Re: [ippm] Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-15: (with DISCUSS and COMMENT)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Mon, 08 November 2021 09:06 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3D6C3A0CFC; Mon, 8 Nov 2021 01:06:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.618
X-Spam-Level:
X-Spam-Status: No, score=-9.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=FEzgdC4F; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=wwLVsECb
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JsVxufjKRblW; Mon, 8 Nov 2021 01:06:22 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3E993A1243; Mon, 8 Nov 2021 01:05:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26988; q=dns/txt; s=iport; t=1636362328; x=1637571928; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=RpWu41oOsX1GFziqcvnFQCRXb40RLx+AM5DzOEt52+0=; b=FEzgdC4FEkDfx52Y94Psph92Ur6CPrWL8exFVyFHhPxG5yoLgb/77ADH 5lwME/UkE76X/A5FbD9vH+GK/yxjEqRl0GVHGIKN2diWx37gBH44FVSSj 5xC0xFvP0SSHJ2KO+iZV9i/JhulBCxaSv2hMfrQIzFiqaZ170WumjIX+x Y=;
IronPort-PHdr: =?us-ascii?q?A9a23=3AMVf6ORKcLxNIE4Yvk9mcuX8yDhhOgF28FgsU9?= =?us-ascii?q?twqh68dOqig/pG3OkvZ6L0tiVLSRozU5rpCjPaeqKHvX2EMoPPj+HAPeZBBT?= =?us-ascii?q?VkJ3MMRmQFzBc+ZT0D3Ma2iYykzBs8XUlhj8jmyOlRUH8CrYVrUrzWy4DceF?= =?us-ascii?q?w+5OxByI7H+G5XZiIK80OXhk6A=3D?=
IronPort-Data: =?us-ascii?q?A9a23=3AhHD4EKgphiZ9ky0x6n8jcb5RX1614RIKZh0uj?= =?us-ascii?q?C45NGQN5FlHY01jehtvCmGOM/ncZTTwKt4gbY2/oEwP656HnYMyTQVl+3w2H?= =?us-ascii?q?39jpJueD7x1DKtf0wB+jyH7ockOA/w2MrEsF+hpCC+DzvuRGuK59yAljPnYH?= =?us-ascii?q?uOU5NPsY0ideyc1EE/Ntjo78wIJqtYAbemRW2thi/uryyHsEAfNNwpPD44hw?= =?us-ascii?q?/nrRCWDExjFkGhwUlQWPZintbJF/pUfJMp3yaqZdxMUTmTId9NWSdovzJnhl?= =?us-ascii?q?o/Y1w0mBtXgmbHhfwhQBLXTJgOJzHFRXsBOgDAb+Xd0ifl9ZaFaMBoM49mKt?= =?us-ascii?q?4gZJNFlu5aqTgwqOKDkk+UGWB4eGCZ7VUFD0O6beiHl4JHClSUqdFOpmZ2CF?= =?us-ascii?q?noeNIYd0vx6GmxH7/cYbjkRclaIgOfe6LOjUuxEh8k/Io/sJox3knB41TScB?= =?us-ascii?q?vYvQIrYa6TH+dEe2y0/7uhCB//Qe48YZCZhKRXYexgKO1AeDdcylfuhrnjyb?= =?us-ascii?q?zMer0iazYI27nPc5A18zLarN8DaEvSJTMlInW6dp36A8mjkaiz2nvT3JSGt6?= =?us-ascii?q?HmggKrEmjn2HdhUH7yj/fksi1qWrlH/wSY+DTOTycRVQGbnMz6HF3Epxw=3D?= =?us-ascii?q?=3D?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3Acan0U6y+h70sC+p++L5nKrPxjuskLtp133?= =?us-ascii?q?Aq2lEZdPULSK2lfpGV8sjziyWatN9IYgBepTiBUJPwJk80hqQFn7X5Wo3SHT?= =?us-ascii?q?UO2VHYYr2KiLGD/9SOIVyEygcw79YET0E6MqyNMbEYt7e73ODbKadb/DDvys?= =?us-ascii?q?nB7o2yowYPPGNXguNbnnpE422gYytLrXx9dOIE/e2nl7N6TlSbCBAqR/X+Ik?= =?us-ascii?q?NAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uEA9n8PMHyyzoggb57q?= =?us-ascii?q?Ksv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+cyDpAJb4RHoFqjgpF591H22?