Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)

John Scudder <jgs@juniper.net> Mon, 20 February 2023 20:38 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13D42C15154F; Mon, 20 Feb 2023 12:38:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="Kl5X6kRF"; dkim=pass (1024-bit key) header.d=juniper.net header.b="DAlshzAn"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AjN-39i-lEP5; Mon, 20 Feb 2023 12:37:55 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95136C151540; Mon, 20 Feb 2023 12:37:55 -0800 (PST)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 31KIs9cO003606; Mon, 20 Feb 2023 12:37:36 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=JrMuzijmdCWHN6vEHZ7E/CfQpYfAPwCzb7ZDmtBzO18=; b=Kl5X6kRFj4PHLOBchVTZmj5p96r7WliQNv4AhhslI9RaNEMpGlwVYU8pYx29qSzjqNW0 h6bo6/Jug4DqjFRui/2pdNhcMfjawydODtN0M9Y5hsktdTN0mwbqNUD//dHaqlvXhVNO ulhcDBK/fI93Xfh2RjvleFhrBMRovtd3Le6z76YV+cLOCQNPNntR02bVq/nYPhXGBU6d 5jfsd5KqE8BAeXAfVrfqzLhW52vasafIWP8VHBhemOzUZGZwKd8NOGoVY8DcX7RRyW5z oT9eBRLxv/CEFG95mgHLPefmFEvYzpiDV2puX3uA/A96oamiFHdUn36jhgv/ELri809U pw==
Received: from co1pr02cu002-vft-obe.outbound.protection.outlook.com (mail-westus2azlp17010003.outbound.protection.outlook.com [40.93.10.3]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3nttsuc2bn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 20 Feb 2023 12:37:36 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QI2fNRus9TdXH5McynEuandD9iLXQwggwQFDr0+maZNNfCTE9y+TOTpzgEVN66KyubjT7D/BHXGFRc1ZFUixBAa5XiDZHwR+2Zc2EPsWCD1rZGtQafCeojqMQtRoGnmaU10LRtyUCmkrI4WF++jFxITBIzd0SgoCItyKBKjqhEJ4BIoAU2/mcJtZvJLXUYt/AyssfeIa8aOJnOIzFWorSOrxYdIjRnUGRzI1kAOk8ZckU+htChgAkYaaFy9pGiASFe03Dh9vHjrsdTFI3Jr/E1DqXNGqPkw+/OpXGR/7BoPcdmfnNbT0bSx5G8EiaToVzGqty+mwr44R/d/reBifSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JrMuzijmdCWHN6vEHZ7E/CfQpYfAPwCzb7ZDmtBzO18=; b=c/sGka31HHMSBgj1hP5xdwS01D3iFohh+Yt0x0t3GxtS8xIK84B6+txWW7XtlX8rNiWQAv57iIREKL1PE+5Tcn/oj1X61C/uLVHsc6cgiK9Lhl9LCPQhhx94CMFnDDx88G7JzMAH4kQ7D2ONgC6J5HzYXPbhsBfchmT/adSCENavCBHguNF1wKSLMI0/QqljaO24PshYnQyKlqrrHrHTzC4LF1dYhhDxKtxyWMw7VtIn29a8jslrC5GkIXpvuqtFn9axmWbsAm8lTrH7YUd3yE6hZ6VWPxRVFqWIO2qdNcTO2jw3orRpOva+Qm0otFCzWzUeQVTs/avz+N5sQJd3ew==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JrMuzijmdCWHN6vEHZ7E/CfQpYfAPwCzb7ZDmtBzO18=; b=DAlshzAn1Mn/XlBLVm4LeEYC5o3jrcWEl/ZcWUsqJt869XkahEtityqi/JTZbDIq/YyENnZPIZFcrMLJaxmgzHQ/jUCBLP+qFG4wVA6vGlnkuHBcd/JDoa6TJaJaFRr2qkbaP9Y8qN6ieC0w07MJBT9Z0mdwU1Mkxj9wa86LVho=
Received: from MN2PR05MB6109.namprd05.prod.outlook.com (2603:10b6:208:c4::20) by SJ0PR05MB7612.namprd05.prod.outlook.com (2603:10b6:a03:2eb::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6111.19; Mon, 20 Feb 2023 20:37:31 +0000
Received: from MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::85e8:9a68:a5c7:9cde]) by MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::85e8:9a68:a5c7:9cde%3]) with mapi id 15.20.6086.017; Mon, 20 Feb 2023 20:37:31 +0000
From: John Scudder <jgs@juniper.net>
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-ippm-ioam-ipv6-options@ietf.org" <draft-ietf-ippm-ioam-ipv6-options@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, "marcus.ihlar@ericsson.com" <marcus.ihlar@ericsson.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
Thread-Index: AQHZHGOfoNTD1YlL1USW4CD5oCL68K7YnYYA
Date: Mon, 20 Feb 2023 20:37:31 +0000
Message-ID: <219FA35A-0A24-4D88-8EE3-09392BCE2118@juniper.net>
References: <166974767573.42018.13628264024826514580@ietfa.amsl.com> <MWHPR11MB1311CFE4C49C480E6911D145DAF09@MWHPR11MB1311.namprd11.prod.outlook.com>
In-Reply-To: <MWHPR11MB1311CFE4C49C480E6911D145DAF09@MWHPR11MB1311.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR05MB6109:EE_|SJ0PR05MB7612:EE_
x-ms-office365-filtering-correlation-id: 2f3845e5-f92e-4491-88c0-08db13824a09
