Re: [auth48] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-05> for your review

"Bernier, Daniel" <daniel.bernier@bell.ca> Thu, 20 April 2023 16:44 UTC

Return-Path: <prvs=4672d0152=daniel.bernier@bell.ca>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51D0EC14E515; Thu, 20 Apr 2023 09:44:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.593
X-Spam-Level:
X-Spam-Status: No, score=-1.593 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bell.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8PsFUkFtBSC1; Thu, 20 Apr 2023 09:44:04 -0700 (PDT)
Received: from ESA2-Dor.bell.ca (esa2-dor.bell.ca [204.101.223.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52442C15952A; Thu, 20 Apr 2023 09:43:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bell.ca; i=@bell.ca; q=dns/txt; s=ESAcorp; t=1682009030; x=1713545030; h=from:to:cc:date:message-id:references:in-reply-to: mime-version:subject; bh=Kchhati1742TZ3iXtZrusPImUXtFOLNAnzeBD5dwz5w=; b=A6/zbyfJfolA6EOrm9agwS0NBxwiYVI2nloYrGL5m1u0niYhUX/HtVTy PyLJd/NZxIUHYrnwEBUD8yDVJqoIBBg57deKmotwAHKS4HUVDdpmlvY7h NTdBkRoJqGSk4NdtJiauGDuMvw+6xOaE/CBG9YQL+tl5KOQQ4iV4EkCUH OT8k+KqD7pcBQUK6LVhuLiNgQHdBVTUzN8L+4Q0DjDO9Rirc9n6cakXo6 N7gNUgqlTYpceJ3cnH3XsRsle9kuBlsJ+hz3Cp4PiVDwAulNGIjoweXvB ZCBCUicbM0iurYeaMaRF1wa3++E5UcJGjCrKRnwcKHHAsJxOkZbNPbLAl A==;
Received: from dc5cmy-d01.bellca.int.bell.ca (HELO DG4MBX01-WYN.bell.corp.bce.ca) ([198.235.121.230]) by esa02corp-dor.bell.corp.bce.ca with ESMTP; 20 Apr 2023 12:43:47 -0400
Received: from DG4MBX03-WYN.bell.corp.bce.ca (142.182.18.29) by DG4MBX01-WYN.bell.corp.bce.ca (142.182.18.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Thu, 20 Apr 2023 12:43:47 -0400
Received: from DG4MBX03-WYN.bell.corp.bce.ca ([fe80::758f:83db:58c4:4fe8]) by DG4MBX03-WYN.bell.corp.bce.ca ([fe80::758f:83db:58c4:4fe8%2]) with mapi id 15.01.2507.016; Thu, 20 Apr 2023 12:43:47 -0400
From: "Bernier, Daniel" <daniel.bernier@bell.ca>
To: Sarah Tarrant <starrant@amsl.com>
CC: Martin Duke <martin.h.duke@gmail.com>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, RFC Errata System <rfc-editor@rfc-editor.org>, "ippm-ads@ietf.org" <ippm-ads@ietf.org>, IPPM Chairs <ippm-chairs@ietf.org>, Tommy Pauly <tpauly@apple.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>, "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
Thread-Topic: [EXT]Re: AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-05> for your review
Thread-Index: AQHZc6CJxg82Aju9jEeA3xLBwBNLCq80Z0yD
Date: Thu, 20 Apr 2023 16:43:47 +0000
Message-ID: <feb6adb7-30c5-420d-a8b4-a6b0dab296a9@email.android.com>
References: <20230327211350.435D288A97@rfcpa.amsl.com> <MWHPR11MB1311A5052D16C984013AC85EDA939@MWHPR11MB1311.namprd11.prod.outlook.com> <CABUE3Xn+ihFCOW9-=pdxdgiiEfYH0hgE2vYC9wF=cRqGkSMEsg@mail.gmail.com> <208277D8-B187-4F3A-A111-014868A0512D@amsl.com> <MWHPR11MB1311D291CF4008E212376A8CDA9B9@MWHPR11MB1311.namprd11.prod.outlook.com> <A2FCCE72-97C0-4EA1-84D4-FE749FB5E2D2@amsl.com> <CAM4esxRWEVVybCcOPJCSrvWFR_pajPO-MQZdxbCXbLJigGNjfQ@mail.gmail.com> <98A350E0-DC26-4892-A669-D9D0918A3AFD@amsl.com> <MWHPR11MB13117A97DE27560988FCE397DA989@MWHPR11MB1311.namprd11.prod.outlook.com> <CAMFZu3MPmG2H-LaWYPWqDKVGo78CaTfN55xMu16Q_GHBeCTfkA@mail.gmail.com> <3D5C1449-9C33-4E4B-AB9F-6FB690F7AFBB@amsl.com>, <4F0707EA-073F-4EC8-83F1-4F8B0DC47348@amsl.com>
In-Reply-To: <4F0707EA-073F-4EC8-83F1-4F8B0DC47348@amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: multipart/alternative; boundary="_000_feb6adb730c5420da8b4a6b0dab296a9emailandroidcom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/ju2dkBE5UF9mJ0br_evBy8N6Lwk>
Subject: Re: [auth48] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-05> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Apr 2023 16:44:08 -0000

Sorry

I approve the changes

On Apr 20, 2023 5:55 p.m., Sarah Tarrant <starrant@amsl.com> wrote:
Hi Daniel,

This is a friendly reminder that we await your review and approval prior to moving this document forward in the publication process.

The files have been posted here (please refresh):
 https://www.rfc-editor.org/authors/rfc9378.txt
 https://www.rfc-editor.org/authors/rfc9378.pdf
 https://www.rfc-editor.org/authors/rfc9378.html
 https://www.rfc-editor.org/authors/rfc9378.xml

The relevant diff files have been posted here (please refresh):
 https://www.rfc-editor.org/authors/rfc9378-diff.html (comprehensive diff)
 https://www.rfc-editor.org/authors/rfc9378-auth48diff.html (AUTH48 changes only)
 https://www.rfc-editor.org/authors/rfc9378-lastdiff.html (last to current version only)

The AUTH48 status page for this document is available here:
 https://www.rfc-editor.org/auth48/rfc9378

Thank you,
RFC Editor/st

> On Apr 13, 2023, at 11:19 AM, Sarah Tarrant <starrant@amsl.com> wrote:
>
> Hi Frank and Shwetha,
>
> We have updated your statuses to “Approved” at https://www.rfc-editor.org/auth48/rfc9378. We will await approval from Daniel prior to moving this document forward in the publication process.
>
> Thank you.
>
> RFC Editor/st
>
>> On Apr 13, 2023, at 1:53 AM, Shwetha Bhandari <shwetha.bhandari@thoughtspot.com> wrote:
>>
>> Hi Sarah,
>>
>> Thank for the edits, it looks good to me. I approve the changes as a co-author too.
