Re: [ippm] WG Last Call for draft-ietf-ippm-ioam-ipv6-options

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Sun, 06 February 2022 16:58 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 477DF3A0A73; Sun, 6 Feb 2022 08:58:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.598
X-Spam-Level:
X-Spam-Status: No, score=-14.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=NU6r+LPp; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=CNtLScy7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JvGJ8q0OEz0M; Sun, 6 Feb 2022 08:58:28 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC3613A0A71; Sun, 6 Feb 2022 08:58:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6106; q=dns/txt; s=iport; t=1644166707; x=1645376307; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=3/0ktvo/7BPutHNxoTjvNWa+Lf17dCTHyMgBG3+qCh0=; b=NU6r+LPpGO0io8+oFjDxugRex6BhmcHD072D9dItmvoSH3M1JQcB/Qvz vhbfl/hW5lj4n2HaRFteoX8fmRkHbyhGb91ivjJq3Dx/PnUS+1O/Cei4/ ZsxSNWzKs2+hSQicDTe2A4DXJ3xfBTZXor2WBYjCkFqOqrJ4MkUjqxYxV 8=;
X-IPAS-Result: A0AYAADZ/f9h/4QNJK1aGwEBAQEBAQEBBQEBARIBAQEDAwEBAUCBRgYBAQELAYFRVgd3WjdChFSDSgOEWWCFDoMCA4sQkBWBLhSBEQNUCwEBAQ0BASoLDAQBAYUFAheDSwIlNAkOAQIEAQEBAQMCAwEBAQEFAQEFAQEBAgEGBIEJE4VoDYZCAQEBAQMBARALBhEMAQEsCwELBAIBCBABBAEBAQICJgICAh8GCxUICAIEAQ0FCBqCY4JlAy4BDp9lAYE6AoofeoExgQGCCAEBBgQEgUpBgwINC4I3AwaBECoBgw2CflRMgR6BYYQIJxyBSUSBFUOCZz6CIUIBAQIBgSgBEgEjgxYTJIIukhQBazQ2BDgZAgRXPSsXCi8CF0uSA4NPqT5rCoNGiwKOZIYXFYNyjCCXe5ZKIIxyg0+QWQiFBQIEAgQFAg4BAQaBYTxpcHAVO4I1ATNRGQ+OIINxhRSFSnQCATUCBgsBAQMJkE8BAQ
IronPort-PHdr: A9a23:uCuvqhGyEswka82xkIZZSZ1GfiYY04WdBeZdwpYkircbdKOl8tyiO UHE/vxigRfPWpmT8PNLjefa8sWCEWwN6JqMqjYOJZpLURJWhcAfhQd1BsmDBAXyJ+LraCpvG sNEWRdl8ni3PFITFtz5YgjZo2a56ngZHRCsXTc=
IronPort-Data: A9a23:3MWG1ayk1jjtPsPcuAd6t+dvxyrEfRIJ4+MujC+fZmUNrF6WrkUDm zMXDTrVb/mJYmSneNwgbYq1pExTvZaAzdI1TFRuq1hgHilAwSbn6Xt1DatR0we6dJCroJdPt p1GAjX4wUNdokb0/n9BCJC5xZVH/fzOFuqU5NLsYHgrH1c+EHl50HqPpsZg6mJWqYnha++yk YuaT/33YDdJDBYtbwr4Q4rawP9elKyaVAEw5zTSVtgX1LPqrET5ObpETU2Hw9QUdaEPdgKyb 76rILhUZQo19T91Yj+uuu6TnkHn3tc+MCDW4ke6VZROjTBJuy0L/KEpd8YCUmFeyG+Vrc9b6 dxk4MnYpQcBZsUgmcwUVx1eVip5J6ADoeeBKnmkusvVxErDG5fu66wxVwdtY8tBoaAuWjsmG f8wcFjhajiNjfixy7G9R8Fnh98oK4/gO4Z3VnRInWyHVKl8H8qfK0nMzdxdwA4gpMd0JP/lS 9cYMmpEQyqebwIabz/7D7p7xo9EnELXciVArXqUqLY5pW/Jw2RZ0aDzbvLUd8CEA8JPkS6wo 2vc9HniRBAaMNWFnGbd/2itjfTUmiW9U4UXPLG9/+Rhxlye2mJVDwcZPXO2or+4h1Kwc91aI k0QvCEpqMAa9lGwUtj7GRylunuNuDYBX9tdHOB84gzl90bPyw+dAm5BRTlbZZl/7Ik9RCch0 RmCmNaB6SFTjYB5gEm1rt+8xQ5e8wBPRYPeTUfolTc43uQ=
