
From nobody Sun Sep  3 05:10:35 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4C3713202D; Sun,  3 Sep 2017 05:10:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.5
X-Spam-Level: 
X-Spam-Status: No, score=-0.5 tagged_above=-999 required=5 tests=[BAYES_05=-0.5] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mEc1tABP_z1k; Sun,  3 Sep 2017 05:10:26 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D0E8132026; Sun,  3 Sep 2017 05:10:26 -0700 (PDT)
Received: from henrik by zinfandel.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1doTjN-0001LD-SC; Sun, 03 Sep 2017 05:10:25 -0700
To: codesprints@ietf.org, iesg@ietf.org, wgchairs@ietf.org
Message-Id: <E1doTjN-0001LD-SC@zinfandel.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Sun, 03 Sep 2017 05:10:25 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, henrik@levkowetz.com, iesg@ietf.org,  wgchairs@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/sKiVTwa-Saw4nV3ySuJQJyV32l8>
Subject: [codesprints] New datatracker release: v6.60.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Sep 2017 12:10:28 -0000

Hi,

This is an automatic notification about a new datatracker release, 
v6.60.0, generated when running the mkrelease script.

Release notes:

ietfdb (6.60.0) ietf; urgency=medium

  **Show NomCom eligibility on account page**

  This is a small feature release which adds person record creation during
  meeting attendance data import, fixes a previous issue with the import, and
  also uses the meeting attendence data to present NomCom eligibility
  information on peoples' account edit page.  Details:

  * Merged in ^/personal/sbirkholz/meeting_registration_more_fixes, which 
    adds creation of missing person records when importing meeting registration 
    data.  Tweaked the resulting code some.

  * Merged in [14088] from rcross@amsl.com:
    Strip whitespace from registration data during import.  Includes 
    migration for existing data.  Fixes #2356.   

  * Merged in [14086] from rjsparks@nostrum.com:
    Show whether a person is nomcom eligible on their edit_profile page. 
    Related to #2257 and #2323.  

  * Added an option to ietf.utils.draft.Draft to pull document name from 
    the source file name.

 -- Henrik Levkowetz <henrik@levkowetz.com>  03 Sep 2017 04:45:31 -0700

The new version is available for installation through SVN checkout, with
  'svn checkout https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.60.0'

For development, copy the new development version instead:
  'svn copy https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.60.1.dev0' <YOURBRANCH>

Regards,

	Henrik
	(via the mkrelease script)


From nobody Mon Sep  4 08:01:33 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0010B12426E; Mon,  4 Sep 2017 08:01:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d16NABIFcDmF; Mon,  4 Sep 2017 08:01:29 -0700 (PDT)
Received: from durif.tools.ietf.org (durif.tools.ietf.org [IPv6:2001:1900:3001:11::3d]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC58D132C2C; Mon,  4 Sep 2017 08:01:22 -0700 (PDT)
Received: from henrik by durif.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dossM-00067i-Kd; Mon, 04 Sep 2017 08:01:22 -0700
To: xml2rfc@ietf.org
Cc: codesprints@ietf.org, rfc-markdown@ietf.org
Message-Id: <E1dossM-00067i-Kd@durif.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Mon, 04 Sep 2017 08:01:22 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, rfc-markdown@ietf.org, xml2rfc@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on durif.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/QNeGU94dLlOh6FIbr_b80cDS-Y4>
Subject: [codesprints] New xml2rfc release: v2.8.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Sep 2017 15:01:31 -0000

Hi,

This is an automatic notification about a new xml2rfc release, 
v2.8.0, generated when running the mkrelease script.

Release notes:

xml2rfc (2.8.0) ietf; urgency=low
  This is a small feature release which changes URLs in boilerplate to
  use https: instead of http:.  There are also some bugfixes.
  * Include notes when doing index processing.  Fixes issue #335.
  * Include erefs with text equal to the URL in the URIs section.  See 
    issue #334.
  * Changed the use of http: to https: in many places.  In the generation 
    of RFCs, the code uses a switchover date of August 21, 2017 when deciding 
    whether to insert http: or https: URLs.  In practice, this means that RFCs 
    with a date of September 2017 or later will get https:.  Also fixed URL 
    line-breaking prevention to apply to https: URLS.  Fixes issue #333.
  * In urlkeep(), prevent breaking also for https:, not only http: URLs

The new version is available through SVN checkout, with
  'svn checkout http://svn.tools.ietf.org/svn/tools/xml2rfc/tags/cli/2.8.0'

Regards,

	Henrik
	(via the mkrelease script)


From nobody Mon Sep  4 12:01:39 2017
Return-Path: <dhruv.ietf@gmail.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3EF1126BFD; Mon,  4 Sep 2017 12:01:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XZzsugLc6_J8; Mon,  4 Sep 2017 12:01:20 -0700 (PDT)
Received: from mail-qk0-x233.google.com (mail-qk0-x233.google.com [IPv6:2607:f8b0:400d:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79C91126B6D; Mon,  4 Sep 2017 12:01:20 -0700 (PDT)
Received: by mail-qk0-x233.google.com with SMTP id b23so4668814qkg.1; Mon, 04 Sep 2017 12:01:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=FSl0pz6qokGMGGgy4BBJiUh4Q7rxhhH2h4LZjlCJAcY=; b=ef4PMYIJojTCbUK6uaBl2gu5l8jTANq8WnOZ+u0PtPsbWw0JXTNTQ1xTJ633cUTsrN h1F6y4DMbCey4pAOPQEQha1AxoyvCx7TMLkKsP9EirsWoCbCRvXRF5t1hrqXerYWas5N cYGd5QK9clSH85dD1erFokSrDRH3qT5+5z+5kPHBWgA8ghkJrC39ngY7ZYuXFAMlMfA6 LwlXDE/GFF/HjT4Clrqjs7mW4ZrJHs5kXfWPnLTLM0milBbTwl+U1rb71PWD3+YHU2rU DYqDUiypuB8oS+qX26YNtBA8/yMMKGun4wXaU22wreEb9hX9F/1wLEA+GQyKQw6syo7w UGpg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=FSl0pz6qokGMGGgy4BBJiUh4Q7rxhhH2h4LZjlCJAcY=; b=Jt2VyF+DT8yDp4Qi8cdqss0xS+/YWs/6JvJe9TfqqZZneSvpUFEPKir4nOufNIgDf6 NB2AJT/h/qYfB3i6dYscMsJNv29XesKjLNv8d//aqkoKdMn4KrK9JSkKlvyRR/UxkPmF s5SMHs+qJ3b+LbRnpb4TLDa4IGioRt7tUup9ZCkYPmPYpBrUdvCI2roYB3tvqYRJ4uPb K5MNtMIn3uXEG9kRTIzYhLyYVHvbFeQI4gqznjzr6cnwNBA0L3Y+BwwDnAOA7Yfu5q67 YdB6nw6I0W8TN1Yr6FJvvLDQIle9AutJDMjcyYtoEJH9XXRC20RWi0jFX2+2Wg0VLH2i V3VQ==
X-Gm-Message-State: AHPjjUgExlsfe/qw0Qu9NNmza8Hf4tTwycEAPIHdsIYyUQOgNrTSqpiX V3aOsn/uHX2pTBnplO2xKt1cLytmZUistZk=
X-Google-Smtp-Source: ADKCNb4LnCMUfr4yGSwBA1HjQ3l0K1k/843g/UH+U2HUc2leEFj4zBfHSZxtfbhQbZnsKBi8kRRrLWA8uhDwhvhwtAA=
X-Received: by 10.55.186.1 with SMTP id k1mr1291771qkf.28.1504551677548; Mon, 04 Sep 2017 12:01:17 -0700 (PDT)
MIME-Version: 1.0
Sender: dhruvdhody@gmail.com
X-Google-Sender-Delegation: dhruvdhody@gmail.com
Received: by 10.140.107.73 with HTTP; Mon, 4 Sep 2017 12:01:16 -0700 (PDT)
In-Reply-To: <E1dossM-00067i-Kd@durif.tools.ietf.org>
References: <E1dossM-00067i-Kd@durif.tools.ietf.org>
From: Dhruv Dhody <dhruv.ietf@gmail.com>
Date: Tue, 5 Sep 2017 00:31:16 +0530
X-Google-Sender-Auth: W2YPfiy6Atjqsou0kG6L5YbQ6Fs
Message-ID: <CAB75xn7P-iD_3O1AOP4pMY2HvS3DwjCr8xYJoSexoHyoUyRpzw@mail.gmail.com>
To: Henrik Levkowetz <henrik@levkowetz.com>
Cc: xml2rfc@ietf.org, rfc-markdown@ietf.org, codesprints@ietf.org
Content-Type: multipart/alternative; boundary="94eb2c043d0c497447055861bcfa"
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/n4HwGRlOg7xxmpwahDt2PJ9O00g>
Subject: Re: [codesprints] [xml2rfc] New xml2rfc release: v2.8.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Sep 2017 19:01:28 -0000

--94eb2c043d0c497447055861bcfa
Content-Type: text/plain; charset="UTF-8"

Hi,

Because of this change idnits is failing and submission for draft is
getting blocked.
I am going to make manual change now, idnits output below for your
reference -

Thanks!

Dhruv

idnits 2.14.01  /var/www/.idnits


tmp/draft-ietf-pce-pceps-17.txt:

  Checking boilerplate required by RFC 5378 and the IETF Trust (see
  http://trustee.ietf.org/license-info):
  ----------------------------------------------------------------------------

  ** The document seems to lack a License Notice according IETF Trust
     Provisions of 28 Dec 2009, Section 6.b.i or Provisions of 12 Sep 2009
     Section 6.b -- however, there's a paragraph with a matching beginning.
     Boilerplate error?

     IETF Trust Legal Provisions of 28-dec-2009, Section 6.b(i), paragraph 3:
        This document is subject to BCP 78 and the IETF Trust's Legal Provisions
        Relating to IETF Documents (http://trustee.ietf.org/license-info)
        in effect on the date of publication of this document.  Please
        review these documents carefully, as they describe your rights
        and restrictions with respect to this document.  Code Components
        extracted from this document must include Simplified BSD License
        text as described in Section 4.e of the Trust Legal Provisions
        and are provided without warranty as described in the Simplified
        BSD License.

     ... text found in draft:
        This document is subject to BCP 78 and the IETF Trust's Legal Provisions
        Relating to IETF Documents
..................................^
        (https://trustee.ietf.org/license-info) in effect on the date of
        publication of this document.  Please review these documents
        carefully, as they describe your rights and restrictions with
        respect to this document.  Code Components extracted from this
        document must include Simplified BSD License text as described in
        Section 4.e of the Trust Legal Provisions and are provided
        without warranty as described in the Simplified BSD License.



  Checking nits according to http://www.ietf.org/id-info/1id-guidelines.txt:
  ----------------------------------------------------------------------------

  ** The document seems to lack a 1id_guidelines paragraph about
     Internet-Drafts being working documents -- however, there's a paragraph
     with a matching beginning. Boilerplate error?

     1id_guidelines, paragraph 1:
        Internet-Drafts are working documents of the Internet Engineering Task
        Force (IETF), its areas, and its working groups.  Note that other
        groups may also distribute working documents as Internet-Drafts.

     ... text found in draft:
        Internet-Drafts are working documents of the Internet Engineering Task
        Force (IETF).  Note that other groups may also distribute working
....................^
        documents as Internet-Drafts.  The list of current
        Internet-Drafts is at
        https://datatracker.ietf.org/drafts/current/.


  ** The document seems to lack a 1id_guidelines paragraph about the list of
     current Internet-Drafts.

     1id_guidelines, paragraph 3:
        The list of current Internet-Drafts can be accessed at
        http://www.ietf.org/1id-abstracts.html

  ** The document seems to lack a 1id_guidelines paragraph about the list of
     Shadow Directories.

     1id_guidelines, paragraph 4:
        The list of Internet-Draft Shadow Directories can be accessed at
        http://www.ietf.org/shadow.html


  Checking nits according to http://www.ietf.org/id-info/checklist :
  ----------------------------------------------------------------------------

     No issues found here.

  Miscellaneous warnings:
  ----------------------------------------------------------------------------

  == The document seems to lack the recommended RFC 2119 boilerplate, even if
     it appears to use RFC 2119 keywords -- however, there's a paragraph with
     a matching beginning. Boilerplate error?

     RFC 2119, paragraph 2:
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
        this document are to be interpreted as described in RFC 2119.

     ... text found in draft:
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
................................................^
        and "OPTIONAL" in this document are to be interpreted as
        described in BCP 14 [RFC2119] [RFC8174] when, and only when, they
        appear in all capitals, as shown here.


     (The document does seem to have the reference to RFC 2119 which the
     ID-Checklist requires).
     (Using the creation date from RFC5440, updated by this document, for
     RFC5378 checks: 2007-11-16)

  -- The document seems to contain a disclaimer for pre-RFC5378 work, and may
     have content which was first submitted before 10 November 2008.  The
     disclaimer is necessary when there are original authors that you have
     been unable to contact, or if some do not wish to grant the BCP78 rights
     to the IETF Trust.  If you are able to get all authors (current and
     original) to grant those rights, you can and should remove the
     disclaimer; otherwise, the disclaimer is needed and you can ignore this
     comment. (See the Legal Provisions document at
     http://trustee.ietf.org/license-info for more information.)


  Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

     (See RFCs 3967 and 4897 for information about using normative references
     to lower-maturity documents in RFCs)

  -- Possible downref: Non-RFC (?) normative reference: ref. 'SHS'


     Summary: 4 errors (**), 0 flaws (~~), 1 warning (==), 2 comments (--).

--------------------------------------------------------------------------------


2	PCE Working Group                                               D. Lopez
3	Internet-Draft                                       O. Gonzalez de Dios
4	Updates: 5440 (if approved)                               Telefonica I+D
5	Intended status: Standards Track                                   Q. Wu
6	Expires: March 8, 2018                                          D. Dhody
7	                                                                  Huawei
8	                                                       September 4, 2017

10	                       Secure Transport for PCEP
11	                        draft-ietf-pce-pceps-17

13	Abstract

15	   The Path Computation Element Communication Protocol (PCEP) defines
16	   the mechanisms for the communication between a Path Computation
17	   Client (PCC) and a Path Computation Element (PCE), or among PCEs.
18	   This document describes the usage of Transport Layer Security (TLS)
19	   to enhance PCEP security, hence the PCEPS acronym proposed for it.
20	   The additional security mechanisms are provided by the transport
21	   protocol supporting PCEP, and therefore they do not affect the
22	   flexibility and extensibility of PCEP.

24	   This document updates RFC 5440 in regards to the PCEP initialization
25	   phase procedures.

27	Status of This Memo

29	   This Internet-Draft is submitted in full conformance with the
30	   provisions of BCP 78 and BCP 79.

32	   Internet-Drafts are working documents of the Internet Engineering
33	   Task Force (IETF).  Note that other groups may also distribute
34	   working documents as Internet-Drafts.  The list of current Internet-
35	   Drafts is at https://datatracker.ietf.org/drafts/current/.

37	   Internet-Drafts are draft documents valid for a maximum of six months
38	   and may be updated, replaced, or obsoleted by other documents at any
39	   time.  It is inappropriate to use Internet-Drafts as reference
40	   material or to cite them other than as "work in progress."

42	   This Internet-Draft will expire on March 8, 2018.

44	Copyright Notice

46	   Copyright (c) 2017 IETF Trust and the persons identified as the
47	   document authors.  All rights reserved.

49	   This document is subject to BCP 78 and the IETF Trust's Legal
50	   Provisions Relating to IETF Documents
51	   (https://trustee.ietf.org/license-info) in effect on the date of
52	   publication of this document.  Please review these documents
53	   carefully, as they describe your rights and restrictions with respect
54	   to this document.  Code Components extracted from this document must
55	   include Simplified BSD License text as described in Section 4.e of
56	   the Trust Legal Provisions and are provided without warranty as
57	   described in the Simplified BSD License.

59	   This document may contain material from IETF Documents or IETF
60	   Contributions published or made publicly available before November
61	   10, 2008.  The person(s) controlling the copyright in some of this
62	   material may not have granted the IETF Trust the right to allow
63	   modifications of such material outside the IETF Standards Process.
64	   Without obtaining an adequate license from the person(s) controlling
65	   the copyright in such materials, this document may not be modified
66	   outside the IETF Standards Process, and derivative works of it may
67	   not be created outside the IETF Standards Process, except to format
68	   it for publication as an RFC or to translate it into languages other
69	   than English.

71	Table of Contents

73	   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
74	   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   4
75	   3.  Applying PCEPS  . . . . . . . . . . . . . . . . . . . . . . .   4
76	     3.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .   4
77	     3.2.  Initiating the TLS Procedures . . . . . . . . . . . . . .   4
78	     3.3.  The StartTLS Message  . . . . . . . . . . . . . . . . . .   7
79	     3.4.  TLS Connection Establishment  . . . . . . . . . . . . . .  12
80	     3.5.  Peer Identity . . . . . . . . . . . . . . . . . . . . . .  14
81	     3.6.  Connection Establishment Failure  . . . . . . . . . . . .  15
82	   4.  Discovery Mechanisms  . . . . . . . . . . . . . . . . . . . .  15
83	     4.1.  DANE Applicability  . . . . . . . . . . . . . . . . . . .  16
84	   5.  Backward Compatibility  . . . . . . . . . . . . . . . . . . .  16
85	   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  17
86	     6.1.  New PCEP Message  . . . . . . . . . . . . . . . . . . . .  17
87	     6.2.  New Error-Values  . . . . . . . . . . . . . . . . . . . .  17
88	   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  18
89	   8.  Manageability Considerations  . . . . . . . . . . . . . . . .  19
90	     8.1.  Control of Function and Policy  . . . . . . . . . . . . .  19
91	     8.2.  Information and Data Models . . . . . . . . . . . . . . .  20
92	     8.3.  Liveness Detection and Monitoring . . . . . . . . . . . .  20
93	     8.4.  Verifying Correct Operations  . . . . . . . . . . . . . .  20
94	     8.5.  Requirements on Other Protocols . . . . . . . . . . . . .  20
95	     8.6.  Impact on Network Operation . . . . . . . . . . . . . . .  21
96	   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  21
97	   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  21
98	     10.1.  Normative References . . . . . . . . . . . . . . . . . .  21
99	     10.2.  Informative References . . . . . . . . . . . . . . . . .  23
100	   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  24

102	1.  Introduction

104	   The Path Computation Element Communication Protocol (PCEP) [RFC5440]
105	   defines the mechanisms for the communication between a Path
106	   Computation Client (PCC) and a Path Computation Element (PCE), or
107	   between two PCEs.  These interactions include requests and replies
108	   that can be critical for a sustainable network operation and adequate
109	   resource allocation, and therefore appropriate security becomes a key
110	   element in the PCE infrastructure.  As the applications of the PCE
111	   framework evolves, and more complex service patterns emerge, the
112	   definition of a secure mode of operation becomes more relevant.

114	   [RFC5440] analyzes in its section on security considerations the
115	   potential threats to PCEP and their consequences, and discusses
116	   several mechanisms for protecting PCEP against security attacks,
117	   without making a specific recommendation on a particular one or
118	   defining their application in depth.  Moreover, [RFC6952] remarks the
119	   importance of ensuring PCEP communication confidentiality, especially
120	   when PCEP communication endpoints do not reside in the same
121	   Autonomous System (AS), as the interception of PCEP messages could
122	   leak sensitive information related to computed paths and resources.

124	   Among the possible solutions mentioned in these documents, Transport
125	   Layer Security (TLS) [RFC5246] provides support for peer
126	   authentication, message encryption and integrity.  TLS provides well-
127	   known mechanisms to support key configuration and exchange, as well
128	   as means to perform security checks on the results of PCE discovery
129	   procedures via Interior Gateway Protocol (IGP) ([RFC5088] and
130	   [RFC5089]).

132	   This document describes a security container for the transport of
133	   PCEP messages, and therefore it does not affect the flexibility and
134	   extensibility of PCEP.

136	   This document describes how to apply TLS to secure interactions with
137	   PCE, including initiation of the TLS procedures, the TLS handshake
138	   mechanism, the TLS methods for peer authentication, the applicable
139	   TLS ciphersuites for data exchange, and the handling of errors in the
140	   security checks.  In the rest of the document we will refer to this
141	   usage of TLS to provide a secure transport for PCEP as "PCEPS".

143	   Within this document, PCEP communications are described through PCC-
144	   PCE relationship.  The PCE architecture also supports the PCE-PCE
145	   communication, this is achieved by requesting PCE fill the role of a
146	   PCC, as usual.  Thus, in this document, the PCC refers to a PCC or a
147	   PCE initiating the PCEP session and acting as a client.

149	2.  Requirements Language

151	   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
152	   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
153	   "OPTIONAL" in this document are to be interpreted as described in BCP
154	   14 [RFC2119] [RFC8174] when, and only when, they appear in all
155	   capitals, as shown here.

157	3.  Applying PCEPS

159	3.1.  Overview

161	   The steps involved in establishing a PCEPS session are as follows:

163	   1.  Establishment of a TCP connection.

165	   2.  Initiating the TLS procedures by the StartTLS message from PCE to
166	       PCC and from PCC to PCE.

168	   3.  Negotiation and establishment of TLS connection.

170	   4.  Start exchanging PCEP messages as per [RFC5440].

172	   This document uses the standard StartTLS procedure in PCEP, instead
173	   of using a different port for the secured session.  This is done to
174	   avoid requesting allocation of another port number for the PCEPS.
175	   The StartTLS procedure makes more efficient use of scarce port
176	   numbers and allow simpler configuration of PCEP.

178	   Implementations SHOULD follow the best practices and recommendations
179	   for using TLS, as per [RFC7525].

181	   It should be noted that this procedure updates what is defined in
182	   section 4.2.1 and section 6.7 of [RFC5440] regarding the
183	   initialization phase and the processing of messages prior to the Open
184	   message.  The details of processing, including backward
185	   compatibility, are discussed in the following sections.

187	3.2.  Initiating the TLS Procedures

189	   Since PCEP can operate either with or without TLS, it is necessary
190	   for a PCEP speaker to indicate whether it wants to set up a TLS
191	   connection or not.  For this purpose, this document specifies a new
192	   PCEP message called StartTLS.  Thus, the PCEP session is secured via
193	   TLS from the start before exchange of any other PCEP message (that
194	   includes the Open message).  This document thus updates [RFC5440],
195	   which required the Open message to be the first PCEP message that is
196	   exchanged.  In the case of a PCEP session using TLS, the StartTLS
197	   message will be sent first.  Also a PCEP speaker that supports PCEPS
198	   MUST NOT start the OpenWait timer after the TCP establishment,
199	   instead it starts a StartTLSWait timer as described in Section 3.3.

201	   The PCEP speaker MAY discover that the PCEP peer supports PCEPS or
202	   can be preconfigured to use PCEPS for a given peer (see Section 4 for
203	   more details).  An existing PCEP session cannot be secured via TLS,
204	   the session MUST be closed and re-established with TLS as per the
205	   procedure described in this document.

207	   The StartTLS message is a PCEP message sent by a PCC to a PCE and by
208	   a PCE to a PCC in order to initiate the TLS procedure for PCEP.  The
209	   PCC initiates the use of TLS by sending a StartTLS message.  The PCE
210	   agrees to the use of TLS by responding with its own StartTLS message.
211	   If the PCE is configured to only support TLS, it may send the
212	   StartTLS message immediately upon TCP connection establishment;
213	   otherwise it MUST wait for the PCC's first message to see whether it
214	   is an Open or a StartTLS message.  The TLS negotiation and
215	   establishment procedures are triggered once the PCEP speaker has sent
216	   and received the StartTLS message.  The Message-Type field of the
217	   PCEP common header for the StartTLS message is set to [TBA1 by IANA].

219	   Once the TCP connection has been successfully established, the first
220	   message sent by the PCC to the PCE and by the PCE to the PCC MUST be
221	   a StartTLS message for the PCEPS.  Note that, this is a significant
222	   change from [RFC5440], where the first PCEP message is the Open
223	   message.

225	   A PCEP speaker receiving a StartTLS message, after any other PCEP
226	   exchange has taken place (by receiving or sending any other messages
227	   from either side) MUST treat it as an unexpected message and reply
228	   with a PCErr message with Error-Type set to [TBA2 by IANA] (PCEP
229	   StartTLS failure) and Error-value set to 1 (reception of StartTLS
230	   after any PCEP exchange), and MUST close the TCP connection.

232	   Any message received prior to StartTLS or Open message MUST trigger a
233	   protocol error condition causing a PCErr message to be sent with
234	   Error-Type set to [TBA2 by IANA] (PCEP StartTLS failure) and Error-
235	   value set to 2 (reception of a message apart from StartTLS or Open)
236	   and MUST close the TCP connection.

238	   If the PCEP speaker that does not support PCEPS, receives a StartTLS
239	   message, it will behave according to the existing error mechanism
240	   described in section 6.2 of [RFC5440] (in case message is received
241	   prior to an Open message) or section 6.9 of [RFC5440] (for the case
242	   of reception of unknown message).  See Section 5 for more details.

244	   If the PCEP speaker that only supports PCEPS connection (as a local
245	   policy), receives an Open message, it MUST treat it as an unexpected
246	   message and reply with a PCErr message with Error-Type set to 1 (PCEP
247	   session establishment failure) and Error-value set to 1 (reception of
248	   an invalid Open message or a non Open message), and MUST close the
249	   TCP connection.

251	   If a PCC supports PCEPS connections as well as allow non-PCEPS
252	   connection (as a local policy), it MUST first try to establish PCEPS,
253	   by sending StartTLS message and in case it receives an PCErr message
254	   from the PCE, it MAY retry to establish connection without PCEPS by
255	   sending an Open message.  If a PCE supports PCEPS connections as well
256	   as allow non-PCEPS connection (as a local policy), it MUST wait to
257	   respond after TCP establishment, based on the message received from
258	   the PCC.  In case of StartTLS message, PCE MUST respond with sending
259	   a StartTLS message and moving to TLS establishment procedures as
260	   described in this document.  In case of Open message, PCE MUST
261	   respond with Open message and move to PCEP session establishment
262	   procedure as per [RFC5440].  If a PCE supports PCEPS connections only
263	   (as a local policy), it MAY send StartTLS message to PCC without
264	   waiting to receive a StartTLS message from PCC.

266	   If a PCEP speaker that is unwilling or unable to negotiate TLS
267	   receives a StartTLS messages, it MUST return a PCErr message (in
268	   clear) with Error-Type set to [TBA2 by IANA] (PCEP StartTLS failure)
269	   and Error-value set to:

271	   o  3 (Failure, connection without TLS is not possible) if it is not
272	      willing to exchange PCEP messages without the solicited TLS
273	      connection, and it MUST close the TCP session.

275	   o  4 (Failure, connection without TLS is possible) if it is willing
276	      to exchange PCEP messages without the solicited TLS connection,
277	      and it MUST close the TCP session.  The receiver MAY choose to
278	      attempt to re-establish the PCEP session without TLS next.  The
279	      attempt to re-establish the PCEP session without TLS SHOULD be
280	      limited to only once.

282	   If the PCEP speaker supports PCEPS and can establish a TLS connection
283	   it MUST start the TLS connection negotiation and establishment steps
284	   described in Section 3.4 before the PCEP initialization procedure
285	   (section 4.2.1 of [RFC5440]).

287	   After the exchange of StartTLS messages, if the TLS negotiation fails
288	   for some reason (e.g. the required mechanisms for certificate
289	   revocation checking are not available), both peers SHOULD immediately
290	   close the connection.

