPE SYNTAX SEQUENCE OF MapRuleEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The (conceptual) table containing rule Information of specific mapping rule. It can also be used for row creation." ::= { mapRule 1 } mapRuleEntry OBJECT-TYPE SYNTAX MapRuleEntry MAX-ACCESS not-accessible STATUS current Fu, et al. Expires December 19, 2015 [Page 5] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 DESCRIPTION "Each entry in this table contains the information on a particular mapping rule." INDEX { mapRuleID } ::= { mapRuleTable 1 } MapRuleEntry ::= SEQUENCE { mapRuleID Integer32, mapRuleIPv6PrefixType InetAddressType, mapRuleIPv6Prefix InetAddress, mapRuleIPv6PrefixLen InetAddressPrefixLength, mapRuleIPv4PrefixType InetAddressType, mapRuleIPv4Prefix InetAddress, mapRuleIPv4PrefixLen InetAddressPrefixLength, mapRulePSID Integer32, mapRulePSIDLen Integer32, mapRuleOffset Unsigned32, mapRuleEALen Integer32, mapRuleType Integer32 } mapRuleID OBJECT-TYPE SYNTAX Integer32 (1..2147483647) MAX-ACCESS not-accessible STATUS current DESCRIPTION "An identifier used to distinguish the multiple mapping rule which is unique with each CE in the same BR." ::= { mapRuleEntry 1 } mapRuleIPv6PrefixType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS read-create STATUS current DESCRIPTION "In this object, it MUST be set to the value of 2 to present IPv6 type. It complies the textule convention of IPv6 address defined in [RFC4001]." ::= { mapRuleEntry 2 } mapRuleIPv6Prefix OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS read-create STATUS current DESCRIPTION "The IPv6 prefix defined in mapping rule which will be assigned to CE ." Fu, et al. Expires December 19, 2015 [Page 6] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 ::= { mapRuleEntry 3 } mapRuleIPv6PrefixLen OBJECT-TYPE SYNTAX InetAddressPrefixLength MAX-ACCESS read-create STATUS current DESCRIPTION "The length of the IPv6 prefix defined in the mapping rule. As a parameter for mapping rule, it will be also assigned to CE." ::= { mapRuleEntry 4 } mapRuleIPv4PrefixType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS read-create STATUS current DESCRIPTION "In this object, it MUST be set to the value of 1 to present IPv4 type. It complies the textual convention of IPv6 address defined in [RFC4001]." ::= { mapRuleEntry 5 } mapRuleIPv4Prefix OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS read-create STATUS current DESCRIPTION " The IPv4 prefix defined in mapping rule which will be assigned to CE." ::= { mapRuleEntry 6 } mapRuleIPv4PrefixLen OBJECT-TYPE SYNTAX InetAddressPrefixLength MAX-ACCESS read-create STATUS current DESCRIPTION "The length of the IPv4 prefix defined in the mapping rule. As a parameter for mapping rule, it will be also assigned to CE." ::= { mapRuleEntry 7 } mapRulePSID OBJECT-TYPE SYNTAX Integer32 MAX-ACCESS read-create STATUS current DESCRIPTION "The PSID value algorithmically identifies a set of ports assigned to a CE." Fu, et al. Expires December 19, 2015 [Page 7] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 ::= { mapRuleEntry 8 } mapRulePSIDLen OBJECT-TYPE SYNTAX Integer32 MAX-ACCESS read-create STATUS current DESCRIPTION "The bit length value of the number of significant bits in the PSID field. When it is set to 0, the PSID field is to be ignored.." ::= { mapRuleEntry 9 } mapRuleOffset OBJECT-TYPE SYNTAX Unsigned32(0..15) MAX-ACCESS read-create STATUS current DESCRIPTION "Bit length value of the number of significant bits in the PSID field. When it is set to 0, the PSID field is to be ignored.." ::= { mapRuleEntry 10 } mapRuleEALen OBJECT-TYPE SYNTAX Integer32 MAX-ACCESS read-create STATUS current DESCRIPTION "The length of the Embedded-Address (EA) defined in mapping rule which will be assigned to CE." ::= { mapRuleEntry 11 } mapRuleType OBJECT-TYPE SYNTAX Integer32 MAX-ACCESS read-create STATUS current DESCRIPTION "The type of the mapping rule. A value of 0 means it is a BMR; a non-zero value means it is a FMR." ::= { mapRuleEntry 12 } mapSecurityCheckTable OBJECT-TYPE SYNTAX SEQUENCE OF MapSecurityCheckEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The (conceptual) table containing information on MAP security checks. This table can be used to statistic the number of invalid packets that been identified" Fu, et al. Expires December 19, 2015 [Page 8] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 ::= { mapSecurityCheck 