Re: [auth48] AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review

Jeff Tantsura <jefftant.ietf@gmail.com> Thu, 28 September 2023 23:22 UTC

Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 272EEC1519BC; Thu, 28 Sep 2023 16:22:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.212
X-Spam-Level:
X-Spam-Status: No, score=-1.212 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m39ew7Luifmz; Thu, 28 Sep 2023 16:22:03 -0700 (PDT)
Received: from mail-pl1-x635.google.com (mail-pl1-x635.google.com [IPv6:2607:f8b0:4864:20::635]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F6C7C151075; Thu, 28 Sep 2023 16:22:03 -0700 (PDT)
Received: by mail-pl1-x635.google.com with SMTP id d9443c01a7336-1bd9b4f8e0eso104365825ad.1; Thu, 28 Sep 2023 16:22:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1695943323; x=1696548123; darn=rfc-editor.org; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:from:to:cc:subject:date:message-id :reply-to; bh=HIs+uB2SHA+2GyAnskJV73EgmtBUFzmmdNsv2gMbnoA=; b=NRvQ01pjI39oDd5ryKVMqYwcXZ9/IyOOrFTD25wIeknvkTwXokVbsY5Sp6N7PUiUQO esr6ot18Q9CYIfR6rxa4ouZkax1Lop6JyrjFOi06unDGA0eJo/+Mm+B572r+d1CzVXNf gUO59KKZ6WkdYUPWE4qKFExv76b8GsQT8/CLM5+tge3AAX0be1oYCbyld1QYMU6eskfg PDHWvsKqrNc4WD3imimhK8nnvQYs4PojNpSK3FRNLcX2QVI7SfniqWhEyDsgWBZTAHvM nKIbp3mg4KfA3MyGWMIVkAjfHJ9V8cNmuDmKW+C8EYXtdvktprd/Pm170ClHZw+i33GM cmxQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695943323; x=1696548123; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=HIs+uB2SHA+2GyAnskJV73EgmtBUFzmmdNsv2gMbnoA=; b=pLSVY3cL069uqPSn9yz9eFaFVJv0hyG7l/XJ6qPOTcNh7xF4uHvaXc4DKBkhw56oqJ xc9r8GMdyMeSBSoQogHO2O4CmrtnjUPAZydmeI5wWn+F0Kt0rcx4yM/hY4mR1ezBh+6U bXV1R030eyBndTv7kWKedNHKp5Dgp0J4+oiq9UbLNxLXfGVOucqqLjBZj/eDomAcbRJK fwmON7gWyX0l/nQ4MsMEDq4PfdSk3T2ojGFBaOZ5bfvAM6p/P01cp5UI4qLqnjBx525A FYmnUcNBU/GcaLC45KbLCdpspoVOQg82wrl8knV5+acedzsl05ooju1I4583Bu3knwRj Qhxw==
X-Gm-Message-State: AOJu0YyBVzsgV/48mZXg/Y/g0CP9AqsjpbpL773dxb2ojQ0qn36rrbLD roTNi5whS0GlurTGck08bqA=
X-Google-Smtp-Source: AGHT+IFS7Tiby5yezFTsO95S1oVGcNZqv9OBD3eupDslHeMX+gd783TxbWPVj36xxI9OBvKAPUGoow==
X-Received: by 2002:a17:903:2452:b0:1c3:6e38:3943 with SMTP id l18-20020a170903245200b001c36e383943mr3169918pls.56.1695943322509; Thu, 28 Sep 2023 16:22:02 -0700 (PDT)
Received: from smtpclient.apple ([2607:fb90:370a:643f:bc3b:be85:f0de:a531]) by smtp.gmail.com with ESMTPSA id ju10-20020a170903428a00b001c613091aeasm9606677plb.297.2023.09.28.16.21.58 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 28 Sep 2023 16:22:02 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-38D68043-21E2-4AE7-A505-4195E63CA08A"
Content-Transfer-Encoding: 7bit
From: Jeff Tantsura <jefftant.ietf@gmail.com>
Mime-Version: 1.0 (1.0)
Date: Thu, 28 Sep 2023 16:21:47 -0700
Message-Id: <BD4CD315-1E5A-4F77-9E24-7C2FF5F22153@gmail.com>
References: <AM0PR07MB4497B3C9E139EC25D79483C983C1A@AM0PR07MB4497.eurprd07.prod.outlook.com>
Cc: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, Acee Lindem <acee.ietf@gmail.com>, Madison Church <mchurch@amsl.com>, "Peter Psenak (ppsenak)" <ppsenak@cisco.com>, John E Drake <jdrake@juniper.net>, rfc-editor@rfc-editor.org, lsr-ads@ietf.org, lsr-chairs@ietf.org, chopps@chopps.org, jgs@juniper.net, auth48archive@rfc-editor.org
In-Reply-To: <AM0PR07MB4497B3C9E139EC25D79483C983C1A@AM0PR07MB4497.eurprd07.prod.outlook.com>
To: "Wim Henderickx (Nokia)" <wim.henderickx@nokia.com>
X-Mailer: iPhone Mail (21A340)
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/NzTHz7I4kfqtyhgW6aoghq4LXDE>
Subject: Re: [auth48] AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Sep 2023 23:22:08 -0000

