Re: [Lsr] I-D Action: draft-wu-lsr-pce-discovery-security-support-01.txt

"Acee Lindem (acee)" <acee@cisco.com> Sat, 01 December 2018 22:30 UTC

Return-Path: <acee@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A79A130E61; Sat, 1 Dec 2018 14:30:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.961
X-Spam-Level:
X-Spam-Status: No, score=-15.961 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hu22aIc1ZAdz; Sat, 1 Dec 2018 14:30:14 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30237130E5E; Sat, 1 Dec 2018 14:30:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4988; q=dns/txt; s=iport; t=1543703414; x=1544913014; h=from:to:cc:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=jdCIKVrJ2ImHVf59c+wsP/+XkEGujpn7nf74Epd3OLk=; b=YMeayUzee4a0frKyC4iZsp1nCN5k6jjkrwL186oQlh+qPoQK/LJ3A+Tk bdPyUlkHrajtD2SUd9S1qaxd6pVpvNR0Vx+Dxw0k/Iga/rgDvM9MoqdPm Yjf13NlpYf7iWl6qcbHpX3IcraEiyQrD2ukvnCw7fTy5vWoer3/CQlLW0 s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ADAACUCgNc/5pdJa1jGQEBAQEBAQEBAQEBAQcBAQEBAQGBUQQBAQEBAQsBggNmgQInCoNviBiMCJlVgXoLAQEYDYRHGYMdIjQJDQEDAQECAQECbRwMhT0CAQMBASEROgsSAQYCDgwCIwMCBCULFAESBAENBQmDGAGCAQ+IeptQgS+ELQEDAg5AP4RcgQuLEReBf4EQAScfgkyDEwsBAQEBAQEWgTEWgwQxgiYCjy6REgkChn6KPBiBW02ERIo6iQSEZYJbiAICERSBJx84gVVwFRohKgGCQQmLE4U/QTEBC40XgR8BAQ
X-IronPort-AV: E=Sophos;i="5.56,304,1539648000"; d="scan'208";a="490239572"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 01 Dec 2018 22:30:13 +0000
Received: from XCH-RTP-013.cisco.com (xch-rtp-013.cisco.com [64.101.220.153]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id wB1MUCLx030898 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 1 Dec 2018 22:30:12 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-013.cisco.com (64.101.220.153) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Sat, 1 Dec 2018 17:30:11 -0500
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1395.000; Sat, 1 Dec 2018 17:30:12 -0500
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "lsr@ietf.org" <lsr@ietf.org>
CC: "pce@ietf.org" <pce@ietf.org>
Thread-Topic: [Lsr] I-D Action: draft-wu-lsr-pce-discovery-security-support-01.txt
Thread-Index: AQHUicVsvYSD4tBXn0yDyUFBmadxcA==
Date: Sat, 01 Dec 2018 22:30:11 +0000
Message-ID: <7EEF7E4C-68D0-49E7-9DD3-28BCE27CEE0A@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.196]
Content-Type: text/plain; charset="utf-8"
Content-ID: <BE481BC4C895584E887ED3D723F747A9@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.153, xch-rtp-013.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/l8Zx0ThQ23StDtnDKYYq1yXZvls>
Subject: Re: [Lsr] I-D Action: draft-wu-lsr-pce-discovery-security-support-01.txt
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Dec 2018 22:30:17 -0000

Hi Qin, 
Thanks for addressing my comment. Additionally, I think we have enough support to accept this as a WG document (even w/o the formal endorsement of the PCE WG __
Thanks,
Acee

On 11/29/18, 1:34 AM, "Lsr on behalf of Qin Wu" <lsr-bounces@ietf.org on behalf of bill.wu@huawei.com> wrote:

    v-01 has just been posted to address received comments so far.
    The diff is:
    https://www.ietf.org/rfcdiff?url2=draft-wu-lsr-pce-discovery-security-support-01
    
    -Qin
    -----邮件原件-----
    发件人: I-D-Announce [mailto:i-d-announce-bounces@ietf.org] 代表 internet-drafts@ietf.org
    发送时间: 2018年11月29日 14:29
    收件人: i-d-announce@ietf.org
    主题: I-D Action: draft-wu-lsr-pce-discovery-security-support-01.txt
    
    
    A New Internet-Draft is available from the on-line Internet-Drafts directories.
    
    
            Title           : IGP extension for PCEP security capability support in the PCE discovery
            Authors         : Diego R. Lopez
                              Qin Wu
                              Dhruv Dhody
                              Michael Wang
                              Daniel King
    	Filename        : draft-wu-lsr-pce-discovery-security-support-01.txt
    	Pages           : 10
    	Date            : 2018-11-28
    
    Abstract:
       When a Path Computation Element (PCE) is a Label Switching Router
       (LSR) participating in the Interior Gateway Protocol (IGP), or even a
       server participating in IGP, its presence and path computation
       capabilities can be advertised using IGP flooding.  The IGP
       extensions for PCE discovery (RFC 5088 and RFC 5089) define a method
       to advertise path computation capabilities using IGP flooding for
       OSPF and IS-IS respectively.  However these specifications lack a
       method to advertise PCEP security (e.g., Transport Layer
       Security(TLS), TCP Authentication Option (TCP-AO)) support
       capability.
    
       This document proposes new capability flag bits for PCE-CAP-FLAGS
       sub-TLV that can be announced as attribute in the IGP advertisement
       to distribute PCEP security support information.  In addition, this
       document updates RFC 5088 and RFC 5089 to allow advertisement of Key
       ID or Key Chain Name Sub-TLV to support TCP AO security capability.
    
    
    The IETF datatracker status page for this draft is:
    https://datatracker.ietf.org/doc/draft-wu-lsr-pce-discovery-security-support/
    
    There are also htmlized versions available at:
    https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-01
    https://datatracker.ietf.org/doc/html/draft-wu-lsr-pce-discovery-security-support-01
    
    A diff from the previous version is available at:
    https://www.ietf.org/rfcdiff?url2=draft-wu-lsr-pce-discovery-security-support-01
    
    
    Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
    
    Internet-Drafts are also available by anonymous FTP at:
    ftp://ftp.ietf.org/internet-drafts/
    
    _______________________________________________
    I-D-Announce mailing list
    I-D-Announce@ietf.org
    https://www.ietf.org/mailman/listinfo/i-d-announce
    Internet-Draft directories: http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
    _______________________________________________
    Lsr mailing list
    Lsr@ietf.org
    https://www.ietf.org/mailman/listinfo/lsr