Re: [auth48] AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Thu, 28 September 2023 22:14 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17B9BC15155C; Thu, 28 Sep 2023 15:14:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="lD75HCko"; dkim=pass (1024-bit key) header.d=cisco.com header.b="P+XQ5O5R"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Lgfx5i7FxEI; Thu, 28 Sep 2023 15:14:42 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D09AC1388B7; Thu, 28 Sep 2023 15:14:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=64140; q=dns/txt; s=iport; t=1695939261; x=1697148861; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=2PdA7VMEGAw2uZ7zSPr32lZl3BZHi7YveUlPatcHVB8=; b=lD75HCkojJy8X3x3Yevq9pYJF8eIBQJ8F+X93qMWdWpFUEVD8yslkm/Y MEumYoFentWfthqzvZiiPFqw1YXfNV7jclY2cidJ+Aq+sAZbgeqSbsplF zQqedP+oT5/G2KdN5iU+Ederghz+62Tg33C3MdeZo/1GOyzDANz/KknPU A=;
X-CSE-ConnectionGUID: UhzYNFoyQNKbSSC19sWW4w==
X-CSE-MsgGUID: ahTCyHeuQCKD3ThTMKjY6g==
X-IPAS-Result: A0AHAAAN+hVlmIMNJK1aGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBZYEXBAEBAQELAYEzMVJ3AlkqEkeEUoNMA4UthkCCIwOLXIwJgTiEXxSBEQNWDwEBAQ0BATkLBAEBhQcCFoZ1AiY1CA4BAgICAQEBAQMCAwEBAQEBAQECAQEFAQEBAgEHBBQBAQEBAQEBAR4ZBQ4QJ4VoDYZJAQEBAQECEhEEBhMBAQUyAQ8CAQgRBAEBIQEGAwICAh8RFAkIAgQBDQUIGoJcAYIWFAMxAwEQBqg/AYFAAoooen8zgQGCCQEBBgQFMq9kDYJJAwaBSAGBX4YMHgGBTgEBgVyCDRiCAoIzJxuBSUSBFAFDgmg+giBCAgGBKgELBwEHHBUPBwmDJTmCL4UuhBmBZIEQggUVLgcygQsMCYEFgywqizgqgQgIXYFqPQINVAsLXYERgkQCAhE5FEdwGwMHA4EEECsHBDIbBwYJFi0lBlEELSQJExI+BIFngVEKgQY/EQ4RgkQiAgc2NhlLglsJFQY6TnYQKwQUF2wgCARqBRoVHjYREhcNAwh2HQIRIzwDBQMENgoVDQshBRRDA0cGTAsDAhwFAwMEgTYFDx4CEBoGDikDAxlOAhAUAz4DAwYDCzIDMFdLDFUDRB1AAwttPRQhFBsFBGRZBaFnChcDbYFyAXErEyYEHQoBCAIJFgIEHC8BSBgTCBMBIxEqCyCSTxKDCAFIinmKa4NRkzk/bwqEDJsVhigXhAGMb5gPYpgyIJE3kTMZgWSDGAIEAgQFAg4BAQaBZQI2a3BwFTuCZ1IZD44gGYNfhRSKZXYCOQIHAQoBAQMJiG6CWwEB
IronPort-PHdr: A9a23:4Oq6XxMBEQfBanCEITIl6nfLWUAX0o4cdiYc7p4hzrVWfbvmo9LpP VfU4rNmi1qaFYnY6vcRk+PNqOigQm0P55+drWoPOIJBTR4LiMga3kQgDceJBFe9LavCZC0hF 8MEX1hgrDmgKUYAIM/lfBXJp2GqqzsbGxHxLw1wc+v0HJXYgt64/+uz4JbUJQ5PgWn1bbZ7N h7jtQzKrYFWmd57N68rwx3Vo31FM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:6ghs0aAhLfP7SRVW/+Pjw5YqxClBgxIJ4kV8jS/XYbTApD5w1TYBy GYXUTvTbvaKNjCkcttzO9i38UkBsZSGy9NiOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hWGthh fuo+5eEYA7/i2YvWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAlDPb933pHAMEGZksao9GafImDT/KlxWRRe0Y0woo6bAElH8 fgebTsKdB3G3qS9wamwTa9ngcFLwMvDZdxE/Co+i2iCS699GPgvQI2SjTNc9DgxgNtEEOzRT 8EYcjFoKh/HZnWjP39OVsNvxbb02yaXnztwoVKpjrsX7nXq5y9di4TtDP/2eO3USpAA9qqfj juWozumav0AD/SW1CaFriKlnOTPnD32cJgcH/i1+v92h0fVwXYcYDUMW1D+rPW4lkmkc8hRI AkZ9isyqrJ081akJuQRRDWxpHqC+xUbQdcVSqsx6RqGzezf5APx6nU4oiBpVdw0hekYQi0T8 HyDpOjCXG10j4LJVifInluLlg+aNS8QJG4EQCYLSwoZ/tXuyL3faDqSE76P94bo07XI9SHML yOi93Fi3u1C5SIf/+DqoAGX3GvESo3hFFZtjjg7SF5J+e+QiGSNTZGm51Hf6p6sx67GEwna5 RDodyVihd3i4LmEkCiLBe4KBrzsvrCOMSbXhhhkGJxJG9WRF5yLI9o4DNJWfRgB3iM4ldnBO xC7VeR5v887AZdSRfUrC79d8uxzpUQaKfzrV+rPcv1FaYVreQmM8UlGPBDBgjG3zRh3zvlgY /93lPpA615EUMyLKxLoH48gPUMDnUjSOEuKH8mglkT7uVZgTCfLEe1t3KSyghARtfPY/1q9H yd3PMqRwBIXS/zlfiTS6uYuwaMicxAG6WTNg5UPLIare1M+cEl4UqO56e16IeRNwf8K/tokC 1ngACe0PnKl2y2eQehLA1g+AI7SsWFX9y1rZXx3bQ35ghDOo++Htc8iSnf+RpF+nMRLxv9vR P5DcMKFasmjgByek9jBRfERdLBfSSk=
