Re: [Idr] AD Review of draft-ietf-idr-bgpls-srv6-ext-09

Ketan Talaulikar <ketant.ietf@gmail.com> Thu, 29 September 2022 19:30 UTC

Return-Path: <ketant.ietf@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7E27C14F735; Thu, 29 Sep 2022 12:30:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.104
X-Spam-Level:
X-Spam-Status: No, score=-1.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zqnUkmY7BCed; Thu, 29 Sep 2022 12:30:42 -0700 (PDT)
Received: from mail-vs1-xe34.google.com (mail-vs1-xe34.google.com [IPv6:2607:f8b0:4864:20::e34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF40FC14F733; Thu, 29 Sep 2022 12:30:42 -0700 (PDT)
Received: by mail-vs1-xe34.google.com with SMTP id j123so2657513vsc.3; Thu, 29 Sep 2022 12:30:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=2QOV8J6HoOuR2RC7Es2S7UR9jVu9G87ICEdru6xdigQ=; b=N8eJ/sKo4p82sG4MKE2zgsMFKQGrywupk84EBYOxwaLrrxKnoGTRvUmSBc06ATH9Ck agjKHPM47zgjJUTLZ1+pJzVX0z479BNPeUXJe3VdP9HU8WPYzedj/0I9JZejay1pPJWk qiHYul3bYdgKdCjsHLmTxyyQCsML/f9CDxfBweWyAlU2N7gl2LEF1lf9GXl0G0PFzgI2 E0iptEeBI/iaCJUY5xSv0Bsg3bwi/SURZsH6UFwRDHx8g17u8rxS/3ABnSCZUSXNgdD2 XceulrdAYAm2B2OiJqcvj0aPdi/c17tjGJjQlgjF8cqGyBVNk8QOheySU/RvipirnV4n w7fQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=2QOV8J6HoOuR2RC7Es2S7UR9jVu9G87ICEdru6xdigQ=; b=DX7i1GdYnMZ6tw4uV/gf8EQmjL8zvetg8HnFJszxdQsjusMPMKoVMRuv+leixdVOTL gscOy9L21w3E1zEIYviAVCq9k0HGs2OuXaDpJ9O7wF6iecwWZGGbpnQa3xI/04zdoD0b oYDKkZgf0IsMAUKnJKvMd8JkVuNm5kjQLxoTmlxsza5sZirdQ9y9zTMVucl2n4ycT2KJ Hh2FVtqlkTss2mvUZBwU9T5cSHf/HkDEZivIAcjs+8+OXg4thSBxMCqRkxCkjSOUsoHZ xWh7KF9F9b/SFaDygfA1V4D1lbJAXanpTFvDOKVh15iYkqco//oAFOc6rlLl3FkLCFPM kdOQ==
X-Gm-Message-State: ACrzQf13Q5AxAoo55IigL/cm6v+3BLTQ735N6E++u3Qur9miiOtXRLfP /niRsnkiB/GXS0AwL2rUoe4unZ+dJk4GGPkvDqM=
X-Google-Smtp-Source: AMsMyM6yUAWYS6woD8o8VONUIVf7dXSM9b+z4Q5ssbPewENZADNIR1EfEnK7JVGN4MGrAvEqvb7eWH+9K7IwD64JdPU=
X-Received: by 2002:a67:c119:0:b0:398:3a4d:b920 with SMTP id d25-20020a67c119000000b003983a4db920mr2660278vsj.64.1664479841219; Thu, 29 Sep 2022 12:30:41 -0700 (PDT)
MIME-Version: 1.0
References: <CAMMESsyFfYF9ZyUKuOM1DQmTPS=DnaN2-rymPvOkxG1OeA=oGQ@mail.gmail.com>
In-Reply-To: <CAMMESsyFfYF9ZyUKuOM1DQmTPS=DnaN2-rymPvOkxG1OeA=oGQ@mail.gmail.com>
From: Ketan Talaulikar <ketant.ietf@gmail.com>
Date: Fri, 30 Sep 2022 01:00:29 +0530
Message-ID: <CAH6gdPxhX13hGkVO_8YyZWJ76m8-bqoOetwOcXK2S_UDDyY_nQ@mail.gmail.com>
To: Alvaro Retana <aretana.ietf@gmail.com>
Cc: Susan Hares <shares@ndzh.com>, idr-chairs@ietf.org, "idr@ietf. org" <idr@ietf.org>, draft-ietf-idr-bgpls-srv6-ext@ietf.org
Content-Type: multipart/alternative; boundary="000000000000abf88f05e9d5e998"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/TBuHNAmP-P8hRxOwJosrc94s-Rw>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgpls-srv6-ext-09
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Sep 2022 19:30:47 -0000

Hi Alvaro,

Thanks for your detailed review and comments/suggestions. Please check
inline below for responses.

