[OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and-processing-05 ietf last call Opsdir review
"Head, Jordan" <jordan.head@hpe.com> Tue, 09 December 2025 14:31 UTC
Return-Path: <jordan.head@hpe.com>
X-Original-To: ops-dir@mail2.ietf.org
Delivered-To: ops-dir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 7178E9801F00; Tue, 9 Dec 2025 06:31:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J_z-9C9xm8NF; Tue, 9 Dec 2025 06:31:26 -0800 (PST)
Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 5DCFB9801DBC; Tue, 9 Dec 2025 06:30:45 -0800 (PST)
Received: from pps.filterd (m0148663.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 5B9D3mQW2876054; Tue, 9 Dec 2025 14:30:32 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=pps0720; bh=lmKdaEF6i2otd8drWmPHYkMDeM U1VXMHg7vlVCyNZHY=; b=C8b1V5iZKmgifBWmGjFPt8i7dnJAkjMOvem9ndm+Hz iTI7UDYARdUqbcUk3ZDukeTSPEWojemNiZN0+Yug0MaCud1BsldZSYT+z+vFUr6r 0Vutpjuc/pKiBTOYBAvD1Gt8A17ZN6x+PlVEYL45uAPfCkBToQ8PJOozjZL5Mvqg iKO2YQ1QpsoqCS2rlfyDEFGx70tHtAp0qkpmC3Eq5HOTKoZjw8/GEYfPBTtbsAC0 OFEjfw84rRR3t6qxXkQn8GHte7Pyb0g19zk77ERlmjHCxn0c9B7kXy13TOlj9Frf LeBJ8DGH1QUx3SoaBH958HS4BBm0MscNkPCVtiD/YbNQ==
Received: from p1lg14880.it.hpe.com (p1lg14880.it.hpe.com [16.230.97.201]) by mx0a-002e3701.pphosted.com (PPS) with ESMTPS id 4axma80w3v-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 09 Dec 2025 14:30:32 +0000 (GMT)
Received: from p1wg14926.americas.hpqcorp.net (unknown [10.119.18.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by p1lg14880.it.hpe.com (Postfix) with ESMTPS id F38B580026E; Tue, 9 Dec 2025 14:30:21 +0000 (UTC)
Received: from p1wg14927.americas.hpqcorp.net (10.119.18.117) by p1wg14926.americas.hpqcorp.net (10.119.18.115) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 9 Dec 2025 02:30:21 -1200
Received: from p1wg14920.americas.hpqcorp.net (16.230.19.123) by p1wg14927.americas.hpqcorp.net (10.119.18.117) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend Transport; Tue, 9 Dec 2025 02:30:21 -1200
Received: from DM5PR08CU004.outbound.protection.outlook.com (192.58.206.38) by edge.it.hpe.com (16.230.19.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 9 Dec 2025 02:30:19 -1200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=VcPyWy0ZGgwJyqg99HyyruVQtkvh0dtVyG13DTsx0ERp0MtObj00MpUlK7LbPQ2Xg6vfS9oh2mZBPGXiJIFZxx+Vd5GlaeDVDtK7KnXwyrV16vi4zm9+i+15wb8NP/T7WB93ux7xrZU2oV2jagD20/KO84Q31nOMkICJIeMwGSgazES4VfbWl5RffOqmt7B0cG+j+Q6m1djjfHkjy6WMe1TvXjnP155jh0lxylJXjxJt1rFxSyRT45+cuiuKE4VpC2xRomO6dYxj5k0sqWFqIEadUYsdkgyUlIlEwB9OdBV684BYfRBEKSFl7a4f85fZUd9hbmqOKZuts+0rzxVLPA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lmKdaEF6i2otd8drWmPHYkMDeMU1VXMHg7vlVCyNZHY=; b=kE5hNsaya7nE/yR9SSZJNErZ51qyb/mcpndpUZFrYLnsf3y2ePAHhTmOk2ryKOEFxcuJla5it2EHIpeUDZb2/M7DI2p3zG/NEOqz8VBhVY+qPrQoctXaFaRWH4cnE34i1qgl+IgaMFA4hJJN47pTgcxUOcRGzTlwkq6XdRQwOWCvzyboebn3MupVdQbRP6AxUk99hm3h695p/LnAnzNgzwosxUJFpGPU+87p06243rvtCC7mKvjcRar9DN31kI0g8lJEi2aLi0PdU0ufy5g3fvTt8V1Iun6X+IkCXu7KlOUKc9tGe6dMcZyjkATkCWq3AiAggVrYjhAZKwVRPSSiWQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none
Received: from SA1PR84MB3960.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:806:3e7::6) by PH0PR84MB2218.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:510:164::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9388.14; Tue, 9 Dec 2025 14:30:15 +0000
Received: from SA1PR84MB3960.NAMPRD84.PROD.OUTLOOK.COM ([fe80::84ae:95d1:82e1:415f]) by SA1PR84MB3960.NAMPRD84.PROD.OUTLOOK.COM ([fe80::84ae:95d1:82e1:415f%4]) with mapi id 15.20.9388.013; Tue, 9 Dec 2025 14:30:15 +0000
From: "Head, Jordan" <jordan.head@hpe.com>
To: Italo Busi <italo.busi@huawei.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Thread-Topic: draft-ietf-rift-kv-tie-structure-and-processing-05 ietf last call Opsdir review
