Re: [auth48] AUTH48: RFC-to-be 9488 <draft-ietf-pce-local-protection-enforcement-11> for your review

"Mustapha Aissaoui (Nokia)" <mustapha.aissaoui@nokia.com> Thu, 05 October 2023 19:31 UTC

Return-Path: <mustapha.aissaoui@nokia.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A84C8C1516E1; Thu, 5 Oct 2023 12:31:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nokia.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e90-VFf1hPMD; Thu, 5 Oct 2023 12:31:48 -0700 (PDT)
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (mail-bn8nam04on2072e.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e8d::72e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA140C151082; Thu, 5 Oct 2023 12:31:47 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Vnjnm+s9J35bLH+cxCD/1V8Zb2PbNg4QXQJxEK6P5EaedoWDnsf2jZKC2wmuAWFgHVOEhYn5lVNlmDvhftvdHxA8KDdTrmR+gbq3KidaAmgE6tAIxoL732Rfvjd6fi8PGjnjJPMgi/BxsSNal21pmr9x2rQS3VU2TX60qrUYTWDTBuNdz8ADWAg73yBkxPMh7LGFBl9LI4wWWp10fmx0c/PN8WKO2F4Jx5NvfRSEtyC6fGWOukk1+g2wiwlJG9HD6z4ErNsLIqOBgVcWMFokaQWvHSieuz67cPdUElzocOGJsHOLRcDycv0bilJh9bIWjo4MKmZZkXV1JLkffz0n2w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=C9GEzn9nqall/d5iaYeW5KFALztXyQtz3pK88frl5Lk=; b=D8H1FrhsomHduCKA5mvF25DeUcQa3EL4+c+bxbteIWnm+9bLqmCzSQk6ThNnEcJ47E+BOLVFEN8Te7ilyPuolH1ZsoUutd2oPaeRYL0NBvMGUWl7vtAjyg81qH/WXejibB9ZOXXakcY8yr1mHLIKCImVISIiG+NL8D7bNIvVm8QCVTvORHE8/GkJUFeShxyGes1vlzyBLy+bFTuyh30b92tgQscVVJHOIbrFCsgTzGPLp5lw9Ti13tKx49N+VGGsYaE6oPnMTbjTD/UMmVE0J0AR6Klox8e3souhMEo/LFmtJu79H+udlvf5zGaY8e1bNdzjhGF9CzboM5eKRV8hcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C9GEzn9nqall/d5iaYeW5KFALztXyQtz3pK88frl5Lk=; b=nJsughp9a45El5OJQMSytOS6VEGU/0XzLFkWdsKBH8y9lc2BvwIz2/gX4+gENjbu7mbzCGKwbGADEWc0iN+5fcZt0PdY0f5Rk+H1DwodW0DrQUEFk1NDU5WAvB1ZvA21fSyfFzS6YugQNcy8hW/GdbUrikoaGV01jOFqGp9Paecb44+0bGgRKTYUgUj7Ahzr9A8bXXasFAdif7WULDLHYuROziiMchfwcEVCX584URaMEVjP1RMQEDNq5osIKgnPCLG1iMLlRb15a7iA4UGPsYzz7cZ0oIQ1iBPNFpixRcqw7ud4JH/8sQmCXgWbXXH6V0tyqYqe3FO1skYu0HnK5w==
Received: from DM6PR08MB6027.namprd08.prod.outlook.com (2603:10b6:5:103::18) by DM8PR08MB7511.namprd08.prod.outlook.com (2603:10b6:5:314::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.35; Thu, 5 Oct 2023 19:31:41 +0000
Received: from DM6PR08MB6027.namprd08.prod.outlook.com ([fe80::4a19:1bc3:c805:8a68]) by DM6PR08MB6027.namprd08.prod.outlook.com ([fe80::4a19:1bc3:c805:8a68%7]) with mapi id 15.20.6838.024; Thu, 5 Oct 2023 19:31:41 +0000
From: "Mustapha Aissaoui (Nokia)" <mustapha.aissaoui@nokia.com>
To: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "Andrew Stone (Nokia)" <andrew.stone@nokia.com>, "ssidor@cisco.com" <ssidor@cisco.com>, "ssivabal@ciena.com" <ssivabal@ciena.com>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "pce-ads@ietf.org" <pce-ads@ietf.org>, "pce-chairs@ietf.org" <pce-chairs@ietf.org>, "julien.meuric@orange.com" <julien.meuric@orange.com>, "jgs@juniper.net" <jgs@juniper.net>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: AUTH48: RFC-to-be 9488 <draft-ietf-pce-local-protection-enforcement-11> for your review
Thread-Index: AQHZ8k9G5l2AkFTE2EiTis19gHD5t7A7oCU6
Date: Thu, 05 Oct 2023 19:31:41 +0000
Message-ID: <DM6PR08MB6027B31104930774B9D5AC9DE4CAA@DM6PR08MB6027.namprd08.prod.outlook.com>
References: <20230928210339.1BBDD76358@rfcpa.amsl.com>
In-Reply-To: <20230928210339.1BBDD76358@rfcpa.amsl.com>
Accept-Language: en-US
