[Bier] Re: Ketan Talaulikar's Discuss on draft-ietf-bier-ping-18: (with DISCUSS and COMMENT)
Greg Mirsky <gregimirsky@gmail.com> Wed, 08 April 2026 18:50 UTC
Return-Path: <gregimirsky@gmail.com>
X-Original-To: bier@mail2.ietf.org
Delivered-To: bier@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 3009ED8438D9 for <bier@mail2.ietf.org>; Wed, 8 Apr 2026 11:50:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775674222; bh=nJzDkVSwNN8AkGh1gtR7iwb4dEoGLWvRgwBKMNQX0pI=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=HVEaHA4cQjsXF6daSTx1GKCuxeSv1XK5JcUFo05MkMygo6W2C5p953d22IFLdf0z3 6tQ4qMiKiB5MjW+m4j8IDU118rwHaf5hLaZgnbsW+slSppzGVD12cxqNwF2/JgaYFG rnVMWqqliVrix+qU42IZBtQK70UCCXhR3E4XTAWs=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kTPZjscUs_eH for <bier@mail2.ietf.org>; Wed, 8 Apr 2026 11:50:19 -0700 (PDT)
Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 8DC80D8438A9 for <bier@ietf.org>; Wed, 8 Apr 2026 11:50:19 -0700 (PDT)
Received: by mail-pj1-x102b.google.com with SMTP id 98e67ed59e1d1-354bc7c2c46so94483a91.0 for <bier@ietf.org>; Wed, 08 Apr 2026 11:50:19 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1775674213; cv=none; d=google.com; s=arc-20240605; b=FP6kppRXWBtEdgg2Y+TItYZQIl/LRIuPsxdoZ9daBmyvMoTcHjtl77cp9PJmj4u183 jyRTYGgHcJdJ/vTOmR4dkLK8K/NEvst6jGsv3L4C04Izt7MsQ/Gb7EgSg5XtAmUYwvRr 1KKYoeddZLVNtmDELQVD/xmv4XeFOB8TiKqoRwUoRFFr4BWsFsQSM7KPPvJ7PPydPkaS pogvxwmcNczuzKjq8HthmoZ8eCOaTlfiD2xHAbeJL8ZsjMHHT/JICLAslyb3PjjKRIue h3D3wr0+rzzyMoQ5KfkG3QdclU75z3Yha+QdxslGMkjOuFY+Co13pepuTxUUjLtNESHZ pAyQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=qK+EYSxAKXEpERsVi62OAVSNoOJtze+4wkwob6Za16M=; fh=cn90qm3uYyuyz9+ArfNWQKORlKOvD5AoOXjGDhVD/bE=; b=Tn9+lALB4g3ut+lfYWsBVmbYhCC6Gsy4h4LtkQiN6pHqaVofhNrmQCbEDZ+nkoV2Cs jP2CRaScgtBgcyYQjpqmNtkI6SeX5W2H7Z3McaL4GfoXt4WQzdP4jQMq9jQtqcgAdlSR Oekd4ynnA09if0u7/di2Oorw6ozQkBKluNro0z/jQnH1+yAS1u7RLQBR0xuQ4XuS7NDL KGsiy1qQ0IJwzU3LVgV9ChHIFb/iFvYbrTmIQWmKaSBh3XqDbJfaZqhQEeOlYBn9iSfe PIvAxMWaWTntIurztdpZLzGd5i1L3XNH1wjkD0+MxIS4H+CDobtV8DJwfpf6WPr7DCbp CK7Q==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1775674213; x=1776279013; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=qK+EYSxAKXEpERsVi62OAVSNoOJtze+4wkwob6Za16M=; b=KhxOZRusjOE2Wx0k1XD1fZecHgEEuLZPXcrFMSP0d5Gk3HqjqhXL0mpBMMBAvJZ0/9 tBjfOSigQ+8r1XMQiqr5BXbsDKNaCVR8Bvp7WIv81PUsX70zTmNxNeQSsWwlSMHV0R// 6WGohkfEgWfLyzaE8dWhCAjQe+ZHTdsDHxv2ttyD+G/VJwYEiUak4R3iD8yTuNayNUlH QUfGM01Z+cmTTydQzv4oFnFAuctxXpYwpBs8u1Ve/K9maihg97hPb9TUr3KkGk+oFh/9 eTT01BVM97WWYihQ/MkyeoHV45PzRp1m+Wnn9fPhWXb3v8QWjxSpvJ6xhCtV1Aj4yxYd 3f3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775674213; x=1776279013; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=qK+EYSxAKXEpERsVi62OAVSNoOJtze+4wkwob6Za16M=; b=EEaJrO8CAZww8Q5wLO7FPufol2MSyLUGv2xep2WDIbLeLk14bjSOgWXUz4CH89sdxI 1DK7VaLTfLigDCyK+xWRBftj9n9MaKLcXDQJP7NJF5sBcIuD95zgqM0eMxt9B7u9kmOG T+MiAuLxKs4Ivxv7XNzFG03sUdBFxW+v7dSoBo7noUto4O1kxtn6rZbpgPSP4cVF6dFN W89qLHPeucvbvW5NqbW5ad2Iy7Iuw16p9G8rTRajucuHgj9ENcuqvQB7V6/90t98cgV2 tfYd5IcDkGLa20czwKNo4PmloSIjidQ6m7NqegCIWN8PXxMcm+U7xVLDsg92p6UnrmgO Eodw==
X-Forwarded-Encrypted: i=1; AJvYcCV2eqCyFvemNcDAmsRzLRdbT2ekKnkO2hd/JHevlhLChuxi9QxefXBJMHUW6bpsGRvZMRVj@ietf.org
X-Gm-Message-State: AOJu0YzkOn0wsASIjHwXPHOXpQTeUmrfBeJ3v+0qMncij2rfGrcCpLeL jPcTlpcfXkydYQKDhOyhbsP2BzmNgqLicoDf312Nynaz6REasfWxXN+OxfIDQSP8rHo9aIXkZJw yf1CFpXyko8tFwCS342z1rXFYN1Q4U/8=
X-Gm-Gg: AeBDies/gROipFDrnIUaLpUUnDbXtv/dAGSM4dvkngKzwOYVitksXo41xAENYSSUnFB 7MSWgUOlxRGBTGsAbZIBzTEAa4tJ0k5z4ZP4juDhYgGvF3SYzPbJLXiom32LonM1mnkhVqbA2r7 1wsZASG4wLQPHqz7pr1j9TcPnhUlNCj4W7jbVj+EulaXvmQ+3wxVxomS/wrJWQh/sUCoBux7gqP rFabbDnt9tLiPnou+N6CYvwo5KSuUUmtLqGjjDTkBAzZU+38DZl6XFzTi8XdkZljsQYsFXt0UdH VFMdi3869iPb/H2d/ANIJv3W0P1pcTtWjQKPexa7
X-Received: by 2002:a17:90b:2e0d:b0:35d:982d:96c7 with SMTP id 98e67ed59e1d1-35de6980b71mr23874718a91.27.1775674212766; Wed, 08 Apr 2026 11:50:12 -0700 (PDT)
MIME-Version: 1.0
References: <176908844064.1352642.8444599727687045726@dt-datatracker-865585c994-4fgh4> <CA+RyBmXW_BZr3yxyk7Fp9bne6avWWxnGsaSHfZiTbg317QStHA@mail.gmail.com> <CAH6gdPzBomWBMmsS26+jVDWyFy7uHVCBp8T5FypfVbB=P3xN3Q@mail.gmail.com> <CA+RyBmV1Si804aemdj1U0V+jSGPBL+Zq_1tX4XNQ7opBT6SxeA@mail.gmail.com> <CAH6gdPxLTaAEueCHPVp6rY6ur9jGYR1ifBBir-8BmG9T12u5VA@mail.gmail.com> <CA+RyBmV_EMu1HCHe0mWSSAQPPzNczXFV4m4WQQsPcgbWEu3V0A@mail.gmail.com> <CA+RyBmWXak2K=jBWrptQQQuZte6B+7G7SbqGX4_JxfDoSFE5ig@mail.gmail.com> <CA+wi2hO_87kPVBOaiXTgiGCfVwqQGoVR7xyA1-21r8Sq7EFUpw@mail.gmail.com> <CA+RyBmWj1dJkhOypFL6iJgGjeKduYjmKgCUTrRQWLzvWmiNooQ@mail.gmail.com> <CA+wi2hORbeR8tWz2Fq8-e0D81amPGYsWA0JkPux0Y0mPpgj+Qw@mail.gmail.com>
In-Reply-To: <CA+wi2hORbeR8tWz2Fq8-e0D81amPGYsWA0JkPux0Y0mPpgj+Qw@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 08 Apr 2026 11:49:59 -0700
X-Gm-Features: AQROBzDfzXnFz_g1Zq4dCJok-o1sjXswh2N5fZNIPquPprzrUN3otJGWYQF7ewc
Message-ID: <CA+RyBmU5VmGCpvPNQ7LjQh0AQ=-isgKekjsK+RxFQW7izUmE1A@mail.gmail.com>
To: Tony Przygienda <tonysietf@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000b05540064ef75e25"
Message-ID-Hash: C5ZEBPHGFA4SGDVVQBZZQBFPMM6J37DU
X-Message-ID-Hash: C5ZEBPHGFA4SGDVVQBZZQBFPMM6J37DU
X-MailFrom: gregimirsky@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bier.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Ketan Talaulikar <ketant.ietf@gmail.com>, The IESG <iesg@ietf.org>, bier-chairs@ietf.org, bier@ietf.org, draft-ietf-bier-ping@ietf.org, mankamana mishra <mankamis@cisco.com>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Bier] Re: Ketan Talaulikar's Discuss on draft-ietf-bier-ping-18: (with DISCUSS and COMMENT)
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/b6Rkc2H0hWO2gjw3PC7AKEn5thQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Owner: <mailto:bier-owner@ietf.org>
List-Post: <mailto:bier@ietf.org>
List-Subscribe: <mailto:bier-join@ietf.org>
List-Unsubscribe: <mailto:bier-leave@ietf.org>