Thread-Index: AQHcTAvUp90kMkmg8UeDZkgReMuNCLUNBtjr
Date: Tue, 09 Dec 2025 14:30:15 +0000
Message-ID: <SA1PR84MB3960118D3A8A9E3932A33049F2DBA@SA1PR84MB3960.NAMPRD84.PROD.OUTLOOK.COM>
References: <176190724360.169254.14490164256663774922@dt-datatracker-5df8666cb-h6h9l>
In-Reply-To: <176190724360.169254.14490164256663774922@dt-datatracker-5df8666cb-h6h9l>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-reactions: allow
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SA1PR84MB3960:EE_|PH0PR84MB2218:EE_
x-ms-office365-filtering-correlation-id: 3c05c099-4e9b-4624-5a37-08de372f7826
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|8096899003|38070700021;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR84MB3960.NAMPRD84.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(8096899003)(38070700021);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: QmomvKgsRtF6Iz7uyDX/oRnS1XH2oA9a0HtTUQlghvTRjx2+1ewgCHf+FSXQDGNhAsS8i5EyW0gOpMWmrrAq9KLgKKERh7Cv4K4jV+oVxJ+Eg1Cti2c4yCe1LpmRbXyijQKp/NQQIWUTorOsA7QI7oRs8NTAchZMBkCQZzBKSFSO11IUaVjTiVKnourmGxilySqo4brYJm6jBjLibgi2eKC57izVf7CGdWY5Ivca5cDcxIxIMrNVKZVxOMq5J7WjX/Szmkc0BMJqBB2HvlKk/NpAESNtX4oNYCtuQe+nvZfO3BWx/PjvL9kQY7paz6OP3Y5p6vkeO15pDtn8Rne2r7MHRMXwg9cgahKXTmoBqYqQwYwOFvhptXFJxAyeUFrTmL0k4CtZ8mdlHs9w/eQnvsQqm/0d9XbQeBQqNYEBn6DZBySbSISBa1qeIiI5VTrVoaS9rQqsQlevfs7A3n+QHBZd3pVJ3CnaVCmqXA3LAqUUReym5dXtKKCAtnEHnV84ZrZSeU0VmSe66Ey8ABDPv3AldCk8H2/7RUYXFX0uH5WbuLgyqWzDEG2s5k1PjG7HP0XZJ9SXk5Es8U5hXiVahOgiXR2POGaMnN9rF7pgPZz5qciGjy+oY7EdY3cP1SzQVDh0WAFBnv9jmXvDqFgiXCiHTJyEOe34EgmBOPGgkUX/+lrWMP5LsZnn5FSPaF1rFTGQ9PdZPinQP9g6peYS3ATYq05VDYF5h+ybdInze752W6K5+N4nNkDjp39JDGk0y/m+rYo2gCE8Ps4ok8D+B/5MiUNa+FIPoKEuoZpkJd9ETe29Hr3R8stEqI6UbETxaYyl7B798g5hWNCqRUjzs4Z8hr7geyQik8wwg/Djl+GXoiBgRwj9pbAa3TrZ6qYPIHwoXaWBLkPmr7J4X+2kPKTrrjcvBSF/MvgLOssoesb2K75vaEDU2t5rMIRt5ROk+vYt05B0Onl1lk+87j0pWBhhyW8VteWn6nUfeWDwnOPlNlzz/6ay8wZ3q74klp9XX7yj25uH+Ahkhy/oSj//u2/wxBOXTmIDgWhkxtmzvql/tgWbYV9CNphQzRyHR8HI2PxK6Fx+noj03VLqd5a6F60nDOFzmGUr8fyit/fgbSAlQdwd8+kMd/BG1I3fvrJvBu6iR0p7ydCp2p9ZAYN4bWJIZk8Dlq+sm/wENTeIEC9o0zkvYIbESPc7Mq3dASYd4ODDbAwq8FWTQsQg+SlAhRkRsSt5/u18UFqHIg/8DpIdMFWNsLZ2npfcSMXYDE8e1j6UnNdFzLa6XBrBrXOAUqxGAXmbHGBV+VgsrJ5JgIE0F8ytYX1a8Bw+mDIytCFKcgmhg2gcL/PrSv6G9eqV30ANoq7Ui5k5b0/WaBlEnaeNfVvMQrZsN79E/rdbJ2Fr9kwTOGJlrtBsLMrVzUNO47bJWm91I5xAy1IzJjy5XkD+E8YWwkB1yTlDYDHQlkZeKcacG1zO0K1LWdKEXMGRLOdM5indb+A0b1s1ytGnOJesVgPBTRrb3x32/6E+YxxU63emB4EIvUgqP/h6LZ/Qjoq4T4f9wfAHdocmfWK2p8o6fXIrothbRfeapEZI54cTxt19q5RNdtTVq4dSr8H3Tg==
Content-Type: multipart/alternative; boundary="_000_SA1PR84MB3960118D3A8A9E3932A33049F2DBASA1PR84MB3960NAMP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA1PR84MB3960.NAMPRD84.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c05c099-4e9b-4624-5a37-08de372f7826
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Dec 2025 14:30:15.1418 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: HCmZJ41TDGAe0h8gywUm/xm014sTGrW98qOwjQW9rRz5H6XIdNS7WyhGr2tNRSBQGkspFjx9JPlvzMDs2TEohA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR84MB2218
X-OriginatorOrg: hpe.com
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMjA5MDEwNyBTYWx0ZWRfX29sK9HuLJtMz fy7DqiWKUYWvpO/JTL43SIJiE5Xqoj9oryco8l+AeeVutg+emFBqLroNeu3T26XCix1vHzQCEKL 0Koak8VexQuXOfauDJ9b7Oa9GSF6yI+EpVQlv5FZ+Sij78YN+0bkK9uyTCvK5ZWqIkGHayoyTpM sJBE6TAPGuKEdmWKXlCPbIyOjmtTWL3IDHQKpZFXnbCgOM5GQtsPAqPkdTZLGOA/YMwpSrYMRrz UDne3tpJdiXZfzFEY/TQN+NE2o0UyLt9fzbx2kAuR96L5w3r6WqnFE1zNM46hAsGWuYi1LyryyD BNuiblOVoAcVxPcgXlyiA6na5vqPgZKfiFXBacxj8QUrscJWmI0/UVx8dMSlDs0pVRSgePaJp+8 f9O4k6N6+ZPAQVokgQsrwhFJqrAosA==
X-Proofpoint-ORIG-GUID: YuvOxRIwYewTMfqzfYXRTXJYIJapXKuv
X-Authority-Analysis: v=2.4 cv=a+s9NESF c=1 sm=1 tr=0 ts=69383288 cx=c_pps a=A+SOMQ4XYIH4HgQ50p3F5Q==:117 a=A+SOMQ4XYIH4HgQ50p3F5Q==:17 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=wP3pNCr1ah4A:10 a=VkNPw1HP01LnGYTKEx00:22 a=48vgC7mUAAAA:8 a=PIMmB0vS5gCT-waGFGQA:9 a=QEXdDO2ut3YA:10 a=xLKkSvMNKDIIzpiS:21 a=_W_S_7VecoQA:10
