Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Tue, 21 February 2023 12:55 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88778C14F72D; Tue, 21 Feb 2023 04:55:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.896
X-Spam-Level:
X-Spam-Status: No, score=-11.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="blRRx8bK"; dkim=pass (1024-bit key) header.d=cisco.com header.b="CFK3le9i"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e4jIwZvcu6di; Tue, 21 Feb 2023 04:55:41 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90C55C151532; Tue, 21 Feb 2023 04:55:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25104; q=dns/txt; s=iport; t=1676984141; x=1678193741; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=7DaZTZEdVFh1Fd3LAPFghnNpUQEngKxVepaA+k+/MWU=; b=blRRx8bKLRar1fjIBZZ0gYqVBDr/gcEvbRSbjjd37uCL8J38oNurC2By s1TxHYclznj3ghlDPvZBohbZgb1Bal0EW6V2P1DB5TxmXjd4kxYyk4iQk MyN9Vbry16jF19mqq4329/ba0poBoS0Cg2FDM3cZlGvQx1S3LrVZbFC6t k=;
X-IPAS-Result: A0AIAACTvfRjmJFdJa1QChsBAQEBAQEBAQUBAQESAQEBAwMBAQFAgTsGAQEBCwGBWlKBBwJZOkYEhE6DTAOEUF+IIgORC4sMgSyBJQNWDwEBAQ0BATkLBAEBhQUCFoUVAiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFOwYnDYZVAQEBAQMSEREMAQElEgELBAIBCA4DBAEBAQICJgICAjAVCAgCBA4FCBMHglwBgyIDAQ+fCAGBPwKKH3qBMoEBgggBAQYEBJ8fAwaBFCwBiRaDb4MWgREnG4FJRIEVQ4FmgQE+gmICgTMEK4NWOYIugQuKIoohCoE0doEjDoFCgQkCCQIRRyqBFghoggMiNwNEHUADCzs6PzULCyEFBCQBNGwwJAUDCxUqRwQINgUGGzQRAggPEg8GJkMOQjc0EwZcASkLDhEDToFHBC9EgRcKAgQBKCaYDz8tBg8fECYBAw0HBAUSAyEEHi0OFggKEysCBwENIwUBAQEOHgEBChGSNi6DE0arPQmBLQqDd4tijgaHKBaDeUmMGZd3YpdWjVKVDA4KhHgCBAIEBQIOAQEGgWI6gVtwFYMiUhkPgzqKZgkDDQkVgzuFFI9DdQI5AgcBCgEBAwmIF4JZAQE
IronPort-PHdr: A9a23:THPfSRTJJrlMTsTk4hZTR0pbutpso7vLVj580XJvo75Nc6H2+ZPkM QSf4Ph2l1bGUM3d7O4MkOvZta3sGAliqZaMuXwPatpAAhkCj8hFkwkpGsXQD0r9IbbjZDA7G 8IXUlhj8jm7PEFZFdy4aUfVpyi57CUZHVP0Mg8mTtk=
IronPort-Data: A9a23:lQr356lNgnA6JhfvAO3aMSjo5gxcJkRdPkR7XQ2eYbSJt1+Wr1Gzt xJODGHXOf/cNjfxKd5za9+38U1V6JDXmtI3TVdv+yA2Q1tH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuKU5NXsZ2YgGmeIdA970Ug4w7Rj29Yy6TSEK1rlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJM53yZWKEpfNatI88thW6 Ar05OrREmvxp3/BAz4++1rxWhVirrX6ZWBihpfKMkSvqkAqm8A87ko0HKQ4cFdLpiSIpYF8l I1fv6GhTCciHJSZzYzxUzEAe81/FbdN9LmCKn+lvInCiUbHaHDrhf5pCSnaP6VBpb0xWj4Ip KdecWxQBvyAr7reLLaTRON2gc8gKsTDN4IEsXYmxjbcZRojacqTEv+bu48GtNs2rp9wPc/4e dM1UhRuSjHiSCZyKFElKqtryY9EgVGmI2EH9zp5v5Ef5mHJxxFqlrntNNPPUtGQRM5OhUGe4 GnB+gzRAwkCMfSexCaLtHW2iYfnnDvjXccZFLS57OVCgVCPyCoUEhJ+fVehqPelz0+zR9waK lQM/28vqqE3sU2zUIe4WAWkoXmCpTYdVsZeVeog52mly6fP7C6YC3QKCDlbZ7QOtsAtbT430 F6RksmvAzFz2IB5UlqH/buS6Di1IyVQfCkJZDQPSk0O5NyLTJwPYgznEPJ6ALKYn9zPSDysm