Re: [OSPF] BFD re-charter complete

Acee Lindem <acee.lindem@ericsson.com> Tue, 10 June 2014 16:35 UTC

Return-Path: <acee.lindem@ericsson.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C92BC1B2820; Tue, 10 Jun 2014 09:35:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RQsT7-9wlV-e; Tue, 10 Jun 2014 09:35:01 -0700 (PDT)
Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 164AD1B2821; Tue, 10 Jun 2014 09:35:01 -0700 (PDT)
X-AuditID: c618062d-f79be6d000006b89-e7-5396e2ed1618
Received: from EUSAAHC008.ericsson.se (Unknown_Domain [147.117.188.96]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id 57.30.27529.DE2E6935; Tue, 10 Jun 2014 12:50:21 +0200 (CEST)
Received: from EUSAAMB101.ericsson.se ([147.117.188.118]) by EUSAAHC008.ericsson.se ([147.117.188.96]) with mapi id 14.03.0174.001; Tue, 10 Jun 2014 12:34:55 -0400
From: Acee Lindem <acee.lindem@ericsson.com>
To: Manav Bhatia <manavbhatia@gmail.com>, Jeffrey Haas <jhaas@pfrc.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, OSPF - OSPF WG List <ospf@ietf.org>
Subject: Re: [OSPF] BFD re-charter complete
Thread-Topic: [OSPF] BFD re-charter complete
Thread-Index: AQHPhLn1+tGMsKmUlUiLuM+ShUV36JtqWA6A
Date: Tue, 10 Jun 2014 16:34:55 +0000
Message-ID: <CFBC813F.3100A%acee.lindem@ericsson.com>
References: <20140610135340.GA19601@pfrc> <CAG1kdojbUddtiqjh1jpVCtE0xZs-BKN+jBFV0phF8j8SKPh8mA@mail.gmail.com>
In-Reply-To: <CAG1kdojbUddtiqjh1jpVCtE0xZs-BKN+jBFV0phF8j8SKPh8mA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.2.140509
x-originating-ip: [147.117.188.9]
Content-Type: multipart/alternative; boundary="_000_CFBC813F3100Aaceelindemericssoncom_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprCIsWRmVeSWpSXmKPExsUyuXRPgu7bR9OCDZ6st7TYf/Atq8XlSW3s Fi337rFbfP6zjdGBxWPnrLvsHkuW/GTyuNy7lTWAOYrLJiU1J7MstUjfLoEro2f/TKaC11MZ Ky4+K29gnFLXxcjJISFgIrHs/V42CFtM4sK99UA2F4eQwFFGiedPX7FCOMsZJU6sX80OUsUm oCPx/NE/ZpCEiMBURollc/pYQBLCAtoSS37+YwSxRYCKel4+ZoWwjSQOvvwEVsMioCoxd+5/ pi5GDg5eAVOJw60uIGEhgQKJpQ+vgV3BKRAo0XJsNhOIzQh00fdTa8BsZgFxiVtP5jNBXCog sWTPeWYIW1Ti5eN/YKtEBfQkmrveMELEFSX29U9nh+iNkuh/PA/sBF4BQYmTM5+wTGAUnYVk 7CwkZbOQlEHEdSQW7P7EBmFrSyxb+JoZxj5z4DFUr7XEi4t3GZHVLGDkWMXIUVqcWpabbmSw iREYjcck2HR3MO55aXmIUYCDUYmHV+H6tGAh1sSy4srcQ4zSHCxK4rzaN6uChQTSE0tSs1NT C1KL4otKc1KLDzEycXBKNTAuuZ8hWKQc0sBdNcUhW2+N7xzbQ9fTloayTricFxZffbG44NXL sMtz7sgfUVt7/cnyi7+PlK/Jf+t28sNb2yuhnvXvLvusFREy/vS8Ys1v7V7+fOuT+TO+zeic JnxURVtu7zmDPc92enj7sxrNz/H/MNUkTUT79o+XU26+VTpw0NLwxk0VvpogJZbijERDLeai 4kQAhGrMRacCAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/rtg-bfd/0iisIPKakojsADY6_eu7lFFTfyk
X-Mailman-Approved-At: Tue, 10 Jun 2014 10:03:34 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jun 2014 16:35:09 -0000

Hi Manav,

From: Manav Bhatia <manavbhatia@gmail.com<mailto:manavbhatia@gmail.com>>
Date: Tuesday, June 10, 2014 7:40 AM
To: Jeffrey Haas <jhaas@pfrc.org<mailto:jhaas@pfrc.org>>, "rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>" <rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>>, OSPF - OSPF WG List <ospf@ietf.org<mailto:ospf@ietf.org>>
Subject: Re: [OSPF] BFD re-charter complete


Hi Jeff,

What about the ospf/isis extn drafts for distributing the sbfd discriminators? I guess these would be owned by the respective IGP WGs. Is this correct?

Since the IGP drafts contain solely the TLV encoding and IGP flooding specifications, there is reason for them to be homed anywhere else.

Thanks,
Acee




Cheers, Manav

--
Thumb typed by Manav

On Jun 10, 2014 7:23 PM, "Jeffrey Haas" <jhaas@pfrc.org<mailto:jhaas@pfrc.org>> wrote:
Working Group,

Our updated charter was approved by the IESG.  The S-BFD work is officially
in scope now!

Per our prior discussion, authors please submit the following documents as
draft-ietf-bfd-*:

draft-aldrin-bfd-seamless-use-case (Milestone: November 2014)
draft-akiya-bfd-seamless-base (Milestone: March 2015)

The following documents are known to be work of interest, but aren't quite
ready for adoption.  Please kick off additional discussions to drive that
work forward:

draft-akiya-bfd-seamless-ip
draft-akiya-bfd-seamless-sr
draft-akiya-bfd-seamless-alert-discrim

My recommendation is to drive the IP case first.

-- Jeff





----- Forwarded message from The IESG <iesg-secretary@ietf.org<mailto:iesg-secretary@ietf.org>> -----

Date: Thu, 05 Jun 2014 10:16:58 -0700
From: The IESG <iesg-secretary@ietf.org<mailto:iesg-secretary@ietf.org>>
To: IETF-Announce <ietf-announce@ietf.org<mailto:ietf-announce@ietf.org>>
Cc: bfd WG <rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>>
Subject: WG Action: Rechartered Bidirectional Forwarding Detection (bfd)

The Bidirectional Forwarding Detection (bfd) working group in the Routing
Area of the IETF has been rechartered. For additional information please
contact the Area Directors or the WG Chairs.

Bidirectional Forwarding Detection (bfd)
------------------------------------------------
Current Status: Active WG

Chairs:
  Nobo Akiya <nobo@cisco.com<mailto:nobo@cisco.com>>
  Jeffrey Haas <jhaas@pfrc.org<mailto:jhaas@pfrc.org>>

Technical advisors:
  Dave Katz <dkatz@juniper.net<mailto:dkatz@juniper.net>>
  David Ward <dward@cisco.com<mailto:dward@cisco.com>>

Assigned Area Director:
  Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>

Mailing list
  Address: rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>
  To Subscribe: rtg-bfd-request@ietf.org<mailto:rtg-bfd-request@ietf.org>
  Archive: http://www.ietf.org/mail-archive/web/rtg-bfd/

Charter:

The BFD Working Group is chartered to standardize and support the
bidirectional forwarding detection protocol (BFD) and its extensions.  A
core goal of the working group is to standardize BFD in the context of
IP routing, or protocols such as MPLS that are based on IP routing, in a
way that will encourage multiple, inter-operable vendor implementations.

The Working Group will also provide advice and guidance on BFD to other
working groups or standards bodies as requested.

