Re: [bess] draft-ietf-bess-evpn-ipvpn-interworking chair review

"Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com> Mon, 18 January 2021 10:37 UTC

Return-Path: <jorge.rabadan@nokia.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61EF23A123C; Mon, 18 Jan 2021 02:37:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.15
X-Spam-Level:
X-Spam-Status: No, score=-2.15 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BDOC-jZxV3NX; Mon, 18 Jan 2021 02:37:01 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2098.outbound.protection.outlook.com [40.107.237.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2074F3A1243; Mon, 18 Jan 2021 02:36:59 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Inj5S548eWX78pX4RkHKkJfA5bXqN+Kqj/eUiBS6x9X/szfF5kxTgnG9Wf208EArLaCmlsCa0GeWTVMMuHzAhm4P5tyS4+vs9htRannSd+HegsKFpQWrplPwrwNwfIRLoN4IwoKJrqFRTmdVDZw0FsLk5It/SzZcDgY3AjezAx7tEsl+Dulo6Lk5qlxAlQZqCQTOSnKQ12GCY/FoLs+THxvzWFkHmQVaWb1PkXQ2nQ9Ow8NYzRmrvT8gi1CM8AfSx+uCv5BZp2YmrmxZSyOD8N+ocWHcXxBV4E7MkB/vuCusq9r+YbO1dz6WpFJwQ8Yi0HNxbDMJseac8NMDVdxzGw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+tgFCwuPQH7CMbL/lTVzsAY3wGkOV6E2wAsNu55wqiw=; b=BkRHAgeJOT6D0CdF+ucfGXjglJiWNG2ZXxkJPlSDVZOz8XBxVDfd1JS4pBTEctUR8/PPLS/cBrfqZvmRHEDVfJU2BwueBoV+Ro2laWBmhZs3j/3zKjFDQVpBLBbKXpafkuwT9s+rKDHn/IOoGyrwyH/xkyTYbCAcIX6mISRfbejlFnvmvQoeZgKl1+4WhJDImrbt3M2YiwV/PKtYrgEkLMJ3D43Hr77LjBPylEDrHifGhUqzH1g17z0kdGO/o82s2y57WI7+VVOlN00oD2iBbaHZSEWW9EnYowI6wQz1ZhBiBbugsHVvLJ/UW1orYoDuUe+CJBCyFX9KUACJWFKI5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+tgFCwuPQH7CMbL/lTVzsAY3wGkOV6E2wAsNu55wqiw=; b=HVNzeBbOnoKgi4rOVMFAI9fRrIISOR600iaHmAo1WKbxgug8RoSrJWhqF1bLeklF31BCs7YaUHhm8l8oNWxV0ydykPAkWdgbTH/kG2l2n9jZ/gOjF3RnLg81frPVNLtFK2HASv8rGOEbYu5srXFXQk8NF5kD0MlnVCqwZW6Rt0k=
Received: from MWHPR08MB3520.namprd08.prod.outlook.com (2603:10b6:301:61::15) by MWHPR08MB2558.namprd08.prod.outlook.com (2603:10b6:300:b6::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.13; Mon, 18 Jan 2021 10:36:55 +0000
Received: from MWHPR08MB3520.namprd08.prod.outlook.com ([fe80::357c:9caf:ff2c:544e]) by MWHPR08MB3520.namprd08.prod.outlook.com ([fe80::357c:9caf:ff2c:544e%6]) with mapi id 15.20.3763.014; Mon, 18 Jan 2021 10:36:55 +0000
From: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
To: "slitkows.ietf@gmail.com" <slitkows.ietf@gmail.com>, "'Stephane Litkowski (slitkows)'" <slitkows@cisco.com>, "draft-ietf-bess-evpn-ipvpn-interworking@ietf.org" <draft-ietf-bess-evpn-ipvpn-interworking@ietf.org>
CC: "bess@ietf.org" <bess@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>
Thread-Topic: draft-ietf-bess-evpn-ipvpn-interworking chair review
Thread-Index: AdbPxaFpRGL7dHhhQA2qKZV1+IXpHAGOurqsAyKM8YAAIoxh6w==
Date: Mon, 18 Jan 2021 10:36:55 +0000
Message-ID: <MWHPR08MB35206C33C71D2579C72D81C4F7D10@MWHPR08MB3520.namprd08.prod.outlook.com>
References: <SJ0PR11MB5136CFF7BC3D523B2BCFFC69C2CA0@SJ0PR11MB5136.namprd11.prod.outlook.com> <MWHPR08MB352049A83F387C57E8D231D9F7C20@MWHPR08MB3520.namprd08.prod.outlook.com>, <00be01d6e28a$c0f22ff0$42d68fd0$@gmail.com>
In-Reply-To: <00be01d6e28a$c0f22ff0$42d68fd0$@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [135.245.20.5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: fb51bad7-60a5-48fa-f7c6-08d8bb9cf9c0
x-ms-traffictypediagnostic: MWHPR08MB2558:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MWHPR08MB25584EC39C3A3DD1273BCBEEF7A40@MWHPR08MB2558.namprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MWHPR08MB3520.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39850400004)(366004)(396003)(136003)(346002)(376002)(9326002)(76116006)(26005)(30864003)(66574015)(6506007)(4326008)(53546011)(55016002)(33656002)(71200400001)(186003)(83380400001)(8936002)(110136005)(7696005)(66556008)(91956017)(66476007)(316002)(66946007)(64756008)(86362001)(52536014)(54906003)(478600001)(8676002)(5660300002)(9686003)(2906002)(66446008)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
Content-Type: multipart/alternative; boundary="_000_MWHPR08MB35206C33C71D2579C72D81C4F7D10MWHPR08MB3520namp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR08MB3520.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fb51bad7-60a5-48fa-f7c6-08d8bb9cf9c0
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jan 2021 10:36:55.1341 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TisQheEkqnbjPJU2Nfkq1OBVKb3tmI9urrPF0qVMUlUVke0I12USDrK/KvFFKZDFrS8Eoe1frWTXCmkmSE6bvQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR08MB2558
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/mVHegH0ZUcPilQ9bnssnEJoQAC4>
Subject: Re: [bess] draft-ietf-bess-evpn-ipvpn-interworking chair review
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jan 2021 10:37:05 -0000