yKAkTk7p74xtJtev0mkxmzvjzWpr5nPawc64ATLQ26ohj+Vgqb4POREDnCGsZ59wJalokqp5 ydbxpDPhAwaJdTcy3zXGbRl8KSBvq7daFXhbUhT847NHglBFla5doxWpTp5PkosY4APeCTiZ wnYvgY5CH5v0JmCM/cfj2GZUpRCIU3c+TLNDaq8gj1mOcAZSeN/1HsyDXN8Jki0+KTWrYkxO I2AbeGnBmsABKJswVKeHrlCj+5ymXBlnD+JGPgXKihLN5LDOBZ5rp9YbjOzghwRt8toXS2Mq Y8EbpvWo/mheLKgPkE7DrL/3XhTfSRkWvgaWuRcd/WIJUJ9CXo9BvrKqY7NiKQ795m5Ytzgp ynnMmcBkQKXrSSedW2iNCs5AJuxBskXkJ7OFXF2Vbpe8yJ9Md/HAWZ2X8ZfQITLA8Q6k68uF 6NZKprbahmNIxyekwkggVDGhNQKXHyWacimZUJJvBBXk0ZcejH0
IronPort-HdrOrdr: A9a23:1HjJpa08qg3P+Gamp8OFTAqjBQZyeYIsimQD101hICG9Lfb3qy n+ppsmPEHP5Ar5AEtQ5expOMG7MBfhHO1OkPYs1NCZLUXbUQqTXcxfBO7ZogEIdBeOjtK1uZ 0QEZSWTeeAcGSS7vyKrzVQcexQu+VvmZrA7Yy1ohcdLj2CKZsQlTuRYTzrdXGeMTM2fKbRY6 DsgPavyQDQHEg/X4CePD0oTuLDr9rEmNbNehgdHSMq7wGIkHeB9KP6OwLw5GZRbxp/hZMZtU TVmQ3w4auu99uhzAXH6mPV55NK3PP819p4AtCWgMR9EESstu/oXvUgZ1SxhkF2nAid0idurD AKmWZlAy1H0QKTQohym2qr5+Cv6kdp15ao8y7nvZKqm72JeNt9MbsZuWqcGSGpsHbJe7pHof p2NiuixupqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MQiFW5uYeE99RjBmckaOf grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgEl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjnwgo+y5K9w6PCheZQOwpd3kJ PdUElAvWp3YE7qAd3m5uw9zvkMehTIYd3A8LAq23EigMyOeFPCC1zwdGwT
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.97,315,1669075200"; d="scan'208";a="28929686"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 Feb 2023 12:55:40 +0000
Received: from mail.cisco.com (xfe-rcd-002.cisco.com [173.37.227.250]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 31LCte4e004143 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 21 Feb 2023 12:55:40 GMT
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Tue, 21 Feb 2023 06:55:39 -0600
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Tue, 21 Feb 2023 06:55:39 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y9MM3xxCy7lriUdJ0gw0LqEduUNvmdiQhp7sdD5RK3wYfD9MJCrAxbcve1GY/fsVTEtOAwHSd8YrWFpWszpQkq/5DKrs98nRmD1Y+otABqUOlVvTwTzqam+bTqBcK2E1lKjA0K3U/kUKHoi1lUOIrHp0+4o731+uSDIRGZxSG0TUw9o7YoWLxDb0d4Q5lFbA8hzSrx8B58jMWStPXswBFwKK10qnBMLlYqKNaNj0vDW9Ru6p4/y/Hp3HQmsk/v1XM3Jf9s1vA3tqZm8EDHrwHGJFfGoGksh/Sz4QyP6EPCnh2Dy+ARG0APi7pYz2+8i8/LxO9S6DwZqPiKvxiTb6/Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7DaZTZEdVFh1Fd3LAPFghnNpUQEngKxVepaA+k+/MWU=; b=Og8xE6tw6WaEsOblnnpyTwxBd5KjDXLtZYHEliK4cAApa4BuVwfQHvPqHxqRo6xPHi8HLnZg1dcZ28ZTnohDLv86iR0vwx3rtn5ThZN9NSTo3+RAamsQXBJ6o4ZMcs/U6FQ0xsP/JyAk6H6W3HsNvrgUSbp0xeB4f8BtjWj7LFdiomzf6F3qWEOd1ugopoXIRi4U35HawI0fzryTt36DDNOjhFoqX86gvOtSfEWqUTMDhMyMgyCdDBIc1RXZfWwbJMUDSExFzLgitAY0CbQSaUK51ZM7st5I+BunEpq9bMmS+iZD4NkccN+e7enkaqNHSNdpbUhJtF0p3iIu/zhHEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7DaZTZEdVFh1Fd3LAPFghnNpUQEngKxVepaA+k+/MWU=; b=CFK3le9iLFR57ROWphU9SnTdWsyrBv1WjwfZITLACkJXC3Z4Sdl1wt7mNQTgZiVyCl8nsMoWV6t+dwAhYYhtb9no/k3iKR+zlh7kCMTqmmLMcAbCha5uF+ym0L15meukz3ebWGBsXca3o9RNb4I6yhYMSmeHHWgTtSedE1Yj9hk=