Content-Language: en-CA
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nokia.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR08MB6027:EE_|DM8PR08MB7511:EE_
x-ms-office365-filtering-correlation-id: 26e92282-1064-44ba-2be5-08dbc5d9b39a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB6027.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(346002)(39860400002)(376002)(396003)(366004)(136003)(230922051799003)(64100799003)(186009)(1800799009)(451199024)(26005)(82960400001)(66574015)(71200400001)(84970400001)(86362001)(55236004)(38100700002)(33656002)(9686003)(53546011)(166002)(38070700005)(83380400001)(6506007)(122000001)(7696005)(66476007)(66946007)(76116006)(966005)(54906003)(478600001)(8676002)(52536014)(21615005)(110136005)(316002)(5660300002)(4326008)(8936002)(55016003)(66446008)(2906002)(30864003)(64756008)(66556008)(41300700001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: hrY3ckuA9pG+UsM3CdLfkxV60Y1wusR0IHP9ZxKVwqU5XGgAJzWxiNWsh+RMFlvJA8QYCcgSWhPk83UdcrTX6QLdluB9HAiOOqD241MGGmecwMIhAsD+uk2ndWIwTT3gghOss/BKVlVLA9ezC/i9PtKQRBHG+YxG4q97qxwYvXZXtOZSGq6IEbVWtwM+y1dWZrh0FXwmcPh1KHAgVxZygtuQq5bOsVfl453ptivDWvFiLv/j23x1eH2Fcaq9c+wOfHxaE7guB9qUtek6zCwY9ctSjmZHWqYQFVLpqO1g4xZKsJH39nwmRQaRTYZSFdxSBk1V93rHrbf9tJUPMuTFQUI6sjs+vbNYNuA3wjpYO4zhjExx7WXqzNRjjnu7Klx4aDSvW5+c3UB0Kh+ubQzAGkxxQa7MRrFYP7HJTCITHm7Ht2tFRASpUfztSDt1JVmJTaYDx3dUzfZgFhsEEtRKCVR/WLx5G6O7JrkKbzDdh3xOreZocw1rJyQzFFJU8hswrhT3dpeJZo8+vmVMNhDdnGHz42JGq8lX21rqYcza816RuG3SxL7OEOviu8AZ4jkZihehKjkgguLGIp5WJ1c8e+Q7HWBq3aEHN7GD4yUungamyk66pxs3IjRIutYXG8WIPAHMliWtdLunItM/NRCZT254jToJ9k/ATdVg8OY/PAUCOPEjBjriqTdIJqPVFe9FYdRfPAQe1jPPlkYc0iULF/R/skEiUg+DLsmAbDA/PnLJC8JuEJhYMEomlx9xABihCcQGIEMBOOKSk/12csNrmquTLQw3bcc4BNuwx24dS7O064qX5vjOqtMp2Edz0bsmoZZagPtdZXG+DdMMf6Ff0dPRlIyAIgM4zfbjU8ZGl6m5qA1VpB+EsrcfnktLT/JQgVY8cnsWE+KwHTKT8AkbN5jK/AIBz+UF3XSXJMY5NsXI36QWSv4e0U1lq3fb3CTBJPiePL5/2Bg+CC04xMIRCWB4R2965W/nkkWopTh+HVEiCGymokBDPJ+a8qCzF2cdiEb53jB+chmWAIN3JIlqN50ILbeu0koQ/1RaS9RyOHbKNdjIOXJKME0nkrUCNp0mE4ZaMQi14bDERUiZr2B1kSkFLPK55IH2bQ+pBpa1yL1kRhg0y1LKC9GTQyjZW7/pVmCe5Zecfi/U+L38Ex/KGykR2pFyZ+h7yztSCmc3zxgZbdYvSu/r80kwmQmexYj8oXtzn0FWPuM4ymFutp3QsWUoH6iDyUJI2gA8ahf2WADMziiVb5P2O6+nM+D0L117Mq/9+yzPfPBdRWM/I3O1bNjrSXhvQJmAPVJuaMUp2RrjZ1WaMexDOQFC/M7z+82eZVI4nOAk1RYXDfA3LZdMyYJtMSms8hXCxwJl404EHhSLA6l4oh6gMoWa7sxNdKPlSzGMZrTPP7/6UwEa2ivpE7GzpYw0LEIy7mevaZwC4mgyjf1yXJZ38LgZDf/G1iCYmK4qOTN/MV/6mGfA4gM+wbQcUex/O/ETiGeLzap7SjM7LVRu9YYxyNcbxr889w5QYqoMDqFZO9KQZCOJ/gqM1pqmg58BscuI5za7zZObHYMlS0UPphBnTXCR5GbwmFF60t9glhr/EUYZA8br6V6lkI4gaAdeb9FiDWyaJqC9FbE=
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB6027B31104930774B9D5AC9DE4CAADM6PR08MB6027namp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR08MB6027.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 26e92282-1064-44ba-2be5-08dbc5d9b39a
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Oct 2023 19:31:41.4808 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OD5Fb48FJzoSJb+A1fbD4p0UlJROwDdyI3iK+PyooLJSwVmn4ZnowZ9G777ekHZ6P4feEvn4lJgRz4dLQt7Knfbb72/dVo5NqhKgUIWYjpM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR08MB7511
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/zCPVHIoSbyoegIX72MYxtY2YeVk>
Subject: Re: [auth48] AUTH48: RFC-to-be 9488 <draft-ietf-pce-local-protection-enforcement-11> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Oct 2023 19:31:52 -0000

