Re: [Last-Call] Genart last call review of draft-ietf-6man-spring-srv6-oam-09

"Zafar Ali (zali)" <zali@cisco.com> Fri, 09 April 2021 06:19 UTC

Return-Path: <zali@cisco.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E69133A0FED; Thu, 8 Apr 2021 23:19:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.616
X-Spam-Level:
X-Spam-Status: No, score=-9.616 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QugK4bTI; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=pg/vsQQj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fyGNaFc_axZ1; Thu, 8 Apr 2021 23:19:31 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 327193A0FDE; Thu, 8 Apr 2021 23:19:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=58767; q=dns/txt; s=iport; t=1617949171; x=1619158771; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=rW2QviWTgWYXUC7nAtFwPCxk+IqjWtaSo0+4YLaRXmU=; b=QugK4bTIj7UZBq/CBsWU0eyg/07E6hiiXdCDSBvSkdOlcajhaD1GVqi7 Hh5gQ9A7AagUX10GfYXWVt38MFy+bYVrjCvsovivOn9W4gIyOpqJWej4B naA4cGmhA18j3kqqvPzk+LRMqnI3TiDU1eerf6nMKDe3UXTEDO9k4ld9e 8=;
IronPort-PHdr: A9a23:x2ckmxyXGDdn7HnXCzMtngc9DhMPsqjoPgMT9pssgq5PdaLm5Zn5IUjD/p1Fg1rAXIGd4PVB2KLasKHlDGoH55vJ8HUPa4dFWBJNj8IK1xchD8iIBQyeTrbqYiU2Ed4EWApj+He2YkdQEcf6IVbVpy764TsbAB6qMw1zK6z8EZLTiMLi0ee09tXTbgxEiSD7b6l1KUC9rB7asY8dho4xQps=
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0A1CADZ8G9g/4QNJK1aHQEBAQEJARIBBQUBghKBIzAjLgd3WjYxCoQ4g0gDhTmIUwOBCYkljw2BQoERA1QLAQEBDQEBKggCBAEBhFACF4FgAiU4EwIDAQEMAQEFAQEBAgEGBHEThVANhkQBAQEBAxoJHQEBNwEPAgEIEQMBAiEBCQICAh8RFAkIAgQBDQWCcQGBflcDLwECDJ91Aoofd4EygQGCBAEBBoE3Ag5BgxkNC4ITAwaBOYJ2hAcBAYEThTsnHIFJQoETASYcgUZjNj6CHkIBAQIBgSgBEgEHIRkNC4JfNYIrgVgBCGMHFhsyBB00AiIuByhLGQkVAQEPMx4ClBiHaYx4kE0JMFsKgwuBIYhCjWEEhTQEH4NNiniJaIctgjuCXJUVi2qDFo9ghEkCBAIEBQIOAQEGgWsjaXBwFTsqAYI+UBcCDo4fDAURg06FFIVFcwI2AgYBCQEBAwl8iVItgQcBgQ4BAQ
X-IronPort-AV: E=Sophos;i="5.82,208,1613433600"; d="scan'208,217";a="881977730"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 Apr 2021 06:19:29 +0000
Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 1396JTFU002853 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 9 Apr 2021 06:19:29 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 9 Apr 2021 01:19:29 -0500
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 9 Apr 2021 01:19:28 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Fri, 9 Apr 2021 01:19:28 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=msQfOEw9AdCHl/1BNgaF+X8K+o5/cGov6t43URFzopGBfJ9/g2cqZhZPx+ru6+AVaeYHw5AVsFfXIe7YuVjceDSHnEcgMNdFjuZKv0JUS6pZ9GdFQnCKbjgZBfDhjU9JiKjKGNcNxfbZFkXY2q8+HifazF+6jKcfgduiqJqRb/964SJJ3ViUSA05BqlD26tdrH1yU/+mSreBBImnHCDSx+46oznHJMBVT1d5gv8ZSspuMZ2rji3eHUq9wW+JlCV5JRGf/S302GPnkA5yUJjwJ5KsVGAlXhwDFSJVZwbdFdalUh2XsNfsxv1LsTUy3cRQQW1+o9FZT3zHWYFQhkOskw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rW2QviWTgWYXUC7nAtFwPCxk+IqjWtaSo0+4YLaRXmU=; b=MoTpLBlNlD9tepfdgv1nsg9fQ+w2aVgwDQyLpJhyziijBhdR6SUUVhvGbI4sbdIEMnfS+yGxCR8pwUKXuv35/a6X0EbaeDrWdHXX3nVkeRSRmrMe9yKXpGhFY8li6Q2FQsx7P1Xb1mCG8lqKJRGP7FYow9nELRQZhUmdqVUGeOR7qYo6hbOsvxHuIFyIWNhkR2XhKlMAvS3JVfLlaBrEzdf0FR7Ygl/4vozhI3a3vUtpEBPOSa1dty8hQ25tpfj0LkRtyyd8hpRStLLg4F3gG6sWEOitpx9EGJAHmRgF9nD+XLPX+2iWKAYzXfrQbZvkztxwV9RgHohzch/n86mtGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rW2QviWTgWYXUC7nAtFwPCxk+IqjWtaSo0+4YLaRXmU=; b=pg/vsQQjF+ztzxj8xsVTuuAmBGHFCZUGFKmcs+emrrC5xgP7TrJXi7YCUe0neb1UWRmlb/HROl+MhvlNtSz6CrxFzLILiR1+YlJ6B8QC/W3AkCXtGoEs79h0Xz1d0Hw8qVyFWEuvp3oMckDR+OXRETlWlU4mLivu7WqmuzNiMXQ=