IronPort-HdrOrdr: A9a23:bHZQNq8k5nBe0em/k3Buk+GXdr1zdoMgy1knxilNoENuA6+lfp GV/MjziyWUtN9IYgBQpTnhAsW9qXO1z+8N3WBjB8bTYOCGghrmEGgG1/qB/9SOIVyCygcw79 YGT0E6MqyPMbEYt7e13ODbKadd/DDvysnB7omuqgYIcegpUdAe0+4TMHfiLqQCfng9OXNPLu vm2iMonUvHRV0nKu6AKj0uWe/Fq9fXlJTgTyInKnccgjWmvHeD0pK/NwKX8Cs/flp0rIvK91 KrryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTFkG+TFcRccozHmApwjPCk6V4snt WJiQwnJd5P53TYeXzwiQfx2jPnzC0l5xbZuBylaDrY0I7ErQABeo58bLFiA1zkAo0bzZdBOZ dwriekXlxsfEr9dWrGloD1vlpR5zmJSDIZ4JwuZjpkIMojgHs7l/1EwKuTe61wRx7S+cQpFv JjA9rb4+sTeVSGb2rBtm0q29C0WG8vdy32CHTql/blmwS+pkoJhHcw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAiiVKCi8fF66MBDiDuUKKnjNo5n47PE84/yrYoUByN83lI 7aWF1VuGYucwblCNGI3pdM7hfRKV/NEAjF24Vb/dx0q7f8TL3kPWmKT00vidKpp7EFDsjSS5 +ISdtr6j/YXB3T8KpyrnrDssNpWAwjueUuy6IGZ24=
X-Talos-CUID: 9a23:bzBIX2OrPdMQYe5DZSl1xWg6HdEcVF7X90z7eh6jNlk1V+jA
X-Talos-MUID: 9a23:ORmlWwrR8vlVEKeebCUezzhiCOx5w6mzMWsuvc46u/WhFi5BZTjI2Q==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Sep 2023 22:14:19 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 38SMEJOn029966 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 28 Sep 2023 22:14:19 GMT
X-CSE-ConnectionGUID: QQiouKh4SDiqB3NgK4/AVQ==
X-CSE-MsgGUID: 3mFZssoxS7askJUmMXwPjA==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=ginsberg@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.03,185,1694736000"; d="scan'208,217";a="3055398"
Received: from mail-sn1nam02lp2047.outbound.protection.outlook.com (HELO NAM02-SN1-obe.outbound.protection.outlook.com) ([104.47.57.47]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Sep 2023 22:14:19 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZynmjLcYTm3jSjd50z6ZvwQ7uLqr8olmXGZ8Cqq8bYJ4SiKsIitX8KWBno6X+UaDb6ymzoQXNPhtAPK2NqGanascz4qWXTBRlBmjDDOKAR+bVCusqSNsjx4wadZxPvde65ZiBK4VP95L3pL6XqEVe++GWaiTRcJbjd6w8CmdQeICiiKHXpeggYo4UUKCImDDCdl0cMJ8ZAiOxBWuQwMOfL2bfmunSPP7kDWqHq4pA5+8UN92tZv8+UTFUYBO0W9tFAE/B/CplGc8C+t0TkLk8+c4nnQjJ7rSeSo/PC3wXKkA/MnKiWpAkgWEWJmUb+vgSTU06MaggsJghFalvxiAkA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2PdA7VMEGAw2uZ7zSPr32lZl3BZHi7YveUlPatcHVB8=; b=OSXqH6RlFn2WWhWij8/BGrFmLKrjCjJxH8w1JsX6V78Xc9M1YCe5H+VayW6kMfk+8HoqgJs2/YFiQWOjQGYNXDXso5VC2cwtipB7VezTytuERtQHx2wcWxTYJATJMYrt6ZJ+8zCx3k4Wun94nwWQjo99MZZ1GiOBxaF+9I1N7JCpSf0z7pIp2QxbNO03wRfbuvL+FNFUK6Hg+WD2MaontFS8//w+wFukgVayx1dCdy0mgfHP4wpyjzifSpGGDbZxXWDQMM2rmJ/+1ve1U+m1VC0lWdeF+h+adtYLN1euMvvb/7fl1vQLYCexlY8rPL/gviDKx+ewbffg0Umli6Tt2Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2PdA7VMEGAw2uZ7zSPr32lZl3BZHi7YveUlPatcHVB8=; b=P+XQ5O5RNPtJAS3VL8+ph3ZPe/Sm0VSxTC8CTt9ZkDgCQj09+BGq/Vr1VtT0iEJZJOKIICCp57zWtgKwbm2elBE7p6paiHPepwrqkMOCYSAFzQsnNFtCmrP0pn/R2Ksm5F/Td0H06mq97rbeVcZRFAv/evgeL9WA7y/m67s0Ei0=