I approve this document for publication.

Regards,
Mustapha.

From: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>
Date: Thursday, September 28, 2023 at 5:03 PM
To: Andrew Stone (Nokia) <andrew.stone@nokia.com>, Mustapha Aissaoui (Nokia) <mustapha.aissaoui@nokia.com>, ssidor@cisco.com <ssidor@cisco.com>, ssivabal@ciena.com <ssivabal@ciena.com>
Cc: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>, pce-ads@ietf.org <pce-ads@ietf.org>, pce-chairs@ietf.org <pce-chairs@ietf.org>, julien.meuric@orange.com <julien.meuric@orange.com>, jgs@juniper.net <jgs@juniper.net>, auth48archive@rfc-editor.org <auth48archive@rfc-editor.org>
Subject: Re: AUTH48: RFC-to-be 9488 <draft-ietf-pce-local-protection-enforcement-11> for your review

CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext for additional information.



Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the following questions, which are also in the XML file.

1) <!-- [rfced] Please note that the title of the document has been updated as
follows. We expanded the abbreviation "PCEP" per Section 3.6 of RFC 7322
("RFC Style Guide"). Please review.

Original:
  Local Protection Enforcement in PCEP

Current:
  Local Protection Enforcement in the Path Computation Element
  Communication Protocol (PCEP)

Note that we also updated the abbreviated title (only appears in the running
header of the pdf output) to match the document title as there was space.

Original:
  Protection Enforcement

Current:
  Local Protection Enforcement in PCEP
-->


2) <!-- [rfced] Please insert any keywords (beyond those that appear in the
title) for use on https://www.rfc-editor.org/search. -->


3) <!-- [rfced] For this sentence in the Abstract, is "protection strictness"
okay, or would "protection enforcement" (like in the document title) be
better?

Original:
   This document also introduces a new flag for
   signalling protection strictness in PCEP.
-->


4) <!-- [rfced] Please review "define enforcement, or strictness of the
protection requirement" here. Would it be helpful to update to either
"define the enforcement of the protection requirement" or "define the
strictness of the protection enforcement requirement"?

Original:
   It is desirable for an operator to be able to define the enforcement,
   or strictness of the protection requirement.