IronPort-HdrOrdr: A9a23:d3RDpaP1ZfiaSMBcT2P155DYdb4zR+YMi2TDiHoRdfUFSKKlfp 6V88jzjSWE9wr4WBkb6Le90dq7MA3hHPlOkMgs1NaZLUfbUQ6TTL2KgrGSuAEIdxeOk9K1kJ 0QD5SWa+eATWSS7/yKmjVQeuxIqLLsnczY5pa9854ud3AWV0gK1XYeNu/vKDwPeOAwP+tBKH Pz3LsimxOQPVAsKuirDHgMWObO4/fRkoj9XBIADxk7rCGTkDKB8tfBYlul9yZbdwkK7aYp8G DDnQC8zL6kqeuHxhjV0HKWx4hKmeHm1sBICKW3+4oow3TX+0OVjbZaKvq/VQMO0aeSAZER4Y DxSiIbToBOArXqDzmISFXWqlLdOX0Vmg7fIBej8AveSIrCNWgH4w4rv/METvMfgHBQ4e2UmZ g7rF6xpt5ZCwjNkz/64MWNXxZ2llCsqX5niuILiWdDOLFuJYO5gLZvt3+9Kq1wVh4SKbpXZ9 VGHYXZ/rJbYFmaZ3fWsi1mx8GtRG06GlODTlIZssKY3jBKlDQhpnFoi/A3jzMF7tYwWpNE7+ PLPuBhk6xPVNYfaeZ4CP0aScW6B2TRSVbHMX6UI17gCKYbUki956Lf8fEw/qWnaZYIxJw9lN DIV05Zr3c7fwb0BciHzPRwg1jwqaWGLH3QI+1llu1EU4zHNczW2He4OSITeuOb0oEiPvE=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.88,347,1635206400"; d="scan'208";a="856172624"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 06 Feb 2022 16:58:22 +0000
Received: from mail.cisco.com (xbe-rcd-004.cisco.com [173.37.102.19]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 216GwM7m019310 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Sun, 6 Feb 2022 16:58:22 GMT
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xbe-rcd-004.cisco.com (173.37.102.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Sun, 6 Feb 2022 10:58:22 -0600
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Sun, 6 Feb 2022 10:58:22 -0600
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Sun, 6 Feb 2022 10:58:22 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dlvAATPw1/r7dlonSySbETClGgq602NJRmVcQbhzfpMZyIOWWP+YMHvXlyPXfJOKg7WUPESLGWqYW9sPZBM0EKFeWKQyjEqVwcM2Tl7pK0oiIF0XIxnpEmkj2HpahA3SvmLyWwkE+8eTxHRpxL+lSdGmCz/dGyVM7CMKDRkjwYAJhwp0XydyNMHB6lMbM9B/jD9ClAWtVs0rp/2BoF75CG6PKzHKzRAH/Qhe49zwC47gpeDV4h7vPLLH5cruYSxOXEGAzaoacZcTjuyJfLfa40tdSfXBRTkEn5X2PjsrzJ7ddHSxDivuaclbVC+VruqZKJ1zY4cc3rk/l3D53E8Tzw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3/0ktvo/7BPutHNxoTjvNWa+Lf17dCTHyMgBG3+qCh0=; b=eyJlBwArLIml0kyL7de0gmNwoITZT7kc1p7A4p7/u4csFva3e6JTmShNu3Jd5fMGXCAac1stn4QsfqrPKxUGJLuVV9rggBaXcxKhANBn2boYwJLZ9+50aUArjY2bfw0SQG6RbGXBSa5owgvjOghOMmvENMtktYRmihyoMDk39YHY/RQyCxuxb7JfyUSpoJwZ0BGbIrW9KlidotpCJaHWRV37/7uEs1uUArTHSNJqdUYsYaRT1ov+QtaZQF3fJSzQKDzNOQ3/ue7JGZjLzjFMBKMOj/baOJ3IuQozI54WYAJHQN31DdJCZFyQ0YP+hLn2Ew2aXTsiFucU5AVs+wGOvw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3/0ktvo/7BPutHNxoTjvNWa+Lf17dCTHyMgBG3+qCh0=; b=CNtLScy7Q/JsddWIvGQE/4XRtw0NwNx/AlT+Rh32kNAVHExQKYlfgeX5OcmhK7FrJ16e+nazlnA55/mQTRaUeJ3dYdqxkhsRd9lfscC4U7H2ddm40BusMG8Eb/LCIhGHqk7Ry6a0+M+IxK4Ow72Y5BnijB+uhSgF1pAkxdEUK+w=
