RE: 6man w.g. last call for <draft-ietf-6man-segment-routing-header-11.txt>

Ron Bonica <rbonica@juniper.net> Wed, 04 April 2018 16:23 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B3E1120724 for <ipv6@ietfa.amsl.com>; Wed, 4 Apr 2018 09:23:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level:
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E_eMuVQsP3Tr for <ipv6@ietfa.amsl.com>; Wed, 4 Apr 2018 09:22:59 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B6631201F8 for <ipv6@ietf.org>; Wed, 4 Apr 2018 09:22:59 -0700 (PDT)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w34GLBBF006317; Wed, 4 Apr 2018 09:22:58 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=b+n7atv17Y87HflUOqMslUc2C4Nfd0wDxVjDLrcnGiQ=; b=RKxIW33qE3sJ5fu7xdnlNZjxgXyaLXmiFe/Ev27u0LL4MCaxTIXwJOVM14iBaiio3Frt mrbOyx8BanuRWsq/l27bmTDmtri1CvbY1HdAt2SicZs1eg6fmoldqtfdEubEJQ9qEIki 89gO29tGnszcmwzx06Bg46/cVp5TJRpdfbtVly8jXt6aGCHOmlC+g9AXR547YPt/OaJv PFnpULasygL9i/sZsTOVOcbB53Rb0/kTgH8zjLM1QVbXO/v172IMusG/SRaaQirdVUew hBnXt51eltv2NP4AJkJu1S04369sAivu42MmehD6+tEwHsYcjXOPnMDza8y1Voa2/fHE YA==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp0015.outbound.protection.outlook.com [216.32.181.15]) by mx0a-00273201.pphosted.com with ESMTP id 2h4y8j8dpu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 04 Apr 2018 09:22:58 -0700
Received: from SN6PR05MB4240.namprd05.prod.outlook.com (52.135.67.146) by SN6PR05MB4174.namprd05.prod.outlook.com (52.135.67.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.675.3; Wed, 4 Apr 2018 16:22:54 +0000
Received: from SN6PR05MB4240.namprd05.prod.outlook.com ([fe80::59a2:13ab:6110:35af]) by SN6PR05MB4240.namprd05.prod.outlook.com ([fe80::59a2:13ab:6110:35af%13]) with mapi id 15.20.0653.013; Wed, 4 Apr 2018 16:22:54 +0000
From: Ron Bonica <rbonica@juniper.net>
To: Bob Hinden <bob.hinden@gmail.com>, IPv6 List <ipv6@ietf.org>
Subject: RE: 6man w.g. last call for <draft-ietf-6man-segment-routing-header-11.txt>
Thread-Topic: 6man w.g. last call for <draft-ietf-6man-segment-routing-header-11.txt>
Thread-Index: AQHTx5zaEut14AfnNkml+3dwg8ha1aPwy/HQ
Date: Wed, 04 Apr 2018 16:22:54 +0000
Message-ID: <SN6PR05MB424035B6FECB0057676067B1AEA40@SN6PR05MB4240.namprd05.prod.outlook.com>
References: <20160428004904.25189.43047.idtracker@ietfa.amsl.com> <FB1C6E49-81F7-49DD-8E8B-2C0C4735071B@gmail.com>
In-Reply-To: <FB1C6E49-81F7-49DD-8E8B-2C0C4735071B@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [66.129.241.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; SN6PR05MB4174; 7:vopYMybAS1o/KBd1rX7rfpbcuAKwnjLItqb23aiHcw5D4t3GiZpUh8FM/oYP8M4OKuBN45yTQ3+9/hYUmCBA9MoaA4Zihno6ibzpncOI566yLUIR77vTj8v0exFynSefqBdy52gVm5hCOTvtGBKLqQzwtnact99PKJrmfeNE/f1OxFThI2k3kgSNN8D3qqrQYzlQWFciwOtbZaIGEzDMg/E3rEs2d4w8uC6nhnZ8wat1fQT3yHIwHmP4ypDwZkFz
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: b884a671-4abf-4737-7db8-08d59a485214
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:SN6PR05MB4174;
x-ms-traffictypediagnostic: SN6PR05MB4174:
x-microsoft-antispam-prvs: <SN6PR05MB4174E4DB7A49C544EF1D369CAEA40@SN6PR05MB4174.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(192374486261705)(131327999870524)(85827821059158);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(3231221)(944501327)(52105095)(10201501046)(6055026)(6041310)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:SN6PR05MB4174; BCL:0; PCL:0; RULEID:; SRVR:SN6PR05MB4174;
x-forefront-prvs: 0632519F33
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(396003)(39380400002)(39860400002)(366004)(346002)(13464003)(377424004)(199004)(189003)(6306002)(446003)(6436002)(53946003)(9686003)(478600001)(110136005)(5660300001)(7736002)(3280700002)(68736007)(26005)(3660700001)(2900100001)(6246003)(53936002)(39060400002)(305945005)(8676002)(3846002)(6116002)(229853002)(8936002)(97736004)(33656002)(316002)(966005)(81166006)(74316002)(81156014)(55016002)(86362001)(4743002)(476003)(106356001)(2906002)(186003)(105586002)(25786009)(14454004)(5250100002)(11346002)(66066001)(99286004)(7696005)(53546011)(59450400001)(102836004)(486006)(6506007)(76176011); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR05MB4174; H:SN6PR05MB4240.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 3BQEVo9fmDHj48spoSr2jPouJgYkNSRG6JkrJSBQ+qU1pkIhOgVAe2hgPC4+HhjCC0IhZXubpojx/oceP8MBTSMaJLusWFjeGJxDFQepfSCu1ZK9dUk1kE3dNW+u479g9bCehPTTiRvAd2vhSzYYa51iEQ3K9axQLBod7FKHc9qHEEjf1ysXs1slctJ3Frg2uP2o4QEa5vREud1fcNShkXyNXsQ0GfLohq0p4j+K7XQQrjFbAxuxfNShwepP4c6wL6myhO2PCjjj5GYhttRajkGf5NvpzihH4m+C2LGBRVfiEaq3JFffiZ4xz58KLbXIb0fcE9XZLQ+LNptFQGM0tU4o4X+Vshy+1k/osztW1d6Qwm3ah4xANHKTAqZFSQQsRgtBe42GNg/YMVtUjredCt+I+qMdkfNA0b8a6JLF5nY=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: b884a671-4abf-4737-7db8-08d59a485214
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Apr 2018 16:22:54.7721 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR05MB4174
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-04-04_04:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804040164
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/LNobF3DDIwjl5tZfcWjdbiHs5-o>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Apr 2018 16:23:03 -0000

