Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Tue, 21 February 2023 12:55 UTC
Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88778C14F72D; Tue, 21 Feb 2023 04:55:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.896
X-Spam-Level:
X-Spam-Status: No, score=-11.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="blRRx8bK"; dkim=pass (1024-bit key) header.d=cisco.com header.b="CFK3le9i"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e4jIwZvcu6di; Tue, 21 Feb 2023 04:55:41 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90C55C151532; Tue, 21 Feb 2023 04:55:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25104; q=dns/txt; s=iport; t=1676984141; x=1678193741; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=7DaZTZEdVFh1Fd3LAPFghnNpUQEngKxVepaA+k+/MWU=; b=blRRx8bKLRar1fjIBZZ0gYqVBDr/gcEvbRSbjjd37uCL8J38oNurC2By s1TxHYclznj3ghlDPvZBohbZgb1Bal0EW6V2P1DB5TxmXjd4kxYyk4iQk MyN9Vbry16jF19mqq4329/ba0poBoS0Cg2FDM3cZlGvQx1S3LrVZbFC6t k=;
X-IPAS-Result: A0AIAACTvfRjmJFdJa1QChsBAQEBAQEBAQUBAQESAQEBAwMBAQFAgTsGAQEBCwGBWlKBBwJZOkYEhE6DTAOEUF+IIgORC4sMgSyBJQNWDwEBAQ0BATkLBAEBhQUCFoUVAiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFOwYnDYZVAQEBAQMSEREMAQElEgELBAIBCA4DBAEBAQICJgICAjAVCAgCBA4FCBMHglwBgyIDAQ+fCAGBPwKKH3qBMoEBgggBAQYEBJ8fAwaBFCwBiRaDb4MWgREnG4FJRIEVQ4FmgQE+gmICgTMEK4NWOYIugQuKIoohCoE0doEjDoFCgQkCCQIRRyqBFghoggMiNwNEHUADCzs6PzULCyEFBCQBNGwwJAUDCxUqRwQINgUGGzQRAggPEg8GJkMOQjc0EwZcASkLDhEDToFHBC9EgRcKAgQBKCaYDz8tBg8fECYBAw0HBAUSAyEEHi0OFggKEysCBwENIwUBAQEOHgEBChGSNi6DE0arPQmBLQqDd4tijgaHKBaDeUmMGZd3YpdWjVKVDA4KhHgCBAIEBQIOAQEGgWI6gVtwFYMiUhkPgzqKZgkDDQkVgzuFFI9DdQI5AgcBCgEBAwmIF4JZAQE
IronPort-PHdr: A9a23:THPfSRTJJrlMTsTk4hZTR0pbutpso7vLVj580XJvo75Nc6H2+ZPkM QSf4Ph2l1bGUM3d7O4MkOvZta3sGAliqZaMuXwPatpAAhkCj8hFkwkpGsXQD0r9IbbjZDA7G 8IXUlhj8jm7PEFZFdy4aUfVpyi57CUZHVP0Mg8mTtk=
IronPort-Data: A9a23:lQr356lNgnA6JhfvAO3aMSjo5gxcJkRdPkR7XQ2eYbSJt1+Wr1Gzt xJODGHXOf/cNjfxKd5za9+38U1V6JDXmtI3TVdv+yA2Q1tH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuKU5NXsZ2YgGmeIdA970Ug4w7Rj29Yy6TSEK1rlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJM53yZWKEpfNatI88thW6 Ar05OrREmvxp3/BAz4++1rxWhVirrX6ZWBihpfKMkSvqkAqm8A87ko0HKQ4cFdLpiSIpYF8l I1fv6GhTCciHJSZzYzxUzEAe81/FbdN9LmCKn+lvInCiUbHaHDrhf5pCSnaP6VBpb0xWj4Ip KdecWxQBvyAr7reLLaTRON2gc8gKsTDN4IEsXYmxjbcZRojacqTEv+bu48GtNs2rp9wPc/4e dM1UhRuSjHiSCZyKFElKqtryY9EgVGmI2EH9zp5v5Ef5mHJxxFqlrntNNPPUtGQRM5OhUGe4 GnB+gzRAwkCMfSexCaLtHW2iYfnnDvjXccZFLS57OVCgVCPyCoUEhJ+fVehqPelz0+zR9waK lQM/28vqqE3sU2zUIe4WAWkoXmCpTYdVsZeVeog52mly6fP7C6YC3QKCDlbZ7QOtsAtbT430 F6RksmvAzFz2IB5UlqH/buS6Di1IyVQfCkJZDQPSk0O5NyLTJwPYgznEPJ6ALKYn9zPSDysm yKAkTk7p74xtJtev0mkxmzvjzWpr5nPawc64ATLQ26ohj+Vgqb4POREDnCGsZ59wJalokqp5 ydbxpDPhAwaJdTcy3zXGbRl8KSBvq7daFXhbUhT847NHglBFla5doxWpTp5PkosY4APeCTiZ wnYvgY5CH5v0JmCM/cfj2GZUpRCIU3c+TLNDaq8gj1mOcAZSeN/1HsyDXN8Jki0+KTWrYkxO I2AbeGnBmsABKJswVKeHrlCj+5ymXBlnD+JGPgXKihLN5LDOBZ5rp9YbjOzghwRt8toXS2Mq Y8EbpvWo/mheLKgPkE7DrL/3XhTfSRkWvgaWuRcd/WIJUJ9CXo9BvrKqY7NiKQ795m5Ytzgp ynnMmcBkQKXrSSedW2iNCs5AJuxBskXkJ7OFXF2Vbpe8yJ9Md/HAWZ2X8ZfQITLA8Q6k68uF 6NZKprbahmNIxyekwkggVDGhNQKXHyWacimZUJJvBBXk0ZcejH0
