Re: [Lsr] A review of draft-ietf-lsr-isis-ttz

Huaimo Chen <huaimo.chen@futurewei.com> Wed, 17 February 2021 21:21 UTC

Return-Path: <huaimo.chen@futurewei.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01A1D3A1D6B; Wed, 17 Feb 2021 13:21:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.089
X-Spam-Level:
X-Spam-Status: No, score=-2.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id htMNGzp6ToCw; Wed, 17 Feb 2021 13:21:45 -0800 (PST)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2090.outbound.protection.outlook.com [40.107.244.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 491B53A1D64; Wed, 17 Feb 2021 13:21:45 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lQCDJcWzxCh3w4Q7cOXxykL7MU3g2sdjFmaKaIBaov0t0ghQ36Kp+ZiwgHVy82ZkN6uMnZB6HFpK9zsdivZMe4Gmptt2I2U03rkLYPG1NysASOhWQTWi3v0l989bvpGXiNpzB653dIjghT2gTDCZ0zGNwvRPHAxV73Mam1elE5hzjFYT/HIe0a/WkRf0D8vSQp698u0wO02xQxMdQVLOH2ER5Mv8E0+6GQcHDIeezwKBsdqR3tu35EYjXz90YPnEV1VQsdUByWGZ/9+a+51h+DYURo52062oXWnT+eNQdHm5ZCcQREI4kkabdP/JH+o7hira5P+s9k/DSXs4LqNeKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dQBn8D+5Br85g1rK5DWm8nYPIV4bwILIVGTXXtcDjBw=; b=i/K0LNpQP1EFGr9ZewC8Uvg7s/LpPRJ9k5zd5lOhOK+ZAG96Gdl6ozfRw7afVsgc3RY1qWgyi1pfMbQ2NwZ9Bjn+kSv/R+WtxNr1p1inZq8SxSVa1EU8hE3giRlDfnoxSAAQ8sIpU/6M+3FY6aPOAcXtOBE39dfICpLbg8kxKEbkKL51bRFeCwx6crovi5ff9UMOcEOQtY8SOUNGEAjvXCSEjnsoEBKAI1muYXBrs0g3QeQuYYiaOvUwyQBc9EyBdus/Lx4BvV0dGJ4uGCVgOhEIlzf6pRPI7UsechcsrQcKgpQqSopvtamjxJC4yKIvy1xaRoVg+ObfVFa6Wnyy1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dQBn8D+5Br85g1rK5DWm8nYPIV4bwILIVGTXXtcDjBw=; b=Irl6JYFiq5+zC/0DvkaRvv715gPkwxOuJaJqj5MIOW7Bf+c9PmQ1AwJ7U2d4ISqsevt1ikkmQLaftFCq1DpHLCmdZwAcVqgFJTmtNRRQ1xwHPOIKjvfcrdOMQMAW99o2ftWzglEbAsmpjU7+mZ9LBlvSF/8X3achUMEzIC8X3G4=
Received: from MN2PR13MB4087.namprd13.prod.outlook.com (2603:10b6:208:263::16) by MN2PR13MB3616.namprd13.prod.outlook.com (2603:10b6:208:16f::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.12; Wed, 17 Feb 2021 21:21:38 +0000
Received: from MN2PR13MB4087.namprd13.prod.outlook.com ([fe80::14ed:3768:8b86:be32]) by MN2PR13MB4087.namprd13.prod.outlook.com ([fe80::14ed:3768:8b86:be32%9]) with mapi id 15.20.3868.028; Wed, 17 Feb 2021 21:21:38 +0000
From: Huaimo Chen <huaimo.chen@futurewei.com>
To: "Acee Lindem (acee)" <acee@cisco.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, 'lsr' <lsr@ietf.org>
CC: "draft-ietf-lsr-isis-ttz@ietf.org" <draft-ietf-lsr-isis-ttz@ietf.org>
Thread-Topic: [Lsr] A review of draft-ietf-lsr-isis-ttz
Thread-Index: AdcCR2vhMlJEbN5ZTliY5aujPCJY/gBUKHKAAHaDFEE=
Date: Wed, 17 Feb 2021 21:21:38 +0000
Message-ID: <MN2PR13MB40870BB32046B199A0F25276F2869@MN2PR13MB4087.namprd13.prod.outlook.com>
References: <034801d70247$a3d0e970$eb72bc50$@olddog.co.uk>, <7DBFCCC7-F8AA-462C-8351-9BC2AF4D1F9E@cisco.com>
In-Reply-To: <7DBFCCC7-F8AA-462C-8351-9BC2AF4D1F9E@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=futurewei.com;
x-originating-ip: [2601:199:4300:8e5a:568:32cb:d367:5734]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0355a5d7-6e5d-49c9-c352-08d8d38a033d
x-ms-traffictypediagnostic: MN2PR13MB3616:
x-microsoft-antispam-prvs: <MN2PR13MB3616C9D1C3501F2125351E01F2869@MN2PR13MB3616.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR13MB4087.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(39840400004)(136003)(396003)(376002)(366004)(7696005)(8936002)(19627405001)(8676002)(66946007)(4326008)(55016002)(5660300002)(966005)(2906002)(30864003)(66476007)(66446008)(6506007)(478600001)(52536014)(166002)(76116006)(66574015)(71200400001)(86362001)(9686003)(186003)(44832011)(53546011)(83380400001)(66556008)(110136005)(316002)(45080400002)(64756008)(33656002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR13MB40870BB32046B199A0F25276F2869MN2PR13MB4087namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR13MB4087.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0355a5d7-6e5d-49c9-c352-08d8d38a033d
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Feb 2021 21:21:38.4410 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: t+5tCInIe2872hZIN5nb5dDZhNsUFFS3eroKhCfj2aB3KkCy+grGY8n9wB7iMfHX2Q0QUt+BU0nqK/+LHTyDuQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB3616
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/7K2QW0mhQ7LN50U1QRqupAtFWgo>
Subject: Re: [Lsr] A review of draft-ietf-lsr-isis-ttz
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Feb 2021 21:21:50 -0000