>>
>> Thanks
>> Shwetha
>>
>> On Thu, 13 Apr 2023, 8:17 am Frank Brockners (fbrockne), <fbrockne@cisco.com> wrote:
>> Hi Sarah,
>>
>> Thanks for the changes. The document LGTM - I approve the doc as one of the authors.
>>
>> Cheers, Frank
>>
>>> -----Original Message-----
>>> From: Sarah Tarrant <starrant@amsl.com>
>>> Sent: Wednesday, 12 April 2023 19:38
>>> To: Martin Duke <martin.h.duke@gmail.com>
>>> Cc: Frank Brockners (fbrockne) <fbrockne@cisco.com>; Tal Mizrahi
>>> <tal.mizrahi.phd@gmail.com>; rfc-editor@rfc-editor.org;
>>> shwetha.bhandari@thoughtspot.com; daniel.bernier@bell.ca; ippm-
>>> ads@ietf.org; ippm-chairs@ietf.org; tpauly@apple.com; auth48archive@rfc-
>>> editor.org
>>> Subject: Re: [AD] AUTH48: RFC-to-be 9378 <draft-ietf-ippm-ioam-deployment-
>>> 05> for your review
>>>
>>> Hi Martin,
>>>
>>> We have updated your status to “Approved” at https://urldefense.com/v3/__https://www.rfc-__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ic04jIKHQ$
>>> editor.org/auth48/rfc9378.
>>>
>>> We will await approvals from the three remaining authors prior to moving this
>>> document forward in the publication process.
>>>
>>> Thank you.
>>>
>>> RFC Editor/st
>>>
>>>> On Apr 12, 2023, at 10:56 AM, Martin Duke <martin.h.duke@gmail.com>
>>> wrote:
>>>>
>>>> Revised Sec 3 LGTM
>>>>
>>>> On Wed, Apr 12, 2023 at 8:51 AM Sarah Tarrant <starrant@amsl.com> wrote:
>>>> Hi Frank and *Martin,
>>>>
>>>> [*Martin - just a reminder that we are requesting your review/approval
>>>> of the text added to Section 3 as highlighted in the following diff:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-auth48diff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie42ABwRw$ .]
>>>>
>>>> Thank you for your reply and guidance. We have updated accordingly.
>>>>
>>>> Please review the files carefully as we do not make changes after publication.
>>>>
>>>> The files have been posted here (please refresh):
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.txt__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6if4NY2luQ$
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.pdf__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6icJu4AWbQ$
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6id1Xfzapg$
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.xml__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie_OoT5uQ$
>>>>
>>>> The relevant diff files have been posted here (please refresh):
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-diff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6idAknQYQw$  (comprehensive diff)
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-auth48diff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie42ABwRw$  (AUTH48
>>> changes only)
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-lastdiff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6icDlde-ow$  (last to
>>>> current version only)
>>>>
>>>> Please contact us with any further updates/questions/comments you may
>>> have.
>>>>
>>>> We will await approvals from each of the parties listed on the AUTH48 status
>>> page prior to moving forward to publication.
>>>>
>>>> The AUTH48 status page for this document is available here:
>>>>  https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9378__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ieZ3UiMwA$
>>>>
>>>> Thank you.
>>>>
>>>> RFC Editor/st
>>>>
>>>>> On Apr 12, 2023, at 3:44 AM, Frank Brockners (fbrockne)
>>> <fbrockne@cisco.com> wrote:
>>>>>
>>>>> Hi Sarah,
>>>>>
>>>>> Thanks for the updates. Please see inline.. ("..FB")
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Sarah Tarrant <starrant@amsl.com>
>>>>>> Sent: Friday, 7 April 2023 17:00
>>>>>> To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>; Frank Brockners
>>>>>> (fbrockne) <fbrockne@cisco.com>; martin.h.duke@gmail.com
>>>>>> Cc: rfc-editor@rfc-editor.org; shwetha.bhandari@thoughtspot.com;
>>>>>> daniel.bernier@bell.ca; ippm-ads@ietf.org; ippm-chairs@ietf.org;
>>>>>> tpauly@apple.com; auth48archive@rfc-editor.org
>>>>>> Subject: Re: [AD] AUTH48: RFC-to-be 9378
>>>>>> <draft-ietf-ippm-ioam-deployment-
>>>>>> 05> for your review
>>>>>>
>>>>>> Hi Frank and Tal (and *Martin),
>>>>>>
>>>>>> [*Martin - please review and approve the changes highlighted at the
>>>>>> beginning of Section 3 in the AUTH48 diff file below.]
>>>>>>
>>>>>> Thank you for your replies and guidance.  We have marked Tal as
>>>>>> “approved" at the AUTH48 status page (see below).  We will assume
>>>>>> Tal’s assent to any further changes provided by the coauthors unless we
>>> hear otherwise at that time.
>>>>>>
>>>>>> Please review the following further questions that arose while we
>>>>>> implemented the requested updates.  We will await your responses to
>>>>>> these questions prior to moving the document forward in the publication
>>> process.
>>>>>>
>>>>>> 1) Regarding question 5, please let us know if any further updates
>>>>>> were necessary regarding point b or if you would like to keep the text as is.
>>>>>
>>>>> ...FB: See below for a minor suggestion.
>>>>>
>>>>>>
>>>>>>>>> 5) <!-- [rfced] We had two questions related to the first two subpoints
>>>>>>>>>  in the list in Section 4:
>>>>>>>>>
>>>>>>>>> a) To make the two nested points parallel, should the second
>>>>>>>>> point be rewritten
>>>>>>>>> ("Operations/Troubleshooting: Understand" updated to "With
>>>>>>>>> regard to operations and troubleshooting, understand...")?  Or
>>>>>>>>> should the first nested point have a similar introduction to the second?
>>>>>>>>> Please let us know if our suggestion below is a viable solution
>>>>>>>>> or if there is another way to rephrase.
>>>>>>>>>
>>>>>>>>> b) Also, please clarify the two instances of "Understand".  Who
>>>>>>>>> is understanding the different paths?  Or is there another way
>>>>>>>>> to clarify
>>>>>> "Understand"?
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>>   Potential uses of IOAM per-hop tracing include:
>>>>>>>>>
>>>>>>>>>   -  Understand the different paths different packets traverse
>>>>>>>>>      between an IOAM encapsulating and an IOAM decapsulating node in
>>>>>>>>>      a network that uses load balancing such as Equal Cost Multi-
>>>>>>>>>      Path (ECMP).  This information could be used to tune the
>>>>>>>>>      algorithm for ECMP for optimized network resource usage.