Received: from MWHPR11MB1311.namprd11.prod.outlook.com (2603:10b6:300:2a::14) by MW4PR11MB5799.namprd11.prod.outlook.com (2603:10b6:303:181::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6111.21; Tue, 21 Feb 2023 12:55:37 +0000
Received: from MWHPR11MB1311.namprd11.prod.outlook.com ([fe80::c45e:69ab:8f7d:e3ef]) by MWHPR11MB1311.namprd11.prod.outlook.com ([fe80::c45e:69ab:8f7d:e3ef%4]) with mapi id 15.20.6111.021; Tue, 21 Feb 2023 12:55:36 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: John Scudder <jgs@juniper.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-ippm-ioam-ipv6-options@ietf.org" <draft-ietf-ippm-ioam-ipv6-options@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, "marcus.ihlar@ericsson.com" <marcus.ihlar@ericsson.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
Thread-Index: AQHZBCMbZaD8l7QZWUCJk4hc9sQSvK6GsxGAgFIa94CAAREKEA==
Date: Tue, 21 Feb 2023 12:55:36 +0000
Message-ID: <MWHPR11MB1311B5671057A984D9CA5288DAA59@MWHPR11MB1311.namprd11.prod.outlook.com>
References: <166974767573.42018.13628264024826514580@ietfa.amsl.com> <MWHPR11MB1311CFE4C49C480E6911D145DAF09@MWHPR11MB1311.namprd11.prod.outlook.com> <219FA35A-0A24-4D88-8EE3-09392BCE2118@juniper.net>
In-Reply-To: <219FA35A-0A24-4D88-8EE3-09392BCE2118@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MWHPR11MB1311:EE_|MW4PR11MB5799:EE_
x-ms-office365-filtering-correlation-id: f312cc18-0021-46be-c0e1-08db140aed49
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MWHPR11MB1311.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(136003)(346002)(396003)(376002)(39860400002)(366004)(451199018)(5660300002)(30864003)(52536014)(53546011)(8936002)(2906002)(41300700001)(54906003)(66574015)(7696005)(966005)(478600001)(316002)(66946007)(4326008)(6916009)(76116006)(66556008)(26005)(9686003)(186003)(6506007)(64756008)(66476007)(8676002)(66446008)(71200400001)(38070700005)(38100700002)(33656002)(86362001)(55016003)(83380400001)(122000001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 