= =?us-ascii?q?xa1uUkZC1QZvib3kmhOl1dZyGdgzUIngxesEMKgmXo8EcL6faJNA7STfAx37?= =?us-ascii?q?6wtnDimhYdVBYW6tMX44vRjeslMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZ?= =?us-ascii?q?IZc6I5l/1TwKp5KuZKIMvB0vFsLACuNrCq2N9GNVeBK3zJtGhmx9KhGnw1Ax?= =?us-ascii?q?edW0AH/siYySJfknx1x1YRgJV3pAZOyLstD51fo+jUOKVhk79DCscQcKJmHe?= =?us-ascii?q?8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR42Mi6PJgTiJcikpXIV11V8W?= =?us-ascii?q?Y0ZkL1EMWLmIZG9xjcKV/NFQgFCvsurqSRloeMMYYDABfzPmzGyfHQ0cn3Kv?= =?us-ascii?q?erL8qOBA=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BuAADO54hh/5ldJa1aDg8BAQEBCQE?= =?us-ascii?q?SAQUFAUCBRQgBCwGBUSMuB3daEyQxhEeDRwOEWWCIEQOQIYphgS4UgREDVAs?= =?us-ascii?q?BAQENAQE3CgQBAYUCAheCPAIlNAkOAQIEAQEBEgEBBQEBAQIBBgSBEROFaA2?= =?us-ascii?q?GQgEBAQECARIREQwBASULBwELBAIBCBEEAQEDAiYCAgIwFQgIAgQBDQUIEwe?= =?us-ascii?q?CUIJVAw4hAQ6ecAGBOgKKH3qBMYEBgggBAQYEBIE2ARNBgn8YgjUDBoEQKgG?= =?us-ascii?q?DCoQagn6BWYItJxyBSUSBFUOBZoEBPoJjAgOBJwEBCwEGAQccgxY3gi6ON2s?= =?us-ascii?q?GARYnJgEDDRUNDAgQFDswEgcrCQEDBAMDCxgFAQEPFAURESyRNCIEEIM1lie?= =?us-ascii?q?RUIEkCoM4ik6GcodYhgMVg2yLcYZKgzqHCIY/HZVzH4xVlAgCBIUBAgQCBAU?= =?us-ascii?q?CDgEBBoFhO2lwcBWCcAEBMlEZD44gDBYVgzuFFIUFRXQ4AgYBCgEBAwmOLwE?= =?us-ascii?q?ngh4BAQ?=
X-IronPort-AV: E=Sophos;i="5.87,218,1631577600"; d="scan'208";a="943129592"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 08 Nov 2021 09:05:25 +0000
Received: from mail.cisco.com (xbe-aln-004.cisco.com [173.36.7.19]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 1A895PRo019507 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 8 Nov 2021 09:05:25 GMT
Received: from xfe-rtp-002.cisco.com (64.101.210.232) by xbe-aln-004.cisco.com (173.36.7.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Mon, 8 Nov 2021 03:05:25 -0600
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Mon, 8 Nov 2021 04:05:24 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Mon, 8 Nov 2021 03:05:24 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=k5sSR9zVU0osBnM1SvBzJwbY4PVoMczoVRtHAgBCYAqk/66RpXo5aMPT0aWagkkz4H5b4PGHDsjwCWmG50qM8ZK3FQaaSMUyD0mv9InMRa/VQKzH2NSAYaziiXhb+SB1s3c4Up3SMuDyDiego7iJfu9Fl+lU9ugVJuGmjdfhNfaRijoI+GeAAl+1uURqmiabKxLDJht8PGpBVSbwDwqaqpRqtv5KLe5MTuctXT9j5y5afO+nSl4T7hrbSZcOY3nqH7BmCXF39ew/G70AmVvKwLe4lft2fFW3daVzoj3/dmyXZamTdz2KjkcLI6Mfqy6hDBQ8WbgWvZReoLU/N/rkMw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RpWu41oOsX1GFziqcvnFQCRXb40RLx+AM5DzOEt52+0=; b=c5Y4fUuZIHLdUVVMEs00ZU+2UmOMWjdazyGXb7hcgrb6ZoRH7aiUYwj0VmiAuKzlMhlXNdfpKdg4NZqeKc4MFEzJYvLOjTwZP8nImt/W+JIKVnXX35GFyJCLH+OITEQVSrgA5qfztFxgEpimIBD+8MiA8A0jGHkZnICe22H8G9VlpQA3RtpRTQNmmY4kjFgjyf+M5jT7hX0ojU2ya0Mvf+WrXEAb2bql45FHqfjJGZXFLdxQpGQxZAQ8ZFIYVMYUmWa0CZeEo6kCxqBwscTObHX8QQHWF47nUVUEmsdHuMDAWBId8oxaqw0tD5jSkqrxMXJUDbTRUoJ4xW09O3JSOQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RpWu41oOsX1GFziqcvnFQCRXb40RLx+AM5DzOEt52+0=; b=wwLVsECbElcsqhN5yEx9xFevHM9lUY/NbpWpyqtvOxSBVSXj336Bmx4CFo3LG+ZCEls4oCn3zaUl9WiwmklTPekuKak1ZvfeS3gX8WQaBy9JfWZnlyhTHPj2SHd6NJXA2/X6JFyzbluaH2MpIeXLhzFcaUhZBBl9FpGzrU2A8Ko=