>>>>>>>>>
>>>>>>>>>   -  Operations/Troubleshooting: Understand which path a particular
>>>>>>>>>      packet or set of packets take as well as what amount of jitter
>>>>>>>>>      and delay different IOAM nodes in the path contribute to the
>>>>>>>>>      overall delay and jitter between the IOAM encapsulating node
>>>>>>>>>      and the IOAM decapsulating node.
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>>   Potential uses of IOAM per-hop tracing include:
>>>>>>>>>
>>>>>>>>>   -  Understanding the different paths different packets traverse
>>>>>>>>>      between an IOAM encapsulating and an IOAM decapsulating node in
>>>>>>>>>      a network that uses load-balancing such as Equal Cost Multi-
>>>>>>>>>      Path (ECMP).  This information could be used to tune the
>>>>>>>>>      algorithm for ECMP for optimized network resource usage.
>>>>>>>>>
>>>>>>>>>   -  With regard to operations and troubleshooting, understanding
>>> which
>>>>>>>>>      path a particular packet or set of packets take as well as what
>>>>>>>>>    amount of jitter and delay different IOAM nodes in the path
>>>>>>>>>    contribute to the overall delay and jitter between the IOAM
>>>>>>>>>    encapsulating node and the IOAM decapsulating node.
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: I like your proposal.
>>>>>
>>>>> ...FB: IMHO it would be good to mention "IOAM encapsulating node" in the
>>> sentence below, rather than just "IOAM encapsulating". But this is just my
>>> "feeling" as a non-native English speaker.
>>>>>
>>>>> CURRENT:
>>>>>     *  Understanding the different paths that different packets
>>>>>        traverse between an IOAM encapsulating and an IOAM
>>>>>        decapsulating node in a network that uses load balancing, such
>>>>>        as Equal Cost Multi-Path (ECMP).  This information could be
>>>>>        used to tune the algorithm for ECMP for optimized network
>>>>>        resource usage.
>>>>>
>>>>> NEW:
>>>>>     *  Understanding the different paths that different packets
>>>>>        traverse between an IOAM encapsulating node and an IOAM
>>>>>        decapsulating node in a network that uses load balancing, such
>>>>>        as Equal Cost Multi-Path (ECMP).  This information could be
>>>>>        used to tune the algorithm for ECMP for optimized network
>>>>>        resource usage.
>>>>>
>>>>>>
>>>>>>
>>>>>> 2) Regarding question 6, where Frank wrote:
>>>>>>
>>>>>>>> NEW:
>>>>>>>>
>>>>>>>> *  Generic data, that is format-free information, where the syntax and
>>>>>>>>    semantics of the information are defined by the operator in a specific
>>>>>>>>    deployment.
>>>>>>
>>>>>> please note that we further updated to use “Generic data, which is
>>>>>> format-free information, where…” as we assume the intention is to
>>>>>> give further information on the generic data (not to contrast it with generic
>>> data that is not format-free).
>>>>>> Please let us know any objections.
>>>>>
>>>>> ...FB: ACK. The change to "which" makes sense.
>>>>>
>>>>>>
>>>>>>
>>>>>> 3) When making terminology updates, we wanted to clarify the following:
>>>>>>
>>>>>> a) Please confirm that the “Perhaps” text below is an *example* of
>>>>>> a desired update (similar text occurs elsewhere).
>>>>>>
>>>>>> Original:
>>>>>> The incremental IOAM-Trace-Option-Type eliminates the need for the
>>>>>> IOAM transit nodes to read the full array in the Trace-Option-Type
>>>>>> and allows packets to grow to the size of the MTU of the IOAM domain.
>>>>>>
>>>>>> Current:
>>>>>> The incremental IOAM Trace
>>>>>> Option-Type eliminates the need for the IOAM transit nodes to read
>>>>>> the full array in the Trace Option-Type and allows packets to grow
>>>>>> to the size of the MTU of the IOAM-Domain.
>>>>>>
>>>>>> Perhaps:
>>>>>> The IOAM Incremental Trace
>>>>>> Option-Type eliminates the need for the IOAM transit nodes to read
>>>>>> the full array in the Trace Option-Type and allows packets to grow
>>>>>> to the size of the MTU of the IOAM-Domain.
>>>>>
>>>>> ...FB: Agreed. Your suggestion is more accurate.
>>>>>
>>>>>>
>>>>>> b) We were uncertain about the updates to “Active flag” per the
>>>>>> author
>>>>>> response:
>>>>>>
>>>>>>> Original:
>>>>>>> IOAM active mode flag
>>>>>>> Active flag
>>>>>>>
>>>>>>> Perhaps:
>>>>>>> Active flag (per RFC 9322)
>>>>>>
>>>>>> ...FB: Agreed.
>>>>>>
>>>>>>>
>>>>>>> See also IOAM Active Mode.
>>>>>>
>>>>>>
>>>>>> Should the title of Section 7.6 be updated as follows?
>>>>>>
>>>>>> Current:
>>>>>> IOAM Active Mode
>>>>>>
>>>>>> Perhaps:
>>>>>> Active Flag
>>>>>
>>>>> ...FB: Agreed. Keeping things consistent with RFC 9322 is appreciated.
>>>>>
>>>>> ...FB: In order to keep things consistent in the document, IMHO it
>>>>> would make sense to also change4
>>>>>
>>>>> CURRENT:
>>>>>
>>>>> 7.5.  IOAM Loopback
>>>>>
>>>>> NEW:
>>>>>
>>>>> 7.5.  Loopback flag
>>>>>
>>>>>>
>>>>>> See also:
>>>>>>
>>>>>> Current:
>>>>>> Example use cases for IOAM Active Mode include:
>>>>>>
>>>>>> Perhaps:
>>>>>> Example use cases for the Active flag include:
>>>>>
>>>>> ...FB: Agreed.
>>>>>
>>>>>>
>>>>>>
>>>>>> We have updated the document with all the other changes as
>>>>>> requested.  Please review these updates carefully as we do not make
>>>>>> changes once the document is published as an RFC.  We will
>>>>>> approvals from each coauthor prior to moving the document forward in the
>>> publication process.
>>>>>
>>>>>
>>>>> ...FB: When reading through the document, I found another minor
>>> inconsistency in language in section 10 ("Direct Exporting mode" vs. "Direct
>>> Exporting"). IMHO it would be good to avoid "mode" here as well and just refer
>>> to "Direct Exporting"
>>>>>
>>>>> CURRENT:
>>>>>
>>>>>  IOAM data can be subject to eavesdropping.  Although the
>>>>>  confidentiality of the user data is not at risk in this context, the
>>>>>  IOAM data elements can be used for network reconnaissance, allowing
>>>>>  attackers to collect information about network paths, performance,
>>>>>  queue states, buffer occupancy, and other information.  Recon is an
>>>>>  improbable security threat in an IOAM deployment that is within a
>>>>>  confined physical domain.  However, in deployments that are not
>>>>>  confined to a single LAN but span multiple interconnected sites (for
>>>>>  example, using an overlay network), the inter-site links are expected
>>>>>  to be secured (e.g., by IPsec) in order to avoid external
>>>>>  eavesdropping and introduction of malicious or false data.  Another
>>>>>  possible mitigation approach is to use the "Direct Exporting" mode
>>>>>  [RFC9326].  In this case, the IOAM-related trace information would
>>>>>  not be available in the customer data packets but would trigger the
>>>>>  exporting of (secured) packet-related IOAM information at every node.