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB6109.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(376002)(346002)(396003)(366004)(136003)(39860400002)(451199018)(54906003)(66574015)(478600001)(71200400001)(122000001)(38100700002)(86362001)(2906002)(30864003)(38070700005)(33656002)(316002)(41300700001)(36756003)(5660300002)(8936002)(8676002)(66556008)(66446008)(6916009)(66476007)(64756008)(83380400001)(91956017)(4326008)(76116006)(66946007)(6512007)(53546011)(6486002)(966005)(6506007)(2616005)(26005)(186003)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <308408A8290D5E4B998052FDACF33755@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR05MB6109.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2f3845e5-f92e-4491-88c0-08db13824a09
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Feb 2023 20:37:31.1403 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: M3h4mDP7kiMpLKm8zrS2xaN2lx81Z5brf7TPu3qRzdrnnPWbLBF0wBR9gwGZpNWO
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR05MB7612
X-Proofpoint-ORIG-GUID: qYvPyaUR-oJpfkn2fPydilz9VNfbs-1V
X-Proofpoint-GUID: qYvPyaUR-oJpfkn2fPydilz9VNfbs-1V
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.170.22 definitions=2023-02-20_17,2023-02-20_02,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 mlxscore=0 malwarescore=0 mlxlogscore=999 phishscore=0 bulkscore=0 spamscore=0 lowpriorityscore=0 clxscore=1011 priorityscore=1501 impostorscore=0 adultscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2302200191
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/H-EXAzcRQkSWws8ofXNLrRfk0Ag>
Subject: Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Feb 2023 20:38:00 -0000

Hi Frank,

I was revisiting old DISCUSSes and see I didn’t reply to you on this, sorry for that. The approach you describe makes sense to me. I’ll look forward to reviewing the next version if this is how you still plan to proceed.

Please let me know if you’re waiting on me for anything. 

Regards,

—John

> On Dec 30, 2022, at 10:30 AM, Frank Brockners (fbrockne) <fbrockne@cisco.com> wrote:
> 
> Hi John,
> 
> Thanks a lot for your review and comments.
> 
> Per the discussion in the IESG telechat: I can understand your frustration with draft-ietf-ippm-ioam-ipv6-options-09. Sorry for that. Part of the vagueness you noted stems from the fact that the document  is a merger of two documents:
> * one which was focused on allocating two code points for v6 options (draft-ioametal-ippm-6man-ioam-ipv6-options)
> * one which was focused on deployment considerations (draft-ioametal-ippm-6man-ioam-ipv6-deployment)
> where the second document was just to provide additional information and context for the first one.
> As a result, section 5 turned out to be a set of considerations, that never got turned into a proper set of requirements.
> 
> We could consider splitting the document up again - into a standards track doc that allocates the code points - and an informational document which discusses deployment aspects, though the IPPM WG originally felt like combining the documents was the way to go.
> 
> Assuming that the we'd stay with a single document, my suggestion would be to clean up section 5.1 and
> * use references to other documents, such as RFC 9197, RFC8799, or draft-ietf-ippm-ioam-deployment where applicable
> * switch from "considerations" to "requirements" and be more specific
> 
> In particular:
> C1 - Change to a reference to draft-ietf-ippm-ioam-deployment
> C2 - Keep (the section already uses formal requirements language) - and adjust the wording per Eric Vyncke's suggestions.
> C3 - Keep - and clarify the wording ("entities") per your note below
> C4, C5 - Refer to RFC 9197 and explicitly restate that IOAM only applies to limited domains per RFC8799
> C6 - Reword as a requirement.
