Re: [OSPF] BFD re-charter complete

Manav Bhatia <manavbhatia@gmail.com> Tue, 10 June 2014 14:40 UTC

Return-Path: <manavbhatia@gmail.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 779DD1B27C4; Tue, 10 Jun 2014 07:40:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NO4V6U6LMVOk; Tue, 10 Jun 2014 07:40:16 -0700 (PDT)
Received: from mail-oa0-x233.google.com (mail-oa0-x233.google.com [IPv6:2607:f8b0:4003:c02::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50E081A017F; Tue, 10 Jun 2014 07:40:16 -0700 (PDT)
Received: by mail-oa0-f51.google.com with SMTP id j17so4136202oag.10 for <multiple recipients>; Tue, 10 Jun 2014 07:40:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=p5+9mw/bfwBp5Eoio6DaiMOk98F7f9k4auYeVjF38Fc=; b=tCZoOaOhqm4MiyHBrT0KJONhTsjVA7PPz3M6+hvnzRvf/YRGAz31eH3KaoRy5GxITZ O0GSuOG3cPIOchZO/NF2zQNQRwzzk6KWOKan0lPkoy0cNqOYVoq1VYvneFAKhotXnB8W eNLEgY638vgir6WXpWlknIGD4Not0yI4vIWHYPpzUb78j5voQ+gYxcWXCjmz/biPktf+ L0YX8/z+QirDMyOzgfDCGvjlyUFoCW4g9w/j1gAuMM0Jo864o2ZlgB3PKO8Wn8u2ppdW jrGTjlRkJ5WyaUqfGHzeO+ofAeK96SPDQpebiHjb4LpSAyzxa1HFkQk5lJfcmotQ8Ss7 1c5A==
MIME-Version: 1.0
X-Received: by 10.182.65.167 with SMTP id y7mr31852782obs.29.1402411215609; Tue, 10 Jun 2014 07:40:15 -0700 (PDT)
Received: by 10.76.77.97 with HTTP; Tue, 10 Jun 2014 07:40:15 -0700 (PDT)
Received: by 10.76.77.97 with HTTP; Tue, 10 Jun 2014 07:40:15 -0700 (PDT)
In-Reply-To: <20140610135340.GA19601@pfrc>
References: <20140610135340.GA19601@pfrc>
Date: Tue, 10 Jun 2014 07:40:15 -0700
Message-ID: <CAG1kdojbUddtiqjh1jpVCtE0xZs-BKN+jBFV0phF8j8SKPh8mA@mail.gmail.com>
From: Manav Bhatia <manavbhatia@gmail.com>
To: Jeffrey Haas <jhaas@pfrc.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, OSPF - OSPF WG List <ospf@ietf.org>
Content-Type: multipart/alternative; boundary="089e0158a91055f3ff04fb7c4e38"
Archived-At: http://mailarchive.ietf.org/arch/msg/ospf/ETQw1S9R32QIZ081XpksItlUFBo
Subject: Re: [OSPF] BFD re-charter complete
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jun 2014 14:40:26 -0000

Hi Jeff,

What about the ospf/isis extn drafts for distributing the sbfd
discriminators? I guess these would be owned by the respective IGP WGs. Is
this correct?

Cheers, Manav

--
Thumb typed by Manav
On Jun 10, 2014 7:23 PM, "Jeffrey Haas" <jhaas@pfrc.org> wrote:

> Working Group,
>
> Our updated charter was approved by the IESG.  The S-BFD work is officially
> in scope now!
>
> Per our prior discussion, authors please submit the following documents as
> draft-ietf-bfd-*:
>
> draft-aldrin-bfd-seamless-use-case (Milestone: November 2014)
> draft-akiya-bfd-seamless-base (Milestone: March 2015)
>
> The following documents are known to be work of interest, but aren't quite
> ready for adoption.  Please kick off additional discussions to drive that
> work forward:
>
> draft-akiya-bfd-seamless-ip
> draft-akiya-bfd-seamless-sr
> draft-akiya-bfd-seamless-alert-discrim
>
> My recommendation is to drive the IP case first.
>
> -- Jeff
>
>
>
>
>
> ----- Forwarded message from The IESG <iesg-secretary@ietf.org> -----
>
> Date: Thu, 05 Jun 2014 10:16:58 -0700
> From: The IESG <iesg-secretary@ietf.org>
> To: IETF-Announce <ietf-announce@ietf.org>
> Cc: bfd WG <rtg-bfd@ietf.org>
> Subject: WG Action: Rechartered Bidirectional Forwarding Detection (bfd)
>
> The Bidirectional Forwarding Detection (bfd) working group in the Routing
> Area of the IETF has been rechartered. For additional information please
> contact the Area Directors or the WG Chairs.
>
> Bidirectional Forwarding Detection (bfd)
> ------------------------------------------------
> Current Status: Active WG
>
> Chairs:
>   Nobo Akiya <nobo@cisco.com>
>   Jeffrey Haas <jhaas@pfrc.org>
>
> Technical advisors:
>   Dave Katz <dkatz@juniper.net>
>   David Ward <dward@cisco.com>
>
> Assigned Area Director:
>   Adrian Farrel <adrian@olddog.co.uk>
>
> Mailing list
>   Address: rtg-bfd@ietf.org
>   To Subscribe: rtg-bfd-request@ietf.org
>   Archive: http://www.ietf.org/mail-archive/web/rtg-bfd/
>
> Charter:
>
> The BFD Working Group is chartered to standardize and support the
> bidirectional forwarding detection protocol (BFD) and its extensions.  A
> core goal of the working group is to standardize BFD in the context of
> IP routing, or protocols such as MPLS that are based on IP routing, in a
> way that will encourage multiple, inter-operable vendor implementations.
>
> The Working Group will also provide advice and guidance on BFD to other
> working groups or standards bodies as requested.
>
> BFD is a protocol intended to detect faults in the bidirectional path
> between two forwarding engines, including physical interfaces,
> subinterfaces, data link(s), and to the extent possible the forwarding
> engines themselves, with potentially very low latency. It operates
> independently of media, data protocols, and routing protocols. An
> additional goal is to provide a single mechanism that can be used for
> liveness detection over any media, at any protocol layer, with
> a wide range of detection times and overhead, to avoid a proliferation
> of different methods.
>
> Important characteristics of BFD include:
>
> - Simple, fixed-field encoding to facilitate implementations in
>   hardware.
>
> - Independence of the data protocol being forwarded between two systems.
>   BFD packets are carried as the payload of whatever encapsulating
>   protocol is appropriate for the medium and network.
>
> - Path independence: BFD can provide failure detection on any kind of
>   path between systems, including direct physical links, virtual
>   circuits, tunnels, MPLS LSPs, multihop routed paths, and
>   unidirectional links (so long as there is some return path, of
>   course).
>
> - Ability to be bootstrapped by any other protocol that automatically
>   forms peer, neighbor or adjacency relationships to seed BFD endpoint
>   discovery.
>
> The working group is currently chartered to complete the following work
> items:
>
> 1. Develop further MIB modules for BFD and submit them to the IESG for
> publication as Proposed Standards.
>
> 2a. Provide a generic keying-based cryptographic authentication
> mechanism for the BFD protocol developing the work of the KARP
> working group.  This mechanism  will support authentication through
> a key identifier for the BFD session's Security Association rather
> than specifying new authentication extensions.
>
> 2b. Provide extensions to the BFD MIB in support of the generic keying-
> based cryptographic authentication mechanism.
>
> 2c. Specify cryptographic authentication procedures for the BFD protocol
> using HMAC-SHA-256 (possibly truncated to a smaller integrity check
> value but not beyond commonly accepted lengths to ensure security) using
> the generic keying-based cryptographic authentication mechanism.
>
> 3. Provide an extension to the BFD core protocol in support of point-to-
> multipoint links and networks.
>
> 4. Provide an informational document to recommend standardized timers
> and timer operations for BFD when used in different applications.
>
> 5. Define a mechanism to perform single-ended path (i.e. continuity)
> verification based on the BFD specification.  Allow such a mechanism to
> work both proactively and on-demand, without prominent initial delay.
> Allow the mechanism to maintain multiple sessions to a target entity and
> between the same pair of network entities. In doing this work, the WG
> will work closely with at least the following other WGs: ISIS, OSPF,
> SPRING.
>
> The working group will maintain a relationship with the MPLS working
> group.
>
> Milestones:
>   Done     - Submit the base protocol specification to the IESG to be
> considered as a Proposed Standard
>   Done     - Submit BFD encapsulation and usage profile for single-hop
> IPv4 and IPv6 adjacencies to the IESG to be considered as a Proposed
> Standard
>   Done     - Submit BFD encapsulation and usage profile for MPLS LSPs to
> the IESG to be considered as a Proposed Standard
>   Done     - Submit BFD encapsulation and usage profile for multi-hop
> IPv4 and IPv6 adjacencies to the IESG to be considered as a Proposed
> Standard
>   Done     - Submit the BFD MIB to the IESG to be considered as a
> Proposed Standard
>   Done     - Submit the BFD over LAG mechanism to the IESG to be
> considered as a Proposed Standard
>   Jun 2014 - Submit the the document on BFD point-to-multipoint support
> to the IESG to be considered as a Proposed Standard
>   Nov 2014 - Submit the BFD MPLS extension MIB to the IESG to be
> considered as a Proposed Standard
>   Jan 2015 - Submit the generic keying based cryptographic authentication
> mechanism to the IESG to be considered as a Proposed Standard
>   Jan 2015 - Submit a BFD MIB extension in support of the generic keying
> document to the IESG to be considered as a Proposed Standard
>   Jan 2015 - Submit the cryptographic authentication procedures for BFD
> to the IESG to be considered as a Proposed Standard
>   Jan 2015 - Submit the BFD Common Intervals document to the IESG to be
> considered as an Informational RFC
>
>
> ----- End forwarded message -----
>
>