X-Proofpoint-GUID: YuvOxRIwYewTMfqzfYXRTXJYIJapXKuv
X-HPE-SCL: -1
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2025-12-09_04,2025-12-04_04,2025-10-01_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 bulkscore=0 adultscore=0 suspectscore=0 clxscore=1011 priorityscore=1501 impostorscore=0 phishscore=0 malwarescore=0 lowpriorityscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510240001 definitions=main-2512090107
Message-ID-Hash: JWKHZ2AM7V44263IQ2TNKRYRMOEDU45G
X-Message-ID-Hash: JWKHZ2AM7V44263IQ2TNKRYRMOEDU45G
X-MailFrom: jordan.head@hpe.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ops-dir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "draft-ietf-rift-kv-tie-structure-and-processing.all@ietf.org" <draft-ietf-rift-kv-tie-structure-and-processing.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "rift@ietf.org" <rift@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and-processing-05 ietf last call Opsdir review
List-Id: Ops Directorate <ops-dir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ops-dir/MbE6EVzV54voup10Kcl-58sbP6c>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ops-dir>
List-Help: <mailto:ops-dir-request@ietf.org?subject=help>
List-Owner: <mailto:ops-dir-owner@ietf.org>
List-Post: <mailto:ops-dir@ietf.org>
List-Subscribe: <mailto:ops-dir-join@ietf.org>
List-Unsubscribe: <mailto:ops-dir-leave@ietf.org>
Italo, Thank you for your patience and the very thorough review, I think your feedback has improved the spec. I have posted the updated spec. Comments inline as jhead>> From: Italo Busi via Datatracker <noreply@ietf.org> Date: Friday, October 31, 2025 at 6:40 AM To: ops-dir@ietf.org <ops-dir@ietf.org> Cc: draft-ietf-rift-kv-tie-structure-and-processing.all@ietf.org <draft-ietf-rift-kv-tie-structure-and-processing.all@ietf.org>, last-call@ietf.org <last-call@ietf.org>, rift@ietf.org <rift@ietf.org> Subject: draft-ietf-rift-kv-tie-structure-and-processing-05 ietf last call Opsdir review [External Email. Be cautious of content] Document: draft-ietf-rift-kv-tie-structure-and-processing Title: RIFT Key/Value TIE Structure and Processing Reviewer: Italo Busi Review result: Has Issues *Summary* The document has issues and nits that should be resolved before publication. *Issues* Note that I am not a subject expert: if some of these comments can be addressed by reading some specific documents, it would be worthwhile adding some explicit pointers (better indicating also the sections, in addition to the documents). 1) Section 2 If I understand correctly the Key Identifier is unique within Key-Type. If so, I would mention this explicitly. jhead>> The Key Identifier is unique in any context, Key-Type or Sub-Type. I will clarify this. 2) Section 2 The document says that the Values field "SHOULD contain 1 or more elements" Is your intention to preclude using the KV TIEs to carry empty Values? If so, why it is a SHOULD and not a MUST? What happens if the Values is empty? jhead>> We don’t intend to preclude a scenario with empty values. If an implementer wants to build some semantics around that, the behavior would be defined in their own spec. 3) Section 2 What happens if the Values field length is not an integer multiplier of 4 bytes (e.g., 2 bytes)? It will be just 2 bytes long or padded to become 4 bytes long? I think this should be explicitly defined jhead>> The draft already RECOMMENDs that a serialized Thrift object is used, if an implementation adheres to this won’t be a factor. Beyond that it’s out of scope for our spec. 4) Section 2.1 If I understand correctly, in this case, the Key Sub-Type is unique within Key-Type and the Key Identifier