> C7 - Expand/Clarify, pending the discussion on the applicability of the incremental trace option for IOAM with v6.
> 
> With that approach, we would also avoid the discussion and potential restatements of "how to ensure that a limited domain does not leak packets" in this document, i.e. the current topics C4 and C5. The document would rather make use of the already existing definition of a limited domain (in RFC8799) and its associated qualities.
> 
> Is this an acceptable approach? If so, we'll create a revision which also addresses your other comments (your comments on section 4 are really helpful - and can be woven into the next rev).
> 
> Thanks again, Frank
> 
>> 
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>> 
>> # John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-ipv6-options-09
>> CC @jgscudder
>> 
>> ## DISCUSS
>> 
>> As noted in https://urldefense.com/v3/__https://www.ietf.org/blog/handling-iesg-ballot-positions/__;!!NEt6yMaO-gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2jcU_QikNttNa1riQzmGyk0g$ , a
>> DISCUSS ballot is a request to have a discussion on the following topics:
>> 
>> ### Structure of the document; Section 5 is vague
>> 
>> The first part of the document, through Section 4, is unproblematic for me --
>> you're simply allocating some IPv6 extension header option types and defining
>> how to use them to transport fields you defined in RFC 9197. Fine.
>> 
>> But Section 5 is giving me a headache. For some reason, even though this is a
>> Standards Track document, you've structured it as some rather high-level
>> "considerations" (or are they "requirements"? It's unclear) and then some
>> generally-worded polite suggestions about how you could deploy it this way or
>> that way.
>> 
>> Is there some reason you've shied away from being prescriptive in Section 5? As
>> the document stands, I felt a bit like I'd been presented with a puzzle. "The
>> solution of this problem is left as an exercise for the student" is great in
>> textbooks, but not so wonderful in Standards Track documents.
>> 
>> ### Section 5.1, C5 is problematic
>> 
>> ```
>> An Autonomous System (AS) that inserts and leaks the IOAM data needs to be
>> easy
>> to identify for the purpose of troubleshooting, due to the high complexity in
>> identifying the source of the leak. Such a troubleshooting process might
>> require coordination between multiple operators, complex configuration
>> verification, packet capture analysis, etc. This requirement may require
>> additional option or fields to be defined to identify the domain that inserted
>> the IOAM data, this is out of the scope of this document. ```
>> 
>> First, just as in C4, the underlying assumption that it's OK if an AS "leaks
>> the IOAM data" appears problematic.
>> 
>> Second, how can you both say "this is a requirement" and in the same paragraph
>> "it's out of scope"? Surely, if this functionality is required, a finished spec
>> is required to support it. And if the spec isn't finished, we shouldn't be
>> advancing it, the WG should take it up and finish it, then send it back when
>> done.
>> 
>> Is it that this isn't truly a requirement? Or is the spec incomplete? If
>> neither, please help me understand.
>> 
>> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> ## COMMENTS
>> 
>> These comments are non-blocking, but I'd still appreciate responses.
>> 
>> ### Section 4, a particular interface
>> 
>> ```
>> Unless a particular interface is explicitly enabled (i.e., explicitly
>> configured) for IOAM, a router MUST ignore IOAM Options. ```
>> 
>> I suppose what you mean is, the router MUST ignore IOAM Options on packets
>> received on that interface? If so, please say so. (If not, let's discuss.)
>> 
>> ### Section 4, reference for IOAM Type, nomenclature
>> 
>> ```
>> IOAM Type: 8-bit field as defined in section 7.1 in [RFC9197].
>> ```
>> 
>> Section 7.1 of RFC 9197 is the IOAM Option-Type Registry in the IANA
>> Considerations section. I wouldn't say an IANA registry "defines" anything, it
>> lists code points. I think a better reference would be Section 4 of 9197, which
>> does indeed define IOAM-Option-Types (in Section 4.1).
>> 
>> Also, it would be better to be consistent with your naming, in RFC 9197 you
>> don't call this the "IOAM Type" but rather the "IOAM-Option-Type" (34
>> occurrences in 9197) or "IOAM Option-Type" without the first hyphen (4
>> occurrences in 9197). I see why you don't want to use the full string from RFC
>> 9197 in your packet diagram (too many characters) but "IOAM-Opt-Type" would
>> fit
>> in the character budget.
