[bess] Fw: New Version Notification for draft-liu-bess-srv6-evpn-validation-00.txt
liu.yao71@zte.com.cn Wed, 26 June 2024 14:23 UTC
Return-Path: <liu.yao71@zte.com.cn>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2EB3CC14F617 for <bess@ietfa.amsl.com>; Wed, 26 Jun 2024 07:23:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ERPNvG2Yr-m9 for <bess@ietfa.amsl.com>; Wed, 26 Jun 2024 07:23:32 -0700 (PDT)
Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84A01C14F5E7 for <bess@ietf.org>; Wed, 26 Jun 2024 07:23:30 -0700 (PDT)
Received: from mxct.zte.com.cn (unknown [192.168.251.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4W8P7c2MNPz8XrX8 for <bess@ietf.org>; Wed, 26 Jun 2024 22:23:24 +0800 (CST)
Received: from mse-fl2.zte.com.cn (unknown [10.5.228.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxct.zte.com.cn (FangMail) with ESMTPS id 4W8P720LhKz50FXV for <bess@ietf.org>; Wed, 26 Jun 2024 22:22:54 +0800 (CST)
Received: from njy2app08.zte.com.cn ([10.40.13.206]) by mse-fl2.zte.com.cn with SMTP id 45QEJvN4009847 for <bess@ietf.org>; Wed, 26 Jun 2024 22:19:57 +0800 (+08) (envelope-from liu.yao71@zte.com.cn)
Received: from mapi (njy2app02[null]) by mapi (Zmail) with MAPI id mid203; Wed, 26 Jun 2024 22:20:01 +0800 (CST)
Date: Wed, 26 Jun 2024 22:20:01 +0800
X-Zmail-TransId: 2afa667c2391204-8caab
X-Mailer: Zmail v1.0
Message-ID: <20240626222001106jzpo6k1c1VlM_ZPeP7F4F@zte.com.cn>
References: 171938669583.302463.9630560826140928707@dt-datatracker-5864469bc9-n5hqk
Mime-Version: 1.0
From: liu.yao71@zte.com.cn
To: bess@ietf.org
Content-Type: multipart/mixed; boundary="=====_001_next====="
X-MAIL: mse-fl2.zte.com.cn 45QEJvN4009847
X-Fangmail-Anti-Spam-Filtered: true
X-Fangmail-MID-QID: 667C245C.000/4W8P7c2MNPz8XrX8
Message-ID-Hash: SACD2JBRUG6NWVDAEQK5UHI6TADRE5DX
X-Message-ID-Hash: SACD2JBRUG6NWVDAEQK5UHI6TADRE5DX
X-MailFrom: liu.yao71@zte.com.cn
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [bess] Fw: New Version Notification for draft-liu-bess-srv6-evpn-validation-00.txt
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/F_75vCL7llE65bJs3s7UuPiPQ1I>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>
Hi All, A new draft draft-liu-bess-srv6-evpn-validation-00 has been posted. This draft proposes extensions for ICMPv6 to detect data plane failures for EVPN and PBB-EVPN over SRv6. As we know, RFC9489 proposes the data plane connectivity check mechanism for MPLS EVPN/PBB-EVPN using MPLS lspping. For EVPN over SRv6, the requirements to detect data plane failures are similar. And this new draft aims to fulfill such requirements. RFC9489 is one of the main references when writing the draft. Please read the draft if you're interested in this topic. Any comments or suggestions are more than welcome. Regards, Yao Original From: internet-drafts@ietf.org <internet-drafts@ietf.org> Date: 2024年06月26日 15:25 Subject: New Version Notification for draft-liu-bess-srv6-evpn-validation-00.txt A new version of Internet-Draft draft-liu-bess-srv6-evpn-validation-00.txt has been successfully submitted by Yao Liu and posted to the IETF repository. Name: draft-liu-bess-srv6-evpn-validation Revision: 00 Title: Data Plane Failure Detection Mechanisms for EVPN and PBB-EVPN over SRv6 Date: 2024-06-26 Group: Individual Submission Pages: 17 URL: https://www.ietf.org/archive/id/draft-liu-bess-srv6-evpn-validation-00.txt Status: https://datatracker.ietf.org/doc/draft-liu-bess-srv6-evpn-validation/ HTML: https://www.ietf.org/archive/id/draft-liu-bess-srv6-evpn-validation-00.html HTMLized: https://datatracker.ietf.org/doc/html/draft-liu-bess-srv6-evpn-validation Abstract: This document proposes extension for ICMPv6 to detect data plane failures for EVPN and PBB-EVPN over SRv6. The IETF Secretariat