Received: from DM6PR11MB4692.namprd11.prod.outlook.com (2603:10b6:5:2aa::11) by DM6PR11MB4346.namprd11.prod.outlook.com (2603:10b6:5:1dd::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.32; Fri, 9 Apr 2021 06:19:26 +0000
Received: from DM6PR11MB4692.namprd11.prod.outlook.com ([fe80::9156:1513:54bf:2fe3]) by DM6PR11MB4692.namprd11.prod.outlook.com ([fe80::9156:1513:54bf:2fe3%9]) with mapi id 15.20.4020.016; Fri, 9 Apr 2021 06:19:26 +0000
From: "Zafar Ali (zali)" <zali@cisco.com>
To: Matt Joras <matt.joras@gmail.com>, "gen-art@ietf.org" <gen-art@ietf.org>
CC: "draft-ietf-6man-spring-srv6-oam.all@ietf.org" <draft-ietf-6man-spring-srv6-oam.all@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "Zafar Ali (zali)" <zali@cisco.com>
Thread-Topic: Genart last call review of draft-ietf-6man-spring-srv6-oam-09
Thread-Index: AQHXF66nGdn1qfYTxU2bnKyJ9mLr+Kqe9E6AgAyp2wA=
Date: Fri, 09 Apr 2021 06:19:26 +0000
Message-ID: <13DD20B3-37D3-496A-B851-7C2A66B1AEF1@cisco.com>
References: <161560168111.19762.11315856321978805374@ietfa.amsl.com> <4BA489D4-C3B3-4272-B3D9-8ADE2C3F8CA3@cisco.com>
In-Reply-To: <4BA489D4-C3B3-4272-B3D9-8ADE2C3F8CA3@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.47.21031401
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [47.185.233.68]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 41efcb18-7f45-4e68-4e85-08d8fb1f6d4e
x-ms-traffictypediagnostic: DM6PR11MB4346:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DM6PR11MB4346DBCFED1777BA7BB8094DDE739@DM6PR11MB4346.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3383;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB4692.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(136003)(39860400002)(346002)(376002)(366004)(396003)(166002)(36756003)(9326002)(53546011)(38100700001)(966005)(54906003)(6512007)(71200400001)(107886003)(478600001)(6506007)(8936002)(2616005)(5660300002)(83380400001)(30864003)(8676002)(26005)(110136005)(33656002)(316002)(6486002)(66476007)(4326008)(64756008)(186003)(66556008)(2906002)(66446008)(91956017)(86362001)(66946007)(76116006)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: multipart/alternative; boundary="_000_13DD20B337D3496AB8517C2A66B1AEF1ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB4692.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 41efcb18-7f45-4e68-4e85-08d8fb1f6d4e
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2021 06:19:26.8017 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: UILhg22F/lip17hRhRLqpdNJIexhafDeIpK2rRpU2gFoXoVoCQYeil0r8aaS96eT
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4346
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/-5k_7vBtKVyhI0jZySNW9lgFA3o>
Subject: Re: [Last-Call] Genart last call review of draft-ietf-6man-spring-srv6-oam-09
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Apr 2021 06:19:37 -0000

Hi Matt,

Many thanks for the offline review of the diffs. Greatly appreciated!