Received: from CY4PR11MB1672.namprd11.prod.outlook.com (2603:10b6:910:f::8) by DM5PR11MB1690.namprd11.prod.outlook.com (2603:10b6:3:15::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.17; Sun, 6 Feb 2022 16:58:20 +0000
Received: from CY4PR11MB1672.namprd11.prod.outlook.com ([fe80::49a2:a2fd:abe1:dda7]) by CY4PR11MB1672.namprd11.prod.outlook.com ([fe80::49a2:a2fd:abe1:dda7%6]) with mapi id 15.20.4951.018; Sun, 6 Feb 2022 16:58:20 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Justin Iurman <justin.iurman@uliege.be>, Erik Kline <ek.ietf@gmail.com>
CC: Marcus Ihlar <marcus.ihlar=40ericsson.com@dmarc.ietf.org>, IPv6 List <ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: WG Last Call for draft-ietf-ippm-ioam-ipv6-options
Thread-Index: AQHX/L29LTdhs/e+lki/fjsSOsrNhayG+7Fw
Date: Sun, 06 Feb 2022 16:58:20 +0000
Message-ID: <CY4PR11MB167247C5F9335D3682523A19DA2B9@CY4PR11MB1672.namprd11.prod.outlook.com>
References: <AM0PR07MB41315DF88FF077CC72F474A6E2789@AM0PR07MB4131.eurprd07.prod.outlook.com> <CAMGpriWq4RKUDiM05afM0FQNMC8uCRV2HtQjZ-Yiiq8UP-+1JQ@mail.gmail.com> <1698496306.248840871.1640786935077.JavaMail.zimbra@uliege.be>
In-Reply-To: <1698496306.248840871.1640786935077.JavaMail.zimbra@uliege.be>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c86198e5-e141-4cd5-c886-08d9e991e109
x-ms-traffictypediagnostic: DM5PR11MB1690:EE_
x-microsoft-antispam-prvs: <DM5PR11MB16907F1BEE4CE5CF398901C7DA2B9@DM5PR11MB1690.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR11MB1672.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(38070700005)(66556008)(186003)(5660300002)(26005)(122000001)(86362001)(76116006)(66946007)(66446008)(33656002)(52536014)(66574015)(64756008)(66476007)(316002)(71200400001)(508600001)(966005)(53546011)(38100700002)(54906003)(7696005)(110136005)(55016003)(8936002)(4326008)(2906002)(83380400001)(6506007)(8676002)(9686003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 