Re: [bess] Benjamin Kaduk's Discuss on draft-ietf-bess-nsh-bgp-control-plane-13: (with DISCUSS and COMMENT)

Adrian Farrel <adrian@olddog.co.uk> Fri, 29 May 2020 11:23 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F0393A00C0; Fri, 29 May 2020 04:23:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R10VJeJGfurK; Fri, 29 May 2020 04:23:23 -0700 (PDT)
Received: from mta8.iomartmail.com (mta8.iomartmail.com [62.128.193.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E7A53A00AD; Fri, 29 May 2020 04:23:21 -0700 (PDT)
Received: from vs1.iomartmail.com (vs1.iomartmail.com [10.12.10.121]) by mta8.iomartmail.com (8.14.4/8.14.4) with ESMTP id 04TBNJhZ020854; Fri, 29 May 2020 12:23:19 +0100
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 07A5A2203B; Fri, 29 May 2020 12:23:19 +0100 (BST)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs1.iomartmail.com (Postfix) with ESMTPS id E64AB2203A; Fri, 29 May 2020 12:23:18 +0100 (BST)
Received: from LAPTOPK7AS653V ([84.93.26.18]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.4/8.14.4) with ESMTP id 04TBNHlY013536 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 29 May 2020 12:23:18 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Benjamin Kaduk' <kaduk@mit.edu>
Cc: draft-ietf-bess-nsh-bgp-control-plane@ietf.org, bess-chairs@ietf.org, bess@ietf.org, 'The IESG' <iesg@ietf.org>
References: <157671012348.4907.819299139449107547.idtracker@ietfa.amsl.com>
In-Reply-To: <157671012348.4907.819299139449107547.idtracker@ietfa.amsl.com>
Date: Fri, 29 May 2020 12:23:17 +0100
Organization: Old Dog Consulting
Message-ID: <0a1e01d635ab$8def5380$a9cdfa80$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQFZqFlNLyfF+wx6N95XO/R6gUuud6m2wlUg
Content-Language: en-gb
X-Originating-IP: 84.93.26.18
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-25448.007
X-TM-AS-Result: No--20.627-10.0-31-10
X-imss-scan-details: No--20.627-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-25448.007
X-TMASE-Result: 10--20.626500-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFrxIbpQ8BhdbNB/IoRhBzVHekMgTOQbVFtnq+k+Y5DhgNbX wyjvXpaTOdBLNLziAW8amPL3RtO1jbrHY8Lbk0RmtKV49RpAH3sR5c83KIxTTtctGlxeXl/oIKR piQCnYZuAT8geMwPsRDZ/jQU9tn8/QSWnAG0egjHiHyvyXeXh5sJGGgoPFw+HyPRAwD/3abbmxz 8jq9dj3bgAPqrTc+P55kCLIWjmeGAlnH3iSkJfWPRUId35VCIeyKglCJ78OOlGM2uNXRqsUiACY tpe6t5bDYPcLZnd2T8qrrWA7JXyBz2I2YygW9F06koSlGmN5iIX2zxRNhh61emHqf6ZGvCRjG76 DvZqHwFSxaWpNH8CSchVailfGKimmqIHTRwtkkM8TeSGZW8c7h5FmvZzFEQu5X8t/NkKVxn0n4A usuw/wI1qzRbhQxkXsMebVdWtan4Yfa7tO1Gd3xn0wrEetTLhfYrr1p9yfCprvf5eVgMu7JsA/G 028B+YlmcnWcw8sLRobWslNx90BnQcZ0vb1cb2UPktDdOX0fueKBD/0uNkNuPR8Z1I5BiYypp7h 0UrnMpYlGu5OKSeuQTr53V4VI0bQPCcWFFkM2bwqWMGwRddJaErNttKYQgXa3uAKAu2IubaeQnU MLECOL0SbNNNgojEvA5RqzNGTC+bvpMYbIN8PPGSfx66m+aMx3x+XnIcCMRpsnGGIgWMmVCRgpa YZTXc58EykvLuSMCv6d+cPNIvoFqzqw/UFRAtMy+jMkhCdFaaIhErJt0dLH5Isu006IGGdeDoEb afACz3yZ6qS7w7MVaqpjfD7gW/YlldA0POS1KeAiCmPx4NwFkMvWAuahr8m5N2YHMD0b8MyrfP9 j+C1d934/rDAK3zUc1+O1X9AzE=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/ZHYcBrkWmuQ6K3HvGZEjovwDh6U>
Subject: Re: [bess] Benjamin Kaduk's Discuss on draft-ietf-bess-nsh-bgp-control-plane-13: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 May 2020 11:23:26 -0000