>>>>>  IOAM data export and securing IOAM data export is outside the scope
>>>>>  of this document.
>>>>>
>>>>> [...]
>>>>>
>>>>>  Notably, IOAM is expected to be deployed in limited network domains
>>>>>  [RFC8799], thus, confining the potential attack vectors within the
>>>>>  limited domain.  Indeed, in order to limit the scope of threats
>>>>>  within the current network domain, the network operator is expected
>>>>>  to enforce policies that prevent IOAM traffic from leaking outside
>>>>>  the IOAM-Domain and prevent an attacker from introducing malicious or
>>>>>  false IOAM data to be processed and used within the IOAM-Domain.
>>>>>  IOAM data leakage could lead to privacy issues.  Consider an IOAM
>>>>>  encapsulating node that is a home gateway in an operator's network.
>>>>>  A home gateway is often identified with an individual.  Revealing
>>>>>  IOAM data, such as "IOAM node identifier" or geolocation information
>>>>>  outside of the limited domain, could be harmful for that user.  Note
>>>>>  that the Direct Exporting mode [RFC9326] can mitigate the potential
>>>>>  threat of IOAM data leaking through data packets.
>>>>>
>>>>> NEW:
>>>>>  IOAM data can be subject to eavesdropping.  Although the
>>>>>  confidentiality of the user data is not at risk in this context, the
>>>>>  IOAM data elements can be used for network reconnaissance, allowing
>>>>>  attackers to collect information about network paths, performance,
>>>>>  queue states, buffer occupancy, and other information.  Recon is an
>>>>>  improbable security threat in an IOAM deployment that is within a
>>>>>  confined physical domain.  However, in deployments that are not
>>>>>  confined to a single LAN but span multiple interconnected sites (for
>>>>>  example, using an overlay network), the inter-site links are expected
>>>>>  to be secured (e.g., by IPsec) in order to avoid external
>>>>>  eavesdropping and introduction of malicious or false data.  Another
>>>>>  possible mitigation approach is to use "Direct Exporting"
>>>>>  [RFC9326].  In this case, the IOAM-related trace information would
>>>>>  not be available in the customer data packets but would trigger the
>>>>>  exporting of (secured) packet-related IOAM information at every node.
>>>>>  IOAM data export and securing IOAM data export is outside the scope
>>>>>  of this document.
>>>>>
>>>>> [...]
>>>>>
>>>>>  Notably, IOAM is expected to be deployed in limited network domains
>>>>>  [RFC8799], thus, confining the potential attack vectors within the
>>>>>  limited domain.  Indeed, in order to limit the scope of threats
>>>>>  within the current network domain, the network operator is expected
>>>>>  to enforce policies that prevent IOAM traffic from leaking outside
>>>>>  the IOAM-Domain and prevent an attacker from introducing malicious or
>>>>>  false IOAM data to be processed and used within the IOAM-Domain.
>>>>>  IOAM data leakage could lead to privacy issues.  Consider an IOAM
>>>>>  encapsulating node that is a home gateway in an operator's network.
>>>>>  A home gateway is often identified with an individual.  Revealing
>>>>>  IOAM data, such as "IOAM node identifier" or geolocation information
>>>>>  outside of the limited domain, could be harmful for that user.  Note
>>>>>  that Direct Exporting [RFC9326] can mitigate the potential
>>>>>  threat of IOAM data leaking through data packets.
>>>>>
>>>>> Cheers, Frank
>>>>>
>>>>>
>>>>>>
>>>>>> The files have been posted here (please refresh):
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.txt__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6if4NY2luQ$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.pdf__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6icJu4AWbQ$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6id1Xfzapg$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.xml__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie_OoT5uQ$
>>>>>>
>>>>>> The relevant diff files have been posted here (please refresh):
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-diff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6idAknQYQw$  (comprehensive
>>>>>> diff) https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-rfcdiff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ic-AN-pqw$
>>>>>> (comprehensive
>>>>>> rfcdiff)
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-auth48diff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie42ABwRw$  (AUTH48
>>>>>> changes only)
>>>>>>
>>>>>> The AUTH48 status page is viewable at:
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9378__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ieZ3UiMwA$
>>>>>>
>>>>>> Thank you.
>>>>>>
>>>>>> RFC Editor/st
>>>>>>> On Apr 5, 2023, at 9:02 AM, Tal Mizrahi <tal.mizrahi.phd@gmail.com>
>>> wrote:
>>>>>>>
>>>>>>> Dear RFC Editorial Team,
>>>>>>>
>>>>>>> I agree with Frank's comments.
>>>>>>> I approve.
>>>>>>>
>>>>>>> Thanks,
>>>>>>> Tal.
>>>>>>>
>>>>>>> On Tue, Apr 4, 2023 at 9:26 PM Frank Brockners (fbrockne)
>>>>>>> <fbrockne@cisco.com> wrote:
>>>>>>>>
>>>>>>>> Dear Sarah, RFC-Editor team,
>>>>>>>>
>>>>>>>>> -----Original Message-----
>>>>>>>>> From: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>
>>>>>>>>> Sent: Monday, 27 March 2023 23:14
>>>>>>>>> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>;
>>>>>>>>> shwetha.bhandari@thoughtspot.com; daniel.bernier@bell.ca;
>>>>>>>>> tal.mizrahi.phd@gmail.com
>>>>>>>>> Cc: rfc-editor@rfc-editor.org; ippm-ads@ietf.org;
>>>>>>>>> ippm-chairs@ietf.org; tpauly@apple.com; martin.h.duke@gmail.com;
>>>>>>>>> auth48archive@rfc-editor.org
>>>>>>>>> Subject: Re: AUTH48: RFC-to-be 9378
>>>>>>>>> <draft-ietf-ippm-ioam-deployment-05>
>>>>>>>>> for your review
>>>>>>>>>
>>>>>>>>> Authors,
>>>>>>>>>
>>>>>>>>> While reviewing this document during AUTH48, please resolve (as
>>>>>>>>> necessary) the following questions, which are also in the XML file.