5leIci4mAFozGXJnBkF1ZbuXj+i+uvNJnQ+ksNH92vmuc63y8pzoDj1xx79IWluHWFDihU25hx3aiVrhexbqkw85bZdL0sfpgpEvpkGMgvV4pTyv+D4WeCAunScOEU2zMf/fhyVZg0Vr9Q9n58EnJ0YbZ2wJ9LgEpr0lAtdwax//Xnlo4S/AAXe5wH5yJyyzkMjbdV5pjnftzn8X+mKAJGs/a/1k8CyYcRV5JcPHrsvB/s8OHKR2oMYPJLXadNeL3Li/zevFf93SKtnJI4V9Yup5sKK2HzqciR5nBlifJ+aqy3XANFl4GB4LZjw7VVOj3rCisz73oJA27mLiHovGQIKrgZIGT8yD+X9raVjEfBvvlM5Tjn+M/4yb+mMgYWAxUj+0LsBF5rBLeqtXMBVNsLCDRNJ4kdxV5h5q5ubCegeNEJCVRWBj4qA/S1w/UXvzu51ezZxtsk2SJVUcMD9SzuWzBij5tlJ0MHtWMtLaL/qDmJyXA1jndQ/Ga8ps15b37wUlltcFUZxCI+RpSVWyEOlMniJlWR9pWbJcdZXSQs9I3QU/E3R9ud312JML2JjsuNou7xpggqxdhcnH0+u09JMRLKev2b8h1WfD5D0FDCOoBhfFyKLmNXqSU0T9PUPTbOuxiVclOOAgR3kwvH5EeAc2KO/erRcyl2UjrcSR0MlqpnCU+VT7k6D+OI1IkjgMnl3BYmxBVE7JzJmXVzoxP9459PuIS3tvcIshNjxc1RCSeSubJpeuYd5YzoEAqyd5Qw8bjrmqq9kbIWYuiIVymBSB2gTx2xA4yyBSWIe3sJF3YRm/rUd6laOkkV6Yc4v0ZlfJ+U9ozssEBEJANxSZdiZT+2z54MEguwGAQgM5gU5/7/5bscsnbRlzr/4ibhuI7dUourhQ1EiPWSIq4jeZba6PLm//p+jFfluxbSDH24cOg9qZ6gN0fQcaI9ylM731xFXo7Xa9Vo8HFe89E/2byp9XeWsCqbg6ufMQlS2DI0MpPhqOG7LOei5be6moHxhp8eiAzsq/taZ3cc6E/HapUl4Ebkuzn0X8m5yuY83w1j6lL4SUhvC9HHH34+UCCjRDbkHrjVimYSJqWJ+OWZekW7BjSK10bOmi5hOzPdqf+RrsPiPDN3UKfoKk4OV5UvX0EKQECwGb6L+ZzOsL+WVJC4F2jLxoWaRPZPKgICmxR6XLXFEXzUzPbGOjJb6YxByGtUsY+lqGEoyeBWUMnCQ4ZTfKwCZLg4tKyCcP8BU9NVwFX5TlTrOAEq7yqGmXdajL0W+XYtin4c/EhWOC0ZztwhIzfv4Wgniuz4kSCd//Yg3inHS7rY1Ubq8SRciT8u098riuHvgfBRmMYL2AEXtTCqOsZhM3zekQdfZj2Mt005WABxIzCOOqfMjGh7HBYca6p2YzPrWidTfxlmGXNi2ieBu8IUx/7z1tz2+X+9gks1b/Ae1qFnx9QK7sbNJXtyBzGt7VJPKqeUTZgTY56sV41P2JDOAVmdO1TOdnlXx0sg8v5L5MN3VwOV2qkE/HaNqtfxZBLIHbDr14nIdylCjvrZ/pUOQSTBvjVPezNmRPxVKhc3q6cltWrD+pze9JoRpK
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR11MB1311.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f312cc18-0021-46be-c0e1-08db140aed49
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Feb 2023 12:55:36.5850 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OOSjIq4yktabmIarUDOPDMaWf3JEMlpM9Gn9w3Qc5z774CzK81f5k441sfgxy3CNwFD+ur8VqbTF08VfCEmcVA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR11MB5799
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.250, xfe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/MKpznm9TYM0iArdRhzQLDBFjle8>
Subject: Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Feb 2023 12:55:46 -0000

Hi John,

Thanks. We're almost done with creating a new revision. We hope to publish -10 shortly.

Cheers, Frank

> -----Original Message-----
> From: John Scudder <jgs@juniper.net>
> Sent: Monday, 20 February 2023 21:38
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> Cc: The IESG <iesg@ietf.org>; draft-ietf-ippm-ioam-ipv6-options@ietf.org;
> ippm-chairs@ietf.org; ippm@ietf.org; marcus.ihlar@ericsson.com
> Subject: Re: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09:
> (with DISCUSS and COMMENT)
> 
> Hi Frank,
> 
> I was revisiting old DISCUSSes and see I didn’t reply to you on this, sorry for that.