IronPort-HdrOrdr: A9a23:1HjJpa08qg3P+Gamp8OFTAqjBQZyeYIsimQD101hICG9Lfb3qy n+ppsmPEHP5Ar5AEtQ5expOMG7MBfhHO1OkPYs1NCZLUXbUQqTXcxfBO7ZogEIdBeOjtK1uZ 0QEZSWTeeAcGSS7vyKrzVQcexQu+VvmZrA7Yy1ohcdLj2CKZsQlTuRYTzrdXGeMTM2fKbRY6 DsgPavyQDQHEg/X4CePD0oTuLDr9rEmNbNehgdHSMq7wGIkHeB9KP6OwLw5GZRbxp/hZMZtU TVmQ3w4auu99uhzAXH6mPV55NK3PP819p4AtCWgMR9EESstu/oXvUgZ1SxhkF2nAid0idurD AKmWZlAy1H0QKTQohym2qr5+Cv6kdp15ao8y7nvZKqm72JeNt9MbsZuWqcGSGpsHbJe7pHof p2NiuixupqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MQiFW5uYeE99RjBmckaOf grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgEl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjnwgo+y5K9w6PCheZQOwpd3kJ PdUElAvWp3YE7qAd3m5uw9zvkMehTIYd3A8LAq23EigMyOeFPCC1zwdGwT
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.97,315,1669075200"; d="scan'208";a="28929686"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 Feb 2023 12:55:40 +0000
Received: from mail.cisco.com (xfe-rcd-002.cisco.com [173.37.227.250]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 31LCte4e004143 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 21 Feb 2023 12:55:40 GMT
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Tue, 21 Feb 2023 06:55:39 -0600
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Tue, 21 Feb 2023 06:55:39 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y9MM3xxCy7lriUdJ0gw0LqEduUNvmdiQhp7sdD5RK3wYfD9MJCrAxbcve1GY/fsVTEtOAwHSd8YrWFpWszpQkq/5DKrs98nRmD1Y+otABqUOlVvTwTzqam+bTqBcK2E1lKjA0K3U/kUKHoi1lUOIrHp0+4o731+uSDIRGZxSG0TUw9o7YoWLxDb0d4Q5lFbA8hzSrx8B58jMWStPXswBFwKK10qnBMLlYqKNaNj0vDW9Ru6p4/y/Hp3HQmsk/v1XM3Jf9s1vA3tqZm8EDHrwHGJFfGoGksh/Sz4QyP6EPCnh2Dy+ARG0APi7pYz2+8i8/LxO9S6DwZqPiKvxiTb6/Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7DaZTZEdVFh1Fd3LAPFghnNpUQEngKxVepaA+k+/MWU=; b=Og8xE6tw6WaEsOblnnpyTwxBd5KjDXLtZYHEliK4cAApa4BuVwfQHvPqHxqRo6xPHi8HLnZg1dcZ28ZTnohDLv86iR0vwx3rtn5ThZN9NSTo3+RAamsQXBJ6o4ZMcs/U6FQ0xsP/JyAk6H6W3HsNvrgUSbp0xeB4f8BtjWj7LFdiomzf6F3qWEOd1ugopoXIRi4U35HawI0fzryTt36DDNOjhFoqX86gvOtSfEWqUTMDhMyMgyCdDBIc1RXZfWwbJMUDSExFzLgitAY0CbQSaUK51ZM7st5I+BunEpq9bMmS+iZD4NkccN+e7enkaqNHSNdpbUhJtF0p3iIu/zhHEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7DaZTZEdVFh1Fd3LAPFghnNpUQEngKxVepaA+k+/MWU=; b=CFK3le9iLFR57ROWphU9SnTdWsyrBv1WjwfZITLACkJXC3Z4Sdl1wt7mNQTgZiVyCl8nsMoWV6t+dwAhYYhtb9no/k3iKR+zlh7kCMTqmmLMcAbCha5uF+ym0L15meukz3ebWGBsXca3o9RNb4I6yhYMSmeHHWgTtSedE1Yj9hk=
Received: from MWHPR11MB1311.namprd11.prod.outlook.com (2603:10b6:300:2a::14) by MW4PR11MB5799.namprd11.prod.outlook.com (2603:10b6:303:181::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6111.21; Tue, 21 Feb 2023 12:55:37 +0000
Received: from MWHPR11MB1311.namprd11.prod.outlook.com ([fe80::c45e:69ab:8f7d:e3ef]) by MWHPR11MB1311.namprd11.prod.outlook.com ([fe80::c45e:69ab:8f7d:e3ef%4]) with mapi id 15.20.6111.021; Tue, 21 Feb 2023 12:55:36 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: John Scudder <jgs@juniper.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-ippm-ioam-ipv6-options@ietf.org" <draft-ietf-ippm-ioam-ipv6-options@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, "marcus.ihlar@ericsson.com" <marcus.ihlar@ericsson.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
Thread-Index: AQHZBCMbZaD8l7QZWUCJk4hc9sQSvK6GsxGAgFIa94CAAREKEA==
Date: Tue, 21 Feb 2023 12:55:36 +0000
Message-ID: <MWHPR11MB1311B5671057A984D9CA5288DAA59@MWHPR11MB1311.namprd11.prod.outlook.com>
References: <166974767573.42018.13628264024826514580@ietfa.amsl.com> <MWHPR11MB1311CFE4C49C480E6911D145DAF09@MWHPR11MB1311.namprd11.prod.outlook.com> <219FA35A-0A24-4D88-8EE3-09392BCE2118@juniper.net>
In-Reply-To: <219FA35A-0A24-4D88-8EE3-09392BCE2118@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MWHPR11MB1311:EE_|MW4PR11MB5799:EE_
x-ms-office365-filtering-correlation-id: f312cc18-0021-46be-c0e1-08db140aed49
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Jg32yXGGp+/kyNYzwNn+PwLRNXjhuEWwIqw74uo8pw8B0+A1uauDmNibe05d8RNSvmwtBOqpjdrP+ofmqumiuQcEq7F91sKjolUvq9k8WlOmnYXxrK6jvAwhHNTT26EMYHqy+qyp1maLf/uhoKZLHa6RprRjsfoQJsW8cbXZlu1tyeCUUnqgvxJ1JpGbyNUJKKmNEEBLCF1hy2pkkoarnG5aIsNioRyxoLLmWJydyrh0gfNys59ratDCB/D/BAW/n6MLc6+W7QeA4PmieBaJ9LHFyFyZnIjxvhi7OYSDABsWLaPCy9QQK6XvOBZy03r4fObzuxop3HaNozQEwdZGG8S2kE41rLXVXPzaxWHgSyhFlPk+C2rrZHUloFMEzYmEsMyL6GePcwVZxjKVeM6cCPMxxe28TzQ2ivDt+wS+thR2Ky8T0ZG+rRuSRR2JWFsYSzOj7cpS3RZSEn1ILjJebmxoEFTPFlvuyPTwPVOMB/wnoGekORZcPBPVOMlz7oIivH4BhQvTb7Bp9RaX8kViv5q5htfFL4m+JWVnzdWl8ChVWWs4AhMcRL4JK6+dxlvFoxmVmAkP4XbBkY/eXi2Z8f24ZXiD3TTMit5x8R0ofn6BHI2ET1CIkT+3pi/M6G3R1m2oH5xro05BKGRem9rlpMXczhTFozKGs3mrk5hdZRfGfuD1XzlrWZj6dQfuOicRHqX6Dk0vzJYxpSG29VNaCKC1y3AAWZ5HasGiJcIIBMs=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MWHPR11MB1311.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(136003)(346002)(396003)(376002)(39860400002)(366004)(451199018)(5660300002)(30864003)(52536014)(53546011)(8936002)(2906002)(41300700001)(54906003)(66574015)(7696005)(966005)(478600001)(316002)(66946007)(4326008)(6916009)(76116006)(66556008)(26005)(9686003)(186003)(6506007)(64756008)(66476007)(8676002)(66446008)(71200400001)(38070700005)(38100700002)(33656002)(86362001)(55016003)(83380400001)(122000001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR11MB1311.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f312cc18-0021-46be-c0e1-08db140aed49
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Feb 2023 12:55:36.5850 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OOSjIq4yktabmIarUDOPDMaWf3JEMlpM9Gn9w3Qc5z774CzK81f5k441sfgxy3CNwFD+ur8VqbTF08VfCEmcVA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR11MB5799
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.250, xfe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/MKpznm9TYM0iArdRhzQLDBFjle8>
Subject: Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Feb 2023 12:55:46 -0000
Hi John, Thanks. We're almost done with creating a new revision. We hope to publish -10 shortly. Cheers, Frank > -----Original Message----- > From: John Scudder <jgs@juniper.net> > Sent: Monday, 20 February 2023 21:38 > To: Frank Brockners (fbrockne) <fbrockne@cisco.com> > Cc: The IESG <iesg@ietf.org>; draft-ietf-ippm-ioam-ipv6-options@ietf.org; > ippm-chairs@ietf.org; ippm@ietf.org; marcus.ihlar@ericsson.com > Subject: Re: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-09: > (with DISCUSS and COMMENT) > > Hi Frank, > > I was revisiting old DISCUSSes and see I didn’t reply to you on this, sorry for that. > The approach you describe makes sense to me. I’ll look forward to reviewing the > next version if this is how you still plan to proceed. > > Please let me know if you’re waiting on me for anything. > > Regards, > > —John > > > On Dec 30, 2022, at 10:30 AM, Frank Brockners (fbrockne) > <fbrockne@cisco.com> wrote: > > > > Hi John, > > > > Thanks a lot for your review and comments. > > > > Per the discussion in the IESG telechat: I can understand your frustration with > draft-ietf-ippm-ioam-ipv6-options-09. Sorry for that. Part of the vagueness you > noted stems from the fact that the document is a merger of two documents: > > * one which was focused on allocating two code