We have posted the diffs discussed earlier in rev 10 of the draft.
https://datatracker.ietf.org/doc/html/draft-ietf-6man-spring-srv6-oam-10

How the diffs addresses your comments are mentioned in-line with [ZA] (in the earlier email).
Please review and advise of any additional comments.

Thanks

Regards … Zafar

From: "Zafar Ali (zali)" <zali@cisco.com>
Date: Thursday, April 1, 2021 at 12:56 AM
To: Matt Joras <matt.joras@gmail.com>, "gen-art@ietf.org" <gen-art@ietf.org>
Cc: "draft-ietf-6man-spring-srv6-oam.all@ietf.org" <draft-ietf-6man-spring-srv6-oam.all@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "Zafar Ali (zali)" <zali@cisco.com>
Subject: Re: Genart last call review of draft-ietf-6man-spring-srv6-oam-09

Hi Matt,

Many thanks for your review and comments; much appreciated.

Please see [ZA] in line.
We are editing the document to address all comments and will upload a latest version once all edits are done.
These comments include a pending comment from our AD: s/2001:DB8/2001:db8/g in accordance with RFC 5952 section 4.3.

Thanks

Regards … Zafar

From: Matt Joras via Datatracker <noreply@ietf.org>
Reply-To: Matt Joras <matt.joras@gmail.com>
Date: Friday, March 12, 2021 at 9:14 PM
To: "gen-art@ietf.org" <gen-art@ietf.org>
Cc: "draft-ietf-6man-spring-srv6-oam.all@ietf.org" <draft-ietf-6man-spring-srv6-oam.all@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Subject: Genart last call review of draft-ietf-6man-spring-srv6-oam-09
Resent-From: <alias-bounces@ietf.org>
Resent-To: <zali@cisco.com>, <cfilsfil@cisco.com>, <satoru.matsushima@g.softbank.co.jp>, <daniel.voyer@bell.ca>, <mach.chen@huawei.com>, <bob.hinden@gmail.com>, <otroan@employees.org>, <ek.ietf@gmail.com>, <evyncke@cisco.com>, "ot@cisco.com" <ot@cisco.com>, "ot@cisco.com" <ot@cisco.com>
Resent-Date: Friday, March 12, 2021 at 9:14 PM

Reviewer: Matt Joras
Review result: Ready with Nits

1.  Introduction

   As Segment Routing with IPv6 data plane (SRv6) [RFC8402] simply adds
   a new type of Routing Extension Header, existing IPv6 OAM mechanisms
   can be used in an SRv6 network.  This document describes how the
   existing IPv6 mechanisms for ping and trace route can be used in an
   SRv6 network.  This includes illustrations of pinging an SRv6 SID for
   the SID connectivity checks and to validate the availability of a
   SID.  This also includes illustrations for tracerouting to an SRv6

Trace route is spelled as two words here rather than a compound elsewhere.

[ZA] Changed it to traceroute

2.1.1.  O-flag Processing
...
   If the telemetry data from the ultimate segment in the segment-list
   is required, a penultimate segment SHOULD NOT be a Penultimate
   Segment Pop (PSP) SID.  When the penultimate segment is a PSP SID,
   the SRH will be removed and the O-bit will not be processed at the
   ultimate segment.

This paragraph refers to it as the O-bit rather than the O-flag.

[ZA] Changed it to O-flag.

2.2.  OAM Operations
...
   Ping to a SID is used for SID connectivity checks and to validate the
   availability of a SID.  Traceroute to a SID is used for hop-by-hop
   fault localization as well as path tracing to a SID.  Section 3
   illustrates the ICMPv6 based ping and the UDP based traceroute
   mechanisms for ping and traceroute to an SRv6 SID.  Although this
   document only illustrates ICMP ping and UDP-based traceroute to an
   SRv6 SID, the procedures are equally applicable to other IPv6 OAM
   probing to an SRv6 SID (e.g., Bidirectional Forwarding Detection
   (BFD) [RFC5880], Seamless BFD (SBFD) [RFC7880], TWAMP Light and STAMP
   probe message processing as described in [I-D.gandhi-spring-twamp-
   srpm] and [I-D.gandhi-spring-stamp-srpm], respectively, etc.).
   Specifically, as long as local configuration allows the Upper-layer
   Header processing of the applicable OAM payload for SRv6 SIDs, the
   existing IPv6 OAM techniques can be used to target a probe to a
   (remote) SID.