Hi Ben,

Many thanks for the detailed review.

Herewith responses to your Discuss and Comments.

> DISCUSS:
> ------------------------------------------------------------------
>
> Section 3.2.1.3 seems to talk about intermingling SFIR-RDs and
> SFIR Pool Identifiers in a common list, but I do not see how it's
> defined to intermingle the (six-octet) Pool Identifier Value with
> the (eight-octet) RDs.

That's because we include the entire extended community not just the value field.  The first two octets indicate whether the extended community is an RD or SFIR Pool Identifier. Each entry has to be read and processed so there is no question of needing to know the length to step over it.

> Section 3.1 seems to allow multiple SFIRs associated with a given
> RD, but the rest of the document seems to assume that any RD
> has at most one associated SFIR (as is stated explicitly for SFPRs).
> (A few specific mentions in the COMMENT.)

Right. There is NOT a 1:1 mapping between an SFIR and an RD. But we have some legacy text that is not clear on that point and we are scrubbing it.

Note that Section 3.1 describes two cases, advertising a single SFIR to represent more than one SFI of a given SFT and advertising an SFIR for each SFI of a given SFT.

> Within my own limited understanding, it seems like this document is
> expanding the boundaries of the SFC Architecture in ways not envisioned
> by RFC 7665 or 8300, and the shepherd writeup is pretty quiet on to what
> extent this architectural change is accepted by the WG (as opposed to
> being contained to just the BGP control plane mechanism).  I'd like to
> get a positive affirmation from someone more familiar with the
> discussions that this is moving the architecture in the right direction
> with respect to things like:
> - the introduction of the Service Function Type intermediate
>   classification
> - the more prominent treatment of looping, jumping, and branching as
>  operations within a single SFP without reclassification by using the
>  "Change Sequence" SFT entries to indicate these behaviors within the
>  SFP definition itself (I note that RFC 7665 does not mention "jump" at all)
> - the introduction of "gaps" in the SI sequence of a given SFP

Note that "classification" and "reclassification" are slightly fudged (my opinion) in the 8300 architecture. They may be performed by a separate component, but that is a functional component that can be built into any other component of the system. Thus, an SF might reasonably have a reclassifier that makes decisions to continue forwarding a packet or to send it to a penalty box. All of the functions of looping, jumping, and branching (the penalty box example is a branch) are done through reclassification.

We took particular care to socialise this work with the SFC working group presenting it to the WG at IETF meetings. The BESS working group last call was also copied to the SFC list. We did receive some comments that helped improve the work, but no complaints about infringing the architecture.

I guess the SFC chairs can confirm this if you're still worried.

> With respect to SFT in particular, it sounds like this is intended to
> help with scalability, which makes the genart reviewer's comment about
> lack of implementation experience particularly poingant.  It seems like
> SFIR pools perform a similar role, though of course not identical; I
> didn't get a clear sense of why pools without SFTs are insufficient.

SFT allows for an SFF to not need to advertise more than one instance of an SF of that type, which is a scalability thing. But, more importantly, it allows a controller to not need to specify a specific SFI at an SFF just saying "any SFI of this type" making the work of the controller a bit easier, and leaving local load balancing choices to the SFF.

The pool is a more diffused tool. All SIs still need to be advertised so that they can be included in the pool. The pool tells two SFFs to make a choice:
- an SFF may have to choose between multiple local SFIs in the same pool
- an SFF may have to choose between multiple next hop SFFs to satisfy the next hop pool

Pools also reduce the re-advertisement of SFPRs which would otherwise occur when the SFIR-RD list changes (so that is a scalability thing, I suppose).