1C8iMymc+MzQ4hYcS01EFRLXRfsVPDRRi8AcMaWXOViQTM+KwmJihRklgd6cEgJ/bT8k9oBorpbq1fodil8pulijQmlWQ0sTD71FceZ0bxfE2TF4nwHxjh5RcCmsasndOvy3Q7gU5tew/elHU0JQqE7XZNkZBZKZ3CdyBoqSuBod8v7N39+Sisu0WZO6gPlz2i7p+FixS71k6YII5hSKq6EgTJWjk1cqeP7Azl6FW+MED8QQaKfAi+WGtcv7sda5RyUOueHXZvnPkmQZZgeABSi78Xfya0eoCbRIs0+cNRO2JAqoeECQsbW0GBuS1EmAkOSMBhlmf5B5UdVCoHbF/OTdJRO2qPJz8tp7+K3D/HUa27uig+HcfLXgONyqZ21vLRej//uer6SwWfGpW06wL6pWW0IbFsa1J1sgse2zHWuAP8NjDiPev94ZdV7nt/mfrb65luTsbJHE9FKZHJsM2vRSpfYDRy5LgFEnhqcQLLu6Sx7ywhsfW5SoUjrQlon92kBN8r/zhDfcWJpwSe/BgzrtRpjcJY2hnCcJo4bZPe++aBLWq/oCZWnlPnEG+8aN+kqjeMAK2zveV7DTuAB9uv7eRtUGoln/+OW34r1bJLp/+av/Q5fvuTBA7ws2ZMxeDMtwCtum2BdUk3ljRB1vL4t2Rm6ufCP4fCAB5wVRFyjLm3KSNBcXIdb8bksKesJw19KAuFTAGlerNmB8+uoHVR0lNbAwA7KrxIFU/BcDtcf8TD6sH9zd6b6QYiTfE/uuq2V/+FqdaQfflXk5EyXnmUOL+TdWscd+D7LEr8kwI5qyycdY3eCtdR6LE/bOCKkLEXLA/RnFbzYklkTZLwItteaR23vqhRsp/8xvXdrkLSCrQ7B7z3cP1xJ2Tcs649r3ZmrCfla2C/wb9znTG9PX+Eg7YGLKcXlpM2WxCLsU6/6KmD438BigFCWExY/HV5u+qz17aiocSmMN/q6Q2F8gCEqiFeDt92uwXyGaFXv1hTwfvHbYmYja0jioilafse+Rx6WwDyqLTQuEkpBD+gtKbmn7tlgRJtNIXWFj3uDqftf5lsIEQv3cOhtPlsramYRwI+amau//hFLU9Wrbn6LddnWpPYuvXGH+FVtNhvEtNuEqCpv8ZQpYaWZIHrJ7w562Mnkhrf4gVhNVvHvkUCd10dn85GrQJTamVwiCosCDWZbhjtPkhPXsPSWdxePNacxctrGR/giRdb1fTCYPG19jaMheB6bnyRqEXcb8/4dLpDXmZdYSTY/DOQsxlfn8s8h4yJoB26YRmvX++My8G0Euyr+i+WS4WSpJOR3Br+PfApKBbZ2zhlXc8ukB5B6PiPTnWqrMkYtYe+3HRLTEC7wfiIl/tT0oQY6QCkNXDNHa4nGRccD3D5LBhZQjQy651hbHZmHSoHihGd8CgslcBAY7lVvMxsT4OJ7UBE93ygAIY4hrv7MPXfd9EcmjjNyc0iANsp353OGeH6D4TA+7FteK+yjWY3N/NRuXULub0JL6wKEtyKExEJ/R3lb3TgTz4h6DW+RtnpmHPKRrv2EjnWGW8DPE00bpM6T1MiecKbje77QNFQ8yEGy44d5plSxMzMFMx7/aQjz86JbiLwmqgSVbew==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR11MB1672.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c86198e5-e141-4cd5-c886-08d9e991e109
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Feb 2022 16:58:20.2961 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 2GkUjLo9faE2cfAnHLezC60WJ2OmFLca6xf1bwS1fC1UBKomGm0DHCIec9yk0hal9YHbtP772QziS3jBYL46og==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1690
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.19, xbe-rcd-004.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/QeZEtj00zl9fgp6pXXwHJWYO0b4>
Subject: Re: [ippm] WG Last Call for draft-ietf-ippm-ioam-ipv6-options
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Feb 2022 16:58:41 -0000

Hi Justin,

Sorry for the late response. I've just posted a revision (https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-ipv6-options/07/) which includes the two suggested changes below.

