Re: [auth48] [AD] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-05> for your review

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Wed, 12 April 2023 08:44 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD55C15C2B7; Wed, 12 Apr 2023 01:44:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.896
X-Spam-Level:
X-Spam-Status: No, score=-11.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="V8qC+3X2"; dkim=pass (1024-bit key) header.d=cisco.com header.b="H+hQagXw"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GQqYqnx66FYL; Wed, 12 Apr 2023 01:44:24 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A6CEC1516E1; Wed, 12 Apr 2023 01:44:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=51124; q=dns/txt; s=iport; t=1681289064; x=1682498664; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=MflnTWdrplHbmMRrJuJccydxRxSpz3Ou0VRauat7rBY=; b=V8qC+3X2tnfDcIy3XWYDANHG6xQR519mWrKf0N9it4ZvCxpvECSyo8j2 BvkRfdIqZrmxVZufljtXqu6IgdI2zsnQFz+8hIzW1z6BkyePBy+1Vdf9w hmV39sGv98cAF8RIkDr+08b5s//eE7gsE7ddE1731LMSmKXzF7/80kejK E=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:DOiz3h9cIQNUMv9uWO3oyV9kXcBvk6//MghQ7YIolPcVNK+i5J/le kfY4KYlgFzIWNDD4ulfw6rNsq/mUHAd+5vJrn0YcZJNWhNEwcUblgAtGoiEXGXwLeXhaGoxG 8ERHER98SSDOFNOUN37e0WUp3Sz6TAIHRCqOwBvIe/2HIP6hMWs3Of08JrWME1EgTOnauZqJ Q6t5UXJ49ALiJFrLLowzBaBrnpTLuJRw24pbV7GlBfn7cD295lmmxk=
IronPort-Data: A9a23:4TKQkK3VQvyB0KCc/vbD5f9xkn2cJEfYwER7XKvMYLTBsI5bp2dTx jBLXGqAOP+PY2akfo1/YYXl9RsEvMOGyIBlHgE63Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKhTr+UUsxNbVU8Enx51Us5w7dRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMa7LYmFNM6bmtt1HapwYAvk PBJlLeVcFJ8VkHMsLx1vxhwGiV6O+hN/6XKZCHl98eS1EbBNXDrxp2CDmlvYtZeobgxWDoIr KdEQNwORkjra+aezrihTeJvgMkLJ8jwN4RZsXZlpd3cJap/HcCfGPqXjTNe9AYBmc91Lf/CX sQQYx9EU0mHOR0SZm5CXfrSm8/x1iWgLFW0smm9rLcr4zSDxRZ60LnzPfLPdNfPSMlUgkGC4 GXc8AzRGB8RcdGTyCaC6Fq2iOSKkC/6RIUIUrqi+ZZXbEa7z2gXDlgdUkG25KDjzEW/QNlYb UcT/0LCsJTe6mSVXsTddju/jETb/T5CC4QINukbwyS0n/+8DxmiOkAISTtIadoDvcAwRCA32 lLhoz8PLWEw2FFyYS/Fnop4vQ9eKgBOdz9fOXNsoR8tpoi9/dBi1nojW/45SMaIYsvJ9SYcK txghAc3nbEai8JjO06Tog2f32nESnQksmcICuj/V2ah6EZyY5SoItXyr1Pa9v1Hao2eSzFtX UToeeDAtYji7rnUy0Rhpdnh+pnyu55p1xWH3jZS82EJrWjFxpJaVdk4DMtCDEloKN0YXjTif VXevwhcjLcKYivzN/QoM9nsUJpypUQFKTgDfq6MBjapSsUuHDJrAAk1DaJt9zm3yRN1wf1X1 WmzIJr1ZZrlNUiX5GPmG7hCuVPa7is/3mjUDYvq1Aiq1KH2WZJmYeltDbd6VchgtPnsiFyMq 753bpLWoz0BC7eWSneMruYuwaUicCJT6Wbe8ZIHL4Zu42NORQkcNhMm6e94JN01zvgFyregE 7PUchYw9WcTTEbvcG2iQntic7joG514qBoG0eYEbD5EB1BLjV6T0Zoi
IronPort-HdrOrdr: A9a23:l30E4KCcPaMFez3lHegGsceALOsnbusQ8zAXPh9KKSC9I/b4qy nxppomPEfP+UgssREb9expOMG7MBXhHO1OkPgs1NCZLUbbUQqTXc1fBO7Zsl7d8kLFh5RgPM tbAsxD4ZjLfCdHZKXBkUeF+rQbsaS6GcmT7I+0pRodL3AOV0gj1XYENu/xKDwOeOAyP+tDKH Pq3Ls+m9PPQwVxUi28PBY4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsV Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RGIFq/QpF4t1H2mxa1O UkkC1QePibLEmhOF1dlCGdnjUIFgxeskMKh2Xo2UcL6vaJNA7SQ/Ax9r6xNCGpqnbJeLpHof h2N6XzjesNMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1VwKp5KuZIIMvB0vFuLM B+SMXHoPpGe1KTaH7U+mFp3dy3R3w2WhOLWFILtMCZ2yVf2CkR9TpU+OUP2nMbsJ4tQZhN4O rJdqxuibFVV8cTKaZwHv0IT8e7AnHEBRjMLGWRK1L6E7xvAQOGl7fnpLEuoO26cp0By5U/3J zHTVNDrGY3P1njDMWftac7hCwlgF/NKggF5vsuk6SR4IeMNoYDGRfzPWwTrw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 12 Apr 2023 08:44:08 +0000
Received: from rcdn-opgw-3.cisco.com (rcdn-opgw-3.cisco.com [72.163.7.164]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 33C8i8wQ008838 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 12 Apr 2023 08:44:08 GMT
Received: from mail-dm6nam04lp2043.outbound.protection.outlook.com (HELO NAM04-DM6-obe.outbound.protection.outlook.com) ([104.47.73.43]) by rcdn-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2023 08:44:08 +0000
Received: from mail-dm6nam04lp2043.outbound.protection.outlook.com (HELO NAM04-DM6-obe.outbound.protection.outlook.com) ([104.47.73.43]) by rcdn-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2023 08:44:08 +0000