Hi Stephane,

Thank you for following up.
Please see in-line.

Jorge

From: slitkows.ietf@gmail.com <slitkows.ietf@gmail.com>
Date: Monday, January 4, 2021 at 4:14 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, 'Stephane Litkowski (slitkows)' <slitkows@cisco.com>, draft-ietf-bess-evpn-ipvpn-interworking@ietf.org <draft-ietf-bess-evpn-ipvpn-interworking@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>, bess-chairs@ietf.org <bess-chairs@ietf.org>
Subject: RE: draft-ietf-bess-evpn-ipvpn-interworking chair review
Hi Jorge,

Thanks for the new version.

Few additional comments on the new text:

Section 4.

a)       “This attribute list may contain”. I think we can use “MAY contain”, right ?
[jorge] ok, will change in the next rev

C) 2) The statement is unclear to me. Let’s say that I have an IGP route or static route in the VRF that needs to be advertised in an EVPN or IPVPN domain, does the statement mean that we are advertising the route with the domain ID of the EVPN or IPVPN realm ? Could you clarify this particular case ?  C.3) makes more sense to me.
[jorge] c2 was specifically added to address a requirement brought up to the list. It is open to the operator if – in c2 – the ISF route uses the domain ID of the EVPN or the IPVPN domains.

e) uses “GW-PE” could use expand it as “GW-PE (gateway PE)” ?
[jorge] added for the next revision

g) for error handling, could you confirm that receiving an unknown ISF type is not an error ?
[jorge] added this, let me know if it is ok:
“Domains in the D-PATH attribute with unknown ISF_SAFI_TYPE values are accepted and not considered an error.”