Perhaps:
   It is desirable for an operator to be able to define the enforcement
   of the protection requirement.

Or:
   It is desirable for an operator to be able to define the strictness
   of the protection enforcement requirement.
-->


5) <!-- [rfced] Will readers understand what is meant by "reference notes"? Also,
we revised "is path setup type and data plane technology agnostic" as
follows to improve readability.

Original:
   The document contains reference notes for Segment Routing, however
   the content described is path setup type and data plane technology
   agnostic.

Current:
   The document contains reference notes for Segment Routing; however,
   the content described is agnostic in regard to path setup type and
   data plane technology.
-->


6) <!-- [rfced] We are having trouble understanding how the last part of this
sentence (i.e., "and the use case...") connects with the first
part. Also, would a citation be helpful for "RSVP"?

Original:
   The name of the flag uses the term "Desired", which by
   definition means "strongly wished for or intended" and the use case
   originated from the RSVP.

Perhaps:
   The name of the flag uses the term "Desired", which by
   definition means "strongly wished for or intended". The use case
   for this flag originated in RSVP.
-->


7) <!-- [rfced] May we update "Implementations of [RFC5440]" as follows for
clarity?

Original:
   Implementations of [RFC5440] have either interpreted the L flag as
   PROTECTION MANDATORY or PROTECTION PREFERRED, leading to operational
   differences.

Perhaps:
   Implementations that use PCEP [RFC5440] have interpreted the L flag as
   either PROTECTION MANDATORY or PROTECTION PREFERRED, leading to operational
   differences.
-->


8) <!-- [rfced] Should "service agreement definitions" here read "Service Level
Agreement definitions" or "SLA definitions"? Or is the current correct?

Original:
   A network may be providing transit to
   multiple service agreement definitions against the same base topology
   network, whose behavior could vary, such as wanting local protection
   to be invoked on some LSPs and not wanting local protection on
   others.
-->


9) <!-- [rfced] Please review "The boolean bit L flag". Would one of the
following options improve clarity and readability?

Original:
   The boolean bit L flag is unable to distinguish between the different
   options of PROTECTION MANDATORY, UNPROTECTED MANDATORY, PROTECTION
   PREFERRED and UNPROTECTED PREFERRED.

Perhaps:
   The L flag is a boolean bit and thus unable to distinguish between the different
   options of PROTECTION MANDATORY, UNPROTECTED MANDATORY, PROTECTION
   PREFERRED and UNPROTECTED PREFERRED.

Or:
   Because it is a boolean bit, the L flag is unable to distinguish between the different
   options of PROTECTION MANDATORY, UNPROTECTED MANDATORY, PROTECTION
   PREFERRED, and UNPROTECTED PREFERRED.
-->


10) <!-- [rfced] Two consecutive paragraphs in Section 4.2 begin with "For
example". Is "For example" needed here? Or should the second one be
updated to something like "As another example"? Please review.

Also, in the second paragraph below, we updated "is when an operator" to "is
for use cases in which an operator" for clarity and for consistency with the
previous paragraph. Please review.

Original:
   For example, PROTECTION MANDATORY is for use cases where an operator
   may need the LSP to follow a path which has local protection provided
   along the full path, ensuring that if there is a failure anywhere
   along the path that traffic will be fast re-routed at the point.

   For example, UNPROTECTED MANDATORY is when an operator may
   intentionally prefer an LSP to not be locally protected, and thus
   would rather local failures cause the LSP to go down. ...

Perhaps:
   PROTECTION MANDATORY is for use cases in which an operator
   may need the LSP to follow a path that has local protection provided
   along the full path, ensuring that if there is a failure anywhere
   along the path that traffic will be fast re-routed at the point.

   UNPROTECTED MANDATORY is for use cases in which an operator may
   intentionally prefer an LSP to not be locally protected and thus
   would rather local failures cause the LSP to go down.
-->


11) <!-- [rfced] Please review "protected with path protection" here. Would
updating to just "protected" retain the intended meaning?

Original:
   An example
   scenario is one where an LSP is protected with path protection via a
   secondary diverse LSP.