Folks,

While I am very supportive of the SRv6 effort, I believe that draft-ietf-6man-segment-routing-header still requires work. The following are a) Major issues and  b) minor issues

With a little work, this could be a great document.

MAJOR ISSUES:

1. Introduction (Comment 1)

 SRv6 distinguishes between topological and service-based instructions. A topological instruction steers a packet along a traffic-engineered path through a network topology. It can appear in anywhere in the SRH Segment List except for the final position. If a topological instruction appears in the final position, it causes the packet to be dropped. Draft-ietf-6man-segment-routing-header offers END and END.X as examples of topological instructions.

By contrast, draft-ietf-6man-segment-routing-header does not offer any examples of service-based instructions. In order to understand these, one must read draft-filsfils-spring-network-programing. Many of the service instructions defined in that document invoke VPN services on the endpoint router. For example, End.DT2M causes the IP header and all of its extension headers to be removed, exposing Ethernet payload. The endpoint router learns the exposed inner MAC SA in L2 table T and forwards the Ethernet packet on all appropriate outgoing interfaces. A service-based instruction can only appear in the final position of the SRH Segment List. If a service-based instruction appears in any other position, it causes the packet to be dropped.

Topological instructions are clearly a legitimate use of the Routing Extension header. However, it is not so clear that service-based instructions belong in the Routing Extension header. The document should include text that further defines service-based instructions (possibly offering an example or two) and explains why they belong in a Routing Extension Header as opposed to a Destinations Option Header or even an upper-layer header. This section should explain the benefit in moving these instructions from upper-layer headers (where they are encoded today) into the Routing Extension header.


2.2 SRv6 Segment (Comment 1)

This section says:

" A local SID of N could be an IPv6 address of a local interface of N but it does not have to.  Most often, a local SID is not an address  of a local interface of N.  The My Local SID Table is thus not populated by default with all the addresses of a node."