Section 5.2:
Isn’t it dangerous to try to define which attributes needs to be propagated, and which one should not be ? We are always creating new attributes, should people update this doc each time a new attribute comes ? I don’t really see how this could be managed.
[jorge] the reason is security again. We don’t want to blindly propagate things across ISF domains. Only those things that help with best path selection. An example of things you don’t want to simply blindly propagate is BGP tunnel encapsulation attributes, route-targets, EVPN communities, bgp prefix-sid attribute… by doing so, unexpected situations may happen. So yes, we think future specs will need to say if ISF gateway PEs need to propagate the new attribute or not.

[SLI] Let’s get some feedback from IDR people on this. I’m a bit afraid of the tracking of updates… I agree that some attributes must not be propagated or even does not make sense to be propagated.
[jorge] ok

Section 5.3:
Shouldn’t we just follow existing aggregation rules of each attribute ? Again, what happens when new attributes are coming in. I don’t think that the gateway function has actually something to change in the aggregation process. Aggregation is happening in the VRF, there is no change compared to what is existing today, for VRF, it’s just IP prefix aggregation.
[jorge] The aggregation per se is just IP aggregation, but the definition of what to do with attributes on the aggregate is new, I think it needs to be clearly specified.

[SLI] Right but this is orthogonal to this draft. The rules should exist on a standard L3VPN PE.
[jorge] personally I still prefer if we have this somewhere, and this document seems to be appropriate (unless it is covered already somewhere else).


Brgds,

Stephane





From: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>
Sent: samedi 19 décembre 2020 13:17
To: Stephane Litkowski (slitkows) <slitkows@cisco.com>; draft-ietf-bess-evpn-ipvpn-interworking@ietf.org
Cc: bess@ietf.org; bess-chairs@ietf.org
Subject: Re: draft-ietf-bess-evpn-ipvpn-interworking chair review

Stephane, all

After a few discussions, we published rev 04, which addresses all the comments received, including Stephane’s comments.
Please see in-line.

Thanks!
Jorge

From: Ali Sajassi (sajassi) <sajassi@cisco.com<mailto:sajassi@cisco.com>>
Date: Monday, December 14, 2020 at 5:17 AM
To: Stephane Litkowski (slitkows) <slitkows@cisco.com<mailto:slitkows@cisco.com>>, draft-ietf-bess-evpn-ipvpn-interworking@ietf.org<mailto:draft-ietf-bess-evpn-ipvpn-interworking@ietf.org> <draft-ietf-bess-evpn-ipvpn-interworking@ietf.org<mailto:draft-ietf-bess-evpn-ipvpn-interworking@ietf.org>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>, bess-chairs@ietf.org<mailto:bess-chairs@ietf.org> <bess-chairs@ietf.org<mailto:bess-chairs@ietf.org>>
Subject: Re: draft-ietf-bess-evpn-ipvpn-interworking chair review
Hi Stephane,

Jorge, John, DJ, and I met several times over the course of last two weeks to address DJ and some of the other outstanding comments and in doing so covering the following three cases as well:

a)       Advertisements of routes learned over a local AC by a GW into the participating domains w/o a domain-path Attribute

b)      Advertisements of routes learned over a local AC by a GW into the participating domains w/ a domain-path Attribute that contains a new SAFI and new a domain-id

c)       Advertisements of routes learned over a local AC by a GW into the participating domains w/ a domain-path Attribute that contains a new SAFI and one of the existing domain-id

Jorge is working hard to incorporate the new changes and by end of the week he should have a new rev that address all the comments including yours below.