> The approach you describe makes sense to me. I’ll look forward to reviewing the
> next version if this is how you still plan to proceed.
> 
> Please let me know if you’re waiting on me for anything.
> 
> Regards,
> 
> —John
> 
> > On Dec 30, 2022, at 10:30 AM, Frank Brockners (fbrockne)
> <fbrockne@cisco.com> wrote:
> >
> > Hi John,
> >
> > Thanks a lot for your review and comments.
> >
> > Per the discussion in the IESG telechat: I can understand your frustration with
> draft-ietf-ippm-ioam-ipv6-options-09. Sorry for that. Part of the vagueness you
> noted stems from the fact that the document  is a merger of two documents:
> > * one which was focused on allocating two code points for v6 options
> > (draft-ioametal-ippm-6man-ioam-ipv6-options)
> > * one which was focused on deployment considerations
> > (draft-ioametal-ippm-6man-ioam-ipv6-deployment)
> > where the second document was just to provide additional information and
> context for the first one.
> > As a result, section 5 turned out to be a set of considerations, that never got
> turned into a proper set of requirements.
> >
> > We could consider splitting the document up again - into a standards track doc
> that allocates the code points - and an informational document which discusses
> deployment aspects, though the IPPM WG originally felt like combining the
> documents was the way to go.
> >
> > Assuming that the we'd stay with a single document, my suggestion
> > would be to clean up section 5.1 and
> > * use references to other documents, such as RFC 9197, RFC8799, or
> > draft-ietf-ippm-ioam-deployment where applicable
> > * switch from "considerations" to "requirements" and be more specific
> >
> > In particular:
> > C1 - Change to a reference to draft-ietf-ippm-ioam-deployment
> > C2 - Keep (the section already uses formal requirements language) - and adjust
> the wording per Eric Vyncke's suggestions.
> > C3 - Keep - and clarify the wording ("entities") per your note below
> > C4, C5 - Refer to RFC 9197 and explicitly restate that IOAM only
> > applies to limited domains per RFC8799
> > C6 - Reword as a requirement.
> > C7 - Expand/Clarify, pending the discussion on the applicability of the
> incremental trace option for IOAM with v6.
> >
> > With that approach, we would also avoid the discussion and potential
> restatements of "how to ensure that a limited domain does not leak packets" in
> this document, i.e. the current topics C4 and C5. The document would rather
> make use of the already existing definition of a limited domain (in RFC8799) and
> its associated qualities.
> >
> > Is this an acceptable approach? If so, we'll create a revision which also
> addresses your other comments (your comments on section 4 are really helpful -
> and can be woven into the next rev).
> >
> > Thanks again, Frank
> >
> >>
> >> ---------------------------------------------------------------------
> >> -
> >> DISCUSS:
> >> ---------------------------------------------------------------------
> >> -
> >>
> >> # John Scudder, RTG AD, comments for
> >> draft-ietf-ippm-ioam-ipv6-options-09
> >> CC @jgscudder
> >>
> >> ## DISCUSS
> >>
> >> As noted in
> >> https://urldefense.com/v3/__https://www.ietf.org/blog/handling-iesg-
> ballot-positions/__;!!NEt6yMaO-
> gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2jcU_QikNt
> tNa1riQzmGyk0g$ , a DISCUSS ballot is a request to have a discussion on the
> following topics:
> >>
> >> ### Structure of the document; Section 5 is vague
> >>
> >> The first part of the document, through Section 4, is unproblematic
> >> for me -- you're simply allocating some IPv6 extension header option
> >> types and defining how to use them to transport fields you defined in RFC
> 9197. Fine.
> >>
> >> But Section 5 is giving me a headache. For some reason, even though
> >> this is a Standards Track document, you've structured it as some
> >> rather high-level "considerations" (or are they "requirements"? It's
> >> unclear) and then some generally-worded polite suggestions about how
> >> you could deploy it this way or that way.
> >>
> >> Is there some reason you've shied away from being prescriptive in
> >> Section 5? As the document stands, I felt a bit like I'd been
> >> presented with a puzzle. "The solution of this problem is left as an
> >> exercise for the student" is great in textbooks, but not so wonderful in
> Standards Track documents.
