Re: [Int-dir] Éric Vyncke's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)

"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Wed, 13 May 2020 21:01 UTC

Return-Path: <naikumar@cisco.com>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AB823A091D; Wed, 13 May 2020 14:01:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=NAo9QbQt; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=lW55qTUD
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id of2jNynnplVV; Wed, 13 May 2020 14:01:14 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EDAD83A091A; Wed, 13 May 2020 14:01:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14476; q=dns/txt; s=iport; t=1589403673; x=1590613273; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=EevsQtadJFLGQ2rKXSTGd40YqxbS4MBJkfTChTAakgo=; b=NAo9QbQtd+Uk8MkWA1aBTHrNQJkLis5nVKFI/BwWQHEyBiwMwgDktCw5 FRUfik6DkkAoJVyU1ZrxReTZZ4cnDBXqGG7AUXIj/o9MvZ/LT1rSJHcFi ljGtxM/T6G2iu83NEzQFDqmwzGCWSs54TJAsxppEW8vXottHfEBV8v5tk 4=;
IronPort-PHdr: 9a23:dIqOMxz62rbX1fnXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5ZRWDt/5sl1TOG47c7qEMh+nXtvXmXmoNqdaEvWsZeZNBHxkClY0NngMmDcLEbC+zLPPjYyEgWsgXUlhj8iKwMFNeH4D1YFiB6nG35CQZTxP4Mwc9L+/pG4nU2sKw0e36+5DabwhSwjSnZrYnJxStpgKXvc4T0oY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJCACwX7xe/4sNJK1mHQEBAQEJARIBBQUBQIFHgVQkLQdvWC8sCoQbg0YDjRiYXIFCgRADVAsBAQEMAQElCAIEAQGERAIXgXckOBMCAwEBCwEBBQEBAQIBBQRthVYMhXICAQMSEREMAQE3AQ8CAQgSCAImAgICMBUCAwsCBAENBRsHgwQBgksDLgEOA6ZpAoE5iGF2gTKDAQEBBYEyARNBgz8Ygg4DBoEOKoJjiV8aggCBEScMEIFPfj6CZwIBAgGBLAELBwEHITECglozgi2OPhIGgkcBPKEoCoJNiB2LR4RQHYJdiGyFAogIhHaDc4w5iV+TWQIEAgQFAg4BAQWBaSJmWBEHcBUaISoBgj5QGA2QQDiDOoUUhUJ0AjUCBgEHAQEDCQF7jAOBNQGBDwEB
X-IronPort-AV: E=Sophos;i="5.73,389,1583193600"; d="scan'208";a="770110186"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 13 May 2020 21:00:49 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 04DL0nFA025244 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 May 2020 21:00:49 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 13 May 2020 16:00:49 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 13 May 2020 16:00:48 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 13 May 2020 16:00:48 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=loVGzyS7X9nYw469zS4NHDfdBfx8Qi3nHh6/DY46Kztr7gGd9FZh0v5xZ7qv3FOETFkwpZKInXDcAy5JJk8GTuCj2u/2R+Pw4QrC4IEhDlmjUUIYktjb28FRxPrg6fVra2F5ZrwtQu8noPhIMAgkNFF04/VSB8XQ2FbmxgQgJ95sTLBdwNsa/dOxIVVUMLC0jDmexUEf84de0we8ke+N+bSTRYGL0HEPueUYk5Bkrw4xziP5gm8HHBAU9WDsvcfFDr2/hZk8jRsnWQaiU2/czbUeRTdbi50Zv6LNraJNG3hH8OtCboagBChigdPXzNc1Rk+MOw5nGweSVRuwsx1pEg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EevsQtadJFLGQ2rKXSTGd40YqxbS4MBJkfTChTAakgo=; b=XnBzCfsI3hB296qa1sjLnw40KOOjBlyBOBmP3e75bs+mToB2/AVq8K3CWaDVU+eZ3ipKDGZOE56YVSnI80CZZBRSM4rWAHoptqLnqVtWa/n4JH22wY1ghWq6BuJCiVU7A/wf4FzR+C5SHG0R5Rdnt19eRS2qDKfvdFXaquW6jR2SaA+h0imCsx6n8BVy9cKOVsHnKpBpdUQ9rkUMrb1Wy2jeDU970ltiSr5GiRwi2lEzEDEVKF8rXAk6FGTCebP5whWhJV23RzlmkfX8dF+bqy24x8OIu5VqEZSngLXdpvyUDoWIQFXuXl5OEO/BMBlI74CygCobgJnPj3LTAgm+Sg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EevsQtadJFLGQ2rKXSTGd40YqxbS4MBJkfTChTAakgo=; b=lW55qTUDERwCzSdnJxyYVSypkgtelKR/9jJ6b4PZibjrEQ3DhCpJGIrfeJY2DsYASoJRRN7chfoHwdI5PCGs+XGiVQjrrOsrYtzDt5teFygGhL8dwad/VHLDAMd7eEJVyfprksaBQDwvIq/iyM83LDgJv4xm/Fkwvwl+DLCCHY8=