>>>>>>>>>
>>>>>>>>> 1) <!-- [rfced] Please note that the title of the document has
>>>>>>>>> been updated as follows to more similarly match related recently
>>> published RFCs.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> In-situ OAM Deployment
>>>>>>>>>
>>>>>>>>> Current:
>>>>>>>>> In Situ Operations, Administration, and Maintenance (IOAM)
>>>>>>>>> Deployment
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: ACK.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 2) <!-- [rfced] We suggest updating the following text for the ease of
>>>>>>>>>   the reader.  Please let us know any objections.
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM mechanisms can be
>>>>>>>>> leveraged where mechanisms using e.g., ICMP do not apply or do
>>>>>>>>> not  offer the desired results, such as proving that a certain
>>>>>>>>> traffic  flow takes a pre-defined path, SLA verification for the
>>>>>>>>> live data  traffic, detailed statistics on traffic distribution
>>>>>>>>> paths in  networks that distribute traffic across multiple
>>>>>>>>> paths, or scenarios  in which probe traffic is potentially
>>>>>>>>> handled differently from  regular data traffic by the network devices.
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> IOAM mechanisms can be
>>>>>>>>> leveraged where mechanisms using, e.g., ICMP do not apply or do
>>>>>>>>> not  offer the desired results. These results could include:
>>>>>>>>>
>>>>>>>>>     * proving that a certain traffic flow takes a predefined
>>>>>>>>> path,
>>>>>>>>>
>>>>>>>>>     * verifying the Service Level Agreement (SLA) for the live data
>>>>>>>>>       traffic,
>>>>>>>>>
>>>>>>>>>     * providing detailed statistics on traffic distribution paths in
>>>>>>>>>       networks that distribute traffic across multiple paths,
>>>>>>>>> or
>>>>>>>>>
>>>>>>>>>     * providing scenarios in which probe traffic is potentially
>>>>>>>>>       handled differently from regular data traffic by the network
>>>>>>>>>       devices.
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: Making this long winded sentence more readable is very
>>>>>>>> worthwhile. In
>>>>>> your proposal, the term "result" could be misunderstood though.
>>>>>>>> How about the following:
>>>>>>>>
>>>>>>>> NEW:
>>>>>>>>
>>>>>>>> IOAM mechanisms can be leveraged in situations where mechanisms
>>>>>>>> using, e.g., ICMP does not apply or does not offer the desired
>>>>>>>> results. These situations could include:
>>>>>>>>
>>>>>>>>      * proving that a certain traffic flow takes a predefined
>>>>>>>> path,
>>>>>>>>
>>>>>>>>     * verifying the Service Level Agreement (SLA) for the live data
>>>>>>>>        traffic,
>>>>>>>>
>>>>>>>>     * providing detailed statistics on traffic distribution paths in
>>>>>>>>       networks that distribute traffic across multiple paths, or
>>>>>>>>
>>>>>>>>      * providing scenarios in which probe traffic is potentially
>>>>>>>>        handled differently from regular data traffic by the network
>>>>>>>>        devices.
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 3) <!--[rfced] We note a lot of similarities in the text of
>>>>>>>>> Section
>>>>>>>>> 3 with the text that appears in Section 4.2 of RFC 9197.
>>>>>>>>> However, there is no citation to that document in Section 3.
>>>>>>>>> Please review and let us know if a citation should be added, any
>>>>>>>>> text should be updated, or if the reader should simply be
>>>>>>>>> pointed to Section 4.2 of RFC 9197 for certain info.-->
>>>>>>>>
>>>>>>>> ...FB: Good point. Given that (a) the deployment document is a
>>>>>>>> bit more
>>>>>> recent than RFC 9197, (b) a partial repeat of definitions helps the
>>>>>> reader and (c) the IESG had comments and text suggestions on the
>>>>>> section which led to revised text, IMHO it would be better to keep the
>>> section in place rather than remove it.
>>>>>> That said, what would make sense is to add a paragraph up front
>>>>>> which states the reference to RFC 9197.  E.g.
>>>>>>>>
>>>>>>>> OLD:
>>>>>>>>
>>>>>>>> 3.  IOAM Deployment: Domains And Nodes
>>>>>>>>
>>>>>>>> IOAM is focused on "limited domains" as defined in [RFC8799].
>>>>>>>> IOAM  is not targeted for a deployment on the global Internet. ...
>>>>>>>>
>>>>>>>> NEW:
>>>>>>>>
>>>>>>>> 3.  IOAM Deployment: Domains And Nodes
>>>>>>>>
>>>>>>>> RFC 9197 defines the scope of IOAM as well as the different
>>>>>>>> types of IOAM nodes. For improved readability, this section
>>>>>>>> provides a brief overview of where IOAM applies,  along with
>>>>>>>> explaining the main roles of nodes that employ IOAM.
>>>>>>>> Please refer to RFC 9197 for further details.
>>>>>>>>
>>>>>>>> IOAM is focused on "limited domains" as defined in [RFC8799].
>>>>>>>> IOAM  is not targeted for a deployment on the global Internet. ...
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 4) <!-- [rfced] Does this instance of "/" indicate "and" or "or"?
>>>>>>>>> Please let us know how we may update for clarity.
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> For example, an IOAM-domain can include an enterprise campus
>>>>>>>>> using  physical connections between devices or an overlay
>>>>>>>>> network using  virtual connections / tunnels for connectivity between
>>> said devices.
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> a)
>>>>>>>>> For example, an IOAM-Domain can include an enterprise campus
>>>>>>>>> using  physical connections between devices or an overlay
>>>>>>>>> network using  virtual connections and tunnels for connectivity between
>>> said devices.
>>>>>>>>>
>>>>>>>>> b)
>>>>>>>>> For example, an IOAM-Domain can include an enterprise campus
>>>>>>>>> using  physical connections between devices or an overlay
>>>>>>>>> network using  virtual connections or tunnels for connectivity between
>>> said devices.
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: It is option b). I.e.,
>>>>>>>>
>>>>>>>> NEW:
>>>>>>>>
>>>>>>>>  For example, an IOAM-Domain can include an enterprise campus using
>>>>>>>>  physical connections between devices or an overlay network using
>>>>>>>>  virtual connections or tunnels for connectivity between said devices.
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 5) <!-- [rfced] We had two questions related to the first two subpoints
>>>>>>>>>   in the list in Section 4:
>>>>>>>>>
>>>>>>>>> a) To make the two nested points parallel, should the second
>>>>>>>>> point be rewritten
>>>>>>>>> ("Operations/Troubleshooting: Understand" updated to "With
>>>>>>>>> regard to operations and troubleshooting, understand...")?  Or
>>>>>>>>> should the first nested point have a similar introduction to the second?
>>>>>>>>> Please let us know if our suggestion below is a viable solution
>>>>>>>>> or if there is another way to rephrase.