We have also posted an update on the lines of the discussion below:
https://datatracker.ietf.org/doc/html/draft-ietf-idr-bgpls-srv6-ext-10


On Mon, Sep 26, 2022 at 6:51 PM Alvaro Retana <aretana.ietf@gmail.com>
wrote:

> [Resending to include the Shepherd, Chairs, and WG.]
>
> On September 26, 2022 at 8:00:05 AM, Alvaro Retana (aretana.ietf@gmail.com)
> wrote:
>
>
>
> Dear authors:
>
> Thank you for this work!  Please see my comments on it below.
>
> My main concern with this draft is that BGP-LS carries information from
> other routing protocols, but there are a significant number of cases where
> the place from where the information is derived is not specified.
>
>
> To the Chairs:  6 authors are listed on the front page.  Please provide a
> justification for having more than 5.
>
>
> Thanks!
>
> Alvaro.
>
>
> [Line numbers from idnits.]
>
> ...
> 98 1.  Introduction
> ...
> 108   An SRv6-capable node N maintains all the SRv6 segments explicitly
> 109   instantiated at node N.
>
> [minor] The mention of "node N" twice makes this sentence sound awkward.
>
> Suggestion>
>
>    An SRv6-capable node maintains all the SRv6 segments explicitly
>    instantiated locally.
>
> KT> Ack


>
>
>
>
> ...
> 147 2.  BGP-LS Extensions for SRv6
> ...
> 153   When the BGP-LS router is advertising topology information that it
> 154   sources from the underlying link-state routing protocol (as
> described
> 155   in [RFC7752]), then it maps the corresponding SRv6 information from
> 156   the SRv6 extensions for IS-IS [I-D.ietf-lsr-isis-srv6-extensions]
> and
> 157   OSPFv3 [I-D.ietf-lsr-ospfv3-srv6-extensions] protocols to their BGP-
> 158   LS TLVs/sub-TLVs for all SRv6 capable nodes in that routing protocol
> 159   domain.  When the BGP-LS router is advertising topology information
> 160   from the BGP routing protocol (e.g., for EPE as described in
> 161   [RFC9086]), then it advertises the SRv6 information from the local
> 162   node alone.
>
> [] "BGP-LS router is advertising topology information that it sources from
> the underlying link-state routing protocol (as described in [RFC7752])"
>
> Some text could be saved by referencing the rfc7752bis terminology and
> using BGP-LS Producer in this case.  I don't want to hold publication of
> this document on the publication of rfc7752bis, but if the base spec update
> is published first, we should come back and revise some of the language and
> the references.
>
> KT> Sure. We can update this and perhaps other BGP-LS documents that end
up getting published after RFC7752bis.


>
>
>
> [nit] s/When the BGP-LS router is advertising/When a BGP-LS router
> advertises/g
>
> KT> Ack


>
>
>
> [nit] "(e.g., for EPE as described in [RFC9086]), then it advertises the
> SRv6 information"
>
> rfc9086 (as explained in this document) is for SR-MPLS, so using it as an
> example for SRv6 seems confusing.
>
> KT> RFC9086 is the reference that we have for originating information from
the BGP protocol for the EPE use-case. Are you suggesting that we remove
that reference from this sentence?

>
>
>
>
> ...
> 173   o  Algorithm support for SRv6 is advertised via the SR Algorithm TLV
> 174      specified in [RFC9085].
>
> [major] s/SR Algorithm TLV/SR-Algorithm TLV
>
> KT> Ack

>
>
>
>
> ...
> 224 3.  SRv6 Node Attributes
>
> 226   SRv6 attributes of a node are advertised using the BGP-LS Attribute
> 227   TLVs defined in this section and associated with the BGP-LS Node
> 228   NLRI.
>
> [nit] s/SRv6 attributes/The SRv6 attributes
>
> KT> Ack

>
>
>
> 230 3.1.  SRv6 Capabilities TLV
>
> 232   This BGP-LS Attribute TLV is used to announce the SRv6 capabilities
> 233   of the node along with the BGP-LS Node NLRI and indicates the SRv6
> 234   support by the node.  A single instance of this TLV MUST be included
> 235   in the BGP-LS attribute for each SRv6 capable node.  This TLV maps
> 236   from the SRv6 Capabilities sub-TLV
> 237   [I-D.ietf-lsr-isis-srv6-extensions] and the SRv6 Capabilities TLV
> 238   [I-D.ietf-lsr-ospfv3-srv6-extensions] of the IS-IS and OSPFv3
> 239   protocol SRv6 extensions respectively.  Any sub-TLVs introduced by
> 240   future documents for IS-IS and OSPFv3 SRv6 Capabilities are REQUIRED
> 241   to be introduced as top-level TLVs in BGP-LS in the future.
>
> [minor] "This TLV maps from the SRv6 Capabilities sub-TLV
> [I-D.ietf-lsr-isis-srv6-extensions] and the SRv6 Capabilities TLV
> [I-D.ietf-lsr-ospfv3-srv6-extensions] of the IS-IS and OSPFv3 protocol SRv6
> extensions respectively."
>
> This sentence is redundant with the specification of the TLV below, where
> the source of the information is repeated.
>
> KT> Agree. Please also see the next response.