Note that it is not a requirement that all SFIs in a pool are of the same type. For example, there might be FooCorp's firewall and BarCorp's firewall with different SFT values but in the same pool.

See sections 1.2, 2.2, and 3.1 for additional info.

> COMMENT:
> -----------------------------------------------------------------
>
> I support Roman's Discuss.

I copied you on the response to that with proposed new text for section 9.

> Section 2.1
>
>   In fact, each SI is mapped to one or more SFs that are implemented by
>   one or more Service Function Instances (SFIs) that support those
>   specified SFs.  Thus an SI may represent a choice of SFIs of one or
>   more Service Function Types.  [...]
>
> In my head a SI that maps to more than one SF implies a requirement to
> do all of the listed SFs and in a specific order; "a choice of SFIs of
> one or more types" seems to relax that a bit so that the order is
> relaxed and perhaps the requirement to do all is also relaxed.  I think
> "choice of SFIs for one or more" would alleviate that concern (if it is
> even a real concern).

Thanks for the glimpse into your head 😊

An SI is an instruction to execute *a* service function. There may be a choice of SF, but only one is executed per SI. Several SIs in a row may cause execution of SFs at the same SFF.I think the current wording holds.
This is all RFC 8300 stuff.
There is more detail in section 5 of this document.

>   in the underlay network.  How this indicator is generated and
>   supplied, and how an SFF generates a new entropy indicator when it
>   forwards a packet to the next SFF are out of scope of this document.
>
> nit: comma after "next SFF".

OK

> Section 2.2
>
>   This approach assumes that there is an underlay network that provides
>   connectivity between SFFs and Controllers, and that the SFFs are
>   grouped to form one or more service function overlay networks through
>   which SFPs are built.  We assume BGP connectivity between the
>   Controllers and all SFFs within each service function overlay
>   network.
>
> Are we thus implicitly not assuming BGP connectivity between arbitrary
> pairs of SFFs?

Depends on what you mean by "connectivity". I normally expect that word to mean a BGP peering: that is not needed. But there does need to be a chain of connectivity so BGP information can be passed along. The use of a Route Reflector is a key tool in this.

> Section 3
>
>   The nexthop field of the MP_REACH_NLRI attribute of the SFC NLRI MUST
>   be set to loopback address of the advertising SFF.
>
> nit: "a loopback address" (?)

ack

> Section 3.1
>
>   Per [RFC4364] the RD field comprises a two byte Type field and a six
>   byte Value field.  If two SFIRs are originated from different
>   administrative domains, they MUST have different RDs.  In particular,
>   SFIRs from different VPNs (for different service function overlay
>   networks) MUST have different RDs, and those RDs MUST be different
>   from any non-VPN SFIRs.
>
> I think we should probably be a little more explicit that we reuse the
> RD element (and the RD type/value semantics!) wholesale from RFC 4364
> and https://www.iana.org/assignments/route-distinguisher-types/route-distinguisher-types.xhtml.
> That is, we are not just reusing the layout, but the logical type as
> well.

It's not reuse, it is use. This is what an RD is. We are using it as designed.

> Also, are all of these "MUST"s indicating requirements that are new with
> this specification, or are some of them inherited from RFC 4364?

They are new with this specification. Hence the mention of "SFIR" in both cases.

> The discussion later on in Section 4.2 suggests that perhaps these RDs
> need to be unique per SFI, akin to how we say they are unique per SFP in
> Section 3.2?

Per your Discuss, 4.2 contains some legacy stuff wrt the 1:1 mapping. 3.1 was accurate.
The RD indicates the application (e.g., the overlay).

>   The Service Function Type identifies the functions/features of
>   service function can offer, e.g., classifier, firewall, load
>   balancer, etc.  There may be several SFIs that can perform a given
>   Service Function.  Each node hosting an SFI MUST originate an SFIR
>
> This seems a bit of a non-sequitur: we go straight from SF*T*s to
> discussion of the SFI/SF relationship, and we only mention "type" (but
> not "SFT") in the rest of the paragraph, so the connection is harder to
> return to than it need be.