Hi Acee,

    We have been working on addressing all the valuable comments from Adrian.

Hi Adrian,

    Thank you very much for your time, good and thorough review.

Best Regards,
Huaimo
________________________________
From: Acee Lindem (acee) <acee@cisco.com>
Sent: Monday, February 15, 2021 12:42 PM
To: adrian@olddog.co.uk <adrian@olddog.co.uk>; 'lsr' <lsr@ietf.org>
Cc: draft-ietf-lsr-isis-ttz@ietf.org <draft-ietf-lsr-isis-ttz@ietf.org>
Subject: Re: [Lsr] A review of draft-ietf-lsr-isis-ttz

Hi Adrian,
Thanks Much - I think these are all good comments and would greatly improve both the completeness and readability of the draft.

Hi Authors,

This is really a good review and I believe all the comments should be incorporated. While many of these are sins of omission that will take some time, it would be good to at least respond as to your intent to cover in future versions of the draft.

Thanks,
Acee

On 2/13/21, 3:35 PM, "Lsr on behalf of Adrian Farrel" <lsr-bounces@ietf.org on behalf of adrian@olddog.co.uk> wrote:

    Hi all,

    Acee leant on me to do a review of this work (so blame him :-)

    It's good to see this document adopted and progressing. Particularly
    good to see the realistic compromise of making this Experimental.

    I have a few comments, below.

    Best,
    Adrian

    ===

    I have a largish issue with the fact that the document offers a choice
    of how to aggregate the zone: virtual node or full mesh. Firstly, it is
    not helpful to offer options without guidance about which option to pick
    if you're an implementer or a deployer. You also need to specify whether
    the choice MUST be a configuration option, and how to handle when some
    nodes in the zone think one option and the others think the other
    option.

    Possibly you can make this part of the experiment (see below for notes
    on the experiment).

    I have some pretty strong opinions on the idea of a single node
    abstraction. The main challenge comes when there is a partial failure in
    the zone such that the zone is partitioned (or the path between two
    zone neighbors across the zone is severely degraded). It is not possible
    to represent this in the node model since your only options are:
    - drop the connection to a neighbor
    - move to represent the zone as two nodes

    In fact, both models (node and mesh) are subject to disruption when
    there is a connectivity failure within the zone, but if we think about
    the mesh model, it doesn't actually need to be advertised as a full
    mesh: partial mesh is easily handled. Nevertheless, the use of a single
    zone leader to perform the aggregation has problems if the zone is
    partitioned in some way - perhaps this is addressed by the partitioned
    zone simply electing two distinct leaders and declaring itself as two
    zones.