292	   A PCEP speaker that does not support PCEPS sends the Open message
293	   directly, as per [RFC5440].  A PCEP speaker that supports PCEPS, but
294	   has learned in the last exchange the peer's willingness to
295	   reestablish session without TLS, MAY send the Open message directly,
296	   as per [RFC5440].  The attempt to re-establish the PCEP session
297	   without TLS SHOULD be limited to only once.

299	   Given the asymmetric nature of TLS for connection establishment, it
300	   is relevant to identify the roles of each of the PCEP peers in it.
301	   The PCC SHALL act as TLS client, and the PCE SHALL act as TLS server
302	   as per [RFC5246].

304	   As per the recommendation from [RFC7525] to avoid downgrade attacks,
305	   PCEP peers that support PCEPS, SHOULD default to strict TLS
306	   configuration i.e. do not allow non-TLS PCEP sessions to be
307	   established.  PCEPS implementations MAY provide an option to allow
308	   the operator to manually override strict TLS configuration and allow
309	   unsecured connections.  Execution of this override SHOULD trigger a
310	   warning about the security implications of permitting unsecured
311	   connections.

313	3.3.  The StartTLS Message

315	   The StartTLS message is used to initiate the TLS procedure for a
316	   PCEPS session between the PCEP peers.  A PCEP speaker sends the
317	   StartTLS message to request negotiation and establishment of TLS
318	   connection for PCEP.  On receiving a StartTLS message from the PCEP
319	   peer (i.e.  when the PCEP speaker has sent and received StartTLS
320	   message) it is ready to start the negotiation and establishment of
321	   TLS and move to steps described in Section 3.4.

323	   The collision resolution procedures described in [RFC5440] for the
324	   exchange of Open messages MUST be applied by the PCEP peers during
325	   the exchange of StartTLS messages.

327	   The format of a StartTLS message is as follows:

329	      <StartTLS Message>::= <Common Header>

331	   The StartTLS message MUST contain only the PCEP common header with
332	   Message-Type field set to [TBA1 by IANA].

334	   Once the TCP connection has been successfully established, the PCEP
335	   speaker MUST start a timer called StartTLSWait timer, after the
336	   expiration of which, if neither StartTLS message has been received,
337	   nor a PCErr/Open message (in case of failure and PCEPS not supported
338	   by the peer, respectively), it MUST send a PCErr message with Error-
339	   Type set to [TBA2 by IANA] and Error-value set to 5 (no StartTLS (nor
340	   PCErr/Open) message received before the expiration of the
341	   StartTLSWait timer) and it MUST release the TCP connection . A
342	   RECOMMENDED value for StartTLSWait timer is 60 seconds.  The value of
343	   StartTLSWait timer MUST NOT be less than OpenWait timer.

345	                  +-+-+                 +-+-+
346	                  |PCC|                 |PCE|
347	                  +-+-+                 +-+-+
348	                    |                     |
349	                    | StartTLS            |
350	                    | msg                 |
351	                    |-------              |
352	                    |       \   StartTLS  |
353	                    |        \  msg       |
354	                    |         \  ---------|
355	                    |          \/         |
356	                    |          /\         |
357	                    |         /  -------->|
358	                    |        /            |
359	                    |<------              |
360	                    |:::::::::TLS:::::::::|
361	                    |:::::Establishment:::|
362	                    |                     |
363	                    |                     |
364	                    |:::::::PCEP::::::::::|
365	                    |                     |

367	            Figure 1: Both PCEP Speaker supports PCEPS (strict)
368	                  +-+-+                 +-+-+
369	                  |PCC|                 |PCE|
370	                  +-+-+                 +-+-+
371	                    |                     |
372	                    | StartTLS            |
373	                    | msg                 |
374	                    |-------              |
375	                    |       \   StartTLS  |
376	                    |        \  msg       |
377	                    |         \  ---------|
378	                    |          \/         |
379	                    |          /\         |
380	                    |         /  -------->|
381	                    |        /            |
382	                    |<------              |
383	                    |:::::::::TLS:::::::::| TLS Establishment
384	                    |:::::Establishment:::| Failure, Both
385	                    |                     | peers close
386	                                            session

388	      Figure 2: Both PCEP Speaker supports PCEPS (strict), but cannot
389	                               establish TLS

391	                  +-+-+                 +-+-+
392	                  |PCC|                 |PCE|
393	                  +-+-+                 +-+-+
394	                    |                     |  Does not support
395	                    | StartTLS            |  PCEPS and thus
396	                    | msg                 |  sends Open
397	                    |-------              |
398	                    |       \   Open      |
399	                    |        \  msg       |
400	                    |         \  ---------|
401	                    |          \/         |
402	                    |          /\         |
403	                    |         /  -------->|
404	                    |        /            |
405	                    |<------              |
406	                    |                     |
407	                    |<--------------------| Send Error
408	                    |       PCErr         | Type=1,Value=1
409	                    |                     | (non-Open message
410	                    |<--------------------|  received)
411	                    |       Close         |
412	                    ///////// TCP /////////
413	                    //////re-establish/////
414	          Send Open | Open                |
415	          this time | msg                 |
416	                    |-------              |
417	                    |       \   Open      |
418	                    |        \  msg       |
419	                    |         \  ---------|
420	                    |          \/         |
421	                    |          /\         |
422	                    |         /  -------->|
423	                    |        /            |
424	                    |<------              |

426	    Figure 3: One PCEP Speaker (PCE) does not support PCEPS, while PCC
427	                    supports both with or without PCEPS

429	                  +-+-+                 +-+-+
430	                  |PCC|                 |PCE|
431	                  +-+-+                 +-+-+
432	                    |                     |
433	                    | StartTLS            |
434	                    | msg                 | PCE waits
435	                    |-------------------->| for PCC and
436	                    |            StartTLS | respond with
437	                    |<--------------------| Start TLS
438	                    |                     |
439	                    |:::::::::TLS:::::::::|
440	                    |:::::Establishment:::|
441	                    |                     |
442	                    |                     |
443	                    |:::::::PCEP::::::::::|
444	                    |                     |

446	    Figure 4: Both PCEP Speaker supports PCEPS as well as without PCEPS

448	                  +-+-+                 +-+-+
449	                  |PCC|                 |PCE|
450	                  +-+-+                 +-+-+
451	                    |                     |
452	                    | StartTLS            |
453	                    | msg                 | PCE waits
454	                    |-------------------->| for PCC
455	                    |               PCErr |
456	                    |<--------------------| Send Error
457	                    |                     | Type=TBA2,Value=3
458	                    |                     | (Failure, connection
459	                    |<--------------------|  without TLS is not
460	                    |       Close         |  possible)

462	   Figure 5: Both PCEP Speaker supports PCEPS as well as without PCEPS,
463	                   but PCE cannot start TLS negotiation

465	                  +-+-+                 +-+-+
466	                  |PCC|                 |PCE|
467	                  +-+-+                 +-+-+
468	                    |                     |
469	                    | Open                |
470	                    | msg                 | PCE waits
471	                    |-------------------->| for PCC and
472	                    |                Open | respond with
473	                    |<--------------------| Open
474	                    |                     |
475	                    |:::::::PCEP::::::::::|
476	                    |                     |

478	   Figure 6: PCE supports PCEPS as well as without PCEPS, while PCC does
479	                             not support PCEPS

481	3.4.  TLS Connection Establishment

483	   Once the establishment of TLS has been agreed by the PCEP peers, the
484	   connection establishment SHALL follow the following steps:

486	   1.  Immediately negotiate a TLS session according to [RFC5246].  The
487	       following restrictions apply:

489	       *  Support for TLS v1.2 [RFC5246] or later is REQUIRED.

491	       *  Support for certificate-based mutual authentication is
492	          REQUIRED.

494	       *  Negotiation of a ciphersuite providing for integrity
495	          protection is REQUIRED.

497	       *  Negotiation of a ciphersuite providing for confidentiality is
498	          RECOMMENDED.

500	       *  Support for and negotiation of compression is OPTIONAL.

502	       *  PCEPS implementations MUST, at a minimum, support negotiation
503	          of the TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [RFC6460], and
504	          SHOULD support TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as
505	          well.  Implementations SHOULD support the NIST P-256
506	          (secp256r1) curve [RFC4492].  In addition, PCEPS
507	          implementations MUST support negotiation of the mandatory-to-
508	          implement ciphersuites required by the versions of TLS that
509	          they support from TLS 1.3 onwards.

511	   2.  Peer authentication can be performed in any of the following two
512	       REQUIRED operation models:

514	       *  TLS with X.509 certificates using Public-Key Infrastructure
515	          Exchange (PKIX) trust models:

517	          +  Implementations MUST allow the configuration of a list of
518	             trusted Certification Authorities (CAs) for incoming
519	             connections.

521	          +  Certificate validation MUST include the verification rules
522	             as per [RFC5280].

524	          +  PCEPS implementations SHOULD incorporate revocation methods
525	             (CRL downloading, OCSP...) according to the trusted CA
526	             policies.

528	          +  Implementations SHOULD indicate their trusted CAs.  For TLS
529	             1.2, this is done using [RFC5246], Section 7.4.4,
530	             "certificate_authorities" (server side) and [RFC6066],
531	             Section 6 "Trusted CA Indication" (client side).

533	          +  Implementations MUST follow the rules and guidelines for
534	             peer validation as defined in [RFC6125].  If an expected
535	             DNS name or IP address for the peer is configured, then the
536	             implementations MUST check them against the values in the
537	             presented certificate.  The DNS names and the IP addresses
538	             can be contained in the CN-ID [RFC6125] (Common Name
539	             Identifier) or the subjectAltName entries.  For
540	             verification, only one of these entries is considered.  The
541	             following precedence applies: for DNS name validation, DNS-
542	             ID [RFC6125] has precedence over CN-ID; for IP address
543	             validation, subjectAltName:iPAddr has precedence over CN-
544	             ID.

546	          +  Implementations MAY allow the configuration of a set of
547	             additional properties of the certificate to check for a
548	             peer's authorization to communicate (e.g., a set of allowed
549	             values in URI-ID [RFC6125] or a set of allowed X509v3
550	             Certificate Policies).  The definition of these properties
551	             are out of scope of this document.

553	       *  TLS with X.509 certificates using certificate fingerprints:
554	          Implementations MUST allow the configuration of a list of
555	          certificates that are trusted to identify peers, identified
556	          via fingerprint of the Distinguished Encoding Rules (DER)
557	          encoded certificate octets.  Implementations MUST support
558	          SHA-256 as defined by [SHS] as the hash algorithm for the
559	          fingerprint, but a later revision may demand support for a
560	          stronger hash function.

562	   3.  Start exchanging PCEP messages.

564	       *  Once the TLS connection has been successfully established, the
565	          PCEP speaker MUST start the OpenWait timer [RFC5440], after
566	          the expiration of which, if no Open message has been received,
567	          it sends a PCErr message and releases the TCP/TLS connection.

569	3.5.  Peer Identity

571	   Depending on the peer authentication method in use, PCEPS supports
572	   different operation modes to establish peer's identity and whether it
573	   is entitled to perform requests or can be considered authoritative in
574	   its replies.  PCEPS implementations SHOULD provide mechanisms for
575	   associating peer identities with different levels of access and/or
576	   authoritativeness, and they MUST provide a mechanism for establishing
577	   a default level for properly identified peers.  Any connection
578	   established with a peer that cannot be properly identified SHALL be
579	   terminated before any PCEP exchange takes place.

581	   In TLS-X.509 mode using fingerprints, a peer is uniquely identified
582	   by the fingerprint of the presented certificate.

584	   There are numerous trust models in PKIX environments, and it is
585	   beyond the scope of this document to define how a particular
586	   deployment determines whether a peer is trustworthy.  Implementations
587	   that want to support a wide variety of trust models should expose as
588	   many details of the presented certificate to the administrator as
589	   possible so that the trust model can be implemented by the
590	   administrator.  At least the following parameters of the X.509
591	   certificate SHOULD be exposed:

593	   o  Peer's IP address

595	   o  Peer's fully qualified domain name (FQDN)

597	   o  Certificate Fingerprint

599	   o  Issuer

601	   o  Subject

603	   o  All X509v3 Extended Key Usage

605	   o  All X509v3 Subject Alternative Name

607	   o  All X509v3 Certificate Policies
608	   Note that the remote IP address used for the TCP session
609	   establishment is also exposed.

611	   [I-D.ietf-pce-stateful-sync-optimizations] specify a Speaker Entity
612	   Identifier TLV (SPEAKER-ENTITY-ID), as an optional TLV that is
613	   included in the OPEN Object.  It contains a unique identifier for the
614	   node that does not change during the lifetime of the PCEP speaker.
615	   An implementation would thus expose the speaker entity identifier as
616	   part of the X509v3 certificate's subjectAltName:otherName, so that an
617	   implementation could use this identifier for the peer identification
618	   trust model.

620	   In addition, a PCC MAY apply the procedures described in [RFC6698]
621	   DNS-Based Authentication of Named Entities (DANE) to verify its peer
622	   identity when using DNS discovery.  See section Section 4.1 for
623	   further details.

625	3.6.  Connection Establishment Failure

627	   In case the initial TLS negotiation or the peer identity check fails,
628	   according to the procedures listed in this document, both peers
629	   SHOULD immediately close the connection.

631	   The initiator SHOULD follow the procedure listed in [RFC5440] to
632	   retry session setup as per the exponential back-off session
633	   establishment retry procedure.

635	4.  Discovery Mechanisms

637	   This document does not specify any discovery mechanism for support of
638	   PCEPS.  Other documents, [I-D.wu-pce-discovery-pceps-support] and
639	   [I-D.wu-pce-dns-pce-discovery] have made proposals:

641	   o  A PCE can advertise its capability to support PCEPS using the
642	      IGP's advertisement mechanism of the PCE discovery information.
643	      The PCE-CAP-FLAGS sub-TLV is an optional sub-TLV used to advertise
644	      PCE capabilities.  It is present within the PCE Discovery (PCED)
645	      sub-TLV carried by OSPF or IS-IS.  [RFC5088] and [RFC5089] provide
646	      the description and processing rules for this sub-TLV when carried
647	      within OSPF and IS-IS, respectively.  PCE capability bits are
648	      defined in [RFC5088].  A new capability flag bit for the PCE-CAP-
649	      FLAGS sub-TLV that can be announced as an attribute to distribute
650	      PCEP security support information is proposed in
651	      [I-D.wu-pce-discovery-pceps-support].

653	   o  A PCE can advertise its capability to support PCEPS using the DNS
654	      [I-D.wu-pce-dns-pce-discovery] by identifying the support of TLS.

656	4.1.  DANE Applicability

658	   DANE [RFC6698] defines a secure method to associate the certificate
659	   that is obtained from a TLS server with a domain name using DNS,
660	   i.e., using the TLSA DNS resource record (RR) to associate a TLS
661	   server certificate or public key with the domain name where the
662	   record is found, thus forming a "TLSA certificate association".  The
663	   DNS information needs to be protected by DNS Security (DNSSEC).  A
664	   PCC willing to apply DANE to verify server identity MUST conform to
665	   the rules defined in section 4 of [RFC6698].  The implementation MUST
666	   support Service certificate constraint (TLSA Certificate Usages type
667	   1) with Matching type 2 (SHA2-256) as described in
668	   [RFC6698][RFC7671].  The server's domain name must be authorized
669	   separately, as TLSA does not provide any useful authorization
670	   guarantees.

672	5.  Backward Compatibility

674	   The procedures described in this document define a security container
675	   for the transport of PCEP requests and replies carried by a TLS
676	   connection initiated by means of a specific extended message
677	   (StartTLS) that does not interfere with PCEP speaker implementations
678	   not supporting it.

680	   A PCC that does not support PCEPS will send Open message as the first
681	   message on TCP establishment.  A PCE that supports PCEPS only, will
682	   send StartTLS message on TCP establishment.  On receiving StartTLS
683	   message, PCC would consider it as an error and behave according to
684	   the existing error mechanism of [RFC5440] and send PCErr message with
685	   Error-Type 1 (PCEP session establishment failure) and Error-Value 1
686	   (reception of an invalid Open message or a non Open message) and
687	   close the session.

689	   A PCC that support PCEPS will send StartTLS message as the first
690	   message on TCP establishment.  A PCE that does not supports PCEPS,
691	   would consider receiving StartTLS message as an error and respond
692	   with PCErr message (with Error-Type 1 and Error-Value 1) and close
693	   the session.

695	   If a StartTLS message is received at any other time by a PCEP speaker
696	   that does not implement PCEPS, it would consider it as an unknown
697	   message and would behave according to the existing error mechanism of
698	   [RFC5440] and send PCErr message with Error-Type 2 (Capability not
699	   supported) and close the session.

701	   An existing PCEP session cannot be upgraded to PCEPS, the session
702	   needs to be terminated and reestablished as per the procedure
703	   described in this document.  During the incremental upgrade, the PCEP
704	   speaker SHOULD allow session establishment with and without TLS.
705	   Once both PCEP speakers are upgraded to support PCEPS, the PCEP
706	   session is re-established with TLS, otherwise PCEP session without
707	   TLS is setup.  A redundant PCE MAY also be used during the
708	   incremental deployment to take over the PCE undergoing upgrade.  Once
709	   the upgrade is completed, support for unsecured version SHOULD be
710	   removed.

712	   A PCE that accepts connections with or without PCEPS, it would
713	   respond based on the message received from PCC.  A PCC that supports
714	   connection with or without PCEPS, it would first attempt to connect
715	   with PCEPS and in case of error, it MAY retry to establish connection
716	   without PCEPS.  For successful TLS operations with PCEP, both PCEP
717	   peers in the network would need to be upgraded to support this
718	   document.

720	   Note that, a PCEP implementation that support PCEPS would respond
721	   with PCErr message with Error-Type set to [TBA2 by IANA] (PCEP
722	   StartTLS failure) and Error-value set to 2 if any other message is
723	   sent before StartTLS or Open.  If the sender of the invalid message
724	   is a PCEP implementation that does not support PCEPS, it will not be
725	   able to understand this error.  A PCEPS implementation could also
726	   send the PCErr message as per [RFC5440] with Error-Type "PCEP session
727	   establishment failure" and Error-value "reception of an invalid Open
728	   message or a non Open message" before closing the session.

730	6.  IANA Considerations

732	6.1.  New PCEP Message

734	   IANA is requested to allocate new message types within the "PCEP
735	   Messages" sub-registry of the PCEP Numbers registry, as follows:

737	      Value  Description                             Reference
738	       TBA1  The Start TLS Message (StartTLS)        This document

740	6.2.  New Error-Values

742	   IANA is requested to allocate new Error Types and Error Values within
743	   the " PCEP-ERROR Object Error Types and Values" sub-registry of the
744	   PCEP Numbers registry, as follows:

746	   Error-
747	   Type    Meaning               Error-value             Reference

749	   TBA2    PCEP StartTLS         0:Unassigned            This document
750	           failure               1:Reception of          This document
751	                                 StartTLS after
752	                                 any PCEP exchange
753	                                 2:Reception of          This document
754	                                 any other message
755	                                 apart from StartTLS,
756	                                 Open or PCErr
757	                                 3:Failure, connection   This document
758	                                 without TLS is not
759	                                 possible
760	                                 4:Failure, connection   This document
761	                                 without TLS is
762	                                 possible
763	                                 5:No StartTLS message   This document
764	                                 (nor PCErr/Open)
765	                                 before StartTLSWait
766	                                 timer expiry

768	7.  Security Considerations

770	   While the application of TLS satisfies the requirement on
771	   confidentiality as well as fine-grained, policy-based peer
772	   authentication, there are security threats that it cannot address.
773	   It may be advisable to apply additional protection measures, in
774	   particular in what relates to attacks specifically addressed to
775	   forging the TCP connection underpinning TLS, especially in the case
776	   of long-lived connections.  One of these measures is the application
777	   of TCP-AO (TCP Authentication Option [RFC5925]), which is fully
778	   compatible with and deemed as complementary to TLS.  The mechanisms
779	   to configure the requirements to use TCP-AO and other lower-layer
780	   protection measures with a particular peer are outside the scope of
781	   this document.

783	   Since computational resources required by TLS handshake and
784	   ciphersuite are higher than unencrypted TCP, clients connecting to a
785	   PCEPS server can more easily create high load conditions and a
786	   malicious client might create a Denial-of-Service attack more easily.

788	   Some TLS ciphersuites only provide integrity validation of their
789	   payload, and provide no encryption, such ciphersuites SHOULD NOT be
790	   used by default.  Administrators MAY allow the usage of these
791	   ciphersuites after careful weighting of the risk of relevant internal
792	   data leakage, that can occur in such a case, as explicitly stated by
793	   [RFC6952].

795	   When using certificate fingerprints to identify PCEPS peers, any two
796	   certificates that produce the same hash value will be considered the
797	   same peer.  Therefore, it is important to make sure that the hash
798	   function used is cryptographically uncompromised, so that attackers
799	   are very unlikely to be able to produce a hash collision with a
800	   certificate of their choice.  This document mandates support for
801	   SHA-256 as defined by [SHS], but a later revision may demand support
802	   for stronger functions if suitable attacks on it are known.

804	   PCEPS implementations that continue to accept connections without TLS
805	   are susceptible to downgrade attacks as described in [RFC7457].  An
806	   attacker could attempt to remove the use of StartTLS message that
807	   request the use of TLS as it pass on the wire in clear, and further
808	   inject a PCErr message that suggest to attempt PCEP connection
809	   without TLS.

811	   The guidance given in [RFC7525] SHOULD be followed to avoid attacks
812	   on TLS.

814	8.  Manageability Considerations

816	   All manageability requirements and considerations listed in [RFC5440]
817	   apply to PCEP protocol extensions defined in this document.  In
818	   addition, requirements and considerations listed in this section
819	   apply.

821	8.1.  Control of Function and Policy

823	   A PCE or PCC implementation SHOULD allow configuring the PCEP
824	   security via TLS capabilities as described in this document.

826	   A PCE or PCC implementation supporting PCEP security via TLS MUST
827	   support general TLS configuration as per [RFC5246].  At least the
828	   configuration of one of the trust models and its corresponding
829	   parameters, as described in Section 3.4 and Section 3.5, MUST be
830	   supported by the implementation.

832	   A PCEP implementation SHOULD allow configuring the StartTLSWait timer
833	   value.

835	   PCEPS implementations MAY provide an option to allow the operator to
836	   manually override strict TLS configuration and allow unsecure
837	   connections.  Execution of this override SHOULD trigger a warning
838	   about the security implications of permitting unsecure connections.

840	   Further, the operator needs to develop suitable security policies
841	   around PCEP within his network.  The PCEP peers SHOULD provide ways
842	   for the operator to complete the following tasks in regards to a PCEP
843	   session:

845	   o  Determine if a session is protected via PCEPS.

847	   o  Determine the version of TLS, the mechanism used for
848	      authentication, and the ciphersuite in use.

850	   o  Determine if the certificate could not be verified, and the reason
851	      for this circumstance.

853	   o  Inspect the certificate offered by the PCEP peer.

855	   o  Be warned if StartTLS procedure fails for the PCEP peers, that are
856	      known to support PCEPS via configurations or capability
857	      advertisements.

859	8.2.  Information and Data Models

861	   The PCEP MIB module is defined in [RFC7420].  The MIB module could be
862	   extended to include the ability to view the PCEPS capability, TLS
863	   related information as well as TLS status for each PCEP peer.

865	   Further, to allow the operator to configure the PCEPS capability and
866	   various TLS related parameters as well as to view the current TLS
867	   status for a PCEP session, the PCEP YANG module
868	   [I-D.ietf-pce-pcep-yang] is extended to include TLS related
869	   information.

871	8.3.  Liveness Detection and Monitoring

873	   Mechanisms defined in this document do not imply any new liveness
874	   detection and monitoring requirements in addition to those already
875	   listed in [RFC5440] and [RFC5246].

877	8.4.  Verifying Correct Operations

879	   A PCEPS implementation SHOULD log error events and provide PCEPS
880	   failure statistics with reasons.

882	8.5.  Requirements on Other Protocols

884	   Mechanisms defined in this document do not imply any new requirements
885	   on other protocols.  Note that, Section 4 list possible discovery
886	   mechanism for support of PCEPS.

888	8.6.  Impact on Network Operation

890	   Mechanisms defined in this document do not have any significant
891	   impact on network operations in addition to those already listed in
892	   [RFC5440], and the policy and management implications discussed
893	   above.

895	9.  Acknowledgements

897	   This specification relies on the analysis and profiling of TLS
898	   included in [RFC6614] and the procedures described for the STARTTLS
899	   command in [RFC4513].

901	   We would like to thank Joe Touch for his suggestions and support
902	   regarding the StartTLS mechanisms.

904	   Thanks to Daniel King for reminding the authors about manageability
905	   considerations.

907	   Thanks to Cyril Margaria for shepherding this document.

909	   Thanks to David Mandelberg for early SECDIR review comments as well
910	   as re-reviewing during IETF last call.

912	   Thanks to Dan Frost for the RTGDIR review and comments.

914	   Thanks to Dale Worley for the Gen-ART review and comments.

916	   Also thanks to Tianran Zhou for OPSDIR review.

918	   Thanks to Deborah Brungard for being the responsible AD and guiding
919	   the authors as needed.

921	   Thanks to Mirja Kuhlewind, Eric Rescorla, Warren Kumari, Kathleen
922	   Moriarty, Suresh Krishnan, Ben Campbell and Alexey Melnikov for the
923	   IESG review and comments.

925	10.  References

927	10.1.  Normative References

929	   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
930	              Requirement Levels", BCP 14, RFC 2119,
931	              DOI 10.17487/RFC2119, March 1997,
932	              <https://www.rfc-editor.org/info/rfc2119>.

934	   [RFC5246]  Dierks, T. and E. Rescorla, "The Transport Layer Security
935	              (TLS) Protocol Version 1.2", RFC 5246,
936	              DOI 10.17487/RFC5246, August 2008,
937	              <https://www.rfc-editor.org/info/rfc5246>.

939	   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
940	              Housley, R., and W. Polk, "Internet X.509 Public Key
941	              Infrastructure Certificate and Certificate Revocation List
942	              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
943	              <https://www.rfc-editor.org/info/rfc5280>.

945	   [RFC5440]  Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation
946	              Element (PCE) Communication Protocol (PCEP)", RFC 5440,
947	              DOI 10.17487/RFC5440, March 2009,
948	              <https://www.rfc-editor.org/info/rfc5440>.

950	   [RFC6066]  Eastlake 3rd, D., "Transport Layer Security (TLS)
951	              Extensions: Extension Definitions", RFC 6066,
952	              DOI 10.17487/RFC6066, January 2011,
953	              <https://www.rfc-editor.org/info/rfc6066>.

955	   [RFC6125]  Saint-Andre, P. and J. Hodges, "Representation and
956	              Verification of Domain-Based Application Service Identity
957	              within Internet Public Key Infrastructure Using X.509
958	              (PKIX) Certificates in the Context of Transport Layer
959	              Security (TLS)", RFC 6125, DOI 10.17487/RFC6125, March
960	              2011, <https://www.rfc-editor.org/info/rfc6125>.

962	   [RFC6698]  Hoffman, P. and J. Schlyter, "The DNS-Based Authentication
963	              of Named Entities (DANE) Transport Layer Security (TLS)
964	              Protocol: TLSA", RFC 6698, DOI 10.17487/RFC6698, August
965	              2012, <https://www.rfc-editor.org/info/rfc6698>.

967	   [RFC7525]  Sheffer, Y., Holz, R., and P. Saint-Andre,
968	              "Recommendations for Secure Use of Transport Layer
969	              Security (TLS) and Datagram Transport Layer Security
970	              (DTLS)", BCP 195, RFC 7525, DOI 10.17487/RFC7525, May
971	              2015, <https://www.rfc-editor.org/info/rfc7525>.

973	   [RFC7671]  Dukhovni, V. and W. Hardaker, "The DNS-Based
974	              Authentication of Named Entities (DANE) Protocol: Updates
975	              and Operational Guidance", RFC 7671, DOI 10.17487/RFC7671,
976	              October 2015, <https://www.rfc-editor.org/info/rfc7671>.

978	   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
979	              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
980	              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

982	   [SHS]      National Institute of Standards and Technology, "Secure
983	              Hash Standard (SHS), FIPS PUB 180-4",
984	              DOI 10.6028/NIST.FIPS.180-4, August 2015,
985	              <http://nvlpubs.nist.gov/nistpubs/FIPS/
986	              NIST.FIPS.180-4.pdf>.

988	10.2.  Informative References

990	   [RFC4492]  Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B.
991	              Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites
992	              for Transport Layer Security (TLS)", RFC 4492,
993	              DOI 10.17487/RFC4492, May 2006,
994	              <https://www.rfc-editor.org/info/rfc4492>.

996	   [RFC4513]  Harrison, R., Ed., "Lightweight Directory Access Protocol
997	              (LDAP): Authentication Methods and Security Mechanisms",
998	              RFC 4513, DOI 10.17487/RFC4513, June 2006,
999	              <https://www.rfc-editor.org/info/rfc4513>.

1001	   [RFC5088]  Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., and R.
1002	              Zhang, "OSPF Protocol Extensions for Path Computation
1003	              Element (PCE) Discovery", RFC 5088, DOI 10.17487/RFC5088,
1004	              January 2008, <https://www.rfc-editor.org/info/rfc5088>.

1006	   [RFC5089]  Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., and R.
1007	              Zhang, "IS-IS Protocol Extensions for Path Computation
1008	              Element (PCE) Discovery", RFC 5089, DOI 10.17487/RFC5089,
1009	              January 2008, <https://www.rfc-editor.org/info/rfc5089>.

1011	   [RFC5925]  Touch, J., Mankin, A., and R. Bonica, "The TCP
1012	              Authentication Option", RFC 5925, DOI 10.17487/RFC5925,
1013	              June 2010, <https://www.rfc-editor.org/info/rfc5925>.

1015	   [RFC6460]  Salter, M. and R. Housley, "Suite B Profile for Transport
1016	              Layer Security (TLS)", RFC 6460, DOI 10.17487/RFC6460,
1017	              January 2012, <https://www.rfc-editor.org/info/rfc6460>.

1019	   [RFC6614]  Winter, S., McCauley, M., Venaas, S., and K. Wierenga,
1020	              "Transport Layer Security (TLS) Encryption for RADIUS",
1021	              RFC 6614, DOI 10.17487/RFC6614, May 2012,
1022	              <https://www.rfc-editor.org/info/rfc6614>.

1024	   [RFC6952]  Jethanandani, M., Patel, K., and L. Zheng, "Analysis of
1025	              BGP, LDP, PCEP, and MSDP Issues According to the Keying
1026	              and Authentication for Routing Protocols (KARP) Design
1027	              Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013,
1028	              <https://www.rfc-editor.org/info/rfc6952>.

1030	   [RFC7420]  Koushik, A., Stephan, E., Zhao, Q., King, D., and J.
1031	              Hardwick, "Path Computation Element Communication Protocol
1032	              (PCEP) Management Information Base (MIB) Module",
1033	              RFC 7420, DOI 10.17487/RFC7420, December 2014,
1034	              <https://www.rfc-editor.org/info/rfc7420>.

1036	   [RFC7457]  Sheffer, Y., Holz, R., and P. Saint-Andre, "Summarizing
1037	              Known Attacks on Transport Layer Security (TLS) and
1038	              Datagram TLS (DTLS)", RFC 7457, DOI 10.17487/RFC7457,
1039	              February 2015, <https://www.rfc-editor.org/info/rfc7457>.

1041	   [I-D.ietf-pce-stateful-sync-optimizations]
1042	              Crabbe, E., Minei, I., Medved, J., Varga, R., Zhang, X.,
1043	              and D. Dhody, "Optimizations of Label Switched Path State
1044	              Synchronization Procedures for a Stateful PCE", draft-
1045	              ietf-pce-stateful-sync-optimizations-10 (work in
1046	              progress), March 2017.

1048	   [I-D.ietf-pce-pcep-yang]
1049	              Dhody, D., Hardwick, J., Beeram, V., and j.
1050	              jefftant@gmail.com, "A YANG Data Model for Path
1051	              Computation Element Communications Protocol (PCEP)",
1052	              draft-ietf-pce-pcep-yang-05 (work in progress), June 2017.

1054	   [I-D.wu-pce-dns-pce-discovery]
1055	              Wu, Q., Dhody, D., King, D., Lopez, D., and J. Tantsura,
1056	              "Path Computation Element (PCE) Discovery using Domain
1057	              Name System(DNS)", draft-wu-pce-dns-pce-discovery-10 (work
1058	              in progress), March 2017.

1060	   [I-D.wu-pce-discovery-pceps-support]
1061	              Lopez, D., Wu, Q., Dhody, D., and D. King, "IGP extension
1062	              for PCEP security capability support in the PCE
1063	              discovery", draft-wu-pce-discovery-pceps-support-07 (work
1064	              in progress), March 2017.

1066	Authors' Addresses

1068	   Diego R. Lopez
1069	   Telefonica I+D
1070	   Don Ramon de la Cruz, 82
1071	   Madrid  28006
1072	   Spain

1074	   Phone: +34 913 129 041
1075	   EMail: diego.r.lopez@telefonica.com
1076	   Oscar Gonzalez de Dios
1077	   Telefonica I+D
1078	   Don Ramon de la Cruz, 82
1079	   Madrid  28006
1080	   Spain

1082	   Phone: +34 913 129 041
1083	   EMail: oscar.gonzalezdedios@telefonica.com

1085	   Qin Wu
1086	   Huawei
1087	   101 Software Avenue, Yuhua District
1088	   Nanjing, Jiangsu  210012
1089	   China

1091	   EMail: sunseawq@huawei.com

1093	   Dhruv Dhody
1094	   Huawei
1095	   Divyashree Techno Park, Whitefield
1096	   Bangalore, KA  560066
1097	   India

1099	   EMail: dhruv.ietf@gmail.com








On Mon, Sep 4, 2017 at 8:31 PM, Henrik Levkowetz <henrik@levkowetz.com>
wrote:

>
> Hi,
>
> This is an automatic notification about a new xml2rfc release,
> v2.8.0, generated when running the mkrelease script.
>
> Release notes:
>
> xml2rfc (2.8.0) ietf; urgency=low
>   This is a small feature release which changes URLs in boilerplate to
>   use https: instead of http:.  There are also some bugfixes.
>   * Include notes when doing index processing.  Fixes issue #335.
>   * Include erefs with text equal to the URL in the URIs section.  See
>     issue #334.
>   * Changed the use of http: to https: in many places.  In the generation
>     of RFCs, the code uses a switchover date of August 21, 2017 when
> deciding
>     whether to insert http: or https: URLs.  In practice, this means that
> RFCs
>     with a date of September 2017 or later will get https:.  Also fixed URL
>     line-breaking prevention to apply to https: URLS.  Fixes issue #333.
>   * In urlkeep(), prevent breaking also for https:, not only http: URLs
>
> The new version is available through SVN checkout, with
>   'svn checkout http://svn.tools.ietf.org/svn/tools/xml2rfc/tags/cli/2.8.0
> '
>
> Regards,
>
>         Henrik
>         (via the mkrelease script)
>
> _______________________________________________
> xml2rfc mailing list
> xml2rfc@ietf.org
> https://www.ietf.org/mailman/listinfo/xml2rfc
>

--94eb2c043d0c497447055861bcfa
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:&quot;tr=
ebuchet ms&quot;,sans-serif;color:rgb(12,52,61)">Hi,=C2=A0</div><div class=
=3D"gmail_default" style=3D"font-family:&quot;trebuchet ms&quot;,sans-serif=
;color:rgb(12,52,61)"><br></div><div class=3D"gmail_default" style=3D"font-=
family:&quot;trebuchet ms&quot;,sans-serif;color:rgb(12,52,61)">Because of =
this change <span id=3D"gmail-4eb349a0-1e44-4ee5-8c21-c058f03c60bd" class=
=3D"gmail-GINGER_SOFTWARE_mark">idnits</span> is failing and submission <sp=
an id=3D"gmail-8c875e66-f092-40fc-a4d3-552d06e47932" class=3D"gmail-GINGER_=
SOFTWARE_mark">for</span> draft is getting blocked.=C2=A0</div><div class=
=3D"gmail_default" style=3D"font-family:&quot;trebuchet ms&quot;,sans-serif=
;color:rgb(12,52,61)">I am going to make <span id=3D"gmail-4aefb0ae-9616-41=
ab-bfea-d2655fde6fb3" class=3D"gmail-GINGER_SOFTWARE_mark">manual change</s=
pan> now, idnits=C2=A0output below for your reference -=C2=A0</div><div cla=
ss=3D"gmail_default" style=3D"font-family:&quot;trebuchet ms&quot;,sans-ser=
if;color:rgb(12,52,61)"><br></div><div class=3D"gmail_default" style=3D"fon=
t-family:&quot;trebuchet ms&quot;,sans-serif;color:rgb(12,52,61)"><pre styl=
e=3D"color:rgb(0,0,0);word-wrap:break-word;white-space:pre-wrap">Thanks! </=
pre><pre style=3D"color:rgb(0,0,0);word-wrap:break-word;white-space:pre-wra=
p">Dhruv<br class=3D"gmail-Apple-interchange-newline">
idnits 2.14.01  /var/www/.idnits


tmp/draft-ietf-pce-pceps-17.txt:

  Checking boilerplate required by RFC 5378 and the IETF Trust (see
  <a href=3D"http://trustee.ietf.org/license-info">http://trustee.ietf.org/=
license-info</a>):
  -------------------------------------------------------------------------=
---

  ** The document seems to lack a License Notice according IETF Trust
     Provisions of 28 Dec 2009, Section 6.b.i or Provisions of 12 Sep 2009
     Section 6.b -- however, there&#39;s a paragraph with a matching beginn=
ing.
     Boilerplate error?

     IETF Trust Legal Provisions of 28-dec-2009, Section 6.b(i), paragraph =
3:
        This document is subject to BCP 78 and the IETF Trust&#39;s Legal P=
rovisions
        Relating to IETF Documents (<a href=3D"http://trustee.ietf.org/lice=
nse-info">http://trustee.ietf.org/license-info</a>)
        in effect on the date of publication of this document.  Please
        review these documents carefully, as they describe your rights
        and restrictions with respect to this document.  Code Components
        extracted from this document must include Simplified BSD License
        text as described in Section 4.e of the Trust Legal Provisions
        and are provided without warranty as described in the Simplified
        BSD License.    =20

     ... text found in draft:
        This document is subject to BCP 78 and the IETF Trust&#39;s Legal P=
rovisions
        Relating to IETF Documents
..................................^
        (<a href=3D"https://trustee.ietf.org/license-info">https://trustee.=
ietf.org/license-info</a>) in effect on the date of
        publication of this document.  Please review these documents
        carefully, as they describe your rights and restrictions with
        respect to this document.  Code Components extracted from this
        document must include Simplified BSD License text as described in
        Section 4.e of the Trust Legal Provisions and are provided
        without warranty as described in the Simplified BSD License.



  Checking nits according to <a href=3D"http://www.ietf.org/id-info/1id-gui=
delines.txt">http://www.ietf.org/id-info/1id-guidelines.txt</a>:
  -------------------------------------------------------------------------=
---

  ** The document seems to lack a 1id_guidelines paragraph about
     Internet-Drafts being working documents -- however, there&#39;s a para=
graph
     with a matching beginning. Boilerplate error?

     1id_guidelines, paragraph 1:
        Internet-Drafts are working documents of the Internet Engineering T=
ask
        Force (IETF), its areas, and its working groups.  Note that other
        groups may also distribute working documents as Internet-Drafts.   =
 =20

     ... text found in draft:
        Internet-Drafts are working documents of the Internet Engineering T=
ask
        Force (IETF).  Note that other groups may also distribute working
....................^
        documents as Internet-Drafts.  The list of current
        Internet-Drafts is at
        <a href=3D"https://datatracker.ietf.org/drafts/current/">https://da=
tatracker.ietf.org/drafts/current/</a>.


  ** The document seems to lack a 1id_guidelines paragraph about the list o=
f
     current Internet-Drafts.=20

     1id_guidelines, paragraph 3:
        The list of current Internet-Drafts can be accessed at
        <a href=3D"http://www.ietf.org/1id-abstracts.html">http://www.ietf.=
org/1id-abstracts.html</a>

  ** The document seems to lack a 1id_guidelines paragraph about the list o=
f
     Shadow Directories.=20

     1id_guidelines, paragraph 4:
        The list of Internet-Draft Shadow Directories can be accessed at
        <a href=3D"http://www.ietf.org/shadow.html">http://www.ietf.org/sha=
dow.html</a>


  Checking nits according to <a href=3D"http://www.ietf.org/id-info/checkli=
st">http://www.ietf.org/id-info/checklist</a> :
  -------------------------------------------------------------------------=
---

     No issues found here.

  Miscellaneous warnings:
  -------------------------------------------------------------------------=
---

  =3D=3D The document seems to lack the recommended RFC 2119 boilerplate, e=
ven if
     it appears to use RFC 2119 keywords -- however, there&#39;s a paragrap=
h with
     a matching beginning. Boilerplate error?

     RFC 2119, paragraph 2:
        The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRE=
D&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
        &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;=
, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in
        this document are to be interpreted as described in RFC 2119.    =
=20

     ... text found in draft:
        The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRE=
D&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
        &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;=
, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;,
................................................^
        and &quot;OPTIONAL&quot; in this document are to be interpreted as
        described in BCP 14 [RFC2119] [RFC8174] when, and only when, they
        appear in all capitals, as shown here.


     (The document does seem to have the reference to RFC 2119 which the
     ID-Checklist requires).
     (Using the creation date from RFC5440, updated by this document, for
     RFC5378 checks: 2007-11-16)

  -- The document seems to contain a disclaimer for pre-RFC5378 work, and m=
ay
     have content which was first submitted before 10 November 2008.  The
     disclaimer is necessary when there are original authors that you have
     been unable to contact, or if some do not wish to grant the BCP78 righ=
ts
     to the IETF Trust.  If you are able to get all authors (current and
     original) to grant those rights, you can and should remove the
     disclaimer; otherwise, the disclaimer is needed and you can ignore thi=
s
     comment. (See the Legal Provisions document at
     <a href=3D"http://trustee.ietf.org/license-info">http://trustee.ietf.o=
rg/license-info</a> for more information.)


  Checking references for intended status: Proposed Standard
  -------------------------------------------------------------------------=
---

     (See RFCs 3967 and 4897 for information about using normative referenc=
es
     to lower-maturity documents in RFCs)

  -- Possible downref: Non-RFC (?) normative reference: ref. &#39;SHS&#39;


     Summary: 4 errors (**), 0 flaws (~~), 1 warning (=3D=3D), 2 comments (=
--).

---------------------------------------------------------------------------=
-----


2	PCE Working Group                                               D. Lopez
3	Internet-Draft                                       O. Gonzalez de Dios
4	Updates: 5440 (if approved)                               Telefonica I+D
5	Intended status: Standards Track                                   Q. Wu
6	Expires: March 8, 2018                                          D. Dhody
7	                                                                  Huawei
8	                                                       September 4, 2017

10	                       Secure Transport for PCEP
11	                        draft-ietf-pce-pceps-17

13	Abstract

15	   The Path Computation Element Communication Protocol (PCEP) defines
16	   the mechanisms for the communication between a Path Computation
17	   Client (PCC) and a Path Computation Element (PCE), or among PCEs.
18	   This document describes the usage of Transport Layer Security (TLS)
19	   to enhance PCEP security, hence the PCEPS acronym proposed for it.
20	   The additional security mechanisms are provided by the transport
21	   protocol supporting PCEP, and therefore they do not affect the
22	   flexibility and extensibility of PCEP.

24	   This document updates RFC 5440 in regards to the PCEP initialization
25	   phase procedures.

27	Status of This Memo

29	   This Internet-Draft is submitted in full conformance with the
30	   provisions of BCP 78 and BCP 79.

32	   Internet-Drafts are working documents of the Internet Engineering
33	   Task Force (IETF).  Note that other groups may also distribute
34	   working documents as Internet-Drafts.  The list of current Internet-
35	   Drafts is at <a href=3D"https://datatracker.ietf.org/drafts/current/"=
>https://datatracker.ietf.org/drafts/current/</a>.

37	   Internet-Drafts are draft documents valid for a maximum of six months
38	   and may be updated, replaced, or obsoleted by other documents at any
39	   time.  It is inappropriate to use Internet-Drafts as reference
40	   material or to cite them other than as &quot;work in progress.&quot;

42	   This Internet-Draft will expire on March 8, 2018.

44	Copyright Notice

46	   Copyright (c) 2017 IETF Trust and the persons identified as the
47	   document authors.  All rights reserved.

49	   This document is subject to BCP 78 and the IETF Trust&#39;s Legal
50	   Provisions Relating to IETF Documents
51	   (<a href=3D"https://trustee.ietf.org/license-info">https://trustee.ie=
tf.org/license-info</a>) in effect on the date of
52	   publication of this document.  Please review these documents
53	   carefully, as they describe your rights and restrictions with respect
54	   to this document.  Code Components extracted from this document must
55	   include Simplified BSD License text as described in Section 4.e of
56	   the Trust Legal Provisions and are provided without warranty as
57	   described in the Simplified BSD License.

59	   This document may contain material from IETF Documents or IETF
60	   Contributions published or made publicly available before November
61	   10, 2008.  The person(s) controlling the copyright in some of this
62	   material may not have granted the IETF Trust the right to allow
63	   modifications of such material outside the IETF Standards Process.
64	   Without obtaining an adequate license from the person(s) controlling
65	   the copyright in such materials, this document may not be modified
66	   outside the IETF Standards Process, and derivative works of it may
67	   not be created outside the IETF Standards Process, except to format
68	   it for publication as an RFC or to translate it into languages other
69	   than English.

71	Table of Contents

73	   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
74	   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   4
75	   3.  Applying PCEPS  . . . . . . . . . . . . . . . . . . . . . . .   4
76	     3.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .   4
77	     3.2.  Initiating the TLS Procedures . . . . . . . . . . . . . .   4
78	     3.3.  The StartTLS Message  . . . . . . . . . . . . . . . . . .   7
79	     3.4.  TLS Connection Establishment  . . . . . . . . . . . . . .  12
80	     3.5.  Peer Identity . . . . . . . . . . . . . . . . . . . . . .  14
81	     3.6.  Connection Establishment Failure  . . . . . . . . . . . .  15
82	   4.  Discovery Mechanisms  . . . . . . . . . . . . . . . . . . . .  15
83	     4.1.  DANE Applicability  . . . . . . . . . . . . . . . . . . .  16
84	   5.  Backward Compatibility  . . . . . . . . . . . . . . . . . . .  16
85	   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  17
86	     6.1.  New PCEP Message  . . . . . . . . . . . . . . . . . . . .  17
87	     6.2.  New Error-Values  . . . . . . . . . . . . . . . . . . . .  17
88	   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  18
89	   8.  Manageability Considerations  . . . . . . . . . . . . . . . .  19
90	     8.1.  Control of Function and Policy  . . . . . . . . . . . . .  19
91	     8.2.  Information and Data Models . . . . . . . . . . . . . . .  20
92	     8.3.  Liveness Detection and Monitoring . . . . . . . . . . . .  20
93	     8.4.  Verifying Correct Operations  . . . . . . . . . . . . . .  20
94	     8.5.  Requirements on Other Protocols . . . . . . . . . . . . .  20
95	     8.6.  Impact on Network Operation . . . . . . . . . . . . . . .  21
96	   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  21
97	   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  21
98	     10.1.  Normative References . . . . . . . . . . . . . . . . . .  21
99	     10.2.  Informative References . . . . . . . . . . . . . . . . .  23
100	   Authors&#39; Addresses  . . . . . . . . . . . . . . . . . . . . . . =
.  24

102	1.  Introduction

104	   The Path Computation Element Communication Protocol (PCEP) [RFC5440]
105	   defines the mechanisms for the communication between a Path
106	   Computation Client (PCC) and a Path Computation Element (PCE), or
107	   between two PCEs.  These interactions include requests and replies
108	   that can be critical for a sustainable network operation and adequat=
e
109	   resource allocation, and therefore appropriate security becomes a ke=
y
110	   element in the PCE infrastructure.  As the applications of the PCE
111	   framework evolves, and more complex service patterns emerge, the
112	   definition of a secure mode of operation becomes more relevant.

114	   [RFC5440] analyzes in its section on security considerations the
115	   potential threats to PCEP and their consequences, and discusses
116	   several mechanisms for protecting PCEP against security attacks,
117	   without making a specific recommendation on a particular one or
118	   defining their application in depth.  Moreover, [RFC6952] remarks th=
e
119	   importance of ensuring PCEP communication confidentiality, especiall=
y
120	   when PCEP communication endpoints do not reside in the same
121	   Autonomous System (AS), as the interception of PCEP messages could
122	   leak sensitive information related to computed paths and resources.

124	   Among the possible solutions mentioned in these documents, Transport
125	   Layer Security (TLS) [RFC5246] provides support for peer
126	   authentication, message encryption and integrity.  TLS provides well=
-
127	   known mechanisms to support key configuration and exchange, as well
128	   as means to perform security checks on the results of PCE discovery
129	   procedures via Interior Gateway Protocol (IGP) ([RFC5088] and
130	   [RFC5089]).

132	   This document describes a security container for the transport of
133	   PCEP messages, and therefore it does not affect the flexibility and
134	   extensibility of PCEP.

136	   This document describes how to apply TLS to secure interactions with
137	   PCE, including initiation of the TLS procedures, the TLS handshake
138	   mechanism, the TLS methods for peer authentication, the applicable
139	   TLS ciphersuites for data exchange, and the handling of errors in th=
e
140	   security checks.  In the rest of the document we will refer to this
141	   usage of TLS to provide a secure transport for PCEP as &quot;PCEPS&q=
uot;.

143	   Within this document, PCEP communications are described through PCC-
144	   PCE relationship.  The PCE architecture also supports the PCE-PCE
145	   communication, this is achieved by requesting PCE fill the role of a
146	   PCC, as usual.  Thus, in this document, the PCC refers to a PCC or a
147	   PCE initiating the PCEP session and acting as a client.

149	2.  Requirements Language

151	   The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED=
&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
152	   &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;,=
 &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and
153	   &quot;OPTIONAL&quot; in this document are to be interpreted as descr=
ibed in BCP
154	   14 [RFC2119] [RFC8174] when, and only when, they appear in all
155	   capitals, as shown here.

157	3.  Applying PCEPS

159	3.1.  Overview

161	   The steps involved in establishing a PCEPS session are as follows:

163	   1.  Establishment of a TCP connection.

165	   2.  Initiating the TLS procedures by the StartTLS message from PCE t=
o
166	       PCC and from PCC to PCE.

168	   3.  Negotiation and establishment of TLS connection.

170	   4.  Start exchanging PCEP messages as per [RFC5440].

172	   This document uses the standard StartTLS procedure in PCEP, instead
173	   of using a different port for the secured session.  This is done to
174	   avoid requesting allocation of another port number for the PCEPS.
175	   The StartTLS procedure makes more efficient use of scarce port
176	   numbers and allow simpler configuration of PCEP.

178	   Implementations SHOULD follow the best practices and recommendations
179	   for using TLS, as per [RFC7525].

181	   It should be noted that this procedure updates what is defined in
182	   section 4.2.1 and section 6.7 of [RFC5440] regarding the
183	   initialization phase and the processing of messages prior to the Ope=
n
184	   message.  The details of processing, including backward
185	   compatibility, are discussed in the following sections.

187	3.2.  Initiating the TLS Procedures

189	   Since PCEP can operate either with or without TLS, it is necessary
190	   for a PCEP speaker to indicate whether it wants to set up a TLS
191	   connection or not.  For this purpose, this document specifies a new
192	   PCEP message called StartTLS.  Thus, the PCEP session is secured via
193	   TLS from the start before exchange of any other PCEP message (that
194	   includes the Open message).  This document thus updates [RFC5440],
195	   which required the Open message to be the first PCEP message that is
196	   exchanged.  In the case of a PCEP session using TLS, the StartTLS
197	   message will be sent first.  Also a PCEP speaker that supports PCEPS
198	   MUST NOT start the OpenWait timer after the TCP establishment,
199	   instead it starts a StartTLSWait timer as described in Section 3.3.

201	   The PCEP speaker MAY discover that the PCEP peer supports PCEPS or
202	   can be preconfigured to use PCEPS for a given peer (see Section 4 fo=
r
203	   more details).  An existing PCEP session cannot be secured via TLS,
204	   the session MUST be closed and re-established with TLS as per the
205	   procedure described in this document.

207	   The StartTLS message is a PCEP message sent by a PCC to a PCE and by
208	   a PCE to a PCC in order to initiate the TLS procedure for PCEP.  The
209	   PCC initiates the use of TLS by sending a StartTLS message.  The PCE
210	   agrees to the use of TLS by responding with its own StartTLS message=
.
211	   If the PCE is configured to only support TLS, it may send the
212	   StartTLS message immediately upon TCP connection establishment;
213	   otherwise it MUST wait for the PCC&#39;s first message to see whethe=
r it
214	   is an Open or a StartTLS message.  The TLS negotiation and
215	   establishment procedures are triggered once the PCEP speaker has sen=
t
216	   and received the StartTLS message.  The Message-Type field of the
217	   PCEP common header for the StartTLS message is set to [TBA1 by IANA]=
.

219	   Once the TCP connection has been successfully established, the first
220	   message sent by the PCC to the PCE and by the PCE to the PCC MUST be
221	   a StartTLS message for the PCEPS.  Note that, this is a significant
222	   change from [RFC5440], where the first PCEP message is the Open
223	   message.

225	   A PCEP speaker receiving a StartTLS message, after any other PCEP
226	   exchange has taken place (by receiving or sending any other messages
227	   from either side) MUST treat it as an unexpected message and reply
228	   with a PCErr message with Error-Type set to [TBA2 by IANA] (PCEP
229	   StartTLS failure) and Error-value set to 1 (reception of StartTLS
230	   after any PCEP exchange), and MUST close the TCP connection.

232	   Any message received prior to StartTLS or Open message MUST trigger =
a
233	   protocol error condition causing a PCErr message to be sent with
234	   Error-Type set to [TBA2 by IANA] (PCEP StartTLS failure) and Error-
235	   value set to 2 (reception of a message apart from StartTLS or Open)
236	   and MUST close the TCP connection.

238	   If the PCEP speaker that does not support PCEPS, receives a StartTLS
239	   message, it will behave according to the existing error mechanism
240	   described in section 6.2 of [RFC5440] (in case message is received
241	   prior to an Open message) or section 6.9 of [RFC5440] (for the case
242	   of reception of unknown message).  See Section 5 for more details.

244	   If the PCEP speaker that only supports PCEPS connection (as a local
245	   policy), receives an Open message, it MUST treat it as an unexpected
246	   message and reply with a PCErr message with Error-Type set to 1 (PCE=
P
247	   session establishment failure) and Error-value set to 1 (reception o=
f
248	   an invalid Open message or a non Open message), and MUST close the
249	   TCP connection.

251	   If a PCC supports PCEPS connections as well as allow non-PCEPS
252	   connection (as a local policy), it MUST first try to establish PCEPS=
,
253	   by sending StartTLS message and in case it receives an PCErr message
254	   from the PCE, it MAY retry to establish connection without PCEPS by
255	   sending an Open message.  If a PCE supports PCEPS connections as wel=
l
256	   as allow non-PCEPS connection (as a local policy), it MUST wait to
257	   respond after TCP establishment, based on the message received from
258	   the PCC.  In case of StartTLS message, PCE MUST respond with sending
259	   a StartTLS message and moving to TLS establishment procedures as
260	   described in this document.  In case of Open message, PCE MUST
261	   respond with Open message and move to PCEP session establishment
262	   procedure as per [RFC5440].  If a PCE supports PCEPS connections onl=
y
263	   (as a local policy), it MAY send StartTLS message to PCC without
264	   waiting to receive a StartTLS message from PCC.

266	   If a PCEP speaker that is unwilling or unable to negotiate TLS
267	   receives a StartTLS messages, it MUST return a PCErr message (in
268	   clear) with Error-Type set to [TBA2 by IANA] (PCEP StartTLS failure)
269	   and Error-value set to:

271	   o  3 (Failure, connection without TLS is not possible) if it is not
272	      willing to exchange PCEP messages without the solicited TLS
273	      connection, and it MUST close the TCP session.

275	   o  4 (Failure, connection without TLS is possible) if it is willing
276	      to exchange PCEP messages without the solicited TLS connection,
277	      and it MUST close the TCP session.  The receiver MAY choose to
278	      attempt to re-establish the PCEP session without TLS next.  The
279	      attempt to re-establish the PCEP session without TLS SHOULD be
280	      limited to only once.

282	   If the PCEP speaker supports PCEPS and can establish a TLS connectio=
n
283	   it MUST start the TLS connection negotiation and establishment steps
284	   described in Section 3.4 before the PCEP initialization procedure
285	   (section 4.2.1 of [RFC5440]).

287	   After the exchange of StartTLS messages, if the TLS negotiation fail=
s
288	   for some reason (e.g. the required mechanisms for certificate
289	   revocation checking are not available), both peers SHOULD immediatel=
y
290	   close the connection.

292	   A PCEP speaker that does not support PCEPS sends the Open message
293	   directly, as per [RFC5440].  A PCEP speaker that supports PCEPS, but
294	   has learned in the last exchange the peer&#39;s willingness to
295	   reestablish session without TLS, MAY send the Open message directly,
296	   as per [RFC5440].  The attempt to re-establish the PCEP session
297	   without TLS SHOULD be limited to only once.

299	   Given the asymmetric nature of TLS for connection establishment, it
300	   is relevant to identify the roles of each of the PCEP peers in it.
301	   The PCC SHALL act as TLS client, and the PCE SHALL act as TLS server
302	   as per [RFC5246].

304	   As per the recommendation from [RFC7525] to avoid downgrade attacks,
305	   PCEP peers that support PCEPS, SHOULD default to strict TLS
306	   configuration i.e. do not allow non-TLS PCEP sessions to be
307	   established.  PCEPS implementations MAY provide an option to allow
308	   the operator to manually override strict TLS configuration and allow
309	   unsecured connections.  Execution of this override SHOULD trigger a
310	   warning about the security implications of permitting unsecured
311	   connections.

313	3.3.  The StartTLS Message

315	   The StartTLS message is used to initiate the TLS procedure for a
316	   PCEPS session between the PCEP peers.  A PCEP speaker sends the
317	   StartTLS message to request negotiation and establishment of TLS
318	   connection for PCEP.  On receiving a StartTLS message from the PCEP
319	   peer (i.e.  when the PCEP speaker has sent and received StartTLS
320	   message) it is ready to start the negotiation and establishment of
321	   TLS and move to steps described in Section 3.4.

323	   The collision resolution procedures described in [RFC5440] for the
324	   exchange of Open messages MUST be applied by the PCEP peers during
325	   the exchange of StartTLS messages.

327	   The format of a StartTLS message is as follows:

329	      &lt;StartTLS Message&gt;::=3D &lt;Common Header&gt;

331	   The StartTLS message MUST contain only the PCEP common header with
332	   Message-Type field set to [TBA1 by IANA].

334	   Once the TCP connection has been successfully established, the PCEP
335	   speaker MUST start a timer called StartTLSWait timer, after the
336	   expiration of which, if neither StartTLS message has been received,
337	   nor a PCErr/Open message (in case of failure and PCEPS not supported
338	   by the peer, respectively), it MUST send a PCErr message with Error-
339	   Type set to [TBA2 by IANA] and Error-value set to 5 (no StartTLS (no=
r
340	   PCErr/Open) message received before the expiration of the
341	   StartTLSWait timer) and it MUST release the TCP connection . A
342	   RECOMMENDED value for StartTLSWait timer is 60 seconds.  The value o=
f
343	   StartTLSWait timer MUST NOT be less than OpenWait timer.

345	                  +-+-+                 +-+-+
346	                  |PCC|                 |PCE|
347	                  +-+-+                 +-+-+
348	                    |                     |
349	                    | StartTLS            |
350	                    | msg                 |
351	                    |-------              |
352	                    |       \   StartTLS  |
353	                    |        \  msg       |
354	                    |         \  ---------|
355	                    |          \/         |
356	                    |          /\         |
357	                    |         /  --------&gt;|
358	                    |        /            |
359	                    |&lt;------              |
360	                    |:::::::::TLS:::::::::|
361	                    |:::::Establishment:::|
362	                    |                     |
363	                    |                     |
364	                    |:::::::PCEP::::::::::|
365	                    |                     |

367	            Figure 1: Both PCEP Speaker supports PCEPS (strict)
368	                  +-+-+                 +-+-+
369	                  |PCC|                 |PCE|
370	                  +-+-+                 +-+-+
371	                    |                     |
372	                    | StartTLS            |
373	                    | msg                 |
374	                    |-------              |
375	                    |       \   StartTLS  |
376	                    |        \  msg       |
377	                    |         \  ---------|
378	                    |          \/         |
379	                    |          /\         |
380	                    |         /  --------&gt;|
381	                    |        /            |
382	                    |&lt;------              |
383	                    |:::::::::TLS:::::::::| TLS Establishment
384	                    |:::::Establishment:::| Failure, Both
385	                    |                     | peers close
386	                                            session

388	      Figure 2: Both PCEP Speaker supports PCEPS (strict), but cannot
389	                               establish TLS

391	                  +-+-+                 +-+-+
392	                  |PCC|                 |PCE|
393	                  +-+-+                 +-+-+
394	                    |                     |  Does not support
395	                    | StartTLS            |  PCEPS and thus
396	                    | msg                 |  sends Open
397	                    |-------              |
398	                    |       \   Open      |
399	                    |        \  msg       |
400	                    |         \  ---------|
401	                    |          \/         |
402	                    |          /\         |
403	                    |         /  --------&gt;|
404	                    |        /            |
405	                    |&lt;------              |
406	                    |                     |
407	                    |&lt;--------------------| Send Error
408	                    |       PCErr         | Type=3D1,Value=3D1
409	                    |                     | (non-Open message
410	                    |&lt;--------------------|  received)
411	                    |       Close         |
412	                    ///////// TCP /////////
413	                    //////re-establish/////
414	          Send Open | Open                |
415	          this time | msg                 |
416	                    |-------              |
417	                    |       \   Open      |
418	                    |        \  msg       |
419	                    |         \  ---------|
420	                    |          \/         |
421	                    |          /\         |
422	                    |         /  --------&gt;|
423	                    |        /            |
424	                    |&lt;------              |

426	    Figure 3: One PCEP Speaker (PCE) does not support PCEPS, while PCC
427	                    supports both with or without PCEPS

429	                  +-+-+                 +-+-+
430	                  |PCC|                 |PCE|
431	                  +-+-+                 +-+-+
432	                    |                     |
433	                    | StartTLS            |
434	                    | msg                 | PCE waits
435	                    |--------------------&gt;| for PCC and
436	                    |            StartTLS | respond with
437	                    |&lt;--------------------| Start TLS
438	                    |                     |
439	                    |:::::::::TLS:::::::::|
440	                    |:::::Establishment:::|
441	                    |                     |
442	                    |                     |
443	                    |:::::::PCEP::::::::::|
444	                    |                     |

446	    Figure 4: Both PCEP Speaker supports PCEPS as well as without PCEPS

448	                  +-+-+                 +-+-+
449	                  |PCC|                 |PCE|
450	                  +-+-+                 +-+-+
451	                    |                     |
452	                    | StartTLS            |
453	                    | msg                 | PCE waits
454	                    |--------------------&gt;| for PCC
455	                    |               PCErr |
456	                    |&lt;--------------------| Send Error
457	                    |                     | Type=3DTBA2,Value=3D3
458	                    |                     | (Failure, connection
459	                    |&lt;--------------------|  without TLS is not
460	                    |       Close         |  possible)

462	   Figure 5: Both PCEP Speaker supports PCEPS as well as without PCEPS,
463	                   but PCE cannot start TLS negotiation

465	                  +-+-+                 +-+-+
466	                  |PCC|                 |PCE|
467	                  +-+-+                 +-+-+
468	                    |                     |
469	                    | Open                |
470	                    | msg                 | PCE waits
471	                    |--------------------&gt;| for PCC and
472	                    |                Open | respond with
473	                    |&lt;--------------------| Open
474	                    |                     |
475	                    |:::::::PCEP::::::::::|
476	                    |                     |

478	   Figure 6: PCE supports PCEPS as well as without PCEPS, while PCC doe=
s
479	                             not support PCEPS

481	3.4.  TLS Connection Establishment

483	   Once the establishment of TLS has been agreed by the PCEP peers, the
484	   connection establishment SHALL follow the following steps:

486	   1.  Immediately negotiate a TLS session according to [RFC5246].  The
487	       following restrictions apply:

489	       *  Support for TLS v1.2 [RFC5246] or later is REQUIRED.

491	       *  Support for certificate-based mutual authentication is
492	          REQUIRED.

494	       *  Negotiation of a ciphersuite providing for integrity
495	          protection is REQUIRED.

497	       *  Negotiation of a ciphersuite providing for confidentiality is
498	          RECOMMENDED.

500	       *  Support for and negotiation of compression is OPTIONAL.

502	       *  PCEPS implementations MUST, at a minimum, support negotiation
503	          of the TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [RFC6460], and
504	          SHOULD support TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as
505	          well.  Implementations SHOULD support the NIST P-256
506	          (secp256r1) curve [RFC4492].  In addition, PCEPS
507	          implementations MUST support negotiation of the mandatory-to-
508	          implement ciphersuites required by the versions of TLS that
509	          they support from TLS 1.3 onwards.

511	   2.  Peer authentication can be performed in any of the following two
512	       REQUIRED operation models:

514	       *  TLS with X.509 certificates using Public-Key Infrastructure
515	          Exchange (PKIX) trust models:

517	          +  Implementations MUST allow the configuration of a list of
518	             trusted Certification Authorities (CAs) for incoming
519	             connections.

521	          +  Certificate validation MUST include the verification rules
522	             as per [RFC5280].

524	          +  PCEPS implementations SHOULD incorporate revocation method=
s
525	             (CRL downloading, OCSP...) according to the trusted CA
526	             policies.

528	          +  Implementations SHOULD indicate their trusted CAs.  For TL=
S
529	             1.2, this is done using [RFC5246], Section 7.4.4,
530	             &quot;certificate_authorities&quot; (server side) and [RFC=
6066],
531	             Section 6 &quot;Trusted CA Indication&quot; (client side).

533	          +  Implementations MUST follow the rules and guidelines for
534	             peer validation as defined in [RFC6125].  If an expected
535	             DNS name or IP address for the peer is configured, then th=
e
536	             implementations MUST check them against the values in the
537	             presented certificate.  The DNS names and the IP addresses
538	             can be contained in the CN-ID [RFC6125] (Common Name
539	             Identifier) or the subjectAltName entries.  For
540	             verification, only one of these entries is considered.  Th=
e
541	             following precedence applies: for DNS name validation, DNS=
-
542	             ID [RFC6125] has precedence over CN-ID; for IP address
543	             validation, subjectAltName:iPAddr has precedence over CN-
544	             ID.

546	          +  Implementations MAY allow the configuration of a set of
547	             additional properties of the certificate to check for a
548	             peer&#39;s authorization to communicate (e.g., a set of al=
lowed
549	             values in URI-ID [RFC6125] or a set of allowed X509v3
550	             Certificate Policies).  The definition of these properties
551	             are out of scope of this document.

553	       *  TLS with X.509 certificates using certificate fingerprints:
554	          Implementations MUST allow the configuration of a list of
555	          certificates that are trusted to identify peers, identified
556	          via fingerprint of the Distinguished Encoding Rules (DER)
557	          encoded certificate octets.  Implementations MUST support
558	          SHA-256 as defined by [SHS] as the hash algorithm for the
559	          fingerprint, but a later revision may demand support for a
560	          stronger hash function.

562	   3.  Start exchanging PCEP messages.

564	       *  Once the TLS connection has been successfully established, th=
e
565	          PCEP speaker MUST start the OpenWait timer [RFC5440], after
566	          the expiration of which, if no Open message has been received=
,
567	          it sends a PCErr message and releases the TCP/TLS connection.

569	3.5.  Peer Identity

571	   Depending on the peer authentication method in use, PCEPS supports
572	   different operation modes to establish peer&#39;s identity and wheth=
er it
573	   is entitled to perform requests or can be considered authoritative i=
n
574	   its replies.  PCEPS implementations SHOULD provide mechanisms for
575	   associating peer identities with different levels of access and/or
576	   authoritativeness, and they MUST provide a mechanism for establishin=
g
577	   a default level for properly identified peers.  Any connection
578	   established with a peer that cannot be properly identified SHALL be
579	   terminated before any PCEP exchange takes place.

581	   In TLS-X.509 mode using fingerprints, a peer is uniquely identified
582	   by the fingerprint of the presented certificate.

584	   There are numerous trust models in PKIX environments, and it is
585	   beyond the scope of this document to define how a particular
586	   deployment determines whether a peer is trustworthy.  Implementation=
s
587	   that want to support a wide variety of trust models should expose as
588	   many details of the presented certificate to the administrator as
589	   possible so that the trust model can be implemented by the
590	   administrator.  At least the following parameters of the X.509
591	   certificate SHOULD be exposed:

593	   o  Peer&#39;s IP address

595	   o  Peer&#39;s fully qualified domain name (FQDN)

597	   o  Certificate Fingerprint

599	   o  Issuer

601	   o  Subject

603	   o  All X509v3 Extended Key Usage

605	   o  All X509v3 Subject Alternative Name

607	   o  All X509v3 Certificate Policies
608	   Note that the remote IP address used for the TCP session
609	   establishment is also exposed.

611	   [I-D.ietf-pce-stateful-sync-optimizations] specify a Speaker Entity
612	   Identifier TLV (SPEAKER-ENTITY-ID), as an optional TLV that is
613	   included in the OPEN Object.  It contains a unique identifier for th=
e
614	   node that does not change during the lifetime of the PCEP speaker.
615	   An implementation would thus expose the speaker entity identifier as
616	   part of the X509v3 certificate&#39;s subjectAltName:otherName, so th=
at an
617	   implementation could use this identifier for the peer identification
618	   trust model.

620	   In addition, a PCC MAY apply the procedures described in [RFC6698]
621	   DNS-Based Authentication of Named Entities (DANE) to verify its peer
622	   identity when using DNS discovery.  See section Section 4.1 for
623	   further details.

625	3.6.  Connection Establishment Failure

627	   In case the initial TLS negotiation or the peer identity check fails=
,
628	   according to the procedures listed in this document, both peers
629	   SHOULD immediately close the connection.

631	   The initiator SHOULD follow the procedure listed in [RFC5440] to
632	   retry session setup as per the exponential back-off session
633	   establishment retry procedure.

635	4.  Discovery Mechanisms

637	   This document does not specify any discovery mechanism for support o=
f
638	   PCEPS.  Other documents, [I-D.wu-pce-discovery-pceps-support] and
639	   [I-D.wu-pce-dns-pce-discovery] have made proposals:

641	   o  A PCE can advertise its capability to support PCEPS using the
642	      IGP&#39;s advertisement mechanism of the PCE discovery informatio=
n.
643	      The PCE-CAP-FLAGS sub-TLV is an optional sub-TLV used to advertis=
e
644	      PCE capabilities.  It is present within the PCE Discovery (PCED)
645	      sub-TLV carried by OSPF or IS-IS.  [RFC5088] and [RFC5089] provid=
e
646	      the description and processing rules for this sub-TLV when carrie=
d
647	      within OSPF and IS-IS, respectively.  PCE capability bits are
648	      defined in [RFC5088].  A new capability flag bit for the PCE-CAP-
649	      FLAGS sub-TLV that can be announced as an attribute to distribute
650	      PCEP security support information is proposed in
651	      [I-D.wu-pce-discovery-pceps-support].

653	   o  A PCE can advertise its capability to support PCEPS using the DNS
654	      [I-D.wu-pce-dns-pce-discovery] by identifying the support of TLS.

656	4.1.  DANE Applicability

658	   DANE [RFC6698] defines a secure method to associate the certificate
659	   that is obtained from a TLS server with a domain name using DNS,
660	   i.e., using the TLSA DNS resource record (RR) to associate a TLS
661	   server certificate or public key with the domain name where the
662	   record is found, thus forming a &quot;TLSA certificate association&q=
uot;.  The
663	   DNS information needs to be protected by DNS Security (DNSSEC).  A
664	   PCC willing to apply DANE to verify server identity MUST conform to
665	   the rules defined in section 4 of [RFC6698].  The implementation MUS=
T
666	   support Service certificate constraint (TLSA Certificate Usages type
667	   1) with Matching type 2 (SHA2-256) as described in
668	   [RFC6698][RFC7671].  The server&#39;s domain name must be authorized
669	   separately, as TLSA does not provide any useful authorization
670	   guarantees.

672	5.  Backward Compatibility

674	   The procedures described in this document define a security containe=
r
675	   for the transport of PCEP requests and replies carried by a TLS
676	   connection initiated by means of a specific extended message
677	   (StartTLS) that does not interfere with PCEP speaker implementations
678	   not supporting it.

680	   A PCC that does not support PCEPS will send Open message as the firs=
t
681	   message on TCP establishment.  A PCE that supports PCEPS only, will
682	   send StartTLS message on TCP establishment.  On receiving StartTLS
683	   message, PCC would consider it as an error and behave according to
684	   the existing error mechanism of [RFC5440] and send PCErr message wit=
h
685	   Error-Type 1 (PCEP session establishment failure) and Error-Value 1
686	   (reception of an invalid Open message or a non Open message) and
687	   close the session.

689	   A PCC that support PCEPS will send StartTLS message as the first
690	   message on TCP establishment.  A PCE that does not supports PCEPS,
691	   would consider receiving StartTLS message as an error and respond
692	   with PCErr message (with Error-Type 1 and Error-Value 1) and close
693	   the session.

695	   If a StartTLS message is received at any other time by a PCEP speake=
r
696	   that does not implement PCEPS, it would consider it as an unknown
697	   message and would behave according to the existing error mechanism o=
f
698	   [RFC5440] and send PCErr message with Error-Type 2 (Capability not
699	   supported) and close the session.

701	   An existing PCEP session cannot be upgraded to PCEPS, the session
702	   needs to be terminated and reestablished as per the procedure
703	   described in this document.  During the incremental upgrade, the PCE=
P
704	   speaker SHOULD allow session establishment with and without TLS.
705	   Once both PCEP speakers are upgraded to support PCEPS, the PCEP
706	   session is re-established with TLS, otherwise PCEP session without
707	   TLS is setup.  A redundant PCE MAY also be used during the
708	   incremental deployment to take over the PCE undergoing upgrade.  Onc=
e
709	   the upgrade is completed, support for unsecured version SHOULD be
710	   removed.

712	   A PCE that accepts connections with or without PCEPS, it would
713	   respond based on the message received from PCC.  A PCC that supports
714	   connection with or without PCEPS, it would first attempt to connect
715	   with PCEPS and in case of error, it MAY retry to establish connectio=
n
716	   without PCEPS.  For successful TLS operations with PCEP, both PCEP
717	   peers in the network would need to be upgraded to support this
718	   document.

720	   Note that, a PCEP implementation that support PCEPS would respond
721	   with PCErr message with Error-Type set to [TBA2 by IANA] (PCEP
722	   StartTLS failure) and Error-value set to 2 if any other message is
723	   sent before StartTLS or Open.  If the sender of the invalid message
724	   is a PCEP implementation that does not support PCEPS, it will not be
725	   able to understand this error.  A PCEPS implementation could also
726	   send the PCErr message as per [RFC5440] with Error-Type &quot;PCEP s=
ession
727	   establishment failure&quot; and Error-value &quot;reception of an in=
valid Open
728	   message or a non Open message&quot; before closing the session.

730	6.  IANA Considerations

732	6.1.  New PCEP Message

734	   IANA is requested to allocate new message types within the &quot;PCE=
P
735	   Messages&quot; sub-registry of the PCEP Numbers registry, as follows=
:

737	      Value  Description                             Reference
738	       TBA1  The Start TLS Message (StartTLS)        This document

740	6.2.  New Error-Values

742	   IANA is requested to allocate new Error Types and Error Values withi=
n
743	   the &quot; PCEP-ERROR Object Error Types and Values&quot; sub-regist=
ry of the
744	   PCEP Numbers registry, as follows:

746	   Error-
747	   Type    Meaning               Error-value             Reference

749	   TBA2    PCEP StartTLS         0:Unassigned            This document
750	           failure               1:Reception of          This document
751	                                 StartTLS after
752	                                 any PCEP exchange
753	                                 2:Reception of          This document
754	                                 any other message
755	                                 apart from StartTLS,
756	                                 Open or PCErr
757	                                 3:Failure, connection   This document
758	                                 without TLS is not
759	                                 possible
760	                                 4:Failure, connection   This document
761	                                 without TLS is
762	                                 possible
763	                                 5:No StartTLS message   This document
764	                                 (nor PCErr/Open)
765	                                 before StartTLSWait
766	                                 timer expiry

768	7.  Security Considerations

770	   While the application of TLS satisfies the requirement on
771	   confidentiality as well as fine-grained, policy-based peer
772	   authentication, there are security threats that it cannot address.
773	   It may be advisable to apply additional protection measures, in
774	   particular in what relates to attacks specifically addressed to
775	   forging the TCP connection underpinning TLS, especially in the case
776	   of long-lived connections.  One of these measures is the application
777	   of TCP-AO (TCP Authentication Option [RFC5925]), which is fully
778	   compatible with and deemed as complementary to TLS.  The mechanisms
779	   to configure the requirements to use TCP-AO and other lower-layer
780	   protection measures with a particular peer are outside the scope of
781	   this document.

783	   Since computational resources required by TLS handshake and
784	   ciphersuite are higher than unencrypted TCP, clients connecting to a
785	   PCEPS server can more easily create high load conditions and a
786	   malicious client might create a Denial-of-Service attack more easily=
.

788	   Some TLS ciphersuites only provide integrity validation of their
789	   payload, and provide no encryption, such ciphersuites SHOULD NOT be
790	   used by default.  Administrators MAY allow the usage of these
791	   ciphersuites after careful weighting of the risk of relevant interna=
l
792	   data leakage, that can occur in such a case, as explicitly stated by
793	   [RFC6952].

795	   When using certificate fingerprints to identify PCEPS peers, any two
796	   certificates that produce the same hash value will be considered the
797	   same peer.  Therefore, it is important to make sure that the hash
798	   function used is cryptographically uncompromised, so that attackers
799	   are very unlikely to be able to produce a hash collision with a
800	   certificate of their choice.  This document mandates support for
801	   SHA-256 as defined by [SHS], but a later revision may demand support
802	   for stronger functions if suitable attacks on it are known.

804	   PCEPS implementations that continue to accept connections without TL=
S
805	   are susceptible to downgrade attacks as described in [RFC7457].  An
806	   attacker could attempt to remove the use of StartTLS message that
807	   request the use of TLS as it pass on the wire in clear, and further
808	   inject a PCErr message that suggest to attempt PCEP connection
809	   without TLS.

811	   The guidance given in [RFC7525] SHOULD be followed to avoid attacks
812	   on TLS.

814	8.  Manageability Considerations

816	   All manageability requirements and considerations listed in [RFC5440=
]
817	   apply to PCEP protocol extensions defined in this document.  In
818	   addition, requirements and considerations listed in this section
819	   apply.

821	8.1.  Control of Function and Policy

823	   A PCE or PCC implementation SHOULD allow configuring the PCEP
824	   security via TLS capabilities as described in this document.

826	   A PCE or PCC implementation supporting PCEP security via TLS MUST
827	   support general TLS configuration as per [RFC5246].  At least the
828	   configuration of one of the trust models and its corresponding
829	   parameters, as described in Section 3.4 and Section 3.5, MUST be
830	   supported by the implementation.

832	   A PCEP implementation SHOULD allow configuring the StartTLSWait time=
r
833	   value.

835	   PCEPS implementations MAY provide an option to allow the operator to
836	   manually override strict TLS configuration and allow unsecure
837	   connections.  Execution of this override SHOULD trigger a warning
838	   about the security implications of permitting unsecure connections.

840	   Further, the operator needs to develop suitable security policies
841	   around PCEP within his network.  The PCEP peers SHOULD provide ways
842	   for the operator to complete the following tasks in regards to a PCE=
P
843	   session:

845	   o  Determine if a session is protected via PCEPS.

847	   o  Determine the version of TLS, the mechanism used for
848	      authentication, and the ciphersuite in use.

850	   o  Determine if the certificate could not be verified, and the reaso=
n
851	      for this circumstance.

853	   o  Inspect the certificate offered by the PCEP peer.

855	   o  Be warned if StartTLS procedure fails for the PCEP peers, that ar=
e
856	      known to support PCEPS via configurations or capability
857	      advertisements.

859	8.2.  Information and Data Models

861	   The PCEP MIB module is defined in [RFC7420].  The MIB module could b=
e
862	   extended to include the ability to view the PCEPS capability, TLS
863	   related information as well as TLS status for each PCEP peer.

865	   Further, to allow the operator to configure the PCEPS capability and
866	   various TLS related parameters as well as to view the current TLS
867	   status for a PCEP session, the PCEP YANG module
868	   [I-D.ietf-pce-pcep-yang] is extended to include TLS related
869	   information.

871	8.3.  Liveness Detection and Monitoring

873	   Mechanisms defined in this document do not imply any new liveness
874	   detection and monitoring requirements in addition to those already
875	   listed in [RFC5440] and [RFC5246].

877	8.4.  Verifying Correct Operations

879	   A PCEPS implementation SHOULD log error events and provide PCEPS
880	   failure statistics with reasons.

882	8.5.  Requirements on Other Protocols

884	   Mechanisms defined in this document do not imply any new requirement=
s
885	   on other protocols.  Note that, Section 4 list possible discovery
886	   mechanism for support of PCEPS.