>
>
>
> [major] "Any sub-TLVs introduced by future documents for IS-IS and OSPFv3
> SRv6 Capabilities are REQUIRED to be introduced as top-level TLVs in BGP-LS
> in the future."
>
> I don't feel comfortable requiring this action since we don't know what
> the contents of such extensions might be.  Also, there's no background as
> to the reasoning.
>
> Suggestion (in a separate paragraph)>
>
>    The SRv6 Capabilities sub-TLV and the SRv6 Capabilities TLV in IS-IS
>    and OSPFv3, respectively, are specified with the ability to carry
>    optional sub-sub-TLVs/sub-TLVs.  However, no such extensions are
>    currently defined.  Moreover, the SRv6 Capabilities TLV defined below
>    is not extensible.  As a result, it is expected that any extensions
>    will be introduced as top-level TLVs in the BGP-LS Attribute.
>
> KT> Thanks for the suggestion and we've incorporated it with minor tweaks.

>
>
>
>
> ...
> 259   o  Flags: 2 octet field.  The flags are derived from the SRv6
> 260      Capabilities sub-TLV/TLV of IS-IS (section 2 of
> 261      [I-D.ietf-lsr-isis-srv6-extensions]) and OSPFv3 (section 2 of
> 262      [I-D.ietf-lsr-ospfv3-srv6-extensions]).
>
> [nit] Even though I doubt that the Section numbers will change, I find it
> less error-prone to simply mention the document name.
>
> KT> Given the dependencies, this document will either follow or get
published alongside the IGP specs and so we will take care to review and
update the section numbers (if necessary). I have received feedback in the
past that reference to section numbers would be helpful.

>
>
>
>
> ...
> 266 3.2.  SRv6 Node MSD Types
>
> [minor] s/MSD Types/MSD-Types/g
> That is the terminology from rfc8814.
>
> KT> Ack

>
>
>
> 268   The Node MSD TLV [RFC8814] of the BGP-LS Attribute of the Node NLRI
> 269   is also used to advertise the limits and the Segment Routing Header
> 270   (SRH) [RFC8754] operations supported by the SRv6 capable node.  The
> 271   SRv6 MSD Types specified in section 4 of
> 272   [I-D.ietf-lsr-isis-srv6-extensions] are also used with the BGP-LS
> 273   Node MSD TLV as these codepoints are shared between IS-IS, OSPF and
> 274   BGP-LS protocols.  The description and semantics of these new MSD
> 275   types for BGP-LS are identical as specified in
> 276   [I-D.ietf-lsr-isis-srv6-extensions].
>
> 278   Each MSD type is encoded as a one-octet type followed by a one-octet
> 279   value as specified in [RFC8814].
>
> [major] In the context of this document it doesn't matter what MSD is,
> what the MSD-Types are, or where they are defined.  What matters is where
> does the information to be put in the Node MSD TLV (rfc8814) come from.
>
> Instead of the text in this section, please be explicit about the origin
> of the information and the BGP-LS TLV used: "The Node MSD TLV (rfc8814) is
> used...the MSD-Type and MSD-Value fields are derived from ...".
>
> KT> This is already covered in RFC8814 and so we were just referring to it
as opposed to repeating the IGP TLV names. Clarified the text a bit to make
this more explicit.

>
>
>
>
> ...
> 287 4.1.  SRv6 End.X SID TLV
>
> 289   The SRv6 End.X SID TLV is used to advertise the SRv6 SIDs associated
> 290   with an IGP Adjacency SID behavior that correspond to a point-to-
> 291   point or point-to-multipoint link or adjacency of the node running
> 292   IS-IS and OSPFv3 protocols.  This TLV can also be used to advertise
> 293   the SRv6 SID corresponding to the underlying layer-2 member links
> for
> 294   a layer-3 bundle interface as a sub-TLV of the L2 Bundle Member
> 295   Attribute TLV [RFC9085].  The SRv6 SID for the IGP adjacency using
> 296   the End.X behaviors (viz.  End.X, End.X with Penultimate Segment Pop
> 297   of the SRH (PSP), End.X with Ultimate Segment Pop of the SRH (USP),
> 298   and End.X with PSP & USP) [RFC8986] are advertised using the SRv6
> 299   End.X SID TLV.
>
> [nit] s/running IS-IS and OSPFv3 protocols/running the IS-IS or OSPFv3
> protocol
>
> KT> Ack

>
>
>
> [nit] s/(viz.  End.X/(viz. End.X/g
>
> KT> The extra space seems to be introduced by the text rendering of the
xml2rfc ...

>
>
>
> 301   This TLV is also used by BGP-LS to advertise the BGP EPE Peer
> 302   Adjacency SID for SRv6 on the same lines as specified for SR-MPLS in
> 303   [RFC9086].  The SRv6 SID for the BGP Peer Adjacency using End.X
> 304   behaviors (viz.  End.X, End.X with PSP, End.X with USP, and End.X
> 305   with PSP & USP) [RFC8986] indicates the cross-connect to a specific
> 306   layer-3 link to the specific BGP session peer (neighbor).
>
> [?] "... on the same lines as specified for SR-MPLS in [RFC9086]."
>
> Is this statement intended to have normative (or other) value?  For
> example, rfc9086 says that the PeerAdj SID can be included more than once,
> but there's no mention of anything related here.
>
> KT> Yes, this can also be included more than once. Made that explicit.