    This discussion of faults within the zone seems (to me) to be pretty
    important.

    I am also struggling with metrics and route computation when the zone is
    viewed from outside the zone.  4.1.5 tells us about route computation,
    but it is not until 4.3.1 that we discover:
       The
       metric to the neighbor is the metric of the shortest path to the edge
       node within the zone.
    This text applies to the full mesh case, and we don't have anything
    about the node model, so we might assume that the metrics on the edge
    circuits are unchanged.

    Obviously, this is important, and it feels that something is broken for
    the virtual node case. Consider Figure 1.

    Without the zone (and assuming link metrics of 1), the cost of the path
    R15-R61-R71-R67-R31 is 4, and this route might not be preferred if some
    other route R15-x-y-R31 exists with cost 3. However, once we have
    introduced the zone using the virtual node approach, there is an
    available route R15-Rz-R31 that appears to have a preferable metric of
    2. I would say that the route R15-x-y-R31 should still be preferred.

    This point certainly needs to be called out in the text, and maybe this
    gives some input to the choice between models. Perhaps the metrics in
    the ISN and ESN TLVs are related to this point, but section 4.2.1 gives
    no hint about how to set these values. Actually, I suspect that what is
    going on here is that all of the metrics advertised to outside the zone
    are controlled by the zone leader and advertised in the ISN/ESN - but I
    don't find that actually stated anywhere.

    All this said, I find it notable that this document focusses almost
    completely (sections 4 and 5 - section 4.3 is a very small section) on
    the virtual node model. It would be good to provide an example like
    Figure 2, but for the mesh model.

    Perhaps rather than deferring this to be an outcome of the experiment,
    this document should spend some time comparing the two models *or* it
    might even be time to abandon one of the models.

    ---

    Obviously, at some point before this goes forward for publication,
    you'll need to reduce to no more than five front-page authors.

    ---

    I think the Abstract might usefully mention IS-IS. Probably the first
    sentence could read:

       This document specifies a topology-transparent zone in an IS-IS area.

    ---

    The document really needs a section to scope the Experiment.

    - How is the experiment kept separate and safe from the Internet or
      indeed from any non-participating routers?
    - What happens if the boundary of the experiment are breached?
      (To expand on this, what happens if there is a misconfiguration so
       that a Zone Internal Node thinks its neighbor is also in the Zone
       when it is actually unaware of these extensions and should be
       treated as a Zone External Node? This misconfiguration has a node
       that should be a Zone Edge/Border Node acting as a Zone Internal
       Node.)
    - How is the success (or failure!) of the experiment assessed?
    - Are there plans to bring this back for consideration on the standards
      track if certain criteria are satisfied?
    - Is evaluation of the relative merits of node and mesh abstraction part
      of the experiment?

    ---

    Section 1

    The WG may have established a different practice, but it used to be
    normal to reference RFC 1195 alongside ISO 10589.  (You do have 1195
    listed in the references section, but you don't actually reference it).

    ---

    Section 1

       There are scalability issues in using areas as the number
       of routers in a network becomes larger and larger.

    Maybe what you're trying to say in this section (and it is important
    because it gives the whole motivation for this work) is that there are
    scalability issues with a single IS-IS area as the number of routers in
    the area grows. (You might explain what those issues are.)

    Then you can go on to say how splitting into multiple levels and having
    multiple L1 areas mitigates the scaling issues. And then you can
    continue with your text about why splitting an IS-IS system as it grows
    can be hard.

    ---

    Section 2

       A Topology-Transparent Zone (TTZ) may be deployed to resolve some
       critical issues such as scalability in existing networks and future
       networks.

    This sounds like you have a number of critical issues in mind, but you
    only mention scalability. Are there others you can list, or should you
    reduce this text to just...

       A Topology-Transparent Zone (TTZ) may be deployed to resolve the
       critical issue of scalability in existing network and future
       networks.

    ---

    Section 2

       o  Abstracting a zone as a TTZ virtual entity, which is a single
          virtual node or zone edges' mesh, SHOULD be smooth with minimum
          service interruption.

    I *think* you are talking about the transition from not using TTZ to
    using TTZ, but it could be a lot clearer.

    A forward pointer to 4.1.4 might be useful. And 4.1.4 really should
    describe some of the processing governed by the OPS bits in 4.2.1.

    ---

    Section 2

       o  De-abstracting (or say rolling back) a TTZ virtual entity to a
          zone SHOULD be smooth with minimum service interruption.