Cheers, Frank

> -----Original Message-----
> From: ippm <ippm-bounces@ietf.org> On Behalf Of Justin Iurman
> Sent: Wednesday, 29 December 2021 15:09
> To: Erik Kline <ek.ietf@gmail.com>
> Cc: Marcus Ihlar <marcus.ihlar=40ericsson.com@dmarc.ietf.org>; IPv6 List
> <ipv6@ietf.org>; ippm@ietf.org
> Subject: Re: [ippm] WG Last Call for draft-ietf-ippm-ioam-ipv6-options
> 
> Hi ippm, 6man,
> 
> I do believe this document is almost ready, though it probably needs a new
> version to address the following review comments.
> 
> 1) In section 4 ("In-situ OAM Metadata Transport in IPv6"), third paragraph, it
> says:
> 
>   "In order for IOAM to work in IPv6 networks, IOAM MUST be explicitly
>    enabled per interface on every node within the IOAM domain.  Unless a
>    particular interface is explicitly enabled (i.e., explicitly
>    configured) for IOAM, a router MUST drop packets that contain
>    extension headers carrying IOAM data-fields.  This is the default
>    behavior and is independent of whether the Hop-by-Hop options or
>    Destination options are used to encode the IOAM data.  This ensures
>    that IOAM data does not unintentionally get forwarded outside the
>    IOAM domain."
> 
> I don't think "a router MUST drop packets" is correct. IOAM options are defined
> with type "00", i.e., skip over this option and continue processing the header.
> Instead, I would rather have something like "a router MUST ignore IOAM
> options". Indeed, you don't want a node to drop packets with IOAM options,
> when not configured, to keep consistency with the behavior of type "00". This is
> the role of a firewall to drop packets if it detects IOAM injections or IOAM leaks.
> 
> New text suggestion:
> 
>   "In order for IOAM to work in IPv6 networks, IOAM MUST be explicitly
>    enabled per interface on every node within the IOAM domain.  Unless a
>    particular interface is explicitly enabled (i.e., explicitly
>    configured) for IOAM, a router MUST ignore IOAM Options.  As
>    additional security, IOAM domains SHOULD provide a mechanism to
>    prevent injections at ingress or leaks at egress."
> 
> Note that the last sentence could be omitted, as consideration #4 (see section
> 5.1) already talks about it.
> 
> 2) Section 5.4.1 ("IPv6-in-IPv6 encapsulation") describes a hacky way to
> encapsulate packets. Instead of using the egress as the outer destination
> address, it uses the same destination address as the inner one. I understand the
> pros of such a technique (i.e., same forwarding path), but it goes against
> RFC2473 and, as a consequence, also against RFC8200. So, I don't think it should
> be part of a standard. Since the "normal" IPv6-in-IPv6 use case is implicitly
> included in the next section (5.4.2, "IP-in-IPv6 encapsulation with ULA"), I think
> section
> 5.4.1 could/should be dropped.
> 
> Thanks,
> Justin
> 
> On Dec 17, 2021, at 10:37 PM, Erik Kline ek.ietf@gmail.com wrote:
> > +6MAN WG, just as an FYI
> >
> > On Fri, Dec 17, 2021 at 7:39 AM Marcus Ihlar
> > <marcus.ihlar=40ericsson.com@dmarc.ietf.org> wrote:
> >>
> >> Hello IPPM,
> >>
> >> This email starts a Working Group Last Call on
> >> draft-ietf-ippm-ioam-ipv6-options.
> >>
> >>
> >>
> >> https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-ipv6-options/
> >>
> >> https://datatracker.ietf.org/doc/html/draft-ietf-ippm-ioam-ipv6-optio
> >> ns-06
> >>
> >>
> >>
> >> Please provide feedback by replying to this email with your reviews
> >> and if you think this document is ready to progress, by Friday, January 14.
> >>
> >>
> >>
> >> Best Regards,
> >>
> >> Marcus & Tommy
> >>
> >> _______________________________________________
> >> ippm mailing list
> >> ippm@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ippm
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
> 
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm