Re: [Idr] I-D Action: draft-ietf-idr-segment-routing-te-policy-08.txt

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Wed, 20 November 2019 10:31 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F227120844 for <idr@ietfa.amsl.com>; Wed, 20 Nov 2019 02:31:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.498
X-Spam-Level:
X-Spam-Status: No, score=-14.498 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Sgfx9U8s; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gcLeym0v
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zlvfWXIPeqDA for <idr@ietfa.amsl.com>; Wed, 20 Nov 2019 02:31:11 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A47A11200D8 for <idr@ietf.org>; Wed, 20 Nov 2019 02:31:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=50290; q=dns/txt; s=iport; t=1574245871; x=1575455471; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=nRSFLEd5UA4muzDJepCs1/1F9hIXV43zfYVpyZ84UDg=; b=Sgfx9U8sd5RZGlipD7HMPoO9Z8SxLyaXLDQt1fIcL4wT3EldgcFIU0OQ X5aZ7ftBbzAT0j0eMVrtmgVVxbRqAAMJitxdxqDs2s+hMweIbRBPAoaTp l9CmJ4SjAt0sdTRX80JIFDAnT+oMoCyyVT8taeDpYPVQ/mgn61rxRqL8w 4=;
IronPort-PHdr: 9a23:ZnSJ0BN1PaNNzDoPXTIl6mtXPHoupqn0MwgJ65Eul7NJdOG58o//OFDEuKQ/l0fHCIPc7f8My/HbtaztQyQh2d6AqzhDFf4ETBoZkYMTlg0kDtSCDBj4IeLjaTASF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AfAACeFNVd/4oNJK1lGwEBAQEBAQEFAQEBEQEBAwMBAQGBagYBAQELAYEbLyQFJwVsWCAECyqEKoNGA4RahhGCXn+XAYEuFIEQA1QJAQEBDAEBGAEMCAIBAYRAAheCECQ0CQ4CAw0BAQQBAQECAQUEbYU3DIVRAQEBAQMBARARChMBASwLAQsEAgEIDgMEAQEhAQYDAgICJQsUCQgCBA4FCAwOgwGBeU0DLgEOpR4CgTiIYHWBMoJ+AQEFgTgCDkGDARiCFwmBNgGMFBiBQD+BEUaCFzU+gmIBAQIBARaBLwEZKwkIglIygiyQFYVIiUiPDQqCK4cahSaJKoI+c4Z2jgmBZJAJhneRVAIEAgQFAg4BAQWBPxM5N4EhcBUaIYJsCUcRFIZGgScBCYJChRSFP3SBKItNB4I5AQE
X-IronPort-AV: E=Sophos;i="5.69,221,1571702400"; d="scan'208,217";a="661824629"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Nov 2019 10:31:05 +0000
Received: from XCH-ALN-017.cisco.com (xch-aln-017.cisco.com [173.36.7.27]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id xAKAV2BK026606 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Nov 2019 10:31:03 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-017.cisco.com (173.36.7.27) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 20 Nov 2019 04:31:02 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 20 Nov 2019 04:31:01 -0600
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 20 Nov 2019 04:31:01 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Zt/m6R/mKhpi5hzfgWc44Bw5V71RNWT9PDPGIHicACKZsCFOygbxXpF/89y8TaKBgjY+6BP7RzbLrScGuiXcq+HrQv2R9YOVjMlaIkVUBR6gJtYD7xh5jwJStIERfytFWKSOBuLXtQMBs1L7XZdT7VGPWdfLpVDmIEgJ6N57aKjDSpPghupLA8MwjrYewA+EBN1NwtRBdehBiVg7rbnW9S3nTDMwpIQ/vBeK6P/CmIxVRfWkUlRz/4y9Sf3C32NKsMlmBkSb2j+5h8VF014zDYR03w+opAyPsNHlCr2VngZ0be+tbRlvH4v0bDOkQPvk+mzRnm7QnnAHMGfA/FsoIw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nRSFLEd5UA4muzDJepCs1/1F9hIXV43zfYVpyZ84UDg=; b=ag+Hu5RSFI4HLGf8uwAgD4VoB0U2V8WOu9YSg9YDbRIZ9J9k5m6jHncjTEfay7tdim6MM2SuWWkdpQqdqB4BfbIl0urooizUsGboTCNhzfW6rcBahWV6T9ChPJ92inbVublSgPuL9IdM/LFKsu8lv0sim3pS8Ual4Z9bVTrITbqdWF8kA2GZhRxjgtT2Z0PAYJG1M+whGmiALjzg/pRqKwFRXQLFSyXhPmSckAl6mfrDhoclBq/g1h8NB46xnF+cfWXBCUWpy2g5eMsGYcQgswq2YiZr+B6I0wsjKhK5qR32Ku+MLT9v7ZVO09euasJBMx298YLrgwMj+53nLhYAmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nRSFLEd5UA4muzDJepCs1/1F9hIXV43zfYVpyZ84UDg=; b=gcLeym0v4TcHAno2a6b7suecxvJ6kQ6gomN0Hro2xLhv8Hjr9q2n+79ybsSSsNcs34KtGw7kjMcm+XnDbKXp8UmNW8q4wSdy/xslja4nQ8U3HJCd8lQPl65g5LorE0gzP24Gi1LV0CNiWRvZMfHiiwoU8fdc0rmheWUIVLg1b6I=
Received: from CY4PR11MB1541.namprd11.prod.outlook.com (10.172.68.150) by CY4PR11MB0021.namprd11.prod.outlook.com (10.165.88.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2451.23; Wed, 20 Nov 2019 10:30:58 +0000