Received: from BN6PR11MB4068.namprd11.prod.outlook.com (2603:10b6:405:7c::31) by BN6PR11MB0034.namprd11.prod.outlook.com (2603:10b6:405:6b::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.24; Wed, 13 May 2020 21:00:47 +0000
Received: from BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34]) by BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34%3]) with mapi id 15.20.3000.016; Wed, 13 May 2020 21:00:47 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Eric Vyncke (evyncke)" <evyncke@cisco.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>, "int-dir@ietf.org" <int-dir@ietf.org>
Thread-Topic: Éric Vyncke's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
Thread-Index: AQHWI6FJ9zTDA56WOkCEPXJ4twd//6imSNQA
Date: Wed, 13 May 2020 21:00:47 +0000
Message-ID: <F82415AC-3212-4133-B974-BFF190217F71@cisco.com>
References: <158876786144.22272.6483455621584357748@ietfa.amsl.com>
In-Reply-To: <158876786144.22272.6483455621584357748@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.117.76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7951c617-3d1d-4a45-cc78-08d7f780b5aa
x-ms-traffictypediagnostic: BN6PR11MB0034:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR11MB003413BFBD9DFC958BCCBAC7C6BF0@BN6PR11MB0034.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0402872DA1
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: aPKLMdjuDJOUcvB1iQVoLpP+Fi1/Lov1yJpEkjFESC55b9IEjH5RziZez6SkFl8VLXVOTc25EjeCPXkxB39g0dGRVTmMgIcdVxwddvbhHzK4waB1KOZQFMAvSahNifHzdH/Gr4p1CQ7OA3/1/1ACuFFRe5R1b7YpPapNhn2hteDHxrhmgqGy+dhzKiwMukFOUfCyrCokdRg9YFUYFrmC21m0Yezt+ILlTnLfotuxVXXgopj9oJ0Ny/37213k2TMpUp5AMTjEesmDZD3ikVlo6v9FCiBoi2VtMa6BZhT4u9a/cdTSgqX2MMz9JXg69Y/f59Dvfo/0zmNyaWLL2Er11LHGd5cuRaawLNSSgOlFadOja5hk/1kPCYsLRxblVMzBliL3W/Cpo8j8lJdRpoXy9bcUN8HV+kCqE8WdQCI/PXFzSFjq65l3hKFnxRioDYdGkcnJ2enCrPrZ6gUj7/2S1FLDfpvB7GU8pDNxPZeqBo21HE09goQtLwFy2q9VAH+LccGwWkHQ7CHaBA2nJB0KHxbLoSR8udCHVP6qwt+KLluJNzHZopu8iEVHbrVbDvuyyB4eAbZ2vt+U7ttFSrSFGvFSR91wt7JDhTK+0RhQMaA=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR11MB4068.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(39860400002)(396003)(346002)(366004)(376002)(33430700001)(2906002)(71200400001)(4326008)(316002)(66574014)(36756003)(33440700001)(110136005)(5660300002)(54906003)(966005)(66446008)(224303003)(6506007)(91956017)(33656002)(76116006)(6486002)(186003)(86362001)(64756008)(66556008)(478600001)(66476007)(8936002)(2616005)(6512007)(26005)(66946007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <AEA42A101D1CFB4BB3D03FCD720430D6@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7951c617-3d1d-4a45-cc78-08d7f780b5aa
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 May 2020 21:00:47.0799 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: uYcAocxeOn1soHrR1tx99JjP4xa4cVImIwBlcdsfj6HjzYwnXKXXjZCwGUffGp/EUMXYbh7saVKb+Y6Z6i+fTA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB0034
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/wje2K0pY3SObZY6odQEv_hy6D1M>
Subject: Re: [Int-dir] Éric Vyncke's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 May 2020 21:01:17 -0000

Hi Eric,

Thank you for the great comments. Please see inline..