points for v6 options > > (draft-ioametal-ippm-6man-ioam-ipv6-options) > > * one which was focused on deployment considerations > > (draft-ioametal-ippm-6man-ioam-ipv6-deployment) > > where the second document was just to provide additional information and > context for the first one. > > As a result, section 5 turned out to be a set of considerations, that never got > turned into a proper set of requirements. > > > > We could consider splitting the document up again - into a standards track doc > that allocates the code points - and an informational document which discusses > deployment aspects, though the IPPM WG originally felt like combining the > documents was the way to go. > > > > Assuming that the we'd stay with a single document, my suggestion > > would be to clean up section 5.1 and > > * use references to other documents, such as RFC 9197, RFC8799, or > > draft-ietf-ippm-ioam-deployment where applicable > > * switch from "considerations" to "requirements" and be more specific > > > > In particular: > > C1 - Change to a reference to draft-ietf-ippm-ioam-deployment > > C2 - Keep (the section already uses formal requirements language) - and adjust > the wording per Eric Vyncke's suggestions. > > C3 - Keep - and clarify the wording ("entities") per your note below > > C4, C5 - Refer to RFC 9197 and explicitly restate that IOAM only > > applies to limited domains per RFC8799 > > C6 - Reword as a requirement. > > C7 - Expand/Clarify, pending the discussion on the applicability of the > incremental trace option for IOAM with v6. > > > > With that approach, we would also avoid the discussion and potential > restatements of "how to ensure that a limited domain does not leak packets" in > this document, i.e. the current topics C4 and C5. The document would rather > make use of the already existing definition of a limited domain (in RFC8799) and > its associated qualities. > > > > Is this an acceptable approach? If so, we'll create a revision which also > addresses your other comments (your comments on section 4 are really helpful - > and can be woven into the next rev). > > > > Thanks again, Frank > > > >> > >> --------------------------------------------------------------------- > >> - > >> DISCUSS: > >> --------------------------------------------------------------------- > >> - > >> > >> # John Scudder, RTG AD, comments for > >> draft-ietf-ippm-ioam-ipv6-options-09 > >> CC @jgscudder > >> > >> ## DISCUSS > >> > >> As noted in > >> https://urldefense.com/v3/__https://www.ietf.org/blog/handling-iesg- > ballot-positions/__;!!NEt6yMaO- > gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2jcU_QikNt > tNa1riQzmGyk0g$ , a DISCUSS ballot is a request to have a discussion on the > following topics: > >> > >> ### Structure of the document; Section 5 is vague > >> > >> The first part of the document, through Section 4, is unproblematic > >> for me -- you're simply allocating some IPv6 extension header option > >> types and defining how to use them to transport fields you defined in RFC > 9197. Fine. > >> > >> But Section 5 is giving me a headache. For some reason, even though > >> this is a Standards Track document, you've structured it as some > >> rather high-level "considerations" (or are they "requirements"? It's > >> unclear) and then some generally-worded polite suggestions about how > >> you could deploy it this way or that way. > >> > >> Is