> >>
> >> ### Section 5.1, C5 is problematic
> >>
> >> ```
> >> An Autonomous System (AS) that inserts and leaks the IOAM data needs
> >> to be easy to identify for the purpose of troubleshooting, due to the
> >> high complexity in identifying the source of the leak. Such a
> >> troubleshooting process might require coordination between multiple
> >> operators, complex configuration verification, packet capture
> >> analysis, etc. This requirement may require additional option or
> >> fields to be defined to identify the domain that inserted the IOAM
> >> data, this is out of the scope of this document. ```
> >>
> >> First, just as in C4, the underlying assumption that it's OK if an AS
> >> "leaks the IOAM data" appears problematic.
> >>
> >> Second, how can you both say "this is a requirement" and in the same
> >> paragraph "it's out of scope"? Surely, if this functionality is
> >> required, a finished spec is required to support it. And if the spec
> >> isn't finished, we shouldn't be advancing it, the WG should take it
> >> up and finish it, then send it back when done.
> >>
> >> Is it that this isn't truly a requirement? Or is the spec incomplete?
> >> If neither, please help me understand.
> >>
> >>
> >> ---------------------------------------------------------------------
> >> -
> >> COMMENT:
> >> ---------------------------------------------------------------------
> >> -
> >>
> >> ## COMMENTS
> >>
> >> These comments are non-blocking, but I'd still appreciate responses.
> >>
> >> ### Section 4, a particular interface
> >>
> >> ```
> >> Unless a particular interface is explicitly enabled (i.e., explicitly
> >> configured) for IOAM, a router MUST ignore IOAM Options. ```
> >>
> >> I suppose what you mean is, the router MUST ignore IOAM Options on
> >> packets received on that interface? If so, please say so. (If not,
> >> let's discuss.)
> >>
> >> ### Section 4, reference for IOAM Type, nomenclature
> >>
> >> ```
> >> IOAM Type: 8-bit field as defined in section 7.1 in [RFC9197].
> >> ```
> >>
> >> Section 7.1 of RFC 9197 is the IOAM Option-Type Registry in the IANA
> >> Considerations section. I wouldn't say an IANA registry "defines"
> >> anything, it lists code points. I think a better reference would be
> >> Section 4 of 9197, which does indeed define IOAM-Option-Types (in Section
> 4.1).
> >>
> >> Also, it would be better to be consistent with your naming, in RFC
> >> 9197 you don't call this the "IOAM Type" but rather the
> >> "IOAM-Option-Type" (34 occurrences in 9197) or "IOAM Option-Type"
> >> without the first hyphen (4 occurrences in 9197). I see why you don't
> >> want to use the full string from RFC
> >> 9197 in your packet diagram (too many characters) but "IOAM-Opt-Type"
> >> would fit in the character budget.
> >>
> >> ### Section 4, Trace-Type constraints
> >>
> >> ```
> >> In addition, to maintain IPv6 extension header 8-octet alignment and
> >> avoid the need to add or remove padding at every hop, the Trace-Type
> >> for Incremental Trace Option in IPv6 MUST be selected such that the
> >> IOAM node data length is a multiple of 8-octets. ```
> >>
> >> I spent some time trying to understand exactly what it means for the
> >> Trace-Type to be selected such that, etc. I suppose this isn't too
> >> complicated in the end, since all the types defined in RFC 9197 are either
> four- or eight-byte fields.
> >> I don't see an explicit pad field being defined, though, so I wonder
> >> if it would be a helpful hint to note that the Opaque State Snapshot
> >> with Length 0 and Schema ID 0xFFFFFF can be used as a four-octet pad
> >> if needed. I see you use 0xFFFFFFFF as a pad in some places in RFC
> >> 9197, but there's no corresponding Trace-Type and it doesn't seem
> >> prudent to just poach a currently undefined bit to indicate the pad.
> >> I guess the other alternative would be to allocate a new Trace-Type
> >> bit to explicitly indicate a four-byte pad field, but given you can use Opaque
> State for this purpose, I don't see why you'd burn the bit.
> >>
> >> Anyway, if I've missed some explicit way eight-byte alignment is
> >> supported in RFC 9197, please point it out to me? Otherwise, I think
> >> you need to be clearer about this, to discourage implementors from
> exercising "creativity".