    This is similarly unclear, and it sounds like you might be talking
    about turning off a zone (i.e., moving all of the Zone Nodes into the
    surrounding area and removing the zone), or you could be talking about
    moving a single node from inside to outside the zone.

    ---

    Section 2

       o  Users SHOULD be able to easily set up an end-to-end service
          crossing TTZs.

    I am not clear what a "service" is in this context. Assuming we're not
    talking about TE extensions, isn't the service simply that the user
    sends packets and they are routed by the network?

    ---

    Section 4

    I think the start of this section needs to add a little about the limits
    of a TTZ. In particular:
    - Is a TTZ restricted to reside within a single level?
    - Is a TTZ restricted to lie within a single area?
    - What happens if one of the zone nodes is an L1/L2 router?
      - Presumably, depending on the answer to the first question, this
        could only happen if the node in question is a zone edge/border node
        But, even then it is complicated: does the abstracted node become an
        L1/L2 router?

    ---

    4.1
    OLD
      Each of these links connects a zone neighbor.
    NEW
      Each of these links connects to a zone neighbor.
    END

    ---

    4.1
       The virtual node ID may be derived from the zone ID.

    Maybe say how else it could be specified and how the implementer or
    deployer makes this choice.

    ---

    A useful modification to Figures 1 and 2 would be to add a circuit from
    R15 to R65 in Figure 1 and show how this becomes a second 'parallel'
    circuit from R15 to Rz in Figure 2.

    ---

    4.1.1

       A TTZ MUST hide the information inside the TTZ from the outside.  It
       MUST NOT directly distribute any internal information about the TTZ
       to a router outside of the TTZ.

       For instance, the TTZ in the figure above MUST NOT send the
       information about TTZ internal router R71 to any router outside of
       the TTZ in the routing domain; it MUST NOT send the information about
       the circuit between TTZ router R61 and R65 to any router outside of
       the TTZ.

    These "for instance" examples are good in that they are true. But they
    imply some things by omission, and I don't think you mean to make those
    implications.

    That is, the first paragraph is much clearer and definitive. But your
    second paragraph, by calling out some special cases of "internal
    information" makes it ambiguous whether, for example, the router R61 is
    advertised outside the TTZ. (Of course, it isn't.)

    It may be better to delete the second paragraph, and go straight to the
    following paragraph that describes what is seen outside the TTZ by
    directly describing what *is* advertised rather than providing a partial
    list of what is not advertised.

    ---

    I think that the subsections of 4.1 cover all of the necessary
    information. My list of things to cover is:
    - zone edge/border nodes form adjacencies with zone neighbor nodes using
      the identity of the aggregate zone node and not their own identities
    - zone nodes continue to operate IS-IS as normal to advertise zone nodes
      and zone links within the zone
    - zone edge/border nodes do not advertise or readvertise LSPs that
      originated within the zone to neighbors outside the zone
    - zone nodes continue to operate IS-IS as normal to re-advertise LSP
      that originated outside the zone
    - the zone leader is responsible for deriving the aggregate node
      information that represents the node and for originating LSPs for this
      aggregate node
    - zone nodes re-advertise LSPs originated by the zone leader on behalf
      of the aggregate zone node on all circuits including those that
      connect to zone neighbor nodes
    - when a zone edge/border node readvertises the LSPs for the aggregate
      zone node, it does so as it had originated the LSP
    - when any zone edge/border node receives an LSP that reports itself as
      originating from the aggregate zone node, the edge/border node
      suppresses the LSP
    - zone nodes do not install routing state resulting from advertisements
      of LSPs describing the aggregate zone node

    As I say, I think you have all this in the subsections of 4.1, but I had
    to hunt around to find all of this. It might be helpful to give a clear
    summary of the behaviors.

    ---

    4.1.2

       The leader election mechanism described in
       [I-D.ietf-lsr-dynamic-flooding] may be used to elect the leader for
       the zone.

    "may be used" or "are used"?

    ---

    4.1.2

       Somewhere you need to cover what happens if the zone leader fails
       but the zone remains otherwise fully connected. Does the new leader
       start from scratch, or does it try to retain the zone ID etc.?

    ---

    4.1.4 attempts to do two things:
    - describe the migration from not-a-zone to the use of a zone
    - describe the steady state zone behavior
    I think it would be helpful to split these out into separate sections.
    In particular, the migration from not-a-zone to zone is only needed in
    operational networks.