Authentication-Results: rcdn-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=fbrockne@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="5.98,338,1673913600"; d="scan'";a="56931"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Wc0oOfbFgh3I9vUocfBhndVcVCsF3/upcXeDv1hXJdi82DrF8Gu1D1zD5KurgmMEKjnSUIKRho8I8bwUl1Woyv0LNKGnbkrUmM7fW68iv8EQMZkb6og/CV2/lunZFwz4kM4hFOfj3Ux/1KIJ3un3kQWwzgfkXAqI1HIMfMGbqMuf5f/dXYA7jCo5MTobN6GuELeSi3iNOIX5dAonyc3q954kF0a3TqE0O6NU/zOI2mmkIW7nDqSbj7ghhVVV6RZoNTga9mRmFVIwP4+etByUKRiQyL6oompyODDI8JkNSoFz7DgI0is7WoRhEXW9Fkixq1nXkkjBBXwD3oaYjqeZGA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MflnTWdrplHbmMRrJuJccydxRxSpz3Ou0VRauat7rBY=; b=iynAZqpGrPRRXh27PRyYiM3epMc+LMUb+MrkTJ1q49GacszfBdhjk8oAQrvg8uhfapzz91301pD+rTYnRkRXaTm0p2mSB4PxPwpsWGloqSca5kLyugBcZLDViZ1WU+Yfzeix/M0g0tnpxmbYj+yr+ambNb8spqMOicc1de9gSrD7nvTjV4WQ3tq4crV890+HmGkvEskre7hO1+DWmNpBf+w2+9kKXheufVRT1BNUCpxX4PL6Y2aATdhaN/sEPuvKgR1V/SFPK8mctT1Jc1MDtnHpxjFCT5QVLdqWrHw8fVydJBZurVK0BAGbf6NpfqhUUs/Uev1FoyiyX8x5DoJy6A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MflnTWdrplHbmMRrJuJccydxRxSpz3Ou0VRauat7rBY=; b=H+hQagXwx85bAX3mUcc6U7nHZsPIRKFu3+bJDZeAbdz7QASFmB/+2i7kZGpPmBPMu2orm7H7tdBglqV5PqM+9nEjEKG4F/dcw8JpIW1xEnSiDp7pP2DsK3SjSxGUyA5CMqSJj6+v402IRw8J9vrP9hXVip75Zr73u4kibJHlvLE=
Received: from MWHPR11MB1311.namprd11.prod.outlook.com (2603:10b6:300:2a::14) by DM4PR11MB8204.namprd11.prod.outlook.com (2603:10b6:8:17d::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6277.38; Wed, 12 Apr 2023 08:44:06 +0000
Received: from MWHPR11MB1311.namprd11.prod.outlook.com ([fe80::4893:8718:72a6:4f15]) by MWHPR11MB1311.namprd11.prod.outlook.com ([fe80::4893:8718:72a6:4f15%6]) with mapi id 15.20.6298.030; Wed, 12 Apr 2023 08:44:05 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Sarah Tarrant <starrant@amsl.com>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, "martin.h.duke@gmail.com" <martin.h.duke@gmail.com>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "shwetha.bhandari@thoughtspot.com" <shwetha.bhandari@thoughtspot.com>, "daniel.bernier@bell.ca" <daniel.bernier@bell.ca>, "ippm-ads@ietf.org" <ippm-ads@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "tpauly@apple.com" <tpauly@apple.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: [AD] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-05> for your review
Thread-Index: AQHZYPEMhpmUnlLCP0iqwJAz5X7J0q8bd4CggAFVLwCAAzSPAIAHbLlA
Date: Wed, 12 Apr 2023 08:44:05 +0000
Message-ID: <MWHPR11MB1311D291CF4008E212376A8CDA9B9@MWHPR11MB1311.namprd11.prod.outlook.com>
References: <20230327211350.435D288A97@rfcpa.amsl.com> <MWHPR11MB1311A5052D16C984013AC85EDA939@MWHPR11MB1311.namprd11.prod.outlook.com> <CABUE3Xn+ihFCOW9-=pdxdgiiEfYH0hgE2vYC9wF=cRqGkSMEsg@mail.gmail.com> <208277D8-B187-4F3A-A111-014868A0512D@amsl.com>
In-Reply-To: <208277D8-B187-4F3A-A111-014868A0512D@amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MWHPR11MB1311:EE_|DM4PR11MB8204:EE_
x-ms-office365-filtering-correlation-id: 56228454-7435-4f45-97e9-08db3b3212c1
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MWHPR11MB1311.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(376002)(136003)(396003)(366004)(39860400002)(451199021)(55016003)(52536014)(8936002)(66899021)(7696005)(30864003)(7416002)(966005)(5660300002)(86362001)(66446008)(66476007)(64756008)(66946007)(76116006)(8676002)(4326008)(66556008)(19627235002)(33656002)(478600001)(38100700002)(110136005)(38070700005)(122000001)(54906003)(71200400001)(53546011)(2906002)(83380400001)(6506007)(9686003)(186003)(66574015)(41300700001)(316002)(26005)(2304002)(559001)(579004)(19607625013); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR11MB1311.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 56228454-7435-4f45-97e9-08db3b3212c1
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Apr 2023 08:44:05.1820 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: lhn0TlnZDPRFOc1b4k/uWCTdEA7qLr2egXZUcPIrIwd5fZSX6aqC92ZG0ZnozoW2wJpUP4TCKVyJNIZ67lyYRw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB8204
X-Outbound-SMTP-Client: 72.163.7.164, rcdn-opgw-3.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/Az5dYJbYARuwwzT6aZAVvnOOLDo>
Subject: Re: [auth48] [AD] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-05> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Apr 2023 08:44:29 -0000