Perhaps:
   An example
   scenario is one where an LSP is protected via a secondary diverse LSP.
-->


12) <!-- [rfced] In Table 1, would it be helpful to list bit 6 first and then bit 7
(matches IANA registry)? Or do you prefer the current (matches order mentioned in
text before table)?
-->


13) <!-- [rfced] We updated this sentence as follows to more accurately describe
the figure. Please let us know any objections.

Original:
   The format of the LSPA Object as defined in [RFC5440] is:

Current:
   The following shows the format of the LSPA object as defined in
   [RFC5440] with the addition of the E flag defined in this document:
-->


14) <!-- [rfced] May we rephrase this sentence to improve clarity?

Original:
   Considerations in the message passing between the PCC and the PCE for
   the E flag bit which are not supported by the entity are outlined in
   this section, with requirements for the PCE and the PCC implementing
   this document described at the end.

Perhaps:
   This section outlines considerations for the E flag bit in the message
   passing between the PCC and the PCE that are not supported by the entity.
   The requirements for the PCE and the PCC implementing this document are described
   at the end.
-->


15) <!-- [rfced] Should "PCUpd E flag (and L flag)" be updated to "the E flag (and
L flag) in a PCUpd message" or something similar? Also, we used a
semicolon and changed "therefore" to "so" for clarity. Please review.

Original:
   For PCC-initiated LSPs, PCUpd E flag (and L flag) is an echo from the
   previous PCRpt however the bit value is ignored on the PCE from the
   previous PCRpt, therefore the E flag value set in the PCUpd is zero.

Perhaps:
   For PCC-initiated LSPs, the E flag (and L flag) in a PCUpd message is an echo from the
   previous PCRpt message; however, the bit value is ignored on the PCE from the
   previous PCRpt message, so the E flag value set in the PCUpd message is 0.
-->


16) <!-- [rfced] Will readers understand what "it" refers to here?

Original:
   For a PCC which does support this document, it MAY set the E flag to
   1 depending on local configuration.

Perhaps:
   A PCC that does support this document MAY set the E flag to
   1 depending on local configuration.

Or:
   For a PCC that does support this document, the E flag MAY be set to
   1 depending on local configuration.
-->


17) <!-- [rfced] Would you like the references to be alphabetized or left in their
current order?
-->


18) <!-- [rfced] Terminology

a) Please confirm the name/description for the E flag defined in this
document. We see the following forms used in the document:

Enforcement
Protection Enforcement
Local Protection Enforcement

Note: The current name in the "LSPA Object Flag Field" registry is "Protection
Enforcement" (see
https://www.iana.org/assignments/pcep/pcep.xhtml#lspa-object-flag-field); if
needed, we will request an update to the registry prior to publication.


b) Should "a local protection desired" here read "the L flag"?

Original:
   Therefore, a local protection desired does
   not require the transit router to satisfy protection in order to
   establish the RSVP signalled path.

Perhaps:
   Therefore, the L flag does
   not require the transit router to satisfy protection in order to
   establish the RSVP-signaled path.


c) FYI - We have updated instances of "PCRpt", "PCUpd", "PCReq", and
"PCInitiate" with the word "message" (i.e., "PCRpt message", "PCUpd message",
"PCReq message", and "PCInitiate message").


d) We see "Session Attribute" (initial caps and no hyphen) in RFC 3209, but we
do not see "SESSION-ATTRIBUTE" (all caps with hyphen). Please review and let
us know if any updates are needed in the following sentence.

Original:
   One such concept in PCEP is the 'Local Protection
   Desired' (L flag in the LSPA Object in [RFC5440]), which was
   originally defined in the SESSION-ATTRIBUTE Object in RFC3209.


e) "Segment Routed path" does not appear in RFC 8664, but "Segment
Routing path" does. Are any changes needed in these sentences?

Original:
   PCEP Extensions for Segment Routing ([RFC8664]) extends support in
   PCEP for Segment Routed paths.
   ...
   When computing a Segment Routed path, It is RECOMMENDED that a PCE
   assume a Node SID is protected.

f) We see that "LSP object" is used in both RFCs 8231 and 8281,
but "LSP Attribute Object" (or "LSPA") is not used in either. Should the
sentence below be updated to reflect usage in the cited documents?