> >>
> >> ### Section 5.1, C3, entities that communicate the errors
> >>
> >> ```
> >> The entities that communicate the errors to devices outside of the
> >> IOAM domain MUST remove any IOAM data from the packet included in the
> >> error message ```
> >>
> >> This is quite non-specific. Who are “the entities“ in this context?
> >> The host or router that originates the ICMP report? The router that
> >> forwards it outside the domain? If the former, I guess that means
> >> every entity within the domain that might originate an ICMP message
> >> has to know a priori if it's sending its message to an internal or
> >> external recipient. If the latter, that's a notable new requirement on border
> routers.
> >>
> >> ### Section 5.1, C4 violates closed domain
> >>
> >> ```
> >> OAM data leaks can affect the forwarding behavior and state of
> >> network elements outside an IOAM domain. IOAM domains MUST provide a
> >> mechanism to prevent data leaks or be able to ensure that if a leak
> >> occurs, network elements outside the domain are not affected (i.e.,
> >> they continue to process other valid packets).
> >> ```
> >>
> >> I have a few difficulties with C4. Among them --
> >>
> >> - The first sentence is quite nonspecific, I don't know if you have
> >> some actual failure modes in mind but I suppose you must. Can you
> >> elucidate? - The second sentence, starting with "or", appears to
> >> violate the limited domain assumption, or at the least, it introduces
> >> a creative understanding of it ("go ahead and leak as long as you're
> >> sure the leaks are fine"). - I don't understand how an operator could
> >> possibly fulfill the "or" clause with confidence since by definition
> >> whatever is happening outside the border of the limited domain is not under
> the control of, or even necessarily known to, the operator.
> >>
> >> My guess is that you're trying to motivate the ULA deployment option
> >> here, without talking about it specifically. Is that right?
> >>
> >> ### Section 5.1, C6 is inaccurate
> >>
> >> ```
> >> Compliance with [RFC8200] requires OAM data to be encapsulated
> >> instead of header/option insertion directly into in-flight packets
> >> using the original IPv6 header. ```
> >>
> >> I don't think you mean the OAM data (by which I think you mean IOAM
> >> data) needs to be encapsulated, but rather that it needs to be within
> >> an encapsulation header? That's what's implied by your Deployment
> >> Options section, anyway. If so, please say so, if not, let's discuss.
> >>
> >> Assuming I've guessed correctly, a possible rewrite could look
> >> something like
> >>
> >> ```
> >> [RFC8200] precludes insertion of IOAM data directly into the original
> >> IPv6 header of in-flight packets. Therefore, in order to add IOAM
> >> data, in-flight packets must be encapsulated in an outer header, and
> >> the IOAM data added to that header. ```
> >>
> >> ### Section 5.1, C7, wording
> >>
> >> ```
> >> Hence when the IOAM Incremental Trace Option-Type is used in the
> >> deployment the RemainingLen field of the option MUST follow the
> >> guidance in [RFC9197] and must be computed and set appropriately. ```
> >>
> >> I assume you mean "used in deployment" and didn't intend the definite
> >> article (which would imply you're talking about a specific
> >> deployment). But I think instead of just dropping "the", you might as
> >> well go ahead and drop "in the deployment" (where else is it going to
> >> be used after all, where this guidance wouldn't apply?).
> >>
> >> ### Section 5.1, C7, lack of specificity
> >>
> >> ```
> >> The IOAM Incremental Trace Option-Type expands the option length that
> >> may affect the processing of extension headers and options that
> >> follow IOAM options. Hence when the IOAM Incremental Trace
> >> Option-Type is used in the deployment the RemainingLen field of the
> >> option MUST follow the guidance in [RFC9197] and must be computed and
> >> set appropriately. ```
> >>
> >> What guidance, exactly, is supposed to be followed? I dug around in
> >> RFC 9197 and the best guess I could come up with is
> >>
> >> ```
> >> The sender MAY calculate the value of the RemainingLen field by
> >> computing the number of node data bytes allowed before exceeding the
> >> PMTU, given that the PMTU is known to the sender. ```
> >>
> >> I'm not very happy with that guess, because it doesn't seem to be
> >> responsive to the problem you've posed. What I've quoted from RFC
> >> 9197 is a way to avoid exceeding the PMTU, but in the present
> >> document you've posed the concern that if you shove too much data
> >> into the IOAM header, other extension headers may be ignored. That's
> >> not the same as PMTU, which relates to total packet size, not header
> >> options size.