Hi Sarah,

Thanks for the updates. Please see inline.. ("..FB")

> -----Original Message-----
> From: Sarah Tarrant <starrant@amsl.com>
> Sent: Friday, 7 April 2023 17:00
> To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>; Frank Brockners (fbrockne)
> <fbrockne@cisco.com>; martin.h.duke@gmail.com
> Cc: rfc-editor@rfc-editor.org; shwetha.bhandari@thoughtspot.com;
> daniel.bernier@bell.ca; ippm-ads@ietf.org; ippm-chairs@ietf.org;
> tpauly@apple.com; auth48archive@rfc-editor.org
> Subject: Re: [AD] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-
> 05> for your review
> 
> Hi Frank and Tal (and *Martin),
> 
> [*Martin - please review and approve the changes highlighted at the beginning
> of Section 3 in the AUTH48 diff file below.]
> 
> Thank you for your replies and guidance.  We have marked Tal as “approved" at
> the AUTH48 status page (see below).  We will assume Tal’s assent to any further
> changes provided by the coauthors unless we hear otherwise at that time.
> 
> Please review the following further questions that arose while we implemented
> the requested updates.  We will await your responses to these questions prior to
> moving the document forward in the publication process.
> 
> 1) Regarding question 5, please let us know if any further updates were
> necessary regarding point b or if you would like to keep the text as is.

...FB: See below for a minor suggestion.

> 
> >>> 5) <!-- [rfced] We had two questions related to the first two subpoints
> >>>    in the list in Section 4:
> >>>
> >>> a) To make the two nested points parallel, should the second point
> >>> be rewritten
> >>> ("Operations/Troubleshooting: Understand" updated to "With regard to
> >>> operations and troubleshooting, understand...")?  Or should the
> >>> first nested point have a similar introduction to the second?
> >>> Please let us know if our suggestion below is a viable solution or
> >>> if there is another way to rephrase.
> >>>
> >>> b) Also, please clarify the two instances of "Understand".  Who is
> >>> understanding the different paths?  Or is there another way to clarify
> "Understand"?
> >>>
> >>> Original:
> >>>     Potential uses of IOAM per-hop tracing include:
> >>>
> >>>     -  Understand the different paths different packets traverse
> >>>        between an IOAM encapsulating and an IOAM decapsulating node in
> >>>        a network that uses load balancing such as Equal Cost Multi-
> >>>        Path (ECMP).  This information could be used to tune the
> >>>        algorithm for ECMP for optimized network resource usage.
> >>>
> >>>     -  Operations/Troubleshooting: Understand which path a particular
> >>>        packet or set of packets take as well as what amount of jitter
> >>>        and delay different IOAM nodes in the path contribute to the
> >>>        overall delay and jitter between the IOAM encapsulating node
> >>>        and the IOAM decapsulating node.
> >>>
> >>> Perhaps:
> >>>     Potential uses of IOAM per-hop tracing include:
> >>>
> >>>     -  Understanding the different paths different packets traverse
> >>>        between an IOAM encapsulating and an IOAM decapsulating node in
> >>>        a network that uses load-balancing such as Equal Cost Multi-
> >>>        Path (ECMP).  This information could be used to tune the
> >>>        algorithm for ECMP for optimized network resource usage.
> >>>
> >>>     -  With regard to operations and troubleshooting, understanding which
> >>>        path a particular packet or set of packets take as well as what
> >>>      amount of jitter and delay different IOAM nodes in the path
> >>>      contribute to the overall delay and jitter between the IOAM
> >>>      encapsulating node and the IOAM decapsulating node.
> >>> -->
> >>
> >> ...FB: I like your proposal.

...FB: IMHO it would be good to mention "IOAM encapsulating node" in the sentence below, rather than just "IOAM encapsulating". But this is just my "feeling" as a non-native English speaker. 

CURRENT:
      *  Understanding the different paths that different packets
         traverse between an IOAM encapsulating and an IOAM
         decapsulating node in a network that uses load balancing, such
         as Equal Cost Multi-Path (ECMP).  This information could be
         used to tune the algorithm for ECMP for optimized network
         resource usage.

NEW:
      *  Understanding the different paths that different packets
         traverse between an IOAM encapsulating node and an IOAM
         decapsulating node in a network that uses load balancing, such
         as Equal Cost Multi-Path (ECMP).  This information could be
         used to tune the algorithm for ECMP for optimized network
         resource usage.

> 
> 
> 2) Regarding question 6, where Frank wrote:
> 
> >> NEW:
> >>
> >>   *  Generic data, that is format-free information, where the syntax and
> >>      semantics of the information are defined by the operator in a specific
> >>      deployment.
> 
> please note that we further updated to use “Generic data, which is format-free
> information, where…” as we assume the intention is to give further information
> on the generic data (not to contrast it with generic data that is not format-free).
> Please let us know any objections.

...FB: ACK. The change to "which" makes sense.

> 
> 
> 3) When making terminology updates, we wanted to clarify the following:
> 
> a) Please confirm that the “Perhaps” text below is an *example* of a desired
> update (similar text occurs elsewhere).
> 
> Original:
> The incremental IOAM-Trace-Option-Type eliminates the need for the IOAM
> transit nodes to read the full array in the Trace-Option-Type and allows packets
> to grow to the size of the MTU of the IOAM domain.
> 
> Current:
> The incremental IOAM Trace
> Option-Type eliminates the need for the IOAM transit nodes to read the full
> array in the Trace Option-Type and allows packets to grow to the size of the
> MTU of the IOAM-Domain.
> 
> Perhaps:
> The IOAM Incremental Trace
> Option-Type eliminates the need for the IOAM transit nodes to read the full
> array in the Trace Option-Type and allows packets to grow to the size of the
> MTU of the IOAM-Domain.

...FB: Agreed. Your suggestion is more accurate.

> 
> b) We were uncertain about the updates to “Active flag” per the author
> response:
> 
> > Original:
> > IOAM active mode flag
> > Active flag
> >
> > Perhaps:
> > Active flag (per RFC 9322)
> 
> ...FB: Agreed.
> 
> >
> > See also IOAM Active Mode.
> 
> 
> Should the title of Section 7.6 be updated as follows?
> 
> Current:
> IOAM Active Mode
> 
> Perhaps:
> Active Flag

...FB: Agreed. Keeping things consistent with RFC 9322 is appreciated.

...FB: In order to keep things consistent in the document, IMHO it would make sense to also change4

CURRENT:

7.5.  IOAM Loopback

NEW:

7.5.  Loopback flag

> 
> See also:
> 
> Current:
>   Example use cases for IOAM Active Mode include:
> 
> Perhaps:
>   Example use cases for the Active flag include:

...FB: Agreed.

> 
> 
> We have updated the document with all the other changes as requested.  Please
> review these updates carefully as we do not make changes once the document
> is published as an RFC.  We will approvals from each coauthor prior to moving
> the document forward in the publication process.


...FB: When reading through the document, I found another minor inconsistency in language in section 10 ("Direct Exporting mode" vs. "Direct Exporting"). IMHO it would be good to avoid "mode" here as well and just refer to "Direct Exporting"

CURRENT:

   IOAM data can be subject to eavesdropping.  Although the
   confidentiality of the user data is not at risk in this context, the
   IOAM data elements can be used for network reconnaissance, allowing
   attackers to collect information about network paths, performance,
   queue states, buffer occupancy, and other information.  Recon is an
   improbable security threat in an IOAM deployment that is within a
   confined physical domain.  However, in deployments that are not
   confined to a single LAN but span multiple interconnected sites (for
   example, using an overlay network), the inter-site links are expected
   to be secured (e.g., by IPsec) in order to avoid external
   eavesdropping and introduction of malicious or false data.  Another
   possible mitigation approach is to use the "Direct Exporting" mode
   [RFC9326].  In this case, the IOAM-related trace information would
   not be available in the customer data packets but would trigger the
   exporting of (secured) packet-related IOAM information at every node.
   IOAM data export and securing IOAM data export is outside the scope
   of this document.

[...]

   Notably, IOAM is expected to be deployed in limited network domains
   [RFC8799], thus, confining the potential attack vectors within the
   limited domain.  Indeed, in order to limit the scope of threats
   within the current network domain, the network operator is expected
   to enforce policies that prevent IOAM traffic from leaking outside
   the IOAM-Domain and prevent an attacker from introducing malicious or
   false IOAM data to be processed and used within the IOAM-Domain.
   IOAM data leakage could lead to privacy issues.  Consider an IOAM
   encapsulating node that is a home gateway in an operator's network.
   A home gateway is often identified with an individual.  Revealing
   IOAM data, such as "IOAM node identifier" or geolocation information
   outside of the limited domain, could be harmful for that user.  Note
   that the Direct Exporting mode [RFC9326] can mitigate the potential
   threat of IOAM data leaking through data packets.

NEW:
   IOAM data can be subject to eavesdropping.  Although the
   confidentiality of the user data is not at risk in this context, the
   IOAM data elements can be used for network reconnaissance, allowing
   attackers to collect information about network paths, performance,
   queue states, buffer occupancy, and other information.  Recon is an
   improbable security threat in an IOAM deployment that is within a
   confined physical domain.  However, in deployments that are not
   confined to a single LAN but span multiple interconnected sites (for
   example, using an overlay network), the inter-site links are expected
   to be secured (e.g., by IPsec) in order to avoid external
   eavesdropping and introduction of malicious or false data.  Another
   possible mitigation approach is to use "Direct Exporting" 
   [RFC9326].  In this case, the IOAM-related trace information would
   not be available in the customer data packets but would trigger the
   exporting of (secured) packet-related IOAM information at every node.
   IOAM data export and securing IOAM data export is outside the scope
   of this document.

[...]

   Notably, IOAM is expected to be deployed in limited network domains
   [RFC8799], thus, confining the potential attack vectors within the
   limited domain.  Indeed, in order to limit the scope of threats
   within the current network domain, the network operator is expected
   to enforce policies that prevent IOAM traffic from leaking outside
   the IOAM-Domain and prevent an attacker from introducing malicious or
   false IOAM data to be processed and used within the IOAM-Domain.
   IOAM data leakage could lead to privacy issues.  Consider an IOAM
   encapsulating node that is a home gateway in an operator's network.
   A home gateway is often identified with an individual.  Revealing
   IOAM data, such as "IOAM node identifier" or geolocation information
   outside of the limited domain, could be harmful for that user.  Note
   that Direct Exporting [RFC9326] can mitigate the potential
   threat of IOAM data leaking through data packets.