Received: from MN2PR11MB4352.namprd11.prod.outlook.com (2603:10b6:208:18e::30) by SA3PR11MB7413.namprd11.prod.outlook.com (2603:10b6:806:31a::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.24; Thu, 28 Sep 2023 22:14:17 +0000
Received: from MN2PR11MB4352.namprd11.prod.outlook.com ([fe80::2b56:eba2:3878:e360]) by MN2PR11MB4352.namprd11.prod.outlook.com ([fe80::2b56:eba2:3878:e360%6]) with mapi id 15.20.6813.027; Thu, 28 Sep 2023 22:14:17 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Acee Lindem <acee.ietf@gmail.com>, Madison Church <mchurch@amsl.com>
CC: "Peter Psenak (ppsenak)" <ppsenak@cisco.com>, "wim.henderickx@nokia.com" <wim.henderickx@nokia.com>, "jefftant.ietf@gmail.com" <jefftant.ietf@gmail.com>, John E Drake <jdrake@juniper.net>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "lsr-ads@ietf.org" <lsr-ads@ietf.org>, "lsr-chairs@ietf.org" <lsr-chairs@ietf.org>, "chopps@chopps.org" <chopps@chopps.org>, "jgs@juniper.net" <jgs@juniper.net>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review
Thread-Index: AQHZ6pN8pEWJJnBQM0WunNfpsbrGkbAsc2GggALGqYCAAYcBAIAAG+ng
Date: Thu, 28 Sep 2023 22:14:17 +0000
Message-ID: <MN2PR11MB43524ED0EDA1ADFF70F080A7C1C1A@MN2PR11MB4352.namprd11.prod.outlook.com>
References: <20230919005146.DB8FAD844F@rfcpa.amsl.com> <BY5PR11MB4337EA2383AF85691B0EEB46C1C3A@BY5PR11MB4337.namprd11.prod.outlook.com> <60414D28-C438-4502-B114-3C0223A8E894@amsl.com> <B035DD7D-F0A5-4372-83FE-EE43EBD85B29@gmail.com>
In-Reply-To: <B035DD7D-F0A5-4372-83FE-EE43EBD85B29@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR11MB4352:EE_|SA3PR11MB7413:EE_
x-ms-office365-filtering-correlation-id: 5e31bea4-d5af-475c-0b05-08dbc07041bf
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB4352.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(136003)(396003)(346002)(366004)(376002)(230922051799003)(451199024)(186009)(64100799003)(1800799009)(2906002)(9686003)(316002)(4326008)(41300700001)(54906003)(8936002)(8676002)(64756008)(52536014)(21615005)(7416002)(5660300002)(53546011)(55016003)(66556008)(66476007)(76116006)(110136005)(86362001)(478600001)(166002)(71200400001)(7696005)(6506007)(33656002)(38100700002)(38070700005)(66574015)(26005)(122000001)(66446008)(66946007)(83380400001)(966005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB43524ED0EDA1ADFF70F080A7C1C1AMN2PR11MB4352namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB4352.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e31bea4-d5af-475c-0b05-08dbc07041bf
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Sep 2023 22:14:17.4483 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: T9rSoVhR4CaKR4bM8f/nF/M6x8KUWByXfVvBBipmmlAGAwwB8C1ed7708KPa0fyN+DsnQ9ZygCeoIbQ2AA/hIQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA3PR11MB7413
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/KuTwBYTqvxNwF9k_LEkWyDhWj1E>
Subject: Re: [auth48] AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Sep 2023 22:14:48 -0000