Received: from CY4PR11MB1541.namprd11.prod.outlook.com ([fe80::d3a:84a6:be65:e33f]) by CY4PR11MB1541.namprd11.prod.outlook.com ([fe80::d3a:84a6:be65:e33f%11]) with mapi id 15.20.2451.031; Wed, 20 Nov 2019 10:30:58 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Przemyslaw Krol <pkrol@google.com>
CC: Nandan Saha <nandan@arista.com>, "idr@ietf.org" <idr@ietf.org>, Prakash Badrinarayanan <prakash@arista.com>, Manoharan Sundaramoorthy <manoharan@arista.com>
Thread-Topic: [Idr] I-D Action: draft-ietf-idr-segment-routing-te-policy-08.txt
Thread-Index: AQHVnqIyRXgT11tsQk2IdX+1xczyjKeSIKDggACT7gCAAHQ9cIAAH7yAgABwpzA=
Date: Wed, 20 Nov 2019 10:30:58 +0000
Message-ID: <CY4PR11MB15416F87C7375B1073AACCF4C14F0@CY4PR11MB1541.namprd11.prod.outlook.com>
References: <157414471256.14003.6244444687150312939@ietfa.amsl.com> <CY4PR11MB1541D63781E529E2B2613F05C14C0@CY4PR11MB1541.namprd11.prod.outlook.com> <CAE+itjeJzygag3K4bA=KpDQgNie7shG8Z47YpMjfjMFF7aq=Tg@mail.gmail.com> <CY4PR11MB15414543EC96BB90BC1167D8C14C0@CY4PR11MB1541.namprd11.prod.outlook.com> <CACH2EkUjd6DDbD9m+rEsAzi+OL1+Q=Q0jEfhPej7d2N73wnL7Q@mail.gmail.com>
In-Reply-To: <CACH2EkUjd6DDbD9m+rEsAzi+OL1+Q=Q0jEfhPej7d2N73wnL7Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ketant@cisco.com;
x-originating-ip: [2001:420:c0d4:1002::1f]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1aa8cae3-0505-4c2f-da80-08d76da4bbad
x-ms-traffictypediagnostic: CY4PR11MB0021:
x-ms-exchange-purlcount: 8
x-microsoft-antispam-prvs: <CY4PR11MB0021E0B93A6E5E8F76DB3194C14F0@CY4PR11MB0021.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02272225C5
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(346002)(376002)(39860400002)(396003)(366004)(13464003)(189003)(199004)(53754006)(52084003)(8936002)(11346002)(446003)(52536014)(790700001)(66574012)(81166006)(81156014)(6116002)(8676002)(7696005)(606006)(14444005)(229853002)(256004)(66946007)(46003)(76116006)(66446008)(5660300002)(6916009)(14454004)(476003)(86362001)(55016002)(53546011)(478600001)(6506007)(6246003)(54896002)(71200400001)(74316002)(54906003)(71190400001)(66556008)(66476007)(64756008)(99286004)(7736002)(4326008)(76176011)(486006)(6306002)(102836004)(9686003)(236005)(6436002)(316002)(33656002)(25786009)(4001150100001)(2906002)(966005)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR11MB0021; H:CY4PR11MB1541.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: o24pRkDkyx8YqRTbIznAmyBVcL6sTamCJQ5u+ETwof2e62c7ToboyjJkcRPRMK1SedIHK/oChZ1i2xnCZX0Tui+2utpd7TmZb91Rq/HVWfj6+YS2y1N99mXxR4iU+EE/eQWWjcBx03QTgkwi4bcEYLzgU4p0s//wHwLQ5rL9ovGfJlYr8bC4MNKk3+16oPZluDT77GTqb9kjG/KDsEe5ST7J5c4vGE0k6YXL/b7dI53QLtFVGhKOxB+Sn3u50svEiVRcEQLP68KLrfPsNXVQxDmhtSsu8blltkmKk7O34HKzy+xJLh1DQBsm/O3pI/adw4ccw92ngPl75wH5RUPyax/PnyrSYD4ETKml6BG16i56V4JiAyNz3xvj+4vOHIfb4w8XAMwpqqpbFmBExsjrxUBi1pBhSivXlsouhXLA/koTyyUamKCV+ENaEMEFctKMFyRsclJBOmMhpZ6dTqLC87hhu299I4jOxpClZV/cs78=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CY4PR11MB15416F87C7375B1073AACCF4C14F0CY4PR11MB1541namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 1aa8cae3-0505-4c2f-da80-08d76da4bbad
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Nov 2019 10:30:58.4732 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wAcyaqkWUyxk9sQf0QNjzKsvghm4qCs1AJEt7EtvAJu9YXVOi7dmH2+f0n68P50QwdcdBZfRIhf34x5roqw12Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR11MB0021
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.27, xch-aln-017.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/HW3Aui7cDxZwjXWMxu8ke1FcRqI>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-segment-routing-te-policy-08.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Nov 2019 10:31:14 -0000