888	8.6.  Impact on Network Operation

890	   Mechanisms defined in this document do not have any significant
891	   impact on network operations in addition to those already listed in
892	   [RFC5440], and the policy and management implications discussed
893	   above.

895	9.  Acknowledgements

897	   This specification relies on the analysis and profiling of TLS
898	   included in [RFC6614] and the procedures described for the STARTTLS
899	   command in [RFC4513].

901	   We would like to thank Joe Touch for his suggestions and support
902	   regarding the StartTLS mechanisms.

904	   Thanks to Daniel King for reminding the authors about manageability
905	   considerations.

907	   Thanks to Cyril Margaria for shepherding this document.

909	   Thanks to David Mandelberg for early SECDIR review comments as well
910	   as re-reviewing during IETF last call.

912	   Thanks to Dan Frost for the RTGDIR review and comments.

914	   Thanks to Dale Worley for the Gen-ART review and comments.

916	   Also thanks to Tianran Zhou for OPSDIR review.

918	   Thanks to Deborah Brungard for being the responsible AD and guiding
919	   the authors as needed.

921	   Thanks to Mirja Kuhlewind, Eric Rescorla, Warren Kumari, Kathleen
922	   Moriarty, Suresh Krishnan, Ben Campbell and Alexey Melnikov for the
923	   IESG review and comments.

925	10.  References

927	10.1.  Normative References

929	   [RFC2119]  Bradner, S., &quot;Key words for use in RFCs to Indicate
930	              Requirement Levels&quot;, BCP 14, RFC 2119,
931	              DOI 10.17487/RFC2119, March 1997,
932	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc2119">h=
ttps://www.rfc-editor.org/info/rfc2119</a>&gt;.

934	   [RFC5246]  Dierks, T. and E. Rescorla, &quot;The Transport Layer Sec=
urity
935	              (TLS) Protocol Version 1.2&quot;, RFC 5246,
936	              DOI 10.17487/RFC5246, August 2008,
937	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc5246">h=
ttps://www.rfc-editor.org/info/rfc5246</a>&gt;.

939	   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
940	              Housley, R., and W. Polk, &quot;Internet X.509 Public Key
941	              Infrastructure Certificate and Certificate Revocation Lis=
t
942	              (CRL) Profile&quot;, RFC 5280, DOI 10.17487/RFC5280, May =
2008,
943	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc5280">h=
ttps://www.rfc-editor.org/info/rfc5280</a>&gt;.

945	   [RFC5440]  Vasseur, JP., Ed. and JL. Le Roux, Ed., &quot;Path Comput=
ation
946	              Element (PCE) Communication Protocol (PCEP)&quot;, RFC 54=
40,
947	              DOI 10.17487/RFC5440, March 2009,
948	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc5440">h=
ttps://www.rfc-editor.org/info/rfc5440</a>&gt;.

950	   [RFC6066]  Eastlake 3rd, D., &quot;Transport Layer Security (TLS)
951	              Extensions: Extension Definitions&quot;, RFC 6066,
952	              DOI 10.17487/RFC6066, January 2011,
953	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc6066">h=
ttps://www.rfc-editor.org/info/rfc6066</a>&gt;.

955	   [RFC6125]  Saint-Andre, P. and J. Hodges, &quot;Representation and
956	              Verification of Domain-Based Application Service Identity
957	              within Internet Public Key Infrastructure Using X.509
958	              (PKIX) Certificates in the Context of Transport Layer
959	              Security (TLS)&quot;, RFC 6125, DOI 10.17487/RFC6125, Mar=
ch
960	              2011, &lt;<a href=3D"https://www.rfc-editor.org/info/rfc6=
125">https://www.rfc-editor.org/info/rfc6125</a>&gt;.

962	   [RFC6698]  Hoffman, P. and J. Schlyter, &quot;The DNS-Based Authenti=
cation
963	              of Named Entities (DANE) Transport Layer Security (TLS)
964	              Protocol: TLSA&quot;, RFC 6698, DOI 10.17487/RFC6698, Aug=
ust
965	              2012, &lt;<a href=3D"https://www.rfc-editor.org/info/rfc6=
698">https://www.rfc-editor.org/info/rfc6698</a>&gt;.

967	   [RFC7525]  Sheffer, Y., Holz, R., and P. Saint-Andre,
968	              &quot;Recommendations for Secure Use of Transport Layer
969	              Security (TLS) and Datagram Transport Layer Security
970	              (DTLS)&quot;, BCP 195, RFC 7525, DOI 10.17487/RFC7525, Ma=
y
971	              2015, &lt;<a href=3D"https://www.rfc-editor.org/info/rfc7=
525">https://www.rfc-editor.org/info/rfc7525</a>&gt;.

973	   [RFC7671]  Dukhovni, V. and W. Hardaker, &quot;The DNS-Based
974	              Authentication of Named Entities (DANE) Protocol: Updates
975	              and Operational Guidance&quot;, RFC 7671, DOI 10.17487/RF=
C7671,
976	              October 2015, &lt;<a href=3D"https://www.rfc-editor.org/i=
nfo/rfc7671">https://www.rfc-editor.org/info/rfc7671</a>&gt;.

978	   [RFC8174]  Leiba, B., &quot;Ambiguity of Uppercase vs Lowercase in R=
FC
979	              2119 Key Words&quot;, BCP 14, RFC 8174, DOI 10.17487/RFC8=
174,
980	              May 2017, &lt;<a href=3D"https://www.rfc-editor.org/info/=
rfc8174">https://www.rfc-editor.org/info/rfc8174</a>&gt;.

982	   [SHS]      National Institute of Standards and Technology, &quot;Sec=
ure
983	              Hash Standard (SHS), FIPS PUB 180-4&quot;,
984	              DOI 10.6028/NIST.FIPS.180-4, August 2015,
985	              &lt;<a href=3D"http://nvlpubs.nist.gov/nistpubs/FIPS/">ht=
tp://nvlpubs.nist.gov/nistpubs/FIPS/</a>
986	              NIST.FIPS.180-4.pdf&gt;.

988	10.2.  Informative References

990	   [RFC4492]  Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B=
.
991	              Moeller, &quot;Elliptic Curve Cryptography (ECC) Cipher S=
uites
992	              for Transport Layer Security (TLS)&quot;, RFC 4492,
993	              DOI 10.17487/RFC4492, May 2006,
994	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc4492">h=
ttps://www.rfc-editor.org/info/rfc4492</a>&gt;.

996	   [RFC4513]  Harrison, R., Ed., &quot;Lightweight Directory Access Pro=
tocol
997	              (LDAP): Authentication Methods and Security Mechanisms&qu=
ot;,
998	              RFC 4513, DOI 10.17487/RFC4513, June 2006,
999	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc4513">h=
ttps://www.rfc-editor.org/info/rfc4513</a>&gt;.

1001	   [RFC5088]  Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., and R=
.
1002	              Zhang, &quot;OSPF Protocol Extensions for Path Computati=
on
1003	              Element (PCE) Discovery&quot;, RFC 5088, DOI 10.17487/RF=
C5088,
1004	              January 2008, &lt;<a href=3D"https://www.rfc-editor.org/=
info/rfc5088">https://www.rfc-editor.org/info/rfc5088</a>&gt;.

1006	   [RFC5089]  Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., and R=
.
1007	              Zhang, &quot;IS-IS Protocol Extensions for Path Computat=
ion
1008	              Element (PCE) Discovery&quot;, RFC 5089, DOI 10.17487/RF=
C5089,
1009	              January 2008, &lt;<a href=3D"https://www.rfc-editor.org/=
info/rfc5089">https://www.rfc-editor.org/info/rfc5089</a>&gt;.

1011	   [RFC5925]  Touch, J., Mankin, A., and R. Bonica, &quot;The TCP
1012	              Authentication Option&quot;, RFC 5925, DOI 10.17487/RFC5=
925,
1013	              June 2010, &lt;<a href=3D"https://www.rfc-editor.org/inf=
o/rfc5925">https://www.rfc-editor.org/info/rfc5925</a>&gt;.

1015	   [RFC6460]  Salter, M. and R. Housley, &quot;Suite B Profile for Tra=
nsport
1016	              Layer Security (TLS)&quot;, RFC 6460, DOI 10.17487/RFC64=
60,
1017	              January 2012, &lt;<a href=3D"https://www.rfc-editor.org/=
info/rfc6460">https://www.rfc-editor.org/info/rfc6460</a>&gt;.

1019	   [RFC6614]  Winter, S., McCauley, M., Venaas, S., and K. Wierenga,
1020	              &quot;Transport Layer Security (TLS) Encryption for RADI=
US&quot;,
1021	              RFC 6614, DOI 10.17487/RFC6614, May 2012,
1022	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc6614">=
https://www.rfc-editor.org/info/rfc6614</a>&gt;.

1024	   [RFC6952]  Jethanandani, M., Patel, K., and L. Zheng, &quot;Analysi=
s of
1025	              BGP, LDP, PCEP, and MSDP Issues According to the Keying
1026	              and Authentication for Routing Protocols (KARP) Design
1027	              Guide&quot;, RFC 6952, DOI 10.17487/RFC6952, May 2013,
1028	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc6952">=
https://www.rfc-editor.org/info/rfc6952</a>&gt;.

1030	   [RFC7420]  Koushik, A., Stephan, E., Zhao, Q., King, D., and J.
1031	              Hardwick, &quot;Path Computation Element Communication P=
rotocol
1032	              (PCEP) Management Information Base (MIB) Module&quot;,
1033	              RFC 7420, DOI 10.17487/RFC7420, December 2014,
1034	              &lt;<a href=3D"https://www.rfc-editor.org/info/rfc7420">=
https://www.rfc-editor.org/info/rfc7420</a>&gt;.

1036	   [RFC7457]  Sheffer, Y., Holz, R., and P. Saint-Andre, &quot;Summari=
zing
1037	              Known Attacks on Transport Layer Security (TLS) and
1038	              Datagram TLS (DTLS)&quot;, RFC 7457, DOI 10.17487/RFC745=
7,
1039	              February 2015, &lt;<a href=3D"https://www.rfc-editor.org=
/info/rfc7457">https://www.rfc-editor.org/info/rfc7457</a>&gt;.

1041	   [I-D.ietf-pce-stateful-sync-optimizations]
1042	              Crabbe, E., Minei, I., Medved, J., Varga, R., Zhang, X.,
1043	              and D. Dhody, &quot;Optimizations of Label Switched Path=
 State
1044	              Synchronization Procedures for a Stateful PCE&quot;, dra=
ft-
1045	              ietf-pce-stateful-sync-optimizations-10 (work in
1046	              progress), March 2017.

1048	   [I-D.ietf-pce-pcep-yang]
1049	              Dhody, D., Hardwick, J., Beeram, V., and j.
1050	              <a href=3D"mailto:jefftant@gmail.com">jefftant@gmail.com=
</a>, &quot;A YANG Data Model for Path
1051	              Computation Element Communications Protocol (PCEP)&quot;=
,
1052	              draft-ietf-pce-pcep-yang-05 (work in progress), June 201=
7.

1054	   [I-D.wu-pce-dns-pce-discovery]
1055	              Wu, Q., Dhody, D., King, D., Lopez, D., and J. Tantsura,
1056	              &quot;Path Computation Element (PCE) Discovery using Dom=
ain
1057	              Name System(DNS)&quot;, draft-wu-pce-dns-pce-discovery-1=
0 (work
1058	              in progress), March 2017.

1060	   [I-D.wu-pce-discovery-pceps-support]
1061	              Lopez, D., Wu, Q., Dhody, D., and D. King, &quot;IGP ext=
ension
1062	              for PCEP security capability support in the PCE
1063	              discovery&quot;, draft-wu-pce-discovery-pceps-support-07=
 (work
1064	              in progress), March 2017.

1066	Authors&#39; Addresses

1068	   Diego R. Lopez
1069	   Telefonica I+D
1070	   Don Ramon de la Cruz, 82
1071	   Madrid  28006
1072	   Spain

1074	   Phone: +34 913 129 041
1075	   EMail: <a href=3D"mailto:diego.r.lopez@telefonica.com">diego.r.lope=
z@telefonica.com</a>
1076	   Oscar Gonzalez de Dios
1077	   Telefonica I+D
1078	   Don Ramon de la Cruz, 82
1079	   Madrid  28006
1080	   Spain

1082	   Phone: +34 913 129 041
1083	   EMail: <a href=3D"mailto:oscar.gonzalezdedios@telefonica.com">oscar=
.gonzalezdedios@telefonica.com</a>

1085	   Qin Wu
1086	   Huawei
1087	   101 Software Avenue, Yuhua District
1088	   Nanjing, Jiangsu  210012
1089	   China

1091	   EMail: <a href=3D"mailto:sunseawq@huawei.com">sunseawq@huawei.com</=
a>

1093	   Dhruv Dhody
1094	   Huawei
1095	   Divyashree Techno Park, Whitefield
1096	   Bangalore, KA  560066
1097	   India

1099	   EMail: <a href=3D"mailto:dhruv.ietf@gmail.com">dhruv.ietf@gmail.com=
</a>








</pre></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote"=
>On Mon, Sep 4, 2017 at 8:31 PM, Henrik Levkowetz <span dir=3D"ltr">&lt;<a =
href=3D"mailto:henrik@levkowetz.com" target=3D"_blank">henrik@levkowetz.com=
</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
Hi,<br>
<br>
This is an automatic notification about a new xml2rfc release,<br>
v2.8.0, generated when running the mkrelease script.<br>
<br>
Release notes:<br>
<br>
xml2rfc (2.8.0) ietf; urgency=3Dlow<br>
=C2=A0 This is a small feature release which changes URLs in boilerplate to=
<br>
=C2=A0 use https: instead of http:.=C2=A0 There are also some bugfixes.<br>
=C2=A0 * Include notes when doing index processing.=C2=A0 Fixes issue #335.=
<br>
=C2=A0 * Include erefs with text equal to the URL in the URIs section.=C2=
=A0 See<br>
=C2=A0 =C2=A0 issue #334.<br>
=C2=A0 * Changed the use of http: to https: in many places.=C2=A0 In the ge=
neration<br>
=C2=A0 =C2=A0 of RFCs, the code uses a switchover date of August 21, 2017 w=
hen deciding<br>
=C2=A0 =C2=A0 whether to insert http: or https: URLs.=C2=A0 In practice, th=
is means that RFCs<br>
=C2=A0 =C2=A0 with a date of September 2017 or later will get https:.=C2=A0=
 Also fixed URL<br>
=C2=A0 =C2=A0 line-breaking prevention to apply to https: URLS.=C2=A0 Fixes=
 issue #333.<br>
=C2=A0 * In urlkeep(), prevent breaking also for https:, not only http: URL=
s<br>
<br>
The new version is available through SVN checkout, with<br>
=C2=A0 &#39;svn checkout <a href=3D"http://svn.tools.ietf.org/svn/tools/xml=
2rfc/tags/cli/2.8.0" rel=3D"noreferrer" target=3D"_blank">http://svn.tools.=
ietf.org/svn/<wbr>tools/xml2rfc/tags/cli/2.8.0</a>&#39;<br>
<br>
Regards,<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Henrik<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 (via the mkrelease script)<br>
<br>
______________________________<wbr>_________________<br>
xml2rfc mailing list<br>
<a href=3D"mailto:xml2rfc@ietf.org">xml2rfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/xml2rfc" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/xml2rfc</a><=
br>
</blockquote></div><br></div>

--94eb2c043d0c497447055861bcfa--


From nobody Mon Sep  4 13:26:23 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CA4312EC30; Mon,  4 Sep 2017 13:26:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O51ZQOGkqtpJ; Mon,  4 Sep 2017 13:26:10 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD026128D0F; Mon,  4 Sep 2017 13:26:10 -0700 (PDT)
Received: from h-99-61.a357.priv.bahnhof.se ([82.196.99.61]:64734 helo=[192.168.1.120]) by zinfandel.tools.ietf.org with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1doxwc-0002Nb-G9; Mon, 04 Sep 2017 13:26:10 -0700
To: Dhruv Dhody <dhruv.ietf@gmail.com>
References: <E1dossM-00067i-Kd@durif.tools.ietf.org> <CAB75xn7P-iD_3O1AOP4pMY2HvS3DwjCr8xYJoSexoHyoUyRpzw@mail.gmail.com>
Cc: xml2rfc@ietf.org, rfc-markdown@ietf.org, codesprints@ietf.org
From: Henrik Levkowetz <henrik@levkowetz.com>
Message-ID: <ef8c0d1b-6864-6ef6-31f9-93558346e4ca@levkowetz.com>
Date: Mon, 4 Sep 2017 22:25:57 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CAB75xn7P-iD_3O1AOP4pMY2HvS3DwjCr8xYJoSexoHyoUyRpzw@mail.gmail.com>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="sa0HblPh5IIixmnm2f6edWaE0rTq0AT6B"
X-SA-Exim-Connect-IP: 82.196.99.61
X-SA-Exim-Rcpt-To: codesprints@ietf.org, rfc-markdown@ietf.org, xml2rfc@ietf.org, dhruv.ietf@gmail.com
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Version: 4.2.1 (built Mon, 26 Dec 2011 16:24:06 +0000)
X-SA-Exim-Scanned: Yes (on zinfandel.tools.ietf.org)
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/9odQ3QL2CB4_c8gfVoQcvGrVjaU>
Subject: Re: [codesprints] [xml2rfc] New xml2rfc release: v2.8.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Sep 2017 20:26:16 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--sa0HblPh5IIixmnm2f6edWaE0rTq0AT6B
Content-Type: multipart/mixed; boundary="DDgGFIVWIP295RsX47gLiNT5qn8VpAq2H";
 protected-headers="v1"
From: Henrik Levkowetz <henrik@levkowetz.com>
To: Dhruv Dhody <dhruv.ietf@gmail.com>
Cc: xml2rfc@ietf.org, rfc-markdown@ietf.org, codesprints@ietf.org
Message-ID: <ef8c0d1b-6864-6ef6-31f9-93558346e4ca@levkowetz.com>
Subject: Re: [xml2rfc] New xml2rfc release: v2.8.0
References: <E1dossM-00067i-Kd@durif.tools.ietf.org>
 <CAB75xn7P-iD_3O1AOP4pMY2HvS3DwjCr8xYJoSexoHyoUyRpzw@mail.gmail.com>
In-Reply-To: <CAB75xn7P-iD_3O1AOP4pMY2HvS3DwjCr8xYJoSexoHyoUyRpzw@mail.gmail.com>

--DDgGFIVWIP295RsX47gLiNT5qn8VpAq2H
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Dhruv,

On 2017-09-04 21:01, Dhruv Dhody wrote:
> Hi,
>=20
> Because of this change idnits is failing and submission for draft is
> getting blocked.
> I am going to make manual change now, idnits output below for your
> reference -

Oops.  Right.  Preparing to release a new idnits now.

Thanks, and best regards,

	Henrik

> Thanks!
>=20
> Dhruv
>=20
> idnits 2.14.01  /var/www/.idnits
>=20
>=20
> tmp/draft-ietf-pce-pceps-17.txt:
>=20
>   Checking boilerplate required by RFC 5378 and the IETF Trust (see
>   http://trustee.ietf.org/license-info):
>   ---------------------------------------------------------------------=
-------
>=20
>   ** The document seems to lack a License Notice according IETF Trust
>      Provisions of 28 Dec 2009, Section 6.b.i or Provisions of 12 Sep 2=
009
>      Section 6.b -- however, there's a paragraph with a matching beginn=
ing.
>      Boilerplate error?
>=20
>      IETF Trust Legal Provisions of 28-dec-2009, Section 6.b(i), paragr=
aph 3:
>         This document is subject to BCP 78 and the IETF Trust's Legal P=
rovisions
>         Relating to IETF Documents (http://trustee.ietf.org/license-inf=
o)
>         in effect on the date of publication of this document.  Please
>         review these documents carefully, as they describe your rights
>         and restrictions with respect to this document.  Code Component=
s
>         extracted from this document must include Simplified BSD Licens=
e
>         text as described in Section 4.e of the Trust Legal Provisions
>         and are provided without warranty as described in the Simplifie=
d
>         BSD License.
>=20
>      ... text found in draft:
>         This document is subject to BCP 78 and the IETF Trust's Legal P=
rovisions
>         Relating to IETF Documents
> ..................................^
>         (https://trustee.ietf.org/license-info) in effect on the date o=
f
>         publication of this document.  Please review these documents
>         carefully, as they describe your rights and restrictions with
>         respect to this document.  Code Components extracted from this
>         document must include Simplified BSD License text as described =
in
>         Section 4.e of the Trust Legal Provisions and are provided
>         without warranty as described in the Simplified BSD License.
>=20
>=20
>=20
>   Checking nits according to http://www.ietf.org/id-info/1id-guidelines=
=2Etxt:
>   ---------------------------------------------------------------------=
-------
>=20
>   ** The document seems to lack a 1id_guidelines paragraph about
>      Internet-Drafts being working documents -- however, there's a para=
graph
>      with a matching beginning. Boilerplate error?
>=20
>      1id_guidelines, paragraph 1:
>         Internet-Drafts are working documents of the Internet Engineeri=
ng Task
>         Force (IETF), its areas, and its working groups.  Note that oth=
er
>         groups may also distribute working documents as Internet-Drafts=
=2E
>=20
>      ... text found in draft:
>         Internet-Drafts are working documents of the Internet Engineeri=
ng Task
>         Force (IETF).  Note that other groups may also distribute worki=
ng
> ....................^
>         documents as Internet-Drafts.  The list of current
>         Internet-Drafts is at
>         https://datatracker.ietf.org/drafts/current/.
>=20
>=20
>   ** The document seems to lack a 1id_guidelines paragraph about the li=
st of
>      current Internet-Drafts.
>=20
>      1id_guidelines, paragraph 3:
>         The list of current Internet-Drafts can be accessed at
>         http://www.ietf.org/1id-abstracts.html
>=20
>   ** The document seems to lack a 1id_guidelines paragraph about the li=
st of
>      Shadow Directories.
>=20
>      1id_guidelines, paragraph 4:
>         The list of Internet-Draft Shadow Directories can be accessed a=
t
>         http://www.ietf.org/shadow.html
>=20
>=20
>   Checking nits according to http://www.ietf.org/id-info/checklist :
>   ---------------------------------------------------------------------=
-------
>=20
>      No issues found here.
>=20
>   Miscellaneous warnings:
>   ---------------------------------------------------------------------=
-------
>=20
>   =3D=3D The document seems to lack the recommended RFC 2119 boilerplat=
e, even if
>      it appears to use RFC 2119 keywords -- however, there's a paragrap=
h with
>      a matching beginning. Boilerplate error?
>=20
>      RFC 2119, paragraph 2:
>         The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL N=
OT",
>         "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in=

>         this document are to be interpreted as described in RFC 2119.
>=20
>      ... text found in draft:
>         The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL N=
OT",
>         "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY"=
,
> ................................................^
>         and "OPTIONAL" in this document are to be interpreted as
>         described in BCP 14 [RFC2119] [RFC8174] when, and only when, th=
ey
>         appear in all capitals, as shown here.
>=20
>=20
>      (The document does seem to have the reference to RFC 2119 which th=
e
>      ID-Checklist requires).
>      (Using the creation date from RFC5440, updated by this document, f=
or
>      RFC5378 checks: 2007-11-16)
>=20
>   -- The document seems to contain a disclaimer for pre-RFC5378 work, a=
nd may
>      have content which was first submitted before 10 November 2008.  T=
he
>      disclaimer is necessary when there are original authors that you h=
ave
>      been unable to contact, or if some do not wish to grant the BCP78 =
rights
>      to the IETF Trust.  If you are able to get all authors (current an=
d
>      original) to grant those rights, you can and should remove the
>      disclaimer; otherwise, the disclaimer is needed and you can ignore=
 this
>      comment. (See the Legal Provisions document at
>      http://trustee.ietf.org/license-info for more information.)
>=20
>=20
>   Checking references for intended status: Proposed Standard
>   ---------------------------------------------------------------------=
-------
>=20
>      (See RFCs 3967 and 4897 for information about using normative refe=
rences
>      to lower-maturity documents in RFCs)
>=20
>   -- Possible downref: Non-RFC (?) normative reference: ref. 'SHS'
>=20
>=20
>      Summary: 4 errors (**), 0 flaws (~~), 1 warning (=3D=3D), 2 commen=
ts (--).
>=20
> -----------------------------------------------------------------------=
---------
>=20
>=20
> 2	PCE Working Group                                               D. Lo=
pez
> 3	Internet-Draft                                       O. Gonzalez de D=
ios
> 4	Updates: 5440 (if approved)                               Telefonica =
I+D
> 5	Intended status: Standards Track                                   Q.=
 Wu
> 6	Expires: March 8, 2018                                          D. Dh=
ody
> 7	                                                                  Hua=
wei
> 8	                                                       September 4, 2=
017
>=20
> 10	                       Secure Transport for PCEP
> 11	                        draft-ietf-pce-pceps-17
>=20
> 13	Abstract
>=20
> 15	   The Path Computation Element Communication Protocol (PCEP) define=
s
> 16	   the mechanisms for the communication between a Path Computation
> 17	   Client (PCC) and a Path Computation Element (PCE), or among PCEs.=

> 18	   This document describes the usage of Transport Layer Security (TL=
S)
> 19	   to enhance PCEP security, hence the PCEPS acronym proposed for it=
=2E
> 20	   The additional security mechanisms are provided by the transport
> 21	   protocol supporting PCEP, and therefore they do not affect the
> 22	   flexibility and extensibility of PCEP.
>=20
> 24	   This document updates RFC 5440 in regards to the PCEP initializat=
ion
> 25	   phase procedures.
>=20
> 27	Status of This Memo
>=20
> 29	   This Internet-Draft is submitted in full conformance with the
> 30	   provisions of BCP 78 and BCP 79.
>=20
> 32	   Internet-Drafts are working documents of the Internet Engineering=

