Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-10: (with DISCUSS and COMMENT)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Sun, 07 May 2023 17:42 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 201C2C151525; Sun, 7 May 2023 10:42:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.595
X-Spam-Level:
X-Spam-Status: No, score=-14.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="lW345r2Y"; dkim=pass (1024-bit key) header.d=cisco.com header.b="AttFaglP"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QAwXKJoQ_ag1; Sun, 7 May 2023 10:42:51 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A183DC14CE46; Sun, 7 May 2023 10:42:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13650; q=dns/txt; s=iport; t=1683481371; x=1684690971; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=tyBTnLJLysgG36rbAUyyCJmTkV92DLoEj3i8bx1u4rc=; b=lW345r2YQLE3mHD3ke4YniVVffc5XNUjfBlDIM9Tfm22R0qOWakqGsYQ qymS2hIMWjarzc1ufV7f4ilRUiUpSEycs+gW1CiDcDMT3w/ruGyxw/t+A 3Xd/DUr3LW1di1KncyEWOXTdgzeCIwZ4yAOo1YXBZIMhes7bXVrdNqrAy k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:Bv3bJRM/6QgoVdK4UTUl6nfLWUAX0o4cdiYc7p4hzrVWfbvmo9LpP VfU4rNmi1qaFYnY6vcRk+PNqOigQm0P55+drWoPOIJBTR4LiMga3kQgDceJBFe9LavCZC0hF 8MEX1hgrDmgKUYAIM/lfBXJp2GqqzsbGxHxLw1wc+r/AInZjMK6/+uz4JbUJQ5PgWn1bbZ7N h7jtQzKrYFWmd57N68rwx3Vo31FM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:Lajet6KfwS3yk1VWFE+RHpUlxSXFcZb7ZxGr2PjKsXjdYENS1DUEm 2caCGCPO6qMYWqgLtkkbYS18kNU65DVytdjSgMd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcIZsCCW0Si6FatANl1EkvU2zbue6Wb+s1hxZH1c+E3980U07wobVv6Yx6TSHK1LV0 T/Ni5W31G+Ng1aY5UpNtspvADs21BjDkGtwUm4WPJinj3eC/5UhN6/zEInqR5fOria4KcbhL wrL5OnREmo0ZH7BAPv9+lrwWhVirrI/oWFih1IOM5VOjCSuqQRo0fwkJvgTN3wQtD6ynu5V0 4xkrpWJHFJB0q3kwIzxUjFRFyV4eKZB4rKCeCH5us2IxEqAeHzpqxlsJBhpZstDpKAuWicXr qdwxDMlNnhvg8q4yqi8Qepqi+woLdLgO8UUvXQIITTxUKp6Hs+ZHfuiCdlw3B1roOQUPs7kQ Mc9ZGM3LxLxQgVTJQJCYH45tL742iagG9FCk3qUvbIyy2ne0AI316LiWPLUYsSPAM5Vl0eCv UrH8nj3RBYAO7S3xSCM/G7ph+LTk2b6QJoXUby///svgUWNmCkUEAEXUl2gifi0lkD4XMhQQ 2QV9zEhhak/6ELtScPyNyBUu1aNuhoaHtFXCeB/sVjLwavP6AHfDW8BJtJcVDA4nJU1HyM41 FDXpJTWDgdujpmOEFuG/47B+FteJhMpBWMFYCYFSy4M7N/ivJw/g3rzojBLTfbdYjrdRGiY/ tyakMQtr+5J3ZNXi81X6XiC0mzx98mRJuIgzl+PNl9J+D+Vc2JMi2aAxlHB6f9GIO51pXHe4 SBYwKByAA3yZKxheQSEROELWbqu/fvAaWSail90FJ5n/DOok5JCQWyyyG8kTKuKGp9bEdMMX KM0kVgLjKK/xFPwMcdKj3uZUqzGN5TIG9X/TezzZdFTeJV3fwLv1HgwNRXLjj+9yxBzzPFX1 XKnnSCEUCpy5UNPkWXeegvh+eNDKt0WnDmKHsmrk3xLL5LEPy7NIVv6DLd+RrlpsPzbyOkk2 91eLMCNgw5OS/HzZzK/zGLgBQ5iEJTPPriv85Y/XrfaemJOQTh9Y9ePmulJU9I+wMxoehLgo yvVtrlwkgSv3BUq6GyiNxheVV8Ydcsh9y9jbHN8Yj5FGRELOO6S0UvWTLNuFZEP/+14xvkyR P4AE/hsyNwUItgb01zxtaXAkbE=
IronPort-HdrOrdr: A9a23:D2EtJqvbPUCWn+GSTHMqQ9r97skCwIMji2hC6mlwRA09TyXGra 6TdaUguiMc1gx8ZJh5o6H9BEDhexnhHZ4c2/h0AV7QZniYhILOFvAu0WKC+UyrJ8SazI9gPM hbAtBD4bHLfDpHZIPBkXSF+rUbsZW6GcKT9JzjJh5WJGkAC9AC0+46MHfgLqQcfnggOXNNLu vk2iMxnUvHRZ14VLXfOpACZYX+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF K13TDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/Qzd4dvfqGrCou O84SvIDP4Drk85uVvF5ScF7jOQkwrGLUWSjmNwz0GT5/ARDwhKdfapzbgpAycxrXBQ8+2VFM lwrjqkX109N2KYoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIdLH4sJlOM1GkcKp gZMOjMoPJNNV+KZXHQuWdihNSqQ3QoBx+DBkwPoNac3TRalG1wixJw/r1Vol4QsJYmD5VU7e XNNapl0LlIU88NdKp4QOMMW9G+BGDBSQ/FdGiSPVPkHqcaPG+lke++3JwloOWxPJAYxpo7n5 rMFFteqG4pYkrrTdaD2ZVamyq9NFlVnQ6dv/22y6IJyIEUHoCbQRFrYGpe4Pednw==
X-Talos-CUID: 9a23:G69v1Gl15/o/3tWkUSpIRfirbFzXOSfelmjCIUDmMiFWQ4aUd3uLoYp/mvM7zg==
X-Talos-MUID: 9a23:5KPWWgz91rpr8QIJSpYf0uLKEFCaqKSEU2Ypy7Y+ge6JESEpY3SbvRWvXpByfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 07 May 2023 17:42:43 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 347Hghfo022935 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 7 May 2023 17:42:43 GMT
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=fbrockne@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="5.99,257,1677542400"; d="scan'";a="1147217"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FfZDdhRA75LOB71TWcRfkD0sdVaeWtUJu9V3K+Ncr4T9+EKofH7ZAZNHEp/s3rMLC17L52vQrFwXi6uJjXc4EVWxYTKoG2EHI4nqLynxTxJmSBzXmS8v6PdlYSLDVDFt5iGO+gkl9klMyEieIQlJ50FYiv94HfvUaxgp3i2WV04K6rPzl/Vv3AKklgXeVwo8Iw5Mh7UdwLjjwiaRTJMW+C+sYDm9+LtsVtak4llSZeSdItnWKrfe55ZXfqNTvw7Ci+7Lj46SggcbV3j7rXKIZP0/bmXPY71M1toEqx4yb8aqWPUN34vHbEmbonwkYvysQfsb+63WwfoMcLJbBcA9Yg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tyBTnLJLysgG36rbAUyyCJmTkV92DLoEj3i8bx1u4rc=; b=PN+IQp9UvcCYKn2lYMM35OZ0SneUWy/rrXmQ0DeGddHnAVUyjcD6sCJSsFmetntx10/jC6q3ujICJxe0sXuC+AVInB9eXvJaFag2KaVQ/rG5s7ha9ISTxhtGh2Dx8sb2G7D9XFVOUa6tGbRJX3CkcdLFSJNMV1NA8Z0QZhG3jr0XUhmdgfj1+uA/Qdkvo4w7W1+LfgQaHZYkqD5bhv3D+uGKCa4AS9R6+GPLGd+RSGUEh3fhOneNRxCPUfBBOP4qMtSgljoiJeLSucTCa6vgYqVfs2JnpL/tSWsG8MsW0ZiJU018QGbKlmgX0ne78JFOyv6I+zTon1SKQzM1R6XghA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tyBTnLJLysgG36rbAUyyCJmTkV92DLoEj3i8bx1u4rc=; b=AttFaglPVffT+guCstF4cbBA7Pw9NVmiWK+SZUihmH+4iWiWSirxW6SSybkXAGo+E2y+Ep7KozrygrlsuXq6uMHvxsoKyn7xe3iOMEvUMSoGT5HdC1FGyK8m/ZbijCbayrzLLFyJeozk927OFNl0e9xW1PwWmjcEfcWWD5bbyHI=
Received: from DM5PR11MB1307.namprd11.prod.outlook.com (2603:10b6:3:15::9) by PH0PR11MB7542.namprd11.prod.outlook.com (2603:10b6:510:28b::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6363.31; Sun, 7 May 2023 17:42:41 +0000
Received: from DM5PR11MB1307.namprd11.prod.outlook.com ([fe80::481f:2c43:691c:4783]) by DM5PR11MB1307.namprd11.prod.outlook.com ([fe80::481f:2c43:691c:4783%11]) with mapi id 15.20.6363.032; Sun, 7 May 2023 17:42:40 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: John Scudder <jgs@juniper.net>, The IESG <iesg@ietf.org>
CC: "draft-ietf-ippm-ioam-ipv6-options@ietf.org" <draft-ietf-ippm-ioam-ipv6-options@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, "marcus.ihlar@ericsson.com" <marcus.ihlar@ericsson.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-10: (with DISCUSS and COMMENT)
Thread-Index: AQHZUfyRcaeuKUXtZUylNwozWX4vMK9Pb/VA
Date: Sun, 07 May 2023 17:42:39 +0000
Message-ID: <DM5PR11MB13072860D1930E3ED0EE8E94DA709@DM5PR11MB1307.namprd11.prod.outlook.com>
References: <167830731167.62600.18373118695908332308@ietfa.amsl.com>
In-Reply-To: <167830731167.62600.18373118695908332308@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM5PR11MB1307:EE_|PH0PR11MB7542:EE_
x-ms-office365-filtering-correlation-id: 70f90d9e-5595-4ff9-2b69-08db4f22742c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM5PR11MB1307.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(366004)(136003)(396003)(39860400002)(376002)(451199021)(83380400001)(66574015)(966005)(7696005)(478600001)(54906003)(71200400001)(110136005)(9686003)(6506007)(53546011)(186003)(2906002)(33656002)(38100700002)(52536014)(66476007)(66556008)(66946007)(76116006)(64756008)(4326008)(122000001)(41300700001)(66446008)(8676002)(8936002)(38070700005)(55016003)(86362001)(5660300002)(316002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: ehY25HZhoHpW5NUvEOTBuCD8EnIgdbIKFJGj3OSXl4+IqATeUiT5+/NcXhLRQbF1izc3GqP+jYciYOfutJyvYkYyIj+2voQP5PsWk/pcMOxnVt+p9AbDfDVYc+iPEE6IyfyFdhm1J6RRSpLrLr7UYgo6tCLW4QIzr/g6n1fgcpava6WQEMedTTInqCBsfLtLXaI3DZdzFW390NNvCJR4tfVosdKo+SfWOXPCPxalIlfmQQiwbu2PcBV5n/Vn78h67jNwjyVGnUHkysZiLEmo5avLKH1kS01UFi4egDmU/FzGLyt2Z3Ev9gMkNk9IoLQ8xHocP7bC/awCgKD669weq37vEs8KRG0kfgcnoGpnImOTHdfgOVBzqcSwxllO4GXL1R9SrN+d4xeliugT+KH5+6+LcMQwT16bCKc5Y/dKlPJKMDV9ES+++ij8GT41jn8yrmYLsSdkTU7tngorcyG/chQwdYGRC0axB7BbL7H+gfWzaqpSa+PTRtfLTkTN6sMLDKYGrPEGTX5CA3lLw3CyGd5b5bpUf9wpJcFXSxjw9+Abs5fsy4TrO8nC6z5MqEginijfQKY7AtMgajDd3oJAfCSs9zBQlKb2duYvMetOTTUxyem3TIgMENlQjHKDVwmX+F6aamp3OMFO+bqPulTg5u8Xk32A5gKwmqS9sG73w7KsYOeetBzWJsXL0bddEDlXzCQb7UvBzSvWvtYmW0AUK7z+KnMtJKLeQQ9XJ+bISQscu6Fg9d3l6NcKN1XS6OhfqnKYw+Ji+JgUIoocTNGxGTh/LqWwI6/1LQH99zOjl8qkmPnRR81SSHq7C66tawIax4wiD3l5aJJ8jJyj5FtiH5oaaUujtjK/EgxyLIl0YbC32I1SyGLAy8CrDd+dRYWcN+Mv6pq7QcxVo8Rak28u3wr3MWvKfb5UAOxgzoSnNZJydTHWEafMdfhro7Zxpuj37MtbSu+IqmE5wZEqKyzNcDB2oGSFj+jVGqex/Q/l0tq7ygX0ArTwTQ53mpQwxPffGsxWa1ATl8aYnUuUQrbVn2UWQOqRjd9kqzt2zkTeZedngp0QxY3ZkozYNHO1c7TR1O1jhC65cjcn1YaiuuouKapDJXB5J9jFqEI1LwVcn1O929ZoRls02TrXEx/KksCqAIjJEQQ+807iIqp92MKuGdVK/TNUZYfcR7moyMeabQohryUXCJ9rK9/JTHNRfQ1X0b1p+Okj+joOu/n1xyz3J1Sqr7Y0ZUZm7+3woC+yrm7jF7eoYjEtAQtM0anqz6wpuuhP25Mujg7JSirWQqomSbTCuTbtGo2VWawnfPmtoEUb18WsI5S24e1qg8WeULV/60/UDisLr1IRq3q/8A0LdcMDix1sbtAG54ueZ2fE1bH/OFIMD8EwGQzg14HTttrOjt4Am13IBaRtL696MMHO8uk2q6TNhadc2YRZkeQLzSooSZ5SRI3c2QeyBoSqbxEhrgiWLzXJkDdfBHNNBD2MoHlQV3KfH/BVLdVJTGc7MgXsehGWezMi+KOp0E2tF48IJEZpNQQU5v5Ml///ZWEo0Q==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR11MB1307.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 70f90d9e-5595-4ff9-2b69-08db4f22742c
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 May 2023 17:42:39.9476 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 0rnucYft4ZBz3oICWTaybGOa3Hw5BibP1S8WhVp5yxR5xD692rFrNvuMs0wakzixJqnTEewu0GShBBAt3kzzrg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB7542
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/QtpwkHLn-v2VGEqyQR7V4GpdbHk>
Subject: Re: [ippm] John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-10: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 May 2023 17:42:56 -0000

Hi John,

Thanks a lot for your comments - and thanks for already clearing your DISCUSS based on the draft-ietf-ippm-ioam-ipv6-options-11 - which addresses the "IOAM-Domain" topic. We've just posted  version -12 - which also addresses your other comments. Please see below.

> -----Original Message-----
> From: John Scudder via Datatracker <noreply@ietf.org>
> Sent: Wednesday, 8 March 2023 21:29
> To: The IESG <iesg@ietf.org>
> Cc: draft-ietf-ippm-ioam-ipv6-options@ietf.org; ippm-chairs@ietf.org;
> ippm@ietf.org; marcus.ihlar@ericsson.com; marcus.ihlar@ericsson.com
> Subject: John Scudder's Discuss on draft-ietf-ippm-ioam-ipv6-options-10:
> (with DISCUSS and COMMENT)
> 
> John Scudder has entered the following ballot position for
> draft-ietf-ippm-ioam-ipv6-options-10: Discuss
> 
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-ipv6-options/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> # John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-ipv6-options-
> 10
> CC @jgscudder
> 
> ## DISCUSS
> 
> Thanks for taking care of my previous DISCUSS! I'm so sorry to have to raise
> another one, related to the new text.
> 
>    C1  IOAM MUST be deployed as a limited domain feature as defined in
>       [RFC8799].
> 
> I applaud your desire to be prescriptive and concise. Unfortunately, I think
> there are a few problems here. First the small ones: you have RFC 8799 as
> an
> Informative reference, which is problematic since you want to make
> adherence to
> it mandatory. But, if you move it to be a Normative reference (as seems
> indicated), then we encounter two further issues: first and less importantly,
> it’s not an IETF document, so possibly needs to be treated as a downref?
> 
> But most importantly, as far as I can tell RFC 8799 does not define “a
> limited
> domain feature”. It provides a taxonomy for talking about limited domains
> and
> various considerations, but nothing I would call a “definition”. I confess I’ve
> only briefly reviewed 8799 just now, not fully re-read it, so maybe you will
> be
> able to point me to a clear and actionable definition, that an implementor
> of
> your spec could apply in order to comply with C1. If so, please do let me
> know
> what that definition is, and also update your reference to cite it
> specifically, rather than just the RFC number. In my own review of 8799, the
> closest I see is Section 6, "Functional Requirements of Limited Domains”. I
> will be a little surprised if you really want to require adherence
> requirements
> 1-11 in that section, though.
> 
> Sadly, I suspect that you’ll end up concluding that RFC 8799 isn’t fit for the
> purpose you’re trying to use it for and that you’ll need to write out in your
> own words what the specific requirements are for your case. It looks to me
> as
> though the taxonomy section of RFC 8799 might be quite useful to you in
> that
> respect, indeed that seems to be partly what it’s for:
> 
> ```
> A.9. Making Use of This Taxonomy
> 
> This taxonomy could be used to design or analyze a specific type of limited
> domain. ```
> 
> It’s unfortunate that we don’t have a good, citable definition of “limited
> domain” in our document set... but we don’t. This might be merely because
> nobody has bothered to write it yet, although I think the real reason is
> more
> likely that it turns out to be a sticky problem to nail it down to a definition
> that is both general enough to be broadly applicable and specific enough to
> be
> actionable.

...FB: Thanks again for the comments above - and thanks for already clearing the DISCUSS based on revision -11.
The approach that revision -11 took for the IOAM-Domain is similar to what was done for segment routing architecture  RFC8402 (Sections 8.2. and 2.).


> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> ## COMMENT
> 
> Thanks for taking care of many of my previous comments. A few appear not
> to
> have been addressed in version 10 nor responded to in email, please forgive
> me
> if I've missed a response. I repeat the comments below, with section
> numbers
> updated to match the numbering in version 10.
> 
> ### Section 3, reference for IOAM Type, nomenclature
> 
> ```
> IOAM Type: 8-bit field as defined in section 7.1 in [RFC9197].
> ```
> 
> Section 7.1 of RFC 9197 is the IOAM Option-Type Registry in the IANA
> Considerations section. I wouldn't say an IANA registry "defines" anything,
> it
> lists code points. I think a better reference would be Section 4 of 9197,
> which
> does indeed define IOAM-Option-Types (in Section 4.1).
> 
> Also, it would be better to be consistent with your naming, in RFC 9197 you
> don't call this the "IOAM Type" but rather the "IOAM-Option-Type" (34
> occurrences in 9197) or "IOAM Option-Type" without the first hyphen (4
> occurrences in 9197). I see why you don't want to use the full string from
> RFC
> 9197 in your packet diagram (too many characters) but "IOAM-Opt-Type"
> would fit
> in the character budget.

...FB: Thanks. This is indeed confusing. 
The latest revision uses "IOAM-Opt-Type" in the diagram and "IOAM-Option-Type" 
in the associated description:

   IOAM-Option-Type:  Abbreviated to "IOAM-Opt-Type" in the diagram
      above: 8-bit field as defined in section 4.1 of [RFC9197].

> 
> ### Section 4.2, encapsulation?
> 
> ```
> For deployments where the IOAM domain is bounded by hosts, hosts will
> perform
> the operation of IOAM data field encapsulation and decapsulation. ```
> 
> Do you intend to imply that the hosts at the edge of the domain are
> sending
> IP-in-IPv6 encapsulated data? It wouldn't seem to be required; since the
> hosts
> are the source/sink of the packets, the problem described in C6 doesn't
> apply,
> and the host can directly place the IOAM data in the header. (What would
> be the
> "inner header" in an overlay solution.)
> 
> I suppose it's technically accurate to describe this as an "encapsulation and
> decapsulation" operation, insofar as any data placed in any header might be
> said to be encapsulated in that header -- but it's misleading. I think this
> section needs to be rewritten to make the meaning plain. For example,
> something
> like "... hosts will place the IOAM data field directly in the IPv6 header."
> (You could say "outer IPv6 header" since there's nothing precluding a host
> from
> sending tunneled packets for some purpose.)
> 
> (I notice Éric Vyncke raises a similar concern about the nontraditional use of
> the term "encapsulation" in his comments.)

...FB: "Encapsulation/Decapsulation" could indeed be misread - as you and Eric pointed out.
Revision -12 now references RFC 9197 for the definition of these terms for this document - and also provides a short description in the intro section:

   The terms "encapsulation" and "decapsulation" are used in this
   document in the same way as in [RFC9197]: An IOAM encapsulating node
   incorporates one or more IOAM-Option-Types into packets.  An IOAM
   decapsulating node removes IOAM-Option-Type(s) from packets.

In addition, we've updated section 4.2 according to your suggestion:

4.2.  IOAM domains bounded by hosts

   For deployments where the IOAM domain is bounded by hosts, hosts will
   perform the operation of IOAM data field encapsulation and
   decapsulation, i.e., hosts will place the IOAM data fields directly
   in the IPv6 header or remove the IOAM data fields directly from the
   IPv6 header.  IOAM data is carried in IPv6 packets as hop-by-hop or
   destination options as specified in this document.

> 
> ### Section 4.3, encapsulation again
> 
> This one is less misleading, but by analogy to 4.2 I suspect more clarity is
> required here too.
> 
> ```
> For deployments where the IOAM domain is bounded by network devices,
> network
> devices such as routers form the edge of an IOAM domain. Network devices
> will
> perform the operation of IOAM data field encapsulation and decapsulation.
> ```
> 
> For example, a more straightforwardly understandable version of the last
> sentence might be "Network devices will encapsulate in-flight packets in an
> outer IPv6 header which carries the IOAM data field."

...FB: Much like for section 4.2 - we also followed you suggestion for 4.3:

4.3.  IOAM domains bounded by network devices

   For deployments where the IOAM domain is bounded by network devices,
   network devices such as routers form the edge of an IOAM domain.
   Network devices will perform the operation of IOAM data field
   encapsulation and decapsulation.  Network devices will encapsulate
   IOAM data fields in an additional, outer, IPv6 header which carries
   the IOAM data fields.


Thanks again for all your guidance and help!

Cheers, Frank
 
> 
> ## Notes
> 
> This review is in the ["IETF Comments" Markdown format][ICMF], You can
> use the
> [`ietf-comments` tool][ICT] to automatically convert this review into
> individual GitHub issues.
> 
> [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
> [ICT]: https://github.com/mnot/ietf-comments
> 
>