Cheers, Frank


> 
> The files have been posted here (please refresh):
>  https://www.rfc-editor.org/authors/rfc9378.txt
>  https://www.rfc-editor.org/authors/rfc9378.pdf
>  https://www.rfc-editor.org/authors/rfc9378.html
>  https://www.rfc-editor.org/authors/rfc9378.xml
> 
> The relevant diff files have been posted here (please refresh):
>  https://www.rfc-editor.org/authors/rfc9378-diff.html (comprehensive diff)
> https://www.rfc-editor.org/authors/rfc9378-rfcdiff.html (comprehensive
> rfcdiff)  https://www.rfc-editor.org/authors/rfc9378-auth48diff.html (AUTH48
> changes only)
> 
> The AUTH48 status page is viewable at:
>  https://www.rfc-editor.org/auth48/rfc9378
> 
> Thank you.
> 
> RFC Editor/st
> > On Apr 5, 2023, at 9:02 AM, Tal Mizrahi <tal.mizrahi.phd@gmail.com> wrote:
> >
> > Dear RFC Editorial Team,
> >
> > I agree with Frank's comments.
> > I approve.
> >
> > Thanks,
> > Tal.
> >
> > On Tue, Apr 4, 2023 at 9:26 PM Frank Brockners (fbrockne)
> > <fbrockne@cisco.com> wrote:
> >>
> >> Dear Sarah, RFC-Editor team,
> >>
> >>> -----Original Message-----
> >>> From: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>
> >>> Sent: Monday, 27 March 2023 23:14
> >>> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>;
> >>> shwetha.bhandari@thoughtspot.com; daniel.bernier@bell.ca;
> >>> tal.mizrahi.phd@gmail.com
> >>> Cc: rfc-editor@rfc-editor.org; ippm-ads@ietf.org;
> >>> ippm-chairs@ietf.org; tpauly@apple.com; martin.h.duke@gmail.com;
> >>> auth48archive@rfc-editor.org
> >>> Subject: Re: AUTH48: RFC-to-be 9378
> >>> <draft-ietf-ippm-ioam-deployment-05>
> >>> for your review
> >>>
> >>> Authors,
> >>>
> >>> While reviewing this document during AUTH48, please resolve (as
> >>> necessary) the following questions, which are also in the XML file.
> >>>
> >>> 1) <!-- [rfced] Please note that the title of the document has been
> >>> updated as follows to more similarly match related recently published RFCs.
> >>>
> >>>
> >>> Original:
> >>> In-situ OAM Deployment
> >>>
> >>> Current:
> >>> In Situ Operations, Administration, and Maintenance (IOAM)
> >>> Deployment
> >>> -->
> >>
> >> ...FB: ACK.
> >>
> >>>
> >>>
> >>> 2) <!-- [rfced] We suggest updating the following text for the ease of
> >>>     the reader.  Please let us know any objections.
> >>>
> >>> Original:
> >>>   IOAM mechanisms can be
> >>>   leveraged where mechanisms using e.g., ICMP do not apply or do not
> >>>   offer the desired results, such as proving that a certain traffic
> >>>   flow takes a pre-defined path, SLA verification for the live data
> >>>   traffic, detailed statistics on traffic distribution paths in
> >>>   networks that distribute traffic across multiple paths, or scenarios
> >>>   in which probe traffic is potentially handled differently from
> >>>   regular data traffic by the network devices.
> >>>
> >>> Perhaps:
> >>>   IOAM mechanisms can be
> >>>   leveraged where mechanisms using, e.g., ICMP do not apply or do not
> >>>   offer the desired results. These results could include:
> >>>
> >>>       * proving that a certain traffic flow takes a predefined path,
> >>>
> >>>       * verifying the Service Level Agreement (SLA) for the live data
> >>>         traffic,
> >>>
> >>>       * providing detailed statistics on traffic distribution paths in
> >>>         networks that distribute traffic across multiple paths, or
> >>>
> >>>       * providing scenarios in which probe traffic is potentially
> >>>         handled differently from regular data traffic by the network
> >>>         devices.
> >>> -->
> >>
> >> ...FB: Making this long winded sentence more readable is very worthwhile. In
> your proposal, the term "result" could be misunderstood though.
> >> How about the following:
> >>
> >> NEW:
> >>
> >> IOAM mechanisms can be leveraged in situations where mechanisms
> >> using, e.g., ICMP does not apply or does not offer the desired
> >> results. These situations could include:
> >>
> >>        * proving that a certain traffic flow takes a predefined path,
> >>
> >>       * verifying the Service Level Agreement (SLA) for the live data
> >>          traffic,
> >>
> >>       * providing detailed statistics on traffic distribution paths in
> >>         networks that distribute traffic across multiple paths, or
> >>
> >>        * providing scenarios in which probe traffic is potentially
> >>          handled differently from regular data traffic by the network
> >>          devices.
> >>
> >>
> >>>
> >>>
> >>> 3) <!--[rfced] We note a lot of similarities in the text of Section
> >>> 3 with the text that appears in Section 4.2 of RFC 9197.  However,
> >>> there is no citation to that document in Section 3.  Please review
> >>> and let us know if a citation should be added, any text should be
> >>> updated, or if the reader should simply be pointed to Section 4.2 of
> >>> RFC 9197 for certain info.-->
> >>
> >> ...FB: Good point. Given that (a) the deployment document is a bit more
> recent than RFC 9197, (b) a partial repeat of definitions helps the reader and (c)
> the IESG had comments and text suggestions on the section which led to revised
> text, IMHO it would be better to keep the section in place rather than remove it.
> That said, what would make sense is to add a paragraph up front which states
> the reference to RFC 9197.  E.g.
> >>
> >> OLD:
> >>
> >> 3.  IOAM Deployment: Domains And Nodes
> >>
> >>   IOAM is focused on "limited domains" as defined in [RFC8799].  IOAM
> >>   is not targeted for a deployment on the global Internet. ...
> >>
> >> NEW:
> >>
> >> 3.  IOAM Deployment: Domains And Nodes
> >>
> >>   RFC 9197 defines the scope of IOAM as well as the different
> >>   types of IOAM nodes. For improved readability, this section
> >>   provides a brief overview of where IOAM applies,
> >>   along with explaining the main roles of nodes that employ IOAM.
> >>   Please refer to RFC 9197 for further details.
> >>
> >>   IOAM is focused on "limited domains" as defined in [RFC8799].  IOAM
> >>   is not targeted for a deployment on the global Internet. ...
> >>
> >>>
> >>>
> >>> 4) <!-- [rfced] Does this instance of "/" indicate "and" or "or"?