Original:
   It is
   important to note that [RFC8231] and [RFC8281] permit the LSP
   Attribute Object to be included in PCUpd messages for PCC-initiated
   and PCE-initiated LSPs.
-->


19) <!-- [rfced] FYI - We have added expansions for the following abbreviations
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

Path Computation Element Communication Protocol (PCEP)
Label Switched Path (LSP)
Border Gateway Protocol - Link State (BGP-LS)
Service Level Agreement (SLA)
-->


20) <!-- [rfced] Please review the "Inclusive Language" portion of the online
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.

Note that our script did not flag any words in particular, but this should
still be reviewed as a best practice.
-->


Thank you.

RFC Editor/rv/ap

On Sep 28, 2023, at 2:02 PM, rfc-editor@rfc-editor.org wrote:

*****IMPORTANT*****

Updated 2023/09/28

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and
approved by you and all coauthors, it will be published as an RFC.
If an author is no longer available, there are several remedies
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties
(e.g., Contributors or Working Group) as necessary before providing
your approval.

Planning your review
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

   Please review and resolve any questions raised by the RFC Editor
   that have been included in the XML file as comments marked as
   follows:

   <!-- [rfced] ... -->

   These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors

   Please ensure that you review any changes submitted by your
   coauthors.  We assume that if you do not speak up that you
   agree to changes submitted by your coauthors.

*  Content

   Please review the full content of the document, as this cannot
   change once the RFC is published.  Please pay particular attention to:
   - IANA considerations updates (if applicable)
   - contact information
   - references

*  Copyright notices and legends

   Please review the copyright notice and legends as defined in
   RFC 5378 and the Trust Legal Provisions
   (TLP – https://trustee.ietf.org/license-info/).

*  Semantic markup

   Please review the markup in the XML file to ensure that elements of
   content are correctly tagged.  For example, ensure that <sourcecode>
   and <artwork> are set correctly.  See details at
   <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

   Please review the PDF, HTML, and TXT files to ensure that the
   formatted output, as generated from the markup in the XML file, is
   reasonable.  Please note that the TXT will have formatting
   limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all
the parties CCed on this message need to see your changes. The parties
include:

   *  your coauthors

   *  rfc-editor@rfc-editor.org (the RPC team)

   *  other document participants, depending on the stream (e.g.,
      IETF Stream participants are your working group chairs, the
      responsible ADs, and the document shepherd).

   *  auth48archive@rfc-editor.org, which is a new archival mailing list
      to preserve AUTH48 conversations; it is not an active discussion
      list:

     *  More info:
        https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

     *  The archive itself:
        https://mailarchive.ietf.org/arch/browse/auth48archive/

     *  Note: If only absolutely necessary, you may temporarily opt out
        of the archiving of messages (e.g., to discuss a sensitive matter).
        If needed, please add a note at the top of the message that you
        have dropped the address. When the discussion is concluded,
        auth48archive@rfc-editor.org will be re-added to the CC list and
        its addition will be noted at the top of the message.

You may submit your changes in one of two ways:

An update to the provided XML file
 — OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text,
and technical changes.  Information about stream managers can be found in
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files
-----

The files are available here:
   https://www.rfc-editor.org/authors/rfc9488.xml
   https://www.rfc-editor.org/authors/rfc9488.html
   https://www.rfc-editor.org/authors/rfc9488.pdf
   https://www.rfc-editor.org/authors/rfc9488.txt

Diff file of the text:
   https://www.rfc-editor.org/authors/rfc9488-diff.html
   https://www.rfc-editor.org/authors/rfc9488-rfcdiff.html (side by side)

Diff of the XML:
   https://www.rfc-editor.org/authors/rfc9488-xmldiff1.html

The following files are provided to facilitate creation of your own
diff files of the XML.

Initial XMLv3 created using XMLv2 as input:
   https://www.rfc-editor.org/authors/rfc9488.original.v2v3.xml

XMLv3 file that is a best effort to capture v3-related format updates
only:
   https://www.rfc-editor.org/authors/rfc9488.form.xml


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
   https://www.rfc-editor.org/auth48/rfc9488

Please let us know if you have any questions.

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9488 (draft-ietf-pce-local-protection-enforcement-11)

Title            : Local Protection Enforcement in PCEP
Author(s)        : A. Stone, M. Aissaoui, S. Sidor, S. Sivabalan
WG Chair(s)      : Julien Meuric, Dhruv Dhody

Area Director(s) : Alvaro Retana, John Scudder, Andrew Alston