there some reason you've shied away from being prescriptive in > >> Section 5? As the document stands, I felt a bit like I'd been > >> presented with a puzzle. "The solution of this problem is left as an > >> exercise for the student" is great in textbooks, but not so wonderful in > Standards Track documents. > >> > >> ### Section 5.1, C5 is problematic > >> > >> ``` > >> An Autonomous System (AS) that inserts and leaks the IOAM data needs > >> to be easy to identify for the purpose of troubleshooting, due to the > >> high complexity in identifying the source of the leak. Such a > >> troubleshooting process might require coordination between multiple > >> operators, complex configuration verification, packet capture > >> analysis, etc. This requirement may require additional option or > >> fields to be defined to identify the domain that inserted the IOAM > >> data, this is out of the scope of this document. ``` > >> > >> First, just as in C4, the underlying assumption that it's OK if an AS > >> "leaks the IOAM data" appears problematic. > >> > >> Second, how can you both say "this is a requirement" and in the same > >> paragraph "it's out of scope"? Surely, if this functionality is > >> required, a finished spec is required to support it. And if the spec > >> isn't finished, we shouldn't be advancing it, the WG should take it > >> up and finish it, then send it back when done. > >> > >> Is it that this isn't truly a requirement? Or is the spec incomplete? > >> If neither, please help me understand. > >> > >> > >> --------------------------------------------------------------------- > >> - > >> COMMENT: > >> --------------------------------------------------------------------- > >> - > >> > >> ## COMMENTS > >> > >> These comments are non-blocking, but I'd still appreciate responses. > >> > >> ### Section 4, a particular interface > >> > >> ``` > >> Unless a particular interface is explicitly enabled (i.e., explicitly > >> configured) for IOAM, a router MUST ignore IOAM Options. ``` > >> > >> I suppose what you mean is, the router MUST ignore IOAM Options on > >> packets received on that interface? If so, please say so. (If not, > >> let's discuss.) > >> > >> ### Section 4, reference for IOAM Type, nomenclature > >> > >> ``` > >> IOAM Type: 8-bit field as defined in section 7.1 in [RFC9197]. > >> ``` > >> > >> Section 7.1 of RFC 9197 is the IOAM Option-Type Registry in the IANA > >> Considerations section. I wouldn't say an IANA registry "defines" > >> anything, it lists code points. I think a better reference would be > >> Section 4 of 9197, which does indeed define IOAM-Option-Types (in Section > 4.1). > >> > >> Also, it would be better to be consistent with your naming, in RFC > >> 9197 you don't call this the "IOAM Type" but rather the > >> "IOAM-Option-Type" (34 occurrences in 9197) or "IOAM Option-Type" > >> without the first hyphen (4 occurrences in 9197). I see why you don't > >> want to use the full string from RFC > >> 9197 in your packet diagram (too many characters) but "IOAM-Opt-Type" > >> would fit in the character budget. > >> > >> ### Section 4, Trace-Type constraints > >> > >> ``` > >> In addition, to maintain IPv6 extension header 8-octet alignment and > >> avoid the need to add or remove padding at every hop, the Trace-Type > >> for Incremental Trace Option in IPv6 MUST be selected such that the > >> IOAM node data length is a multiple