Received: from DM8PR11MB5606.namprd11.prod.outlook.com (2603:10b6:8:3c::23) by DM4PR11MB5567.namprd11.prod.outlook.com (2603:10b6:5:39a::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4669.10; Mon, 8 Nov 2021 09:05:22 +0000
Received: from DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::f08e:4b62:6e0:5854]) by DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::f08e:4b62:6e0:5854%3]) with mapi id 15.20.4649.019; Mon, 8 Nov 2021 09:05:22 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-ippm-ioam-data@ietf.org" <draft-ietf-ippm-ioam-data@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, Al Morton <acm@research.att.com>
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-15: (with DISCUSS and COMMENT)
Thread-Index: AQHXvu+QEKMI+comg0mGHgiPZ24fkav5d9yw
Date: Mon, 8 Nov 2021 09:05:22 +0000
Message-ID: <DM8PR11MB56061971838DDC19A6CF4013DA919@DM8PR11MB5606.namprd11.prod.outlook.com>
References: <163399139337.5936.5073810021440741362@ietfa.amsl.com>
In-Reply-To: <163399139337.5936.5073810021440741362@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ee9ceabd-a4c7-4ba6-ded3-08d9a296e587
x-ms-traffictypediagnostic: DM4PR11MB5567:
x-microsoft-antispam-prvs: <DM4PR11MB556734B3B17393442B930140DA919@DM4PR11MB5567.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM8PR11MB5606.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(508600001)(316002)(966005)(2906002)(186003)(38070700005)(4326008)(26005)(9686003)(8936002)(33656002)(38100700002)(83380400001)(55016002)(30864003)(122000001)(66446008)(53546011)(7696005)(86362001)(66574015)(76116006)(52536014)(6506007)(66946007)(66556008)(66476007)(64756008)(5660300002)(110136005)(54906003)(8676002)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ZEtBQkFsbFNyS1Bmb1I4ZHNXSmZaSW5pMURSeXo5aWwzcmdhUWZ0eC9XbXd5?= =?utf-8?B?NEg4US9remtrVGZrN0VuL0NGamVYaC9mS2ZqMzR0akNEM3YwUzFFVjJJemFm?= =?utf-8?B?enVFSDF1OGVuaEx4ZHRVQXZRRjdkN3ZIYkNveGpQYS83eG50dXlyUS85TkUy?= =?utf-8?B?Sy9qYmlibjYrWEdoRm9iNm4xdmRveFJJN2JsUXd1c0xEbXgxV0JxT3BtaXdY?= =?utf-8?B?OGlneHBjVmRPNjk3dUNvcFhCZlBZK3ozb3hnUHVMcWhqZ056SlBaR2t5MS9D?= =?utf-8?B?amZYTFVWWDBMekhrNkRLdWNVcHJDZjJzV3U4czV2dDI3NzRLZVQ5c0FpL3Q0?= =?utf-8?B?T0ZLZFBaOStyRGZCTUNlaEJvTGRpRHB1VnlRSklFdkdxSVhoODlTWWtPMzJN?= =?utf-8?B?UDB5Q1Zoa2Y0Q2FiUkhLZ0VqbVVOMW1FNUZFb0dOUGh4Lzk1eHMzY3BuSUNU?= =?utf-8?B?VEJndVAyeUx1anNwNFFzd1E1SG5uV0dldGxRVk13aG5sUXZEOVl3QzE0NXpR?= =?utf-8?B?QW9VdkM4bGRDVUlGTXlrY1FEK2pDaHRxSS9xTVdkYW5wVm9vbUxWeGZBYnRw?= =?utf-8?B?UzNJNm9BdW5SMDZVMTVBdlA0VGtxby9TU0R2WWpNb2RNdFl2RFNYTlU1TUhS?= =?utf-8?B?U1NLQTRpZC9oZUIzRFNjdjNvRmNnOGp2ZFFRRlZPQXBkQTNabTcxcUxGMjZW?= =?utf-8?B?bWNYbjR2Q2R0RVY1Uzl5ZmdUVXhXd0haWGE2MzZZdkRYSC9ldHdtdTZHdlJC?= =?utf-8?B?Y0J3Y0U3WEdIT3RERjJaZmdPMVNzWGg4OXNCWTBxWm9kbDFmNzFGTDBjTVlj?= =?utf-8?B?cHFqZlpQWCtIcGMxRG53cmxPOVVSZjNmck1NY0w2UGdVYXVYejFVaW84R2VX?= =?utf-8?B?c25zbW5aM25iZGpXQ2FYa29YQjFPQU11MktTdWZ5UkI0R3VqdkxodjJNdno1?= =?utf-8?B?dzhIUnpOSFBYamVFTkNOZEJuK0NYQUdNSHNtMERtRWk0VmVnR1gzRk1YbnNX?= =?utf-8?B?RldJeUlZTEhKcWRpaUFrTU9nbzNIOWEyZi93T3NHNGZ4TTJxNDJqaDdxd3My?= =?utf-8?B?RVNTSXYvNElWVDVaSWY5eWhFR2xRQmVnbnd5SCtqaGJlUkl3YjNnVStWUmZK?= =?utf-8?B?OWtMelM2YlJoODNSV0NwOUIrRjZHNmMrTTlkTmFsTVVFbWlMNjVuemRISzFI?= =?utf-8?B?dktjdGRJTlZiZzd6dzdyeW9HMkZpanEycythblJ6MVRlWW5HaGtLUnVSMHlG?= =?utf-8?B?NXY0WjV6YzQ5WUQ0cDNPaXhLcElvSnVML2ZVS08xTWxMNnRUZUlTTGV2OGND?= =?utf-8?B?b0czZmtUekdMSVRwQzlKN2pkT25XWVVRbms5WmNYZkRCR2E0OVE2M1ZHWWl1?= =?utf-8?B?aitmb3RGd2tVVWNsdEhNUlZYM1RTc1pQSm41MjZqNmkzRW95aWdyTHBEN0Ev?= =?utf-8?B?SUxLemNPeHI5NTcwR2cybUgyWkVvUzMwMWw0TkZwZ3JScG5iZ2JzTFBpSUVF?= =?utf-8?B?OEJERUN1TXEyY0FBWmZEdjR3enphOTVBRElhVkFKUERIUTlvWW5MSzNxMCtR?= =?utf-8?B?V3NxSmRYQXBYMTh6U2RxUUR5OUF6K2tLTlpSMGRNVUhGNGt0N3ZyazNMdzFR?= =?utf-8?B?Rks5Qlk0N1FaM3NRMlVuMlBLWDdJYSt4QzNsTkFzUk01OFlyVWo1NUZPTmVu?= =?utf-8?B?eVJyL0hnNnlvY29CRVU4VmtZVzZRRmNlOU1mWURKVUlqa3NhN1phNWxUSHFU?= =?utf-8?B?NVM0YndhYlV1QTZCd05ZcEdqWDRhRzkvM0ZaL0VuVDJ5cTBPMTFlaEh0NGVI?= =?utf-8?B?Y01JVjZNUmp2NTB6Q3hUbjdjZCtvMmZiaml6bWFLVFB4cDNXSlV0SS8zNTkw?= =?utf-8?B?Zk5XTXBrMDhBSU9xV0ZlRE9QeU1ZZktKamt4NHlMU3M3T3FiSkw4dEdhZFRH?= =?utf-8?B?S05wK0EzOGF0UHBkT2UvSHE2OWNLb3VwVUlUN2c1aHlvTzc4SGhXQXJ4VUJu?= =?utf-8?B?MlFiUVNBcHllTXBadVJOckJnQXJqZ1BpVkZuSFNMQUZmY1VYSmlDZHJrV0Q4?= =?utf-8?B?L1pzeWhWS2R4d3ZQQ1htWVhhTnhzNG5WZ1JRdU0yNFJ3ZTVlTUNscmJGREpR?= =?utf-8?B?NjhUVnRrK2JVc1RublNhcmZKVU1MTlEwSVlHUUh3V3NraTlaSC9Pa0swSXhK?= =?utf-8?B?S2c9PQ==?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM8PR11MB5606.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ee9ceabd-a4c7-4ba6-ded3-08d9a296e587
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Nov 2021 09:05:22.8161 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: uxGIvafnQsBs1N4K/1CnGo7FghwYSpPl92GxH7t5W60KkIhUyXkBEVxrcWwoKLwLDbpLwPgD5k/zV/KNPlg6sA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB5567
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.19, xbe-aln-004.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/zDaEbpjbmJ-_IAaa1JigxognaY8>
Subject: Re: [ippm] Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-15: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Nov 2021 09:06:27 -0000