On 5/6/20, 8:24 AM, "Éric Vyncke via Datatracker" <noreply@ietf.org> wrote:

    Éric Vyncke has entered the following ballot position for
    draft-ietf-sfc-oam-framework-13: No Objection
    
    When responding, please keep the subject line intact and reply to all
    email addresses included in the To and CC lines. (Feel free to cut this
    introductory paragraph, however.)
    
    
    Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
    for more information about IESG DISCUSS and COMMENT positions.
    
    
    The document, along with other ballot positions, can be found here:
    https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/
    
    
    
    ----------------------------------------------------------------------
    COMMENT:
    ----------------------------------------------------------------------
    
    Thank you for the work put into this document. The document is easy to read;
    BTW, I found that its content is more about the justifications / requirements
    for an OAM system and tools descriptions than about for a framework description.
  
<Nagendra> As you might have noticed, this document does not attempt to list a set of requirements. Instead, it proposes a structured layer and positions different SFC OAM components and explain the OAM  functionalities of such components and thereby making it easier for the solution documents to address the same. Accordingly, we believe this fit as a framework document (.

    The core of the document appears to be section 6: this should probably be
    reflected in the abstract and introduction
    
<Nagendra> Section 6 is about the candidate SFC OAM tools. But the other sections are equally important to better understand the overall context, different components followed by the toolset availability and the gaps. The Introduction section explains this for ease of reading. 

    Please address the comments raised in the Internet directorate review by Carlos
    Bernardos:
    https://mailarchive.ietf.org/arch/msg/int-dir/TgQulH7hytGPNxdAPWcSgkTx1IM
  
<Nagendra> Thank you for forwarding the comments from Carlos. We addressed the same and included the modification in the document.

    Please find below a couple on non-blocking COMMENTs. I would really appreciate
    a reply to all these COMMENTs.
    
    I hope that this helps to improve the document,
    
    Regards,
    
    -éric
    
    == COMMENTS ==
    
    I would not refer to BCP 14 (RFC 8174) as this is an architectural/framework
    document (informational) and not a protocol specification.
   
<Nagendra> We got similar comments from other reviewers as well. We removed this section and updated by avoiding the use of normative statements.

    It seems that most of the described tools are about synthetic traffic. Is there
    any other means to do OAM in SFC (not that I have any suggestion...)?.
   
<Nagendra> We briefly explained the applicability of In-Situ OAM in section 6.4.3. The overlay header (such as NSH) can carry iOAM data fields. The solution documents can detail the specifics of what data to collect or how to use it.

    -- Section 1 --
    About "to be applied to packets and/or frames", for me packets are layer-3 PDUs
    and frames are layer-2 PDUs. While I am not familiar with SFC, I could envision
    SFC being applied to transport or application layers PDUs. So, why restricting
    the use of this document to layers 2 and 3 only ?
    
<Nagendra> Good point. I think we can modify the same as below:

OLD:
applied to packets and/or frames selected as a result

NEW:
applied to any traffic selected as a result..

    -- Section 2 --
    Is there a reason why all 'virtual links' are not mentioned in this section?
    I.e., SR-IOv network, tun/tap, ...
    
<Nagendra> I think it is very much possible. Does the below text looks better?

OLD:
o  The link layer, which is tightly coupled with the physical
      technology used.  Ethernet is a popular choice for this layer, but
      other alternatives are deployed (e.g.  POS, DWDM).  The same or
      distinct link layer technologies may be used in each leg shown in
      Figure 1.

NEW:
o  The link layer, which is tightly coupled with the physical layer
      technology used.  Ethernet is a popular choice for this layer, but
      other alternatives are deployed (e.g.  POS, DWDM).  In a virtual environment, 
      virtualized I/O technologies such as SR-IOV or similar are applicable for this layer.
      The same or distinct link layer technologies may be used in each leg shown in
      Figure 1.

    Similar question about why limiting the example of VM and not including
    containers ?
    
<Nagendra> We changed virtual machines as virtual entities so that it is not limited to VMs. Below is the modified text:

OLD:
In Figure 1, the service layer element such as classifier and SF are
   depicted as virtual machines that are interconnected using an overlay
   network.  The underlay network may comprise of multiple intermediate
   nodes but not shown in the figure that provides underlay connectivity
   between the service layer elements.