of 8-octets. ``` > >> > >> I spent some time trying to understand exactly what it means for the > >> Trace-Type to be selected such that, etc. I suppose this isn't too > >> complicated in the end, since all the types defined in RFC 9197 are either > four- or eight-byte fields. > >> I don't see an explicit pad field being defined, though, so I wonder > >> if it would be a helpful hint to note that the Opaque State Snapshot > >> with Length 0 and Schema ID 0xFFFFFF can be used as a four-octet pad > >> if needed. I see you use 0xFFFFFFFF as a pad in some places in RFC > >> 9197, but there's no corresponding Trace-Type and it doesn't seem > >> prudent to just poach a currently undefined bit to indicate the pad. > >> I guess the other alternative would be to allocate a new Trace-Type > >> bit to explicitly indicate a four-byte pad field, but given you can use Opaque > State for this purpose, I don't see why you'd burn the bit. > >> > >> Anyway, if I've missed some explicit way eight-byte alignment is > >> supported in RFC 9197, please point it out to me? Otherwise, I think > >> you need to be clearer about this, to discourage implementors from > exercising "creativity". > >> > >> ### Section 5.1, C3, entities that communicate the errors > >> > >> ``` > >> The entities that communicate the errors to devices outside of the > >> IOAM domain MUST remove any IOAM data from the packet included in the > >> error message ``` > >> > >> This is quite non-specific. Who are “the entities“ in this context? > >> The host or router that originates the ICMP report? The router that > >> forwards it outside the domain? If the former, I guess that means > >> every entity within the domain that might originate an ICMP message > >> has to know a priori if it's sending its message to an internal or > >> external recipient. If the latter, that's a notable new requirement on border > routers. > >> > >> ### Section 5.1, C4 violates closed domain > >> > >> ``` > >> OAM data leaks can affect the forwarding behavior and state of > >> network elements outside an IOAM domain. IOAM domains MUST provide a > >> mechanism to prevent data leaks or be able to ensure that if a leak > >> occurs, network elements outside the domain are not affected (i.e., > >> they continue to process other valid packets). > >> ``` > >> > >> I have a few difficulties with C4. Among them -- > >> > >> - The first sentence is quite nonspecific, I don't know if you have > >> some actual failure modes in mind but I suppose you must. Can you > >> elucidate? - The second sentence, starting with "or", appears to > >> violate the limited domain assumption, or at the least, it introduces > >> a creative understanding of it ("go ahead and leak as long as you're > >> sure the leaks are fine"). - I don't understand how an operator could > >> possibly fulfill the "or" clause with confidence since by definition > >> whatever is happening outside the border of the limited domain is not under > the control of, or even necessarily known to, the operator. > >> > >> My guess is that you're trying to motivate the ULA deployment option > >> here, without talking about it specifically. Is that right? > >> > >> ### Section 5.1, C6 is inaccurate > >> > >> ``` > >> Compliance with [RFC8200] requires OAM data to be encapsulated > >> instead of header/option insertion directly into in-flight packets > >> using the original IPv6 