Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)

Roman Danyliw <rdd@cert.org> Thu, 02 March 2023 03:02 UTC

Return-Path: <rdd@cert.org>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9A8BC14CE5D; Wed, 1 Mar 2023 19:02:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e6HZiSj5moWg; Wed, 1 Mar 2023 19:02:15 -0800 (PST)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on071c.outbound.protection.office365.us [IPv6:2001:489a:2202:c::71c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2042C14CEE5; Wed, 1 Mar 2023 19:02:14 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=USV3UQk0J6Lwp+DgXsgnXQIgeWg2q8bsOH4lmjno4Fgc01vJdX8pYDd+i31SfUXrkb88ebh+4YsiEQFSmsC0X5oSrHujN6AfmHXjs/1+vUse5i/FtvjipHbkvi5ljbcl/PAFiB5E/8jV6gr8psbX8lymDuLhhR2s59KlVJ5T4OQz2PpHhGD5hmajT1qOV1IDKJ05U1KICJKYEvChCnmUKOZgLYkuUVBnuoSHSGPt8zjwxbEWw81V/f84ZIfhjXeRWEoTIeApVzTFWLHJVA9clXSBFjN6h+XQ6Y1MnAzWYsCBT5W4mUN1rtoBYx+JB7XIhS4QPSjNgTvJtCcxwjxdfg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=I3BzztqtjmiocruTZrGmzWeDirLPqiTV4p/CCUg78To=; b=cO7P1ZW+uhulSFEgWotcV1ahiAyciDxMSEiFIc1QP+pn+UKk3zcLxV2dOSJDOMX+Uj/wpt7/Fv6HrMm2Pm4hWkPYOGDoJGmZzsiOdNhcECgxwW+BrraX+ASwIsmPrlDWyDD6smUNFFeJUGkOeQVfMqvxrkEQIKEfVl7ERHiw78+AQgOgcw28sMFWH7KR3yo6Q6qClVtwnjEL7ibXhgPhQArjCcdcj3EFxDNLMtEkChTiOcCYjf8qYb/Sb9FRE5zfENyItpx7ELn9t/LjuTzEWRPlRTAFv/3HDl6ZcRBYHqg0SHoHdZoI0ClgaB86iyKCiNtHNat/OQ1xTPJQXvcV8Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=I3BzztqtjmiocruTZrGmzWeDirLPqiTV4p/CCUg78To=; b=ETC+cCHS3ATihMemVmTe3xGWVgfykg6+H5jnUhAHvFYm3rbNY4WnyPU1+n0QDPL9kMdiPKx/htvts1IZ2B1wjqfRj+7nJnG7YyFOeYHKznzv+lMfJnThkpbg2lc6ZsyDRWrcnpiW+YEqW2sq7q5uf48Dq/IDDmwN7a3xbTLV0jM=
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:168::11) by BN2P110MB1009.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:16b::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6156.18; Thu, 2 Mar 2023 03:02:08 +0000
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::b585:6958:6026:4b8a]) by BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::b585:6958:6026:4b8a%5]) with mapi id 15.20.6134.030; Thu, 2 Mar 2023 03:02:08 +0000
From: Roman Danyliw <rdd@cert.org>
To: Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>, John Scudder <jgs@juniper.net>, Erik Kline <ek.ietf@gmail.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-ippm-ioam-ipv6-options@ietf.org" <draft-ietf-ippm-ioam-ipv6-options@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, "marcus.ihlar@ericsson.com" <marcus.ihlar@ericsson.com>, "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
Thread-Index: AQHZBCMr3dnHWaEnLkaqZirmW2xXbK6GvvcAgFIPEYCAARFGAIAMFiAAgAFo2+A=
Date: Thu, 02 Mar 2023 03:02:08 +0000
Message-ID: <BN2P110MB11076BFBCFB42C346DA35770DCB29@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
References: <166974767573.42018.13628264024826514580@ietfa.amsl.com> <MWHPR11MB1311CFE4C49C480E6911D145DAF09@MWHPR11MB1311.namprd11.prod.outlook.com> <219FA35A-0A24-4D88-8EE3-09392BCE2118@juniper.net> <MWHPR11MB1311B5671057A984D9CA5288DAA59@MWHPR11MB1311.namprd11.prod.outlook.com> <CAMFZu3O--66uNRJQm84DBYOthW7yorV8bTqs+X=9vjNfXxLfUg@mail.gmail.com>
In-Reply-To: <CAMFZu3O--66uNRJQm84DBYOthW7yorV8bTqs+X=9vjNfXxLfUg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN2P110MB1107:EE_|BN2P110MB1009:EE_
x-ms-office365-filtering-correlation-id: 1d6faad9-a43f-4102-49b6-08db1aca82d4
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230025)(366004)(136003)(396003)(39830400003)(451199018)(966005)(33656002)(86362001)(66946007)(55016003)(41300700001)(66476007)(64756008)(66446008)(8936002)(66556008)(4326008)(5660300002)(8676002)(30864003)(2906002)(122000001)(38070700005)(38100700002)(82960400001)(166002)(52536014)(71200400001)(508600001)(7696005)(54906003)(76116006)(41320700001)(83380400001)(66574015)(110136005)(53546011)(9686003)(26005)(6506007)(186003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN2P110MB11076BFBCFB42C346DA35770DCB29BN2P110MB1107NAMP_"
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 1d6faad9-a43f-4102-49b6-08db1aca82d4
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2023 03:02:08.3411 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN2P110MB1009
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/-yex15zFGItgseMr4I8D3c8dPrA>
Subject: Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Mar 2023 03:02:20 -0000

Hi Frank and Shwetha!

I appreciate the edits make in -10.  They address my DISCUSS and COMMENT feedback.  I’ve cleared my ballot.

Thanks,
Roman

From: Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
Sent: Wednesday, March 1, 2023 12:30 AM
To: John Scudder <jgs@juniper.net>; Erik Kline <ek.ietf@gmail.com>; Roman Danyliw <rdd@cert.org>
Cc: The IESG <iesg@ietf.org>; draft-ietf-ippm-ioam-ipv6-options@ietf.org; ippm-chairs@ietf.org; ippm@ietf.org; marcus.ihlar@ericsson.com; Frank Brockners (fbrockne) <fbrockne@cisco.com>
Subject: Re: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)

Hi Erik, John, Roman,
A new version (-10<https://datatracker.ietf.org/doc/html/draft-ietf-ippm-ioam-ipv6-options>) of the draft-ietf-ippm-ioam-ipv6-options is now published which addresses the comments received during the IESG review, telechat. The following are the major changes done:
1. Removed the Incremental trace option from IPv6 as it requires changes to option length in transit.
2. Cleaned up the deployment and implementation consideration section to be in line with the limited domain RFC8799 feature.
3. Removed the deployment options section which described a IPv6 in IPv6 encapsulation scheme with ULA.
4. Added sub-section on Applicability of AH when IOAM options are present.

Diffs from 09 to 10<https://author-tools.ietf.org/iddiff?url1=draft-ietf-ippm-ioam-ipv6-options-09&url2=draft-ietf-ippm-ioam-ipv6-options-10&difftype=--html>

Thanks,
Frank and Shwetha

On Tue, Feb 21, 2023 at 6:25 PM Frank Brockners (fbrockne) <fbrockne@cisco.com<mailto:fbrockne@cisco.com>> wrote:
Hi John,

Thanks. We're almost done with creating a new revision. We hope to publish -10 shortly.

Cheers, Frank

> -----Original Message-----
> From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
> Sent: Monday, 20 February 2023 21:38
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com<mailto:fbrockne@cisco.com>>
> Cc: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>; draft-ietf-ippm-ioam-ipv6-options@ietf.org<mailto:draft-ietf-ippm-ioam-ipv6-options@ietf.org>;
> ippm-chairs@ietf.org<mailto:ippm-chairs@ietf.org>; ippm@ietf.org<mailto:ippm@ietf.org>; marcus.ihlar@ericsson.com<mailto:marcus.ihlar@ericsson.com>
> Subject: Re: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09:
> (with DISCUSS and COMMENT)
>
> Hi Frank,
>
> I was revisiting old DISCUSSes and see I didn’t reply to you on this, sorry for that.
> The approach you describe makes sense to me. I’ll look forward to reviewing the
> next version if this is how you still plan to proceed.
>
> Please let me know if you’re waiting on me for anything.
>
> Regards,
>
> —John
>
> > On Dec 30, 2022, at 10:30 AM, Frank Brockners (fbrockne)
> <fbrockne@cisco.com<mailto:fbrockne@cisco.com>> wrote:
> >
> > Hi John,
> >
> > Thanks a lot for your review and comments.
> >
> > Per the discussion in the IESG telechat: I can understand your frustration with
> draft-ietf-ippm-ioam-ipv6-options-09. Sorry for that. Part of the vagueness you
> noted stems from the fact that the document  is a merger of two documents:
> > * one which was focused on allocating two code points for v6 options
> > (draft-ioametal-ippm-6man-ioam-ipv6-options)
> > * one which was focused on deployment considerations
> > (draft-ioametal-ippm-6man-ioam-ipv6-deployment)
> > where the second document was just to provide additional information and
> context for the first one.
> > As a result, section 5 turned out to be a set of considerations, that never got
> turned into a proper set of requirements.
> >
> > We could consider splitting the document up again - into a standards track doc
> that allocates the code points - and an informational document which discusses
> deployment aspects, though the IPPM WG originally felt like combining the
> documents was the way to go.
> >
> > Assuming that the we'd stay with a single document, my suggestion
> > would be to clean up section 5.1 and
> > * use references to other documents, such as RFC 9197, RFC8799, or
> > draft-ietf-ippm-ioam-deployment where applicable
> > * switch from "considerations" to "requirements" and be more specific
> >
> > In particular:
> > C1 - Change to a reference to draft-ietf-ippm-ioam-deployment
> > C2 - Keep (the section already uses formal requirements language) - and adjust
> the wording per Eric Vyncke's suggestions.
> > C3 - Keep - and clarify the wording ("entities") per your note below
> > C4, C5 - Refer to RFC 9197 and explicitly restate that IOAM only
> > applies to limited domains per RFC8799
> > C6 - Reword as a requirement.
> > C7 - Expand/Clarify, pending the discussion on the applicability of the
> incremental trace option for IOAM with v6.
> >
> > With that approach, we would also avoid the discussion and potential
> restatements of "how to ensure that a limited domain does not leak packets" in
> this document, i.e. the current topics C4 and C5. The document would rather
> make use of the already existing definition of a limited domain (in RFC8799) and
> its associated qualities.
> >
> > Is this an acceptable approach? If so, we'll create a revision which also
> addresses your other comments (your comments on section 4 are really helpful -
> and can be woven into the next rev).
> >
> > Thanks again, Frank
> >
> >>
> >> ---------------------------------------------------------------------
> >> -
> >> DISCUSS:
> >> ---------------------------------------------------------------------
> >> -
> >>
> >> # John Scudder, RTG AD, comments for
> >> draft-ietf-ippm-ioam-ipv6-options-09
> >> CC @jgscudder
> >>
> >> ## DISCUSS
> >>
> >> As noted in
> >> https://urldefense.com/v3/__https://www.ietf.org/blog/handling-iesg-<https://urldefense.com/v3/__https:/www.ietf.org/blog/handling-iesg->
> ballot-positions/__;!!NEt6yMaO-
> gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2jcU_QikNt
> tNa1riQzmGyk0g$ , a DISCUSS ballot is a request to have a discussion on the
> following topics:
> >>
> >> ### Structure of the document; Section 5 is vague
> >>
> >> The first part of the document, through Section 4, is unproblematic
> >> for me -- you're simply allocating some IPv6 extension header option
> >> types and defining how to use them to transport fields you defined in RFC
> 9197. Fine.
> >>
> >> But Section 5 is giving me a headache. For some reason, even though
> >> this is a Standards Track document, you've structured it as some
> >> rather high-level "considerations" (or are they "requirements"? It's
> >> unclear) and then some generally-worded polite suggestions about how
> >> you could deploy it this way or that way.
> >>
> >> Is there some reason you've shied away from being prescriptive in
> >> Section 5? As the document stands, I felt a bit like I'd been
> >> presented with a puzzle. "The solution of this problem is left as an
> >> exercise for the student" is great in textbooks, but not so wonderful in
> Standards Track documents.
> >>
> >> ### Section 5.1, C5 is problematic
> >>
> >> ```
> >> An Autonomous System (AS) that inserts and leaks the IOAM data needs
> >> to be easy to identify for the purpose of troubleshooting, due to the
> >> high complexity in identifying the source of the leak. Such a
> >> troubleshooting process might require coordination between multiple
> >> operators, complex configuration verification, packet capture
> >> analysis, etc. This requirement may require additional option or
> >> fields to be defined to identify the domain that inserted the IOAM
> >> data, this is out of the scope of this document. ```
> >>
> >> First, just as in C4, the underlying assumption that it's OK if an AS
> >> "leaks the IOAM data" appears problematic.
> >>
> >> Second, how can you both say "this is a requirement" and in the same
> >> paragraph "it's out of scope"? Surely, if this functionality is
> >> required, a finished spec is required to support it. And if the spec
> >> isn't finished, we shouldn't be advancing it, the WG should take it
> >> up and finish it, then send it back when done.
> >>
> >> Is it that this isn't truly a requirement? Or is the spec incomplete?
> >> If neither, please help me understand.
> >>
> >>
> >> ---------------------------------------------------------------------
> >> -
> >> COMMENT:
> >> ---------------------------------------------------------------------
> >> -
> >>
> >> ## COMMENTS
> >>
> >> These comments are non-blocking, but I'd still appreciate responses.
> >>
> >> ### Section 4, a particular interface
> >>
> >> ```
> >> Unless a particular interface is explicitly enabled (i.e., explicitly
> >> configured) for IOAM, a router MUST ignore IOAM Options. ```
> >>
> >> I suppose what you mean is, the router MUST ignore IOAM Options on
> >> packets received on that interface? If so, please say so. (If not,
> >> let's discuss.)
> >>
> >> ### Section 4, reference for IOAM Type, nomenclature
> >>
> >> ```
> >> IOAM Type: 8-bit field as defined in section 7.1 in [RFC9197].
> >> ```
> >>
> >> Section 7.1 of RFC 9197 is the IOAM Option-Type Registry in the IANA
> >> Considerations section. I wouldn't say an IANA registry "defines"
> >> anything, it lists code points. I think a better reference would be
> >> Section 4 of 9197, which does indeed define IOAM-Option-Types (in Section
> 4.1).
> >>
> >> Also, it would be better to be consistent with your naming, in RFC
> >> 9197 you don't call this the "IOAM Type" but rather the
> >> "IOAM-Option-Type" (34 occurrences in 9197) or "IOAM Option-Type"
> >> without the first hyphen (4 occurrences in 9197). I see why you don't
> >> want to use the full string from RFC
> >> 9197 in your packet diagram (too many characters) but "IOAM-Opt-Type"
> >> would fit in the character budget.
> >>
> >> ### Section 4, Trace-Type constraints
> >>
> >> ```
> >> In addition, to maintain IPv6 extension header 8-octet alignment and
> >> avoid the need to add or remove padding at every hop, the Trace-Type
> >> for Incremental Trace Option in IPv6 MUST be selected such that the
> >> IOAM node data length is a multiple of 8-octets. ```
> >>
> >> I spent some time trying to understand exactly what it means for the
> >> Trace-Type to be selected such that, etc. I suppose this isn't too
> >> complicated in the end, since all the types defined in RFC 9197 are either
> four- or eight-byte fields.
> >> I don't see an explicit pad field being defined, though, so I wonder
> >> if it would be a helpful hint to note that the Opaque State Snapshot
> >> with Length 0 and Schema ID 0xFFFFFF can be used as a four-octet pad
> >> if needed. I see you use 0xFFFFFFFF as a pad in some places in RFC
> >> 9197, but there's no corresponding Trace-Type and it doesn't seem
> >> prudent to just poach a currently undefined bit to indicate the pad.
> >> I guess the other alternative would be to allocate a new Trace-Type
> >> bit to explicitly indicate a four-byte pad field, but given you can use Opaque
> State for this purpose, I don't see why you'd burn the bit.
> >>
> >> Anyway, if I've missed some explicit way eight-byte alignment is
> >> supported in RFC 9197, please point it out to me? Otherwise, I think
> >> you need to be clearer about this, to discourage implementors from
> exercising "creativity".
> >>
> >> ### Section 5.1, C3, entities that communicate the errors
> >>
> >> ```
> >> The entities that communicate the errors to devices outside of the
> >> IOAM domain MUST remove any IOAM data from the packet included in the
> >> error message ```
> >>
> >> This is quite non-specific. Who are “the entities“ in this context?
> >> The host or router that originates the ICMP report? The router that
> >> forwards it outside the domain? If the former, I guess that means
> >> every entity within the domain that might originate an ICMP message
> >> has to know a priori if it's sending its message to an internal or
> >> external recipient. If the latter, that's a notable new requirement on border
> routers.
> >>
> >> ### Section 5.1, C4 violates closed domain
> >>
> >> ```
> >> OAM data leaks can affect the forwarding behavior and state of
> >> network elements outside an IOAM domain. IOAM domains MUST provide a
> >> mechanism to prevent data leaks or be able to ensure that if a leak
> >> occurs, network elements outside the domain are not affected (i.e.,
> >> they continue to process other valid packets).
> >> ```
> >>
> >> I have a few difficulties with C4. Among them --
> >>
> >> - The first sentence is quite nonspecific, I don't know if you have
> >> some actual failure modes in mind but I suppose you must. Can you
> >> elucidate? - The second sentence, starting with "or", appears to
> >> violate the limited domain assumption, or at the least, it introduces
> >> a creative understanding of it ("go ahead and leak as long as you're
> >> sure the leaks are fine"). - I don't understand how an operator could
> >> possibly fulfill the "or" clause with confidence since by definition
> >> whatever is happening outside the border of the limited domain is not under
> the control of, or even necessarily known to, the operator.
> >>
> >> My guess is that you're trying to motivate the ULA deployment option
> >> here, without talking about it specifically. Is that right?
> >>
> >> ### Section 5.1, C6 is inaccurate
> >>
> >> ```
> >> Compliance with [RFC8200] requires OAM data to be encapsulated
> >> instead of header/option insertion directly into in-flight packets
> >> using the original IPv6 header. ```
> >>
> >> I don't think you mean the OAM data (by which I think you mean IOAM
> >> data) needs to be encapsulated, but rather that it needs to be within
> >> an encapsulation header? That's what's implied by your Deployment
> >> Options section, anyway. If so, please say so, if not, let's discuss.
> >>
> >> Assuming I've guessed correctly, a possible rewrite could look
> >> something like
> >>
> >> ```
> >> [RFC8200] precludes insertion of IOAM data directly into the original
> >> IPv6 header of in-flight packets. Therefore, in order to add IOAM
> >> data, in-flight packets must be encapsulated in an outer header, and
> >> the IOAM data added to that header. ```
> >>
> >> ### Section 5.1, C7, wording
> >>
> >> ```
> >> Hence when the IOAM Incremental Trace Option-Type is used in the
> >> deployment the RemainingLen field of the option MUST follow the
> >> guidance in [RFC9197] and must be computed and set appropriately. ```
> >>
> >> I assume you mean "used in deployment" and didn't intend the definite
> >> article (which would imply you're talking about a specific
> >> deployment). But I think instead of just dropping "the", you might as
> >> well go ahead and drop "in the deployment" (where else is it going to
> >> be used after all, where this guidance wouldn't apply?).
> >>
> >> ### Section 5.1, C7, lack of specificity
> >>
> >> ```
> >> The IOAM Incremental Trace Option-Type expands the option length that
> >> may affect the processing of extension headers and options that
> >> follow IOAM options. Hence when the IOAM Incremental Trace
> >> Option-Type is used in the deployment the RemainingLen field of the
> >> option MUST follow the guidance in [RFC9197] and must be computed and
> >> set appropriately. ```
> >>
> >> What guidance, exactly, is supposed to be followed? I dug around in
> >> RFC 9197 and the best guess I could come up with is
> >>
> >> ```
> >> The sender MAY calculate the value of the RemainingLen field by
> >> computing the number of node data bytes allowed before exceeding the
> >> PMTU, given that the PMTU is known to the sender. ```
> >>
> >> I'm not very happy with that guess, because it doesn't seem to be
> >> responsive to the problem you've posed. What I've quoted from RFC
> >> 9197 is a way to avoid exceeding the PMTU, but in the present
> >> document you've posed the concern that if you shove too much data
> >> into the IOAM header, other extension headers may be ignored. That's
> >> not the same as PMTU, which relates to total packet size, not header
> >> options size.
> >>
> >> Whatever it is you're trying to do here, I think you need to be more
> >> specific about it.
> >>
> >> ### Section 5.2, encapsulation?
> >>
> >> ```
> >> For deployments where the IOAM domain is bounded by hosts, hosts will
> >> perform the operation of IOAM data field encapsulation and
> >> decapsulation. ```
> >>
> >> Do you intend to imply that the hosts at the edge of the domain are
> >> sending
> >> IP-in-IPv6 encapsulated data? It wouldn't seem to be required; since
> >> the hosts are the source/sink of the packets, the problem described
> >> in C6 doesn't apply, and the host can directly place the IOAM data in
> >> the header. (What would be the "inner header" in an overlay
> >> solution.)
> >>
> >> I suppose it's technically accurate to describe this as an
> >> "encapsulation and decapsulation" operation, insofar as any data
> >> placed in any header might be said to be encapsulated in that header
> >> -- but it's misleading. I think this section needs to be rewritten to
> >> make the meaning plain. For example, something like "... hosts will
> >> place the IOAM data field directly in the IPv6 header."
> >> (You could say "outer IPv6 header" since there's nothing precluding a
> >> host from sending tunneled packets for some purpose.)
> >>
> >> (I notice Éric Vyncke raises a similar concern about the
> >> nontraditional use of the term "encapsulation" in his comments.)
> >>
> >> ### Section 5.3, encapsulation again
> >>
> >> This one is less misleading, but by analogy to 5.2 I suspect more
> >> clarity is required here too.
> >>
> >> ```
> >> For deployments where the IOAM domain is bounded by network devices,
> >> network devices such as routers form the edge of an IOAM domain.
> >> Network devices will perform the operation of IOAM data field
> >> encapsulation and decapsulation. ```
> >>
> >> For example, a more straightforwardly understandable version of the
> >> last sentence might be "Network devices will encapsulate in-flight
> >> packets in an outer IPv6 header which carries the IOAM data field."
> >>
> >> ### Section 5.4.1 infeasible requirement
> >>
> >> ```
> >> Addressing and routing in the IOAM Overlay Network are to be
> >> configured so that the IP-in-IPv6 encapsulated packets follow the
> >> same path as the original, non-encapsulated packet would have taken.
> >> ```
> >>
> >> This doesn't seem to be feasible in the face of ECMP.
> >>
> >> ### Section 5.4.2, wording
> >>
> >> ```
> >> In this case IOAM can be encapsulated in as an extension header in
> >> the tunnel
> >> (outer) IPv6 header. ```
> >>
> >> Is the "as" unintended in the quoted text? If so, please remove it,
> >> if not, I don't understand the meaning.
> >>
> >> ## NITS
> >>
> >> ### Section 5.1
> >>
> >> "if IOAM is used in in transit devices"
> >>
> >> s/in in/in/
> >>
> >> ### Section 5.4
> >>
> >> "This section lists out"
> >>
> >> Just "lists", no "out".
> >>
> >> ### 5.4.1
> >>
> >> "almost close to zero"
> >>
> >> I assume you mean either "almost zero" or "close to zero". Because as
> >> written, I would parse "almost close to zero" as "not close to zero"
> >> which is probably not what you're going for.
> >>
> >> ## Notes
> >>
> >> This review is in the ["IETF Comments" Markdown format][ICMF], You
> >> can use the [`ietf-comments` tool][ICT] to automatically convert this
> >> review into individual GitHub issues.
> >>
> >> [ICMF]:
> >> https://urldefense.com/v3/__https://github.com/mnot/ietf-comments/blo<https://urldefense.com/v3/__https:/github.com/mnot/ietf-comments/blo>
> >> b/main/format.md__;!!NEt6yMaO-
> gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_
> >> XY1jCzk9LXQr32P_G_2jcU_QikNttNa1riQo4wYhBw$
> >> [ICT]:
> >> https://urldefense.com/v3/__https://github.com/mnot/ietf-comments__<https://urldefense.com/v3/__https:/github.com/mnot/ietf-comments__>;!
> >> !NEt6yMaO-
> gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2j
> >> cU_QikNttNa1riSkUdWP9w$
> >>
> >>
> >