The changes look good to me.
Thanks!

Cheers,
Jeff

On Sep 28, 2023, at 16:04, Wim Henderickx (Nokia) <wim.henderickx@nokia.com> wrote:



I am good with the latest changes.

 

 

CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext for additional information.

 

I am fine with all of the changes Acee has proposed.

 

  Les

 

From: Acee Lindem <acee.ietf@gmail.com>
Sent: Thursday, September 28, 2023 1:34 PM
To: Madison Church <mchurch@amsl.com>
Cc: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Peter Psenak (ppsenak) <ppsenak@cisco.com>; wim.henderickx@nokia.com; jefftant.ietf@gmail.com; John E Drake <jdrake@juniper.net>; rfc-editor@rfc-editor.org; lsr-ads@ietf.org; lsr-chairs@ietf.org; chopps@chopps.org; jgs@juniper.net; auth48archive@rfc-editor.org
Subject: Re: AUTH48: RFC-to-be 9492 <draft-ietf-lsr-rfc8920bis-06> for your review

 

Hi Madison, 

 

Actually, I spoke too soon and have some changes. I removed “new” in a few places where it was redundant. 

I also updated contact information and included a couple readability improvements. 

 

 

*** rfc9492.txt.orig Thu Sep 28 15:47:08 2023

--- rfc9492.txt Thu Sep 28 16:27:18 2023

***************

*** 27,33 ****

     attributes, the current advertisements do not support application-

     specific values for a given attribute, nor do they support indication

     of which applications are using the advertised value for a given

!    link.  This document introduces new link attribute advertisements in

     OSPFv2 and OSPFv3 that address both of these shortcomings.

 

     This document obsoletes RFC 8920.

--- 27,33 ----

     attributes, the current advertisements do not support application-

     specific values for a given attribute, nor do they support indication

     of which applications are using the advertised value for a given

!    link.  This document introduces link attribute advertisements in

     OSPFv2 and OSPFv3 that address both of these shortcomings.

 

     This document obsoletes RFC 8920.

***************

*** 134,140 ****

     the router that is an RSVP-TE head end sees the link attribute being

     advertised for that link, it assumes RSVP-TE is enabled on that link,

     even though it is not.  If such an RSVP-TE head-end router tries to

!    set up an RSVP-TE path via that link, it will result in the path

!    setup failure.

 

     An additional issue arises in cases where both applications are

--- 134,140 ----

     the router that is an RSVP-TE head end sees the link attribute being

     advertised for that link, it assumes RSVP-TE is enabled on that link,

     even though it is not.  If such an RSVP-TE head-end router tries to

!    set up an RSVP-TE path via that link, it will result in a setup

!    failure for the path.