Hi Ben,

Thanks a lot for another really thorough review. GREATLY appreciated.
We just published -16 to address your comments and your discusses below.
Please also find responses inline.

> -----Original Message-----
> From: Benjamin Kaduk via Datatracker <noreply@ietf.org>
> Sent: Tuesday, 12 October 2021 00:30
> To: The IESG <iesg@ietf.org>
> Cc: draft-ietf-ippm-ioam-data@ietf.org; ippm-chairs@ietf.org; ippm@ietf.org;
> Al Morton <acm@research.att.com>om>; acm@research.att.com
> Subject: Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-15: (with
> DISCUSS and COMMENT)
> 
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-ippm-ioam-data-15: Discuss
> 
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-data/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> Thanks for the many updates and email discussion about the relationship
> between limited (network) domains, IOAM domains, IOAM namespaces, and the
> like -- I think I do now have a pretty clear picture of how they're expected to
> interact!  However, I think there may still be a couple places in the document
> that need to get updated in order to match that vision.  One point here, and
> some (more minor) instances in the COMMENT section...
> 
> Section 5.2 has:
> 
>    The role of an IOAM-encapsulating, IOAM-transit or IOAM-decapsulating
>    node is always performed within a specific IOAM-Namespace.  This
>    [...]
>    described above, that is added in a future revision.  An IOAM
>    decapsulating node situated at the edge of an IOAM domain MUST remove
>    all IOAM-Option-Types and associated encapsulation headers for all
>    IOAM-Namespaces from the packet.
> 
> The "MUST remove [...] for all IOAM-Namespaces" at the end seems to conflict
> with the notion of the role of IOAM-decapsulating node being performed within
> a specific IOAM-Namespace.  Indeed, later on in Section
> 5.3 we see that namespace identifiers "allow devices which are IOAM capable to
> determine: [...] o  whether IOAM-Option-Type(s) have to be removed from the
> packet, e.g., at a domain edge or domain boundary."  If a decapsulating node
> always had to remove IOAM options from all namespaces, then the namespace
> identifier is irrelevant to whether option type(s) are removed from the packet.

...FB: Good catch. This is a left-over from earlier discussions and indeed inconsistent with how Namespaces are defined now.
The sentence: " An IOAM decapsulating node situated at the edge of an IOAM domain MUST remove all IOAM-Option-Types and associated encapsulation headers for all IOAM-Namespaces from the packet." got removed.

