Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-ietf-ippm-ioam-conf-state-10> for your review
Greg Mirsky <gregimirsky@gmail.com> Fri, 10 March 2023 01:44 UTC
Return-Path: <gregimirsky@gmail.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1658C15C524; Thu, 9 Mar 2023 17:44:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SMxiZGvuyfs0; Thu, 9 Mar 2023 17:43:58 -0800 (PST)
Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 862E8C1522C2; Thu, 9 Mar 2023 17:43:58 -0800 (PST)
Received: by mail-qk1-x72c.google.com with SMTP id c200so1454335qke.2; Thu, 09 Mar 2023 17:43:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1678412637; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=RyPkfe1wa456Iw23dM/k34WWQl9+py/LekRpHOW4/6c=; b=mOYdB1ET589yYVg396qjaJTbLvmGqS7wRH+wjPqvixUeCVKNuSj/Oi/ujDrIrGh+jV dgKkKk0pbJaUwYpdfE1SmF8cRCL6xY0qIlyfG8wKDnc3D2Egl72Edyc+DaEFlboc1kQd oJLFP9rClyAl1TIuBN6FEy6EBaSGx5qLUs9o8jJuR/Un+nkW1Zbz3FFtgEpMqNylaEz1 HARAw51WQVPpOzjjuyMsnJMt2qltNecCRqZsW7o+bC944r68fR8rEuQ8cykIWGa1/QeM 90t5IzcqA2pEYZ4soBDPmm7Qa9NYRQsjPhLAC+MO6SpkCF9e6fGnu2WoCKz9qch9nR4d 9Pqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1678412637; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=RyPkfe1wa456Iw23dM/k34WWQl9+py/LekRpHOW4/6c=; b=Ol7nJs6i/9QNn1CHS9y89bsmHmgoKj42s7NYo8mjAwhV/O5jFKvccUPmdTBaYqPiet eX7t5VI+M/Uq8kKMOHibAwEuiqEbBbJZA7hqlP0lPh7MT621iDZfqeT9EzkCBjsrG5A1 LHpFjah4gUx7bZ91ullpx14ap5yrPm8lWe2otIFcOjJMvQuOh9U/NIOyp+rf2+6Xrmg0 K/jjCH1h09p/znai6TwDT4deZDmyUJnoCV7lmcL2+cbt6z4+TEj4IYz6k+SjiF1GYPBQ N/0BMzzL/l7t8HgIeLPs75W9SVNND6FAHlSCby40aHMJglLUsymbwyBt6xIVHAUIRZzO k9/A==
X-Gm-Message-State: AO0yUKWkKW9HvIFX54mAroGI9APkF7kDzRv5QAUyNV/4ilFvxRpOwPDA 13hnRUHtOMt3MWpvxl3ywqp77P6E0+Wxq1fHH4w=
X-Google-Smtp-Source: AK7set9qLj/GX7I9AHdr1BlDe6kQhYQ32POBILCyQl3jZSZNgfKPdGKAikK/iT0x0FJup+yzW5oBCvqGeLMDJAzfqfM=
X-Received: by 2002:a05:620a:1584:b0:742:32aa:5f1e with SMTP id d4-20020a05620a158400b0074232aa5f1emr167067qkk.0.1678412637410; Thu, 09 Mar 2023 17:43:57 -0800 (PST)
MIME-Version: 1.0
References: <CA+RyBmWC8fiUaQW0Hg0pMNX7H5yJ4X0WxdHdzN2NvSsAf0pkyw@mail.gmail.com> <202303100930210400525@zte.com.cn>
In-Reply-To: <202303100930210400525@zte.com.cn>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 09 Mar 2023 17:43:45 -0800
Message-ID: <CA+RyBmVHSCFs9c=0O7n9rXX1CdPGA5cu=qk+dqgTGrspz8rFEQ@mail.gmail.com>
To: xiao.min2@zte.com.cn
Cc: rfc-editor@rfc-editor.org, leibo@chinatelecom.cn, ippm-ads@ietf.org, ippm-chairs@ietf.org, marcus.ihlar@ericsson.com, martin.h.duke@gmail.com, auth48archive@rfc-editor.org
Content-Type: multipart/alternative; boundary="0000000000000a196a05f681e577"
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/EL00BuXnxOcQmaqA1JLTPxRWUMs>
Subject: Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-ietf-ippm-ioam-conf-state-10> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Mar 2023 01:44:02 -0000
Hi Xiao Min, thank you for your kind consideration of my answers. Dear RFC Editor, it seems like Xiao Min and I have agreed on our responses to your questions. Please advise of any further steps we need to make. Regards, Greg On Thu, Mar 9, 2023 at 5:31 PM <xiao.min2@zte.com.cn> wrote: > Thank you for the reply, Greg. > > Please see inline... > Original > *From: *GregMirsky <gregimirsky@gmail.com> > *To: *rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>; > *Cc: *leibo@chinatelecom.cn <leibo@chinatelecom.cn>;ippm-ads@ietf.org < > ippm-ads@ietf.org>;ippm-chairs@ietf.org <ippm-chairs@ietf.org>; > marcus.ihlar@ericsson.com <marcus.ihlar@ericsson.com>; > martin.h.duke@gmail.com <martin.h.duke@gmail.com>; > auth48archive@rfc-editor.org <auth48archive@rfc-editor.org>;肖敏10093570; > *Date: *2023年03月10日 06:21 > *Subject: **Re: [ADs] AUTH48: RFC-to-be 9359 > <draft-ietf-ippm-ioam-conf-state-10> for