I am fine with all of the changes Acee has proposed.

  Les

From: Acee Lindem <acee.ietf@gmail.com>
Sent: Thursday, September 28, 2023 1:34 PM
To: Madison Church <mchurch@amsl.com>
Cc: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Peter Psenak (ppsenak) <ppsenak@cisco.com>; wim.henderickx@nokia.com; jefftant.ietf@gmail.com; John E Drake <jdrake@juniper.net>; rfc-editor@rfc-editor.org; lsr-ads@ietf.org; lsr-chairs@ietf.org; chopps@chopps.org; jgs@juniper.net; auth48archive@rfc-editor.org
Subject: Re: AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review

Hi Madison,

Actually, I spoke too soon and have some changes. I removed “new” in a few places where it was redundant.
I also updated contact information and included a couple readability improvements.


*** rfc9492.txt.orig Thu Sep 28 15:47:08 2023
--- rfc9492.txt Thu Sep 28 16:27:18 2023
***************
*** 27,33 ****
     attributes, the current advertisements do not support application-
     specific values for a given attribute, nor do they support indication
     of which applications are using the advertised value for a given
!    link.  This document introduces new link attribute advertisements in
     OSPFv2 and OSPFv3 that address both of these shortcomings.

     This document obsoletes RFC 8920.
--- 27,33 ----
     attributes, the current advertisements do not support application-
     specific values for a given attribute, nor do they support indication
     of which applications are using the advertised value for a given
!    link.  This document introduces link attribute advertisements in
     OSPFv2 and OSPFv3 that address both of these shortcomings.

     This document obsoletes RFC 8920.
***************
*** 134,140 ****
     the router that is an RSVP-TE head end sees the link attribute being
     advertised for that link, it assumes RSVP-TE is enabled on that link,
     even though it is not.  If such an RSVP-TE head-end router tries to
!    set up an RSVP-TE path via that link, it will result in the path
!    setup failure.