However, it does not tell us how a SID that is an interface address is processed. Is the processing exactly the same as the END instruction, except that it is allowed when SL == 0? If so, why do both exist.


Section 2.2 SRv6 Segment (Comment 2)

The draft fails to explain how a SID is routed through an IPv6 network once it is copied into an IPv6 Destination Address. Section 3 of draft-filsfils-spring-srv6-network-programming provides an explanation. It explains that the high order bits of the SID represent the node upon which the SID is instantiated. It also explains that the instantiating node advertises that prefix into the routing subsystem. This text should be brought forward into the current draft.



Section 2.2 SRv6 Segment (Comment 3)

The draft fails to explain how a node decides whether it needs to process the SRH. For every other Routing Extension Type, the Routing Extension Header is processed if the IP Destination Address represents a local interface and Segments Left is greater than 0. For the SRv6, SRH is processed even when SL == 0. It is not clear whether the SRH is processed whenever the SID falls within an specific prefix, or when it is actually in "My Local SID Table".

How are the error cases handled (e.g., when the SID was in My Local SID Table when the packet was sent but is not more).


Section 2.2 SRv6 Segment (Comment 4)

The draft fails to specify how an SRv6 capable node behaves when it processes a SID but does not recognize the instruction. (I don't find this in draft-filsfils-spring-srv6-network-programming either).


Section 2.2 SRv6 Segment (Comment 5)

According to RFC 8200:

"If, while processing a received packet, a node encounters a Routing header with an unrecognized Routing Type value, the required behavior of the node depends on the value of the Segments Left field, as follows:

 -  If Segments Left is zero, the node must ignore the Routing header and proceed to process the next header in the packet, whose type is identified by the Next Header field in the Routing header.

-  If Segments Left is non-zero, the node must discard the packet and send an ICMP Parameter Problem, Code 0, message to the packet's Source Address, pointing to the unrecognized Routing Type."

This is safe, so long as all Routing Extension Types use SL == 0  to indicate that the Routing Extension Header has been completely processed. It is may not be safe when SL == 0 means that one more segment needs to be processed. 

In the SRH, SL == 0 indicates that one more segment needs to be processed. The document should address this security consideration.

If you redefine the SL to match RFC 8200's definition, this problem resolves itself.


Section 2.3  Segment Routing (SR) Domain (Comment 1)

RFC 8200 says:

"Extension headers (except for the Hop-by-Hop Options header) are not processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header."

Draft-ietf-6man-segment-routing-header says:

" It is assumed in this document that the SRH is added to the packet by its source, consistently with the source routing model defined in  [RFC8200].  For example:

   o  At the node originating the packet (host, server).

   o  At the ingress node of an SR domain where the ingress node receives an IPv6 packet and encapsulates it into an outer IPv6 header followed by a Segment Routing header."

This gives the reader the impression that draft-ietf-6man-segment-routing-header is in harmony with RFC 8200.

However, Sections 4.13, 5.2  and 5.3 of draft-filsfils-spring-srv6-network-programming offer procedures in which intermediate nodes insert Segment Routing Headers. (Sometimes, they insert a second SRH in a packet that already has an SRH).

Draft-ietf-6man-segment-routing-header should either proscribe SHR insertion (using RFC 2119 language) or update the above-mentioned assumption and define scenarios in which Routing Extension Header insertion is acceptable.



Section 3 Segment Routing Header (Comment 1)

RFC 8200 defines the Segments Left field in the Routing Extension Header as follows:

 "8-bit unsigned integer.  Number of route  segments remaining, i.e., number of explicitly  listed intermediate nodes still to be visited  before reaching the final destination."

Draft-ietf-6man-segment-routing-header redefines the Segments Left field in the Routing Extension Header as follows:

"Defined in [RFC8200], it contains the index, in the Segment List, of the next segment to inspect.  Segments Left is decremented at each segment."

These definitions are different from one another. In the RFC 8200 definition, SL==0 indicates that the Routing Extension Header has been completely processed. In the SRH definition, SL==0 indicates that one segment remains to be processed.

The current draft should adopt the RFC 8200 definition. This would resolve a few of the issues mentioned above.


Section 3 Segment Routing Header (Comment 2)

The draft fails to describe P-bit processing. How should a node behave when it receives a packet with the P-bit set? Clear?


Section 3 Segment Routing Header (Comment 3)

The draft fails to describe O-bit processing. 

While some text can be found in Section 6.3 of Draft-filsfils-spring-srv6-network-programming, that text is incomplete. It says that a) O-bit processing is optional and b) the O-bit causes a timestamped copy of the packet to be punted to the control plane. It doesn't say what the control plane does with this information

Section 3 Segment Routing Header (Comment 4)

The draft fails to describe how the tag field is processed.

Section 3.1 SRH TLV's (Comment 1)

Draft-ietf-6man-segment-routing-header says:

" Type Length Value (TLV) contain optional information that may be used  by the node identified in the DA of the packet.  It has to be noted that the information carried in the TLVs is not intended to be used  by the routing layer.  Typically, TLVs carry information that is consumed by other components (e.g.: OAM) than the routing function."

Given that this information is not consumed by the routing layer, the authors should explain why it is in a Routing Extension Header, as opposed to a Destination Option.


Section 3.1.1 Ingress Node TLV (Comment 1)

It is not clear how this TLV will be useful. When the SRH is created by the originating node, the  ingress TLV is represented by the IPv6 source address. When the SRH is prepended by an SR ingress node,  the ingress TLV is represented by the IPv6 Destination Address of the outer IPv6 header


Section 3.1.1 Ingress Node TLV (Comment 2)

The following text requires explanation:

" Ingress Node: 128 bits.  Defines the node where the packet is   expected to enter the SR domain.  In the encapsulation case  described in Section 2.3.1, this information corresponds to the SA  of the encapsulating header."

The words 'is expected' implies that the packet has not yet entered the SR domain. If that is the case, how can it have an SRH?

Section 3.1.2 Egress Node TLV (Comment 1)

It is not clear how this TLV will be useful.  Can't the egress node be derived from the high order bits of the final members of the Segment list. Draft-filsfils-spring-srv6 calls these bits the locator.


Section 3.1.3 Opaque Container TLV Comment 1)

The Opaque container field is defined as "128 bits of opaque data not relevant for the  routing layer.  Typically, this information is consumed by a non- routing component of the node receiving the packet (i.e.: the node in the DA)."

If it is not relevant to routing, and its meaning is not define, why is it in a Routing Extension Header?

Section 3.1.6 NSH Carrier TLV (Comment 1)

By including the NSH Carrier TLV in the SRH, SRv6 becomes coupled to SRv6. Can you conceive of a scenario where you might want to deploy NSH without SRv6? If so, it would be a good idea to move this information to an IPv6 Destination Option.

Also, this section talks about NSH TLVs. No TLVs are defined in RFC 8300.


Section 3.1.6 NSH Carrier TLV (Comment 2)

Does this TLV need to be mutable? Might every node accumulate metadata?

Section 3.2.  SRH and RFC8200 behavior (Comment 1)

Draft-ietf-6man-segment-routing-header says that the SRH " SHOULD only appear once in the packet". However, Section 4.13 of draft-filfils-spring-srv6-network-programming talks about a scenarios in which the SRH can appear many times in a packet.

The current draft should either a) upgrade the SHOULD to a MUST or b) explain when it is acceptable for a packet to include multiple instances of the SRH and place an upper limit on the number of SRH instances that a packet can contain.

Section 4 SRH Functions (Comment 1)

Draft-ietf-6man-segment-routing header says that " [I-D.filsfils-spring-srv6-network-programming] defines the basic  functions associated with SRv6 SID's." Given that, the reference to draft- filsfils-spring-srv6-network-programming should be normative.


Section 4.1  Endpoint Function (End)  (Comment 1)

This section says, "If the FIB lookup matches a multicast state, then the related  Reverse Path Forwarding (RPF) check must be considered successful." The draft should dive deeper into multicast considerations. Multicast forwarding may be acceptable at some points in the segment list, while dangerous at other points.

Section 4.1  Endpoint Function (End)  (Comment 2)

This section says, " An SRv6-capable node MUST include the Flow Label of the IPv6 header in its hash computation for ECMP load-balancing."  