> 
> 
> [the following paragraph is retained unchanged from my ballot position on the -
> 12, since the topic seems to still be open.]
> 
> As foreshadowed in
> https://mailarchive.ietf.org/arch/msg/last-call/Ak2NAIKQ7p4Rij9jfv123xeTXQY/
> I think we need to have a discussion about the expectations and provisions for
> cryptographic (e.g., integrity) protection of IOAM data.
> >From my perspective, IOAM is a new (class of) protocols that is seeking
> publication on the IETF stream as Proposed Standard.  While we do make
> exceptions for modifications to protocols that were developed before we
> realized how important integrated security mechanisms are, it's generally the
> case that new protocols are held to the current IETF expectations for what
> security properties are provided; the default expectation is that a protocol is
> expected to provide secure operation in the internet threat model of RFC 3552.
> This draft currently only provides a brief note in the security considerations that
> there exists an individual draft (draft-brockners-ippm-ioam-data-integrity) that
> might provide ways to protect the integrity of IOAM data fields.
> Shouldn't the security mechanisms be getting developed side-by-side by the
> protocol mechanisms, to ensure that they are properly integrated and fit for
> purpose?  (This does not necessarily have to be in the same document and could
> be part of a cluster of related documents, but I don't think that an informative
> reference to a non-WG draft really
> qualifies.)
> 
> [new disucssion on this topic as of the -15] The discussion on this topic was over
> a rather protracted timescale, for which I share much of the blame.  I think that
> the latest message is
> https://mailarchive.ietf.org/arch/msg/ippm/POycw2NpSl5cIruqSimTa_4WrwI/
> where I make a proposal to have some text about how actual use of these data
> fields in a protocol or encapsulation needs to provide some (possibly optional)
> mechanism for cryptographic integrity protection, which could be draft-
> brockners-ippm-ioam-data-integrity but could also be native to the
> encapsulation format.  I think that such a construction would allow this
> document to proceed to RFC without waiting for the other one to be complete.

...FB: The new version -16 includes the following paragraph - following your suggested approach, and also referencing I-D.ietf-ippm-ioam-data-integrity, which is the WG adopted version of draft-brockners-ippm-ioam-data-integrity.

   IETF protocols require features to ensure their security.  While IOAM
   data fields don't represent a protocol by themselves, the IOAM data
   fields add to the protocol that the IOAM data fields are encapsulated
   into.  Any specification that defines how IOAM data fields carried in
   an encapsulating protocol MUST provide for a mechanism for
   cryptographic integrity protection of the IOAM data fields.
   Cryptographic integrity protection could be either achieved through a
   mechanism of the encapsulating protocol or it could incorporate the
   mechanisms specified in [I-D.ietf-ippm-ioam-data-integrity].
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> All-new (okay, almost all) comments as of the -15.
> 
> Mentioning here for lack of a better place, I happened to follow the reference
> to draft-brokners-opsawg-ioam-deployment, which seems to still be using the
> old definition of transit node and should get updated to match this document's
> definition.
> 
> Section 5.2
> 
>    IOAM is expected to be deployed in a specific domain.  The part of
>    the network which employs IOAM is referred to as the "IOAM-Domain".
> 
> In light of the (new) text up in §5, we might consider rewording this part as well,
> mostly to avoid mentioning "network" that risks confusion about "network
> domain" (pre previous discussion).

...FB: Section 5.2 starts off now with "Section 4 already mentioned that IOAM is expected to be deployed in a
   limited domain [RFC8799]."

> 
>    An "IOAM transit node" read and/or write and/or process one or more
>    of the IOAM-Data-Fields.  If both the Pre-allocated and the
>    Incremental Trace Option-Types are present in the packet, each IOAM
>    transit node based on configuration and available implementation of
>    IOAM populates IOAM trace data in either Pre-allocated or Incremental
>    Trace Option-Type but not both.  [...]
> 
> Since we redefined transit nodes to include only reading, in addition to
> modifying, it doesn't seem 100% accurate to say that "each transit node
> populates [one or the other but not both]" -- it seems valid for a transit node to
> populate zero of the trace option types.

..FB: Good catch. Given that no change is indeed an option, we changed "populates" to "might populate".

> 
> Section 5.3
> 
>    An IOAM-Namespace can be associated to a subset or all of the the
>    IOAM-Option-Types and their corresponding IOAM-Data-Fields.  IOAM-
> 
> This sentence seems confusing to me.  It talks about namespaces as if they
> contain options, but if we go on to examine the actual data structures each
> option has a field to indicate the associated namespace.
> We even go on to say that the IOAM-Namespace field "MUST be included in all
> future IOAM-Option-Types" (side note: might be worth calling that out in the
> guidance in the IANA considerations, and also to specifically say that it's the first
> field of the option).  So it's really not clear to me what this sentence is adding --
> would it be safe to just remove it?

...FB: Indeed. The sentence does not add anything. We removed "An IOAM-Namespace can be associated to a subset or all of the the  IOAM-Option-Types and their corresponding IOAM-Data-Fields. "
  The IANA section now also has a note that asks for checks for newly defined Option-Types.
 