     An additional issue arises in cases where both applications are
--- 134,140 ----
     the router that is an RSVP-TE head end sees the link attribute being
     advertised for that link, it assumes RSVP-TE is enabled on that link,
     even though it is not.  If such an RSVP-TE head-end router tries to
!    set up an RSVP-TE path via that link, it will result in a setup
!    failure for the path.

     An additional issue arises in cases where both applications are
***************
*** 263,269 ****
  5.  Advertisement of Application-Specific Values

     To allow advertisement of the application-specific values of the link
!    attribute, a new Application-Specific Link Attributes (ASLA) sub-TLV
     is defined.  The ASLA sub-TLV is a sub-TLV of the OSPFv2 Extended
     Link TLV [RFC7684] and OSPFv3 Router-Link TLV [RFC8362].

--- 263,269 ----
  5.  Advertisement of Application-Specific Values

     To allow advertisement of the application-specific values of the link
!    attribute, an Application-Specific Link Attributes (ASLA) sub-TLV
     is defined.  The ASLA sub-TLV is a sub-TLV of the OSPFv2 Extended
     Link TLV [RFC7684] and OSPFv3 Router-Link TLV [RFC8362].

***************
*** 299,305 ****
     +-                                                             -+
     |                            ...                                |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
!    |                      Link Attribute sub-sub-TLVs              |
     +-                                                             -+
     |                            ...                                |

--- 299,305 ----
     +-                                                             -+
     |                            ...                                |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
!    |                      Link Attribute sub-TLVs                  |
     +-                                                             -+
     |                            ...                                |

***************
*** 373,379 ****
     previously defined link attributes can be kept and reused when
     advertising them in the ASLA sub-TLV.

!    If the same attribute is advertised in more than one ASLA sub-TLVs
     with the application listed in the Application Identifier Bit Masks,
     the application SHOULD use the first instance of advertisement and
     ignore any subsequent advertisements of that attribute.
--- 373,379 ----
     previously defined link attributes can be kept and reused when
     advertising them in the ASLA sub-TLV.

!    If the same attribute is advertised in more than one ASLA sub-TLV
     with the application listed in the Application Identifier Bit Masks,
     the application SHOULD use the first instance of advertisement and
     ignore any subsequent advertisements of that attribute.
***************
*** 778,784 ****
     limited to prevent a denial-of-service (DoS) attack (distributed or
     otherwise) from overloading the OSPF control plane.

!    This document defines a new way to advertise link attributes.
     Tampering with the information defined in this document may have an
     effect on applications using it, including impacting TE, which uses
     various link attributes for its path computation.  This is similar in
--- 778,784 ----
     limited to prevent a denial-of-service (DoS) attack (distributed or
     otherwise) from overloading the OSPF control plane.

!    This document defines an improved way to advertise link attributes.
     Tampering with the information defined in this document may have an
     effect on applications using it, including impacting TE, which uses
     various link attributes for its path computation.  This is similar in
***************
*** 795,801 ****

     *  the "OSPFv3 Extended-LSA Sub-TLVs" registry

!    The new values defined in this document have been allocated using the
     IETF Review procedure as described in [RFC8126].

  14.1.  OSPFv2
--- 795,801 ----

     *  the "OSPFv3 Extended-LSA Sub-TLVs" registry

!    The values defined in this document have been allocated using the
     IETF Review procedure as described in [RFC8126].

  14.1.  OSPFv2
***************
*** 889,895 ****
     advertisements MUST be used and the specific conditions under which
     they MUST NOT be used.

!    A new subsection discussing the use of zero-length Application
     Identifier Bit Masks has been added for greater consistency with
     [RFC9479].  See Section 12.2.

--- 889,895 ----
     advertisements MUST be used and the specific conditions under which
     they MUST NOT be used.

!    A subsection discussing the use of zero-length Application
     Identifier Bit Masks has been added for greater consistency with
     [RFC9479].  See Section 12.2.