>
>
>
> 308   The TLV has the following format:
>
> 310     0                   1                   2                   3
> 311     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> 312    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 313    |               Type            |          Length               |
> 314    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 315    |        Endpoint Behavior      |      Flags    |   Algorithm   |
> 316    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 317    |     Weight    |   Reserved    |  SID (16 octets) ...          |
> 318    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 319    |    SID (cont ...)                                             |
> 320    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 321    |    SID (cont ...)                                             |
> 322    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 323    |    SID (cont ...)                                             |
> 324    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 325    |    SID (cont ...)             | Sub-TLVs (variable) . . .
> 326    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
> 328                      Figure 2: SRv6 End.X TLV Format
>
> 330   Where:
>
> 332      Type: 1106
> 333      Length: variable
>
> 335      Endpoint Behavior: 2 octet field.  The Endpoint Behavior code
> 336      point for this SRv6 SID as defined in section 10.2 of [RFC8986].
>
> [major] All the information in this TLV comes from the corresponding TLVs
> in IS-IS/OSPF -- so please indicate where the information comes from.  That
> is more important than what the information is.  Also, despite the name and
> the explanation above, the "End.X behaviors (viz.  End.X, End.X with PSP,
> End.X with USP, and End.X with PSP & USP)" are not the only Endpoint
> Behaviors allowed in the IGP drafts.
>
> KT> Ack. Fixed.

>
>
>
> 338      Flags: 1 octet of flags.  The flags are derived from the SRv6
> 339      End.X SID sub-TLV/TLV of IS-IS (section 8.1 of
> 340      [I-D.ietf-lsr-isis-srv6-extensions]) and OSPFv3 (section 8.1 of
> 341      [I-D.ietf-lsr-ospfv3-srv6-extensions]).  In the case of BGP EPE
> 342      Peer Adjacency SID, the flags are as defined for the SRv6 BGP
> Peer
> 343      Node SID TLV (Section 7.2).
>
> [minor] "section 8.1 of [I-D.ietf-lsr-ospfv3-srv6-extensions]"
>
> That section doesn't exist.  See my comment above about section numbers.
>
> KT> Fixed.

>
>
>
> [major] "In the case of BGP EPE Peer Adjacency SID, the flags are as
> defined for the SRv6 BGP Peer Node SID TLV (Section 7.2)."
>
> I guess that this means that the flags are defined in §7.2 -- not just for
> the SRv6 BGP Peer Node SID TLV, but for this one too, right?
>
> KT> Correct.

>
>
>
> 345      Algorithm: 1 octet field.  Algorithm associated with the SID.
> 346      Algorithm values are defined in the IANA IGP Algorithm Type
> 347      registry (https://www.iana.org/assignments/igp-parameters/igp-
> 348      parameters.xhtml).
>
> [major] As above, the information comes from the IGP drafts...the registry
> doesn't matter.
>
> KT> Ack. Removed the reference to the registry.

>
>
>
> 350      Weight: 1 octet field.  The value represents the weight of the
> SID
> 351      for the purpose of load balancing.  The use of the weight is
> 352      defined in [RFC8402].
>
> [major] As above, the information comes from the IGP drafts...what it is
> or how it may be used is inherited from there...
>
> KT> True, but the weights are also applicable for BGP EPE and hence good
to put a reference here.

>
>
>
> 354      Reserved: 1 octet field that MUST be set to 0 and ignored on
> 355      receipt.
>
> 357      SID: 16 octet field.  This field encodes the advertised SRv6 SID
> 358      as 128 bit value.
>
> [major] ...and comes from the IGP drafts...
>
> KT> This is also used for BGP-EPE.

>
>
>
> 360      Sub-TLVs : They are allocated from the IANA "BGP-LS Node
> 361      Descriptor, Link Descriptor, Prefix Descriptor, and Attribute
> 362      TLVs" registry and are used to advertise sub-TLVs that provide
> 363      additional attributes for the specific SRv6 SID.  This document
> 364      defines one inSection 8.
>
> [major] Again, the information should come from corresponding IGP
> sub-TLVs, not just any TLV in the registry.  The TLV in §8 is "inherited"
> from the IGP drafts.
>
> KT> Updated the text.

>
>
>
> [nit] s/inSection 8/in Section 8
>
> KT> Ack.