Hi PK,

Please check inline below for responses.

From: Przemyslaw Krol <pkrol@google.com>
Sent: 20 November 2019 09:36
To: Ketan Talaulikar (ketant) <ketant@cisco.com>
Cc: Nandan Saha <nandan@arista.com>; idr@ietf.org; Prakash Badrinarayanan <prakash@arista.com>; Manoharan Sundaramoorthy <manoharan@arista.com>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-segment-routing-te-policy-08.txt

Howdy Ketan,

Few nits:

2.2.  SR Policy and Tunnel Encapsulation Attribute

If more than one TLV of type "SR Policy"
   appears, the update is considered malformed and the "treat-as-
   withdraw" strategy of [RFC7606] is applied.

Given this version introduces an explicit error handling section (5.  Error Handling), would it be reasonable to delete this? I believe this has been done for other tlv/sub-tlvs already.
[KT] Ack


3.  Color Extended Community

two bits from the RESERVED field (as
 defined in [I-D.ietf-idr-tunnel-encaps]) is are used as follows
[KT] Ack

4.2.1. Acceptance of an SR Policy NLRI
This section explicitly requires either Route Target(s) or Community in order to consider policy valid:

The SR Policy update MUST have either the NO_ADVERTISE community
      or at least one route-target

and clearly states the behavior when both are missing (policy not accepted). Do you see a value in stating the behavior when both are present? Based on the above wording this would deem policy not acceptable and in consequence neither accepted locally not propagated down (must not accepted, not necessarily usable, in order to propagate as stated in the following section). Should it be clearly stated as erroneous condition?
[KT] By itself, the NO_ADVERTISE indicates that the update should not be propagated (in general). If an RT is present, then it has to match the local BGP router-id otherwise the SR Policy is not usable on the local router. So I am not sure if this would be an error condition. However, I agree that this combination has not been covered in the spec and we can look for further feedback from the WG before concluding on this.

4.2.4. Propagation of an SR Policy

It seems that the original wording was referring to just BGP when addressing the default propagation. In the current version, there is a distinction between EBGP (do not propagate) and IBGP (propagate). What is the reason for such distinction?
[KT] The reason to not propagate for EBGP is security reasons since SR Policy information should not be send over to a different administrative domain. Even though Sec 4.2.4 had a MAY for IBGP propagation, we had this text in the introduction Sec 1 which was contradictory and hence clarified.

BGP can then be used to
   propagate the SR Policies and candidate paths.  The usual BGP rules
   for BGP propagation and "bestpath selection" are used.


Additionally,

A BGP node advertises a received SR Policy NLRI to its IBGP neighbors
according to normal IBGP propagation rules.

this would imply that if a node receives an advertisement by IBGP it would not propagate it down via IBGP ("normal IBGP propagation rules"), is that correct? If so, this section really describes a case when a node receives SRTE policy via EBGP. Given the distinction between IBGP and EBGP introduced in this version, would it make sense to be more specific in this case as well?
[KT] BGP propagation rules are followed normally. The only special case is for EBGP due to the security reasons and this has been discussed in the Security Considerations section.

Thanks,
Ketan

thanks,
pk


On Wed, Nov 20, 2019 at 7:51 AM Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi Nandan,

When the acceptance criteria fails, the update is considered malformed and the TAW or AFI/SAFI disable or session reset would be the error handling based on what the specific error is as described in sec 5.