MUST be unique Key Sub-Type If so, I would mention this explicitly. jhead>> Good catch. We already state that if Key Sub-Type is used within the Well-Known Key-Type, it MUST be registered (implies unique). jhead>> I added that the Key Identifier "SHOULD be unique" within the given Key Sub-Type (which covers both Well-Known and future Key-Types that elect to use a Sub-Type). We simply cannot say MUST here as depending upon the specifications derivation procedures for the Key Identifier, hashing collisions are possible or likely, it would be like telling someone that they MUST NOT accidentally do something. 5) Section 2.1 The document says that the Key Sub-Type MUST be used when the Key-Type is either Well-Known or Experimental. As a consequence, it cannot be used for other Key-Type to be defined in future. Is this the intention? I am wondering whether the real intent was intention to say that whether the Key Sub-Type MUST be used or MUST NOT be used is defined by the Key-Type? If this is the case, I would rephrase the sentence. jhead>> Good catch, I’ve rephrased it to say “The Key Sub-Type MUST be used when the Key-Type is either Well-Known or Experimental in order to avoid interoperability issues, but is OPTIONAL for any other Key-Type.” 6) Section 2.1 I am not sure the requirement OPTIONAL should be capitalized. If I understand correctly, the defining the Key Sub-Type is optional for the designer of the Key-Type and not optional to be implemented. If the specific Key-Type (e.g., the Well Known Key-Type) defines the Key Sub-Type, the Key Sub-Type MUST be implemented. If the specific Key-Type (e.g., the OUI Key-Type) does not defined the Key Sub-Type, the Key Sub-Type MUST NOT be implemented. jhead>> I’m good with removing the normative language from this particular section. I’ll add the normative language to the more specific sub-sections where the behavior would actually be implemented (e.g., Well-Known and Experimental Key-Types will have a mention that it’s a MUST, but others will be normative OPTIONAL as mentioned above.) 7) Section 2.3 The document requires that all the "implementations SHOULD support" the Well-Known Key-Types I am not sure we can RECOMMEND all the implementations to support all the values, especially sine some of these values can defined in future. IMHO, the compliancy requirements for the Well-Known Key-Types should be defined in the RFC that defines the specific Well-Known Key-Type and not here. Proposed rephrasing: "This section reserves a value in the RIFT Key-Type Registry to indicate a Well-Known Key-Type.” jhead>> My text should be “The Well-Known Key-Type” (singular, not plural) meaning that an implementation should recognize a given Key-Type as Well-Known, not every single Well-Known Key-Type. 8) Section 3 The document says that "Key-Value elements SHOULD NOT be used to carry topology information used by RIFT itself to perform distributed computations." Why it is a SHOULD and not a MUST? What happens if a Key-Value element is used to carry topology information? jhead>> The short answer is that you may end up in race conditions between the underlying RIFT convergence and the data you need in the KV-TIEs. We state SHOULD NOT because if someone really wants to, they can, it’s up to the implementer. 9) Section 3.1.1 How to understand the format of the Values field (i.e., which bytes in the Values field carry the System ID and which bytes carry the Level)? Maybe it is sufficient to provide a reference where the format and length for System ID and Level fields are defined. jhead>> This is governed by Thrift encoding, I should have a reference here to point to the normative Thrift model in Appendix A. That model then references the “common” model which is defined normatively in the base spec. jhead>> Please note that the Thrift model syntax uses words like “required” and “optional”, but these are not considered normative themselves in the context of the document. 