I think we can clean up type/SFT.

>   Note that a node may advertise all SFIs of one SFT in one shot using
>   normal BGP Update packing.  That is, all of the SFIRs in an Update
>   share a common Tunnel Encapsulation and RT attribute.  See also
>
> I think we need to expand "route target".
> Also, I suggest s/may advertise all/may advertise all its/

Ack

> Section 3.1.2
>
> I suggest explicitly stating that these MPLS labels are used to direct
> incoming traffic to the SFI in question (fulfilling the promise made by
> the abstract).
>
>   Note that it is assumed that each SFF has one or more globally unique
>   SFC Context Labels and that the context label space and the SPI
>   address space are disjoint.
>
> What I'm taking away from the last clause is roughly "we do not assume
> that the values of SFC context labels have any structured relationship
> to the corresponding SPI values", even though a strict reading of
> "disjoint" would seem to be that "if a value is used in one setting it
> is guaranteed to not be used in the other setting".  I think some
> rewording may be in order.

The "strict" meaning was the intended meaning. We have added "(i.e., a label value cannot be used both to indicate an SFC context and an SPI, and it can be determined from knowledge of the label spaces whether a label indicates an SFC context or an SPI)"

> Section 3.2
>
> [our treatment of RD should presumably be consistent with Section 3.1,
> if we make any changes there]
>
>   byte Value field.  All SFPs MUST be associated with different RDs.
>   The association of an SFP with an RD is determined by provisioning.
>
> So this means that any given RD value can have at most one SFP
> associated with it?  I guess that's needed in order to provide the level
> of separation between SFPs that we need...

The RD provides uniqueness between SFPRs

> Section 3.2.1
>
> Is there intended to be a distinction between the error-handling
> behavior for error cases 1/2/6/7 and error case 4?  (If there is, I'm
> not seeing it.)

Yes. Can't recall the history of how this ended up like this, but you're right and we have merged the list entries.

>      5., 8.:  The absence of an RD with which to correlate is nothing
>         more than a soft error.  The receiver SHOULD store the
>         information from the SFP attribute until a corresponding
>         advertisement is received.
>
> Should any sort of timeout also be applied?

This was discussed and I was over-ruled 😊
The theory is that the configuration of an SFC system might be taken over a long period, and nodes might be down for a while. A timer, it was felt, was too rigid.
The resultant "SHOULD" allows (of course) an implementation to not store information until the corresponding advertisement is received if (for example) it finds itself memory-constrained.

> Section 3.2.1.1
>
>      SFP.  An SFP attribute SHOULD NOT contain more than one
>      Association TLV with Association Type 1: if more than one is
>      present, the first one MUST be processed and subsequent instances
>      MUST be ignored.  Note that documents that define new Association
>
> Do we want to say anything about checking consistency that (per these
> rules) the forward SFP is associated with the backward, and the backward
> SFP is associated with the forward one?  [I guess Section 7.1 is
> probably enough.]

We think 7.1 is enough. There is a forward pointer at the end of 3.2.1.1.

> Section 3.2.1.3
>
> [It's not clear to me that grouping by type gives any efficiency savings
> here, as grouping by pool is available, and the semantics seem to be
> equivalent to if the list of allowed SFI (pool)s was explicitly given
> without the container.  A single pool containing all the SFIs in the
> type would replace the SFIR-RD-value-zero semantics.]

Grouping by type gives scalability wrt the number of SFIRs - it reduces their number.
Pool ID gives scalability by reducing the frequency of SFPR - i.e., a new instance of an SFPR doesn't need to be advertised in response to the change in the SFIR population.  It comes w/ a configuration cost which RD-value-zero does not have. 

But while we're here. 3.2.1.3/4 should describe sub-TLVs not TLVs.