> 33	   Task Force (IETF).  Note that other groups may also distribute
> 34	   working documents as Internet-Drafts.  The list of current Intern=
et-
> 35	   Drafts is at https://datatracker.ietf.org/drafts/current/.
>=20
> 37	   Internet-Drafts are draft documents valid for a maximum of six mo=
nths
> 38	   and may be updated, replaced, or obsoleted by other documents at =
any
> 39	   time.  It is inappropriate to use Internet-Drafts as reference
> 40	   material or to cite them other than as "work in progress."
>=20
> 42	   This Internet-Draft will expire on March 8, 2018.
>=20
> 44	Copyright Notice
>=20
> 46	   Copyright (c) 2017 IETF Trust and the persons identified as the
> 47	   document authors.  All rights reserved.
>=20
> 49	   This document is subject to BCP 78 and the IETF Trust's Legal
> 50	   Provisions Relating to IETF Documents
> 51	   (https://trustee.ietf.org/license-info) in effect on the date of
> 52	   publication of this document.  Please review these documents
> 53	   carefully, as they describe your rights and restrictions with res=
pect
> 54	   to this document.  Code Components extracted from this document m=
ust
> 55	   include Simplified BSD License text as described in Section 4.e o=
f
> 56	   the Trust Legal Provisions and are provided without warranty as
> 57	   described in the Simplified BSD License.
>=20
> 59	   This document may contain material from IETF Documents or IETF
> 60	   Contributions published or made publicly available before Novembe=
r
> 61	   10, 2008.  The person(s) controlling the copyright in some of thi=
s
> 62	   material may not have granted the IETF Trust the right to allow
> 63	   modifications of such material outside the IETF Standards Process=
=2E
> 64	   Without obtaining an adequate license from the person(s) controll=
ing
> 65	   the copyright in such materials, this document may not be modifie=
d
> 66	   outside the IETF Standards Process, and derivative works of it ma=
y
> 67	   not be created outside the IETF Standards Process, except to form=
at
> 68	   it for publication as an RFC or to translate it into languages ot=
her
> 69	   than English.
>=20
> 71	Table of Contents
>=20
> 73	   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .=
   3
> 74	   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .=
   4
> 75	   3.  Applying PCEPS  . . . . . . . . . . . . . . . . . . . . . . .=
   4
> 76	     3.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .=
   4
> 77	     3.2.  Initiating the TLS Procedures . . . . . . . . . . . . . .=
   4
> 78	     3.3.  The StartTLS Message  . . . . . . . . . . . . . . . . . .=
   7
> 79	     3.4.  TLS Connection Establishment  . . . . . . . . . . . . . .=
  12
> 80	     3.5.  Peer Identity . . . . . . . . . . . . . . . . . . . . . .=
  14
> 81	     3.6.  Connection Establishment Failure  . . . . . . . . . . . .=
  15
> 82	   4.  Discovery Mechanisms  . . . . . . . . . . . . . . . . . . . .=
  15
> 83	     4.1.  DANE Applicability  . . . . . . . . . . . . . . . . . . .=
  16
> 84	   5.  Backward Compatibility  . . . . . . . . . . . . . . . . . . .=
  16
> 85	   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .=
  17
> 86	     6.1.  New PCEP Message  . . . . . . . . . . . . . . . . . . . .=
  17
> 87	     6.2.  New Error-Values  . . . . . . . . . . . . . . . . . . . .=
  17
> 88	   7.  Security Considerations . . . . . . . . . . . . . . . . . . .=
  18
> 89	   8.  Manageability Considerations  . . . . . . . . . . . . . . . .=
  19
> 90	     8.1.  Control of Function and Policy  . . . . . . . . . . . . .=
  19
> 91	     8.2.  Information and Data Models . . . . . . . . . . . . . . .=
  20
> 92	     8.3.  Liveness Detection and Monitoring . . . . . . . . . . . .=
  20
> 93	     8.4.  Verifying Correct Operations  . . . . . . . . . . . . . .=
  20
> 94	     8.5.  Requirements on Other Protocols . . . . . . . . . . . . .=
  20
> 95	     8.6.  Impact on Network Operation . . . . . . . . . . . . . . .=
  21
> 96	   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .=
  21
> 97	   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .=
  21
> 98	     10.1.  Normative References . . . . . . . . . . . . . . . . . .=
  21
> 99	     10.2.  Informative References . . . . . . . . . . . . . . . . .=
  23
> 100	   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . =
=2E  24
>=20
> 102	1.  Introduction
>=20
> 104	   The Path Computation Element Communication Protocol (PCEP) [RFC5=
440]
> 105	   defines the mechanisms for the communication between a Path
> 106	   Computation Client (PCC) and a Path Computation Element (PCE), o=
r
> 107	   between two PCEs.  These interactions include requests and repli=
es
> 108	   that can be critical for a sustainable network operation and ade=
quate
> 109	   resource allocation, and therefore appropriate security becomes =
a key
> 110	   element in the PCE infrastructure.  As the applications of the P=
CE
> 111	   framework evolves, and more complex service patterns emerge, the=

> 112	   definition of a secure mode of operation becomes more relevant.
>=20
> 114	   [RFC5440] analyzes in its section on security considerations the=

> 115	   potential threats to PCEP and their consequences, and discusses
> 116	   several mechanisms for protecting PCEP against security attacks,=

> 117	   without making a specific recommendation on a particular one or
> 118	   defining their application in depth.  Moreover, [RFC6952] remark=
s the
> 119	   importance of ensuring PCEP communication confidentiality, espec=
ially
> 120	   when PCEP communication endpoints do not reside in the same
> 121	   Autonomous System (AS), as the interception of PCEP messages cou=
ld
> 122	   leak sensitive information related to computed paths and resourc=
es.
>=20
> 124	   Among the possible solutions mentioned in these documents, Trans=
port
> 125	   Layer Security (TLS) [RFC5246] provides support for peer
> 126	   authentication, message encryption and integrity.  TLS provides =
well-
> 127	   known mechanisms to support key configuration and exchange, as w=
ell
> 128	   as means to perform security checks on the results of PCE discov=
ery
> 129	   procedures via Interior Gateway Protocol (IGP) ([RFC5088] and
> 130	   [RFC5089]).
>=20
> 132	   This document describes a security container for the transport o=
f
> 133	   PCEP messages, and therefore it does not affect the flexibility =
and
> 134	   extensibility of PCEP.
>=20
> 136	   This document describes how to apply TLS to secure interactions =
with
> 137	   PCE, including initiation of the TLS procedures, the TLS handsha=
ke
> 138	   mechanism, the TLS methods for peer authentication, the applicab=
le
> 139	   TLS ciphersuites for data exchange, and the handling of errors i=
n the
> 140	   security checks.  In the rest of the document we will refer to t=
his
> 141	   usage of TLS to provide a secure transport for PCEP as "PCEPS".
>=20
> 143	   Within this document, PCEP communications are described through =
PCC-
> 144	   PCE relationship.  The PCE architecture also supports the PCE-PC=
E
> 145	   communication, this is achieved by requesting PCE fill the role =
of a
> 146	   PCC, as usual.  Thus, in this document, the PCC refers to a PCC =
or a
> 147	   PCE initiating the PCEP session and acting as a client.
>=20
> 149	2.  Requirements Language
>=20
> 151	   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NO=
T",
> 152	   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",=
 and
> 153	   "OPTIONAL" in this document are to be interpreted as described i=
n BCP
> 154	   14 [RFC2119] [RFC8174] when, and only when, they appear in all
> 155	   capitals, as shown here.
>=20
> 157	3.  Applying PCEPS
>=20
> 159	3.1.  Overview
>=20
> 161	   The steps involved in establishing a PCEPS session are as follow=
s:
>=20
> 163	   1.  Establishment of a TCP connection.
>=20
> 165	   2.  Initiating the TLS procedures by the StartTLS message from P=
CE to
> 166	       PCC and from PCC to PCE.
>=20
> 168	   3.  Negotiation and establishment of TLS connection.
>=20
> 170	   4.  Start exchanging PCEP messages as per [RFC5440].
>=20
> 172	   This document uses the standard StartTLS procedure in PCEP, inst=
ead
> 173	   of using a different port for the secured session.  This is done=
 to
> 174	   avoid requesting allocation of another port number for the PCEPS=
=2E
> 175	   The StartTLS procedure makes more efficient use of scarce port
> 176	   numbers and allow simpler configuration of PCEP.
>=20
> 178	   Implementations SHOULD follow the best practices and recommendat=
ions
> 179	   for using TLS, as per [RFC7525].
>=20
> 181	   It should be noted that this procedure updates what is defined i=
n
> 182	   section 4.2.1 and section 6.7 of [RFC5440] regarding the
> 183	   initialization phase and the processing of messages prior to the=
 Open
> 184	   message.  The details of processing, including backward
> 185	   compatibility, are discussed in the following sections.
>=20
> 187	3.2.  Initiating the TLS Procedures
>=20
> 189	   Since PCEP can operate either with or without TLS, it is necessa=
ry
> 190	   for a PCEP speaker to indicate whether it wants to set up a TLS
> 191	   connection or not.  For this purpose, this document specifies a =
new
> 192	   PCEP message called StartTLS.  Thus, the PCEP session is secured=
 via
> 193	   TLS from the start before exchange of any other PCEP message (th=
at
> 194	   includes the Open message).  This document thus updates [RFC5440=
],
> 195	   which required the Open message to be the first PCEP message tha=
t is
> 196	   exchanged.  In the case of a PCEP session using TLS, the StartTL=
S
> 197	   message will be sent first.  Also a PCEP speaker that supports P=
CEPS
> 198	   MUST NOT start the OpenWait timer after the TCP establishment,
> 199	   instead it starts a StartTLSWait timer as described in Section 3=
=2E3.
>=20
> 201	   The PCEP speaker MAY discover that the PCEP peer supports PCEPS =
or
> 202	   can be preconfigured to use PCEPS for a given peer (see Section =
4 for
> 203	   more details).  An existing PCEP session cannot be secured via T=
LS,
> 204	   the session MUST be closed and re-established with TLS as per th=
e
> 205	   procedure described in this document.
>=20
> 207	   The StartTLS message is a PCEP message sent by a PCC to a PCE an=
d by
> 208	   a PCE to a PCC in order to initiate the TLS procedure for PCEP. =
 The
> 209	   PCC initiates the use of TLS by sending a StartTLS message.  The=
 PCE
> 210	   agrees to the use of TLS by responding with its own StartTLS mes=
sage.
> 211	   If the PCE is configured to only support TLS, it may send the
> 212	   StartTLS message immediately upon TCP connection establishment;
> 213	   otherwise it MUST wait for the PCC's first message to see whethe=
r it
> 214	   is an Open or a StartTLS message.  The TLS negotiation and
> 215	   establishment procedures are triggered once the PCEP speaker has=
 sent
> 216	   and received the StartTLS message.  The Message-Type field of th=
e
> 217	   PCEP common header for the StartTLS message is set to [TBA1 by I=
ANA].
>=20
> 219	   Once the TCP connection has been successfully established, the f=
irst
> 220	   message sent by the PCC to the PCE and by the PCE to the PCC MUS=
T be
> 221	   a StartTLS message for the PCEPS.  Note that, this is a signific=
ant
> 222	   change from [RFC5440], where the first PCEP message is the Open
> 223	   message.
>=20
> 225	   A PCEP speaker receiving a StartTLS message, after any other PCE=
P
> 226	   exchange has taken place (by receiving or sending any other mess=
ages
> 227	   from either side) MUST treat it as an unexpected message and rep=
ly
> 228	   with a PCErr message with Error-Type set to [TBA2 by IANA] (PCEP=

> 229	   StartTLS failure) and Error-value set to 1 (reception of StartTL=
S
> 230	   after any PCEP exchange), and MUST close the TCP connection.
>=20
> 232	   Any message received prior to StartTLS or Open message MUST trig=
ger a
> 233	   protocol error condition causing a PCErr message to be sent with=

> 234	   Error-Type set to [TBA2 by IANA] (PCEP StartTLS failure) and Err=
or-
> 235	   value set to 2 (reception of a message apart from StartTLS or Op=
en)
> 236	   and MUST close the TCP connection.
>=20
> 238	   If the PCEP speaker that does not support PCEPS, receives a Star=
tTLS
> 239	   message, it will behave according to the existing error mechanis=
m
> 240	   described in section 6.2 of [RFC5440] (in case message is receiv=
ed
> 241	   prior to an Open message) or section 6.9 of [RFC5440] (for the c=
ase
> 242	   of reception of unknown message).  See Section 5 for more detail=
s.
>=20
> 244	   If the PCEP speaker that only supports PCEPS connection (as a lo=
cal
> 245	   policy), receives an Open message, it MUST treat it as an unexpe=
cted
> 246	   message and reply with a PCErr message with Error-Type set to 1 =
(PCEP
> 247	   session establishment failure) and Error-value set to 1 (recepti=
on of
> 248	   an invalid Open message or a non Open message), and MUST close t=
he
> 249	   TCP connection.
>=20
> 251	   If a PCC supports PCEPS connections as well as allow non-PCEPS
> 252	   connection (as a local policy), it MUST first try to establish P=
CEPS,
> 253	   by sending StartTLS message and in case it receives an PCErr mes=
sage
> 254	   from the PCE, it MAY retry to establish connection without PCEPS=
 by
> 255	   sending an Open message.  If a PCE supports PCEPS connections as=
 well
> 256	   as allow non-PCEPS connection (as a local policy), it MUST wait =
to
> 257	   respond after TCP establishment, based on the message received f=
rom
> 258	   the PCC.  In case of StartTLS message, PCE MUST respond with sen=
ding
> 259	   a StartTLS message and moving to TLS establishment procedures as=

> 260	   described in this document.  In case of Open message, PCE MUST
> 261	   respond with Open message and move to PCEP session establishment=

> 262	   procedure as per [RFC5440].  If a PCE supports PCEPS connections=
 only
> 263	   (as a local policy), it MAY send StartTLS message to PCC without=

> 264	   waiting to receive a StartTLS message from PCC.
>=20
> 266	   If a PCEP speaker that is unwilling or unable to negotiate TLS
> 267	   receives a StartTLS messages, it MUST return a PCErr message (in=

> 268	   clear) with Error-Type set to [TBA2 by IANA] (PCEP StartTLS fail=
ure)
> 269	   and Error-value set to:
>=20
> 271	   o  3 (Failure, connection without TLS is not possible) if it is =
not
> 272	      willing to exchange PCEP messages without the solicited TLS
> 273	      connection, and it MUST close the TCP session.
>=20
> 275	   o  4 (Failure, connection without TLS is possible) if it is will=
ing
> 276	      to exchange PCEP messages without the solicited TLS connectio=
n,
> 277	      and it MUST close the TCP session.  The receiver MAY choose t=
o
> 278	      attempt to re-establish the PCEP session without TLS next.  T=
he
> 279	      attempt to re-establish the PCEP session without TLS SHOULD b=
e
> 280	      limited to only once.
>=20
> 282	   If the PCEP speaker supports PCEPS and can establish a TLS conne=
ction
> 283	   it MUST start the TLS connection negotiation and establishment s=
teps
> 284	   described in Section 3.4 before the PCEP initialization procedur=
e
> 285	   (section 4.2.1 of [RFC5440]).
>=20
> 287	   After the exchange of StartTLS messages, if the TLS negotiation =
fails
> 288	   for some reason (e.g. the required mechanisms for certificate
> 289	   revocation checking are not available), both peers SHOULD immedi=
ately
> 290	   close the connection.
>=20
> 292	   A PCEP speaker that does not support PCEPS sends the Open messag=
e
> 293	   directly, as per [RFC5440].  A PCEP speaker that supports PCEPS,=
 but
> 294	   has learned in the last exchange the peer's willingness to
> 295	   reestablish session without TLS, MAY send the Open message direc=
tly,
> 296	   as per [RFC5440].  The attempt to re-establish the PCEP session
> 297	   without TLS SHOULD be limited to only once.
>=20
> 299	   Given the asymmetric nature of TLS for connection establishment,=
 it
> 300	   is relevant to identify the roles of each of the PCEP peers in i=
t.
> 301	   The PCC SHALL act as TLS client, and the PCE SHALL act as TLS se=
rver
> 302	   as per [RFC5246].
>=20
> 304	   As per the recommendation from [RFC7525] to avoid downgrade atta=
cks,
> 305	   PCEP peers that support PCEPS, SHOULD default to strict TLS
> 306	   configuration i.e. do not allow non-TLS PCEP sessions to be
> 307	   established.  PCEPS implementations MAY provide an option to all=
ow
> 308	   the operator to manually override strict TLS configuration and a=
llow
> 309	   unsecured connections.  Execution of this override SHOULD trigge=
r a
> 310	   warning about the security implications of permitting unsecured
> 311	   connections.
>=20
> 313	3.3.  The StartTLS Message
>=20
> 315	   The StartTLS message is used to initiate the TLS procedure for a=

> 316	   PCEPS session between the PCEP peers.  A PCEP speaker sends the
> 317	   StartTLS message to request negotiation and establishment of TLS=

> 318	   connection for PCEP.  On receiving a StartTLS message from the P=
CEP
> 319	   peer (i.e.  when the PCEP speaker has sent and received StartTLS=

> 320	   message) it is ready to start the negotiation and establishment =
of
> 321	   TLS and move to steps described in Section 3.4.
>=20
> 323	   The collision resolution procedures described in [RFC5440] for t=
he
> 324	   exchange of Open messages MUST be applied by the PCEP peers duri=
ng
> 325	   the exchange of StartTLS messages.
>=20
> 327	   The format of a StartTLS message is as follows:
>=20
> 329	      <StartTLS Message>::=3D <Common Header>
>=20
> 331	   The StartTLS message MUST contain only the PCEP common header wi=
th
> 332	   Message-Type field set to [TBA1 by IANA].
>=20
> 334	   Once the TCP connection has been successfully established, the P=
CEP
> 335	   speaker MUST start a timer called StartTLSWait timer, after the
> 336	   expiration of which, if neither StartTLS message has been receiv=
ed,
> 337	   nor a PCErr/Open message (in case of failure and PCEPS not suppo=
rted
> 338	   by the peer, respectively), it MUST send a PCErr message with Er=
ror-
> 339	   Type set to [TBA2 by IANA] and Error-value set to 5 (no StartTLS=
 (nor
> 340	   PCErr/Open) message received before the expiration of the
> 341	   StartTLSWait timer) and it MUST release the TCP connection . A
> 342	   RECOMMENDED value for StartTLSWait timer is 60 seconds.  The val=
ue of
> 343	   StartTLSWait timer MUST NOT be less than OpenWait timer.
>=20
> 345	                  +-+-+                 +-+-+
> 346	                  |PCC|                 |PCE|
> 347	                  +-+-+                 +-+-+
> 348	                    |                     |
> 349	                    | StartTLS            |
> 350	                    | msg                 |
> 351	                    |-------              |
> 352	                    |       \   StartTLS  |
> 353	                    |        \  msg       |
> 354	                    |         \  ---------|
> 355	                    |          \/         |
> 356	                    |          /\         |
> 357	                    |         /  -------->|
> 358	                    |        /            |
> 359	                    |<------              |
> 360	                    |:::::::::TLS:::::::::|
> 361	                    |:::::Establishment:::|
> 362	                    |                     |
> 363	                    |                     |
> 364	                    |:::::::PCEP::::::::::|
> 365	                    |                     |
>=20
> 367	            Figure 1: Both PCEP Speaker supports PCEPS (strict)
> 368	                  +-+-+                 +-+-+
> 369	                  |PCC|                 |PCE|
> 370	                  +-+-+                 +-+-+
> 371	                    |                     |
> 372	                    | StartTLS            |
> 373	                    | msg                 |
> 374	                    |-------              |
> 375	                    |       \   StartTLS  |
> 376	                    |        \  msg       |
> 377	                    |         \  ---------|
> 378	                    |          \/         |
> 379	                    |          /\         |
> 380	                    |         /  -------->|
> 381	                    |        /            |
> 382	                    |<------              |
> 383	                    |:::::::::TLS:::::::::| TLS Establishment
> 384	                    |:::::Establishment:::| Failure, Both
> 385	                    |                     | peers close
> 386	                                            session
>=20
> 388	      Figure 2: Both PCEP Speaker supports PCEPS (strict), but cann=
ot
> 389	                               establish TLS
>=20
> 391	                  +-+-+                 +-+-+
> 392	                  |PCC|                 |PCE|
> 393	                  +-+-+                 +-+-+
> 394	                    |                     |  Does not support
> 395	                    | StartTLS            |  PCEPS and thus
> 396	                    | msg                 |  sends Open
> 397	                    |-------              |
> 398	                    |       \   Open      |
> 399	                    |        \  msg       |
> 400	                    |         \  ---------|
> 401	                    |          \/         |
> 402	                    |          /\         |
> 403	                    |         /  -------->|
> 404	                    |        /            |
> 405	                    |<------              |
> 406	                    |                     |
> 407	                    |<--------------------| Send Error
> 408	                    |       PCErr         | Type=3D1,Value=3D1
> 409	                    |                     | (non-Open message
> 410	                    |<--------------------|  received)
> 411	                    |       Close         |
> 412	                    ///////// TCP /////////
> 413	                    //////re-establish/////
> 414	          Send Open | Open                |
> 415	          this time | msg                 |
> 416	                    |-------              |
> 417	                    |       \   Open      |
> 418	                    |        \  msg       |
> 419	                    |         \  ---------|
> 420	                    |          \/         |
> 421	                    |          /\         |
> 422	                    |         /  -------->|
> 423	                    |        /            |
> 424	                    |<------              |
>=20
> 426	    Figure 3: One PCEP Speaker (PCE) does not support PCEPS, while =
PCC
> 427	                    supports both with or without PCEPS
>=20
> 429	                  +-+-+                 +-+-+
> 430	                  |PCC|                 |PCE|
> 431	                  +-+-+                 +-+-+
> 432	                    |                     |
> 433	                    | StartTLS            |
> 434	                    | msg                 | PCE waits
> 435	                    |-------------------->| for PCC and
> 436	                    |            StartTLS | respond with
> 437	                    |<--------------------| Start TLS
> 438	                    |                     |
> 439	                    |:::::::::TLS:::::::::|
> 440	                    |:::::Establishment:::|
> 441	                    |                     |
> 442	                    |                     |
> 443	                    |:::::::PCEP::::::::::|
> 444	                    |                     |
>=20
> 446	    Figure 4: Both PCEP Speaker supports PCEPS as well as without P=
CEPS
>=20
> 448	                  +-+-+                 +-+-+
> 449	                  |PCC|                 |PCE|
> 450	                  +-+-+                 +-+-+
> 451	                    |                     |
> 452	                    | StartTLS            |
> 453	                    | msg                 | PCE waits
> 454	                    |-------------------->| for PCC
> 455	                    |               PCErr |
> 456	                    |<--------------------| Send Error
> 457	                    |                     | Type=3DTBA2,Value=3D3
> 458	                    |                     | (Failure, connection
> 459	                    |<--------------------|  without TLS is not
> 460	                    |       Close         |  possible)
>=20
> 462	   Figure 5: Both PCEP Speaker supports PCEPS as well as without PC=
EPS,
> 463	                   but PCE cannot start TLS negotiation
>=20
> 465	                  +-+-+                 +-+-+
> 466	                  |PCC|                 |PCE|
> 467	                  +-+-+                 +-+-+
> 468	                    |                     |
> 469	                    | Open                |
> 470	                    | msg                 | PCE waits
> 471	                    |-------------------->| for PCC and
> 472	                    |                Open | respond with
> 473	                    |<--------------------| Open
> 474	                    |                     |
> 475	                    |:::::::PCEP::::::::::|
> 476	                    |                     |
>=20
> 478	   Figure 6: PCE supports PCEPS as well as without PCEPS, while PCC=
 does
> 479	                             not support PCEPS
>=20
> 481	3.4.  TLS Connection Establishment
>=20
> 483	   Once the establishment of TLS has been agreed by the PCEP peers,=
 the
> 484	   connection establishment SHALL follow the following steps:
>=20
> 486	   1.  Immediately negotiate a TLS session according to [RFC5246]. =
 The
> 487	       following restrictions apply:
>=20
> 489	       *  Support for TLS v1.2 [RFC5246] or later is REQUIRED.
>=20
> 491	       *  Support for certificate-based mutual authentication is
> 492	          REQUIRED.
>=20
> 494	       *  Negotiation of a ciphersuite providing for integrity
> 495	          protection is REQUIRED.
>=20
> 497	       *  Negotiation of a ciphersuite providing for confidentialit=
y is
> 498	          RECOMMENDED.
>=20
> 500	       *  Support for and negotiation of compression is OPTIONAL.
>=20
> 502	       *  PCEPS implementations MUST, at a minimum, support negotia=
tion
> 503	          of the TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [RFC6460],=
 and
> 504	          SHOULD support TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as=

> 505	          well.  Implementations SHOULD support the NIST P-256
> 506	          (secp256r1) curve [RFC4492].  In addition, PCEPS
> 507	          implementations MUST support negotiation of the mandatory=
-to-
> 508	          implement ciphersuites required by the versions of TLS th=
at
> 509	          they support from TLS 1.3 onwards.
>=20
> 511	   2.  Peer authentication can be performed in any of the following=
 two
> 512	       REQUIRED operation models:
>=20
> 514	       *  TLS with X.509 certificates using Public-Key Infrastructu=
re
> 515	          Exchange (PKIX) trust models:
>=20
> 517	          +  Implementations MUST allow the configuration of a list=
 of
> 518	             trusted Certification Authorities (CAs) for incoming
> 519	             connections.
>=20
> 521	          +  Certificate validation MUST include the verification r=
ules
> 522	             as per [RFC5280].
>=20
> 524	          +  PCEPS implementations SHOULD incorporate revocation me=
thods
> 525	             (CRL downloading, OCSP...) according to the trusted CA=

> 526	             policies.
>=20
> 528	          +  Implementations SHOULD indicate their trusted CAs.  Fo=
r TLS
> 529	             1.2, this is done using [RFC5246], Section 7.4.4,
> 530	             "certificate_authorities" (server side) and [RFC6066],=

> 531	             Section 6 "Trusted CA Indication" (client side).
>=20
> 533	          +  Implementations MUST follow the rules and guidelines f=
or
> 534	             peer validation as defined in [RFC6125].  If an expect=
ed
> 535	             DNS name or IP address for the peer is configured, the=
n the
> 536	             implementations MUST check them against the values in =
the
> 537	             presented certificate.  The DNS names and the IP addre=
sses
> 538	             can be contained in the CN-ID [RFC6125] (Common Name
> 539	             Identifier) or the subjectAltName entries.  For
> 540	             verification, only one of these entries is considered.=
  The
> 541	             following precedence applies: for DNS name validation,=
 DNS-
> 542	             ID [RFC6125] has precedence over CN-ID; for IP address=

> 543	             validation, subjectAltName:iPAddr has precedence over =
CN-
> 544	             ID.
>=20
> 546	          +  Implementations MAY allow the configuration of a set o=
f
> 547	             additional properties of the certificate to check for =
a
> 548	             peer's authorization to communicate (e.g., a set of al=
lowed
> 549	             values in URI-ID [RFC6125] or a set of allowed X509v3
> 550	             Certificate Policies).  The definition of these proper=
ties
> 551	             are out of scope of this document.
>=20
> 553	       *  TLS with X.509 certificates using certificate fingerprint=
s:
> 554	          Implementations MUST allow the configuration of a list of=

> 555	          certificates that are trusted to identify peers, identifi=
ed
> 556	          via fingerprint of the Distinguished Encoding Rules (DER)=

