[Idr] shepherd report for draft-ietf-idr-sr-p2mp-policy-00

Susan Hares <shares@ndzh.com> Tue, 03 September 2024 22:54 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8D8EC1E0D90 for <idr@ietfa.amsl.com>; Tue, 3 Sep 2024 15:54:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8092HI4PTAGx for <idr@ietfa.amsl.com>; Tue, 3 Sep 2024 15:54:34 -0700 (PDT)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2138.outbound.protection.outlook.com [40.107.220.138]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C027CC1CAE6D for <idr@ietf.org>; Tue, 3 Sep 2024 15:54:32 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=wCZxfQbP2Bh8dCZFAACSf0L+WF7OhXorXmY9HKe3ctaEZYk3co7lhYRNK6OuFRAvElnoEyo+54LoXllSPWazUyC82MH6EjJ+JjsX73Xubp45KwN2NK4ilQ0eNDp1RNAjjZQXlfxyw67qaPGRVoOj5aq1/7QrkDr+dxDK2cxGwWw4pr0KDBsQOaL11OrMzMnraHZCykBXa2y+UYkRePfayUuC7iKQnD1MVYrG2MC+KN0KMg/NrJSHy+ky5IuQIyAg/+APiQP4C2NjLW0MGzLVpTcNKw6sVLbp4JKoaMliFdK9+6sg18i/MVm8MuFDsrtappz4PWjf4gLY3JTvYFWchQ==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Epv8/hxIYA/i8icTTFEA5563shvbXK9840m1y0YmzUU=; b=sChUvI/dc6RCCJTsLuYG6VzLN+xAt2J6/3Qky4B7kRekiJo6ZrQE3rePkdqQPve96jBNdfwfaUnF6GEHB+hkngXCj9bWfcIej0lmPust0oHyzRi8IDMmQI4b0lHFFwbLxauvLZboZrHVngp9JwyjaqaHhL2SPnOSQanIEpN+KLdVDxgEq10GK+ND8VCdS+FFl+FTLug0xk4Uu80MpzVCLE67f5aCswUrgDqOnJ9LA/l08IEgoaLJJcBjE+TsnoKlmTMjAfI0hIBiCID0dy7uSlz63bFWnnyJ/8ZlhZG3ZlzvoFuWU02hejS6uPwu1a+1mZhsftOzOZmlj8O+Fv6knw==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 104.47.57.174) smtp.rcpttodomain=bell.ca smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=ndzh.com] dkim=[1,1,header.d=ndzh.com] dmarc=[1,1,header.from=ndzh.com])
Received: from DS7PR03CA0234.namprd03.prod.outlook.com (2603:10b6:5:3ba::29) by CH0PR08MB8615.namprd08.prod.outlook.com (2603:10b6:610:187::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.24; Tue, 3 Sep 2024 22:54:27 +0000
Received: from DS1PEPF0001709A.namprd05.prod.outlook.com (2603:10b6:5:3ba:cafe::6) by DS7PR03CA0234.outlook.office365.com (2603:10b6:5:3ba::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.27 via Frontend Transport; Tue, 3 Sep 2024 22:54:27 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.57.174) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.57.174 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.57.174; helo=NAM11-DM6-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (3.132.208.199) by DS1PEPF0001709A.mail.protection.outlook.com (10.167.18.104) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7918.13 via Frontend Transport; Tue, 3 Sep 2024 22:54:27 +0000
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2174.outbound.protection.outlook.com [104.47.57.174]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id 92081102316; Tue, 3 Sep 2024 22:54:26 +0000 (UTC)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=VvkkHiV0qUKlRkBOBboRAeD6xYlfwT9BmQua7RlDDy8v9mo0wLgdwEb2VZcIz83stnxX/wTT10TEEFh21vitOoRaUBxSwAkSp5r1iawt2RcYFzRk65ET7CNY6YoWJW3sSgwoVz2dFUVXtxxw18w7F1d82Vz8MKkcgV9knBOpAoLDS1y996azXPgG2rdtbnfmwo6dG/X4lRTV/sP7ySGO2vWno//eFBVjVhJ0xxMeogIGd6VvY2a1NqQcgJVHVmolNg63EaJJ0zyPIEmlLtqpXkqXo+Z0bZaKMUC84MM0XWS2oFBT5tPuJdk8Fc7hvJn2gDLgCuLdkk5v28ARy99/WQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Epv8/hxIYA/i8icTTFEA5563shvbXK9840m1y0YmzUU=; b=Xv47KF99RRUTLhOW/1UH/n7U+BC7doDQlGFWXc3jw9/4xJJ74mFOaZfciFnj+a5t+qgpr97K/XWdkgE5BSWiRqxxormYSTxDRIwiKdnHnntVOQkC7EHK98mJyxoOLvwoLxZAU9ObM72DEOrRA1H4lVk3FsB2/ckrr1msX4SUHxQ7PJaYBfRjkA1Cva3uH0pY74IKJxSDIh4KYYC45gg54UKfNRqImDqwTghM1nxmfPCukrAKO1FUICodggHBvOVBRu+F22onExjwFvsEQ8LzRAB5C6+MF9dZnorqkTYRKstaayG8RQYJI2INJHN2EV5YltKdkbVYISYsHeNeQW0lCQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ndzh.com; dmarc=pass action=none header.from=ndzh.com; dkim=pass header.d=ndzh.com; arc=none