BFD is a protocol intended to detect faults in the bidirectional path
between two forwarding engines, including physical interfaces,
subinterfaces, data link(s), and to the extent possible the forwarding
engines themselves, with potentially very low latency. It operates
independently of media, data protocols, and routing protocols. An
additional goal is to provide a single mechanism that can be used for
liveness detection over any media, at any protocol layer, with
a wide range of detection times and overhead, to avoid a proliferation
of different methods.

Important characteristics of BFD include:

- Simple, fixed-field encoding to facilitate implementations in
  hardware.

- Independence of the data protocol being forwarded between two systems.
  BFD packets are carried as the payload of whatever encapsulating
  protocol is appropriate for the medium and network.

- Path independence: BFD can provide failure detection on any kind of
  path between systems, including direct physical links, virtual
  circuits, tunnels, MPLS LSPs, multihop routed paths, and
  unidirectional links (so long as there is some return path, of
  course).

- Ability to be bootstrapped by any other protocol that automatically
  forms peer, neighbor or adjacency relationships to seed BFD endpoint
  discovery.

The working group is currently chartered to complete the following work
items:

1. Develop further MIB modules for BFD and submit them to the IESG for
publication as Proposed Standards.

2a. Provide a generic keying-based cryptographic authentication
mechanism for the BFD protocol developing the work of the KARP
working group.  This mechanism  will support authentication through
a key identifier for the BFD session's Security Association rather
than specifying new authentication extensions.

2b. Provide extensions to the BFD MIB in support of the generic keying-
based cryptographic authentication mechanism.

2c. Specify cryptographic authentication procedures for the BFD protocol
using HMAC-SHA-256 (possibly truncated to a smaller integrity check
value but not beyond commonly accepted lengths to ensure security) using
the generic keying-based cryptographic authentication mechanism.

3. Provide an extension to the BFD core protocol in support of point-to-
multipoint links and networks.

4. Provide an informational document to recommend standardized timers
and timer operations for BFD when used in different applications.

5. Define a mechanism to perform single-ended path (i.e. continuity)
verification based on the BFD specification.  Allow such a mechanism to
work both proactively and on-demand, without prominent initial delay.
Allow the mechanism to maintain multiple sessions to a target entity and
between the same pair of network entities. In doing this work, the WG
will work closely with at least the following other WGs: ISIS, OSPF,
SPRING.

The working group will maintain a relationship with the MPLS working
group.

Milestones:
  Done     - Submit the base protocol specification to the IESG to be
considered as a Proposed Standard
  Done     - Submit BFD encapsulation and usage profile for single-hop
IPv4 and IPv6 adjacencies to the IESG to be considered as a Proposed
Standard
  Done     - Submit BFD encapsulation and usage profile for MPLS LSPs to
the IESG to be considered as a Proposed Standard
  Done     - Submit BFD encapsulation and usage profile for multi-hop
IPv4 and IPv6 adjacencies to the IESG to be considered as a Proposed
Standard
  Done     - Submit the BFD MIB to the IESG to be considered as a
Proposed Standard
  Done     - Submit the BFD over LAG mechanism to the IESG to be
considered as a Proposed Standard
  Jun 2014 - Submit the the document on BFD point-to-multipoint support
to the IESG to be considered as a Proposed Standard
  Nov 2014 - Submit the BFD MPLS extension MIB to the IESG to be
considered as a Proposed Standard
  Jan 2015 - Submit the generic keying based cryptographic authentication
mechanism to the IESG to be considered as a Proposed Standard
  Jan 2015 - Submit a BFD MIB extension in support of the generic keying
document to the IESG to be considered as a Proposed Standard
  Jan 2015 - Submit the cryptographic authentication procedures for BFD
to the IESG to be considered as a Proposed Standard
  Jan 2015 - Submit the BFD Common Intervals document to the IESG to be
considered as an Informational RFC


----- End forwarded message -----