   While Figure 1 depicts an example where SFs are enabled as virtual
   entities, the SFC architecture does not make any assumptions on how
   the SFC data plane elements are deployed.  The SFC architecture is
   flexible and accommodates physical or virtual entity deployment.  SFC
   OAM accounts for this flexibility and accordingly it is applicable
   whether SFC data plane elements are deployed directly on physical
   hardware, as one or more Virtual Machines, or any combination
   thereof.

NEW:

In Figure 1, the service layer element such as classifier and SF are
   depicted as virtual entities that are interconnected using an overlay
   network.  The underlay network may comprise of multiple intermediate
   nodes but not shown in the figure that provides underlay connectivity
   between the service layer elements.

   While Figure 1 depicts an example where SFs are enabled as virtual
   entities, the SFC architecture does not make any assumptions on how
   the SFC data plane elements are deployed.  The SFC architecture is
   flexible and accommodates physical or virtual entity deployment.  SFC
   OAM accounts for this flexibility and accordingly it is applicable
   whether SFC data plane elements are deployed directly on physical
   hardware, as one or more Virtual entities, or any combination
   thereof.

    -- Section 3 --
    The word "performance" is often used in the document but it is not described in
    depth though: is it about the SF CPU/memory or 'client traffic' latency &
    throughput ? Section 4 partially addresses my question but not completely;
    also, adding forward pointers to section 4 would be nice.

<Nagendra> SFC being unidirectional, one-way delay measurement and packet loss was emphasized in section 4.4. We added the pointer as below:

OLD:
The second SFC OAM requirement for the SF component is to allow an
   SFC-aware network device to check the performance metrics such as
   loss and delay induced by a specific SF for processing legitimate
   traffic.  The performance can be a passive measurement by using live
   traffic or can be active measurement by using synthetic probe
   packets.

NEW:
The second SFC OAM requirement for the SF component is to allow an
   SFC-aware network device to check the performance metrics such as
   loss and delay induced by a specific SF for processing legitimate
   traffic.  The performance can be a passive measurement by using live
   traffic or can be active measurement by using synthetic probe
   packets. More details about this OAM function is explained 
in Section 4.4.
    
    -- Section 4.3 --
    Please bear with my ignorance of SFC world... but, if a SF is doing proxying /
    rewriting the application message, how useful is an end-to-end PMTUd check? As
    there are two stitched TCP connections ?

<Nagendra> Path MTU discovery is one of the connectivity functions and the above-mentioned scenario appears to be one possible case. Accordingly, I think this should be addressed in the respective solution document. 
    
    The overall assumption of this section is that all SF are pure layer-3, leaving
    the IP header intact so that ECMP & TTL checks can be done. Is it always the
    case ?
   
<Nagendra> Not necessarily. The TTL handling mentioned in this document is about the TTL in the NSH/Overlay header. The traffic encapsulated by the overlay header can be L2 or L3.

    Section 5.2 addresses the above points, but, I suggest that section 4.3 to be
    restricted to ' link-layer OAM'
    
<Nagendra> The NSH TTL field can be controlled to terminate the probe on any service layer element. So I think it is not limited to link-layer. 

    -- Section 6.4.1 --
    "TTL field in NSH header to 63", not familiar with NSH, but, if there is a TTL
    field in NSH, then it could be useful to point to the RFC & section describing
    it. Esp in a section whose title is "ICMP" (referring obviously to the IP
    header).
    
<Nagendra> Make sense. Please see below for the modified text:

OLD:
can set the TTL field in NSH header to 63...
NEW:
can set the TTL field in NSH header [RFC8300] to 63...

    -- Section 8 --
    In this security section, I wonder whether the trace tool deserves a paragraph
    or two as if trusted while being forgeable/spoofed, then operators could trust
    a SFC which is "owned" and not reliable (i.e., with a bypass of some security
    SF). Trusting the security AD to raise a DISCUSS if they think it is a DISCUSS.
    
<Nagendra> The section in ver-13 was updated based on the comments from SecDir review. Please feel free to share any text suggestions if you think the can be improved further.

    == NITS ==
    
    -- section 6.3 --
    Is it really required to re-specify the use of bit O in NSH ?
    
<Nagendra> I think we can leave it as it doesn’t appear to vitiate the meaning of the sentence (.

    -- Section 6.4.1 --
    Sigh... using the IPv4 terminology of TTL...

<Nagendra> The TTL discussed in this section is the field in the NSH header. 

Once again, thanks a lot for the great comments.

Thanks,
Nagendra