Cheers,
Ali

From: "Stephane Litkowski (slitkows)" <slitkows@cisco.com<mailto:slitkows@cisco.com>>
Date: Friday, December 11, 2020 at 7:37 AM
To: "draft-ietf-bess-evpn-ipvpn-interworking@ietf.org<mailto:draft-ietf-bess-evpn-ipvpn-interworking@ietf.org>" <draft-ietf-bess-evpn-ipvpn-interworking@ietf.org<mailto:draft-ietf-bess-evpn-ipvpn-interworking@ietf.org>>
Cc: "bess@ietf.org<mailto:bess@ietf.org>" <bess@ietf.org<mailto:bess@ietf.org>>, "bess-chairs@ietf.org<mailto:bess-chairs@ietf.org>" <bess-chairs@ietf.org<mailto:bess-chairs@ietf.org>>
Subject: draft-ietf-bess-evpn-ipvpn-interworking chair review
Resent-From: <alias-bounces@ietf.org<mailto:alias-bounces@ietf.org>>
Resent-To: <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>, Cisco Employee <sajassi@cisco.com<mailto:sajassi@cisco.com>>, <erosen52@gmail.com<mailto:erosen52@gmail.com>>, <jdrake@juniper.net<mailto:jdrake@juniper.net>>, <wlin@juniper.net<mailto:wlin@juniper.net>>, <ju1738@att.com<mailto:ju1738@att.com>>, <adam.1.simpson@nokia.com<mailto:adam.1.simpson@nokia.com>>
Resent-Date: Friday, December 11, 2020 at 7:35 AM

Hi Authors,


Please find below my chair review related to draft-ietf-bess-evpn-ipvpn-interworking.

BTW, you need to refresh the draft now, it has expired.

Section 3:

·         Nit:
s/uniqueness of the DOMAIN- ID/uniqueness of the DOMAIN-ID/
[jorge] fixed, thx



·         a) I agree with DJ’s comment on: “This attribute list may contain zero, one or more segments". It is actually one or more.
[jorge] fixed, thx


·         The section 3 contains both normative and non-normative language. If section 3 is intended to detail the normative behavior of adding/modifying D-PATH, it must use normative for any of the normative procedure. For instance b) may require normative language. While it is very good to have an example in b), one or more clear normative rules are required before talking about the example.
[jorge] ok, added more normative language.


·         b) talks about domain-ids attached to IP-VRF, this is fine. However, the text should provide a wider view so people don’t think that this is the only option. Domain-Ids may be assigned at VRF level, but also at more a higher level (BGP peer), or even lower level (bgp community…). We should not limit implementations here in the granularity domain-ids are defined.
[jorge] check out the new text in (e)


·         c) I don’t see why “MUST NOT”, it does not hurt to have a DOMAIN-ID associated with non ISF world (routes learned from IGP, static)… there could be design where people do BGP one leg and non-BGP on the other leg. We should probably relax that.
[jorge] check out the new text in (c)

Would you mind adding a beautiful ASCII-ART for the attribute format ? It’s usually good to have when reading to see the attribute format rather than having to read the text.
[jorge] done


You need to define the error handling procedures for D-PATH as per RFC7606 (you should have it as normative ref too).
[jorge] done, check out the new text in (g)


Section 3.1
This sentence is misleading and does not match with the normative behavior of Section 3) d)

“In general, any interworking PE that imports an ISF route MUST flag

   the route as "looped" if its D-PATH contains a <DOMAIN-ID:ISF_SAFI_TYPE> segment, where DOMAIN-ID matches a local DOMAIN-ID

   in the tenant IP-VRF.”

I don’t see the value of this section beyond providing an example. The normative behavior is already given in Section 3) d). Can’t the example be packed under d).
[jorge] ok, done.

Also the pointed sentence still refers to a DOMAIN-ID per VRF, which is not good for a generic statement. My domain ID info could from the BGP peer config. Again, this option of per VRF is fine, but this is not the only one that can be implemented.
[jorge] agreed. See new text.


Section 4.1:
I don’t see why “no-propagation-mode” is the default mode. This is breaking existing propagation of attributes from SAFI 1 to SAFI 128. When we have a CE running BGP with a PE, the PE propagates the attributes (CTs, ASPATH, MED…) coming from the CE.
[jorge] the reason why it is the default mode is security (the security section points out some risks of the propagation or attributes). In order to not break existing RFC4364 implementations we added this:
“This is the default mode of operation for gateway PEs that re-export ISF routes from any ISF SAFI into EVPN, and from EVPN into any other SAFI.” – since there is no other spec for EVPN interworking, we should be fine.