    ---

    4.2

       The following TLV is defined in IS-IS.

    I think...

       This document defines a new TLV for use in IS-IS as follows.

    ---

    4.2.1

       The format of IS-IS Zone ID TLV is illustrated below.  It may be
       added into an LSP for a zone node.

    s/may/MUST/

    ---

    4.2.1

       If every link of a zone edge node is a zone link

    Doesn't that mean that the zone edge node is not a zone edge node?

    ---

    4.2.1

    To be honest, I found the description of the processing governed by
    the OPS bits to be pretty complicated.

    I would recommend adding a new section (related to 4.1.4) that talks
    through the process in clear steps. Then this txt can just list the
    meanings of the bits and point back to the process description.

    Maybe this is what sections 5, 6.2, and 6.3 are for, in which case cut
    down the explanation here and provide forward pointers.

    ---

    Figures 4 and 5. I think you have defined the types for these two
    sub-TLVs (1 and 2).

    ---

    4.2.1

    I wonder how many neighbors a zone might have. It could be a fairly big
    number, I suspect, although obviously it depends on how the operator
    decides to chop up the area into zones (for which I don't find any
    guidance).

    The size of the ISN and ESN would appear to be a function of the number
    of neighbors times (IDlength+3). Is there a practical constraint on the
    size of the TLVs which places a limit on the number of neighbors that a
    zone can have? This would be an important design consideration for the
    operator. Maybe it is another feature for experimentation.

    ---

    4.2.1

    The same neighbour may have two links to the zone and not necessarily
    through the same edge/border node (see my previous point). In this case,
    might the different links have different metrics? I think so, but I
    don't see how that is encoded in the sub-TLVs.

    ---

    6.1

    There is probably something to be said about what happens if the
    configuration of the zone ID is not consistent across the zone. Is it
    as simple as you ending up with two zones?

    What is the scope of uniqueness of the zone ID? I think it only has to be
    unique in the zone and with the neighbors. Obviously there are ways to
    make this safe (such as area or global uniqueness). What are the
    constraints?

    ---

    6.2

       When receiving
       the command, the node distributes it to every zone node.

    Is this in the management plane or in IS-IS? I can see how it could be
    in IS-IS if the configured node is the zone leader and it just starts
    sending the zone TLV and all of the edge nodes are identified in
    sub-TLVs such that a receiving node is either an edge or an internal
    node. But I don't see how it works if the configured node is just some
    internal or edge node and the leader has to be elected.

    Similarly...
       If automatic transferring zone to node is enabled, the user does not
       need to issue the command.  A zone node, such as the zone leader,
       will distribute the "command" to every zone node after determining
       that the configuration of the zone has been finished.
    ...what is the command and how is it distributed?

    Same sort of issues in 6.3

    ---

    Section 7 is a bit suspect! What would happen if a zone TLV was sent by
    a compromised router or added to an LSP by a mid-wire attacker? I would
    be sympathetic to you saying that if an attacker can do either of these
    things then there are many far worse things they can do, but I think you
    should call out:
    - what sort of attacks are possible
    - what damage they might do
    - how these attacks might be detected
    - what protections are available (references would be enough)

    ---

    Section 8

       Under the registry name "IS-IS TLV Codepoints", IANA is requested to
       assign a new registry type for Zone ID as follows:

    I think...

       IANA is requested to make a new allocation in the "IS-IS TLV
       Codepoint Registry" under the registry name "IS-IS TLV Codepoints"
       as follows:

    ---

    Section 8

    I recommend you tell IANA whether you want the new TLV type to be less
    than or greater than 255.

    ---

    Section 8

       IANA is requested to create a new sub-registry "Adjacent Node ID Sub-
       TLVs" on the IANA IS-IS TLV Codepoints web page as follows:

    I recommend you call the new sub-registry "Sub-TLVs for TLV type TBD1
    (Zone ID TLV)"

    _______________________________________________
    Lsr mailing list
    Lsr@ietf.org
    https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Flsr&amp;data=04%7C01%7Chuaimo.chen%40futurewei.com%7Caa16d30a01e04474c24408d8d1d91f4b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637490077767552522%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=6wBvV8M6rC1ttkvhbz3x6%2FkshLJ05v4orXwOIQMR%2Bc4%3D&amp;reserved=0