>> 
>> ### Section 4, Trace-Type constraints
>> 
>> ```
>> In addition, to maintain IPv6 extension header 8-octet alignment and avoid the
>> need to add or remove padding at every hop, the Trace-Type for Incremental
>> Trace Option in IPv6 MUST be selected such that the IOAM node data length is a
>> multiple of 8-octets. ```
>> 
>> I spent some time trying to understand exactly what it means for the Trace-Type
>> to be selected such that, etc. I suppose this isn't too complicated in the end,
>> since all the types defined in RFC 9197 are either four- or eight-byte fields.
>> I don't see an explicit pad field being defined, though, so I wonder if it
>> would be a helpful hint to note that the Opaque State Snapshot with Length 0
>> and Schema ID 0xFFFFFF can be used as a four-octet pad if needed. I see you use
>> 0xFFFFFFFF as a pad in some places in RFC 9197, but there's no corresponding
>> Trace-Type and it doesn't seem prudent to just poach a currently undefined bit
>> to indicate the pad. I guess the other alternative would be to allocate a new
>> Trace-Type bit to explicitly indicate a four-byte pad field, but given you can
>> use Opaque State for this purpose, I don't see why you'd burn the bit.
>> 
>> Anyway, if I've missed some explicit way eight-byte alignment is supported in
>> RFC 9197, please point it out to me? Otherwise, I think you need to be clearer
>> about this, to discourage implementors from exercising "creativity".
>> 
>> ### Section 5.1, C3, entities that communicate the errors
>> 
>> ```
>> The entities that communicate the errors to devices outside of the IOAM domain
>> MUST remove any IOAM data from the packet included in the error message ```
>> 
>> This is quite non-specific. Who are “the entities“ in this context? The host or
>> router that originates the ICMP report? The router that forwards it outside the
>> domain? If the former, I guess that means every entity within the domain that
>> might originate an ICMP message has to know a priori if it's sending its
>> message to an internal or external recipient. If the latter, that's a notable
>> new requirement on border routers.
>> 
>> ### Section 5.1, C4 violates closed domain
>> 
>> ```
>> OAM data leaks can affect the forwarding behavior and state of network
>> elements
>> outside an IOAM domain. IOAM domains MUST provide a mechanism to prevent
>> data
>> leaks or be able to ensure that if a leak occurs, network elements outside the
>> domain are not affected (i.e., they continue to process other valid packets).
>> ```
>> 
>> I have a few difficulties with C4. Among them --
>> 
>> - The first sentence is quite nonspecific, I don't know if you have some actual
>> failure modes in mind but I suppose you must. Can you elucidate? - The second
>> sentence, starting with "or", appears to violate the limited domain assumption,
>> or at the least, it introduces a creative understanding of it ("go ahead and
>> leak as long as you're sure the leaks are fine"). - I don't understand how an
>> operator could possibly fulfill the "or" clause with confidence since by
>> definition whatever is happening outside the border of the limited domain is
>> not under the control of, or even necessarily known to, the operator.
>> 
>> My guess is that you're trying to motivate the ULA deployment option here,
>> without talking about it specifically. Is that right?
>> 
>> ### Section 5.1, C6 is inaccurate
>> 
>> ```
>> Compliance with [RFC8200] requires OAM data to be encapsulated instead of
>> header/option insertion directly into in-flight packets using the original IPv6
>> header. ```
>> 
>> I don't think you mean the OAM data (by which I think you mean IOAM data)
>> needs
>> to be encapsulated, but rather that it needs to be within an encapsulation
>> header? That's what's implied by your Deployment Options section, anyway. If
>> so, please say so, if not, let's discuss.
>> 
>> Assuming I've guessed correctly, a possible rewrite could look something like
>> 
>> ```
>> [RFC8200] precludes insertion of IOAM data directly into the original IPv6
>> header of in-flight packets. Therefore, in order to add IOAM data, in-flight
>> packets must be encapsulated in an outer header, and the IOAM data added to
>> that header. ```
>> 
>> ### Section 5.1, C7, wording
>> 
>> ```
>> Hence when the IOAM Incremental Trace Option-Type is used in the deployment
>> the
>> RemainingLen field of the option MUST follow the guidance in [RFC9197] and
>> must
>> be computed and set appropriately. ```
>> 
>> I assume you mean "used in deployment" and didn't intend the definite article
>> (which would imply you're talking about a specific deployment). But I think
>> instead of just dropping "the", you might as well go ahead and drop "in the
>> deployment" (where else is it going to be used after all, where this guidance
>> wouldn't apply?).