>>>>>>>>>
>>>>>>>>> b) Also, please clarify the two instances of "Understand".  Who
>>>>>>>>> is understanding the different paths?  Or is there another way
>>>>>>>>> to clarify
>>>>>> "Understand"?
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>>    Potential uses of IOAM per-hop tracing include:
>>>>>>>>>
>>>>>>>>>    -  Understand the different paths different packets traverse
>>>>>>>>>       between an IOAM encapsulating and an IOAM decapsulating node
>>> in
>>>>>>>>>       a network that uses load balancing such as Equal Cost Multi-
>>>>>>>>>       Path (ECMP).  This information could be used to tune the
>>>>>>>>>       algorithm for ECMP for optimized network resource usage.
>>>>>>>>>
>>>>>>>>>    -  Operations/Troubleshooting: Understand which path a particular
>>>>>>>>>       packet or set of packets take as well as what amount of jitter
>>>>>>>>>       and delay different IOAM nodes in the path contribute to the
>>>>>>>>>       overall delay and jitter between the IOAM encapsulating node
>>>>>>>>>       and the IOAM decapsulating node.
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>>    Potential uses of IOAM per-hop tracing include:
>>>>>>>>>
>>>>>>>>>    -  Understanding the different paths different packets traverse
>>>>>>>>>       between an IOAM encapsulating and an IOAM decapsulating node
>>> in
>>>>>>>>>       a network that uses load-balancing such as Equal Cost Multi-
>>>>>>>>>       Path (ECMP).  This information could be used to tune the
>>>>>>>>>       algorithm for ECMP for optimized network resource usage.
>>>>>>>>>
>>>>>>>>>    -  With regard to operations and troubleshooting, understanding
>>> which
>>>>>>>>>       path a particular packet or set of packets take as well as what
>>>>>>>>>     amount of jitter and delay different IOAM nodes in the path
>>>>>>>>>     contribute to the overall delay and jitter between the IOAM
>>>>>>>>>     encapsulating node and the IOAM decapsulating node.
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: I like your proposal.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 6) <!-- [rfced] To make this list parallel, may we update "Generic data:
>>>>>>>>>   Format-free information where..." to "Generic data, such as
>>>>>>>>>   format-free information, where..."? Or would you like the list to
>>>>>>>>>   be more of a definition list where each point has a term and then
>>>>>>>>>   a definition list?  Please let us know how we may update.
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> *  Generic data: Format-free information where syntax and semantic of
>>>>>>>>>    the information is defined by the operator in a specific
>>>>>>>>>    deployment.  For a specific IOAM-Namespace, all IOAM nodes should
>>>>>>>>>    interpret the generic data the same way.  Examples for generic
>>>>>>>>>    IOAM data include geolocation information (location of the node at
>>>>>>>>>    the time the packet was processed), buffer queue fill level or
>>>>>>>>>    cache fill level at the time the packet was processed, or even a
>>>>>>>>>    battery charge level.
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> *  Generic data, such as format-free information, where the syntax and
>>>>>>>>>    semantics of the information are defined by the operator in a specific
>>>>>>>>>    deployment.  For a specific IOAM-Namespace, all IOAM nodes should
>>>>>>>>>    interpret the generic data the same way.  Examples for generic
>>>>>>>>>    IOAM data include geolocation information (location of the node at
>>>>>>>>>    the time the packet was processed), bufferqueue fill level or
>>>>>>>>>    cache fill level at the time the packet was processed, or even a
>>>>>>>>>    battery charge level.
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: Generic data _is_ format-free in case of IOAM. "such as"
>>>>>>>> could be read
>>>>>> as "format-free" information is only an example.  How about:
>>>>>>>>
>>>>>>>> NEW:
>>>>>>>>
>>>>>>>>  *  Generic data, that is format-free information, where the syntax and
>>>>>>>>     semantics of the information are defined by the operator in a specific
>>>>>>>>     deployment.  For a specific IOAM-Namespace, all IOAM nodes should
>>>>>>>>     interpret the generic data the same way.  Examples for generic
>>>>>>>>     IOAM data include geolocation information (location of the node at
>>>>>>>>     the time the packet was processed), bufferqueue fill level or
>>>>>>>>     cache fill level at the time the packet was processed, or even a
>>>>>>>>     battery charge level.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 7) <!--[rfced] The following text seems to be taken from RFC 9197.  May
>>>>>>>>>   we update the capping scheme to match?  Note that we will update
>>>>>>>>>   s/consist/consists regardless (which seems to be an error in
>>>>>>>>>   RFC 9197).
>>>>>>>>>
>>>>>>>>> RFC 9197:
>>>>>>>>> The IOAM Proof of Transit Option-Type consist of a fixed-size
>>>>>>>>> "IOAM Proof of Transit Option header" and "IOAM Proof of Transit
>>>>>>>>> Option data
>>>>>>>>> fields":
>>>>>>>>>
>>>>>>>>> This document:
>>>>>>>>> The IOAM Proof of Transit Option-Type consist of a fixed size
>>>>>>>>> "IOAM proof of transit option header" and "IOAM proof of transit
>>>>>>>>> option data
>>>>>> fields".
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> The IOAM Proof of Transit Option-Type consists of a fixed-size
>>>>>>>>> "IOAM Proof of Transit Option header" and "IOAM Proof of Transit
>>>>>>>>> Option data
>>>>>> fields."
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: Your suggestion makes sense.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 8) <!--[rfced] We had a question about the citation in this text:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> ... IOAM loopback mode.  For a definition of IOAM Namespaces and
>>>>>>>>> IOAM layering, please refer to [RFC9197].  IOAM loopback mode is
>>>>>>>>> defined in [RFC9322].
>>>>>>>>>
>>>>>>>>> We note that RFC 9322 never actually uses the term "mode".
>>>>>>>>> Please review and let us know if any updates to the following text are
>>> necessary.
>>>>>>>>>
>>>>>>>> ...FB: Rather than talk about "IOAM loopback mode" we should
>>>>>>>> simply say
>>>>>> "IOAM loopback".
>>>>>>>> How about...
>>>>>>>>
>>>>>>>> NEW:
>>>>>>>>
>>>>>>>> 7.  IOAM Deployment Considerations
>>>>>>>>
>>>>>>>> This section describes several concepts of IOAM, and provides
>>>>>>>> considerations that need to be taken to account when implementing
>>>>>>>> IOAM in a network domain.  This includes concepts like IOAM
>>>>>>>> Namespaces, IOAM Layering, traffic-sets that IOAM is applied to
>>>>>>>> and  IOAM Loopback.  For a definition of IOAM Namespaces and IOAM
>>>>>>>> layering, please refer to [RFC9197].  IOAM Loopback is defined
>>>>>>>> in [RFC9322].