1 } mapSecurityCheckEntry OBJECT-TYPE SYNTAX MapSecurityCheckEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Each entry in this table contains the information on a particular MAP SecurityCheck." INDEX { ifIndex } ::= { mapSecurityCheckTable 1 } MapSecurityCheckEntry ::= SEQUENCE { mapSecurityCheckInvalidv4 Counter64, mapSecurityCheckInvalidv6 Counter64 } mapSecurityCheckInvalidv4 OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS accessible-for-notify STATUS current DESCRIPTION "The CE SHOULD check that MAP received packets' transport-layer destination port number is in the range configured by MAP for the CE. So this object indicate the number of the invalid IPv4 packets received by the MAP." ::= { mapSecurityCheckEntry 1 } mapSecurityCheckInvalidv6 OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS accessible-for-notify STATUS current DESCRIPTION "The BR MUST perform a validation of the consistency of the source IPv6 address and source port number for the packet using BMR. So this object indicate the number of the invalid IPv6 packets received by the BR." ::= { mapSecurityCheckEntry 2 } -- Conformance Information mapMIBConformance OBJECT IDENTIFIER ::= {mapMIB 2} mapMIBCompliances OBJECT IDENTIFIER ::= { mapMIBConformance 1 } mapMIBGroups OBJECT IDENTIFIER ::= { mapMIBConformance 2 } -- compliance statements Fu, et al. Expires December 19, 2015 [Page 9] Internet-Draft draft-ietf-softwire-map-mib-04 June 2015 mapMIBCompliance MODULE-COMPLIANCE STATUS current DESCRIPTION " Describes the minimal requirements for conformance to the MAP-E MIB." MODULE -- this module MANDATORY-GROUPS { mapMIBRuleGroup , mapMIBSecurityGroup } ::= { mapMIBCompliances 1 } -- Units of Conformance mapMIBRuleGroup OBJECT-GROUP OBJECTS { mapRuleIPv6PrefixType, mapRuleIPv6Prefix, mapRuleIPv6PrefixLen, mapRuleIPv4PrefixType, mapRuleIPv4Prefix, mapRuleIPv4PrefixLen, mapRulePSID, mapRulePSIDLen, mapRuleOffset, mapRuleEALen, mapRuleType } STATUS current DESCRIPTION &RFC6987], [RFC2328], and [RFC5340]. [major] [*] This section says nothing! rfc6987 has no Security Considerations to speak of (sorry!)...rfc2328's Security Considerations only talk about authentication, and there's no mention of rfc5709 or rfc7474...and rfc5340 doesn't apply because this document is not about OSPFv3 -- also, rfc5340 doesn't have specific Security Considerations related to the R-bit. [*] I don't really have a SecDir hat...just pretending I do. Suggestion: tell the reader why there are no new security considerations. "This document introduces functionality to do a, b, and c... Non of that affects security..." Of course, more words would be nice. There is one specific item that I think should be mentioned as a risk. §5 talks about using Auto Discovery "to avoid the possibility of any routing loops due to partial deployment". Even with proper authentication, there is the possibility that a (rogue) router can advertise the Host Support capability without really supporting it (there's no way to verify!!). The result can be a loop... I don't think this issue can be mitigated, but mentioning it would go a long way in demonstrating that you at least thought about the issues. ... 279 10.1. Normative References ... 290 [RFC3101] Murphy, P., "The OSPF Not-So-Stubby Area (NSSA) Option", 291 RFC 3101, DOI 10.17487/RFC3101, January 2003, 292 ;. 294 [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF 295 for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, 296 ;. [minor] These 2 references can be Informative. ... 307 10.2. Informative References ... 319 [RFC6987] Retana, A., Nguyen, L., Zinin, A., White, R., and D. 320 McPherson, "OSPF Stub Router Advertisement", RFC 6987, 321 DOI 10.17487/RFC6987, September 2013, 322 ;. [major] Because of the specification of the use of MaxLinkMetric, this reference has to be Normative. rfc6987 is already in the DownRef registry. |
2018-11-28
|
06 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2018-11-28
|
06 | Alvaro Retana | Notification list changed to Yingzhen Qu <yingzhen.ietf@gmail.com>, aretana.ietf@gmail.com from Yingzhen Qu <yingzhen.ietf@gmail.com> |
2018-11-21
|
06 | Alvaro Retana | IESG state changed to AD Evaluation from Publication Requested |
2018-10-03
|