This works only if the node that originated the packet sets the Flow Label to something other than zero. Furthermore, load balancing will still break of intermediate, none SRv6-capable nodes don't include the Flow Label in the hash computation

The draft needs a section on load balancing and ECMP.

Section 4.1  Endpoint Function (End)  (Comment 3)

This section says, " By default, a local SID bound to the End function does not allow the decapsulation of an outer header.  As a consequence, an End  SID cannot be the last SID of an SRH and cannot be the DA of a  packet without SRH".

It continues to say, " If the decapsulation is desired, then another function must be  bound to the SID (e.g., End.DX6 defined in  [I-D.filsfils-spring-srv6-network-programming]).  This prevents  any unintentional decapsulation by the segment endpoint node."

But consider the case where the source node generates the SRH and the SRH is preserved all the way to the destination. In that case, no decapsulation is required. So, why is END not allowed to be the last SID of an SRH in that scenario?


Section 4.1  Endpoint Function (End)  (Comment 4)

Section 4.20 of Draft-filsfils-srv6-network-programming appears to modify this procedure to support Ultimate SRH Popping and Penultimate SRH popping. These modifications should be brought forward into the current draft


Section 5.1 Source SR Node (Comment 1)

The draft says, " The Segments Left field is set to n-1 where n is the number of  elements in the Segment List."

Please compare this with the example offered in Section 4.4. of RFC 2460. In that example,  Segments Left field is set to n where n is the number of  elements in the Segment List.

If you did that, many of the above mentioned problems would resolve themselves.

Section 5.2 Transit Node (Comment 1)

The draft says, " the only node who is allowed to inspect  the Routing Extension Header (and therefore the SRH), is the node corresponding to the DA of the packet."

Clearly, if the DA is a local interface, the node should inspect the SRH. But if the DA does not represent an interface, should it inspect the packet only if the DA is in My Local SID Table? Or if the DA falls within a prefix that was allocated for My Local SID Table.

In either case, the draft should address what happens if the DA was in My Local SID Table when the packet was sent but is no longer there.



MINOR ISSUES:

Section 3 Segment Routing Header (Comment 1)

Why are the U-bit not contiguous?

Section 3 Segment Routing Header (Comment 2)

The A-bit seems to be redundant. The presence of TLVs can be determined from the values of the Header Extension Length and Last Entry fields.

Section 3.1.1, 3,1,2 and 3.1.3 Ingress, Egress and Opaque TLVs (Comment 1)

Why is a Flags field defined when no flags are defined? You could merge this field with the RESERVED field.


Section 4.1 Endpoint Function (Comment 1)

The End function is also defined in Section 4.1 of draft-filsfils-spring-srv6-network-programming. Which definition is normative?

Section 4.2 End.X: Endpoint with Layer-3 cross-connect  (Comment 1)

The End.X function is also defined in Section 4.2 of draft-filsfils-spring-srv6-network-programming. Which definition is normative?


NITS:

The Nit Checker complains about a downref.

> -----Original Message-----
> From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Bob Hinden
> Sent: Thursday, March 29, 2018 4:31 PM
> To: IPv6 List <ipv6@ietf.org>
> Cc: Bob Hinden <bob.hinden@gmail.com>
> Subject: 6man w.g. last call for <draft-ietf-6man-segment-routing-header-
> 11.txt>
> 
> 
> This message starts a two week 6MAN Working Group Last Call on advancing:
> 
>        Title           : IPv6 Segment Routing Header (SRH)
>        Authors         : Stefano Previdi
>                          Clarence Filsfils
>                          John Leddy
>                          Satoru Matsushima
>                          Daniel Voyer
> 	Filename       : draft-ietf-6man-segment-routing-header-11.txt
> 	Pages          : 34
> 	Date           : 2018-03-28
> 
>      https://tools.ietf.org/html/draft-ietf-6man-segment-routing-header
> 
> as a Proposed Standard.  Substantive comments and statements of support
> for publishing this document should be directed to the mailing list.
> Editorial suggestions can be sent to the author.  This last call will end on 12
> April 2018.
> 
> An issue tracker will be setup to track issues raised on this document.
> 
> Thanks,
> Bob & Ole
> 
> 
>