Re: [auth48] AUTH48: RFC-to-be 9524 <draft-ietf-spring-sr-replication-segment-19> for your review

"Rishabh Parekh (riparekh)" <riparekh@cisco.com> Tue, 13 February 2024 18:19 UTC

Return-Path: <riparekh@cisco.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21C24C151545; Tue, 13 Feb 2024 10:19:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.906
X-Spam-Level:
X-Spam-Status: No, score=-11.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uI45JTF8gxZZ; Tue, 13 Feb 2024 10:19:26 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6CAD2C151548; Tue, 13 Feb 2024 10:18:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=49268; q=dns/txt; s=iport; t=1707848333; x=1709057933; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=makXHRmpoLA1oXjfpIp8sTq8dcxQHBzonKq4acgslic=; b=eGJhaJnO/fmdTA5LeB+jVEl9M8pbkPG9aS0Enz2FHrlrZD1oygKonBhJ R/u5WUX4Irv5tc4iG41Pc8zJW2p+gn9zDU/z0QKZnhqDULlKdo2ysMH+S XUkYJacAhiVRPENwnKQkksFnN1zvWjr3zdyDzAd0TgngQx+lBjUOVuK5H g=;
X-CSE-ConnectionGUID: 47m1pPppQyCGQxHgmbGjzw==
X-CSE-MsgGUID: 9pBVY3JRT8qonEP/YYMFqQ==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:Weo9ZxS4NCYQrYg1F9BYmIXKCtpso3fLVj580XJvo7tKdqLm+IztI wmDo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHlcWv3vq/+J37aARTjz37arR3f 126qAzLvZwOiJB5YuYpnwHEoHZDZ6xaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:952zjKlmUIYT/whrt57KXFLo5gyhJkRdPkR7XQ2eYbSJt1+Wr1Gzt xIdCm6CbveIZGCmeI8jOo60oUsC6seHnNMwG1Q6qn8yEFtH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaB4E/rav649SUUOZigHtLUEPTDNj16WThqQSIgjQMLs+Mii+aEu/Dha++2k Y20+5O31GONgWYubjpOsvnb8nuDgdyr0N8mlg1mDRx0lAe2e0k9VPo3Oay3Jn3kdYhYdsbSq zHrlezREsvxpn/BO/v9+lrJWhRiro36YWBivkFrt52K2XCukMCdPpETb5LwYW8P49mAcksYJ N9l7fRcQi9xVkHAdXh0vxRwS0lD0aN6FLDvfSe66NSr11X/YlDD+uVOA0Q8Eo8K5bMiaY1O3 aRwxDEldBuPgae9x6i2D7A2wM8iN8LseogYvxmMzxmAUq1gGs+FEv6MvIMItNszrpgm8fL2f csBYCBibxToaBxUMVBRA5U79AutriCvKmMG8AzL+cLb5UCC1CZP4ePPCuaFY9uMaP0Sr3e9i Hv/qjGR7hYyb4HHlmHfrRpAnNTnlD7nWN5CHaez9v90jXWJyGdWBREXSVyh5/6jhSaWQdxUb kEY+zYpt4Ao+kfuQ9X8Qxqi5nmesXYht8F4CeY27kSGzbDZpl/DQGMFVTVGLtchsafaWADGy HfVwNawHQR3qISEYl2k5pebqDmdOzoKeDpqiTA/cSMJ5NzqoYcWhx3JT8p+HKPdsjETMWyuq 9xthHVu74j/nfI2O7OHEUcrag9AS7DTRQIzow7QRG/gt1k/b4++bIvu4l/ehRqhEGp7ZgfR1 JTns5HChAzrMX1rvHfSKAnqNOr5j8tpyBWG3TZS82AJrlxBAUKLc4FK+y1ZL0x0KMsCcjKBS BaM4VwOusUNbCv6NPMfj2eN5yICkPeI+TPNC6G8UzaySscZmPKvpXgxNRDKgwgBbmBywPhX1 WinnTaEVitCVv89k1Jats8W0KQgwWgl1HjPSJXghxWh2vz2WZJmYeltDbd6VchgtPnsiFyMq 753bpLWoz0BC7eWSneMruYuwaUicCJT6Wbe8ZIHL4Zu42NORQkcNhMm6ep/INY1x/UNx72gE 7PUchYw9WcTTEbvcG2iQntic7joG514qBoG0eYEZD5EB1BLjV6T0Zoi
IronPort-HdrOrdr: A9a23:eiNNlq3I8GkFo6xLW7GXeAqjBf1xeYIsimQD101hICG9Lfbo9P xGzc566farslcssSkb6K690cm7LU819fZOkO8s1MSZLXjbUQyTXc5fBOrZsnHd8kLFh5RgPM tbAsxD4ZjLfCdHZKXBkUeF+rQbsaS6GcmT7I+0oQYOPGRXguNbnntE422gYzRLrXx9dOEE/e 2nl7J6TlSbCBMqR/X+LEMoG8LEoNrGno/nZxkpOz4LgTPlsRqYrJTBP1y9xBkxbxNjqI1OzY HCqWPEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwiy6zDb4RG4GqjXQQmqWC+VwqmN 7Dr1MLJMJo8U7ceWmzvF/ExxTg6jAz8HXvoGXowkcL4PaJBg7SOfAxwb6xQSGprHbIe+sMlp 6j6ljp8qa/yymwxRgVqeK4Dy2C3XDE0UbK2dRj/EC3F7FuKYO4aeckjRlo+FBqJlOg1Kk3VO ZpF83S//BQbBeTaG3YpHBmxJi2Um00BQrueDlIhiW56UkeoJlC9TpR+OUP2nMbsJ4tQZhN4O rJdqxuibFVV8cTKaZwHv0IT8e7AnHEBUukChPeHX33UKUcf37doZ/+57s4oOmsZZwT1ZM33J DMSklRu2I+c1/nTceOwJpI+BbQR3jVZ0Wm9uhOo5xi/rHsTrviNiOODFgojsu7uv0aRtbWXv 6iUagmdcML7VGebrqh8zeOL6W6c0NuIvH9kuxLLm6zng==
X-Talos-CUID: 9a23:2w3aE246EWs2pHt4wdssqBERQ9gdamXk3Vz/Gl+YBmNjZ7+HVgrF
X-Talos-MUID: 9a23:kGJl+woKOwNDa8Mbr0Uez2B6HvlZuIaUNBAUlpMrg461BAleIg7I2Q==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-8.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Feb 2024 18:18:51 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 41DIInmL021551 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 13 Feb 2024 18:18:50 GMT
X-CSE-ConnectionGUID: FkCL6elGQvupSvIccpB6YA==
X-CSE-MsgGUID: elxfvgAWSAWCslon/OAktA==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=riparekh@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.06,157,1705363200"; d="scan'208";a="23788455"