header. ``` > >> > >> I don't think you mean the OAM data (by which I think you mean IOAM > >> data) needs to be encapsulated, but rather that it needs to be within > >> an encapsulation header? That's what's implied by your Deployment > >> Options section, anyway. If so, please say so, if not, let's discuss. > >> > >> Assuming I've guessed correctly, a possible rewrite could look > >> something like > >> > >> ``` > >> [RFC8200] precludes insertion of IOAM data directly into the original > >> IPv6 header of in-flight packets. Therefore, in order to add IOAM > >> data, in-flight packets must be encapsulated in an outer header, and > >> the IOAM data added to that header. ``` > >> > >> ### Section 5.1, C7, wording > >> > >> ``` > >> Hence when the IOAM Incremental Trace Option-Type is used in the > >> deployment the RemainingLen field of the option MUST follow the > >> guidance in [RFC9197] and must be computed and set appropriately. ``` > >> > >> I assume you mean "used in deployment" and didn't intend the definite > >> article (which would imply you're talking about a specific > >> deployment). But I think instead of just dropping "the", you might as > >> well go ahead and drop "in the deployment" (where else is it going to > >> be used after all, where this guidance wouldn't apply?). > >> > >> ### Section 5.1, C7, lack of specificity > >> > >> ``` > >> The IOAM Incremental Trace Option-Type expands the option length that > >> may affect the processing of extension headers and options that > >> follow IOAM options. Hence when the IOAM Incremental Trace > >> Option-Type is used in the deployment the RemainingLen field of the > >> option MUST follow the guidance in [RFC9197] and must be computed and > >> set appropriately. ``` > >> > >> What guidance, exactly, is supposed to be followed? I dug around in > >> RFC 9197 and the best guess I could come up with is > >> > >> ``` > >> The sender MAY calculate the value of the RemainingLen field by > >> computing the number of node data bytes allowed before exceeding the > >> PMTU, given that the PMTU is known to the sender. ``` > >> > >> I'm not very happy with that guess, because it doesn't seem to be > >> responsive to the problem you've posed. What I've quoted from RFC > >> 9197 is a way to avoid exceeding the PMTU, but in the present > >> document you've posed the concern that if you shove too much data > >> into the IOAM header, other extension headers may be ignored. That's > >> not the same as PMTU, which relates to total packet size, not header > >> options size. > >> > >> Whatever it is you're trying to do here, I think you need to be more > >> specific about it. > >> > >> ### Section 5.2, encapsulation? > >> > >> ``` > >> For deployments where the IOAM domain is bounded by hosts, hosts will > >> perform the operation of IOAM data field encapsulation and > >> decapsulation. ``` > >> > >> Do you intend to imply that the hosts at the edge of the domain are > >> sending > >> IP-in-IPv6 encapsulated data? It wouldn't seem to be required; since > >> the hosts are the source/sink of the packets, the problem described > >> in C6 doesn't apply, and the host can directly place the IOAM data in > >> the header. (What would be the "inner header" in an overlay > >> solution.) > >> > >> I suppose it's technically accurate to describe this as an > >> "encapsulation and decapsulation" operation, insofar as any data > >> placed in any header might be said to be encapsulated in that header > >> -- but it's misleading. I think this section needs to be rewritten to > >> make the meaning plain. For example, something like "... hosts will > >> place the IOAM data field directly in the IPv6 header." > >> (You could say "outer IPv6 header" since there's nothing precluding a > >> host from sending tunneled packets for some purpose.) > >> > >> (I notice Éric Vyncke raises a similar concern about the > >> nontraditional use of the term "encapsulation" in his comments.) > >> > >> ### Section 5.3, encapsulation again > >> > >> This one is less misleading, but by analogy to 5.2 I suspect more > >> clarity is required here too. > >> > >> ``` > >> For deployments where the IOAM domain is bounded by network devices, > >> network devices such as routers form the edge of an IOAM domain. > >> Network devices will perform the operation of IOAM data field > >> encapsulation and decapsulation. ``` > >> > >> For example, a more straightforwardly understandable version of the > >> last sentence might be "Network devices will encapsulate in-flight > >> packets in an outer IPv6 header which carries the IOAM data field." > >> > >> ### Section 5.4.1 infeasible requirement > >> > >> ``` > >> Addressing and routing in the IOAM Overlay Network are to be > >> configured so that the IP-in-IPv6 encapsulated packets follow the > >> same path as the original, non-encapsulated packet would have taken. > >> ``` > >> > >> This doesn't seem to be feasible in the face of ECMP. > >> > >> ### Section 5.4.2, wording > >> > >> ``` > >> In this case IOAM can be encapsulated in as an extension header in > >> the tunnel > >> (outer) IPv6 header. ``` > >> > >> Is the "as" unintended in the quoted text? If so, please remove it, > >> if not, I don't understand the meaning. > >> > >> ## NITS > >> > >> ### Section 5.1 > >> > >> "if IOAM is used in in transit devices" > >> > >> s/in in/in/ > >> > >> ### Section 5.4 > >> > >> "This section lists out" > >> > >> Just "lists", no "out". > >> > >> ### 5.4.1 > >> > >> "almost close to zero" > >> > >> I assume you mean either "almost zero" or "close to zero". Because as > >> written, I would parse "almost close to zero" as "not close to zero" > >> which is probably not what you're going for. > >> > >> ## Notes > >> > >> This review is in the ["IETF Comments" Markdown format][ICMF], You > >> can use the [`ietf-comments` tool][ICT] to automatically convert this > >> review into individual GitHub issues. > >> > >> [ICMF]: > >> https://urldefense.com/v3/__https://github.com/mnot/ietf-comments/blo > >> b/main/format.md__;!!NEt6yMaO- > gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_ > >> XY1jCzk9LXQr32P_G_2jcU_QikNttNa1riQo4wYhBw$ > >> [ICT]: > >> https://urldefense.com/v3/__https://github.com/mnot/ietf-comments__;! > >> !NEt6yMaO- > gk!HWtPKZFNvzKAvGGibIraT_FJ14meyU4ob82_XY1jCzk9LXQr32P_G_2j > >> cU_QikNttNa1riSkUdWP9w$ > >> > >> > >
- [ippm] John Scudder's Discuss on draft-ietf-ippm-… John Scudder via Datatracker
- Re: [ippm] John Scudder's Discuss on draft-ietf-i… Frank Brockners (fbrockne)
- Re: [ippm] John Scudder's Discuss on draft-ietf-i… John Scudder
- Re: [ippm] John Scudder's Discuss on draft-ietf-i… Frank Brockners (fbrockne)
- Re: [ippm] John Scudder's Discuss on draft-ietf-i… Shwetha Bhandari
- Re: [ippm] John Scudder's Discuss on draft-ietf-i… Roman Danyliw