> 557	          encoded certificate octets.  Implementations MUST support=

> 558	          SHA-256 as defined by [SHS] as the hash algorithm for the=

> 559	          fingerprint, but a later revision may demand support for =
a
> 560	          stronger hash function.
>=20
> 562	   3.  Start exchanging PCEP messages.
>=20
> 564	       *  Once the TLS connection has been successfully established=
, the
> 565	          PCEP speaker MUST start the OpenWait timer [RFC5440], aft=
er
> 566	          the expiration of which, if no Open message has been rece=
ived,
> 567	          it sends a PCErr message and releases the TCP/TLS connect=
ion.
>=20
> 569	3.5.  Peer Identity
>=20
> 571	   Depending on the peer authentication method in use, PCEPS suppor=
ts
> 572	   different operation modes to establish peer's identity and wheth=
er it
> 573	   is entitled to perform requests or can be considered authoritati=
ve in
> 574	   its replies.  PCEPS implementations SHOULD provide mechanisms fo=
r
> 575	   associating peer identities with different levels of access and/=
or
> 576	   authoritativeness, and they MUST provide a mechanism for establi=
shing
> 577	   a default level for properly identified peers.  Any connection
> 578	   established with a peer that cannot be properly identified SHALL=
 be
> 579	   terminated before any PCEP exchange takes place.
>=20
> 581	   In TLS-X.509 mode using fingerprints, a peer is uniquely identif=
ied
> 582	   by the fingerprint of the presented certificate.
>=20
> 584	   There are numerous trust models in PKIX environments, and it is
> 585	   beyond the scope of this document to define how a particular
> 586	   deployment determines whether a peer is trustworthy.  Implementa=
tions
> 587	   that want to support a wide variety of trust models should expos=
e as
> 588	   many details of the presented certificate to the administrator a=
s
> 589	   possible so that the trust model can be implemented by the
> 590	   administrator.  At least the following parameters of the X.509
> 591	   certificate SHOULD be exposed:
>=20
> 593	   o  Peer's IP address
>=20
> 595	   o  Peer's fully qualified domain name (FQDN)
>=20
> 597	   o  Certificate Fingerprint
>=20
> 599	   o  Issuer
>=20
> 601	   o  Subject
>=20
> 603	   o  All X509v3 Extended Key Usage
>=20
> 605	   o  All X509v3 Subject Alternative Name
>=20
> 607	   o  All X509v3 Certificate Policies
> 608	   Note that the remote IP address used for the TCP session
> 609	   establishment is also exposed.
>=20
> 611	   [I-D.ietf-pce-stateful-sync-optimizations] specify a Speaker Ent=
ity
> 612	   Identifier TLV (SPEAKER-ENTITY-ID), as an optional TLV that is
> 613	   included in the OPEN Object.  It contains a unique identifier fo=
r the
> 614	   node that does not change during the lifetime of the PCEP speake=
r.
> 615	   An implementation would thus expose the speaker entity identifie=
r as
> 616	   part of the X509v3 certificate's subjectAltName:otherName, so th=
at an
> 617	   implementation could use this identifier for the peer identifica=
tion
> 618	   trust model.
>=20
> 620	   In addition, a PCC MAY apply the procedures described in [RFC669=
8]
> 621	   DNS-Based Authentication of Named Entities (DANE) to verify its =
peer
> 622	   identity when using DNS discovery.  See section Section 4.1 for
> 623	   further details.
>=20
> 625	3.6.  Connection Establishment Failure
>=20
> 627	   In case the initial TLS negotiation or the peer identity check f=
ails,
> 628	   according to the procedures listed in this document, both peers
> 629	   SHOULD immediately close the connection.
>=20
> 631	   The initiator SHOULD follow the procedure listed in [RFC5440] to=

> 632	   retry session setup as per the exponential back-off session
> 633	   establishment retry procedure.
>=20
> 635	4.  Discovery Mechanisms
>=20
> 637	   This document does not specify any discovery mechanism for suppo=
rt of
> 638	   PCEPS.  Other documents, [I-D.wu-pce-discovery-pceps-support] an=
d
> 639	   [I-D.wu-pce-dns-pce-discovery] have made proposals:
>=20
> 641	   o  A PCE can advertise its capability to support PCEPS using the=

> 642	      IGP's advertisement mechanism of the PCE discovery informatio=
n.
> 643	      The PCE-CAP-FLAGS sub-TLV is an optional sub-TLV used to adve=
rtise
> 644	      PCE capabilities.  It is present within the PCE Discovery (PC=
ED)
> 645	      sub-TLV carried by OSPF or IS-IS.  [RFC5088] and [RFC5089] pr=
ovide
> 646	      the description and processing rules for this sub-TLV when ca=
rried
> 647	      within OSPF and IS-IS, respectively.  PCE capability bits are=

> 648	      defined in [RFC5088].  A new capability flag bit for the PCE-=
CAP-
> 649	      FLAGS sub-TLV that can be announced as an attribute to distri=
bute
> 650	      PCEP security support information is proposed in
> 651	      [I-D.wu-pce-discovery-pceps-support].
>=20
> 653	   o  A PCE can advertise its capability to support PCEPS using the=
 DNS
> 654	      [I-D.wu-pce-dns-pce-discovery] by identifying the support of =
TLS.
>=20
> 656	4.1.  DANE Applicability
>=20
> 658	   DANE [RFC6698] defines a secure method to associate the certific=
ate
> 659	   that is obtained from a TLS server with a domain name using DNS,=

> 660	   i.e., using the TLSA DNS resource record (RR) to associate a TLS=

> 661	   server certificate or public key with the domain name where the
> 662	   record is found, thus forming a "TLSA certificate association". =
 The
> 663	   DNS information needs to be protected by DNS Security (DNSSEC). =
 A
> 664	   PCC willing to apply DANE to verify server identity MUST conform=
 to
> 665	   the rules defined in section 4 of [RFC6698].  The implementation=
 MUST
> 666	   support Service certificate constraint (TLSA Certificate Usages =
type
> 667	   1) with Matching type 2 (SHA2-256) as described in
> 668	   [RFC6698][RFC7671].  The server's domain name must be authorized=

> 669	   separately, as TLSA does not provide any useful authorization
> 670	   guarantees.
>=20
> 672	5.  Backward Compatibility
>=20
> 674	   The procedures described in this document define a security cont=
ainer
> 675	   for the transport of PCEP requests and replies carried by a TLS
> 676	   connection initiated by means of a specific extended message
> 677	   (StartTLS) that does not interfere with PCEP speaker implementat=
ions
> 678	   not supporting it.
>=20
> 680	   A PCC that does not support PCEPS will send Open message as the =
first
> 681	   message on TCP establishment.  A PCE that supports PCEPS only, w=
ill
> 682	   send StartTLS message on TCP establishment.  On receiving StartT=
LS
> 683	   message, PCC would consider it as an error and behave according =
to
> 684	   the existing error mechanism of [RFC5440] and send PCErr message=
 with
> 685	   Error-Type 1 (PCEP session establishment failure) and Error-Valu=
e 1
> 686	   (reception of an invalid Open message or a non Open message) and=

> 687	   close the session.
>=20
> 689	   A PCC that support PCEPS will send StartTLS message as the first=

> 690	   message on TCP establishment.  A PCE that does not supports PCEP=
S,
> 691	   would consider receiving StartTLS message as an error and respon=
d
> 692	   with PCErr message (with Error-Type 1 and Error-Value 1) and clo=
se
> 693	   the session.
>=20
> 695	   If a StartTLS message is received at any other time by a PCEP sp=
eaker
> 696	   that does not implement PCEPS, it would consider it as an unknow=
n
> 697	   message and would behave according to the existing error mechani=
sm of
> 698	   [RFC5440] and send PCErr message with Error-Type 2 (Capability n=
ot
> 699	   supported) and close the session.
>=20
> 701	   An existing PCEP session cannot be upgraded to PCEPS, the sessio=
n
> 702	   needs to be terminated and reestablished as per the procedure
> 703	   described in this document.  During the incremental upgrade, the=
 PCEP
> 704	   speaker SHOULD allow session establishment with and without TLS.=

> 705	   Once both PCEP speakers are upgraded to support PCEPS, the PCEP
> 706	   session is re-established with TLS, otherwise PCEP session witho=
ut
> 707	   TLS is setup.  A redundant PCE MAY also be used during the
> 708	   incremental deployment to take over the PCE undergoing upgrade. =
 Once
> 709	   the upgrade is completed, support for unsecured version SHOULD b=
e
> 710	   removed.
>=20
> 712	   A PCE that accepts connections with or without PCEPS, it would
> 713	   respond based on the message received from PCC.  A PCC that supp=
orts
> 714	   connection with or without PCEPS, it would first attempt to conn=
ect
> 715	   with PCEPS and in case of error, it MAY retry to establish conne=
ction
> 716	   without PCEPS.  For successful TLS operations with PCEP, both PC=
EP
> 717	   peers in the network would need to be upgraded to support this
> 718	   document.
>=20
> 720	   Note that, a PCEP implementation that support PCEPS would respon=
d
> 721	   with PCErr message with Error-Type set to [TBA2 by IANA] (PCEP
> 722	   StartTLS failure) and Error-value set to 2 if any other message =
is
> 723	   sent before StartTLS or Open.  If the sender of the invalid mess=
age
> 724	   is a PCEP implementation that does not support PCEPS, it will no=
t be
> 725	   able to understand this error.  A PCEPS implementation could als=
o
> 726	   send the PCErr message as per [RFC5440] with Error-Type "PCEP se=
ssion
> 727	   establishment failure" and Error-value "reception of an invalid =
Open
> 728	   message or a non Open message" before closing the session.
>=20
> 730	6.  IANA Considerations
>=20
> 732	6.1.  New PCEP Message
>=20
> 734	   IANA is requested to allocate new message types within the "PCEP=

> 735	   Messages" sub-registry of the PCEP Numbers registry, as follows:=

>=20
> 737	      Value  Description                             Reference
> 738	       TBA1  The Start TLS Message (StartTLS)        This document
>=20
> 740	6.2.  New Error-Values
>=20
> 742	   IANA is requested to allocate new Error Types and Error Values w=
ithin
> 743	   the " PCEP-ERROR Object Error Types and Values" sub-registry of =
the
> 744	   PCEP Numbers registry, as follows:
>=20
> 746	   Error-
> 747	   Type    Meaning               Error-value             Reference
>=20
> 749	   TBA2    PCEP StartTLS         0:Unassigned            This docum=
ent
> 750	           failure               1:Reception of          This docum=
ent
> 751	                                 StartTLS after
> 752	                                 any PCEP exchange
> 753	                                 2:Reception of          This docum=
ent
> 754	                                 any other message
> 755	                                 apart from StartTLS,
> 756	                                 Open or PCErr
> 757	                                 3:Failure, connection   This docum=
ent
> 758	                                 without TLS is not
> 759	                                 possible
> 760	                                 4:Failure, connection   This docum=
ent
> 761	                                 without TLS is
> 762	                                 possible
> 763	                                 5:No StartTLS message   This docum=
ent
> 764	                                 (nor PCErr/Open)
> 765	                                 before StartTLSWait
> 766	                                 timer expiry
>=20
> 768	7.  Security Considerations
>=20
> 770	   While the application of TLS satisfies the requirement on
> 771	   confidentiality as well as fine-grained, policy-based peer
> 772	   authentication, there are security threats that it cannot addres=
s.
> 773	   It may be advisable to apply additional protection measures, in
> 774	   particular in what relates to attacks specifically addressed to
> 775	   forging the TCP connection underpinning TLS, especially in the c=
ase
> 776	   of long-lived connections.  One of these measures is the applica=
tion
> 777	   of TCP-AO (TCP Authentication Option [RFC5925]), which is fully
> 778	   compatible with and deemed as complementary to TLS.  The mechani=
sms
> 779	   to configure the requirements to use TCP-AO and other lower-laye=
r
> 780	   protection measures with a particular peer are outside the scope=
 of
> 781	   this document.
>=20
> 783	   Since computational resources required by TLS handshake and
> 784	   ciphersuite are higher than unencrypted TCP, clients connecting =
to a
> 785	   PCEPS server can more easily create high load conditions and a
> 786	   malicious client might create a Denial-of-Service attack more ea=
sily.
>=20
> 788	   Some TLS ciphersuites only provide integrity validation of their=

> 789	   payload, and provide no encryption, such ciphersuites SHOULD NOT=
 be
> 790	   used by default.  Administrators MAY allow the usage of these
> 791	   ciphersuites after careful weighting of the risk of relevant int=
ernal
> 792	   data leakage, that can occur in such a case, as explicitly state=
d by
> 793	   [RFC6952].
>=20
> 795	   When using certificate fingerprints to identify PCEPS peers, any=
 two
> 796	   certificates that produce the same hash value will be considered=
 the
> 797	   same peer.  Therefore, it is important to make sure that the has=
h
> 798	   function used is cryptographically uncompromised, so that attack=
ers
> 799	   are very unlikely to be able to produce a hash collision with a
> 800	   certificate of their choice.  This document mandates support for=

> 801	   SHA-256 as defined by [SHS], but a later revision may demand sup=
port
> 802	   for stronger functions if suitable attacks on it are known.
>=20
> 804	   PCEPS implementations that continue to accept connections withou=
t TLS
> 805	   are susceptible to downgrade attacks as described in [RFC7457]. =
 An
> 806	   attacker could attempt to remove the use of StartTLS message tha=
t
> 807	   request the use of TLS as it pass on the wire in clear, and furt=
her
> 808	   inject a PCErr message that suggest to attempt PCEP connection
> 809	   without TLS.
>=20
> 811	   The guidance given in [RFC7525] SHOULD be followed to avoid atta=
cks
> 812	   on TLS.
>=20
> 814	8.  Manageability Considerations
>=20
> 816	   All manageability requirements and considerations listed in [RFC=
5440]
> 817	   apply to PCEP protocol extensions defined in this document.  In
> 818	   addition, requirements and considerations listed in this section=

> 819	   apply.
>=20
> 821	8.1.  Control of Function and Policy
>=20
> 823	   A PCE or PCC implementation SHOULD allow configuring the PCEP
> 824	   security via TLS capabilities as described in this document.
>=20
> 826	   A PCE or PCC implementation supporting PCEP security via TLS MUS=
T
> 827	   support general TLS configuration as per [RFC5246].  At least th=
e
> 828	   configuration of one of the trust models and its corresponding
> 829	   parameters, as described in Section 3.4 and Section 3.5, MUST be=

> 830	   supported by the implementation.
>=20
> 832	   A PCEP implementation SHOULD allow configuring the StartTLSWait =
timer
> 833	   value.
>=20
> 835	   PCEPS implementations MAY provide an option to allow the operato=
r to
> 836	   manually override strict TLS configuration and allow unsecure
> 837	   connections.  Execution of this override SHOULD trigger a warnin=
g
> 838	   about the security implications of permitting unsecure connectio=
ns.
>=20
> 840	   Further, the operator needs to develop suitable security policie=
s
> 841	   around PCEP within his network.  The PCEP peers SHOULD provide w=
ays
> 842	   for the operator to complete the following tasks in regards to a=
 PCEP
> 843	   session:
>=20
> 845	   o  Determine if a session is protected via PCEPS.
>=20
> 847	   o  Determine the version of TLS, the mechanism used for
> 848	      authentication, and the ciphersuite in use.
>=20
> 850	   o  Determine if the certificate could not be verified, and the r=
eason
> 851	      for this circumstance.
>=20
> 853	   o  Inspect the certificate offered by the PCEP peer.
>=20
> 855	   o  Be warned if StartTLS procedure fails for the PCEP peers, tha=
t are
> 856	      known to support PCEPS via configurations or capability
> 857	      advertisements.
>=20
> 859	8.2.  Information and Data Models
>=20
> 861	   The PCEP MIB module is defined in [RFC7420].  The MIB module cou=
ld be
> 862	   extended to include the ability to view the PCEPS capability, TL=
S
> 863	   related information as well as TLS status for each PCEP peer.
>=20
> 865	   Further, to allow the operator to configure the PCEPS capability=
 and
> 866	   various TLS related parameters as well as to view the current TL=
S
> 867	   status for a PCEP session, the PCEP YANG module
> 868	   [I-D.ietf-pce-pcep-yang] is extended to include TLS related
> 869	   information.
>=20
> 871	8.3.  Liveness Detection and Monitoring
>=20
> 873	   Mechanisms defined in this document do not imply any new livenes=
s
> 874	   detection and monitoring requirements in addition to those alrea=
dy
> 875	   listed in [RFC5440] and [RFC5246].
>=20
> 877	8.4.  Verifying Correct Operations
>=20
> 879	   A PCEPS implementation SHOULD log error events and provide PCEPS=

> 880	   failure statistics with reasons.
>=20
> 882	8.5.  Requirements on Other Protocols
>=20
> 884	   Mechanisms defined in this document do not imply any new require=
ments
> 885	   on other protocols.  Note that, Section 4 list possible discover=
y
> 886	   mechanism for support of PCEPS.
>=20
> 888	8.6.  Impact on Network Operation
>=20
> 890	   Mechanisms defined in this document do not have any significant
> 891	   impact on network operations in addition to those already listed=
 in
> 892	   [RFC5440], and the policy and management implications discussed
> 893	   above.
>=20
> 895	9.  Acknowledgements
>=20
> 897	   This specification relies on the analysis and profiling of TLS
> 898	   included in [RFC6614] and the procedures described for the START=
TLS
> 899	   command in [RFC4513].
>=20
> 901	   We would like to thank Joe Touch for his suggestions and support=

> 902	   regarding the StartTLS mechanisms.
>=20
> 904	   Thanks to Daniel King for reminding the authors about manageabil=
ity
> 905	   considerations.
>=20
> 907	   Thanks to Cyril Margaria for shepherding this document.
>=20
> 909	   Thanks to David Mandelberg for early SECDIR review comments as w=
ell
> 910	   as re-reviewing during IETF last call.
>=20
> 912	   Thanks to Dan Frost for the RTGDIR review and comments.
>=20
> 914	   Thanks to Dale Worley for the Gen-ART review and comments.
>=20
> 916	   Also thanks to Tianran Zhou for OPSDIR review.
>=20
> 918	   Thanks to Deborah Brungard for being the responsible AD and guid=
ing
> 919	   the authors as needed.
>=20
> 921	   Thanks to Mirja Kuhlewind, Eric Rescorla, Warren Kumari, Kathlee=
n
> 922	   Moriarty, Suresh Krishnan, Ben Campbell and Alexey Melnikov for =
the
> 923	   IESG review and comments.
>=20
> 925	10.  References
>=20
> 927	10.1.  Normative References
>=20
> 929	   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
> 930	              Requirement Levels", BCP 14, RFC 2119,
> 931	              DOI 10.17487/RFC2119, March 1997,
> 932	              <https://www.rfc-editor.org/info/rfc2119>.
>=20
> 934	   [RFC5246]  Dierks, T. and E. Rescorla, "The Transport Layer Secu=
rity
> 935	              (TLS) Protocol Version 1.2", RFC 5246,
> 936	              DOI 10.17487/RFC5246, August 2008,
> 937	              <https://www.rfc-editor.org/info/rfc5246>.
>=20
> 939	   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
> 940	              Housley, R., and W. Polk, "Internet X.509 Public Key
> 941	              Infrastructure Certificate and Certificate Revocation=
 List
> 942	              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2=
008,
> 943	              <https://www.rfc-editor.org/info/rfc5280>.
>=20
> 945	   [RFC5440]  Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computa=
tion
> 946	              Element (PCE) Communication Protocol (PCEP)", RFC 544=
0,
> 947	              DOI 10.17487/RFC5440, March 2009,
> 948	              <https://www.rfc-editor.org/info/rfc5440>.
>=20
> 950	   [RFC6066]  Eastlake 3rd, D., "Transport Layer Security (TLS)
> 951	              Extensions: Extension Definitions", RFC 6066,
> 952	              DOI 10.17487/RFC6066, January 2011,
> 953	              <https://www.rfc-editor.org/info/rfc6066>.
>=20
> 955	   [RFC6125]  Saint-Andre, P. and J. Hodges, "Representation and
> 956	              Verification of Domain-Based Application Service Iden=
tity
> 957	              within Internet Public Key Infrastructure Using X.509=

> 958	              (PKIX) Certificates in the Context of Transport Layer=

> 959	              Security (TLS)", RFC 6125, DOI 10.17487/RFC6125, Marc=
h
> 960	              2011, <https://www.rfc-editor.org/info/rfc6125>.
>=20
> 962	   [RFC6698]  Hoffman, P. and J. Schlyter, "The DNS-Based Authentic=
ation
> 963	              of Named Entities (DANE) Transport Layer Security (TL=
S)
> 964	              Protocol: TLSA", RFC 6698, DOI 10.17487/RFC6698, Augu=
st
> 965	              2012, <https://www.rfc-editor.org/info/rfc6698>.
>=20
> 967	   [RFC7525]  Sheffer, Y., Holz, R., and P. Saint-Andre,
> 968	              "Recommendations for Secure Use of Transport Layer
> 969	              Security (TLS) and Datagram Transport Layer Security
> 970	              (DTLS)", BCP 195, RFC 7525, DOI 10.17487/RFC7525, May=

> 971	              2015, <https://www.rfc-editor.org/info/rfc7525>.
>=20
> 973	   [RFC7671]  Dukhovni, V. and W. Hardaker, "The DNS-Based
> 974	              Authentication of Named Entities (DANE) Protocol: Upd=
ates
> 975	              and Operational Guidance", RFC 7671, DOI 10.17487/RFC=
7671,
> 976	              October 2015, <https://www.rfc-editor.org/info/rfc767=
1>.
>=20
> 978	   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RF=
C
> 979	              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC81=
74,
> 980	              May 2017, <https://www.rfc-editor.org/info/rfc8174>.
>=20
> 982	   [SHS]      National Institute of Standards and Technology, "Secu=
re
> 983	              Hash Standard (SHS), FIPS PUB 180-4",
> 984	              DOI 10.6028/NIST.FIPS.180-4, August 2015,
> 985	              <http://nvlpubs.nist.gov/nistpubs/FIPS/
> 986	              NIST.FIPS.180-4.pdf>.
>=20
> 988	10.2.  Informative References
>=20
> 990	   [RFC4492]  Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., a=
nd B.
> 991	              Moeller, "Elliptic Curve Cryptography (ECC) Cipher Su=
ites
> 992	              for Transport Layer Security (TLS)", RFC 4492,
> 993	              DOI 10.17487/RFC4492, May 2006,
> 994	              <https://www.rfc-editor.org/info/rfc4492>.
>=20
> 996	   [RFC4513]  Harrison, R., Ed., "Lightweight Directory Access Prot=
ocol
> 997	              (LDAP): Authentication Methods and Security Mechanism=
s",
> 998	              RFC 4513, DOI 10.17487/RFC4513, June 2006,
> 999	              <https://www.rfc-editor.org/info/rfc4513>.
>=20
> 1001	   [RFC5088]  Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., a=
nd R.
> 1002	              Zhang, "OSPF Protocol Extensions for Path Computatio=
n
> 1003	              Element (PCE) Discovery", RFC 5088, DOI 10.17487/RFC=
5088,
> 1004	              January 2008, <https://www.rfc-editor.org/info/rfc50=
88>.
>=20
> 1006	   [RFC5089]  Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., a=
nd R.
> 1007	              Zhang, "IS-IS Protocol Extensions for Path Computati=
on
> 1008	              Element (PCE) Discovery", RFC 5089, DOI 10.17487/RFC=
5089,
> 1009	              January 2008, <https://www.rfc-editor.org/info/rfc50=
89>.
>=20
> 1011	   [RFC5925]  Touch, J., Mankin, A., and R. Bonica, "The TCP
> 1012	              Authentication Option", RFC 5925, DOI 10.17487/RFC59=
25,
> 1013	              June 2010, <https://www.rfc-editor.org/info/rfc5925>=
=2E
>=20
> 1015	   [RFC6460]  Salter, M. and R. Housley, "Suite B Profile for Tran=
sport
> 1016	              Layer Security (TLS)", RFC 6460, DOI 10.17487/RFC646=
0,
> 1017	              January 2012, <https://www.rfc-editor.org/info/rfc64=
60>.
>=20
> 1019	   [RFC6614]  Winter, S., McCauley, M., Venaas, S., and K. Wiereng=
a,
> 1020	              "Transport Layer Security (TLS) Encryption for RADIU=
S",
> 1021	              RFC 6614, DOI 10.17487/RFC6614, May 2012,
> 1022	              <https://www.rfc-editor.org/info/rfc6614>.
>=20
> 1024	   [RFC6952]  Jethanandani, M., Patel, K., and L. Zheng, "Analysis=
 of
> 1025	              BGP, LDP, PCEP, and MSDP Issues According to the Key=
ing
> 1026	              and Authentication for Routing Protocols (KARP) Desi=
gn
> 1027	              Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013,
> 1028	              <https://www.rfc-editor.org/info/rfc6952>.
>=20
> 1030	   [RFC7420]  Koushik, A., Stephan, E., Zhao, Q., King, D., and J.=

> 1031	              Hardwick, "Path Computation Element Communication Pr=
otocol
> 1032	              (PCEP) Management Information Base (MIB) Module",
> 1033	              RFC 7420, DOI 10.17487/RFC7420, December 2014,
> 1034	              <https://www.rfc-editor.org/info/rfc7420>.
>=20
> 1036	   [RFC7457]  Sheffer, Y., Holz, R., and P. Saint-Andre, "Summariz=
ing
> 1037	              Known Attacks on Transport Layer Security (TLS) and
> 1038	              Datagram TLS (DTLS)", RFC 7457, DOI 10.17487/RFC7457=
,
> 1039	              February 2015, <https://www.rfc-editor.org/info/rfc7=
457>.
>=20
> 1041	   [I-D.ietf-pce-stateful-sync-optimizations]
> 1042	              Crabbe, E., Minei, I., Medved, J., Varga, R., Zhang,=
 X.,
> 1043	              and D. Dhody, "Optimizations of Label Switched Path =
State
> 1044	              Synchronization Procedures for a Stateful PCE", draf=
t-
> 1045	              ietf-pce-stateful-sync-optimizations-10 (work in
> 1046	              progress), March 2017.
>=20
> 1048	   [I-D.ietf-pce-pcep-yang]
> 1049	              Dhody, D., Hardwick, J., Beeram, V., and j.
> 1050	              jefftant@gmail.com, "A YANG Data Model for Path
> 1051	              Computation Element Communications Protocol (PCEP)",=

> 1052	              draft-ietf-pce-pcep-yang-05 (work in progress), June=
 2017.
>=20
> 1054	   [I-D.wu-pce-dns-pce-discovery]
> 1055	              Wu, Q., Dhody, D., King, D., Lopez, D., and J. Tants=
ura,
> 1056	              "Path Computation Element (PCE) Discovery using Doma=
in
> 1057	              Name System(DNS)", draft-wu-pce-dns-pce-discovery-10=
 (work
> 1058	              in progress), March 2017.
>=20
> 1060	   [I-D.wu-pce-discovery-pceps-support]
> 1061	              Lopez, D., Wu, Q., Dhody, D., and D. King, "IGP exte=
nsion
> 1062	              for PCEP security capability support in the PCE
> 1063	              discovery", draft-wu-pce-discovery-pceps-support-07 =
(work
> 1064	              in progress), March 2017.
>=20
> 1066	Authors' Addresses
>=20
> 1068	   Diego R. Lopez
> 1069	   Telefonica I+D
> 1070	   Don Ramon de la Cruz, 82
> 1071	   Madrid  28006
> 1072	   Spain
>=20
> 1074	   Phone: +34 913 129 041
> 1075	   EMail: diego.r.lopez@telefonica.com
> 1076	   Oscar Gonzalez de Dios
> 1077	   Telefonica I+D
> 1078	   Don Ramon de la Cruz, 82
> 1079	   Madrid  28006
> 1080	   Spain
>=20
> 1082	   Phone: +34 913 129 041
> 1083	   EMail: oscar.gonzalezdedios@telefonica.com
>=20
> 1085	   Qin Wu
> 1086	   Huawei
> 1087	   101 Software Avenue, Yuhua District
> 1088	   Nanjing, Jiangsu  210012
> 1089	   China
>=20
> 1091	   EMail: sunseawq@huawei.com
>=20
> 1093	   Dhruv Dhody
> 1094	   Huawei
> 1095	   Divyashree Techno Park, Whitefield
> 1096	   Bangalore, KA  560066
> 1097	   India
>=20
> 1099	   EMail: dhruv.ietf@gmail.com
>=20
>=20
>=20
>=20
>=20
>=20
>=20
>=20
> On Mon, Sep 4, 2017 at 8:31 PM, Henrik Levkowetz <henrik@levkowetz.com>=

> wrote:
>=20
>>
>> Hi,
>>
>> This is an automatic notification about a new xml2rfc release,
>> v2.8.0, generated when running the mkrelease script.
>>
>> Release notes:
>>
>> xml2rfc (2.8.0) ietf; urgency=3Dlow
>>   This is a small feature release which changes URLs in boilerplate to=

>>   use https: instead of http:.  There are also some bugfixes.
>>   * Include notes when doing index processing.  Fixes issue #335.
>>   * Include erefs with text equal to the URL in the URIs section.  See=

>>     issue #334.
>>   * Changed the use of http: to https: in many places.  In the generat=
ion
>>     of RFCs, the code uses a switchover date of August 21, 2017 when
>> deciding
>>     whether to insert http: or https: URLs.  In practice, this means t=
hat
>> RFCs
>>     with a date of September 2017 or later will get https:.  Also fixe=
d URL
>>     line-breaking prevention to apply to https: URLS.  Fixes issue #33=
3.
>>   * In urlkeep(), prevent breaking also for https:, not only http: URL=
s
>>
>> The new version is available through SVN checkout, with
>>   'svn checkout http://svn.tools.ietf.org/svn/tools/xml2rfc/tags/cli/2=
=2E8.0
>> '
>>
>> Regards,
>>
>>         Henrik
>>         (via the mkrelease script)
>>
>> _______________________________________________
>> xml2rfc mailing list
>> xml2rfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/xml2rfc
>>
>=20


--DDgGFIVWIP295RsX47gLiNT5qn8VpAq2H--

--sa0HblPh5IIixmnm2f6edWaE0rTq0AT6B
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=yppq
-----END PGP SIGNATURE-----

--sa0HblPh5IIixmnm2f6edWaE0rTq0AT6B--


From nobody Mon Sep 11 08:18:12 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECC781330CC; Mon, 11 Sep 2017 08:18:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 03R4AET1rc8O; Mon, 11 Sep 2017 08:18:08 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45AC21330C8; Mon, 11 Sep 2017 08:18:08 -0700 (PDT)
Received: from henrik by zinfandel.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1drQTE-000472-Ib; Mon, 11 Sep 2017 08:17:59 -0700
To: codesprints@ietf.org, iesg@ietf.org, wgchairs@ietf.org
Message-Id: <E1drQTE-000472-Ib@zinfandel.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Mon, 11 Sep 2017 08:17:56 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, henrik@levkowetz.com, iesg@ietf.org,  wgchairs@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/u7Vc1u5vSkKxZmvVkBwRVW_S2aM>
Subject: [codesprints] New datatracker release: v6.61.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Sep 2017 15:18:10 -0000

Hi,

This is an automatic notification about a new datatracker release, 
v6.61.0, generated when running the mkrelease script.