your review* > Dear RFC Editor, > thank you for your thoughtful questions. Please find my answers in-line > below under the GIM>> tag. I have two alternative proposals. Please let me > know if you have any questions. > > Regards, > Greg > > On Tue, Mar 7, 2023 at 7:13 PM <xiao.min2@zte.com.cn> wrote: > >> Dear RFC Editor, >> >> >> Many thanks for your effort. >> >> Please see inline... >> Original >> *From: *rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org> >> *To: *肖敏10093570;gregimirsky@gmail.com <gregimirsky@gmail.com>; >> leibo@chinatelecom.cn <leibo@chinatelecom.cn>; >> *Cc: *rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>; >> ippm-ads@ietf.org <ippm-ads@ietf.org>;ippm-chairs@ietf.org < >> ippm-chairs@ietf.org>;marcus.ihlar@ericsson.com < >> marcus.ihlar@ericsson.com>;martin.h.duke@gmail.com < >> martin.h.duke@gmail.com>;auth48archive@rfc-editor.org < >> auth48archive@rfc-editor.org>; >> *Date: *2023年03月07日 11:50 >> *Subject: **Re: [ADs] AUTH48: RFC-to-be 9359 >> <draft-ietf-ippm-ioam-conf-state-10> for your review* >> Authors and *ADs, >> >> [*ADs - please see question 9 below.] >> >> >> While reviewing this document during AUTH48, please resolve (as necessary) the following questions, >> which are also in the XML file. >> >> >> 1) <!-- [rfced] We had the following questions regarding the document's title. >> >> a) Please note that the title of the document has been >> updated as follows to more similarly match related recently >> published RFCs. >> >> Original: >> Echo Request/Reply for Enabled In-situ OAM Capabilities >> >> Current: >> Echo Request/Reply for Enabled In Situ OAM (IOAM) Capabilities >> >> [XM]>>> This change looks good to me. >> > GIM>> I agree with the proposed update of the title. > >> >> b) Please review the short title of the document as "Ping" is only mentioned >> >> briefly in this document. >> >> Original: >> Ping Enabled IOAM Capabilities >> >> [XM]>>> "Ping" is used widely, so I lean to remain it as is. >> > GIM>> "Ping" is synonymous with Echo Request/Reply and traditionally used > as a shorter version. I think that is quite fitting for the short title. > >> --> >> >> >> >> 2) <!-- [rfced] Please insert any keywords (beyond those that appear in the >> title) for use on https://www.rfc-editor.org/search. >> >> [XM]>>> IPv6, MPLS, SFC, BIER. >> > GIM>> I agree with Xiao Min's proposal. > >> --> >> >> >> 3) <!-- [rfced] FYI, to avoid run-on sentence structure, we updated this >> following paragraph (adding "and" in "... NETCONF Client, and each IOAM >> ...." and adding "so" in "... NETCONF Server, so complexity can be >> ...."). Please let us know any objections. >> >> Original: >> * When NETCONF/YANG is used in this scenario, each IOAM >> encapsulating node (including the host when it takes the role of >> an IOAM encapsulating node) needs to implement a NETCONF Client, >> each IOAM transit and IOAM decapsulating node (including the host >> when it takes the role of an IOAM decapsulating node) needs to >> implement a NETCONF Server, the complexity can be an issue. >> Furthermore, each IOAM encapsulating node needs to establish a >> NETCONF Connection with each IOAM transit and IOAM decapsulating >> node, so scalability can be an issue. >> >> Current: >> * When NETCONF/YANG is used in this scenario, each IOAM >> encapsulating node (including the host when it takes the role of >> an IOAM encapsulating node) needs to implement a NETCONF Client, >> >> and each IOAM transit and IOAM decapsulating node (including the host >> when it takes the role of an IOAM decapsulating node) needs to >> implement a NETCONF Server, so complexity can be an issue. >> Furthermore, each IOAM encapsulating node needs to establish a >> NETCONF Connection with each IOAM transit and IOAM decapsulating >> node, so scalability can be an issue. >> >> [XM]>>> No objection. >> > GIM>> I agree with the proposed update; thank you. > >> --> >> >> >> 4) <!