06 | Acee Lindem | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? A Standards Track RFC is being requested and is indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines a new router-LSA bit known as the Host Bit or the H-bit. An OSPFv2 router advertising a router-LSA with the H-bit set indicates to other OSPFv2 routers in the area supporting the functionality that it MUST NOT be used as a transit router. Working Group Summary: The Working Group has reached consensus that this document is useful and should be published. Document Quality: The document has been implemented by xxxx. Personnel: Yingzhen Qu is the Document Shepherd. Alvaro Retana is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has reviewed each revision of the document and followed the discussion on the OSPF/LSR mailing lists. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. None. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? NA. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is consensus from the WG that this document can progress. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Nits are all resolved. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Not applicable. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The publication of this document will update RFC 2328. This information has been listed on the title page header, the Abstract, and Introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document requires an allocation of Host(H-bit) in OSPF router-LSA bit registry. It also requires to define a new Router Functional Capability (RFC7770), the Host Support Functional Capability, from the Router Functional Capability Bits TLV. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable. |
2018-10-03
|
06 | Acee Lindem | Responsible AD changed to Alvaro Retana |
2018-10-03
|
06 | Acee Lindem | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2018-10-03
|
06 | Acee Lindem | IESG state changed to Publication Requested |
2018-10-03
|
06 | Acee Lindem | IESG process started in state Publication Requested |
2018-10-03
|
06 | Acee Lindem | Changed consensus to Yes from Unknown |
2018-10-03
|
06 | Acee Lindem | Intended Status changed to Proposed Standard from None |
2018-09-04
|
06 | Yingzhen Qu | Changed document writeup |
2018-08-27
|
06 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-06.txt |
2018-08-27
|
06 | (System) | New version approved |
2018-08-27
|
06 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel |
2018-08-27
|
06 | Padma Pillay-Esnault | Uploaded new revision |
2018-08-08
|
05 | Yingzhen Qu | Notification list changed to Yingzhen Qu <yingzhen.ietf@gmail.com> |
2018-08-08
|
05 | Yingzhen Qu | Document shepherd changed to Yingzhen Qu |
2018-08-01
|
05 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-05.txt |
2018-08-01
|
05 | (System) | New version approved |
2018-08-01
|
05 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel |
2018-08-01
|
05 | Padma Pillay-Esnault | Uploaded new revision |
2018-08-01
|
04 | (System) | Document has expired |
2018-02-28
|
04 | Cindy Morgan | Notification list changed to none |
2018-02-28
|
04 | Cindy Morgan | Changed group to Link State Routing (LSR) from Open Shortest Path First IGP (OSPF) |
2018-01-28
|
04 | Keyur Patel | New version available: draft-ietf-ospf-ospfv2-hbit-04.txt |
2018-01-28
|
04 | (System) | New version approved |
2018-01-28
|
04 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel |
2018-01-28
|
04 | Keyur Patel | Uploaded new revision |
2017-12-16
|
03 | (System) | Document has expired |
2017-06-14
|
03 | Keyur Patel | New version available: draft-ietf-ospf-ospfv2-hbit-03.txt |
2017-06-14
|
03 | (System) | Removed from session: IETF-117: oauth Wed-1630 |
2017-06-14
|
03 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel |
2017-06-14
|
03 | Keyur Patel | Uploaded new revision |
2017-04-10
|
02 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-02.txt |
2017-04-10
|
02 | (System) | New version approved |
2017-04-10
|
02 | (System) | Request for posting confirmation emailed to previous authors: Serpil Bayraktar , Manish Bhardwaj , Padma Pillay-Esnault , Keyur Patel , ospf-chairs@ietf.org |
2017-04-10
|
02 | Padma Pillay-Esnault | Uploaded new revision |
2017-01-06
|
01 | (System) | Document has expired |
2016-07-05
|
01 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-01.txt |
2015-11-09
|
00 | Acee Lindem | This document now replaces draft-keyupate-ospf-ospfv2-hbit instead of None |
2015-10-18
|
00 | Padma Pillay-Esnault | New version available: draft-ietf-ospf-ospfv2-hbit-00.txt |