Hi Tony, thank you for reviewing updates. I uploaded the updated version, so it is available for the WG review and comments. Regards, Greg On Mon, Apr 6, 2026 at 7:14 AM Tony Przygienda <tonysietf@gmail.com> wrote: > diff looks good to me and AFAIS the doc _is_ MPLS specific at this point > in time while generic enough the according sub-TLVs for entropy around > other technologies can be trivially added later when the needs arise. all I > worried about > > > > > > > On Tue, Mar 24, 2026 at 3:08 AM Greg Mirsky <gregimirsky@gmail.com> wrote: > >> Hi Tony, >> Thank you so much for sharing your thoughts and suggestions to improve >> the document. Please find my notes below, tagged GIM>>. I attached the TXT >> copy of the working version, and the diff highlighting the proposed updates. >> >> Regards, >> Greg >> >> On Sat, Mar 21, 2026 at 2:36 AM Tony Przygienda <tonysietf@gmail.com> >> wrote: >> >>> okey, I scanned the -20 version and tried to parse the conversation as >>> far as possible. so in fact it seems we really do have some stuff that >>> makes the draft in pieces MPLS encaps specific and I would argue along the >>> lines of Ketan that we should preferrably have _one_ OAM rfc covering any >>> encaps even if it delays the publication somewhat or at least include >>> enough "clear hooks" everywhere so future documents can easily refer to the >>> according RFC sections >>> >>> so far we have >>> * mpls and non-mpls (basically label not being label ;-) which can be >>> stuck into >>> * mpls label stack >>> * ether type >>> * v4/v6 bierin6 >>> >>> and the OAM will work AFAIS for all except pieces around entropy which >>> seem to me quite MPLS specific >>> >>> " >>> Multipath Entropy Data sub-TLV is applicable for BIER Echo Request >>> packets encapsulated in MPLS. Encoding of multipath information for other >>> data planes, e.g., IPv6, is for further study. If the Multipath Entropy >>> Data sub-TLV is present in the BIER Echo Request packet encapsulated in a >>> non-MPLS data plane, it MUST be ignored by the responding BFR. >>> " >>> >>> so yes, this is MPLS specific entropy and I think the TLV should be >>> called accordingly MPLS Multipath entropy data but it does not make the >>> document "MPLS encaps only" AFAIS >>> >>> AFAIS we can easily add stuff for v6 entropy and so on later as the >>> document says >>> >>> However, the section 4.2 worries me. on one hand it seems to imply that >>> we can stick "BIER entropy value" into the multipath entropy sub-tlv", on >>> the other hand it seems to refer back to 8029 which is MPLS specific? I >>> think this needs to be clarified >>> >>> As suggestion: call the multipath entropy data sub-tlv "MPLS entropy" >>> and allow other sub-TLVs with other entropy types since e.g. v6 flow label >>> may interact with the bier entropy and you may want to report both back or >>> set them both on request ? >>> >> GIM>> Thank you for the suggestion to clarify the sub-TLV name. Would the >> following update throughout the draft work s/Multipath Entropy Data/MPLS >> Multipath Entropy Data/? Furthermore, I propose clarify in the draft that >> all actions of the ECMP discovery defined in the draft are applicable to >> "ECMP discovery within a BIER domain with MPLS underlay". Please check the >> diff file to review how this is applied in the document. >> >>> >>> Brings up the question, what about he BIER entropy stuff being reported >>> back and correlated? is it assumed that the sender knows what it put in the >>> entropy field and can correlate it e.g. via the seq# of the message or that >>> the sender will set the entropy on response? The last paragraph of 4.2 >>> somehow seems to imply that the entropy sub-TLV can be set on reply as well >>> which seems confirmed by >>> >>> " >>> Set the Best-return-code to "Replying router is one of the BFERs in BIER >>> header BitString", and include Downstream Mapping TLV if the responder is >>> BFER and there are more bits in BitString left for forwarding. Also, >>> include the Multipath information as defined in Section 4.2 >>> <https://datatracker.ietf.org/doc/html/draft-ietf-bier-ping-20#sect-4.2> >>> if the received Echo Request carries Multipath Entropy Data Sub-TLV. Go to Section >>> 4.5 >>> <https://datatracker.ietf.org/doc/html/draft-ietf-bier-ping-20#sect-4.5> >>> . >>> " >>> >>> and again here, I think we need to report back _all_ entropy, i.e. v6 >>> flow (which should be copied from bier entropy , bier entropy, mpls entropy >>> >> GIM>> Good question. I think that ECMP queries can be scoped to the >> specific underlay, i.e., MPLS, v6, or Ethernet. >> >>> >>> Otherwise I see >>> >>> "If the BIER-MPLS label in the received Echo Request is not the one >>> assigned for SI in Original SI-BitString TLV, "Set-Identifier Mismatch" is >>> set in order to report the mismatch." >>> >>> this applies to other encaps as well so I don't know why we'd call it >>> BIER MPLS label, it's really BIFT-ID, isn't it? >>> >> GIM>> As I understand it, yes. Although in non-MPLS underlay BIER-MPLS >> Label should be referred to as BIFT-id, according to Section 2 of RFC >> 8296 <https://datatracker.ietf.org/doc/html/rfc8296#section-2>. >> >>> >>> OAM, just like security is hard work and often unexciting but both >>> matter a lot in long term at scale deployments and thus thanks for the >>> effort, Greg ;-) >>> >> GIM>> Thanks. >> >>> >>> -- tony >>> >>> >>> On Sun, Mar 1, 2026 at 9:56 PM Greg Mirsky <gregimirsky@gmail.com> >>> wrote: >>> >>>> Sorry, now with the diff >>>> >>>> On Sun, Mar 1, 2026 at 12:55 PM Greg Mirsky <gregimirsky@gmail.com> >>>> wrote: >>>> >>>>> Hi Ketan, >>>>> thank you for your thoughtful consideration and the great discussion. >>>>> I am glad that we're converging on many points. For the remaining issues, >>>>> please see my follow-up notes tagged GIM3>>. Also, thank you for helping to >>>>> clarify the "IPv6 Unnumbered" issue. I read the Errata to RFC 8029 filed by >>>>> Adrian and updated our draft accordingly. I attached the working version >>>>> and diff highlighting applied updates. >>>>> >>>>> Regards, >>>>> Greg >>>>> >>>>> On Thu, Feb 26, 2026 at 11:23 PM Ketan Talaulikar < >>>>> ketant.ietf@gmail.com> wrote: >>>>> >>>>>> Hi Greg, >>>>>> >>>>>> Thanks for sharing your responses and the proposed changes. Please >>>>>> check inline with KT2 for follow-ups and consider the ones without >>>>>> responses as having been addressed by your updates