>
>
>
> 366 4.2.  SRv6 LAN End.X SID TLV
>
> [] Most of the comments from the last section apply here too.
>
> KT> Ack

>
>
>
> ...
> 433   o  Neighbor ID : 6 octets of IS-IS System ID of the neighbor for the
> 434      IS-IS SRv6 LAN End.X SID TLV and 4 octets of OSPFv3 Router-id of
> 435      the neighbor for the OSPFv3 SRv6 LAN End.X SID TLV.
>
> [major] s/IS-IS System ID of the neighbor for/Neighbor System-ID in
>
> KT> Ack

>
>
>
> [major] s/OSPFv3 Router-id of the neighbor/
>
> It looks like draft-ietf-lsr-ospfv3-srv6-extensions-08 hasn't settled on a
> name yet.  Figure 8 says "OSPFv3 Router-ID of neighbor" while the
> description calls it "Neighbor ID".
>
> KT> I hold the pen on the OSPFv3 SRv6 draft and will change the field name
to Neighbor Router-ID to be consistent. Updated the text here accordingly.

>
>
>
>
> ...
> 446 4.3.  SRv6 Link MSD Types
>
> 448   The Link MSD TLV [RFC8814] of the BGP-LS Attribute of the Link NLRI
> 449   is also used to advertise the limits and the SRH operations
> supported
> 450   on the specific link by the SRv6 capable node.  The SRv6 MSD Types
> 451   specified in section 4 of[I-D.ietf-lsr-isis-srv6-extensions] are
> also
> 452   used with the BGP-LS Link MSD TLV as these codepoints are shared
> 453   between IS-IS, OSPF, and BGP-LS protocols.  The description and
> 454   semantics of these new MSD types for BGP-LS are identical as
> 455   specified in [I-D.ietf-lsr-isis-srv6-extensions].
>
> 457   Each MSD type is encoded as a one-octet type followed by a one-octet
> 458   value as specified in [RFC8814].
>
> [major] See the comment in §3.2.
>
> KT> Ack - fixed on the same lines as in section 3.2

>
>
>
>
> ...
> 466 5.1.  SRv6 Locator TLV
>
> [] Some of the comments from §4.1 about where the values are derived apply
> here as well.
>
> KT> Ack - Fixed.

>
>
>
>
> ...
> 471   A node is provisioned with one or more locators supported by that
> 472   node.  Locators are covering prefixes for the set of SIDs
> provisioned
> 473   on that node.  These Locators are advertised as BGP-LS Prefix NLRI
> 474   objects along with the SRv6 Locator TLV in its BGP-LS Attribute.
>
> [minor] s/locators/Locators/g
>
> Most of this document capitalize the term.
>
> KT> Ack

>
>
>
> 476   The IPv6 Prefix matching the Locator MAY be also advertised as a
> 477   prefix reachability by the underlying routing protocol.  In this
> 478   case, the Prefix NLRI would be also associated with the Prefix
> Metric
> 479   TLV that carries the routing metric for this prefix.  When the
> 480   Locator prefix is not being advertised as a prefix reachability,
> then
> 481   the Prefix NLRI would have the SRv6 Locator TLV associated with it
> 482   but no Prefix Metric TLV.  In the absence of Prefix Metric TLV, the
> 483   consumer of the BGP-LS topology information MUST NOT interpret the
> 484   Locator prefix as a prefix reachability routing advertisement in the
> 485   IGPs default SPF computation.
>
> [major] "IPv6 Prefix...MAY be also advertised...by the underlying routing
> protocol"
>
> This is not a Normative statement (on the IGPs!), just a statement of
> fact. s/MAY/may
>
> KT> Ack

>
>
>
> [major] Add a reference to where the Prefix Metric TLV is specified
> (rfc7752 ?).
>
> KT> Ack

>
>
>
> [nit] s/advertised as a prefix reachability/advertised as prefix
> reachability
>
> KT> Ack

>
>
>
> [major] "consumer...MUST NOT interpret"
>
> No instructions for the consumer.
>
> KT> Fixed the text.

>
>
>
>
> ...
> 522      Metric: 4 octet field.  The value of the metric for the Locator.
>
> [major] Where does this value come from?
>
> KT> Added reference to the underlying IGP specs.

>
>
>
>
> ...
> 530 6.  SRv6 SID NLRI
>
> 532   SRv6 SID information is advertised in BGP UPDATE messages using the
> 533   MP_REACH_NLRI and MP_UNREACH_NLRI attributes [RFC4760].  The "Link-
> 534   State NLRI" defined in [RFC7752] is extended to carry the SRv6 SID
> 535   information.
>
> [] The first sentence is not technically wrong, but it is confusing.  The
> new SRv6 SID NLRI is in fact carried in the MP_* attributes, but it is an
> extension of the specification in rfc7752.  IOW, it is not needed as the
> information is already present in rfc7752.
>
> KT> Ack. Removed.