> Section 3.2.1.5
>
>   The SFP Traversal With MPLS Label Stack TLV (Type value 5) is a zero
>   length sub-TLV that can be carried in the SFP Attribute and indicates
>
> If it's carried directly in the SFP Attribute, doesn't that make it a
> non-sub TLV?

Yes.
Rats' nest of when is a TLV not a TLV?

> Section 3.2.2
>
>   In all cases, there is no way for the receiving SFF to know which
>   SFPR to process, and the SFPRs could be received in any order.  At
>   any point in time, when multiple SFPRs have the same SPI but
>   different SFPR-RDs, the SFF MUST use the SFPR with the numerically
>   lowest SFPR-RD.  The SFF SHOULD log this occurrence to assist with
>
> (The "interpreted as an 8-octet integer in big-endian form" is
> implicit?)

I thought we'd all moved on from this and had a general understanding of how to eat our eggs.
But it never hurts to remind, so added (although "network byte ordering" is the term du jour)

> Section 4.1
>
>   The main feature introduced by this document is the ability to create
>   multiple service function overlay networks through the use of Route
>   Targets (RTs) [RFC4364].
>
> As mentioned above, this seems like the second (not first) usage of
> "RT".

Fixed as above, but left the expansion/abbreviation here because of the title of the section.

> Section 4.5
>
>   When an SFF gets an SFPR advertisement it will first determine
>   whether to import the route by examining the RT.  If the SFPR is
>   imported the SFF then determines whether it is on the SFP by looking
>   for its own SFIR-RDs in the SFPR.  For each occurrence in the SFP,
>
> Also for non-specific SFT mentions that would apply, right?

Yes, should add "and RD zero"

> Section 5
>
>   o  There may be an obvious branch needed in an SFP such as the
>      processing after a firewall where admitted packets continue along
>      the SFP, but suspect packets are diverted to a "penalty box".  In
>      this case, the next hop in the SFP will be indicated with two
>      different SFT values.
>
> My (admittedly poor) understanding of the SFC Architecture was that this
> was best done as a reclassification, and that the various SFI options
> for a given SI were intended to be roughly equivalent.  Am I just
> imagining that?

Yes, reclassification is the word. Now the choice here is:
- program the reclassifier
- include the information in the SFP
The former essentially means that you have three SFP fragments. We are describing the second of these to make an SFP that branches.

>   2.  From the SFP attribute of that SFPR, it finds the Hop TLV with SI
>       value set to SI-y.  If there is no such Hop TLV, then such
>       packets cannot be forwarded.
>
> This seems to exclude the "gaps" in SI space that this document is
> trying to allow.  Or is the gap processing to have already happened by
> the time the SFF is at the "needs to forward" stage?

The sequence of SI values may have gaps, but the SFP contains those explicit values and must be matched.
The next value is found in the Hop TLV.

>       A.  An SFIR is relevant if it carries RT-z, the SFT in its NLRI
>           matches the SFT value in one of the SFT TLVs, and the RD
>           value in its NLRI matches an entry in the list of SFIR-RDs in
>           that SFT TLV.
>
>       B.  If an entry in the SFIR-RD list of an SFT TLV contains the
>           value zero, then an SFIR is relevant if it carries RT-z and
>           the SFT in its NLRI matches the SFT value in that SFT TLV.
>           I.e., any SFIR in the service function overlay network
>           defined by RT-z and with the correct SFT is relevant.
>
> Do we need to talk about expansion of pools as well?

Thanks. Good catch.

>   Thus, at any point in time when an SFF selects its next hop, it
>   chooses from the intersection of the set of next hop RDs contained in
>   the SFPR and the RDs contained in its local set of SFIRs.  If the
>   intersection is null, the SFPR is unusable.  Similarly, when this
>   condition obtains the originator of the SFPR SHOULD either withdraw
>   the SFPR or re-advertise it with a new set of RDs for the affected
>   hop.
>
> (This seems to require a definition of "contained in" that includes
> various types of expansion having been performed.)

OK

> nit: s/obtains/is detected/ (??)