and/or clarifications. >>>>>> >>>>>> >>>>>> On Tue, Feb 24, 2026 at 5:03 AM Greg Mirsky <gregimirsky@gmail.com> >>>>>> wrote: >>>>>> >>>>>>> Hi Ketan, >>>>>>> thank you for your kind consideration of proposed updates and >>>>>>> further clarifications of your concerns. Please find my follow up notes >>>>>>> below tagged GIM2>>. I attached the working version of the draft and the >>>>>>> diff highlighting applied updates. >>>>>>> >>>>>>> Regards, >>>>>>> Greg >>>>>>> >>>>>>> On Tue, Jan 27, 2026 at 7:08 AM Ketan Talaulikar < >>>>>>> ketant.ietf@gmail.com> wrote: >>>>>>> >>>>>>>> Hi Greg, >>>>>>>> >>>>>>>> Thanks for your response and sharing the proposed update. >>>>>>>> >>>>>>>> Please check inline below for responses with KT. >>>>>>>> >>>>>>>> >>>>>>>> On Mon, Jan 26, 2026 at 6:54 AM Greg Mirsky <gregimirsky@gmail.com> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Hi Ketan, >>>>>>>>> thank you for your comments. Please find my notes below tagged >>>>>>>>> GIM>>. I attached the new working version of the draft and the diff >>>>>>>>> highlighting the updates applied. >>>>>>>>> >>>>>>>>> Regards, >>>>>>>>> Greg >>>>>>>>> >>>>>>>>> On Thu, Jan 22, 2026 at 6:16 AM Ketan Talaulikar via Datatracker < >>>>>>>>> noreply@ietf.org> wrote: >>>>>>>>> >>>>>>>>>> Ketan Talaulikar has entered the following ballot position for >>>>>>>>>> draft-ietf-bier-ping-18: Discuss >>>>>>>>>> >>>>>>>>>> When responding, please keep the subject line intact and reply to >>>>>>>>>> all >>>>>>>>>> email addresses included in the To and CC lines. (Feel free to >>>>>>>>>> cut this >>>>>>>>>> introductory paragraph, however.) >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Please refer to >>>>>>>>>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ >>>>>>>>>> for more information about how to handle DISCUSS and COMMENT >>>>>>>>>> positions. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> The document, along with other ballot positions, can be found >>>>>>>>>> here: >>>>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-bier-ping/ >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> ---------------------------------------------------------------------- >>>>>>>>>> DISCUSS: >>>>>>>>>> >>>>>>>>>> ---------------------------------------------------------------------- >>>>>>>>>> >>>>>>>>>> Thanks to the authors and the WG for their work on this document. >>>>>>>>>> >>>>>>>>>> I have a number of points that I would like to DISCUSS on this >>>>>>>>>> document that I >>>>>>>>>> am providing inline in the idnits o/p of v16 of this document. >>>>>>>>>> >>>>>>>>>> Note: This is an updated ballot for v18. The points that are >>>>>>>>>> resolved are >>>>>>>>>> deleted but the previous number has been retained. >>>>>>>>>> >>>>>>>>>> 177 3. BIER OAM >>>>>>>>>> >>>>>>>>>> 179 BIER OAM is defined to stay within the BIER layer by >>>>>>>>>> directly >>>>>>>>>> 180 following the BIER header without mandating the need >>>>>>>>>> for an IP >>>>>>>>>> 181 header. [RFC8296] defines a 4-bit field as "Proto" to >>>>>>>>>> identify the >>>>>>>>>> 182 payload following the BIER header. When the payload >>>>>>>>>> is BIER OAM, the >>>>>>>>>> 183 "Proto" field will be set to 5 as defined in [RFC8296] >>>>>>>>>> >>>>>>>>>> <discuss-1> I do not find the specification for setting the other >>>>>>>>>> fields in the >>>>>>>>>> BIER header for OAM packets besides the Proto field. I find >>>>>>>>>> something about the >>>>>>>>>> Entropy field usage further and about the use of BFIR-id and >>>>>>>>>> BitString but it >>>>>>>>>> was not clear to me. Perhaps some specification in this section >>>>>>>>>> that covers >>>>>>>>>> how the BIER header fields are set for BIER OAM packets would >>>>>>>>>> help clarify >>>>>>>>>> along with forward reference to the respective sections that >>>>>>>>>> describe their >>>>>>>>>> usage in further details? >>>>>>>>>> >>>>>>>>> GIM>> Would the following update make setting parameters in BIER >>>>>>>>> header of a BIER OAM packet clearer: >>>>>>>>> OLD TEXT: >>>>>>>>> BIER OAM is defined to stay within the BIER layer by directly >>>>>>>>> following the BIER header without mandating the need for an IP >>>>>>>>> header. [RFC8296] defines a 4-bit field as "Proto" to identify >>>>>>>>> the >>>>>>>>> payload following the BIER header. When the payload is BIER >>>>>>>>> OAM, the >>>>>>>>> "Proto" field will be set to 5 as defined in [RFC8296]. >>>>>>>>> NEW TEXT: >>>>>>>>> BIER OAM is defined to stay within the BIER layer by directly >>>>>>>>> following the BIER header without mandating the need for an IP >>>>>>>>> header. To produce information that is useful to an operator, >>>>>>>>> information that statistically reflects conditions experienced >>>>>>>>> by the >>>>>>>>> monitored data flow, the operator must be able to ensure that >>>>>>>>> active >>>>>>>>> OAM packets, e.g., BIER Echo Request, traverse the set of links >>>>>>>>> and >>>>>>>>> nodes and receive the same forwarding treatment as the monitored >>>>>>>>> flow. Hence, all fields in the BIER header that affect packet >>>>>>>>> forwarding (e.g., BFIR-id, BitString) must be set to the values >>>>>>>>> applied to the monitored data flow. [RFC8296] defines a 4-bit >>>>>>>>> field >>>>>>>>> as "Proto" to identify the payload following the BIER header. >>>>>>>>> When >>>>>>>>> the payload is BIER OAM, the "Proto" field will be set to 5 as >>>>>>>>> defined in [RFC8296]. >>>>>>>>> >>>>>>>> >>>>>>>> KT> That clarifies and clears this discussion point. Thanks. >>>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 209 Message Type - a six-bit field that identifies OAM >>>>>>>>>> protocol. >>>>>>>>>> 210 Values defined in this document are as follows: >>>>>>>>>> >>>>>>>>>> 212 Value Description >>>>>>>>>> 213 -------- --------------- >>>>>>>>>> 214 1 Echo Request >>>>>>>>>> 215 2 Echo Reply >>>>>>>>>> >>>>>>>>>> <discuss-2> The handling of unknown types is undefined in this >>>>>>>>>> base >>>>>>>>>> specification. E.g., how are implementations expected to handle a >>>>>>>>>> new Type 3 >>>>>>>>>> message defined by as future specification that it does not >>>>>>>>>> recognize? While I >>>>>>>>>> am raising the