>
>
>
> 537   A new "Link-State NLRI Type" is defined for SRv6 SID information as
> 538   following:
>
> [nit] s/as following/as follows
>
> KT> Ack

>
>
>
>
> ...
> 561   o  Protocol-ID: 1 octet field that specifies the protocol component
> 562      through which BGP-LS learns the SRv6 SIDs of the node.  The
> BGP-LS
> 563      Protocol-ID registry was created by [RFC7752] and then additional
> 564      assignments were made for other BGP-LS extensions.
>
> [minor] No need for the history:
>
> Suggestion>
>    Protocol-ID: 1 octet field that specifies the information source
> protocol
>    [RFC7752].
>
> KT> Ack

>
>
>
>
> ...
> 568   o  Local Node Descriptors TLV: as defined in [RFC7752] for IGPs,
> 569      local and static configuration and as defined in [RFC9086] for
> BGP
> 570      protocol.
>
> [minor] What is it?
>
> Suggestion>
>    Local Node Descriptors: set of Node Descriptor TLVs for the local
>    node, as defined in [RFC7752] and [RFC9086].
>
> KT> Ack

>
>
>
>
> 572   o  SRv6 SID Descriptors: MUST include a single SRv6 SID Information
> 573      TLV defined in Section 6.1 and optionally MAY include the Multi-
> 574      Topology Identifier TLV as defined in [RFC7752].
>
> [major] Ok, but what is it?  Also, "optionally MAY" is redundant.
>
> Suggestion>
>    SRv6 SID Descriptors: set of SRv6 SID Descriptor TLVs.  This field
>    MUST contain a single SRv6 SID Information TLV (Section 6.1) and
>    MAY contain the Multi-Topology Identifier TLV [RFC7752].
>
> KT> Ack

>
>
>
> [major] Are those the only 2 TLVs expected here?
>
> KT> Yes

>
>
>
> 576   New TLVs for advertisement within the BGP Link State Attribute
> 577   [RFC7752] are defined in Section 7 to carry the attributes of an
> SRv6
> 578   SID.
>
> [minor] s/BGP Link State Attribute/BGP-LS Attribute
>
> KT> Ack

>
>
>
> 580 6.1.  SRv6 SID Information TLV
> ...
> 608      SID: 16 octet field.  This field encodes the advertised SRv6 SID
> 609      as 128 bit value.
>
> [major] Where is this information derived from?
>
> KT> Updated text.

>
>
>
>
> ...
> 616 7.1.  SRv6 Endpoint Behavior TLV
> ...
> 643      Endpoint Behavior: 2 octet field.  The Endpoint Behavior code
> 644      point for this SRv6 SID as defined in section 10.2 of [RFC8986].
>
> [major] Where is this information derived from?
>
> KT> Updated the text.

>
>
>
>
> ...
> 649      Algorithm: 1 octet field.  Algorithm associated with the SID.
> 650      Algorithm values are defined in the IGP Algorithm Type registry
> 651      (https://www.iana.org/assignments/igp-parameters/igp-
> 652      parameters.xhtml).
>
> [major] Where is this information derived from?
>
> KT> Updated the text.

>
>
>
> 654 7.2.  SRv6 BGP Peer Node SID TLV
>
> 656   The BGP Peer Node SID and Peer Set SID for SR-MPLS are specified in
> 657   [RFC9086].  Similar Peer Node and Peer Set functionality can be
> 658   realized with SRv6 using SIDs with END.X behavior.  The SRv6 BGP
> Peer
> 659   Node SID TLV is a mandatory TLV for use in the BGP-LS Attribute for
> 660   an SRv6 SID NLRI advertised by BGP for the EPE functionality.  This
> 661   TLV MUST be included along with SRv6 SIDs that are associated with
> 662   the BGP Peer Node or Peer Set functionality.
>
> [major] s/BGP Peer Node SID and Peer Set SID/BGP PeerNode and PeerSet SIDs
>
> KT> Ack

>
>
>
> ...
> 686   o  Flags: 1 octet of flags with the following definition (also refer
> 687      to Section 9.3 for IANA registry):
>
> [minor] No need to refer to the registry here.
>
> KT> Ack - reference removed.

>
>
>
> 689     0 1 2 3 4 5 6 7
> 690    +-+-+-+-+-+-+-+-+
> 691    |B|S|P| Reserved|
> 692    +-+-+-+-+-+-+-+-+
>
> [minor] Remove "Reserved".
>
> KT> Ack

>
>
>
> 694                  Figure 9: SRv6 BGP EPE SID Flags Format
>
> 696      *  B-Flag: Backup Flag.  If set, the SID is eligible for
> 697         protection (e.g. using IPFRR) as described in [RFC8355].
>
> 699      *  S-Flag: Set Flag.  When set, the S-Flag indicates that the SID
> 700         refers to a set of BGP peering sessions (i.e.  BGP Peer Set
> SID
> 701         functionality) and therefore MAY be assigned to one or more
> 702         End.X SIDs associated with BGP peer sessions.
>
> [nit] s/(i.e.  BGP/(i.e. BGP
>
> KT> space introduced during text rendering from xml2rfc

>
>
>
> [major] "MAY be assigned"
>
> Who?  How?  Is this related to the End.X SID TLVs defined earlier?
>
> KT> This is related to the provisioning of BGP EPE PeerSet SID - the same
SID is shared across the peers in the set. The traffic sent to that SID
would therefore get load-balanced over to those peers. This is per RFC8402.

>
>
>
> 704      *  P-Flag: Persistent Flag: When set, the P-Flag indicates that
> 705         the SID is persistently allocated, i.e., the value remains
> 706         consistent across router restart and/or session flap.
>
> [major] Where are these flags derived from?
>
> KT> From the BGP EPE configuration. Same as in RFC9086.