Release notes:

ietfdb (6.61.0) ietf; urgency=medium

  This is a small feature release which adds directorate mail aliases,
  annoncement tool refactoring, improved handling of Yang validation
  messages and xml submission processing messages.  Details:

  * Merged in [14106] from rcross@amsl.com:
    Add support for directorates to generate-wg-aliases.  Fixes #2363.   

  * Merged in [14104] from rcross@amsl.com:
    Update secretariat admin permissions.  Change AnnouncementFrom.address 
    to CharField because full emails, with real name, fail EmailField 
    validation. Includes migration.  

  * Merged in [14103] from rcross@amsl.com:
    Change announcement tool access function to use data from 
    AnnouncementFrom objects.  Fixes #2362.   

  * Tweaked the submission checker shell invocation code to deal with 
    command lines starting with environment variable settings.

  * Changed the message shown when xml file parsing fails during draft 
    submission to include the actual error message from the xml parser.  Fixes 
    issue #2353.

  * Fixed another issue with the meeting materials urls, related to the 
    href() normalisation work.

  * Changed the handling of yang validation otput to capture errors 
    messages also when command the exit code is zero.

 -- Henrik Levkowetz <henrik@levkowetz.com>  11 Sep 2017 07:53:19 -0700

The new version is available for installation through SVN checkout, with
  'svn checkout https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.61.0'

For development, copy the new development version instead:
  'svn copy https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.61.1.dev0' <YOURBRANCH>

Regards,

	Henrik
	(via the mkrelease script)


From nobody Sun Sep 17 08:52:29 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E75E01331F2; Sun, 17 Sep 2017 08:52:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dEC1yTklgE6w; Sun, 17 Sep 2017 08:52:15 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A87F51252BA; Sun, 17 Sep 2017 08:52:15 -0700 (PDT)
Received: from henrik by zinfandel.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dtbri-0005EB-QN; Sun, 17 Sep 2017 08:52:14 -0700
To: codesprints@ietf.org, iesg@ietf.org, wgchairs@ietf.org
Message-Id: <E1dtbri-0005EB-QN@zinfandel.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Sun, 17 Sep 2017 08:52:14 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, henrik@levkowetz.com, iesg@ietf.org,  wgchairs@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/arYiS3zmY3qapuKgkdtZ9mVEXmw>
Subject: [codesprints] New datatracker release: v6.62.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Sep 2017 15:52:21 -0000

Hi,

This is an automatic notification about a new datatracker release, 
v6.62.0, generated when running the mkrelease script.

Release notes:

ietfdb (6.62.0) ietf; urgency=medium

  **API for submission automation**

  This release introduces an API suitable for automation of draft submission,
  as proposed by martin.thomson@gmail.com and encouraged by others.
  Instructions are available at https://datatracker.ietf.org/api/submit.  The
  interface accepts only xml uploads which can be processed on the server, and
  requires the user to have a datatracker account. A successful submit still
  requires the same email confirmation roundtrip as submissions done through
  the regular submission tool.  The release also contains some bugfixes.

  From the commit log:

  * Added ietf.utils.text.unidecode_name() and replaced various uses of 
    unidecode() with it, in order to normalize the generation of ascii versions 
    of names, to avoid different practices in space stripping and space 
    normalization in different parts of the code.

  * Added submit API instructions and fixed a bug in error handling for the 
    submission validity checkers.

  * Added an API for draft submission, at /api/submit.  Added an urls.py file
    under api/ to hold api urls, and moved those from ietf/urls.py.
    Refactored out many parts of the regular submission forms and functions in
    submit/forms.py and submit/views.py in order to re-use the appropriate
    parts for the submission API.  Moved support functions to submit/utils.py.
    Added a new validation errors for missing docName in xml-based
    submissions.  Updated the submission test document templates to use insert
    additional values.  Added failure and success test cases for automated API
    submissions, and refactored some test utility functions.

  * Tweaked Document.relations_that_doc() to accept unicode relationship 
    strings, in order to let it be called from modules importing  
    __future__.unicode_literals.

  * Tweaked the test utility function create_person() to create ascii-only
    .ascii fields, which it did not do before.

  * Modified the mailtrigger clean_duplicates to reduce email address list 
    entries with the same address but different names to one instance, and use 
    consistent unicode names for authors if known.

  * Fixed another place where updated logic is needed to get the current
    meeting when we have multiple future meetings.  Fixes issue #2371.

  * Updated meeting.helpers.get_meeting() to deal with multiple future 
    meetings the same way get_ietf_meeting() does.

 -- Henrik Levkowetz <henrik@levkowetz.com>  17 Sep 2017 06:05:04 -0700

The new version is available for installation through SVN checkout, with
  'svn checkout https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.62.0'

For development, copy the new development version instead:
  'svn copy https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.62.1.dev0' <YOURBRANCH>

Regards,

	Henrik
	(via the mkrelease script)


From nobody Mon Sep 18 05:50:00 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 228A3129A89; Mon, 18 Sep 2017 05:49:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vFD5BXU9vp3R; Mon, 18 Sep 2017 05:49:56 -0700 (PDT)
Received: from durif.tools.ietf.org (durif.tools.ietf.org [IPv6:2001:1900:3001:11::3d]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E82DF124F57; Mon, 18 Sep 2017 05:49:56 -0700 (PDT)
Received: from henrik by durif.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dtvUq-000106-SM; Mon, 18 Sep 2017 05:49:56 -0700
To: xml2rfc@ietf.org
Cc: codesprints@ietf.org, rfc-markdown@ietf.org
Message-Id: <E1dtvUq-000106-SM@durif.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Mon, 18 Sep 2017 05:49:56 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, rfc-markdown@ietf.org, xml2rfc@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on durif.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/5LVcqZ9Tiezkz7Dw9KXdXuIp7wo>
Subject: [codesprints] New xml2rfc release: v2.8.1
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Sep 2017 12:49:58 -0000

Hi,

This is an automatic notification about a new xml2rfc release, 
v2.8.1, generated when running the mkrelease script.

Release notes:

xml2rfc (2.8.1) ietf; urgency=low
  This release improves the v2 to v3 conversion of <artwork/> elements
  which contains <CODE BEGINS>; these are now converted to <sourcecode/>
  elements.

The preferred way to install xml2rfc is by doing 'pip install xml2rfc',
and 'pip install --upgrade xml2rfc' to upgrade.

The new version is also available through SVN checkout, with
  'svn checkout http://svn.tools.ietf.org/svn/tools/xml2rfc/tags/cli/2.8.1'

Regards,

	Henrik
	(via the mkrelease script)


From nobody Wed Sep 20 14:13:10 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 785CF134212; Wed, 20 Sep 2017 14:13:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lYwah0zk8s4C; Wed, 20 Sep 2017 14:13:01 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29F3D1320D8; Wed, 20 Sep 2017 14:13:01 -0700 (PDT)
Received: from henrik by zinfandel.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dumIm-0002a7-Gp; Wed, 20 Sep 2017 14:13:00 -0700
To: codesprints@ietf.org, iesg@ietf.org, wgchairs@ietf.org
Message-Id: <E1dumIm-0002a7-Gp@zinfandel.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Wed, 20 Sep 2017 14:13:00 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, henrik@levkowetz.com, iesg@ietf.org,  wgchairs@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/9ZRztOxzPXOXvOpjF0LywkzNuAw>
Subject: [codesprints] New datatracker release: v6.62.1
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Sep 2017 21:13:02 -0000

Hi,

This is an automatic notification about a new datatracker release, 
v6.62.1, generated when running the mkrelease script.

Release notes:

ietfdb (6.62.1) ietf; urgency=medium

  This is a bugfix release which also brings in a utility script to add
  document object for some old drafts that are currently missing from
  the database.  Details:

  * Merged in [14138] from rjsparks@nostrum.com:
    Added a script to process the id-archive and add Document objects for
    drafts that are currently missing from the datatracker. Fixes #1316.  

  * Moved unidecode_name from utils.text to person.name.

  * Modified UserFactory to use a new locale for each new user, instead of the
    same locale for a whole test run.  This (almost) ensures the exercise of
    code to deal with non-ascii names, something which would not happen if a
    locale with ascii names was chosen at the start of a run.

  * Modified name.initials() to not use non-word characters as initials.

  * Modified unidecode_name() to do more normalization, to conform to the
    conventions used in internet-drafts.

  * Added saving of the factory-boy random state in order to be able to re-run
    a test suite with the same pseudo-random sequence as in a previous failed
    run.

  * Fixed an issue with email formatting in test_api_submit_ok().

  * Modified the draft author extraction code to deal better with names with
    embedded apostrophes.

  * Refined a test case which could fail incorrectly when PersonFactory
    produced multiple persons with the same name during a test run, using
    TestCase.assertMailboxContains().

  * Added a new TestCase assertion: assertMailboxContains(), to be able to
    better express some test cases.

  * Updated the PLAN

 -- Henrik Levkowetz <henrik@levkowetz.com>  20 Sep 2017 13:48:56 -0700

The new version is available for installation through SVN checkout, with
  'svn checkout https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.62.1'

For development, copy the new development version instead:
  'svn copy https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.62.2.dev0' <YOURBRANCH>

Regards,

	Henrik
	(via the mkrelease script)


From nobody Sat Sep 23 07:16:29 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0A3E132025; Sat, 23 Sep 2017 07:16:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gS30voE7FS12; Sat, 23 Sep 2017 07:16:20 -0700 (PDT)
Received: from durif.tools.ietf.org (durif.tools.ietf.org [IPv6:2001:1900:3001:11::3d]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C332312EC30; Sat, 23 Sep 2017 07:16:20 -0700 (PDT)
Received: from henrik by durif.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dvlEC-0006jC-Nk; Sat, 23 Sep 2017 07:16:20 -0700
To: xml2rfc@ietf.org
Cc: codesprints@ietf.org, rfc-markdown@ietf.org
Message-Id: <E1dvlEC-0006jC-Nk@durif.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Sat, 23 Sep 2017 07:16:20 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, rfc-markdown@ietf.org, xml2rfc@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on durif.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/73G5ozCV9qb9S0G_Xn_Exn0rk24>
Subject: [codesprints] New xml2rfc release: v2.8.2
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Sep 2017 14:16:22 -0000

Hi,

This is an automatic notification about a new xml2rfc release, 
v2.8.2, generated when running the mkrelease script.

Release notes:

xml2rfc (2.8.2) ietf; urgency=low
  * Modified the V2v3 conversion writer to work with generic lxml.etree 
    instances, and fixed a failure that could occur for hanging style lists 
    without hangText attributes.
  * Tweaked mkrelease to work without the old tools control files and tools 
    feeds being present.

The preferred way to install xml2rfc is by doing 'pip install xml2rfc',
and 'pip install --upgrade xml2rfc' to upgrade.

The new version is also available through SVN checkout, with
  'svn checkout http://svn.tools.ietf.org/svn/tools/xml2rfc/tags/cli/2.8.2'

Regards,

	Henrik
	(via the mkrelease script)


From nobody Thu Sep 28 02:34:17 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADF191345BB; Thu, 28 Sep 2017 02:34:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JhbIwzJ7eqSv; Thu, 28 Sep 2017 02:34:00 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AED31321A6; Thu, 28 Sep 2017 02:34:00 -0700 (PDT)
Received: from henrik by zinfandel.tools.ietf.org with local (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dxVCh-00089D-Ti; Thu, 28 Sep 2017 02:33:59 -0700
To: codesprints@ietf.org, iesg@ietf.org, wgchairs@ietf.org
Message-Id: <E1dxVCh-00089D-Ti@zinfandel.tools.ietf.org>
From: Henrik Levkowetz <henrik@levkowetz.com>
Date: Thu, 28 Sep 2017 02:33:59 -0700
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: codesprints@ietf.org, henrik@levkowetz.com, iesg@ietf.org,  wgchairs@ietf.org
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/fLpioHk-1s_WckIsLWXPyxqZ7ZM>
Subject: [codesprints] New datatracker release: v6.63.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Sep 2017 09:34:02 -0000

Hi,

This is an automatic notification about a new datatracker release, 
v6.63.0, generated when running the mkrelease script.

Release notes:

ietfdb (6.63.0) ietf; urgency=medium

  **Support for document-specific URL annotations**

  This release adds support for document-specific URL annotations; look
  for 'Additional URLs' on the draft status page.  These can be edited
  by the group chairs for group drafts and by the authors for individual
  drafts.  There are also some changes and enhancements related to the
  submission automation API and to the nomcom template and email handling.

  Commit log extract:

  * Changed the nomcom code to permit nomcom year interpolation in the 
    nomcom from-address and in nomcom templates.  Changed the nomcom 
    from-address setting to 'nomcom-chair-{year}@ietf.org'.  Added test
    code to verify that nomcom from-address contains the nomcom year.

  * Tweaked the submission search form to accept draft names which include 
    revision numbers.  Fixes issue #2380.

  * Added a cancel button to the submission confirmation page.  Fixes issue 
    #2349.

  * Removed the repeat of the error message in the HTTP reason string.  
    Fixes issue #2378.

  * Added 'Additional URLs' for documents, the same way we have them for
    groups.  This could be used to point to a document source repository, to
    extracted yang module files, document wikis, and other relevant resources.

  * Added migrations for document url model changes.  Updated the name 
    fixtures.  Added ability for individual draft authors to edit document urls.

  * Removed some unreachable code.

  * Another tweak to the draft author extraction code, to handle some name 
    transliterations using multiple leading grave accents.

 -- Henrik Levkowetz <henrik@levkowetz.com>  27 Sep 2017 08:33:16 -0700

The new version is available for installation through SVN checkout, with
  'svn checkout https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.63.0'

For development, copy the new development version instead:
  'svn copy https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.63.1.dev0' <YOURBRANCH>

Regards,

	Henrik
	(via the mkrelease script)


From nobody Thu Sep 28 07:16:04 2017
Return-Path: <mlarson@amsl.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2E5B133057; Thu, 28 Sep 2017 07:16:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yzN80e-L4NAt; Thu, 28 Sep 2017 07:16:01 -0700 (PDT)
Received: from mail.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 562931331D7; Thu, 28 Sep 2017 07:16:01 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id E376B1C4A2E; Thu, 28 Sep 2017 07:15:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t4x75tmNa6kM; Thu, 28 Sep 2017 07:15:19 -0700 (PDT)
Received: from [192.168.0.69] (50-89-234-39.res.bhn.net [50.89.234.39]) by c8a.amsl.com (Postfix) with ESMTPA id 683011C4A2A; Thu, 28 Sep 2017 07:15:19 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: Matt Larson <mlarson@amsl.com>
In-Reply-To: <E1dxVCh-00089D-Ti@zinfandel.tools.ietf.org>
Date: Thu, 28 Sep 2017 10:16:00 -0400
Cc: codesprints@ietf.org, iesg@ietf.org, wgchairs@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <0FF020FF-813B-47EA-9118-37A38701CBB1@amsl.com>
References: <E1dxVCh-00089D-Ti@zinfandel.tools.ietf.org>
To: Henrik Levkowetz <henrik@levkowetz.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/Tj70I_dXWnTPPGA9jHTnVyeNFpE>
Subject: Re: [codesprints] New datatracker release: v6.63.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Sep 2017 14:16:03 -0000

Greetings all!

Datatracker 6.63.0 has been deployed to production, and Datatracker =
6.63.1.dev0 has been deployed to the sandbox.

Matt

> On Sep 28, 2017, at 5:33 AM, Henrik Levkowetz <henrik@levkowetz.com> =
wrote:
>=20
>=20
> Hi,
>=20
> This is an automatic notification about a new datatracker release,=20
> v6.63.0, generated when running the mkrelease script.
>=20
> Release notes:
>=20
> ietfdb (6.63.0) ietf; urgency=3Dmedium
>=20
>  **Support for document-specific URL annotations**
>=20
>  This release adds support for document-specific URL annotations; look
>  for 'Additional URLs' on the draft status page.  These can be edited
>  by the group chairs for group drafts and by the authors for =
individual
>  drafts.  There are also some changes and enhancements related to the
>  submission automation API and to the nomcom template and email =
handling.
>=20
>  Commit log extract:
>=20
>  * Changed the nomcom code to permit nomcom year interpolation in the=20=

>    nomcom from-address and in nomcom templates.  Changed the nomcom=20
>    from-address setting to 'nomcom-chair-{year}@ietf.org'.  Added test
>    code to verify that nomcom from-address contains the nomcom year.
>=20
>  * Tweaked the submission search form to accept draft names which =
include=20
>    revision numbers.  Fixes issue #2380.
>=20
>  * Added a cancel button to the submission confirmation page.  Fixes =
issue=20
>    #2349.
>=20
>  * Removed the repeat of the error message in the HTTP reason string. =20=

>    Fixes issue #2378.
>=20
>  * Added 'Additional URLs' for documents, the same way we have them =
for
>    groups.  This could be used to point to a document source =
repository, to
>    extracted yang module files, document wikis, and other relevant =
resources.
>=20
>  * Added migrations for document url model changes.  Updated the name=20=

>    fixtures.  Added ability for individual draft authors to edit =
document urls.
>=20
>  * Removed some unreachable code.
>=20
>  * Another tweak to the draft author extraction code, to handle some =
name=20
>    transliterations using multiple leading grave accents.
>=20
> -- Henrik Levkowetz <henrik@levkowetz.com>  27 Sep 2017 08:33:16 -0700
>=20
> The new version is available for installation through SVN checkout, =
with
>  'svn checkout =
https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.63.0'
>=20
> For development, copy the new development version instead:
>  'svn copy =
https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.63.1.dev0' =
<YOURBRANCH>
>=20
> Regards,
>=20
> 	Henrik
> 	(via the mkrelease script)
>=20
> _______________________________________________
> codesprints mailing list
> codesprints@ietf.org
> https://www.ietf.org/mailman/listinfo/codesprints
>=20

-------------------------------------------
Matthew Larson, Software Engineer
Association Management Solutions
Forum Management, Meeting and Event Planning
5177 Brandin Court
Fremont, CA  94538


From nobody Thu Sep 28 07:46:08 2017
Return-Path: <henrik@levkowetz.com>
X-Original-To: codesprints@ietfa.amsl.com
Delivered-To: codesprints@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B69C4133075; Thu, 28 Sep 2017 07:46:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zmk8OC9wkpth; Thu, 28 Sep 2017 07:45:55 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:126c::1:2a]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D694120720; Thu, 28 Sep 2017 07:45:55 -0700 (PDT)
Received: from h-99-61.a357.priv.bahnhof.se ([82.196.99.61]:56379 helo=[192.168.1.120]) by zinfandel.tools.ietf.org with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <henrik@levkowetz.com>) id 1dxa4V-0008IK-GU; Thu, 28 Sep 2017 07:45:54 -0700
To: Matt Larson <mlarson@amsl.com>
References: <E1dxVCh-00089D-Ti@zinfandel.tools.ietf.org> <0FF020FF-813B-47EA-9118-37A38701CBB1@amsl.com>
Cc: wgchairs@ietf.org, codesprints@ietf.org
From: Henrik Levkowetz <henrik@levkowetz.com>
Message-ID: <ba200f34-075a-1f8b-df92-d5f734a3c7aa@levkowetz.com>
Date: Thu, 28 Sep 2017 16:45:41 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <0FF020FF-813B-47EA-9118-37A38701CBB1@amsl.com>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="DS6Mrg5lAvSUqbsIa4PGOvacGx8uAfF4P"
X-SA-Exim-Connect-IP: 82.196.99.61
X-SA-Exim-Rcpt-To: codesprints@ietf.org, wgchairs@ietf.org, mlarson@amsl.com
X-SA-Exim-Mail-From: henrik@levkowetz.com
X-SA-Exim-Version: 4.2.1 (built Mon, 26 Dec 2011 16:24:06 +0000)
X-SA-Exim-Scanned: Yes (on zinfandel.tools.ietf.org)
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/codesprints/u_MsCArxtxJlmpNjwdWVvfEeUiI>
Subject: Re: [codesprints] New datatracker release: v6.63.0
X-BeenThere: codesprints@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for coordinating \(and following up on\) codesprint activities" <codesprints.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/codesprints>, <mailto:codesprints-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/codesprints/>
List-Post: <mailto:codesprints@ietf.org>
List-Help: <mailto:codesprints-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/codesprints>, <mailto:codesprints-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Sep 2017 14:46:02 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--DS6Mrg5lAvSUqbsIa4PGOvacGx8uAfF4P
Content-Type: multipart/mixed; boundary="i9bA2cqHT7liUAl3sCqDDPJL6klbOxjMi";
 protected-headers="v1"
From: Henrik Levkowetz <henrik@levkowetz.com>
To: Matt Larson <mlarson@amsl.com>
Cc: wgchairs@ietf.org, codesprints@ietf.org
Message-ID: <ba200f34-075a-1f8b-df92-d5f734a3c7aa@levkowetz.com>
Subject: Re: [codesprints] New datatracker release: v6.63.0
References: <E1dxVCh-00089D-Ti@zinfandel.tools.ietf.org>
 <0FF020FF-813B-47EA-9118-37A38701CBB1@amsl.com>
In-Reply-To: <0FF020FF-813B-47EA-9118-37A38701CBB1@amsl.com>

--i9bA2cqHT7liUAl3sCqDDPJL6klbOxjMi
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Thank you, Matt!

	Henrik

On 2017-09-28 16:16, Matt Larson wrote:
> Greetings all!
>=20
> Datatracker 6.63.0 has been deployed to production, and Datatracker 6.6=
3.1.dev0 has been deployed to the sandbox.
>=20
> Matt
>=20
>> On Sep 28, 2017, at 5:33 AM, Henrik Levkowetz <henrik@levkowetz.com> w=
rote:
>>=20
>>=20
>> Hi,
>>=20
>> This is an automatic notification about a new datatracker release,=20
>> v6.63.0, generated when running the mkrelease script.
>>=20
>> Release notes:
>>=20
>> ietfdb (6.63.0) ietf; urgency=3Dmedium
>>=20
>>  **Support for document-specific URL annotations**
>>=20
>>  This release adds support for document-specific URL annotations; look=

>>  for 'Additional URLs' on the draft status page.  These can be edited
>>  by the group chairs for group drafts and by the authors for individua=
l
>>  drafts.  There are also some changes and enhancements related to the
>>  submission automation API and to the nomcom template and email handli=
ng.
>>=20
>>  Commit log extract:
>>=20
>>  * Changed the nomcom code to permit nomcom year interpolation in the =

>>    nomcom from-address and in nomcom templates.  Changed the nomcom=20
>>    from-address setting to 'nomcom-chair-{year}@ietf.org'.  Added test=

>>    code to verify that nomcom from-address contains the nomcom year.
>>=20
>>  * Tweaked the submission search form to accept draft names which incl=
ude=20
>>    revision numbers.  Fixes issue #2380.
>>=20
>>  * Added a cancel button to the submission confirmation page.  Fixes i=
ssue=20
>>    #2349.
>>=20
>>  * Removed the repeat of the error message in the HTTP reason string. =
=20
>>    Fixes issue #2378.
>>=20
>>  * Added 'Additional URLs' for documents, the same way we have them fo=
r
>>    groups.  This could be used to point to a document source repositor=
y, to
>>    extracted yang module files, document wikis, and other relevant res=
ources.
>>=20
>>  * Added migrations for document url model changes.  Updated the name =

>>    fixtures.  Added ability for individual draft authors to edit docum=
ent urls.
>>=20
>>  * Removed some unreachable code.
>>=20
>>  * Another tweak to the draft author extraction code, to handle some n=
ame=20
>>    transliterations using multiple leading grave accents.
>>=20
>> -- Henrik Levkowetz <henrik@levkowetz.com>  27 Sep 2017 08:33:16 -0700=

>>=20
>> The new version is available for installation through SVN checkout, wi=
th
>>  'svn checkout https://svn.tools.ietf.org/svn/tools/ietfdb/tags/6.63.0=
'
>>=20
>> For development, copy the new development version instead:
>>  'svn copy https://svn.tools.ietf.org/svn/tools/ietfdb/tags/dev/6.63.1=
=2Edev0' <YOURBRANCH>
>>=20
>> Regards,
>>=20
>> 	Henrik
>> 	(via the mkrelease script)
>>=20
>> _______________________________________________
>> codesprints mailing list
>> codesprints@ietf.org
>> https://www.ietf.org/mailman/listinfo/codesprints
>>=20
>=20
> -------------------------------------------
> Matthew Larson, Software Engineer
> Association Management Solutions
> Forum Management, Meeting and Event Planning
> 5177 Brandin Court
> Fremont, CA  94538
>=20
>=20


--i9bA2cqHT7liUAl3sCqDDPJL6klbOxjMi--

--DS6Mrg5lAvSUqbsIa4PGOvacGx8uAfF4P
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=Xxe8
-----END PGP SIGNATURE-----

--DS6Mrg5lAvSUqbsIa4PGOvacGx8uAfF4P--