--[rfced] This text may need some clarification. If the "perhaps" >> text does not convey the intended meaning, please rephrase. >> >> Original: >> SoP (Size of POT) field has two bits, which means the size of "PktID" >> and "Cumulative" data that are specified in Section 4.5 of [RFC9197]. >> >> Perhaps: >> The SoP (Size of POT) field has two bits, which means the size of >> "PktID" and "Cumulative" data are those that are specified in >> Section 4.5 of [RFC9197]. >> >> [XM]>>> How about: >> >> The SoP (Size of POT) field has two bits, which means the size of >> "PktID" and "Cumulative" data, the two data are specified in >> Section 4.5 of [RFC9197]. >> > GIM>> I would propose another editorial update: > OLD TEXT: > SoP (Size of POT) field has two bits, which means the size of "PktID" > and "Cumulative" data that are specified in Section 4.5 of [RFC9197]. > NEW TEXT: > SoP (Size of POT) field has two bits that indicate the size of "PktID" > and "Cumulative" data, which are specified in Section 4.5 of [RFC9197]. > > WDYT? > > [XM-2]>>> The new text proposed by Greg looks good to me. > >> --> >> >> >> 5) <!-- [rfced] FYI - we have updated this text to use a list format for >> the ease of the reader. Please let us know any objections. >> >> Original: >> Once the IOAM encapsulating node is triggered to discover the enabled >> IOAM capabilities of each IOAM transit and IOAM decapsulating node, >> the IOAM encapsulating node will send echo requests that include the >> IOAM Capabilities Query Container. First, with TTL equal to 1 to >> reach the closest node, which may be an IOAM transit node or not. >> Then with TTL equal to 2 to reach the second-nearest node, which also >> may be an IOAM transit node or not. And further, increasing by 1 the >> TTL every time the IOAM encapsulating node sends a new echo request, >> until the IOAM encapsulating node receives an echo reply sent by the >> IOAM decapsulating node, which contains the IOAM Capabilities >> Response Container including the IOAM Edge-to-Edge Capabilities >> Object or the IOAM End-of-Domain Object. >> >> Current: >> Once the IOAM encapsulating node is triggered to discover the enabled >> IOAM capabilities of each IOAM transit and IOAM decapsulating node, >> the IOAM encapsulating node will send echo requests that include the >> IOAM Capabilities Query Container as follows: >> >> * First, with TTL equal to 1 to reach the closest node (which may or >> may not be an IOAM transit node). >> >> * Then, with TTL equal to 2 to reach the second-nearest node (which >> also may or may not be an IOAM transit node). >> >> * Then, further increasing by 1 the TTL every time the IOAM >> encapsulating node sends a new echo request, until the IOAM >> encapsulating node receives an echo reply sent by the IOAM >> decapsulating node (which contains the IOAM Capabilities Response >> Container including the IOAM Edge-to-Edge Capabilities Object or >> the IOAM End-of-Domain Object). >> >> [XM]>>> No objection. And I suggest to separate "Alternatively, if the >> IOAM encapsulating node...without TTL expiration." from the following >> paragraph, into a new paragraph. >> > GIM>> I agree with the proposed update. And I support the update proposed > by Xuiao Min. > >> --> >> >> >> 6) <!--[rfced] We do not see "RFC Required" mentioned at >> https://www.iana.org/assignments/ioam-capabilities/ioam-capabilities.xhtml >> . >> >> Please let us know if the registry needs an update of if the following text in this >> >> document needs an update. >> >> Original: >> New registries in this group can be created via RFC Required process >> as per [RFC8126]. >> [XM]>>> Please remove this sentence. >> > GIM>> I agree with Xiao Min's resolution. > >> --> >> >> >> >> 7) <!