>
>
>
>
> ...
> 711   o  Weight: 1 octet field.  The value represents the weight of the
> SID
> 712      for the purpose of load balancing.  The use of the weight is
> 713      defined in [RFC8402].
>
> [major] Where is this value derived from?
>
> KT>  From the BGP EPE configuration. Same as in RFC9086.

>
>
>
>
> ...
> 718   o  Peer AS Number : 4 octets of BGP AS number of the peer router.
>
> [major] Where is this value derived from?
>
> KT> From the BGP EPE configuration. Same as in RFC9086.

>
>
>
> 720   o  Peer BGP Identifier : 4 octets of the BGP Identifier (BGP Router-
> 721      ID) of the peer router.
>
> [major] Where is this value derived from?
>
> KT> From the BGP EPE configuration. Same as in RFC9086.

>
>
>
> 723   For an SRv6 BGP EPE Peer Node SID, one instance of this TLV is
> 724   associated with the SRv6 SID.  For SRv6 BGP EPE Peer Set SID,
> 725   multiple instances of this TLV (one for each peer in the "peer set")
> 726   are associated with the SRv6 SID and the S (set/group) flag is SET.
>
> [minor] s/S (set/group) flag is SET/S-Flag is set
>
> KT> Ack.

>
>
>
> [?] My take-away from this paragraph is that if multiple TLVs are present
> then they should all have the S-Flag set.  And if there's only one instance
> then it shouldn't.  ??
>
> KT> S-flag needs to be set when there are multiple instances of this TLV
(i.e. this SID is pointing to multiple peers). However, S-flag may also be
set when there is a single instance (i.e., a set of one).

>
>
>
> 728 8.  SRv6 SID Structure TLV
>
> 730   The SRv6 SID Structure TLV is used to advertise the length of each
> 731   individual part of the SRv6 SID as defined in [RFC8986].  It is an
> 732   optional TLV for use in the BGP-LS Attribute for an SRv6 SID NLRI
> and
> 733   as a sub-TLV of the SRv6 End.X, IS-IS SRv6 LAN End.X and OSPFv3 SRv6
> 734   LAN End.X TLVs.  The TLV has the following format:
>
> [minor] s/SRv6 End.X, IS-IS SRv6 LAN End.X and OSPFv3 SRv6 LAN End.X
> TLVs/SRv6 End.X SID, IS-IS SRv6 LAN End.X SID, and OSPFv3 SRv6 LAN End.X
> SID TLVs
>
> KT> Ack

>
>
>
> 736     0                   1                   2                   3
> 737     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> 738    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 739    |               Type            |          Length               |
> 740    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 741    |    LB Length  |  LN Length    | Fun. Length   |  Arg. Length  |
> 742    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> ...
> 752      Locator Block Length: 1 octet field.  SRv6 SID Locator Block
> 753      length in bits.
>
> 755      Locator Node Length: 1 octet field.  SRv6 SID Locator Node length
> 756      in bits.
>
> 758      Function Length: 1 octet field.  SRv6 SID Function length in
> bits.
>
> 760      Argument Length: 1 octet field.  SRv6 SID Argument length in
> bits.
>
> [major] The names of these fields (as shown in the figure) are different
> from the ones used in the description.
>
> KT> Fixed.

>
>
>
> [major] Where is this information derived from?
>
> KT> Updated text.

>
>
>
> 762   The total of the locator block, locator node, function, and argument
> 763   lengths MUST be less than or equal to 128.
>
> [minor] s/total of the locator block, locator node, function, and argument
> lengths/sum of the LB Length, LN Length, Fun. Length and Arg. Length
>
> KT> Ack

>
>
>
> 765 9.  IANA Considerations
>
> 767   This document requests assigning code-points from the IANA "Border
> 768   Gateway Protocol - Link State (BGP-LS) Parameters" registry as
> 769   described in the sub-sections below.
>
> [nit] This is the only occurrence of "code-point"; most of the text uses
> "codepoint", but it seems to me that the correct form is "code point".
> Please be consistent.
>
> KT> Fixed as code point.

>
>
>
> 771 9.1.  BGP-LS NLRI-Types
>
> 773   The following codepoints are assigned by IANA via the early
> 774   allocation process from within the sub-registry called "BGP-LS NLRI-
> 775   Types":
>
> [nit] s/are assigned/have been assigned/g
>
> KT> Ack

>
>
>
>
> ...
> 808 9.3.  SRv6 BGP EPE SID Flags
>
> 810   This document requests the creation of a new registry called "SRv6
> 811   BGP EPE SID Flags" under the "Border Gateway Protocol - Link State
> 812   (BGP-LS) Parameters" registry.  The allocation policy of this
> 813   registry is "Standards Action" according to [RFC8126].
>
> 815   The following flags are defined:
>
> 817             Bit     Description                   Reference
> 818            ---------------------------------------------------
> 819               0     Backup Flag (B-Flag)        This document
> 820               1     Set Flag (S-Flag)           This document
> 821               2     Persistent Flag (P-Flag)    This document
> 822             3-7     Unassigned
>
> [minor] Missing figure/table number.
>
> KT> Fixed

>
>
>
> 824 10.  Manageability Considerations
> ...
> 841   A consumer of the BGP-LS information retrieves this information over
> 842   a BGP-LS session (refer Section 1 and 2 of [RFC7752]).  The handling
> 843   of semantic or content errors by the consumer would be dictated by
> 844   the nature of its application usage and hence is beyond the scope of
> 845   this document.
>
> [major] While the reference is to rfc7752, rfc7752bis makes it clear that
> the interface to the consumer is not necessarily a BGP session.  This
> paragraph is not needed.
>
> KT> Ack. Removed.