point for the message types, it also applies to >>>>>>>>>> all levels of >>>>>>>>>> TLVs/sub-TLVs as well. For some TLVs, when unrecognized are >>>>>>>>>> present, the >>>>>>>>>> operation has been specified to error out and I wanted to confirm >>>>>>>>>> that was >>>>>>>>>> intended given that it restricts extensions. >>>>>>>>>> >>>>>>>>> GIM>> In the version 18 of the draft, addressing comments from >>>>>>>>> Med, we added the following text in Section 4.1: >>>>>>>>> Processing of the received BIER OAM packet with unknown value >>>>>>>>> of the >>>>>>>>> Message Type field (Figure 1) is stopped and the event SHOULD be >>>>>>>>> logged although through the rate-controlling system. >>>>>>>>> Do you find the text addressing your concern? >>>>>>>>> >>>>>>>> >>>>>>>> KT> It does, but only partially. Btw, there is also some text on >>>>>>>> similar lines in section 3.4. My point was there we have >>>>>>>> several layers of message types and TLVs/sub-TLVs in this spec. >>>>>>>> Since this document sets the "base" for BIER OAM >>>>>>>> and defines a totally new messaging system, we need to cover >>>>>>>> handling of unknown message types and TLVs >>>>>>>> at all these layers. I am wondering if we can have the same error >>>>>>>> handling at all levels. Choices are - return error and >>>>>>>> drop the message, drop the message without error, ignore the >>>>>>>> unknown (can be an option for optional TLVs?) and process >>>>>>>> the message, ... anything else? >>>>>>>> >>>>>>> GIM2>> In version 18, we introduced the new TLV, Erroneous Echo >>>>>>> Request. The Responder must use a TLV that cannot process a TLV in the >>>>>>> received BIER Echo Request. I believe that returning an error with as much >>>>>>> of the message that caused the error as possible is the most informative >>>>>>> option for an operator. I think that must be a common handling for all >>>>>>> unrecognized types in TLV/sub-TLV processing. Do you see anywhere in the >>>>>>> draft that we missed specifying the handling policy? >>>>>>> >>>>>> >>>>>> KT2> Fair enough. I was only bringing up the options. I would have >>>>>> personally recommended the option to drop by default so that this does not >>>>>> become an attack vector (especially given this is multicast), but I see how >>>>>> the handling that you proposed may help the operator determine the error. >>>>>> Which one is better in the field operationally, is debatable. Having had >>>>>> the discussion on this error handling, I will leave it to the authors and >>>>>> WG to make their choice. We can consider this discussion closed. >>>>>> >>>>> GIM3>> Do you think that both approaches can be controlled via a BFER >>>>> local policy? For example, if no policy enabled, the default, as you >>>>> suggested, is to drop unrecognized packet. If the Respond to an erroneous >>>>> BIER Echo request enabled, then BFER sends BIER Echo Reply with the >>>>> Erroneous Echo Request TLV. WDYT? >>>>> >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> <discuss-5> Regarding section 3.2. Is it possible that more than >>>>>>>>>> one error >>>>>>>>>> code is applicable at the responder for a given echo request? If >>>>>>>>>> so, I assume >>>>>>>>>> these are supposed to be an ordered set rules (called "steps" in >>>>>>>>>> section 4.4) >>>>>>>>>> that need to be followed by an implementation in determining the >>>>>>>>>> Return Code? >>>>>>>>>> Please check for redundancy between the text in this section and >>>>>>>>>> 4.4 - best to >>>>>>>>>> specify in one place. I am guessing the purpose of the text in >>>>>>>>>> this section >>>>>>>>>> was to describe those error codes, but the description includes >>>>>>>>>> normative >>>>>>>>>> procedures - best to do so in one place like section 4.4? This >>>>>>>>>> still leaves >>>>>>>>>> the part that what is needed in section 4.4 is ordering (with a >>>>>>>>>> numbered list?) >>>>>>>>>> - this also allows for further specifications that introduce more >>>>>>>>>> TLVs or >>>>>>>>>> verification checks to introduce their error codes/handling in an >>>>>>>>>> appropriate >>>>>>>>>> position in the sequence by updating this specification. >>>>>>>>>> >>>>>>>>>> <v18> The multiple error codes part is clarified, but the >>>>>>>>>> discussion on >>>>>>>>>> the use of a numbered list in section 4.4 remains open. >>>>>>>>>> >>>>>>>>> >>>>>>>> KT> This one seems to have been skipped. You are very familiar with >>>>>>>> https://datatracker.ietf.org/doc/html/rfc8029#section-4.4 >>>>>>>> and how that has helped other documents to extend these procedures >>>>>>>> for newer features. >>>>>>>> >>>>>>> GIM2>> Sorry, I missed this one. Moved QTF exception handling to >>>>>>> Section 4.4; simplified RTF. Please let me know if these updates address >>>>>>> your concern. >>>>>>> >>>>>> >>>>>> KT2> Looks good. >>>>>> >>>>> GIM3>> Thank you. >>>>> >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 558 Type Addr. Type DA Length DIA >>>>>>>>>> Length >>>>>>>>>> 559 ------- --------------- ---------- >>>>>>>>>> ---------- >>>>>>>>>> 560 1 IPv4 Numbered 4 >>>>>>>>>> 4 >>>>>>>>>> 561 2 IPv4 Unnumbered 4 >>>>>>>>>> 4 >>>>>>>>>> 562 3 IPv6 Numbered 16 >>>>>>>>>> 16 >>>>>>>>>> 563 4 IPv6 Unnumbered 16 >>>>>>>>>> 4 >>>>>>>>>> >>>>>>>>>> <discuss-6> What is IPv6 Unnumbered? I am not familiar with that >>>>>>>>>> term. Could you >>>>>>>>>> please provide a reference? Or, is this a reference to an >>>>>>>>>> interface that >>>>>>>>>> only has IPv6 link-local address and no IPv6 global address? >>>>>>>>>> >>>>>>>>> GIM>> As the result of addressing Med's comments, this list in >>>>>>>>> version 18 was split into two: >>>>>>>>> Value Address Type >>>>>>>>> ------- --------------- >>>>>>>>> 1 IPv4 Numbered >>>>>>>>> 2 IPv4 Unnumbered >>>>>>>>> 3 IPv6 Numbered >>>>>>>>> 4 IPv6 Unnumbered >>>>>>>>> and >>>>>>>>> Value DA Length DIA Length >>>>>>>>> ------- ------------ ------------ >>>>>>>>> 1 4 4 >>>>>>>>> 2 4 4 >>>>>>>>> 3 16 16 >>>>>>>>> 4 16 4 >>>>>>>>> Does the new format address your concern? >>>>>>>>> Use of IPv6 unnumbered is analogous to how IPv4 unnumbered address >>>>>>>>> is used, i.e., on a point-to-point interface re-using another IP address, >>>>>>>>> usually a loopback, as a source address. One of common uses is BGP >>>>>>>>> unnumbered. >>>>>>>>> >>>>>>>> >>>>>>>> KT> AFAIK the unnumbered only applies to IPv4 (i.e., an interface >>>>>>>> w/o any IPv4 addresses of its own and so it "borrows" from the loopback). >>>>>>>> When it comes to IPv6, we really never have an interface without an IPv6 >>>>>>>> address - there is always the link-local address. When you say >>>>>>>> IPv6 unnumbered, are you referring to links with only IPv6 >>>>>>>> link-local addresses? Is there any RFC that uses the term IPv6 unnumbered? >>>>>>>> >>>>>>> GIM2>> One that comes to mind is RFC 8029. I added the reference. >>>>>>> >>>>>> >>>>>> KT2> That explains where this error is originating from. However, it >>>>>> is still wrong and let me start a separate thread on this topic. >>>>>> >>>>> GIM3>> Thnak you for clarifying this with the 6man WG. I updated draft >>>>> removing IPv6 Unnumbered. Also, it seems like re-naming IPv6 Numbered as >>>>> IPv6 Address will remove any confusion. WDYT? >>>>> >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 737 3.3.7. Upstream Interface TLV >>>>>>>>>> >>>>>>>>>> 739 The BFR replying to the request MUST include the >>>>>>>>>> Upstream Interface >>>>>>>>>> 740 TLV. This TLV identifies the incoming interface and >>>>>>>>>> the BIER-MPLS >>>>>>>>>> 741 label in the incoming Echo Request. This TLV has the >>>>>>>>>> following >>>>>>>>>> 742 format: >>>>>>>>>> >>>>>>>>>> <discuss-7> I don't see the BIER-MPLS label being carried in this >>>>>>>>>> TLV. Am I >>>>>>>>>> missing something? Also, I see that the ping but more so the >>>>>>>>>> traceroute >>>>>>>>>> procedures in this document work only for MPLS and not for other >>>>>>>>>> data planes. >>>>>>>>>> Am I correct? If so, perhaps this needs to be called out in the >>>>>>>>>> abstract >>>>>>>>>> and introduction? >>>>>>>>>> >>>>>>>>> GIM>> In addressing Med's comments, this section was changed as >>>>>>>>> follows: >>>>>>>>> >>>>>>>>> 3.4.7. Ingress Interface TLV >>>>>>>>> >>>>>>>>> The BFR replying to the request MUST include the Ingress >>>>>>>>> Interface >>>>>>>>> TLV. This TLV identifies the incoming interface on which the >>>>>>>>> Echo >>>>>>>>> Request was received. >>>>>>>>> Do you find the text in version 18 addresses your concern? >>>>>>>>> >>>>>>>> >>>>>>>> KT> It does not. There are two aspects here. The first is that I >>>>>>>> found the TLVs missing the forwarding >>>>>>>> information - this specific TLV is an example. Should it not >>>>>>>> include the MPLS label (for BIER MPLS) >>>>>>>> to provide diagnostic information? The second point is that I find >>>>>>>> coverage for BIER MPLS in the >>>>>>>> procedures, but the same is not there for IPv6 or native BIER. If >>>>>>>> this document is focussing on >>>>>>>> BIER MPLS, it can be called out and other data planes can be >>>>>>>> specified in future documents? >>>>>>>> >>>>>>> GIM2>> As I understand it, the BIER WG agreed with the document and >>>>>>> the level of diagnostic that it provides. Also, I am not familiar with >>>>>>> "native BIER". Can you please give me an example or a reference to the >>>>>>> document that specifies it? >>>>>>> >>>>>> >>>>>> KT2> I will not further debate the utility of inclusion of the MPLS >>>>>> Label if this has been discussed by the WG. By "native BIER" (sorry for the >>>>>> use of an inaccurate term), I am referring to Ethernet - >>>>>> https://www.rfc-editor.org/rfc/rfc8296.html#section-2.2 and then for >>>>>> IPv6 there is >>>>>> https://datatracker.ietf.org/doc/draft-ietf-bier-bierin6/ which has >>>>>> completed WGLC. One option to resolve this point is for this document to >>>>>> scope itself only to BIER MPLS and leave the others for future documents. >>>>>> >>>>> GIM3>> Thank you for pointing me to Section 2.2 of RFC 8296. After >>>>> comparing it with the BIERin6 draft, I think that there's ambiguity in >>>>> regard to use of Ethertype 0xAB37. Consider that IEEE assigned this value >>>>> for non-MPLS encapsulation of BIER, as explained in RFC 8296. But in >>>>> BIERin6, this Ethertype value is optionally used if BFRs are directly >>>>> connected. >>>>> But turning back to the use of the Ingress Interface TLV. It returns >>>>> IP address of the interface the responding BFR received the BIER Echo >>>>> Request. Would you agree that the interface IP address is unambiguous >>>>> information that doesn't depend on the type of the underlay (MPLS, IPv6, or >>>>> Ethernet) that transports BIER? >>>>> >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 770 3.4. Multipath Entropy Data Encoding >>>>>>>>>> >>>>>>>>>> 772 The size of the Entropy field in the BIER header is 20 >>>>>>>>>> bits, as >>>>>>>>>> 773 defined in Section 2 of [RFC8296]. This encoding is >>>>>>>>>> the same as the >>>>>>>>>> 774 Multipath Type 9 encoding, defined in Section >>>>>>>>>> 3.4.1.1.1 of [RFC8029]. >>>>>>>>>> >>>>>>>>>> <discuss-8> RFC8029 talks about MPLS and how the IP destination >>>>>>>>>> address for an >>>>>>>>>> LSP Ping packet is encoded. I don't see how that applies to BIER >>>>>>>>>> Echo Request. >>>>>>>>>> What is required is perhaps the entropy encoding but I don't >>>>>>>>>> follow how that >>>>>>>>>> would work. Please clarify. >>>>>>>>>> >>>>>>>>> GIM>> As result of addressing Med's comments, this text in version >>>>>>>>> 18 chged to: >>>>>>>>> The interpretaion of the Multipath Type field and Multipath >>>>>>>>> Entropy Data encoding options are the same defined in >>>>>>>>> Section 3.4.1.1 of [RFC8029]. >>>>>>>>> Do you find the latest version addresses your concern? >>>>>>>>> >>>>>>>> >>>>>>>> KT> It is not clear to me. The BIER header has its own Entropy >>>>>>>> field. >>>>>>>> There is also the case of different data planes than just MPLS. Can >>>>>>>> you explain how what >>>>>>>> is defined for LSP Ping (RFC8029) multipath would work with not >>>>>>>> just BIER MPLS but BIER >>>>>>>> in general? >>>>>>>> >>>>>>> GIM2>> As I understand BIER specification and its processing in MPLS >>>>>>> and non-MPLS networks, Section 6.7 of RFC 8279 >>>>>>> <https://datatracker.ietf.org/doc/html/rfc8279#section-6.7> discusses >>>>>>> ECMP in a BIER domain. Section 2.1.2 of RFC 8296 specifies Entropy field >>>>>>> and its relation with underlay encapsulations, e.g., MPLS. In regard to >>>>>>> IPv6 tunnel transporting BIER, draft-ietf-bier-bierin6 >>>>>>> <https://datatracker.ietf.org/doc/draft-ietf-bier-bierin6/> >>>>>>> explains that: >>>>>>> BIERin6 being a solution based on [RFC8279] and [RFC8296], ECMP is >>>>>>> inherently supported by BFRs using the the 20-bit entropy field in >>>>>>> the BIER header for the load balancing hash. When a BIER packet >>>>>>> is >>>>>>> transported over an IPv6 tunnel, the entropy value is copied into >>>>>>> the >>>>>>> 20-bit IPv6 Flow Label [RFC6437], so that routers along the tunnel >>>>>>> can do ECMP based on Flow Labels (instead of hashing based on >>>>>>> 5-tuple >>>>>>> of an IP packet). For a router along the tunnel doing deep packet >>>>>>> inspection for ECMP purpose, if it understands BIER header it can >>>>>>> go >>>>>>> past the BIER header to look for the 5-tuple input key to a hash >>>>>>> function. Otherwise, it stops at the BIER header. In either case >>>>>>> the router will not mistake the BIER header as an IP header so no >>>>>>> misordering should happen. >>>>>>> BIER Echo Request can be transmitted in the same IPv6 tunnel as data >>>>>>> packets with BIER headers to trace the paths traversed using particular >>>>>>> combinations in BitString and Entropy fields. >>>>>>> >>>>>> >>>>>> KT2> Right. So my point is that the proposal for encoding multipath >>>>>> in >>>>>> https://www.ietf.org/archive/id/draft-ietf-bier-ping-18.html#section-3.4.4.1.1 >>>>>> via essentially a reference to RFC8029 (which is MPLS specific) does not >>>>>> cover the gamut of all encapsulations/data plane that BIER works over. More >>>>>> specifically, the multipath types (see >>>>>> https://www.iana.org/assignments/mpls-lsp-ping-parameters/mpls-lsp-ping-parameters.xhtml#multipath-type) >>>>>> does not cover the encoding of the entropy field in the BIER header. >>>>>> >>>>> GIM3>> Thank you for the clarification. I agree to explicitly scoping >>>>> Multipath Entropy Data sub-TLV to MPLS underlay only and adding note that >>>>> other underlay types are for further study. Would the following update >>>>> address your concern: >>>>> NEW TEXT: >>>>> Multipath Entropy Data sub-TLV is applicable for BIER Echo Request >>>>> packets encapsulated in MPLS. Encoding of multipath information for >>>>> other data planes, e.g., IPv6, is for further study. If the >>>>> Multipath Entropy Data sub-TLV is present in the BIER Echo Request >>>>> packet encapsulated in a non-MPLS data plane, it MUST be ignored by >>>>> the responding BFR. >>>>> >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 814 4.3. Sending BIER Echo Request >>>>>>>>>> >>>>>>>>>> 816 The Initiator MUST set the Message Type as 1 and >>>>>>>>>> Return Code as 0. >>>>>>>>>> 817 The Proto field in the OAM packet MUST be set to 0. >>>>>>>>>> The choice of >>>>>>>>>> >>>>>>>>>> <discuss-9> Does this precludes the use of any padding or such to >>>>>>>>>> increase the >>>>>>>>>> size of the BIER OAM packet to debug issues with specific packet >>>>>>>>>> sizes? I don't >>>>>>>>>> see a padding TLV and neither do I see the ability to carry some >>>>>>>>>> other payload. >>>>>>>>>> Has this been discussed/considered by the WG? >>>>>>>>>> >>>>>>>>> GIM>> Padding for BIER Echo Request can be provided using Data TLV >>>>>>>>> that is defined in >>>>>>>>> https://www.ietf.org/archive/id/draft-ietf-bier-path-mtu-discovery-18.txt >>>>>>>>> . >>>>>>>>> >>>>>>>> >>>>>>>> KT> Thanks for that pointer - it clarifies that this is coming >>>>>>>> potentially in a separate document. >>>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 1031 5.1. UDP Port Number >>>>>>>>>> >>>>>>>>>> 1033 This document requests a UDP port TBD1 to be allocated >>>>>>>>>> by IANA for >>>>>>>>>> 1034 BIER Echo. >>>>>>>>>> >>>>>>>>>> <discuss-10> Should this not be BIER OAM in general and not just >>>>>>>>>> for a specific >>>>>>>>>> message types? >>>>>>>>>> >>>>>>>>> GIM>> I think that the requested for BIER Echo Reply UDP port >>>>>>>>> number should have specific application as other OAM protocols, e.g., BFD >>>>>>>>> and STAMP, already have their port numbers assigned. >>>>>>>>> >>>>>>>> >>>>>>>> KT> I was still referring to BIER. Can this be called BIER OAM? >>>>>>>> Where Echo is one of the OAM functions with the potential to >>>>>>>> add more OAM functions for BIER. Since the message is called BIER >>>>>>>> OAM message and Echo request/reply are two message >>>>>>>> types, then I am assuming more OAM message types could be added in >>>>>>>> the future? >>>>>>>> >>>>>>> GIM2>> Naming this UDP port as BIER OAM might be confusing. Consider >>>>>>> how it relates to other active OAM functions in BIER. For example, a BFER >>>>>>> encapsulates the BFD control message in BIER while BFIRs may use IP/IDP >>>>>>> encapsulation to transmit BFD control messages to that BFER. None of the >>>>>>> actors will use the UDP port number that we're discussing. Similar >>>>>>> situation with measuring performance using STAMP - Session-Reflectors may >>>>>>> use UDP port 862 assigned for TWAMP test plane. >>>>>>> >>>>>> >>>>>> KT2> I am confused by your response. None of BFD, STAMP, or TWAMP are >>>>>> BIER OAM - they have their own independent protocols. I can understand >>>>>> these protocols encapsulated in BIER headers, but I cannot understand why >>>>>> they would be sent as BIER OAM messages. >>>>>> >>>>> GIM3>> BIER OAM type acts as Associated channel, for example, as VCCV >>>>> in PW (RFC 5085 <https://datatracker.ietf.org/doc/html/rfc5085>). It >>>>> allows using non-IP encapsulation for OAM packets. Of course, OAM packets >>>>> can be encapsulated in IP/UDP, then BIER, not as BIER OAM, but as IPv4 or >>>>> IPv6 packt identified in the Proto field of the BIER header according to >>>>> values in IANA BIER Next Protocol Identifiers registry. >>>>> >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> <discuss-13> This is in general for all the IANA registries >>>>>>>>>> created and their >>>>>>>>>> allocation rules. I would be interested