***************
*** 1026,1038 ****
     should be considered as coauthors:

     Acee Lindem
!    Cisco Systems
     United States of America
!    Email: acee@cisco.com<mailto:acee@cisco.com>


     Ketan Talaulikar
!    Arrcus, Inc.
     India
     Email: ketant.ietf@gmail.com<mailto:ketant.ietf@gmail.com>

--- 1026,1038 ----
     should be considered as coauthors:

     Acee Lindem
!    LabN Consulting, L.L.C.
     United States of America
!    Email: acee.ietf@gmail.com<mailto:acee.ietf@gmail.com>


     Ketan Talaulikar
!    Cisco Systems
     India
     Email: ketant.ietf@gmail.com<mailto:ketant.ietf@gmail.com>

Thanks,
Acee



On Sep 27, 2023, at 5:14 PM, Madison Church <mchurch@amsl.com<mailto:mchurch@amsl.com>> wrote:

Hi Les,

Thank you for your reply! We have updated the document per your responses. We have a few followup questions/comments.

1) Regarding this requested change:


1)Section 5

"Standard Application Identifier Bit Mask:  Optional set of bits,
    where each bit represents a single standard application.  Bits are
    defined in the "Link Attribute Application Identifiers" registry,
    which is defined in [RFC8919]."

The reference should be updated to be the new RFC9479.

We have updated instances of [RFC8919] to [RFC9479]. Note that RFC-to-be 9479 is in AUTH48; we will publish this document at the same time as RFC-to-be 9479.


2) Regarding this requested change:


2)Section 5

"Bit 1 (S-bit):  Segment Routing Policy.  This is data plane
      independent."

This format does not match the same text in RFC9479(to be) which is currently shown as:

" S-bit:  Set to specify SR Policy (this is data plane independent)."

My personal preference is to keep the parentheses.

We have updated the S-bit definition as you suggest above to keep the parentheses; as you note, this matches the format in RFC-to-be 9479. Would you also like to use parentheses for the F-bit definition to match RFC 9479?

Current in this document:
Bit 2 (F-bit):  LFA.  Includes all LFA types.

Current in RFC 9479:
F-bit:  Set to specify an LFA (includes all LFA types).


3) Regarding Question 7:


7) <!-- [rfced] The following expansions are defined more than once
throughout the
document. May we use the abbreviated form for the following expansions
upon
first use per Section 3.6 of RFC 7322 ("RFC Style Guide")?

Loop-Free Alternates (LFAs)
Standard Application Bit Mask (SABM)
Segment Routing (SR)
traffic engineering (TE)
User Defined Application Bit Mask (UDABM) -->

Within the definition list in Section 5, we left the expanded forms of “Standard Application Identifier Bit Mask” and “User-Defined Application Identifier Bit Mask” as is to match the field names in the figure directly above.  If you prefer to use the abbreviated forms in the definition list, please let us know. Also, would it be correct to add “field” to the following entries for clarity as shown below?

Original:
SABM Length:  Standard Application Identifier Bit Mask Length in octets.

UDABM Length:  User-Defined Application Identifier Bit Mask Length in
   octets.

Perhaps:
SABM Length:  Length of the Standard Application Identifier Bit Mask field in
   octets.

UDABM Length:  Length of the User-Defined Application Identifier Bit Mask
   field in octets.


Updated XML file:
  https://www.rfc-editor.org/authors/rfc9492.xml

Updated output files:
  https://www.rfc-editor.org/authors/rfc9492.txt
  https://www.rfc-editor.org/authors/rfc9492.pdf
  https://www.rfc-editor.org/authors/rfc9492.html

Diff file showing all changes made during AUTH48:
  https://www.rfc-editor.org/authors/rfc9492-auth48diff.html

Diff files showing all changes:
  https://www.rfc-editor.org/authors/rfc9492-diff.html
  https://www.rfc-editor.org/authors/rfc9492-rfcdiff.html (side-by-side diff)

Note that it may be necessary for you to refresh your browser to view the most recent version.

For the AUTH48 status of this document, please see:
 https://www.rfc-editor.org/auth48/rfc9492

Thank you,
RFC Editor/mc