> 
>    o  IOAM-Namespaces can be used by an operator to distinguish
>       different operational domains.  Devices at domain edges can filter
>       on Namespace-IDs to provide for proper IOAM-Domain isolation.
> 
> I suggest tweaking the wording to clarify that the "different operational
> domains" in the first sentence are precisely the "IOAM-Domain"s of the second
> sentence.

...FB: Good point. The paragraph now reads: 
     "IOAM-Namespaces can be used by an operator to distinguish
      different IOAM-domains.  Devices at edges of an IOAM-domain can
      filter on Namespace-IDs to provide for proper IOAM-domain
      isolation."

> 
>       *  Assigning different IOAM Namespace-IDs to different sets of
>          [...]
> 
> There are two instances of a bullet point that talks about assembling a full trace
> from partial traces, but the text has substantial differences.  I suspect that one is
> just an editing artifact and should be removed, but am less sure which one has
> the intended text (I would guess the latter, for what it's worth).

...FB: Uuuups. My bad. The first bullet got removed. It was indeed redundant and a left-over from editing.

> 
> Section 5.4
> 
>    "IOAM tracing data" is expected to be collected at every IOAM transit
>    node that a packet traverses to ensure visibility into the entire
>    path a packet takes within an IOAM-Domain.  [...]
> 
> Since we redefined transit nodes to include only reading, this "is expected to be
> collected" doesn't seem entirely representative anymore.

...FB: Fully agreed. The sentence ""IOAM tracing data" is expected to be collected at every IOAM transit
   node that a packet traverses to ensure visibility into the entire
   path a packet takes within an IOAM-Domain." is at best a statement about potential deployments.
   It does not really fit into the document - and thus got removed.

> 
>    [...].  If not all nodes within a domain support IOAM functionality
>    as defined in this document, IOAM tracing information (i.e., node
>    data, see below) will only be collected on those nodes which support
>    IOAM functionality as defined in this document.  [...]
> 
> Similarly, I might s/will only/can only/ here for the same reason.

...FB: Done.

> 
> 
> Section 5.4.2
> 
>    Some IOAM-Data-Fields defined below, such as interface identifiers or
>    IOAM-Namespace specific data, are defined in both "short format" as
>    well as "wide format".  "Short format" refers to an IOAM-Data-Field
>    which comprises 4 octets.  "Wide format" refers to an IOAM-Data-Field
>    which comprises 8 octets.  [...]
> 
> We have definition entries for short/wide format in Section 3, so these
> clarification sentences may not be needed.

...FB: Removed the two sentences which restated the definition of short/wide format.

> 
> Section 5.5
> 
> draft-ietf-sfc-proof-of-transit might be undergoing significant changes
> prompted by the results of its secdir review thread.  I don't object to leaving this
> discusison in place but it may be prudent to think about paring down what we
> say here.  In particular, there seems to be some (admittely, small) chance that
> the SFC doc will not have exactly two POT types.

...FB: Given the uncertainties around draft-ietf-sfc-proof-of-transit, draft-ietf-ippm-ioam-data-16 no longer uses draft-ietf-sfc-proof-of-transit as a reference. 
The key fields for POT Type 0 - PacketID and Cumulative are generic, straight forward and thus don't require the SFC draft.
Per what you state above: The note on the particular flag to signal the active profile was very specific to the current method used in the POT draft.
It got removed. Should a future POT solution require it, it can be specified in a corresponding draft.

> 
> Section 6.3
> 
> It seems that in going from the -12 to -15 we lost the paragraph about leap
> seconds here.  My understanding is that posix timestamps *are* affected by leap
> seconds, and so it is correct to include such a statement.  My ballot comment on
> the -12 was conditioned on the use of TAI for the epoch, and thus my comment
> on the -12 is irrelevant.

...FB: The draft now references RFC8877 and other timestamp sources, rather than it tries to reexplain timestamp formats. As a consequence, there is indeed no discussion on leap seconds etc. Hope this works for you. Otherwise the document ends up loaning from other specs without adding much - and potentially leading to misalignment and confusion. 

> 
> Section 10
> 
> We should probably say that the opaque snapshot, namespace specific data,
> etc., will have security considerations corresponding to their defined data
> contents that should be described where those formats are defined. [ed. this
> remains unchanged from my comment on the -12; I'm not sure if the intent to
> add some text just got overlooked, but don't intend to rehash any discussions
> that were already made.]

...FB: The following paragraph got added to reflect your note above:

This document does not define the data contents of custom fields like
   "Opaque State Snapshot" and "namespace specific data" IOAM data
   fields.  These custom data fields will have security considerations
   corresponding to their defined data contents that need to be
   described where those formats are defined.

> 
> Since we clarified the definition of transit nodes to include read-only transit
> nodes, we might want to say something about how transit nodes that only
> implement support for one or the other trace option types (as is clearly
> permitted) will have an incomplete picture of the trace in cases where both
> trace option types are used for the same packet.  In many cases that is
> innocuous, of course, but it does not seem guaranteed to always be so.

...FB: Good point. -16 now states:

IOAM deployments which leverage both IOAM Trace Option-Types, i.e.,
   the Pre-allocated Trace Option-Type and Incremental Trace Option-Type
   can suffer from incomplete visibility if the information gathered via
   the two Trace Option-Types is not correlated and aggregated
   appropriately.  If IOAM transit nodes leverage the IOAM data fields
   in the packet for further actions or insights, then IOAM transit
   nodes which only support one IOAM Trace Option-Type in an IOAM
   deployment which leverages both Trace Option-Types, have limited
   visibility and thus can draw inappropriate conclusions or take wrong
   actions.

> 
>    allowing attackers to collect information about network paths,
>    performance, queue states, buffer occupancy and other information.
> 
> One possible application of such reconiassance is to gauge the effectiveness of
> an ongoing attack (e.g., if buffers and queues are overflowing).  I don't know
> whether it's particularly useful to mention that scenario here or not, though, and
> the lack of response the previous time I made the comment suggests that it's
> not actually useful to mention it.

...FB: It is useful to be mentioned of course. -16 now adds:

" One
   possible application of such reconnaissance is to gauge the
   effectiveness of an ongoing attack, e.g., if buffers and queues are
   overflowing."

> 
>                   Indeed, in order to limit the scope of threats
>    mentioned above to within the current network domain the network
>    operator is expected to enforce policies that prevent IOAM traffic
>    from leaking outside of the IOAM domain, and prevent IOAM data from
>    outside the domain to be processed and used within the domain.
> 
> On the -12, I said "it would be great if we could provide a bit more detail on the
> scope of consequences if the operator fails to do so."
> Some of the follow-up discussion suggested that draft-brockners-opsawg-ioam-
> deployment would be a better home, which I don't object to; I'm retaining this
> comment just in case there was actual desire to put such content in this
> document.  No specific reply is expected or required, either way.

...FB: ACK.

> 
> NITS
> 
> Section 5.3
> 
>       controllers.  For example, the node identifier field (node_id, see
>       below) does not need to be unique in a deployment (e.g., if an
>       operator wishes to use different node identifiers for different
>       IOAM layers, even within the same device; or node identifiers
>       might not be unique for other organizational reasons, such as
>       after a merger of two formerly separated organizations), the
>       Namespace-ID can be used as a context identifier, such that the
>       combination of node_id and Namespace-ID will always be unique.
> 
> This looks like a comma splice (maybe put a sentence break after the long
> parenthetical?).

...FB: The monster got split up: 
     The node identifier field (node_id, see below) does
      not need to be unique in a deployment.  This could be the case if
      an operator wishes to use different node identifiers for different
      IOAM layers, even within the same device or node identifiers might
      not be unique for other organizational reasons, such as after a
      merger of two formerly separated organizations.  The Namespace-ID
      can be used as a context identifier, such that the combination of
      node_id and Namespace-ID will always be unique.

> 
>       *  Assigning different IOAM Namespace-IDs to different sets of
>          nodes or network partitions and using the Namespace-ID as a
>          selector at the IOAM encapsulating node, a full trace for a
>          flow could be collected and constructed via partial traces in
>          different packets of the same flow.  Example: An operator could
> 
> I think s/Assigning/By assigning/ (note the comment that indicates there are
> "two copies" of this text).

...FB: Done.

> 
> Section 5.4
> 
>    o  Time of day when the packet was processed by the node as well as
>       the transit delay.  Different definitions of processing time are
>       feasible and expected, though it is important that all devices of
>       an in-situ OAM domain follow the same definition.
> 
> I think we've been standardizing on the "IOAM domain" spelling.

... FB: Done. Good catch :-)


Thanks again for all your comments and the really thorough review.

Cheers, Frank
> 
>