Received: from mail-co1nam11lp2168.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.168]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Feb 2024 18:18:48 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OQ5+3XSUUKo9f1NpHkPEuYJKMN16TMtONc8XMN6ltV3h8yvM+3Hp03o/WiECzowqf7J8KWiN7/LpXkbS9r0DFxSnos9Dw7+Ps3dJm5OMfbdB3CrTwWiPMsCopYu3LNAk/fUy7CfciOc/DcJU/OvWYmwyxriDeGP9TJiNjR3OfPDB9cf/8hMaEO4zVXaX3iLvpO4IPfxzUQQ4YK6Vw9Be4KahczCbXR+PmZ7uDxEzgBA9z2dhn7KvOiHDPZn4cic7slmTF69UeOYCMC0tm6utrIDnYzixJi7e0QQf+60j3bNuhz68bkWUuHjUDSM8el0yBCphlVOtgr0Q/nGk99o14w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=makXHRmpoLA1oXjfpIp8sTq8dcxQHBzonKq4acgslic=; b=azugQFEiAeobNnTDdtKGs/6kPgoMKJROCbzWpg5Fsoh4uoCRnjpt+blHmQFZ+Vu1n4ELNQVW1c2JCW2oZuAxPKEoaKuxBjL4VUFUPriAfem+734mabsv2ukF8NmBAI+CAJkaYqZ3EW/405ZL1VtAGYu8FA0akcOfYeh9jq3NVyNj5S6eMwAO+ZDjdKpSCPcN5aAN7V656BZSSaQM+BkGDVHA/ex/ix+gug2dG3ENQArkivwbGLCGE/ZiCjUAuN6vXwB3nHlEGKWf9sTE/UpC0ymNnEGnUQi8/DV4PHI5WCKyO5Yg4KxJ0QwfU5jzIoUFTJbdhRZ+saa4g3Rph6m6PA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from BYAPR11MB3000.namprd11.prod.outlook.com (2603:10b6:a03:8e::21) by IA0PR11MB8380.namprd11.prod.outlook.com (2603:10b6:208:485::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7270.38; Tue, 13 Feb 2024 18:18:42 +0000
Received: from BYAPR11MB3000.namprd11.prod.outlook.com ([fe80::280c:a3ff:189b:254f]) by BYAPR11MB3000.namprd11.prod.outlook.com ([fe80::280c:a3ff:189b:254f%4]) with mapi id 15.20.7270.036; Tue, 13 Feb 2024 18:18:42 +0000
From: "Rishabh Parekh (riparekh)" <riparekh@cisco.com>
To: Megan Ferguson <mferguson@amsl.com>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "daniel.voyer@bell.ca" <daniel.voyer@bell.ca>, "Clarence Filsfils (cfilsfil)" <cfilsfil@cisco.com>, "hooman.bidgoli@nokia.com" <hooman.bidgoli@nokia.com>, "zzhang@juniper.net" <zzhang@juniper.net>, "spring-ads@ietf.org" <spring-ads@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>, "Mankamana Mishra (mankamis)" <mankamis@cisco.com>, "james.n.guichard@futurewei.com" <james.n.guichard@futurewei.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: AUTH48: RFC-to-be 9524 <draft-ietf-spring-sr-replication-segment-19> for your review
Thread-Index: AQHaSwvTqQ6KlVCgwEipJTnoWel8zLDs4HrQgA+6hICABdof0IAEx92AgAF+6aA=
Date: Tue, 13 Feb 2024 18:18:42 +0000
Message-ID: <BYAPR11MB3000AC0211B495E33F67BB97DE4F2@BYAPR11MB3000.namprd11.prod.outlook.com>
References: <20240119191446.5AA721BA43FC@rfcpa.amsl.com> <DM6PR11MB30029089F23C54F39EE8CC70DE782@DM6PR11MB3002.namprd11.prod.outlook.com> <B83E56FB-B989-47D7-9992-6F41B2444664@amsl.com> <BYAPR11MB30004AE15DBC26E7C5F48049DE4B2@BYAPR11MB3000.namprd11.prod.outlook.com> <D9F5FFF4-8EE5-4DE8-BE02-A1D00BD1C737@amsl.com>
In-Reply-To: <D9F5FFF4-8EE5-4DE8-BE02-A1D00BD1C737@amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BYAPR11MB3000:EE_|IA0PR11MB8380:EE_
x-ms-office365-filtering-correlation-id: 42fe415e-d5d1-457c-0752-08dc2cc0358b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB3000.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(376002)(136003)(366004)(346002)(396003)(230922051799003)(230273577357003)(64100799003)(451199024)(186009)(1800799012)(55016003)(2906002)(41300700001)(9686003)(478600001)(26005)(30864003)(38070700009)(4326008)(66446008)(5660300002)(7696005)(54906003)(53546011)(71200400001)(6916009)(966005)(8936002)(66476007)(8676002)(66556008)(66946007)(64756008)(52536014)(76116006)(83380400001)(6506007)(33656002)(316002)(86362001)(122000001)(19627235002)(38100700002)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3000.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 42fe415e-d5d1-457c-0752-08dc2cc0358b
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2024 18:18:42.2969 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wooldQ8OOCxDMdPS2CQhwXaKnqol12J+Tq8SaVG0ZBx2Uo6yP4yLhy3ta+nwK3BXPED5ErwQtgxv7PAcYafH/w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR11MB8380
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/lxCv53X522FYbyOmTQERfdpbWvg>
Subject: Re: [auth48] AUTH48: RFC-to-be 9524 <draft-ietf-spring-sr-replication-segment-19> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Feb 2024 18:19:31 -0000

I have reviewed the document and I approve the publication of this document.