 

     An additional issue arises in cases where both applications are

***************

*** 263,269 ****

  5.  Advertisement of Application-Specific Values

 

     To allow advertisement of the application-specific values of the link

!    attribute, a new Application-Specific Link Attributes (ASLA) sub-TLV

     is defined.  The ASLA sub-TLV is a sub-TLV of the OSPFv2 Extended

     Link TLV [RFC7684] and OSPFv3 Router-Link TLV [RFC8362].

 

--- 263,269 ----

  5.  Advertisement of Application-Specific Values

 

     To allow advertisement of the application-specific values of the link

!    attribute, an Application-Specific Link Attributes (ASLA) sub-TLV

     is defined.  The ASLA sub-TLV is a sub-TLV of the OSPFv2 Extended

     Link TLV [RFC7684] and OSPFv3 Router-Link TLV [RFC8362].

 

***************

*** 299,305 ****

     +-                                                             -+

     |                            ...                                |

     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

!    |                      Link Attribute sub-sub-TLVs              |

     +-                                                             -+

     |                            ...                                |

 

--- 299,305 ----

     +-                                                             -+

     |                            ...                                |

     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

!    |                      Link Attribute sub-TLVs                  |

     +-                                                             -+

     |                            ...                                |

 

***************

*** 373,379 ****

     previously defined link attributes can be kept and reused when

     advertising them in the ASLA sub-TLV.

 

!    If the same attribute is advertised in more than one ASLA sub-TLVs

     with the application listed in the Application Identifier Bit Masks,

     the application SHOULD use the first instance of advertisement and

     ignore any subsequent advertisements of that attribute.

--- 373,379 ----

     previously defined link attributes can be kept and reused when

     advertising them in the ASLA sub-TLV.

 

!    If the same attribute is advertised in more than one ASLA sub-TLV

     with the application listed in the Application Identifier Bit Masks,

     the application SHOULD use the first instance of advertisement and

     ignore any subsequent advertisements of that attribute.

***************

*** 778,784 ****

     limited to prevent a denial-of-service (DoS) attack (distributed or

     otherwise) from overloading the OSPF control plane.

 

!    This document defines a new way to advertise link attributes.

     Tampering with the information defined in this document may have an

     effect on applications using it, including impacting TE, which uses

     various link attributes for its path computation.  This is similar in

--- 778,784 ----

     limited to prevent a denial-of-service (DoS) attack (distributed or

     otherwise) from overloading the OSPF control plane.

 

!    This document defines an improved way to advertise link attributes.

     Tampering with the information defined in this document may have an

     effect on applications using it, including impacting TE, which uses

     various link attributes for its path computation.  This is similar in

***************

*** 795,801 ****

 

     *  the "OSPFv3 Extended-LSA Sub-TLVs" registry

 

!    The new values defined in this document have been allocated using the

     IETF Review procedure as described in [RFC8126].

 

  14.1.  OSPFv2

--- 795,801 ----

 

     *  the "OSPFv3 Extended-LSA Sub-TLVs" registry

 

!    The values defined in this document have been allocated using the

     IETF Review procedure as described in [RFC8126].

 

  14.1.  OSPFv2

***************

*** 889,895 ****

     advertisements MUST be used and the specific conditions under which

     they MUST NOT be used.

 

!    A new subsection discussing the use of zero-length Application

     Identifier Bit Masks has been added for greater consistency with

     [RFC9479].  See Section 12.2.

 

--- 889,895 ----

     advertisements MUST be used and the specific conditions under which

     they MUST NOT be used.

 

!    A subsection discussing the use of zero-length Application

     Identifier Bit Masks has been added for greater consistency with

     [RFC9479].  See Section 12.2.

 

***************

*** 1026,1038 ****

     should be considered as coauthors:

 

     Acee Lindem

!    Cisco Systems

     United States of America

!    Email: acee@cisco.com

 

 

     Ketan Talaulikar

!    Arrcus, Inc.