-- [rfced] FYI, to make the hierarchy of phrases ("whether ...", "whether >> ....", and "once ...") more clear, we updated the example in the sentence >> to the following. Please let us know any objections. >> >> Original: >> An implementation can also check whether the fields in received echo >> requests and replies strictly conform to the specifications, e.g., >> whether the list of IOAM Namespace-IDs includes duplicate entries, >> whether the received Namespace-ID is an operator-assigned or IANA- >> assigned one, once a check fails, an exception event indicating the >> checked field should be reported to the management. >> >> Current: >> An implementation can also check whether the fields in received echo >> requests and replies strictly conform to the specifications, e.g., >> whether the list of IOAM Namespace-IDs includes duplicate entries >> and whether the received Namespace-ID is an operator-assigned or IANA- >> assigned one, once a check fails, an exception event indicating the >> checked field should be reported to the management. >> >> [XM]>>> No objection. >> > GIM>> I agree with the proposed update. > >> --> >> >> >> 8) <!-- [rfced] For the reference entry for [I-D.ietf-bier-ping], the >> first author's name appears differently in various locations. How >> may we update for accuracy and consistency? >> >> "N. Kumar" in original >> "N.K. Nainar" in current (xi:include) >> "N. Nainar" in past RFCs >> >> [XM]>>> I believe the current one is up-to-date. >> > GIM>> I've checked published RFCs, e.g., RFC 8029. It appears that N. > Kumar is the right form. > > [XM-2]>>> I checked the latest one RFC 9214, where "N. Nainar" is used. > Considering his full name "Nagendra Kumar Nainar", I believe "N.K. Nainar" > is up-to-date. Anyway, either one works for me. :) > >> --> >> >> >> 9) <!-- [rfced] *ADs - please review and approve the changes to Sections >> 1, 2.2, 3.2, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, and 3.2.6 that >> were submitted by the authors while this document was in our >> queue. They are as follows: >> >> >> Section 1: >> >> a) >> Original: >> Furthermore, each IOAM encapsulating node needs to establish >> NETCONF Connection with each IOAM transit and IOAM decapsulating >> node, the scalability can be an issue. >> >> Updated: >> Furthermore, each IOAM encapsulating node needs to establish a >> NETCONF Connection with each IOAM transit and IOAM decapsulating >> node, so scalability can be an issue. >> >> b) >> Original: >> Fate sharing is a common requirement for all kinds of active OAM >> packets, echo request is among them, in this document that means echo >> request is required to traverse a path of IOAM data packet. This >> requirement can be achieved by, e.g., applying same explicit path or >> ECMP processing to both echo request and IOAM data packet. Specific >> >> to apply same ECMP processing to both echo request and IOAM data >> packet, one possible way is to populate the same value(s) of ECMP >> affecting field(s) in the echo request. >> >> Updated: >> Fate sharing is a common requirement for all kinds of active OAM >> packets including echo request. In this document that means echo >> request is required to traverse the path of an IOAM data packet. >> This requirement can be achieved by, e.g., applying the same explicit >> path or ECMP processing to both echo request and IOAM data packets. >> Specifically, the same ECMP processing can be applied to both echo >> request and IOAM data packets, by populating the same value(s) in >> ECMP affecting field(s) of the packets. >> >> ...... >> >> Section 2.2: >> >> Added