Thanks,
-Rishabh

> -----Original Message-----
> From: Megan Ferguson <mferguson@amsl.com>
> Sent: Monday, February 12, 2024 11:28 AM
> To: Rishabh Parekh (riparekh) <riparekh@cisco.com>
> Cc: rfc-editor@rfc-editor.org; daniel.voyer@bell.ca; Clarence Filsfils (cfilsfil)
> <cfilsfil@cisco.com>; hooman.bidgoli@nokia.com; zzhang@juniper.net; spring-
> ads@ietf.org; spring-chairs@ietf.org; Mankamana Mishra (mankamis)
> <mankamis@cisco.com>; james.n.guichard@futurewei.com;
> auth48archive@rfc-editor.org
> Subject: Re: AUTH48: RFC-to-be 9524 <draft-ietf-spring-sr-replication-segment-
> 19> for your review
> 
> Rishabh,
> 
> Thank you for your reply and the updated file.  We have reposted our version to
> match.
> 
>   The files have been posted here (please refresh):
>    https://www.rfc-editor.org/authors/rfc9524.txt
>    https://www.rfc-editor.org/authors/rfc9524.pdf
>    https://www.rfc-editor.org/authors/rfc9524.html
>    https://www.rfc-editor.org/authors/rfc9524.xml
> 
>   The relevant diff files have been posted here (please refresh):
>    https://www.rfc-editor.org/authors/rfc9524-diff.html (comprehensive diff)
>    https://www.rfc-editor.org/authors/rfc9524-rfcdiff.html (comprehensive side-
> by-side)
>    https://www.rfc-editor.org/authors/rfc9524-auth48diff.html (all AUTH48
> changes)
>    https://www.rfc-editor.org/authors/rfc9524-lastdiff.html (last version to this)
>    https://www.rfc-editor.org/authors/rfc9524-lastrfcdiff.html (last version to
> this side-by-side)
> 
> Upon review, please let us know if any further updates are necessary.
> Please review the files carefully as we do not make changes after publication.
> 
> We will await approvals from each of the parties listed on the AUTH48 status
> page prior to moving forward to publication.
> 
> The AUTH48 status page for this document is available here:
> 
> https://www.rfc-editor.org/auth48/rfc9524
> 
> Thank you.
> 
> RFC Editor/mf
> 
> 
> 
> > On Feb 9, 2024, at 4:23 PM, Rishabh Parekh (riparekh) <riparekh@cisco.com>
> wrote:
> >
> > Replies inline @ [RP]
> >
> > I have made some of suggested changes in attached XML file.
> >
> > -Rishabh
> >
> >> -----Original Message-----
> >> From: Megan Ferguson <mferguson@amsl.com>
> >> Sent: Monday, February 5, 2024 5:05 PM
> >> To: Rishabh Parekh (riparekh) <riparekh@cisco.com>
> >> Cc: rfc-editor@rfc-editor.org; daniel.voyer@bell.ca; Clarence
> >> Filsfils (cfilsfil) <cfilsfil@cisco.com>; hooman.bidgoli@nokia.com;
> >> zzhang@juniper.net; spring- ads@ietf.org; spring-chairs@ietf.org;
> >> Mankamana Mishra (mankamis) <mankamis@cisco.com>;
> >> james.n.guichard@futurewei.com; auth48archive@rfc-editor.org
> >> Subject: Re: AUTH48: RFC-to-be 9524
> >> <draft-ietf-spring-sr-replication-segment-
> >> 19> for your review
> >>
> >> Hi Rishabh,
> >>
> >> Thank you for sending along your edited file and responses to our queries.
> >>
> >> We have combined the two and posted the updated files below.
> >>
> >> We also had a few additional questions:
> >>
> >> 1.) It looks like we missed sending the following question:
> >>
> >> <!--[rfced] We had a few questions regarding the following text:
> >>
> >> Original:
> >> Given the definition of the Replication segment in this document, an
> >> attacker subverting ingress filter above cannot take advantage of a
> >> stack of replication segments to perform amplification attacks nor link
> exhaustion attacks.
> >>
> >> a) Would it be helpful to the reader to point them to the section in
> >> which they can find the definition of “Replication segment” (i.e., Section 1.1,
> Section 2)?
> >
> > [RP] I don't think it is necessary to refer to the definition. We can assume the
> reader has read the preceding sections before the Security section.
> >
> >>
> >> b) It might help the reader to clarify what/where “above” is referring to.
> >> We see this as the only instance of “ingress filters” in the document.
> >>
> >
> > [RP] I don't think it is necessary, but if the RFC editors think it will help to
> clarify "above", please do so.
> >
> >> c) (Maybe depending on the response to b above) Should “subverting
> >> ingress filter”
> >> be made either “subverting ingress filters” (plural) or “subverting
> >> an ingress filter”?
> >>
> >
> > [RP] I see that latest XML has changed this to plural "ingress filters" which is
> fine.
> >
> >> —>
> >>
> >> 2.) And we would like you to further review the use of “Replication state” vs.
> >> “Replication segment state”.
> >>
> >
> > [RP] I have changed text for "Replication segment state" in the attached XML
> file.
> >
> >> 3) In the pseudocode, may we put parentheses around the following?
> >>
> >> Original:
> >>   S01.   Lookup FUNCT portion of S to get Replication state RS
> >>
> >> Perhaps:
> >>   S01.   Lookup FUNCT portion of S to get Replication state (RS)
> >
> > [RP] I have made the change in attached XML file.
> >
> >>
> >>  The files have been posted here (please refresh):
> >>   https://www.rfc-editor.org/authors/rfc9524.txt
> >>   https://www.rfc-editor.org/authors/rfc9524.pdf
> >>   https://www.rfc-editor.org/authors/rfc9524.html
> >>   https://www.rfc-editor.org/authors/rfc9524.xml
> >>
> >>  The relevant diff files have been posted here (please refresh):
> >>   https://www.rfc-editor.org/authors/rfc9524-diff.html (comprehensive)
> >>   https://www.rfc-editor.org/authors/rfc9524-rfcdiff.html
> >> (comprehensive side-
> >> by-side)
> >>   https://www.rfc-editor.org/authors/rfc9524-auth48diff.html (AUTH48
> >> changes
> >> only)
> >>
> >> Upon review, please let us know if any further updates are necessary.
> >> Please review the files carefully as we do not make changes after publication.
> >>
> >> We will await approvals from each of the parties listed on the AUTH48
> >> status page prior to moving forward to publication.
> >>
> >> The AUTH48 status page for this document is available here:
> >>
> >> https://www.rfc-editor.org/auth48/rfc9524
> >>
> >> Thank you.
> >>
> >> RFC Editor/mf
> >>
> >>> On Jan 26, 2024, at 6:40 PM, Rishabh Parekh (riparekh)
> >> <riparekh=40cisco.com@dmarc.ietf.org> wrote:
> >>>
> >>> I have made some of the suggested modifications in the attached XML
> >>> file. For other questions and concerns, please look for my inline
> >>> replies @ [RP]
> >>>
> >>> Thanks,
> >>> -Rishabh
> >>>
> >>>> -----Original Message-----
> >>>> From: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>
> >>>> Sent: Friday, January 19, 2024 11:15 AM
> >>>> To: daniel.voyer@bell.ca; Clarence Filsfils (cfilsfil)
> >>>> <cfilsfil@cisco.com>; Rishabh Parekh (riparekh)
> >>>> <riparekh@cisco.com>; hooman.bidgoli@nokia.com; zzhang@juniper.net
> >>>> Cc: rfc-editor@rfc-editor.org; spring-ads@ietf.org;
> >>>> spring-chairs@ietf.org; Mankamana Mishra (mankamis)
> >>>> <mankamis@cisco.com>; james.n.guichard@futurewei.com;
> >>>> auth48archive@rfc-editor.org
> >>>> Subject: Re: AUTH48: RFC-to-be 9524
> >>>> <draft-ietf-spring-sr-replication-segment-
> >>>> 19> for your review
> >>>>
> >>>> Authors,
> >>>>
> >>>> While reviewing this document during AUTH48, please resolve (as
> >>>> necessary) the following questions, which are also in the XML file.
> >>>>
> >>>> 1) <!-- [rfced] Please note that the title of the document has been
> >>>>    updated as follows:
> >>>>
> >>>> a. Abbreviations have been expanded per Section 3.6 of RFC 7322
> >>>> (“RFC Style Guide”).  Additionally, please let us know any
> >>>> suggestions for reducing the redundancy of "Segment" (see our suggestion
> below).
> >>>>
> >>>> b. We have also removed the hyphen from "Multi-point" for
> >>>> consistency with previous RFCs (in the title and throughout).
> >>>> Please review and let us know any objections.
> >>>>
> >>>> Original:
> >>>>
> >>>> SR Replication segment for Multi-point Service Delivery
> >>>>
> >>>> Current:
> >>>>
> >>>> Segment Routing Replication Segment for Multipoint Service Delivery
> >>>>
> >>>> Perhaps:
> >>>> Segment Routing Replication for Multipoint Service Delivery
> >>>> -->
> >>>>
> >>>
> >>> [RP] I have changed the tile in the edited XML file.
> >>>
> >>>>
> >>>> 2) <!-- [rfced] Please insert any keywords (beyond those that appear in
> >>>>    the title) for use on https://www.rfc-editor.org/search.
> >>>> -->
> >>>>
> >>>>
> >>>> 3) <!--[rfced] We see the following three similar sentences in close
> >>>>    proximity:
> >>>>
> >>>> Original:
> >>>> This Replication segment can be either provisioned locally on
> >>>> ingress and egress nodes, or using dynamic auto-discovery
> >>>> procedures for MVPN
> >> and EVPN.
> >>>>
> >>>> and
> >>>>
> >>>> Original:
> >>>> A Replication segment is a local segment instantiated at a
> >>>> Replication node.  It can be either provisioned locally on a node
> >>>> or
> >> programmed by a control plane.
> >>>>
> >>>
> >>> [RP] In this sentence the control plane refers to something like a
> >>> PCE rather
> >> than MVPN or EVPN (as used for ingress replication).
> >>>
> >>>> and
> >>>>
> >>>> Original:
> >>>> Replication segments can be stitched together to form a tree by
> >>>> either local provisioning on nodes or using a control plane.
> >>>
> >>> [RP] Again, the control plane refers to PCE in this context as
> >>> explained later in
> >> the paragraph.
> >>>
> >>>>
> >>>> a) Please confirm our update to the first sentence (see below)
> >>>> correctly captures your intent.  Our goal is to make the two
> >>>> phrases joined by
> >> "either"
> >>>> symmetrical.
> >>>>
> >>>> Perhaps:
> >>>> This Replication segment can be either provisioned locally on
> >>>> ingress and egress nodes or using dynamic autodiscovery procedures
> >>>> for MVPN and
> >> EVPN.
> >>>
> >>> [RP] I have rearranged the first sentence to make both options
> >>> (local and
> >> dynamic) symmetrical.
> >>>
> >>>>
> >>>> b) Please review the three similar sentences listed above and
> >>>> ensure that they do not need to be made more uniform and/or review
> >>>> if redundancy should be reduced.
> >>>>
> >>>> -->
> >>>>
> >>>>
> >>>> 4) <!--[rfced] In the following, does "Anycast set" mean "a set of
> >>>>    Anycast SIDs"?  Note: this text occurs two times in the text.
> >>>>
> >>>> Original:
> >>>>  *  A Replication node MAY use an Anycast SID or a Border Gateway
> >>>>     Protocol (BGP) PeerSet SID in segment list to send a
> >>>>     replicated packet to one downstream Replication node in an Anycast
> set...
> >>>>
> >>>>
> >>>> -->
> >>>
> >>> [RP] Anycast-SID is one SID that is shared by multiple nodes in an Anycast
> set.
> >> I have re-worded the sentence to make this clear.
> >>>
> >>>>
> >>>>
> >>>> 5) <!-- [rfced] We had the following questions regarding the pseudocode in
> >>>>    Section 2.2.1.
> >>>>
> >>>> a) The following line exceeds the 72-character limit. Please let us
> >>>> know how this line can be modified.
> >>>>
> >>>> Original:
> >>>>
> >>>> S03.     Discard the packet
> >>>> S04.     # ICMPv6 Time Exceeded is not permitted (ICMPv6 section below)
> >>>> S05.   }
> >>>>
> >>>> Perhaps:
> >>>>
> >>>> S03.     Discard the packet
> >>>> S04.     # ICMPv6 Time Exceeded is not permitted
> >>>>          (ICMPv6 section below)
> >>>> S05.   }
> >>>>
> >>>
> >>> [RP] Fixed
> >>>
> >>>> b) Will it be clear what "ICMPv6 section below" in the
> >>>> parenthetical in point a) above refers to?  Should this be replaced
> >>>> by a specific section number.  Note this occurs more than once.
> >>>>
> >>>
> >>> [RP] Although it should be clear that this refers to Section 2.2.3,
> >>> changing this
> >> to an explicit reference is fine.
> >>>
> >>>> c) We note that there is no space between PPC and its expansion.
> >>>> May we make the following updates?
> >>>>
> >>>> Original:
> >>>> S20.       Derive packet processing context(PPC) from Segment List
> >>>>
> >>>> Perhaps:
> >>>> S20.       Derive packet processing context (PPC) from Segment List
> >>>>
> >>>> Original:
> >>>> S28.       Derive packet processing context(PPC)
> >>>>
> >>>> Perhaps:
> >>>> S28.       Derive packet processing context (PPC)
> >>>
> >>> [RP] Fixed.
> >>>
> >>>>
> >>>> d) In the pseudocode, we see Upper-layer Header.  In other parts of
> >>>> the document, we mostly see Upper-Layer header (but upper layer
> >>>> headers also appears).  Please let us know if/how these terms may
> >>>> be made consistent in both the pseudocode and the body of the
> document.
> >>>>
> >>>> Original:
> >>>> S12.     # (SR Upper-layer Header Error)
> >>>>
> >>>> Perhaps:
> >>>> S12.     # (SR Upper-Layer header Error)
> >>>>
> >>>
> >>> [RP] RFC 8986 uses "Upper-Layer Header" with capital H in title of
> >>> Section
> >> 4.1.1 and "Upper-Layer header" in rest of the text. I think we can
> >> use the same approach.
> >>>
> >>>> e)  Please review our update to the reference to RFC 8986 in the
> >>>> pseudocode and let us know any concerns.
> >>>>
> >>>> Original:
> >>>>  S09.         Execute H.Encaps or H.Encaps.Red with RS.Segment-List
> >>>>               on packet copy #RFC 8986 Section 5.1, 5.2
> >>>>
> >>>> Current:
> >>>>  S09.         Execute H.Encaps or H.Encaps.Red with RS.Segment-List
> >>>>               on packet copy #RFC 8986, Sections 5.1 and 5.2
> >>>>
> >>>>
> >>>
> >>> [RP] This is fine.
> >>>
> >>>> 	  -->
> >>>>
> >>>>
> >>>> 6) <!--[rfced] In the first sentence, "transit node" is singular.  In the
> >>>>    second, it's plural (i.e., "The transit nodes...").  Please
> >>>>    review and let us know if/how updates should be made for clarity.
> >>>>
> >>>> Original:
> >>>> The source can then send the Echo Request packet to a transit
> >>>> node's Replication SID.  The transit nodes replicate the packet by
> >>>> replacing the IPv6 destination address till the packet reaches the
> >>>> Leaf/Bud node which responds with an ICMPv6 Echo Reply.
> >>>>
> >>>> Perhaps:
> >>>> The source can then send the Echo Request packet to a transit
> >>>> node's Replication SID.  The transit node replicates the packet by
> >>>> replacing the IPv6 destination address until the packet reaches the
> >>>> Leaf/Bud node, which responds with an ICMPv6 Echo Reply.
> >>>
> >>> [RP] I have made the suggested change in edited XML file.
> >>>
> >>>>
> >>>> -->
> >>>>
> >>>>
> >>>> 7) <!--[rfced] In the following text:
> >>>>
> >>>> Original:
> >>>> Traceroute to a Leaf/Bud node Replication SID is not possible due
> >>>> to restriction prohibiting origination of ICMPv6 Time Exceeded
> >>>> error message for a Replication SID as described in the section below.
> >>>>
> >>>> Current:
> >>>> Traceroute to a Leaf/Bud node Replication SID is not possible due
> >>>> to restrictions prohibiting the origination of the ICMPv6 Time
> >>>> Exceeded error message for a Replication SID as described in Section 2.2.3.
> >>>>
> >>>> a) Please review our update to make "restrictions" plural.
> >>>>
> >>>> b) Please also confirm the update to point to Section 2.2.3.
> >>>>
> >>>
> >>> [RP] The changes are fine.
> >>>
> >>>> -->
> >>>>
> >>>>
> >>>> 8) <!--[rfced] In the following, the close proximity of two occurrences
> >>>>    of "from" makes this sentence possibly difficult to parse on a
> >>>>    single read-through.  Might the following suggested text be
> >>>>    acceptable?
> >>>>
> >>>> Original:
> >>>> This is to prevent a storm of ICMPv6 error messages resulting from
> >>>> replicated
> >>>> IPv6 packets from overwhelming a source node.
> >>>>
> >>>> Perhaps:
> >>>> This is to prevent a source node from being overwhelmed by a storm
> >>>> of
> >>>> ICMPv6 error messages resulting from replicated IPv6 packets.
> >>>> -->
> >>>>
> >>>
> >>> [RP] I have made the suggested change in edited XML file.
> >>>
> >>>>
> >>>> 9) <!--[rfced] Please review the list in the Security Considerations
> >>>>    section.  While most points begin with a verb phrase, a few
> >>>>    points do not.  Please let us know if/how we may make this list
> >>>>    parallel in structure.
> >>>>
> >>>> Original:
> >>>>
> >>>>  *  For SR-MPLS deployments:
> >>>>
> >>>>     -  By disabling MPLS on external interfaces of each edge node or
> >>>>        any other technique to filter labeled traffic ingress on these
> >>>>        interfaces.
> >>>>
> >>>>  *  For SRv6 deployments:
> >>>>
> >>>>     -  Allocate all the SIDs from an IPv6 prefix block S/s and
> >>>>        configure each external interface of each edge node of the
> >>>>        domain with an inbound infrastructure access list (IACL) that
> >>>>        drops any incoming packet with a destination address in S/s.
> >>>>
> >>>>     -  Additionally, an iACL may be applied to all nodes (k)
> >>>>        provisioning SIDs as defined in this specification:
> >>>>
> >>>>        o  Assign all interface addresses from within IPv6 prefix A/a.
> >>>>           At node k, all SIDs local to k are assigned from prefix Sk/
> >>>>           sk.  Configure each internal interface of each SR node k in
> >>>>           the SR domain with an inbound IACL that drops any incoming
> >>>>           packet with a destination address in Sk/sk if the source
> >>>>           address is not in A/a.
> >>>>
> >>>>     -  Denying traffic with spoofed source addresses by implementing
> >>>>        recommendations in BCP 84 [RFC3704].
> >>>>
> >>>>     -  Additionally the block S/s from which SIDs are allocated may be
> >>>>        a non-globally-routable address such as ULA or the prefix
> >>>>        defined in [I-D.ietf-6man-sids].
> >>>> -->
> >>>
> >>> [RP] The updated text is fine.
> >>>
> >>>>
> >>>>
> >>>> 10) <!--[rfced] This sentence may be easier to get through on a single
> >>>>    read if broken into a list as follows.  Please let us know if
> >>>>    this is agreeable.
> >>>>
> >>>> Original:
> >>>> If an attacker can forge an IPv6 packet with source address of a
> >>>> node, Replication SID as destination address and an IPv6 Hop Limit
> >>>> such that nodes which forward replicated packets on IPv6 locator
> >>>> unicast prefix, decrement the Hop Limit to zero, then these nodes
> >>>> can cause a storm of
> >>>> ICMPv6 Error packets to overwhelm the source node under attack.
> >>>>
> >>>> Perhaps:
> >>>>
> >>>> If an attacker can forge an IPv6 packet with:
> >>>>
> >>>> * the source address of a node,
> >>>> * a Replication SID as the destination address, and
> >>>> * an IPv6 Hop Limit such that nodes that forward replicated packets
> >>>> on an IPv6 locator unicast prefix decrement the Hop Limit to zero,
> >>>>
> >>>> then these nodes can cause a storm of ICMPv6 error packets to
> >>>> overwhelm the source node under attack.
> >>>>
> >>>
> >>> [RP] I have split up the sentence as suggested in edited XML file.
> >>>
> >>>> -->
> >>>>
> >>>>
> >>>> 11) <!-- [rfced] Please review the "type" attribute of each sourcecode
> >>>>    element in the XML file to ensure correctness. If the current
> >>>>    list of preferred values for "type"
> >>>>    (https://www.rfc-editor.org/materials/sourcecode-types.txt) does
> >>>>    not contain an applicable type, then feel free to let us
> >>>>    know. Also, it is acceptable to leave the "type" attribute not
> >>>>    set.
> >>>
> >>> [RP] "pseudocode" type is appropriate.
> >>>
> >>>> -->
> >>>>
> >>>>
> >>>> 12) <!-- [rfced] We have a few questions regarding the terms used in this
> >>>>    document.
> >>>>
> >>>> a. End.Replicate is treated differently in the two instances below.
> >>>> Please review and let us know if/how these should be made uniform.
> >>>> Perhaps this term should be added to the Terminology section in
> >>>> lieu of the
> >> two descriptions?
> >>>>
> >>>> Original:
> >>>> “Endpoint with replication” behavior (End.Replicate for short)
> >>>>
> >>>> and
> >>>>
> >>>> Original:
> >>>> The "Endpoint with replication and/or decapsulate behavior
> >>>> (End.Replicate for
> >>>> short) is variant of End behavior.
> >>>>
> >>>
> >>> [RP] I have made changes to make both of this consistent (by using "
> >>> Endpoint
> >> with replication and/or decapsulate") in the edited XML file.
> >>>
> >>>>
> >>>> b. Regarding hyphenation and capitalization of the following terms:
> >>>>
> >>>> i. Anycast SID: This term appears without a hyphen throughout the
> >>>> document, but in cited RFCs, it appears as Anycast-SID. May we
> >>>> update to the hyphenated form for consistency with these previous RFCs?
> >>>>
> >>> [RP] Yes, please update.
> >>>
> >>>> ii. Adjacency SID: This term seems to be "Adj-SID" in RFC 8402.
> >>>> Please review this usage and let us know if we can adjust to use "Adj-SID"
> >>>> for consistency with this cited RFC.
> >>>>
> >>> [RP] Yes, please use "Adj-SID"
> >>>
> >>>> iii. Replication SID: This term appears both hyphenated and without
> >>>> a hyphen (and in lowercase at times) throughout the document. May
> >>>> we update all instances to "Replication-SID", for consistency with
> >>>> the previous related terms and cited RFCs?
> >>>>
> >>> [RP] Yes, please update to "Replication-SID"
> >>>
> >>>> iv. FYI - Related to the above, we see the following terms in the
> >>>> document:
> >>>>
> >>>> Node-SID
> >>>> PeerSet SID
> >>>> context SID
> >>>>
> >>>
> >>> [RP] RFC 8402 uses "Node-SID" and "PeerSet SID" (without
> >>> hyphenation) and
> >> we have adopted it from there, but it is fine to use "PeerSet-SID". "context
> SID"
> >> is introduced in this document and can therefore be changed to "context-
> SID".
> >>>
> >>>> In addition to:
> >>>> R-SID
> >>>> A-SID
> >>>> N-SID
> >>>>
> >>>> Please consider these when making decisions related to i-iii above.
> >>>>
> >>>> c. Several terms in this document appear separated with a slash
> >>>> (/), but it is unclear whether the slash stands for "and", "or", or
> >>>> "and/or". Please review uses of the slash throughout this document
> >>>> and let us know how to adjust for clarity.
> >>>>
> >>> [RP] I have replaced all occurrences of  slash (/) in "Leaf/Bud" and
> >> "MVPN/EVPN" with "and" or "or" as appropriate. Please let me know if
> >> there are any other ambiguous usage of the slash.
> >>>
> >>>>
> >>>> d. Should the following capitalized terms (seemingly node names) be
> >>>> changed to lowercase throughout for consistency with previous RFCs?
> >>>>
> >>>> Downstream
> >>>> Root
> >>>> Leaf
> >>>> Bud
> >>>>
> >>>> Related: We see both Replication node and Non-replication node.
> >>>> Please consider if all node name should be lowercase in light of the above.
> >>>>
> >>> [RP] Yes, these can be changed to lowercase.
> >>>
> >>>> e. We have updated the following terms to use the form on the right.
> >>>> Please review and let us know any objections:
> >>>>
> >>>> Active Segment / active segment (to match RFC 8402) replication
> >>>> branch / Replication branch
> >>>>
> >>> [RP] Change to "active segment" is fine, but I don't think "Replication
> branch"
> >> change is appropriate because lowercase "replication" is used to
> >> signify the act of replication instead of needing a proper noun with
> uppercase "Replication".
> >>>
> >>>>
> >>>> f. We see the following terms used inconsistently throughout the
> document.
> >>>> Please review and let us know if/how these may be made uniform.
> >>>>
> >>>> Replication segment vs. Replication Segment vs. replication segment
> >>>
> >>> [RP] I think using "Replication segment" will be consistent.
> >>>
> >>>>
> >>>> f. Please review the following questions about the message names below:
> >>>>
> >>>> i. Should "message" be lowercased or capitalized?
> >>>>
> >>>> Packet Too Big message vs. Parameter Problem Message
> >>>>
> >>>> ii. We see Parameter Problem both with and without ICMPv6.  Please
> >>>> review and let us know if/how these uses should be made uniform.
> >>>>
> >>>> iii. May we make the error codes uniform with regard to capping and
> >> ordering?
> >>>>
> >>>>
> >>>> Originals:
> >>>> ICMPv6 Parameter Problem with Code 0
> >>>> ICMPv6 Parameter Problem with Code 4 an ICMPv6 error message
> >>>> (parameter problem, code 0) Parameter Problem Message, Code 2
> >>>> Parameter Problem Message, code 2 ICMPv6 Error
> >> messages.
> >>>>
> >>>> Perhaps (making assumptions about i, ii, and iii above):
> >>>> ICMPv6 Parameter Problem message with Code 0
> >>>> ICMPv6 Parameter Problem message with Code 4
> >>>> ICMPv6 Parameter Problem message with Code 0
> >>>> ICMPv6 Parameter Problem message with Code 2
> >>>> ICMPv6 Parameter Problem message with Code 2
> >>>>
> >>> [RP] Above suggestion is fine.
> >>>
> >>>> -->
> >>>>
> >>>>
> >>>> 13) <!--[rfced] We had the following questions/comments related to
> >>>>    abbreviations used throughout the document:
> >>>>
> >>>> a. FYI - We have expanded the following abbreviations upon first
> >>>> use per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review
> >>>> each expansion in the document carefully to ensure correctness:
> >>>>
> >>>> Destination Address (DA)
> >>>> Unique Local Address (ULA)
> >>>> Operations, Administration, and Maintenance (OAM)
> >>>>
> >>> [RP] This is fine.
> >>>
> >>>> b. FYI - We will update to use the abbreviated form of the
> >>>> following terms after the abbreviation is expanded on first use.
> >>>> Please let us know any
> >> objections.
> >>>>
> >>>> Destination Address will become DA
> >>>> Replication state will become RS
> >>>> Segment Routing will become SR
> >>>>
> >>> [RP] This Is fine.
> >>>
> >>>>
> >>>> c) Please review this use of POP:
> >>>>
> >>>> Original:
> >>>> ...is a Replication SID, the processing results in a POP [RFC8402]...
> >>>>
> >>>> We do not see POP being expanded as an abbreviation in RFC 8402 or
> >>>> any of the normative references.  Please let us know if/how we may
> >>>> expand
> >> it.
> >>>>
> >>> [RP] POP is not used an acronym here. It signifies a "pop" operation
> >>> on the
> >> top label of the label stack.
> >>>
> >>>> d) Please review the expansion and use of IACL/iACL.
> >>>>
> >>>> While we see the same expansion as used in this document in RFC
> >>>> 8754 (see below), we are curious about the 1:1 relationship between
> >>>> the initialism and the expansion.
> >>>>
> >>>> We also note a single use of "iACL" in this document (see below).
> >>>>
> >>>> Original:
> >>>> -  Allocate all the SIDs from an IPv6 prefix block S/s and
> >>>> configure each external interface of each edge node of the  domain
> >>>> with an inbound infrastructure access list (IACL) that  drops any
> >>>> incoming packet with a destination address in S/s.
> >>>>
> >>>> then later:
> >>>>
> >>>> Original:
> >>>> -  Additionally, an iACL may be applied to all nodes (k)
> >>>> provisioning SIDs as defined in this specification:
> >>>>
> >>>> i) Should these uses be made "infrastructure Access Control List
> >>>> (iACL)" on expansion and then "iACL" thereafter?  Note that we see
> >>>> "Infrastructure Access Control List (iACL)" used in RFCs 7404 and 9098.
> >>>>
> >>>> ii) Or perhaps "infrastructure Access Control List (ACL)" on
> >>>> expansion as used in RFCs 6752 and 9252 (and "infrastructure ACL
> >> thereafter")?
> >>>>
> >>>> iii) Or maybe we should switch to using "Infrastructure Access
> >>>> Control List (IACL)" with a 1:1 between the expansion and the
> >>>> initialism and corresponding capitalization?  This form has not
> >>>> appeared in any published RFCs to date, but if this is how people
> >>>> know it,
> >> then perhaps this is the way to go in the future?
> >>>>
> >>>> We appreciate any guidance you may have.
> >>>>
> >>>
> >>> [RP] I don't think there is an established terminology for ACL and
> >>> lowercase
> >> "i" or uppercase "I" do not make a difference. It should be fine to
> >> use using "Infrastructure Access Control List (IACL)".
> >>>> -->
> >>>>
> >>>>
> >>>> 14) <!-- [rfced] Please review the "Inclusive Language" portion of the
> >>>>    online Style Guide
> >>>>    <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
> >>>>    and let us know if any changes are needed.
> >>>>
> >>>> Note that our script did not flag any words in particular, but this
> >>>> should still be reviewed as a best practice.-->
> >>>>
> >>>>
> >>>> Thank you.
> >>>>
> >>>> RFC Editor/kf/mf
> >>>>
> >>>> *****IMPORTANT*****
> >>>>
> >>>> Updated 2024/01/19
> >>>>
> >>>> RFC Author(s):
> >>>> --------------
> >>>>
> >>>> Instructions for Completing AUTH48
> >>>>
> >>>> Your document has now entered AUTH48.  Once it has been reviewed
> >>>> and approved by you and all coauthors, it will be published as an RFC.
> >>>> If an author is no longer available, there are several remedies
> >>>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> >>>>
> >>>> You and you coauthors are responsible for engaging other parties
> >>>> (e.g., Contributors or Working Group) as necessary before providing
> >>>> your
> >> approval.
> >>>>
> >>>> Planning your review
> >>>> ---------------------
> >>>>
> >>>> Please review the following aspects of your document:
> >>>>
> >>>> *  RFC Editor questions
> >>>>
> >>>>  Please review and resolve any questions raised by the RFC Editor
> >>>> that have been included in the XML file as comments marked as
> >>>>  follows:
> >>>>
> >>>>  <!-- [rfced] ... -->
> >>>>
> >>>>  These questions will also be sent in a subsequent email.
> >>>>
> >>>> *  Changes submitted by coauthors
> >>>>
> >>>>  Please ensure that you review any changes submitted by your
> >>>> coauthors.  We assume that if you do not speak up that you  agree
> >>>> to changes submitted by your coauthors.
> >>>>
> >>>> *  Content
> >>>>
> >>>>  Please review the full content of the document, as this cannot
> >>>> change once the RFC is published.  Please pay particular attention to:
> >>>>  - IANA considerations updates (if applicable)
> >>>>  - contact information
> >>>>  - references
> >>>>
> >>>> *  Copyright notices and legends
> >>>>
> >>>>  Please review the copyright notice and legends as defined in  RFC
> >>>> 5378 and the Trust Legal Provisions  (TLP –
> >>>> https://trustee.ietf.org/license-info/).
> >>>>
> >>>> *  Semantic markup
> >>>>
> >>>>  Please review the markup in the XML file to ensure that elements
> >>>> of  content are correctly tagged.  For example, ensure that
> >>>> <sourcecode>  and <artwork> are set correctly.  See details at
> >>>> <https://authors.ietf.org/rfcxml-vocabulary>.
> >>>>
> >>>> *  Formatted output
> >>>>
> >>>>  Please review the PDF, HTML, and TXT files to ensure that the
> >>>> formatted output, as generated from the markup in the XML file, is
> >>>> reasonable.  Please note that the TXT will have formatting
> >>>> limitations compared to the PDF and HTML.
> >>>>
> >>>>
> >>>> Submitting changes
> >>>> ------------------
> >>>>
> >>>> To submit changes, please reply to this email using ‘REPLY ALL’ as
> >>>> all the parties CCed on this message need to see your changes. The
> >>>> parties
> >>>> include:
> >>>>
> >>>>  *  your coauthors
> >>>>
> >>>>  *  rfc-editor@rfc-editor.org (the RPC team)
> >>>>
> >>>>  *  other document participants, depending on the stream (e.g.,
> >>>>     IETF Stream participants are your working group chairs, the
> >>>>     responsible ADs, and the document shepherd).
> >>>>
> >>>>  *  auth48archive@rfc-editor.org, which is a new archival mailing list
> >>>>     to preserve AUTH48 conversations; it is not an active discussion
> >>>>     list:
> >>>>
> >>>>    *  More info:
> >>>>       https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-
> >>>> 4Q9l2USxIAe6P8O4Zc
> >>>>
> >>>>    *  The archive itself:
> >>>>       https://mailarchive.ietf.org/arch/browse/auth48archive/
> >>>>
> >>>>    *  Note: If only absolutely necessary, you may temporarily opt out
> >>>>       of the archiving of messages (e.g., to discuss a sensitive matter).
> >>>>       If needed, please add a note at the top of the message that you
> >>>>       have dropped the address. When the discussion is concluded,
> >>>>       auth48archive@rfc-editor.org will be re-added to the CC list and
> >>>>       its addition will be noted at the top of the message.
> >>>>
> >>>> You may submit your changes in one of two ways:
> >>>>
> >>>> An update to the provided XML file
> >>>> — OR —
> >>>> An explicit list of changes in this format
> >>>>
> >>>> Section # (or indicate Global)
> >>>>
> >>>> OLD:
> >>>> old text
> >>>>
> >>>> NEW:
> >>>> new text
> >>>>
> >>>> You do not need to reply with both an updated XML file and an
> >>>> explicit list of changes, as either form is sufficient.
> >>>>
> >>>> We will ask a stream manager to review and approve any changes that
> >>>> seem beyond editorial in nature, e.g., addition of new text,
> >>>> deletion of text, and technical changes.  Information about stream
> >>>> managers can be found in the FAQ.  Editorial changes do not require
> >>>> approval from a
> >> stream manager.
> >>>>
> >>>>
> >>>> Approving for publication
> >>>> --------------------------
> >>>>
> >>>> To approve your RFC for publication, please reply to this email
> >>>> stating that you approve this RFC for publication.  Please use
> >>>> ‘REPLY ALL’, as all the parties CCed on this message need to see your
> approval.
> >>>>
> >>>>
> >>>> Files
> >>>> -----
> >>>>
> >>>> The files are available here:
> >>>>  https://www.rfc-editor.org/authors/rfc9524.xml
> >>>>  https://www.rfc-editor.org/authors/rfc9524.html
> >>>>  https://www.rfc-editor.org/authors/rfc9524.pdf
> >>>>  https://www.rfc-editor.org/authors/rfc9524.txt
> >>>>
> >>>> Diff file of the text:
> >>>>  https://www.rfc-editor.org/authors/rfc9524-diff.html
> >>>>  https://www.rfc-editor.org/authors/rfc9524-rfcdiff.html (side by
> >>>> side)
> >>>>
> >>>> Diff of the XML:
> >>>>  https://www.rfc-editor.org/authors/rfc9524-xmldiff1.html
> >>>>
> >>>> The following files are provided to facilitate creation of your own
> >>>> diff files of the XML.
> >>>>
> >>>> Initial XMLv3 created using XMLv2 as input:
> >>>>  https://www.rfc-editor.org/authors/rfc9524.original.v2v3.xml
> >>>>
> >>>> XMLv3 file that is a best effort to capture v3-related format
> >>>> updates
> >>>> only:
> >>>>  https://www.rfc-editor.org/authors/rfc9524.form.xml
> >>>>
> >>>>
> >>>> Tracking progress
> >>>> -----------------
> >>>>
> >>>> The details of the AUTH48 status of your document are here:
> >>>>  https://www.rfc-editor.org/auth48/rfc9524
> >>>>
> >>>> Please let us know if you have any questions.
> >>>>
> >>>> Thank you for your cooperation,
> >>>>
> >>>> RFC Editor
> >>>>
> >>>> --------------------------------------
> >>>> RFC9524 (draft-ietf-spring-sr-replication-segment-19)
> >>>>
> >>>> Title            : SR Replication segment for Multi-point Service Delivery
> >>>> Author(s)        : D. Voyer, Ed., C. Filsfils, R. Parekh, H. Bidgoli, Z. Zhang
> >>>> WG Chair(s)      : Bruno Decraene, Alvaro Retana, Joel M. Halpern
> >>>>
> >>>> Area Director(s) : Alvaro Retana, John Scudder, Andrew Alston
> >>>>
> >>>
> >>> <rfc9524-Jan26.xml><rfc9524-Jan26.diff.html>
> >>
> >>
> >>
> >>
> >
> > <rfc9524-Feb09.xml><rfc9524-Feb09.diff.html>