This section creates some ambiguity about the D-PATH attribute. Based on Section 3, D-PATH will be necessarily sent but received D-PATH may be dropped and new one created but the text of section 4.1 makes me think that it’s not the case in no-propagation mode.
I think setting D-PATH is orthogonal to the attribute propagation.
As section 4.1 tells, people may still want to rely on existing SoO for instance in some case in this case D-PATH may not be added.
I think section 3 and 4.1 have to be more clear on the normative procedures about D-PATH addition/modification.
[jorge] good point. I clarified section 3(b) - D-PATH MUST be added by the gateway PE as long as the gateway works in uniform-propagation-mode.

Section 4.2:
Isn’t it dangerous to try to define which attributes needs to be propagated, and which one should not be ? We are always creating new attributes, should people update this doc each time a new attribute comes ? I don’t really see how this could be managed.
[jorge] the reason is security again. We don’t want to blindly propagate things across ISF domains. Only those things that help with best path selection. An example of things you don’t want to simply blindly propagate is BGP tunnel encapsulation attributes, route-targets, EVPN communities, bgp prefix-sid attribute… by doing so, unexpected situations may happen. So yes, we think future specs will need to say if ISF gateway PEs need to propagate the new attribute or not.

Isn’t there an indentation issue starting “When propagating an ISD route to a different ISF SAFI…” ?
[jorge] should be fixed now, thx

The considerations about ASPATH look really implementation details to me (at least the way it is written). Basically the ASPATH propagation rules doesn’t change and the gateway function itself does not modify the ASPATH.

Similarly, for the IBGP-only path attributes, the word “copy” looks really implementation dependent. Why not telling that the advertised route should keep the received iBGP-only attribute ?
[jorge] ok, I changed it with “keep”
You should also clarify considerations regarding rfc6368.
[jorge] not sure what you mean, would you suggest some text please?


Section 4.3:
Shouldn’t we just follow existing aggregation rules of each attribute ? Again, what happens when new attributes are coming in. I don’t think that the gateway function has actually something to change in the aggregation process. Aggregation is happening in the VRF, there is no change compared to what is existing today, for VRF, it’s just IP prefix aggregation.
[jorge] The aggregation per se is just IP aggregation, but the definition of what to do with attributes on the aggregate is new, I think it needs to be clearly specified.


However, as we are defining D-PATH, we can define aggregation rules related to D-PATH.
[jorge] it is also included yes.



Section 5:


“For a given prefix advertised in one or more non-EVPN ISF routes, the

   BGP best path selection procedure will produce a set of "non-EVPN

   best paths".  For a given prefix advertised in one or more EVPN ISF

   routes, the BGP best path selection procedure will produce a set of

   "EVPN best paths". »

I think the EVPN vs non EVPN paths is a bit misleading. Couldn’t we simplify say that we have best path selection at ISF level which inserts routes in IP-VRF and then we have a new selection at VRF level.
[jorge] the new ISF SAFI is EVPN, and the new spec is the selection between EVPN and non-EVPN. The rest of the ISF SAFIs and their interaction was already there. That’s why we thought it was clearer to talk in terms of EVPN and non-EVPN. Let us know if it is not ok.

Regarding the new tie-breakers:
It s not clear to me which steps tie breaks an IPVPN path vs an EVPN path (composite PE case) that are equivalent (only ISF changes).
[jorge] if everything else is the same, step 4 would remove from consideration the IPVPN path.



Section 7:

I agree with Suresh’s comment about the unclarity of the first bullet.
This document makes ISF 1 in the picture, so all the procedures defined in the document are applicable to all the combinations of ISFs including SAFI1 <-> SAFI 128. So the text must be written carefully.
[jorge] check out the new text, we tried to capture SAFI 1 consistently now..


Section 10:  This section should be at the top of the document.
[jorge] done

Section 11:
You need a security consideration section.
[jorge] done

Section 15:
IMO, intersubnet forwarding and prefix-adv drafts must be normative as they are key components of the solution.
[jorge] ok, done



Pls update the draft and then I’ll ask IDR to have a review on the draft as well.


Brgds,

Stephane