     India

     Email: ketant.ietf@gmail.com

 

--- 1026,1038 ----

     should be considered as coauthors:

 

     Acee Lindem

!    LabN Consulting, L.L.C.

     United States of America

!    Email: acee.ietf@gmail.com

 

 

     Ketan Talaulikar

!    Cisco Systems

     India

     Email: ketant.ietf@gmail.com

 

Thanks, 

Acee

 

 

 

On Sep 27, 2023, at 5:14 PM, Madison Church <mchurch@amsl.com> wrote:

Hi Les,

Thank you for your reply! We have updated the document per your responses. We have a few followup questions/comments.

1) Regarding this requested change:



1)Section 5

"Standard Application Identifier Bit Mask:  Optional set of bits,
    where each bit represents a single standard application.  Bits are
    defined in the "Link Attribute Application Identifiers" registry,
    which is defined in [RFC8919]."

The reference should be updated to be the new RFC9479.


We have updated instances of [RFC8919] to [RFC9479]. Note that RFC-to-be 9479 is in AUTH48; we will publish this document at the same time as RFC-to-be 9479.


2) Regarding this requested change:



2)Section 5

"Bit 1 (S-bit):  Segment Routing Policy.  This is data plane
      independent."

This format does not match the same text in RFC9479(to be) which is currently shown as:

" S-bit:  Set to specify SR Policy (this is data plane independent)."

My personal preference is to keep the parentheses.


We have updated the S-bit definition as you suggest above to keep the parentheses; as you note, this matches the format in RFC-to-be 9479. Would you also like to use parentheses for the F-bit definition to match RFC 9479?

Current in this document:
Bit 2 (F-bit):  LFA.  Includes all LFA types.

Current in RFC 9479:
F-bit:  Set to specify an LFA (includes all LFA types).


3) Regarding Question 7:



7) <!-- [rfced] The following expansions are defined more than once
throughout the
document. May we use the abbreviated form for the following expansions
upon
first use per Section 3.6 of RFC 7322 ("RFC Style Guide")?

Loop-Free Alternates (LFAs)
Standard Application Bit Mask (SABM)
Segment Routing (SR)
traffic engineering (TE)
User Defined Application Bit Mask (UDABM) -->


Within the definition list in Section 5, we left the expanded forms of “Standard Application Identifier Bit Mask” and “User-Defined Application Identifier Bit Mask” as is to match the field names in the figure directly above.  If you prefer to use the abbreviated forms in the definition list, please let us know. Also, would it be correct to add “field” to the following entries for clarity as shown below?

Original:
SABM Length:  Standard Application Identifier Bit Mask Length in octets.

UDABM Length:  User-Defined Application Identifier Bit Mask Length in
   octets.

Perhaps:
SABM Length:  Length of the Standard Application Identifier Bit Mask field in
   octets.

UDABM Length:  Length of the User-Defined Application Identifier Bit Mask
   field in octets.


Updated XML file:
  https://www.rfc-editor.org/authors/rfc9492.xml" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492.xml

Updated output files:
  https://www.rfc-editor.org/authors/rfc9492.txt" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492.txt
  https://www.rfc-editor.org/authors/rfc9492.pdf" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492.pdf
  https://www.rfc-editor.org/authors/rfc9492.html" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492.html

Diff file showing all changes made during AUTH48:
  https://www.rfc-editor.org/authors/rfc9492-auth48diff.html" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492-auth48diff.html

Diff files showing all changes:
  https://www.rfc-editor.org/authors/rfc9492-diff.html" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492-diff.html
  https://www.rfc-editor.org/authors/rfc9492-rfcdiff.html" rel="nofollow">https://www.rfc-editor.org/authors/rfc9492-rfcdiff.html (side-by-side diff)

Note that it may be necessary for you to refresh your browser to view the most recent version.

For the AUTH48 status of this document, please see:
 https://www.rfc-editor.org/auth48/rfc9492" rel="nofollow">https://www.rfc-editor.org/auth48/rfc9492

Thank you,
RFC Editor/mc