Damn our fancy use of language ;o)

> Section 7.4
>
>   o  If an SFC Classifiers Extended Community is received with SFT = 0
>      then there are two sub-cases:
>
>      *  If there is a choice of SFT in the hop indicated by the value
>         of the SI (including SI = 0) then SFT = 0 means there is a free
>         choice according to local policy of which SFT to use).
>
>      *  If there is no choice of SFT in the hop indicated by the value
>         of SI, then SFT = 0 means that the value of the SFT at that hop
>         as indicated in the SFPR for the indicated SPI MUST be used.
>
> side note(?): I think it would be possible to include the second case as
> a special case of the first, as a "free choice" among all one allowed
> values by the SFP for that SI.

True, but clearer to spell it out.

>   which the traffic belongs.  Additionally, note that to put the
>   indicated SPI into context when multiple SFC overlays are present in
>   one network, each FlowSpec update MUST be tagged with the route
>   target of the overlay or VPN network for which it is intended.
>
> I'd suggest making this requirement more prominent by putting it earlier
> in the section.

Yes

> Section 7.5
>
> The description of these flags as describing "how the originating SFF
> expects to see the SPI/SI represented" has some connotation of
> exclusivity ("I expect to see an NSH" implying "I don't expect to see
> anything else, including MPLS"), which does not seem like a good fit for
> a bitmask where multiple bits can be set (as opposed to just a codepoint
> for the encoding to use).
>
>   The following bits are defined by this document:
>
>   Bit 0:  If this bit is set the NSH is to be used to carry the SPI/SI
>      in the data plane.
>
> How are we numbering the bits?

Thanks. Yes, from most significant as zero.

> Section 7.6
>
>   When a classifier constructs an MPLS label stack for an SFP it starts
>   with that SFP' last hop.  If the last hop requires an {SPI, SI} label
>
> nit: "SFP's"

Ack

> Section 8.1
>
>   SFF1 followed by an SF of type 43 located at SFF2.  This path is
>   fully explicit and each SFF is offered no choice in forwarding packet
>   along the path.
>
> nit: "forwarding packets" or "forwarding a packet"

Ack

> Section 8.4
>
>   This example provides a choice of SF type in the second hop in the
>   path.  The SI of 250 indicates a choice between SF type 43 located
>   through SF2 and SF type 44 located at SF3.
>
> nit: s/located through/located at/?

Ack

>   When the packets are returned to SFF1 by the SFI the SI will be
>   decreased to 250 for the next hop.  SFF1 now has a free choice of
>   next hop SFF to execute the next hop in the path selecting between
>   all SFF2 that support an SF of type 43 and SFF3 that supports an SF
>   of type 44.  These may be completely different functions that are to
>
> nit: I think s/all SFF2 that support/SFF2 that supports/ ?

Actually, s/SFF2/SFFs/

> Section 8.8
>
> Some pedantic part of me wants to complain that this is not a "branch",
> since switching to SPF10 is the only option allowed at SI=250 on SPF11.

We welcome your inner pedant. Please name it and give it an email address.
It's an optional branch.

> Section 8.9.1
>
> It might make more sense to mvoe SPF13's definition before the paragraph
> that talks about "sufficiently precisely specified SFPs", since SPF13
> does not actually "specify [...] exact SFIs to use"

Done

> Section 9
>
> I really like the way this section is written; thank you!

Although not well enough to prevent you supporting Roman's Discuss 😉

> I think the core SFC documents cover enough of the considerations
> inherent to looping, jumping, and branching that there's probably not
> more to say here.
>
> I'll list a handful of potential security topics I can think of after
> reading the document, but that's not meant to imply that they all need
> to be covered individually in the document: they are *potential* topics,
> but may not end up being worth talking about.

[snip]

We factored a lot of these good suggestions into the reworking of Section 9 sent out to Roman and cc'ed to you.

> Section 10.4
>
> [When I first saw "association TLV" I was expecting it to share a
> registry with some other association grouping usages.  But I don't have
> a particular complaint about doing it this way.]

So no action on that one.

Thanks once again,
Adrian