10) Section 3.2 This section defines the Key Targets and their processing and the Key Targets can be present on KV TIEs However, it is not clear where and how the Key Targets can be present in the KV TIE format jhead>> I caught this as I was reading through your review, will fold it back into the spec. In short, the Key Target comes before the underlying KV header. 11) Section 4.2.1 I am not sure we can allocate values with a Description and Reference "To be defined" Either remove these values from the registry (Expert Review can be requested at a later stage) or add the Description and Reference\ jhead>> Someone else mentioned this too, I have removed those items. 12) Section 4.3 I think that the specification for a new RIFT Well-Known Key Sub-Type should not only provide the required fields but also how the Values field of the KV TIE is formatted to carry these fields (see my comment 9 above) It is worthwhile mentioning this explicitly jhead>> This goes back to me referencing the normative Thrift model in the spec. If someone really wants to implement it without using Thrift, it’s out of scope for this document. 13) Section 4.3 I think that the specification for a new RIFT Key-Type should also defined how the Key Identifier are assigned and, depending on whether Key Sub-Type can be used in future RIFT Key-Types (see comment 5 above), also whether the Key Sub-Type is defined or not for that Key-Type. Please consider also the option to add a flag in Section 4.1.1 to track within the IANA Registry whether the Key Sub-Type is defined or not for that Key-Type. jhead>> I like this a lot, I have added a bullet point to this section to cover this. jhead>> If an implementation gets a new a new Key-Type from IANA and that implementation uses Key Sub-Types, those Sub-Types have no relevance outside of that spec. If a new spec wants to leverage an existing Key Sub-Type for a new use case, they do so at their own risk knowing that the behavior could change. I do not think that needs to be specified. *Nits* 13) Title Please expand the acronyms in the I-D title: Routing in Fat Trees (RIFT) Key/Value Topology Information Elements jhead>> Sure, I updated it. 14) Abstract and Introduction If I understand correctly, the RIFT protocols allows to advertise information using KV TIEs but it does not define the format of KV TIEs. If so, it might be worthwhile mentioning this explicitly in the Abstract and Introduction. jhead>> The higher level structure of the KV-TIE is defined in the RIFT base spec (RFC9692). 15) Abstract and Introduction In section 3, this document is also defining one Well-Known KT TIE for tie-breaking It might be worthwhile mentioning this explicitly in the Abstract and Introduction jhead> I’ll add this to the abstract. 17) Figure 6 In Figure 4, the Key-Type allocated value 2 is explicitly shown. I would align the style and shown explicitly the value 2 for the Key-Type and the value 127 for the Key Sub-Type fields. jhead>> I like this, will do. 18) Section 4: I think that the name of second registry should be "RIFT Well-Known Key Sub-Types", as correctly used in the title of section 4.2 jhead>> Ah yes, good catch. Will adjust. Regards, Italo
- [OPS-DIR]draft-ietf-rift-kv-tie-structure-and-pro… Italo Busi via Datatracker
- [OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and… Jordan Head
- [OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and… Head, Jordan
- [OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and… Italo Busi
- [OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and… mohamed.boucadair
- [OPS-DIR]Re: draft-ietf-rift-kv-tie-structure-and… Italo Busi