>> 
>> ### Section 5.1, C7, lack of specificity
>> 
>> ```
>> The IOAM Incremental Trace Option-Type expands the option length that may
>> affect the processing of extension headers and options that follow IOAM
>> options. Hence when the IOAM Incremental Trace Option-Type is used in the
>> deployment the RemainingLen field of the option MUST follow the guidance in
>> [RFC9197] and must be computed and set appropriately. ```
>> 
>> What guidance, exactly, is supposed to be followed? I dug around in RFC 9197
>> and the best guess I could come up with is
>> 
>> ```
>> The sender MAY calculate the value of the RemainingLen field by computing the
>> number of node data bytes allowed before exceeding the PMTU, given that the
>> PMTU is known to the sender. ```
>> 
>> I'm not very happy with that guess, because it doesn't seem to be responsive to
>> the problem you've posed. What I've quoted from RFC 9197 is a way to avoid
>> exceeding the PMTU, but in the present document you've posed the concern
>> that
>> if you shove too much data into the IOAM header, other extension headers may
>> be
>> ignored. That's not the same as PMTU, which relates to total packet size, not
>> header options size.
>> 
>> Whatever it is you're trying to do here, I think you need to be more specific
>> about it.
>> 
>> ### Section 5.2, encapsulation?
>> 
>> ```
>> For deployments where the IOAM domain is bounded by hosts, hosts will
>> perform
>> the operation of IOAM data field encapsulation and decapsulation. ```
>> 
>> Do you intend to imply that the hosts at the edge of the domain are sending
>> IP-in-IPv6 encapsulated data? It wouldn't seem to be required; since the hosts
>> are the source/sink of the packets, the problem described in C6 doesn't apply,
>> and the host can directly place the IOAM data in the header. (What would be the
>> "inner header" in an overlay solution.)
>> 
>> I suppose it's technically accurate to describe this as an "encapsulation and
>> decapsulation" operation, insofar as any data placed in any header might be
>> said to be encapsulated in that header -- but it's misleading. I think this
>> section needs to be rewritten to make the meaning plain. For example,
>> something
>> like "... hosts will place the IOAM data field directly in the IPv6 header."
>> (You could say "outer IPv6 header" since there's nothing precluding a host from
>> sending tunneled packets for some purpose.)
>> 
>> (I notice Éric Vyncke raises a similar concern about the nontraditional use of
>> the term "encapsulation" in his comments.)
>> 
>> ### Section 5.3, encapsulation again
>> 
>> This one is less misleading, but by analogy to 5.2 I suspect more clarity is
>> required here too.
>> 
>> ```
>> For deployments where the IOAM domain is bounded by network devices,
>> network
>> devices such as routers form the edge of an IOAM domain. Network devices will
>> perform the operation of IOAM data field encapsulation and decapsulation. ```
>> 
>> For example, a more straightforwardly understandable version of the last
>> sentence might be "Network devices will encapsulate in-flight packets in an
>> outer IPv6 header which carries the IOAM data field."
>> 
>> ### Section 5.4.1 infeasible requirement
>> 
>> ```
>> Addressing and routing in the IOAM Overlay Network are to be configured so
>> that
>> the IP-in-IPv6 encapsulated packets follow the same path as the original,
>> non-encapsulated packet would have taken. ```
>> 
>> This doesn't seem to be feasible in the face of ECMP.
>> 
>> ### Section 5.4.2, wording
>> 
>> ```
>> In this case IOAM can be encapsulated in as an extension header in the tunnel
>> (outer) IPv6 header. ```
>> 
>> Is the "as" unintended in the quoted text? If so, please remove it, if not, I
>> don't understand the meaning.
>> 
>> ## NITS
>> 
>> ### Section 5.1
>> 
>> "if IOAM is used in in transit devices"
>> 
>> s/in in/in/
>> 
>> ### Section 5.4
>> 
>> "This section lists out"
>> 
>> Just "lists", no "out".
>> 
>> ### 5.4.1
>> 
>> "almost close to zero"
>> 
>> I assume you mean either "almost zero" or "close to zero". Because as written,
>> I would parse "almost close to zero" as "not close to zero" which is probably
>> not what you're going for.
>> 
>> ## Notes
>> 
>> This review is in the ["IETF Comments" Markdown format][ICMF], You can use
>> the
>> [`ietf-comments` tool][ICT] to automatically convert this review into
>> individual GitHub issues.
>> 
>> [ICMF]: https://urldefense.com/v3/__https://github.com/mnot/ietf-comments/blob/main/format.md__;!!NEt6yMaO-gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2jcU_QikNttNa1riQo4wYhBw$
>> [ICT]: https://urldefense.com/v3/__https://github.com/mnot/ietf-comments__;!!NEt6yMaO-gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2jcU_QikNttNa1riSkUdWP9w$
>> 
>> 
>