to Abbreviations List: >> SoP: Size of POT >> TSF: TimeStamp Format >> ...... >> >> Section 3.2: >> >> Original: >> A list of IOAM capabilities objects (one >> or more objects) which contains the enabled IOAM capabilities MUST be >> included in this container of echo reply except the sender encounters >> an error (e.g., no matched Namespace-ID). >> >> Updated: >> A list of IOAM capabilities objects (one >> or more objects) which contains the enabled IOAM capabilities MUST be >> included in this container of echo reply unless the sender encounters >> an error (e.g., no matched Namespace-ID). >> >> ...... >> >> Sections 3.2.1, 3.2.2, 3.2.3, 3.2.4, and 3.2.5: >> >> Original: >> Reserved field is reserved for future use and MUST be set to zero, >> and MUST be ignored when non-zero. >> >> Updated: >> Reserved field MUST be zeroed on transmission and ignored on receipt. >> >> ...... >> >> Section 3.2.6: >> >> a) >> Original (in table): >> Must Be Zero >> >> Updated: >> Reserved >> >> b) >> Original: >> When the IOAM >> edge-to-edge function is enabled at the IOAM decapsulating node, it's >> RECOMMENDED to include only the IOAM Edge-to-Edge Capabilities Object >> but not the IOAM End-of-Domain Object. >> >> Updated: >> When the IOAM >> edge-to-edge function is enabled at the IOAM decapsulating node, >> including only the IOAM Edge-to-Edge Capabilities Object but not the >> IOAM End-of-Domain Object is RECOMMENDED. >> >> c) >> Added paragraph at end of section: >> Reserved field MUST be zeroed on transmission and ignored on receipt. >> >> ...... >> >> Acknowledgements: >> Added "Donald Eastlake") >> >> Original: >> The authors would like to acknowledge Tianran Zhou, Dhruv Dhody, >> Frank Brockners, Cheng Li, Gyan Mishra, Marcus Ihlar, Martin Duke, >> Chris Lonvick, Eric Vyncke, Alvaro Retana, Paul Wouters, Roman >> Danyliw, Lars Eggert, Warren Kumari, John Scudder, Robert Wilton, >> Erik Kline, Zaheduzzaman Sarker and Murray Kucherawy for their >> careful review and helpful comments. >> >> Updated: >> The authors would like to acknowledge Tianran Zhou, Dhruv Dhody, >> Frank Brockners, Cheng Li, Gyan Mishra, Marcus Ihlar, Martin Duke, >> Chris Lonvick, Eric Vyncke, Alvaro Retana, Paul Wouters, Roman >> Danyliw, Lars Eggert, Warren Kumari, John Scudder, Robert Wilton, >> Erik Kline, Zaheduzzaman Sarker, Murray Kucherawy, and Donald Eastlake >> for their careful review and helpful comments. >> --> >> >> >> 10) <!--[rfced] Terminology: we had the following questions related to the use of terminology >> >> throughout the document. >> >> a) IOAM domain: we see "IOAM-Domain" in RFC 9197. Please let us know if this term should be >> >> updated in this document. >> >> [XM]>>> Yes, this term should be updated in this document. >> > GIM>> Thank you for pointing this out. You're correct, should use > IOM-Domain. > >> >> b) Please review the use of both "Object Header" and "object header" in the body of Section 3.2. >> >> >> Should the capping scheme be made uniform there? Note also that we see "Object" capped in the first sentence of all of the 3.2.* subsections. Please confirm that this should not be made "object" or updated to the full name (e.g., in Section 3.2.6: "When the IOAM End-of-Domain Object is present..."). >> >> [XM]>>> Please do s/Object Header/object header in the body of Section >> 3.2. Please do s/Object/the-full-name in the first sentence of all of the >> 3.2.* subsections. >> > GIM>> It seems to me that in > Similar to the container, each object has an object header that is > used to identify the type and length of the object payload. > > "object header" refers to the field by its shortened name. If that is > right, I think that capitalization is needed. WDYT? > > [XM-2]>>> Make sense to me. To RFC Editor, Please do s/object > header/Object Header in the body of Section 3.2. Please do > s/Object/the-full-name in the first sentence of all of the 3.2.