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>> -->
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 9) <!-- [rfced] We had the following queries related to terminology use
>>>>>>>>>   throughout the document:
>>>>>>>>>
>>>>>>>>> a) The following terminology appears to be used inconsistently.
>>>>>>>>> May we update as suggested below for consistency with past RFCs?
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> Direct export
>>>>>>>>> Direct Export
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> Direct Export (based on RFC 9326)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> Incremental Trace-Option-Type
>>>>>>>>> incremental Trace Option-Type
>>>>>>>>> Incremental Trace-Option
>>>>>>>>> Incremental Trace Option-Type
>>>>>>>>> "Incremental" Trace-Option-Type
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> Incremental Trace Option-Type (based on RFC 9197)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM Layering
>>>>>>>>> IOAM layering
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> IOAM Layering (based on RFC 9197)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM Loopback
>>>>>>>>> IOAM loopback
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> ? - RFC 9322 uses IOAM Loopback only once, then we see "IOAM
>>>>>>>>> looped-
>>>>>> back"
>>>>>>>>
>>>>>>>> ...FB: See above. Let's standardize on "IOAM Loopback".
>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM active mode flag
>>>>>>>>> Active flag
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> Active flag (per RFC 9322)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>> See also IOAM Active Mode.
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> loopback flag
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> Loopback flag (per RFC 9322)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM-Namespace
>>>>>>>>> IOAM Namespace
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> IOAM-Namespace (based on RFCs 9197 and 9322)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM-Option-Type
>>>>>>>>> IOAM Option-Type
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> IOAM Option-Type (based on RFC 9197 and 9326)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> IOAM-Trace-Option-Type
>>>>>>>>> IOAM Trace Option Type
>>>>>>>>> IOAM Trace Option-Type
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> IOAM Trace Option-Type (based on RFC 9197)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> Pre-allocated Trace-Option-Type
>>>>>>>>> pre-allocated Option-Type
>>>>>>>>> Pre-allocated Trace-Option
>>>>>>>>> "Pre-allocated" Trace-Option-Type
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> Pre-allocated Trace Option-Type (based on RFC 9197)
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Original:
>>>>>>>>> Trace-Option-Type
>>>>>>>>> Trace Option-Type
>>>>>>>>> trace Option-Type
>>>>>>>>>
>>>>>>>>> Perhaps:
>>>>>>>>> Trace Option-Type (based on RFC 9197)
>>>>>>>>>
>>>>>>>>> Relating to the two entries above, see also:
>>>>>>>>> The Option-Types of incremental tracing and pre-allocated
>>>>>>>>> tracing are  defined in [RFC9197].
>>>>>>>>
>>>>>>>> ...FB: Agreed.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> b) We have updated "Edge to Edge" and "Edge-to-edge" to "Edge-to-
>>> Edge"
>>>>>>>>> per RFC 9197. May we update all subsequent instances to "E2E"
>>>>>>>>> when not in quotes?
>>>>>>>>
>>>>>>>> ...FB: Makes sense.
>>>>>>>>
>>>>>>>>>
>>>>>>>>> c) FYI, we have updated to use the following forms (see
>>>>>>>>> capitalization/hyphenation/etc.) of various terms for
>>>>>>>>> consistency with recent RFCs on the topic. Please let us know of any
>>> objections.
>>>>>>>>>
>>>>>>>>> Hop-by-Hop (per RFC 9326)
>>>>>>>>> IOAM-Domain (per feedback on RFC-to-be 9359)  Proof of Transit
>>>>>>>>> (per feedback on RFC-to-be 9359)  IOAM encapsulating node, IOAM
>>>>>>>>> decapsulating node, IOAM transit node
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: ACK.
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 10) <!-- [rfced] Please review the "Inclusive Language" portion of the
>>>>>>>>>   online Style Guide
>>>>>>>>>   <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie1C5gmvA$ >
>>>>>>>>>   and let us know if any changes are needed.  Note that our script
>>>>>>>>>   did not flag any words in particular, but this should still be
>>>>>>>>>   reviewed as a best practice.
>>>>>>>>> -->
>>>>>>>>
>>>>>>>> ...FB: Thanks for the note. I'm also not aware of any challenges
>>>>>>>> wrt/ non-
>>>>>> inclusive language with the current text.
>>>>>>>> I don't see a need for further changes.
>>>>>>>>
>>>>>>>> THANKS A LOT for your suggestions, review and help.
>>>>>>>>
>>>>>>>> Cheers, Frank
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Thank you.
>>>>>>>>>
>>>>>>>>> RFC Editor/st/mf
>>>>>>>>>
>>>>>>>>> *****IMPORTANT*****
>>>>>>>>>
>>>>>>>>> Updated 2023/03/27
>>>>>>>>>
>>>>>>>>> RFC Author(s):
>>>>>>>>> --------------
>>>>>>>>>
>>>>>>>>> Instructions for Completing AUTH48
>>>>>>>>>
>>>>>>>>> Your document has now entered AUTH48.  Once it has been reviewed
>>>>>>>>> and approved by you and all coauthors, it will be published as an RFC.
>>>>>>>>> If an author is no longer available, there are several remedies
>>>>>>>>> available as listed in the FAQ (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6idBXRC0kQ$ ).
>>>>>>>>>
>>>>>>>>> You and you coauthors are responsible for engaging other parties
>>>>>>>>> (e.g., Contributors or Working Group) as necessary before
>>>>>>>>> providing your
>>>>>> approval.
>>>>>>>>>
>>>>>>>>> Planning your review
>>>>>>>>> ---------------------
>>>>>>>>>
>>>>>>>>> Please review the following aspects of your document:
>>>>>>>>>
>>>>>>>>> *  RFC Editor questions
>>>>>>>>>
>>>>>>>>> Please review and resolve any questions raised by the RFC
>>>>>>>>> Editor  that have been included in the XML file as comments
>>>>>>>>> marked as
>>>>>>>>> follows:
>>>>>>>>>
>>>>>>>>> <!-- [rfced] ... -->
>>>>>>>>>
>>>>>>>>> These questions will also be sent in a subsequent email.
>>>>>>>>>
>>>>>>>>> *  Changes submitted by coauthors
>>>>>>>>>
>>>>>>>>> Please ensure that you review any changes submitted by your
>>>>>>>>> coauthors.  We assume that if you do not speak up that you
>>>>>>>>> agree to changes submitted by your coauthors.
>>>>>>>>>
>>>>>>>>> *  Content
>>>>>>>>>
>>>>>>>>> Please review the full content of the document, as this cannot
>>>>>>>>> change once the RFC is published.  Please pay particular attention to:
>>>>>>>>> - IANA considerations updates (if applicable)
>>>>>>>>> - contact information
>>>>>>>>> - references
>>>>>>>>>
>>>>>>>>> *  Copyright notices and legends
>>>>>>>>>
>>>>>>>>> Please review the copyright notice and legends as defined in
>>>>>>>>> RFC 5378 and the Trust Legal Provisions  (TLP –
>>>>>>>>> https://urldefense.com/v3/__https://trustee.ietf.org/license-info/__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6icRrn8x_A$ ).