>
>
>
>
> ...
> 866   The extensions, specified in this document, do not introduce any new
> 867   configuration or monitoring aspects in BGP or BGP-LS other than as
> 868   discussed in [RFC7752].  The manageability aspects of the underlying
> 869   SRv6 features are covered by [I-D.ietf-spring-srv6-yang].
>
> [minor] I-D.ietf-spring-srv6-yang:  Not only is this draft expired, but it
> doesn't address the manageability of BGP-LS (or BGP), which is what is
> specified in this document.  Recommendation: remove the reference.
>
> KT> Looks like it was just refreshed. It does cover provisioning of End.X
SID and SID owner as BGP. It does not explicitly mention BGP-EPE though,
which perhaps it should. But it should cover some of the questions you
asked above on how the info is derived for BGP-EPE SRv6 SIDs.

>
>
>
> 871 11.  Security Considerations
> ...
> 882   The extensions introduced in this document are used to propagate IGP
> 883   defined information ([I-D.ietf-lsr-isis-srv6-extensions] and
> 884   [I-D.ietf-lsr-ospfv3-srv6-extensions]).  These extensions represent
> 885   the advertisement of SRv6 information associated with the IGP node,
> 886   link, and prefix.  The IGP instances originating these TLVs are
> 887   assumed to support all the required security and authentication
> 888   mechanisms (as described in [I-D.ietf-lsr-isis-srv6-extensions] and
> 889   [I-D.ietf-lsr-ospfv3-srv6-extensions]) in order to prevent any
> 890   security issue when propagating the information into BGP-LS
>
> < the rest got snipped for me - getting it from the mailer archive >

[major] A recent IESG comment objected to the "prevent any security issue"
claim -- let's take that part out:

s/...in order to prevent any security issue when propagating the
information into BGP-LS./.

KT> Ack.



...
896   BGP-LS SRv6 extensions enable traffic engineering use-cases within
897   the Segment Routing domain.  SR operates within a trusted domain
898   [RFC8402] and its security considerations also apply to BGP-LS
899   sessions when carrying SR information.  The SR traffic engineering
900   policies using the SIDs advertised via BGP-LS are expected to be used
901   entirely within this trusted SR domain (e.g., between multiple AS or
902   IGP domains within a single provider network).  Therefore, precaution
903   is necessary to ensure that the link-state information (including
904   SRv6 information) advertised via BGP-LS sessions is limited to
905   consumers in a secure manner within this trusted SR domain.  BGP
906   peering sessions for address-families other than Link-State may be
907   set up to routers outside the SR domain.  The isolation of BGP-LS
908   peering sessions is recommended to ensure that BGP-LS topology
909   information (including the newly added SR information) is not
910   advertised to an external BGP peering session outside the SR domain.

[] It would be nice to point to the updated Operational and Security
considerations in rfc7752bis.  To not delay publication, should the
recommendation at the end of this paragraph be Normative?

s/recommended/RECOMMENDED

KT> Sure. Will update the text.



...
949 14.1.  Normative References
...
983   [RFC8754]  Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J.,
984              Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header
985              (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020,
986              <https://www.rfc-editor.org/info/rfc8754>.

[minor] This reference can be Informative.

KT> Ack



...
1012 14.2.  Informative References
...
1031   [RFC8126]  Cotton, M., Leiba, B., and T. Narten, "Guidelines for
1032              Writing an IANA Considerations Section in RFCs", BCP 26,
1033              RFC 8126, DOI 10.17487/RFC8126, June 2017,
1034              <https://www.rfc-editor.org/info/rfc8126>.

[major] This reference should be Normative.

KT> Ack


1036   [RFC8355]  Filsfils, C., Ed., Previdi, S., Ed., Decraene, B., and R.
1037              Shakir, "Resiliency Use Cases in Source Packet Routing in
1038              Networking (SPRING) Networks", RFC 8355,
1039              DOI 10.17487/RFC8355, March 2018,
1040              <https://www.rfc-editor.org/info/rfc8355>.

[major] As used (§7.2) this reference should be Normative.  See my comment
there about the origin of the information.

KT> This is an informational RFC though ...


1042 Appendix A.  Differences with BGP-EPE for SR-MPLS

[minor] Please add a reference in the main text to this appendix so the
reader knows it is here.

KT> Ack

Thanks,

Ketan

[EoR -09]