* > subsections. > > > Cheers, > > Xiao Min > >> >> c) Should IOAM be added here? >> >> Original: >> ...the End-of-Domain Object MUST be present in the IOAM Capabilities >> Response Container sent by an IOAM decapsulating node. >> >> Perhaps: >> >> ...the IOAM End-of-Domain Object MUST be present in the IOAM Capabilities >> Response Container sent by an IOAM decapsulating node.--> >> [XM]>>> Yes, IOAM should be added here. >> > GIM>> I agree as well. > >> >> Best Regards, >> >> Xiao Min >> >> >> Thank you. >> >> RFC Editor/st/mf >> >> *****IMPORTANT***** >> >> Updated 2023/03/06 >> >> RFC Author(s): >> -------------- >> >> Instructions for Completing AUTH48 >> >> Your document has now entered AUTH48. Once it has been reviewed and >> approved by you and all coauthors, it will be published as an RFC. >> If an author is no longer available, there are several remedies >> available as listed in the FAQ (https://www.rfc-editor.org/faq/). >> >> You and you coauthors are responsible for engaging other parties >> (e.g., Contributors or Working Group) as necessary before providing >> your approval. >> >> Planning your review >> --------------------- >> >> Please review the following aspects of your document: >> >> * RFC Editor questions >> >> Please review and resolve any questions raised by the RFC Editor >> that have been included in the XML file as comments marked as >> follows: >> >> <!-- [rfced] ... --> >> >> These questions will also be sent in a subsequent email. >> >> * Changes submitted by coauthors >> >> Please ensure that you review any changes submitted by your >> coauthors. We assume that if you do not speak up that you >> agree to changes submitted by your coauthors. >> >> * Content >> >> Please review the full content of the document, as this cannot >> change once the RFC is published. Please pay particular attention to: >> - IANA considerations updates (if applicable) >> - contact information >> - references >> >> * Copyright notices and legends >> >> Please review the copyright notice and legends as defined in >> RFC 5378 and the Trust Legal Provisions >> (TLP – https://trustee.ietf.org/license-info/). >> >> * Semantic markup >> >> Please review the markup in the XML file to ensure that elements of >> content are correctly tagged. For example, ensure that <sourcecode> >> and <artwork> are set correctly. See details at >> <https://authors.ietf.org/rfcxml-vocabulary>. >> >> * Formatted output >> >> Please review the PDF, HTML, and TXT files to ensure that the >> formatted output, as generated from the markup in the XML file, is >> reasonable. Please note that the TXT will have formatting >> limitations compared to the PDF and HTML. >> >> >> Submitting changes >> ------------------ >> >> To submit changes, please reply to this email using ‘REPLY ALL’ as all >> the parties CCed on this message need to see your changes. The parties >> include: >> >> * your coauthors >> >> * rfc-editor@rfc-editor.org (the RPC team) >> >> * other document participants, depending on the stream (e.g., >> IETF Stream participants are your working group chairs, the >> responsible ADs, and the document shepherd). >> >> * auth48archive@rfc-editor.org, which is a new archival mailing list >> >> to preserve AUTH48 conversations; it is not an active discussion >> list: >> >> * More info: >> >> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc >> >> * The archive itself: >> https://mailarchive.ietf.org/arch/browse/auth48archive/ >> >> * Note: If only absolutely necessary, you may temporarily opt out >> >> of the archiving of messages (e.g., to discuss a sensitive matter). >> If