> >>> Please let us know how we may update for clarity.
> >>>
> >>> Original:
> >>>   For example, an IOAM-domain can include an enterprise campus using
> >>>   physical connections between devices or an overlay network using
> >>>   virtual connections / tunnels for connectivity between said devices.
> >>>
> >>> Perhaps:
> >>> a)
> >>>   For example, an IOAM-Domain can include an enterprise campus using
> >>>   physical connections between devices or an overlay network using
> >>>   virtual connections and tunnels for connectivity between said devices.
> >>>
> >>> b)
> >>>   For example, an IOAM-Domain can include an enterprise campus using
> >>>   physical connections between devices or an overlay network using
> >>>   virtual connections or tunnels for connectivity between said devices.
> >>> -->
> >>
> >> ...FB: It is option b). I.e.,
> >>
> >> NEW:
> >>
> >>    For example, an IOAM-Domain can include an enterprise campus using
> >>    physical connections between devices or an overlay network using
> >>    virtual connections or tunnels for connectivity between said devices.
> >>
> >>
> >>>
> >>>
> >>> 5) <!-- [rfced] We had two questions related to the first two subpoints
> >>>     in the list in Section 4:
> >>>
> >>> a) To make the two nested points parallel, should the second point
> >>> be rewritten
> >>> ("Operations/Troubleshooting: Understand" updated to "With regard to
> >>> operations and troubleshooting, understand...")?  Or should the
> >>> first nested point have a similar introduction to the second?
> >>> Please let us know if our suggestion below is a viable solution or
> >>> if there is another way to rephrase.
> >>>
> >>> b) Also, please clarify the two instances of "Understand".  Who is
> >>> understanding the different paths?  Or is there another way to clarify
> "Understand"?
> >>>
> >>> Original:
> >>>      Potential uses of IOAM per-hop tracing include:
> >>>
> >>>      -  Understand the different paths different packets traverse
> >>>         between an IOAM encapsulating and an IOAM decapsulating node in
> >>>         a network that uses load balancing such as Equal Cost Multi-
> >>>         Path (ECMP).  This information could be used to tune the
> >>>         algorithm for ECMP for optimized network resource usage.
> >>>
> >>>      -  Operations/Troubleshooting: Understand which path a particular
> >>>         packet or set of packets take as well as what amount of jitter
> >>>         and delay different IOAM nodes in the path contribute to the
> >>>         overall delay and jitter between the IOAM encapsulating node
> >>>         and the IOAM decapsulating node.
> >>>
> >>> Perhaps:
> >>>      Potential uses of IOAM per-hop tracing include:
> >>>
> >>>      -  Understanding the different paths different packets traverse
> >>>         between an IOAM encapsulating and an IOAM decapsulating node in
> >>>         a network that uses load-balancing such as Equal Cost Multi-
> >>>         Path (ECMP).  This information could be used to tune the
> >>>         algorithm for ECMP for optimized network resource usage.
> >>>
> >>>      -  With regard to operations and troubleshooting, understanding which
> >>>         path a particular packet or set of packets take as well as what
> >>>       amount of jitter and delay different IOAM nodes in the path
> >>>       contribute to the overall delay and jitter between the IOAM
> >>>       encapsulating node and the IOAM decapsulating node.
> >>> -->
> >>
> >> ...FB: I like your proposal.
> >>
> >>>
> >>>
> >>> 6) <!-- [rfced] To make this list parallel, may we update "Generic data:
> >>>     Format-free information where..." to "Generic data, such as
> >>>     format-free information, where..."? Or would you like the list to
> >>>     be more of a definition list where each point has a term and then
> >>>     a definition list?  Please let us know how we may update.
> >>>
> >>> Original:
> >>>   *  Generic data: Format-free information where syntax and semantic of
> >>>      the information is defined by the operator in a specific
> >>>      deployment.  For a specific IOAM-Namespace, all IOAM nodes should
> >>>      interpret the generic data the same way.  Examples for generic
> >>>      IOAM data include geolocation information (location of the node at
> >>>      the time the packet was processed), buffer queue fill level or
> >>>      cache fill level at the time the packet was processed, or even a
> >>>      battery charge level.
> >>>
> >>> Perhaps:
> >>>   *  Generic data, such as format-free information, where the syntax and
> >>>      semantics of the information are defined by the operator in a specific
> >>>      deployment.  For a specific IOAM-Namespace, all IOAM nodes should
> >>>      interpret the generic data the same way.  Examples for generic
> >>>      IOAM data include geolocation information (location of the node at
> >>>      the time the packet was processed), bufferqueue fill level or
> >>>      cache fill level at the time the packet was processed, or even a
> >>>      battery charge level.
> >>> -->
> >>
> >> ...FB: Generic data _is_ format-free in case of IOAM. "such as" could be read
> as "format-free" information is only an example.  How about:
> >>
> >> NEW:
> >>
> >>    *  Generic data, that is format-free information, where the syntax and
> >>       semantics of the information are defined by the operator in a specific
> >>       deployment.  For a specific IOAM-Namespace, all IOAM nodes should
> >>       interpret the generic data the same way.  Examples for generic
> >>       IOAM data include geolocation information (location of the node at
> >>       the time the packet was processed), bufferqueue fill level or
> >>       cache fill level at the time the packet was processed, or even a
> >>       battery charge level.
> >>
> >>>
> >>>
> >>> 7) <!--[rfced] The following text seems to be taken from RFC 9197.  May
> >>>     we update the capping scheme to match?  Note that we will update
> >>>     s/consist/consists regardless (which seems to be an error in
> >>>     RFC 9197).
> >>>
> >>> RFC 9197:
> >>> The IOAM Proof of Transit Option-Type consist of a fixed-size "IOAM