This paragraph mixes "ICMPv6 based ping" and "ICMP ping". There is also
not consistency with "-based", e.g. "UDP-based" versus "UDP based".

[ZA] changed ICMP to ICMPv6; changed UDP-based to UDP based.

The
reference link to [I-D.gandhi-spring-twamp-srpm] is not functional.

[ZA] Fixed

   IPv6 OAM operations can be performed with the target SID in the IPv6
   destination address without SRH or with SRH where the target SID is
   the last segment.  In general, OAM operations to a target SID may not
   exercise all of its processing depending on its behavior definition.
   For example, ping to an END.X SID (refer [I-D.ietf-spring-srv6-
   network-programming]) at the target node only validates availability
   of the SID and does not validate switching to the correct outgoing
   interface.  To exercise the behavior of a target SID, the OAM
   operation SHOULD construct the probe in a manner similar to a data
   packet that exercises the SID behavior, i.e. to include that SID as a
   transit SID in either an SRH or IPv6 DA of an outer IPv6 header or as
   appropriate based on the definition of the SID behavior.

The reference to [I-D.ietf-spring-srv6-network-programming] is not
functional and "refer" before it reads awkwardly.

[ZA] Updated the reference and fixed the awkwardly (“refer [ref]”) text.

3.1.1.  Classic Ping

   If an SRv6 capable ingress node wants to ping an IPv6 address via an
   arbitrary segment list <S1, S2, S3>, it needs to initiate ICMPv6 ping
   with an SR header containing the SID list <S1, S2, S3>.  This is
   illustrated using the topology in Figure 1.  Assume all the links
   have IGP metric 10 except both links between N2 and N3, which have
   IGP metric set to 100.  User issues a ping from node N1 to a loopback
   of node 5, via segment list <2001:DB8:B:2:C31::, 2001:DB8:B:4:C52::>.
   The SID behavior used in the example is End.X SID (refer [I-D.ietf-
   spring-srv6-network-programming]) but the procedure is equally
   applicable to any other (transit) SID type.

Suggest "initial an ICMPv6 ping". "IGP" is not defined here or subsequently
in the document. Another broken reference, and the "refer" language.

[ZA] Added IGP to terminology section; fixed “refer” text. “initiate” is IMO a better fit than “initial”.

...
   o  The echo request packet at N5 arrives as an IPv6 packet with or
      without an SRH.  If N5 receives the packet with SRH, it skips SRH
      processing (SL=0).  In either case, Node N5 performs the standard
      IPv6/ ICMPv6 processing on the echo request and responds with the
      echo reply message.  The echo reply message is IP routed.

"IPv6/ ICMPv6" is a typo, suggest just being ICMPv6 as the latter implies
the former.

[ZA] Fixed

3.1.2.  Pinging a SID

   The classic ping described in the previous section applies equally to
   perform SID connectivity checks and to validate the availability of a
   remote SID.  This is explained using an example in the following.
   The example uses ping to an END SID (refer [I-D.ietf-spring-srv6-
   network-programming]) but the procedure is equally applicable to ping
   any other SID behaviors.

Broken reference to [I-D.ietf-spring-srv6-network-programming] and same
refer language.

[ZA] Fixed

3.2.1.  Classic Traceroute
...
   If an SRv6 capable ingress node wants to traceroute to IPv6 address
   via an arbitrary segment list <S1, S2, S3>, it needs to initiate
   traceroute probe with an SR header containing the SID list <S1, S2,
   S3>.  That is illustrated using the topology in Figure 1.  Assume all
   the links have IGP metric 10 except both links between N2 and N3,
   which have IGP metric set to 100.  User issues a traceroute from node
   N1 to a loopback of node 5, via segment list <2001:DB8:B:2:C31::,
   2001:DB8:B:4:C52::>.  The SID behavior used in the example is End.X
   SID (refer [I-D.ietf-spring-srv6-network-programming]) but the
   procedure is equally applicable to any other (transit) SID type.
   Figure 3 contains sample output for the traceroute request.

Reference works here. But again "refer" language.