in understanding the >>>>>>>>>> rationale for this >>>>>>>>>> very complicated scheme with mix of various allocation policies >>>>>>>>>> and the WG >>>>>>>>>> discussion around why this was necessary as opposed to a much >>>>>>>>>> simpler scheme >>>>>>>>>> that is IETF Review + experimental/private use ? >>>>>>>>>> >>>>>>>>>> <v18> FCFS has changed to RFC Required but the discussion point >>>>>>>>>> still remains. >>>>>>>>>> <v18> Perhaps the 2 unassigned rows in Table 3 were meant to fall >>>>>>>>>> on the >>>>>>>>>> boundaries of these different allocation schemes? >>>>>>>>>> >>>>>>>>> GIM>> Thank you for the catch. Updated Table 3 as follows: >>>>>>>>> | 4 - 191 | Unassigned | This >>>>>>>>> document | >>>>>>>>> >>>>>>>>> +-----------+-----------------------------------+---------------+ >>>>>>>>> | 192 - 247 | Unassigned | This >>>>>>>>> document | >>>>>>>>> >>>>>>>> >>>>>>>> KT> Thanks for fixing that. My question was really trying to >>>>>>>> understand the reason behind such a complicated >>>>>>>> set of allocation policies. I am trying to understand why the >>>>>>>> authors/WG could not just pick IETF Review >>>>>>>> instead of IETF Review + RFC Required? Is the expectation that RFCs >>>>>>>> for BIER OAM be published via >>>>>>>> the Independent Stream outside of the IETF? >>>>>>>> >>>>>>>> >>>>>>>> - 0 - 191 - IETF Review >>>>>>>> - 192 - 247 - RFC Required >>>>>>>> - 248 - 251 - Experimental Use (Reserved, not to be assigned) >>>>>>>> - 252 - 255 - Private Use (Reserved, not to be assigned) >>>>>>>> >>>>>>>> GIM2>> Thank you for the clarification. To better understand it, I >>>>>>> refreshed my memory of RFC 8126 >>>>>>> <https://datatracker.ietf.org/doc/rfc8126/>, and I agree with your >>>>>>> point that IETF Review sufficiently reflects the WG's intention and >>>>>>> expectation for the future assignments of code points from all newly >>>>>>> created IANA registries. I updated the draft accordingly. >>>>>>> >>>>>> >>>>>> KT2> Thanks and the updates look good to me. >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> ---------------------------------------------------------------------- >>>>>>>>>> COMMENT: >>>>>>>>>> >>>>>>>>>> ---------------------------------------------------------------------- >>>>>>>>>> >>>>>>>>>> I would also like to share some comments inline in the idnits o/p >>>>>>>>>> of v16 of this document. >>>>>>>>>> >>>>>>>>>> I support the DISCUSS from Roman and some of the DISCUSS points >>>>>>>>>> raised by Med. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 285 Value Description >>>>>>>>>> 286 -------- --------------- >>>>>>>>>> 287 1 Do not Reply >>>>>>>>>> 288 2 Reply via IPv4/IPv6 UDP >>>>>>>>>> packet >>>>>>>>>> 289 3 Reply via BIER packet >>>>>>>>>> >>>>>>>>>> 291 When Reply Mode is set to 1, the receiver will not >>>>>>>>>> send any reply. >>>>>>>>>> 292 This mode can be used for unidirectional path >>>>>>>>>> validation. When >>>>>>>>>> 293 the Reply Mode is set to 2, the Responder >>>>>>>>>> Bit-Forwarding Router >>>>>>>>>> 294 (BFR) encapsulates the Echo reply payload with the >>>>>>>>>> IP/UDP header. >>>>>>>>>> >>>>>>>>>> <major> How does the responder choose whether to use IPv4 or IPv6 >>>>>>>>>> if is running >>>>>>>>>> dual/stack? >>>>>>>>>> >>>>>>>>> GIM>> Although a dual-stack support on a router is common, I am >>>>>>>>> not familiar with deployments of IPv4 and IPv6 in the same BIER domain. As >>>>>>>>> I understand it, only one address family is associated with BFR-id. If that >>>>>>>>> is the case, a BFR will use mapping of BFR-id when consructing BIER Echo >>>>>>>>> Reply is IP/UDP encapsulation. >>>>>>>>> >>>>>>>> >>>>>>>> KT> I am not very familiar with BIER deployments either. It might >>>>>>>> be helpful to crosscheck and clarify in the text that the BFR-ID is used to >>>>>>>> determine whether to use IPv4 or IPv6 in a dual stack scenario? >>>>>>>> >>>>>>> GIM2>> I propose the following update: >>>>>>> OLD TEXT: >>>>>>> When >>>>>>> the Reply Mode is set to 2, the Responder Bit-Forwarding Router >>>>>>> (BFR) encapsulates the Echo reply payload with the IP/UDP >>>>>>> header. >>>>>>> NEW TEXT: >>>>>>> When >>>>>>> the Reply Mode is set to 2, the Responder Bit-Forwarding Router >>>>>>> (BFR) encapsulates the Echo reply payload with the IP/UDP >>>>>>> header. >>>>>>> The Responder BFR uses the BFIR-id field in the BIER header to >>>>>>> determine which IP address family to use in the IP/UDP >>>>>>> encaspulation. >>>>>>> >>>>>> >>>>>> KT2> Looks good to me. >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 443 Any Initiator MUST include this TLV in the Echo >>>>>>>>>> Request packet. >>>>>>>>>> >>>>>>>>>> <major> Is this only supposed to be present in the request and >>>>>>>>>> not in the response? >>>>>>>>>> Please clarify. >>>>>>>>>> >>>>>>>>> GIM>> Original SI-BitString TLV carries a copy of the BitString in >>>>>>>>> BIER header of thr BIER Echo Request. It is recommended that the responder >>>>>>>>> includes Incoming SI-BitString TLV that carries the BitString as received >>>>>>>>> in the BIER Echo Request. >>>>>>>>> >>>>>>>> >>>>>>>> KT> Right. My question was should there be a text that says "A >>>>>>>> Responder MUST NOT include this TLV in Echo Response." on the >>>>>>>> lines of a similar text in section 3.4.3 for the Incoming SI-Bitrsing TLV ? >>>>>>>> >>>>>>> GIM2>> Thank you for the suggestion. I added this clarification as >>>>>>> follows: >>>>>>> NEW TEXT: >>>>>>> Any Initiator MUST include this TLV in the Echo Request packet. A >>>>>>> Responder MUST NOT include this TLV in the Echo Reply packet. >>>>>>> >>>>>> >>>>>> KT2> Thanks. >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 481 the BFER responding to the Echo Request. This TLV >>>>>>>>>> MUST be included >>>>>>>>>> 482 by Initiator in the BIER OAM packet if the Downstream >>>>>>>>>> Mapping TLV >>>>>>>>>> 483 (Section 3.3.4) is included. >>>>>>>>>> >>>>>>>>>> <major> Is this allowed in both request and response? i.e., if >>>>>>>>>> present in the >>>>>>>>>> request, should the responder also copy it in the response? >>>>>>>>>> >>>>>>>>> GIM>> Target SI-BitString TLV is used by the Initiator to control >>>>>>>>> which BFER responds with the BIER Echo Reply. >>>>>>>>> >>>>>>>> >>>>>>>> KT> My question was on similar lines as the previous response. Can >>>>>>>> it be specified which TLVs are not to be used besides where they are used? >>>>>>>> Also, the error handling if they are used probably should be to ignore them? >>>>>>>> >>>>>>> GIM2>> Thank you for the clarification. The draft already specifies >>>>>>> for Incoming SI-BitString TLV " An Initiator MUST NOT include this TLV in >>>>>>> Echo Request." I propose adding similar requirements for Responder BFER TLV >>>>>>> and Responder BFR TLV.As for the error handling when the Responder receives >>>>>>> a BIER Echo Request with unexpected TLV, e.g., Incoming SI-BitString TLV, >>>>>>> it must use the Erroneous Echo Request TLV. >>>>>>> >>>>>> >>>>>> KT2> Sounds good. Thanks. >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> >>>>>>>>>> 609 This section defines the optional Sub-TLVs that can be >>>>>>>>>> included in >>>>>>>>>> 610 Downstream Mapping TLV. >>>>>>>>>> >>>>>>>>>> 612 Sub-TLV Type Value >>>>>>>>>> 613 ------------ ------------- >>>>>>>>>> 614 1 Multipath Entropy Data >>>>>>>>>> 615 2 Egress BitString >>>>>>>>>> >>>>>>>>>> <major> What is the handling for unknown/unrecognized sub-TLVs? >>>>>>>>>> >>>>>>>>> GIM>> Thank you for pointing this out to me. Added the following >>>>>>>>> text to clarify handling of the undefined Type value: >>>>>>>>> NEW TEXT: >>>>>>>>> Any other value MUST be considered as invalid, the Return Code >>>>>>>>> set to >>>>>>>>> Malformed Echo Request received (1). Also, the Erroneous Echo >>>>>>>>> Request TLV (Section 3.4.8) SHOULD be included in the BIER Echo >>>>>>>>> Reply. >>>>>>>>> >>>>>>>> >>>>>>>> KT> Perfect. Thanks. This is also related to discuss-2. Could you >>>>>>>> please check at other "levels"? >>>>>>>> >>>>>>> GIM2>> It seems like we now covered all error handling with the new >>>>>>> Erroneous Echo Request TLV. >>>>>>> >>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 767 Upstream Address >>>>>>>>>> 768 As defined in Section 3.3.4 >>>>>>>>>> >>>>>>>>>> <major> What is defined in 3.3.4 is very different. Please >>>>>>>>>> specify here again >>>>>>>>>> even if the concept is similar for clarity. >>>>>>>>>> >>>>>>>>> GIM>> Updated to the following text: >>>>>>>>> Ingress Interface Address >>>>>>>>> A four or sixteen-octet-long field. It lists an address >>>>>>>>> associated with the interface on which the BIER Echo Request >>>>>>>>> received. >>>>>>>>> >>>>>>>> >>>>>>>> KT> Thanks. >>>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> 780 4.1. BIER OAM Processing >>>>>>>>>> >>>>>>>>>> 782 A BIER OAM packet MUST be sent to the BIER control >>>>>>>>>> plane for OAM >>>>>>>>>> 783 processing if one of the following conditions is true: >>>>>>>>>> >>>>>>>>>> 785 * The receiving BFR is a BFER. >>>>>>>>>> >>>>>>>>>> 787 * TTL of BIER-MPLS Label (Section 2.1.1.1 [RFC8296]) >>>>>>>>>> expired. >>>>>>>>>> >>>>>>>>>> <major> What about IPv6 or natively over Ethernet? If traceroute >>>>>>>>>> is not supported >>>>>>>>>> or not specified for those data planes then perhaps this should >>>>>>>>>> be called >>>>>>>>>> out in the abstract and introduction sections. This is related to >>>>>>>>>> discuss-7. >>>>>>>>>> >>>>>>>>>> <v18> IPv6 is covered. I am still trying to understand (for my >>>>>>>>>> own learning) how >>>>>>>>>> this works for natively over Ethernet. >>>>>>>>>> >>>>>>>>> >>>>>>>> KT> This one seems to have been missed. This is related to discuss-7 >>>>>>>> >>>>>>> GIM2>> I'm confused about the applicability of "natively over >>>>>>> Ethernet" in the BIER layer. Of course, IPv6 or MPLS are encapsulated in >>>>>>> Ethernet, but, to the best of my knowledge, BIER in Ethernet encapsulation >>>>>>> has not been specified. Am I missing something here? >>>>>>> >>>>>> >>>>>> KT2> Please see >>>>>> https://www.rfc-editor.org/rfc/rfc8296.html#section-2.2 and >>>>>> https://www.rfc-editor.org/rfc/rfc8296.html#section-5 for Ethernet. >>>>>> Am I mistaken? >>>>>> >>>>> GIM3>> As I understand it, TTL value in the BIER header is present >>>>> whether BIER packet is encapsulated in MPLS, IPv6, or Ethernet. Would >>>>> removing reference to BIER-MPLS label address your concern? >>>>> >>>>>> >>>>>> Thanks, >>>>>> Ketan >>>>>> >>>>>> >>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> >>>>>>>>>> 1036 5.2. BIER OAM Parameters >>>>>>>>>> >>>>>>>>>> 1038 IANA is requested to create and maintain the "BIER OAM >>>>>>>>>> Parameters" >>>>>>>>>> 1039 registry containing the sub-registries listed below. >>>>>>>>>> >>>>>>>>>> <major> Why would this not be placed under the existing BIER >>>>>>>>>> Parameters >>>>>>>>>> registry-group? >>>>>>>>>> >>>>>>>>> GIM>> IANA expert reviewed and agreed with the proposed >>>>>>>>> heierachcy. >>>>>>>>> >>>>>>>> >>>>>>>> KT> Sure. However, this is not a question that IANA is expert on, >>>>>>>> but for the WG to decide. >>>>>>>> Let's consider this closed. >>>>>>>> >>>>>>> GIM2>> Thank you. >>>>>>> >>>>>>>> >>>>>>>> Thanks, >>>>>>>> Ketan >>>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>> >>>>>>>>>> <EoRv16> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> _______________________________________________ >>>> BIER mailing list -- bier@ietf.org >>>> To unsubscribe send an email to bier-leave@ietf.org >>>> >>>
- [Bier] Ketan Talaulikar's Discuss on draft-ietf-b… Ketan Talaulikar via Datatracker
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Greg Mirsky
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Ketan Talaulikar
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Greg Mirsky
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Ketan Talaulikar
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Greg Mirsky
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Greg Mirsky
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Ketan Talaulikar
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Tony Przygienda
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Greg Mirsky
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Tony Przygienda
- [Bier] Re: Ketan Talaulikar's Discuss on draft-ie… Greg Mirsky