> >>> Proof of Transit Option header" and "IOAM Proof of Transit Option
> >>> data
> >>> fields":
> >>>
> >>> This document:
> >>> The IOAM Proof of Transit Option-Type consist of a fixed size "IOAM
> >>> proof of transit option header" and "IOAM proof of transit option data
> fields".
> >>>
> >>> Perhaps:
> >>> The IOAM Proof of Transit Option-Type consists of a fixed-size "IOAM
> >>> Proof of Transit Option header" and "IOAM Proof of Transit Option data
> fields."
> >>> -->
> >>
> >> ...FB: Your suggestion makes sense.
> >>
> >>>
> >>>
> >>> 8) <!--[rfced] We had a question about the citation in this text:
> >>>
> >>>
> >>> Original:
> >>> ... IOAM loopback mode.  For a definition of IOAM Namespaces and
> >>> IOAM layering, please refer to [RFC9197].  IOAM loopback mode is
> >>> defined in [RFC9322].
> >>>
> >>> We note that RFC 9322 never actually uses the term "mode".  Please
> >>> review and let us know if any updates to the following text are necessary.
> >>>
> >> ...FB: Rather than talk about "IOAM loopback mode" we should simply say
> "IOAM loopback".
> >> How about...
> >>
> >> NEW:
> >>
> >> 7.  IOAM Deployment Considerations
> >>
> >>   This section describes several concepts of IOAM, and provides
> >>   considerations that need to be taken to account when implementing
> >>   IOAM in a network domain.  This includes concepts like IOAM
> >>   Namespaces, IOAM Layering, traffic-sets that IOAM is applied to and
> >>   IOAM Loopback.  For a definition of IOAM Namespaces and IOAM
> >>   layering, please refer to [RFC9197].  IOAM Loopback is defined
> >>   in [RFC9322].
> >>
> >>
> >>>
> >>> -->
> >>>
> >>>
> >>> 9) <!-- [rfced] We had the following queries related to terminology use
> >>>     throughout the document:
> >>>
> >>> a) The following terminology appears to be used inconsistently.  May
> >>> we update as suggested below for consistency with past RFCs?
> >>>
> >>> Original:
> >>>  Direct export
> >>>  Direct Export
> >>>
> >>> Perhaps:
> >>>  Direct Export (based on RFC 9326)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>
> >>> Original:
> >>>  Incremental Trace-Option-Type
> >>>  incremental Trace Option-Type
> >>>  Incremental Trace-Option
> >>>  Incremental Trace Option-Type
> >>>  "Incremental" Trace-Option-Type
> >>>
> >>> Perhaps:
> >>>  Incremental Trace Option-Type (based on RFC 9197)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>
> >>> Original:
> >>>  IOAM Layering
> >>>  IOAM layering
> >>>
> >>> Perhaps:
> >>>  IOAM Layering (based on RFC 9197)
> >>
> >> ...FB: Agreed.
> >>>
> >>>
> >>> Original:
> >>>  IOAM Loopback
> >>>  IOAM loopback
> >>>
> >>> Perhaps:
> >>>  ? - RFC 9322 uses IOAM Loopback only once, then we see "IOAM looped-
> back"
> >>
> >> ...FB: See above. Let's standardize on "IOAM Loopback".
> >>
> >>>
> >>> Original:
> >>>  IOAM active mode flag
> >>>  Active flag
> >>>
> >>> Perhaps:
> >>>  Active flag (per RFC 9322)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>  See also IOAM Active Mode.
> >>>
> >>> Original:
> >>>  loopback flag
> >>>
> >>> Perhaps:
> >>>  Loopback flag (per RFC 9322)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>> Original:
> >>>  IOAM-Namespace
> >>>  IOAM Namespace
> >>>
> >>> Perhaps:
> >>>  IOAM-Namespace (based on RFCs 9197 and 9322)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>
> >>> Original:
> >>>  IOAM-Option-Type
> >>>  IOAM Option-Type
> >>>
> >>> Perhaps:
> >>>  IOAM Option-Type (based on RFC 9197 and 9326)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>
> >>> Original:
> >>>  IOAM-Trace-Option-Type
> >>>  IOAM Trace Option Type
> >>>  IOAM Trace Option-Type
> >>>
> >>> Perhaps:
> >>>  IOAM Trace Option-Type (based on RFC 9197)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>
> >>> Original:
> >>>  Pre-allocated Trace-Option-Type
> >>>  pre-allocated Option-Type
> >>>  Pre-allocated Trace-Option
> >>>  "Pre-allocated" Trace-Option-Type
> >>>
> >>>
> >>> Perhaps:
> >>>  Pre-allocated Trace Option-Type (based on RFC 9197)
> >>
> >> ...FB: Agreed.
> >>
> >>>
> >>>
> >>> Original:
> >>>  Trace-Option-Type
> >>>  Trace Option-Type
> >>>  trace Option-Type
> >>>
> >>> Perhaps:
> >>> Trace Option-Type (based on RFC 9197)
> >>>
> >>> Relating to the two entries above, see also:
> >>>   The Option-Types of incremental tracing and pre-allocated tracing are
> >>>   defined in [RFC9197].
> >>
> >> ...FB: Agreed.
> >>>
> >>>
> >>> b) We have updated "Edge to Edge" and "Edge-to-edge" to "Edge-to-Edge"
> >>> per RFC 9197. May we update all subsequent instances to "E2E" when
> >>> not in quotes?
> >>
> >> ...FB: Makes sense.
> >>
> >>>
> >>> c) FYI, we have updated to use the following forms (see
> >>> capitalization/hyphenation/etc.) of various terms for consistency
> >>> with recent RFCs on the topic. Please let us know of any objections.
> >>>
> >>>  Hop-by-Hop (per RFC 9326)
> >>>  IOAM-Domain (per feedback on RFC-to-be 9359)  Proof of Transit (per
> >>> feedback on RFC-to-be 9359)  IOAM encapsulating node, IOAM
> >>> decapsulating node, IOAM transit node
> >>> -->
> >>
> >> ...FB: ACK.
> >>
> >>>
> >>>
> >>> 10) <!-- [rfced] Please review the "Inclusive Language" portion of the
> >>>     online Style Guide
> >>>     <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
> >>>     and let us know if any changes are needed.  Note that our script
> >>>     did not flag any words in particular, but this should still be
> >>>     reviewed as a best practice.
> >>> -->
> >>
> >> ...FB: Thanks for the note. I'm also not aware of any challenges wrt/ non-
> inclusive language with the current text.
> >> I don't see a need for further changes.
> >>
> >> THANKS A LOT for your suggestions, review and help.
> >>
> >> Cheers, Frank
> >>>
> >>>
> >>> Thank you.
> >>>
> >>> RFC Editor/st/mf
> >>>
> >>> *****IMPORTANT*****
> >>>
> >>> Updated 2023/03/27
> >>>
> >>> RFC Author(s):
> >>> --------------
> >>>
> >>> Instructions for Completing AUTH48
> >>>
> >>> Your document has now entered AUTH48.  Once it has been reviewed and
> >>> approved by you and all coauthors, it will be published as an RFC.