>>>>>>>>>
>>>>>>>>> *  Semantic markup
>>>>>>>>>
>>>>>>>>> Please review the markup in the XML file to ensure that
>>>>>>>>> elements of  content are correctly tagged.  For example, ensure
>>>>>>>>> that <sourcecode>  and <artwork> are set correctly.  See details
>>>>>>>>> at  <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6id2N5D7og$ >.
>>>>>>>>>
>>>>>>>>> *  Formatted output
>>>>>>>>>
>>>>>>>>> Please review the PDF, HTML, and TXT files to ensure that the
>>>>>>>>> formatted output, as generated from the markup in the XML file,
>>>>>>>>> is  reasonable.  Please note that the TXT will have formatting
>>>>>>>>> limitations compared to the PDF and HTML.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Submitting changes
>>>>>>>>> ------------------
>>>>>>>>>
>>>>>>>>> To submit changes, please reply to this email using ‘REPLY ALL’
>>>>>>>>> as all the parties CCed on this message need to see your
>>>>>>>>> changes. The parties
>>>>>>>>> include:
>>>>>>>>>
>>>>>>>>> *  your coauthors
>>>>>>>>>
>>>>>>>>> *  rfc-editor@rfc-editor.org (the RPC team)
>>>>>>>>>
>>>>>>>>> *  other document participants, depending on the stream (e.g.,
>>>>>>>>>    IETF Stream participants are your working group chairs, the
>>>>>>>>>    responsible ADs, and the document shepherd).
>>>>>>>>>
>>>>>>>>> *  auth48archive@rfc-editor.org, which is a new archival mailing list
>>>>>>>>>    to preserve AUTH48 conversations; it is not an active discussion
>>>>>>>>>    list:
>>>>>>>>>
>>>>>>>>>   *  More info:
>>>>>>>>>
>>>>>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie64C1PHQ$
>>>>>>>>> 4Q9l2USxIAe6P8O4Zc
>>>>>>>>>
>>>>>>>>>   *  The archive itself:
>>>>>>>>>      https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ic0QJDdXg$
>>>>>>>>>
>>>>>>>>>   *  Note: If only absolutely necessary, you may temporarily opt out
>>>>>>>>>      of the archiving of messages (e.g., to discuss a sensitive matter).
>>>>>>>>>      If needed, please add a note at the top of the message that you
>>>>>>>>>      have dropped the address. When the discussion is concluded,
>>>>>>>>>      auth48archive@rfc-editor.org will be re-added to the CC list and
>>>>>>>>>      its addition will be noted at the top of the message.
>>>>>>>>>
>>>>>>>>> You may submit your changes in one of two ways:
>>>>>>>>>
>>>>>>>>> An update to the provided XML file — OR — An explicit list of
>>>>>>>>> changes in this format
>>>>>>>>>
>>>>>>>>> Section # (or indicate Global)
>>>>>>>>>
>>>>>>>>> OLD:
>>>>>>>>> old text
>>>>>>>>>
>>>>>>>>> NEW:
>>>>>>>>> new text
>>>>>>>>>
>>>>>>>>> You do not need to reply with both an updated XML file and an
>>>>>>>>> explicit list of changes, as either form is sufficient.
>>>>>>>>>
>>>>>>>>> We will ask a stream manager to review and approve any changes
>>>>>>>>> that seem beyond editorial in nature, e.g., addition of new
>>>>>>>>> text, deletion of text, and technical changes.  Information
>>>>>>>>> about stream managers can be found in the FAQ.  Editorial
>>>>>>>>> changes do not require
>>>>>> approval from a stream manager.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Approving for publication
>>>>>>>>> --------------------------
>>>>>>>>>
>>>>>>>>> To approve your RFC for publication, please reply to this email
>>>>>>>>> stating that you approve this RFC for publication.  Please use
>>>>>>>>> ‘REPLY ALL’, as all the parties CCed on this message need to see
>>>>>>>>> your
>>>>>> approval.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Files
>>>>>>>>> -----
>>>>>>>>>
>>>>>>>>> The files are available here:
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.xml__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ie_OoT5uQ$
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6id1Xfzapg$
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.pdf__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6icJu4AWbQ$
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.txt__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6if4NY2luQ$
>>>>>>>>>
>>>>>>>>> Diff file of the text:
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-diff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6idAknQYQw$
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-rfcdiff.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ic-AN-pqw$  (side
>>>>>>>>> by
>>>>>>>>> side)
>>>>>>>>>
>>>>>>>>> Diff of the XML:
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378-xmldiff1.html__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6icRlFRZQw$
>>>>>>>>>
>>>>>>>>> The following files are provided to facilitate creation of your
>>>>>>>>> own diff files of the XML.
>>>>>>>>>
>>>>>>>>> Initial XMLv3 created using XMLv2 as input:
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.original.v2v3.xml__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ieJ7525GQ$
>>>>>>>>>
>>>>>>>>> XMLv3 file that is a best effort to capture v3-related format
>>>>>>>>> updates
>>>>>>>>> only:
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9378.form.xml__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6idnP0nFVA$
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Tracking progress
>>>>>>>>> -----------------
>>>>>>>>>
>>>>>>>>> The details of the AUTH48 status of your document are here:
>>>>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9378__;!!MZ3Fw45to5uY!Niwb5rCDDNfXQuFUzPalS0gFsNgF3_4LZ3s3LLw_xzfBsriDBl8vlmJ8zxQfiHOE-oE6EWuL-hN-hjOe6ieZ3UiMwA$
>>>>>>>>>
>>>>>>>>> Please let us know if you have any questions.
>>>>>>>>>
>>>>>>>>> Thank you for your cooperation,
>>>>>>>>>
>>>>>>>>> RFC Editor
>>>>>>>>>
>>>>>>>>> --------------------------------------
>>>>>>>>> RFC9378 (draft-ietf-ippm-ioam-deployment-05)
>>>>>>>>>
>>>>>>>>> Title            : In-situ OAM Deployment
>>>>>>>>> Author(s)        : F. Brockners, Ed., S. Bhandari, Ed., D. Bernier, T. Mizrahi,
>>> Ed.
>>>>>>>>> WG Chair(s)      : Marcus Ihlar, Tommy Pauly
>>>>>>>>> Area Director(s) : Martin Duke, Zaheduzzaman Sarker
>>>>
>>>>
>>>>
>>>
>

------------------------------------------------------------------------------
External Email: Please use caution when opening links and attachments / Courriel externe: Soyez prudent avec les liens et documents joints