Received: from CO1PR08MB6611.namprd08.prod.outlook.com (2603:10b6:303:98::12) by SJ0PR08MB7620.namprd08.prod.outlook.com (2603:10b6:a03:3f4::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.25; Tue, 3 Sep 2024 22:54:23 +0000
Received: from CO1PR08MB6611.namprd08.prod.outlook.com ([fe80::7744:8abd:9769:c2bf]) by CO1PR08MB6611.namprd08.prod.outlook.com ([fe80::7744:8abd:9769:c2bf%5]) with mapi id 15.20.7918.024; Tue, 3 Sep 2024 22:54:22 +0000
From: Susan Hares <shares@ndzh.com>
To: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: shepherd report for draft-ietf-idr-sr-p2mp-policy-00
Thread-Index: Adr+Uk4LviL59peFQx+tdElMEIr4xg==
Date: Tue, 03 Sep 2024 22:54:22 +0000
Message-ID: <CO1PR08MB661179AA6C3635786B865CE9B3932@CO1PR08MB6611.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ndzh.com;
x-ms-traffictypediagnostic: CO1PR08MB6611:EE_|SJ0PR08MB7620:EE_|DS1PEPF0001709A:EE_|CH0PR08MB8615:EE_
X-MS-Office365-Filtering-Correlation-Id: d5c300ee-6ca0-4a5e-5d9a-08dccc6b5d11
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230040|366016|1800799024|376014|38070700018;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR08MB6611.namprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(38070700018);DIR:OUT;SFP:1102;
Content-Type: multipart/alternative; boundary="_000_CO1PR08MB661179AA6C3635786B865CE9B3932CO1PR08MB6611namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR08MB7620
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.57.174];domain=NAM11-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.57.174];domain=NAM11-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DS1PEPF0001709A.namprd05.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: d4a50851-69d7-4836-2e9e-08dccc6b5a53
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|376014|82310400026|1800799024|35042699022;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:3.132.208.199;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM11-DM6-obe.outbound.protection.outlook.com;PTR:mail-dm6nam11lp2174.outbound.protection.outlook.com;CAT:NONE;SFS:(13230040)(36860700013)(376014)(82310400026)(1800799024)(35042699022);DIR:OUT;SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Sep 2024 22:54:27.3972 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d5c300ee-6ca0-4a5e-5d9a-08dccc6b5d11
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5;Ip=[3.132.208.199];Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0001709A.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR08MB8615
Message-ID-Hash: ANSVVTWXYBC77MCQECMUZVBYTPDX3J6G
X-Message-ID-Hash: ANSVVTWXYBC77MCQECMUZVBYTPDX3J6G
X-MailFrom: shares@ndzh.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-idr.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "Rishabh Parekh (riparekh)" <riparekh@cisco.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Idr] shepherd report for draft-ietf-idr-sr-p2mp-policy-00
List-Id: Inter-Domain Routing <idr.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/WKaz1MQDND6hc_EJPrpdZJzcM-c>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Owner: <mailto:idr-owner@ietf.org>
List-Post: <mailto:idr@ietf.org>
List-Subscribe: <mailto:idr-join@ietf.org>
List-Unsubscribe: <mailto:idr-leave@ietf.org>