needed, please add a note at the top of the message that you >> have dropped the address. When the discussion is concluded, >> auth48archive@rfc-editor.org will be re-added to the CC list and >> >> its addition will be noted at the top of the message. >> >> You may submit your changes in one of two ways: >> >> An update to the provided XML file >> — OR — >> An explicit list of changes in this format >> >> Section # (or indicate Global) >> >> OLD: >> old text >> >> NEW: >> new text >> >> You do not need to reply with both an updated XML file and an explicit >> list of changes, as either form is sufficient. >> >> We will ask a stream manager to review and approve any changes that seem >> beyond editorial in nature, e.g., addition of new text, deletion of text, >> >> and technical changes. Information about stream managers can be found in >> >> the FAQ. Editorial changes do not require approval from a stream manager. >> >> >> Approving for publication >> -------------------------- >> >> To approve your RFC for publication, please reply to this email stating >> that you approve this RFC for publication. Please use ‘REPLY ALL’, >> as all the parties CCed on this message need to see your approval. >> >> >> Files >> ----- >> >> The files are available here: >> https://www.rfc-editor.org/authors/rfc9359.xml >> https://www.rfc-editor.org/authors/rfc9359.html >> https://www.rfc-editor.org/authors/rfc9359.pdf >> https://www.rfc-editor.org/authors/rfc9359.txt >> >> Diff file of the text: >> https://www.rfc-editor.org/authors/rfc9359-diff.html >> https://www.rfc-editor.org/authors/rfc9359-rfcdiff.html (side by side) >> >> Diff of the XML: >> https://www.rfc-editor.org/authors/rfc9359-xmldiff1.html >> >> The following files are provided to facilitate creation of your own >> diff files of the XML. >> >> Initial XMLv3 created using XMLv2 as input: >> https://www.rfc-editor.org/authors/rfc9359.original.v2v3.xml >> >> XMLv3 file that is a best effort to capture v3-related format updates >> only: >> https://www.rfc-editor.org/authors/rfc9359.form.xml >> >> >> Tracking progress >> ----------------- >> >> The details of the AUTH48 status of your document are here: >> https://www.rfc-editor.org/auth48/rfc9359 >> >> Please let us know if you have any questions. >> >> Thank you for your cooperation, >> >> RFC Editor >> >> -------------------------------------- >> RFC9359 (draft-ietf-ippm-ioam-conf-state-10) >> >> Title : Echo Request/Reply for Enabled In-situ OAM Capabilities >> Author(s) : X. Min, G. Mirsky, L. Bo >> WG Chair(s) : Marcus Ihlar, Tommy Pauly >> Area Director(s) : Martin Duke, Zaheduzzaman Sarker >> >> >> >> >
- [auth48] AUTH48: RFC-to-be 9359 <draft-ietf-ippm-… rfc-editor
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… rfc-editor
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… xiao.min2
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Greg Mirsky
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… xiao.min2
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Greg Mirsky
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Megan Ferguson
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Greg Mirsky
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… xiao.min2
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Megan Ferguson
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Greg Mirsky
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… xiao.min2
- Re: [auth48] Fw: [ADs] AUTH48: RFC-to-be 9359 <dr… leibo@chinatelecom.cn
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Megan Ferguson
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Megan Ferguson
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Martin Duke
- Re: [auth48] [ADs] AUTH48: RFC-to-be 9359 <draft-… Megan Ferguson