[ZA] Fixed

...
   The information about the IP address of the incoming interface on
   which the traceroute probe was received by the reporting node is very
   useful.  This information can also be used to verify if SIDs
   2001:DB8:B:2:C31:: and 2001:DB8:B:4:C52:: are executed correctly by
   N2 and N4, respectively.  Specifically, the information displayed for
   the second hop contains the incoming interface address
   2001:DB8:2:3:31:: at N3.  This matches with the expected interface
   bound to END.X behavior 2001:DB8:B:2:C31:: (link3).  Similarly, the
   information displayed for hop5 contains the incoming interface
   address 2001:DB8:4:5::52:: at N5.  This matches with the expected
   interface bound to the END.X behavior 2001:DB8:B:4:C52:: (link10).

The first sentence of this paragraph is awkwardly, perhaps just
verbosely phrased. Suggest rephrasing along the lines of "The IP
address of the interface on which the traceroute probe was received
is useful."

[ZA] Fixed

3.3.  A Hybrid OAM Using O-flag
...
   The illustration is different than the In-situ OAM defined in [I.D-
   draft-ietf-ippm-ioam-data].  This is because In-situ OAM records
   operational and telemetry information in the packet as the packet
   traverses a path between two points in the network [I.D-draft-ietf-
   ippm-ioam-data].  The illustration in section 3 does not require the
   recording of OAM data in the packet.

Broken reference to [I.D-draft-ietf-ippm-ioam-data]

[ZA] Fixed
...
   Consider the example where the user wants to monitor sampled IPv4 VPN
   999 traffic going from CE1 to CE2 via a low latency SR policy P
   installed at Node N1.  To exercise a low latency path, the SR Policy
   P forces the packet via segments 2001:DB8:B:2:C31:: and
   2001:DB8:B:4:C52::.  The VPN SID at N7 associated with VPN 999 is
   2001:DB8:B:7:DT999::.  2001:DB8:B:7:DT999:: is a USP SID.  N1, N4,
   and N7 are capable of processing SRH.Flags.O-flag but N2 is not
   capable of processing SRH.Flags.O-flag.  N100 is the centralized
   controller capable of processing and correlating the copy of the
   packets sent from nodes N1, N4, and N7.  N100 is aware of
   SRH.Flags.O-flag processing capabilities.  Controller N100 with the
   help from nodes N1, N4, N7 and implements a hybrid OAM mechanism
   using the SRH.Flags.O-flag as follows:

Is it reasonable to assume understanding of "VPN 999 traffic", "CE1",
"CE2", and "low latency SR policy P"?

[ZA] Yes, IMP.

...
   o  When node N2 receives the packet with SRH.Flags.O-flag set, it
      ignores the SRH.Flags.O-flag.  This is because node N2 is not
      capable of processing the O-flag.  Node N2 performs the standard
      SRv6 SID and SRH processing.  Specifically, it executes the END.X
      (refer [I-D.ietf-spring-srv6-network-programming]) behavior
      (2001:DB8:B:2:C31::) and forwards the packet P1 (2001:DB8:A:1::,
      2001:DB8:B:4:C52::) (2001:DB8:B:7:DT999::, 2001:DB8:B:4:C52::,
      2001:DB8:B:2:C31::; SL=1; O-flag=1; NH=IPv4)(IPv4 header)(payload)
      over link 3 towards Node N3.

Inconsistent use of "SRH.Flags.O-flag" versus simply "O-flag".

[ZA] Fixed; :s/ SRH.Flags.O-flag/ O-flag/g

3.4.  Monitoring of SRv6 Paths
...
   In the reference topology in Figure 1, N100 uses an IGP protocol like
   OSPF or ISIS to get the topology view within the IGP domain.  N100
   can also use BGP-LS to get the complete view of an inter-domain
   topology.  The controller leverages the visibility of the topology to
   monitor the paths between the various endpoints.
"OSPF" and "ISIS" are not defined, and neither is "BGP-LS".

[ZA] Added to terminology section

   The controller N100 advertises an END (refer [I-D.ietf-spring-srv6-
   network-programming]) SID 2001:DB8:B:100:1::. To monitor any
   arbitrary SRv6 paths, the controller can create a loopback probe that
   originates and terminates on Node N100.  To distinguish between a
   failure in the monitored path and loss of connectivity between the
   controller and the network, Node N100 runs a suitable mechanism to
   monitor its connectivity to the monitored network.

Broken reference to [I-D.ietf-spring-srv6-network-programming], and
another use of "refer".

[ZA] Fixed, globally