Hooman, Daniel, Andrew, Rishabh, Serge, Swadesh, and Jeffrey:

Below I've attached my shepherd's review for draft-ietf-idr-wr-p2mp-policy-00.
Please let me know if you have any questions.

The IDR chairs are keeping a tighter review on BGP-LS and SR drafts in 2024-2025.
Since the IDR WG has reached WG consensus on many BGP-LS or SR base drafts,
the IDR chairs are actively working to schedule WG LCs for any BGP-LS or SR
drafts that have completed 2 implementations.


Would you answer a few questions?


  1.  I thought you were working on another version of this draft (-01).

What is the status of the next version?
      Are you still interested in continuing to work on this draft?


  1.  How is the implementation going for this draft?
  2.  Do you have any progress you'd like to report at the BGP-LS or SR meeting

on September 9th, 2024.

  1.  Do you need an early allocation of sub-TLV IDs or Tunnel types?


We have a challenge regarding the number space for Sub-TLVs for BGP Tunnel Encapsulation draft.
The assignments for sub-TLVs are mixing different types of sub-TLV assignments.
It might make sense to split up the space into Segment types and other parameters (Metric, preference).

We will be talking about this at the IDR Interim on September 9, 2024.

Cheerily, Sue Hares


==============

Shepherd Review
draft-ietf-idr-sr-p2mp-policy-00

status: WG Draft, expired
Status: Proposed Standard
version: revision required for WG LC
implementation: At least one in progress

Issue-1.) Abstract needs to be 2 paragraphs

replacement text:/
   SR P2MP policies are set of policies that enable architecture for
   P2MP service delivery.  A P2MP policy consists of a set of
   candidate paths that connects the Root of a multicast Tre
   the Tree to a set of Leaves.  The P2MP policy is composed of
   replication segments.  A replication segment is a forwarding
   instruction for a candidate path which is downloaded to the Root,
   transit nodes and the leaves.

   An SR P2MP Policy is comprised of a set of Candidate SR P2MP Policies. BGP
   distributes each Candidate Policy as some NLRI plus a BGP Tunnel Encapsulation
   Attribute (Tunnel-Encaps) for an SR Policy Tunnel. This document specifies a new
   NLRI with a new BGP SAFI (SR P2MP Policy) for IPv4 Unicast AFI and IPv6 Unicast AFI,
   plus a new tunnel type for the BGP Tunnel-Encap Attribute.
   This new NLRI has three new route types within this NLRI(Root node,
   replication segment binding sid, Repliation segment OIF).
    It should be noted that this document does not specify how the Root
   and the Leaves are discovered on the controller, it only describes
   how the P2MP Policy and Replication Segments are programmed from the
   controller to the nodes./


Issue-2. Introduction, paragraph 3, clarity on options

paragraph 3:/
   For a P2MP segment, a controller may be used to compute a tree from a
   Root node to a set of Leaf nodes, optionally via a set of replication
   nodes.  A packet is replicated at the root node and optionally on
   Replication nodes towards each Leaf node./

New text:/
   For a P2MP segment, a controller may be used to compute a tree from a
   Root node to a set of Leaf nodes.  Optionally, this computed distribution
   tree MAY be via a set of replication nodes toward each Leaf node./

Issue-3. Introduction, paragraph 4, sentence 1, confusion use of "i.e.,"

Old text:/
   A Point-to-Multipoint service delivery could be via Ingress
   Replication (aka Spray in some SR context), i.e., the root unicasts
   individual copies of traffic to each leaf./

new text:/
   A Point-to-Multipoint service delivery could be via Ingress
   Replication (aka Spray in some SR context). For example the root
   could unicast individual copies of traffic to each leaf. /

Issue-4. Introduction, paragraph 5, sentence 1, confusion use of "i.e.,"

Old text:/
   A Point-to-Multipoint service delivery could also be via Downstream
   Replication (aka TreeSID in some SR context), i.e., the root and some
   downstream replication nodes replicate the traffic along the way as
   it traverses closer to the leaves./

 new text:/
   A Point-to-Multipoint service delivery could also be via Downstream
   Replication (aka TreeSID in some SR context).  For example, the root and some
   downstream replication nodes replicate the traffic along the way as
   it traverses the tree closer to the leaves./

Issue-5. Introduction, paragraph starting "The leaves and root of tree", Discovery protocols

problem: Are you missing BGP-LS or NETCONF?  or PCE?

Old text:/
   The leaves and the root of a p2mp policy can be discovered via the
   multicast protocols or procedures like NG-MVPN [RFC6513] or manually
   configured on the PCC (CLI) or the PCE./

new text:/
   The leaves and the root of a p2mp policy can be discovered via the
   multicast protocols, or procedures like NG-MVPN [RFC6513], or BGP-LS [RFC9552],
   or NETCONF/RESTCONF reading of manually configuration on the PCC (CLI) or the PCE./

Issue-6: Introduction , paragraph 8, description of BGP extensions

Current text:/
   The advertisement uses BGP extensions defined in this
   document.  The controller also calculates the tree path and builds
   the replication segments on each segment of the tree, Root, Transit
   and Leaf nodes and downloads the forwarding instructions to the nodes
   via BGP extensions defined in this document./

new text:/
    The advertisement of the P2MP policy uses BGP extensions for
      a new NLRI (P2MP-Policy NLRI), a new Tunnel type
      P2MP Policy, and new Sub-TLVs for attributes of the new Tunnel type.
      The controller also calculates the tree path and builds
    the replication segments on each segment of the tree, Root, Transit
    and Leaf nodes and downloads the forwarding instructions to the nodes
    via BGP extensions [need to specify which here] defined in this document./

Note:  I'm not exactly clear what you want to say.

Issue-7: Introduction, paragraph 9, replace [draft-ietf-idr-segment-routing-te-policy]

[draft-ietf-idr-segment-routing-te-policy] was replaced by
[draft-ietf-idr-sr-policy-safi] and [draft-ietf-idr-bgp-sr-segtypes-ext]

I think you want [draft-ietf-idr-sr-policy-safi] to replace the outdated draft, but
you should look at this point.

Issue-8: Introduction, paragraph 10, path instance.

I realize that path-instance is equivalent to a P2MP LSP.
However, where is path instance defined in SR routing?

I'm not clear what path instance is.  Please define it before section 3.:

Issue-9: Section 3.1, last paragraph, outdated reference

Old text:/
   All other recommendations of
   [draft-ietf-idr-segment-routing-te-policy] section SR Policy SAFI and
   NLRI, should be taken into account for P2MP policy. /

   Please verify that a replacement of [draft-ietf-idr-segment-routing-te-policy]
   with [draft-ietf-idr-sr-policy-safi].

Issue-10: Section 3.1.1, Tree-id value.

Is the value "0" valid?  Or does the value zero denote something special?
The text reads as though TREE-ID value of zero is like any other value.

Issue-11: Section 3.1.2

Please specify ROOT-ID length, Node-ID length, and Replication SID elngth.

The last sentence in the "instance-id" is unclearly or hanging.
Old text:/ Instance-ID can be used.

Issue-12: Section 3.1.3

   Please verify that a replacement of [draft-ietf-idr-segment-routing-te-policy]
   with [draft-ietf-idr-sr-policy-safi].

Issue-13: Section 3.1.3
The last sentence in the "instance-id" is unclearly or hanging.
Old text:/ Instance-ID can be used.

Issue-14: Section 3.2

It is unclear which two new Tunnel-Type you are using.  I believe
the tunnel types are:
1) P2MP-Policy - tunnel type
2) Replication-Segment-oif - tunnel type

Please make this sentence consistent on the names.

Issue-15: Section 3.2, paragraph 1, unclear run-on sentence

Old text:/
  The content of this new NLRI is encoded in the tunnel Encapsulation
   Attribute originally defined in [RFC9012] using two new Tunnel-Type
   TLV (codepoint is TBD, assigned by IANA from the "BGP Tunnel
   Encapsulation Attribute Tunnel Types" registry) one for P2MP Policy
   and another for Replication segment./

Suggested text:/
   The P2MP information is distributed with the P2MP NLRI and
   a BGP Tunnel Encapsulation (Tunnel-Encaps) attribute defined in
   [RFC9012] with one of two new Tunnel-Type TLV. The two tunnel types
   are allocated from the Tunnel Encapsulation Attribute Tunnel Types" registry.
   The first tunnel type is P2MP Policy and the second tunnel type
   is Replication segment.

Issue-16: Section 3.2.1

a) Please verify that a replacement of [draft-ietf-idr-segment-routing-te-policy]
   with [draft-ietf-idr-sr-policy-safi].

b) Policy name, Policy Candidate Path Name, Preference, and
segment list is defined in[draft-ietf-idr-sr-policy-safi].  Please correct.

c) What does "*Relevant only at the Root" mean? I think it means that
this subTLV is only vlaid for the Root node.

d) Please provide a table with sub-TLVs that will be used
   for P2MP Policy Tunnel type.  Existing sub-TLVs that you do not explicitly indicate
   can be used for this Tunnel type are invalid.  Future sub-TLVS are outside the
   scope of this document.

 Issue-17: Section 3.2.2

 Thank you for stating will not have any sub-TLVs.


Issue-17: Section 3.2.3

a) Policy name, Policy Candidate Path Name, Preference,
segment list, and weight are defined in [draft-ietf-idr-sr-policy-safi].  Please correct.

b) Please provide a table with subTLVs that will be used for replication-Segment-oif

c) I have found that Tunnel-Encaps attribute abbreviation reads better to people than TEA.
   You do not have to change. However, you do need to provide an initial instance prior to
   using TEA.

Issue-18: Section 3.3.1, whole section, already defined.

Please remove the preference sub-TLV.  It is already defined.
You can define the use this sub-TLV has in the two tunnel types you define.

Issue-19: Section 3.2.2 + Section 3.3.3.1  -  length calculation

The calculation of length needs to include the "reserved field'.

Issue-20: Section 3.3.3

1) please define MBB procedure (what it is) and how it works.

Issue-21: Section 3.3.3.1, length.

What is the length of the active instance-id?  Is it 4 octets?
If it is 4 octets, then the length appears to always be 5 octets.

Issue-22: Section 3.3.3.2, length

What is the length of the instance-id?  Is it 4 octets?
If it is 4 octets, then the length appears to always be 5 octets.

Also note: "instance-id" is incorrectly spelled in the description.

Issue-23: Section 3.4.3

editorial:
Current:/
   Protection sub-tlv is optional, if FRR is desired for the downstream
   node this sub-tlv can be used to identify the protection segment
   list.
New:/
   Protection sub-tlv is optional. if FRR is desired for the downstream
   node the Protection Sub-TLV can be used to identify the protection segment
   list. /


Confusing:/ A protection segment
   list can not have a weight sub-tlv and it can not participate in
   ECMP.  That said a segment list that is being protected can have a
   weight sub-tlv and participate in ECMP./

This seems to be contradictory.  What am i missing.

Flags:  All flags not defined in the flag, should be set to zero upon transmission
and ignored upon reception.

Issue-24: Section 3.4.4 Segment Sub-TLV

reference [draft-ietf-idr-sr-segtypes-ext.] for segment types E an G

Old text:/
   *  If the replication segment is steered via IPv4 or IPv6 nexthops or
      interface then the segment type E or G can be used with the new R
      flag set./
New text:/
   *  If the replication segment is steered via IPv4 or IPv6 nexthops or
      interface then the segment type E or G [draft-ietf-idr-sr-segtypes-ext]
        can be used with the new R flag set./

old text (unclear) /
   The SR node/adjacency or binding
   sids steer the packet through a SR domain until it reaches another
   replication segment. where the bottom of the stack replication sid
   identifies the forwarding information on that replication segment./

new text: (not sure if this works)/
   The SR node/adjacency or binding sids steer the packet through an
   SR domain until it reaches another replication segment.
   The bottom of the stack replication sid
   identifies the forwarding information on that replication segment./
 Editorial:/
  old text: The outgoing tree SID it self is programmed in
   the appropriate route type./

   new text:/ The outgoing tree SID itself is programmed in
   the appropriate route type./

Issue-25: Section 4, replace draft-ietf-idr-segment-routing-te-policy with
[draft-ietf-idr-sr-policy-safi].

old-text: /
   Inline with [draft-ietf-idr-segment-routing-te-policy] the consumer
   of an P2MP Policy is not the BGP process. /

with
   Similar to [draft-ietf-idr-sr-policy-safi] usage, the consumer
   of an P2MP Policy is not the BGP process. /


Issue-26: Section 4.1, paragraph 1, 3rd sentence, editorial (I hope)

old text:/ Each route
   target identifies one head-end (root nodes) for P2MP Policy route or
   one or more head-end, transit and leaf nodes for the Non- Shared/
   Shared Tree Replication Segment route, for the advertised P2MP
   Policy./

new text:/ Each route target identifies one head-end (root nodes)
   for the P2MP Policy route.  Each route target for the
   advertised P2MP Policy identifies one or more head-end,
   transit and leaf nodes for the Non-Shareed Tree Replication
   route./

Issue-27: This document needs a manageability section

Issue-28: This document needs a security section.

Please see the security section in [draft-ietf-idr-sr-policy-safi]
as an example of a good security section.