> >>
> >> Whatever it is you're trying to do here, I think you need to be more
> >> specific about it.
> >>
> >> ### Section 5.2, encapsulation?
> >>
> >> ```
> >> For deployments where the IOAM domain is bounded by hosts, hosts will
> >> perform the operation of IOAM data field encapsulation and
> >> decapsulation. ```
> >>
> >> Do you intend to imply that the hosts at the edge of the domain are
> >> sending
> >> IP-in-IPv6 encapsulated data? It wouldn't seem to be required; since
> >> the hosts are the source/sink of the packets, the problem described
> >> in C6 doesn't apply, and the host can directly place the IOAM data in
> >> the header. (What would be the "inner header" in an overlay
> >> solution.)
> >>
> >> I suppose it's technically accurate to describe this as an
> >> "encapsulation and decapsulation" operation, insofar as any data
> >> placed in any header might be said to be encapsulated in that header
> >> -- but it's misleading. I think this section needs to be rewritten to
> >> make the meaning plain. For example, something like "... hosts will
> >> place the IOAM data field directly in the IPv6 header."
> >> (You could say "outer IPv6 header" since there's nothing precluding a
> >> host from sending tunneled packets for some purpose.)
> >>
> >> (I notice Éric Vyncke raises a similar concern about the
> >> nontraditional use of the term "encapsulation" in his comments.)
> >>
> >> ### Section 5.3, encapsulation again
> >>
> >> This one is less misleading, but by analogy to 5.2 I suspect more
> >> clarity is required here too.
> >>
> >> ```
> >> For deployments where the IOAM domain is bounded by network devices,
> >> network devices such as routers form the edge of an IOAM domain.
> >> Network devices will perform the operation of IOAM data field
> >> encapsulation and decapsulation. ```
> >>
> >> For example, a more straightforwardly understandable version of the
> >> last sentence might be "Network devices will encapsulate in-flight
> >> packets in an outer IPv6 header which carries the IOAM data field."
> >>
> >> ### Section 5.4.1 infeasible requirement
> >>
> >> ```
> >> Addressing and routing in the IOAM Overlay Network are to be
> >> configured so that the IP-in-IPv6 encapsulated packets follow the
> >> same path as the original, non-encapsulated packet would have taken.
> >> ```
> >>
> >> This doesn't seem to be feasible in the face of ECMP.
> >>
> >> ### Section 5.4.2, wording
> >>
> >> ```
> >> In this case IOAM can be encapsulated in as an extension header in
> >> the tunnel
> >> (outer) IPv6 header. ```
> >>
> >> Is the "as" unintended in the quoted text? If so, please remove it,
> >> if not, I don't understand the meaning.
> >>
> >> ## NITS
> >>
> >> ### Section 5.1
> >>
> >> "if IOAM is used in in transit devices"
> >>
> >> s/in in/in/
> >>
> >> ### Section 5.4
> >>
> >> "This section lists out"
> >>
> >> Just "lists", no "out".
> >>
> >> ### 5.4.1
> >>
> >> "almost close to zero"
> >>
> >> I assume you mean either "almost zero" or "close to zero". Because as
> >> written, I would parse "almost close to zero" as "not close to zero"
> >> which is probably not what you're going for.
> >>
> >> ## Notes
> >>
> >> This review is in the ["IETF Comments" Markdown format][ICMF], You
> >> can use the [`ietf-comments` tool][ICT] to automatically convert this
> >> review into individual GitHub issues.
> >>
> >> [ICMF]:
> >> https://urldefense.com/v3/__https://github.com/mnot/ietf-comments/blo
> >> b/main/format.md__;!!NEt6yMaO-
> gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_
> >> XY1jCzk9LXQr32P_G_2jcU_QikNttNa1riQo4wYhBw$
> >> [ICT]:
> >> https://urldefense.com/v3/__https://github.com/mnot/ietf-comments__;!
> >> !NEt6yMaO-
> gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2j
> >> cU_QikNttNa1riSkUdWP9w$
> >>
> >>
> >