> >>> If an author is no longer available, there are several remedies
> >>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> >>>
> >>> You and you coauthors are responsible for engaging other parties
> >>> (e.g., Contributors or Working Group) as necessary before providing your
> approval.
> >>>
> >>> Planning your review
> >>> ---------------------
> >>>
> >>> Please review the following aspects of your document:
> >>>
> >>> *  RFC Editor questions
> >>>
> >>>   Please review and resolve any questions raised by the RFC Editor
> >>>   that have been included in the XML file as comments marked as
> >>>   follows:
> >>>
> >>>   <!-- [rfced] ... -->
> >>>
> >>>   These questions will also be sent in a subsequent email.
> >>>
> >>> *  Changes submitted by coauthors
> >>>
> >>>   Please ensure that you review any changes submitted by your
> >>>   coauthors.  We assume that if you do not speak up that you
> >>>   agree to changes submitted by your coauthors.
> >>>
> >>> *  Content
> >>>
> >>>   Please review the full content of the document, as this cannot
> >>>   change once the RFC is published.  Please pay particular attention to:
> >>>   - IANA considerations updates (if applicable)
> >>>   - contact information
> >>>   - references
> >>>
> >>> *  Copyright notices and legends
> >>>
> >>>   Please review the copyright notice and legends as defined in
> >>>   RFC 5378 and the Trust Legal Provisions
> >>>   (TLP – https://trustee.ietf.org/license-info/).
> >>>
> >>> *  Semantic markup
> >>>
> >>>   Please review the markup in the XML file to ensure that elements of
> >>>   content are correctly tagged.  For example, ensure that <sourcecode>
> >>>   and <artwork> are set correctly.  See details at
> >>>   <https://authors.ietf.org/rfcxml-vocabulary>.
> >>>
> >>> *  Formatted output
> >>>
> >>>   Please review the PDF, HTML, and TXT files to ensure that the
> >>>   formatted output, as generated from the markup in the XML file, is
> >>>   reasonable.  Please note that the TXT will have formatting
> >>>   limitations compared to the PDF and HTML.
> >>>
> >>>
> >>> Submitting changes
> >>> ------------------
> >>>
> >>> To submit changes, please reply to this email using ‘REPLY ALL’ as
> >>> all the parties CCed on this message need to see your changes. The
> >>> parties
> >>> include:
> >>>
> >>>   *  your coauthors
> >>>
> >>>   *  rfc-editor@rfc-editor.org (the RPC team)
> >>>
> >>>   *  other document participants, depending on the stream (e.g.,
> >>>      IETF Stream participants are your working group chairs, the
> >>>      responsible ADs, and the document shepherd).
> >>>
> >>>   *  auth48archive@rfc-editor.org, which is a new archival mailing list
> >>>      to preserve AUTH48 conversations; it is not an active discussion
> >>>      list:
> >>>
> >>>     *  More info:
> >>>        https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-
> >>> 4Q9l2USxIAe6P8O4Zc
> >>>
> >>>     *  The archive itself:
> >>>        https://mailarchive.ietf.org/arch/browse/auth48archive/
> >>>
> >>>     *  Note: If only absolutely necessary, you may temporarily opt out
> >>>        of the archiving of messages (e.g., to discuss a sensitive matter).
> >>>        If needed, please add a note at the top of the message that you
> >>>        have dropped the address. When the discussion is concluded,
> >>>        auth48archive@rfc-editor.org will be re-added to the CC list and
> >>>        its addition will be noted at the top of the message.
> >>>
> >>> You may submit your changes in one of two ways:
> >>>
> >>> An update to the provided XML file
> >>> — OR —
> >>> An explicit list of changes in this format
> >>>
> >>> Section # (or indicate Global)
> >>>
> >>> OLD:
> >>> old text
> >>>
> >>> NEW:
> >>> new text
> >>>
> >>> You do not need to reply with both an updated XML file and an
> >>> explicit list of changes, as either form is sufficient.
> >>>
> >>> We will ask a stream manager to review and approve any changes that
> >>> seem beyond editorial in nature, e.g., addition of new text,
> >>> deletion of text, and technical changes.  Information about stream
> >>> managers can be found in the FAQ.  Editorial changes do not require
> approval from a stream manager.
> >>>
> >>>
> >>> Approving for publication
> >>> --------------------------
> >>>
> >>> To approve your RFC for publication, please reply to this email
> >>> stating that you approve this RFC for publication.  Please use
> >>> ‘REPLY ALL’, as all the parties CCed on this message need to see your
> approval.
> >>>
> >>>
> >>> Files
> >>> -----
> >>>
> >>> The files are available here:
> >>>   https://www.rfc-editor.org/authors/rfc9378.xml
> >>>   https://www.rfc-editor.org/authors/rfc9378.html
> >>>   https://www.rfc-editor.org/authors/rfc9378.pdf
> >>>   https://www.rfc-editor.org/authors/rfc9378.txt
> >>>
> >>> Diff file of the text:
> >>>   https://www.rfc-editor.org/authors/rfc9378-diff.html
> >>>   https://www.rfc-editor.org/authors/rfc9378-rfcdiff.html (side by
> >>> side)
> >>>
> >>> Diff of the XML:
> >>>   https://www.rfc-editor.org/authors/rfc9378-xmldiff1.html
> >>>
> >>> The following files are provided to facilitate creation of your own
> >>> diff files of the XML.
> >>>
> >>> Initial XMLv3 created using XMLv2 as input:
> >>>   https://www.rfc-editor.org/authors/rfc9378.original.v2v3.xml
> >>>
> >>> XMLv3 file that is a best effort to capture v3-related format
> >>> updates
> >>> only:
> >>>   https://www.rfc-editor.org/authors/rfc9378.form.xml
> >>>
> >>>
> >>> Tracking progress
> >>> -----------------
> >>>
> >>> The details of the AUTH48 status of your document are here:
> >>>   https://www.rfc-editor.org/auth48/rfc9378
> >>>
> >>> Please let us know if you have any questions.
> >>>
> >>> Thank you for your cooperation,
> >>>
> >>> RFC Editor
> >>>
> >>> --------------------------------------
> >>> RFC9378 (draft-ietf-ippm-ioam-deployment-05)
> >>>
> >>> Title            : In-situ OAM Deployment
> >>> Author(s)        : F. Brockners, Ed., S. Bhandari, Ed., D. Bernier, T. Mizrahi, Ed.
> >>> WG Chair(s)      : Marcus Ihlar, Tommy Pauly
> >>> Area Director(s) : Martin Duke, Zaheduzzaman Sarker
> >>>
> >>
> >