In Sec 4.2.1 we have the following text.

A router that receives an SR Policy update that is not valid
   according to these criteria MUST treat the update as malformed and
   the SR Policy candidate path MUST NOT be passed to the SRPM.

Then in the Sec 5 for error handling we specify the treatment for errors in the NLRI part, the Tunnel Encap Attribute (it’s existing TLVs) and then the new ones introduced in this document. E.g. for the TLV/sub-TLVs in the Tunnel Encap attribute (new and old)


In case of any error detected, either

   at the attribute or its TLV/sub-TLV level, the "treat-as-withdraw"

   strategy of [RFC7606<https://tools.ietf.org/html/rfc7606>] MUST be applied.

Hope that clarifies.

Thanks,
Ketan

From: Nandan Saha <nandan@arista.com<mailto:nandan@arista.com>>
Sent: 20 November 2019 00:47
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: idr@ietf.org<mailto:idr@ietf.org>; Prakash Badrinarayanan <prakash@arista.com<mailto:prakash@arista.com>>; Manoharan Sundaramoorthy <manoharan@arista.com<mailto:manoharan@arista.com>>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-segment-routing-te-policy-08.txt

Hi Ketan,
 Thank you for the updated version. I'm still reviewing it, but spotted something I wanted to quickly clarify.

ver-7 of section "4.2.1. Acceptance of an SR Policy NLRI" had text mandating RFC7606 TAW if acceptance criteria fail. In ver-8 this has been removed, and I can't quite tell what text in section "5 Error Handling" covers this? I'm assuming we still want to do TAW if acceptance criteria fail.
Please clarify.

Thanks,
Nandan


On Tue, Nov 19, 2019 at 1:39 PM Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi All,

This update of the draft is to get it ready for the WG to review towards WGLC .

The following is the high level overview of the changes:

1) Introduced Error Handling section where all these aspects have been consolidated.

2) Added the request for IANA registry for Color Extended Community reserved field. Changed the process to Specification Required and added DE guidelines since the flags and other space is too small for FCFS.

3) Added security consideration section.

4) Add the clarification for handling of route target during propagation as per the request and discussions on the mailer and also clarified the matching with BGP Router ID part.

5) Changed the segment type naming from numbers to alphabets to align with upcoming update in the draft-ietf-segment-routing-policy to remove confusion between the segment types and the protocol code-points as discussed on the Spring and IDR lists recently.

Besides this, there are other minor and editorial changes to prepare for WGLC.

We are also trying to capture all the implementation reports at the wiki below and would request WG members to help update the same as there are multiple shipping implementations of this specification:

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-segment-routing-te-policy%20implementations%20

Also note that the draft is on IDR agenda for presentation on Thu in Singapore.

Thanks,
Ketan (on behalf of co-authors)

-----Original Message-----
From: Idr <idr-bounces@ietf.org<mailto:idr-bounces@ietf.org>> On Behalf Of internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>
Sent: 19 November 2019 14:25
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: [Idr] I-D Action: draft-ietf-idr-segment-routing-te-policy-08.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Inter-Domain Routing WG of the IETF.

        Title           : Advertising Segment
    Routing Policies in BGP
        Authors         : Stefano Previdi
                          Clarence Filsfils
                          Ketan Talaulikar
                          Paul Mattes
                          Eric Rosen
                          Dhanendra Jain
                          Steven Lin
        Filename        : draft-ietf-idr-segment-routing-te-policy-08.txt
        Pages           : 38
        Date            : 2019-11-18

Abstract:
   This document defines a new BGP SAFI with a new NLRI in order to
   advertise a candidate path of a Segment Routing (SR) Policy.  An SR
   Policy is a set of candidate paths, each consisting of one or more
   segment lists.  The headend of an SR Policy may learn multiple
   candidate paths for an SR Policy.  Candidate paths may be learned via
   a number of different mechanisms, e.g., CLI, NetConf, PCEP, or BGP.
   This document specifies the way in which BGP may be used to
   distribute SR Policy candidate paths.  New sub-TLVs for the Tunnel
   Encapsulation Attribute are defined for signaling information about
   these candidate paths.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-idr-segment-routing-te-policy/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-idr-segment-routing-te-policy-08
https://datatracker.ietf.org/doc/html/draft-ietf-idr-segment-routing-te-policy-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-idr-segment-routing-te-policy-08


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org>.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr

_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr


--
Przemyslaw Gniewomir "PK" Krol |
  Network Engineer
ing | pkrol@google.com<mailto:pkrol@google.com>