Re: [OSPF] AD review of draft-ietf-ospf-encapsulation-cap-03
Alia Atlas <akatlas@gmail.com> Fri, 30 June 2017 15:30 UTC
Return-Path: <akatlas@gmail.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B56312F290; Fri, 30 Jun 2017 08:30:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m648tTOJAsS8; Fri, 30 Jun 2017 08:30:12 -0700 (PDT)
Received: from mail-wm0-x22d.google.com (mail-wm0-x22d.google.com [IPv6:2a00:1450:400c:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2699312F287; Fri, 30 Jun 2017 08:30:12 -0700 (PDT)
Received: by mail-wm0-x22d.google.com with SMTP id 62so113570463wmw.1; Fri, 30 Jun 2017 08:30:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3DMD8N/OmE8GHorROPeYtm6OqzujOgkmp3jt1X2YQZE=; b=I2M09kgjIZf79Su2IKQtVtSy8glLoLLTdS7Hu4BbhksPRf8IkMmNR/h5CBgiFgm1bg RVZcP70G+USIoYpbt9PA6iUG/lpe8zar4b9ubwsBZzbHt087jQrsYL4b19/g0WzhAb8q uQ5ASR/C783eFUGRCnYnsn2x1DwX94aaknsf0jBVoILn6XWkUk44kzm1NJRiwrNldLQA nfmjDE4n5OGIG5LAg5kXpK012GeFcywLxPd7WFo+GSvBAGRRxJFluajAn5JEAEUCdjDl gAtAjof/vGSJfw9eRxWg97LivCyflNJUBXSkr4Hn9FzRWVPtn25Hoj6mZfenZto4WmCx tv3A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3DMD8N/OmE8GHorROPeYtm6OqzujOgkmp3jt1X2YQZE=; b=IXXmQFxV/LqR3fQFqIC/yNnBJzucTihDquemi2cAAGGWePND5zMhkFfBDLRUh6xB5I ns3Ckxlq2jfZMULSMYZenJS3HmZUcPZ9aoNmoZC7L8gvvcUvltbTizQI68lQNqHMm7YZ Q0l+kz4Fr9FcQXTJ39wboxIA+UQyD79e0aMDsrFv9Qm/F1xBKbHzOWs/J+phQKymHC5E sYpk6twcPc9lH1KgPswFfCJhaD2mB/lpcEXTJc3CgJABwQPHqJ4gDyjDiOQQ0WDenZi2 buJlPRBLVXzfdpbY2C5dxXo5st3T6M59jeHFyRsgjtFL0TzvG5Q8Hgfb5XwKrVDo3pqR L2DA==
X-Gm-Message-State: AIVw1109TSjxkjHqabp8ivKgEkqa9MYjM8jwz7MpwoktamuxeU/B1E99 d4NJmUhImvMiyVokEOoVRuCUi13Db3BC
X-Received: by 10.28.52.15 with SMTP id b15mr6175927wma.123.1498836610406; Fri, 30 Jun 2017 08:30:10 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.130.179 with HTTP; Fri, 30 Jun 2017 08:30:09 -0700 (PDT)
In-Reply-To: <26797_1498825901_595644AD_26797_68_1_53C29892C857584299CBF5D05346208A477E050A@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <CAG4d1rfJPTyz-nENp2ViJYg14BCctGAAzt+TD3E9zEdejpqJaA@mail.gmail.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE2BBC446D@NKGEML515-MBX.china.huawei.com> <CAG4d1rdaPeUD4Vdgh8BGdF73mxc1Px=aaTj=7GzcaF+0JGuxKw@mail.gmail.com> <29949_1498471189_5950DB15_29949_382_1_53C29892C857584299CBF5D05346208A477AC986@OPEXCLILM21.corporate.adroot.infra.ftgroup> <CAG4d1rdBsH8j3u6yVppzUKPwL-T44nHbH-kuw-SFfT7voqhoJQ@mail.gmail.com> <26797_1498825901_595644AD_26797_68_1_53C29892C857584299CBF5D05346208A477E050A@OPEXCLILM21.corporate.adroot.infra.ftgroup>
From: Alia Atlas <akatlas@gmail.com>
Date: Fri, 30 Jun 2017 11:30:09 -0400
Message-ID: <CAG4d1reTWATBUMSU8R6_FgpsvwLebrBkdt+AYN-vQTXhYtKE+A@mail.gmail.com>
To: Bruno Decraene <bruno.decraene@orange.com>
Cc: OSPF List <ospf@ietf.org>, "draft-ietf-ospf-encapsulation-cap@ietf.org" <draft-ietf-ospf-encapsulation-cap@ietf.org>, Xuxiaohu <xuxiaohu@huawei.com>
Content-Type: multipart/alternative; boundary="001a114353e6bd615305532f170b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ospf/tpoXdrlrBdyD1-YWB4nS6oJMZSY>
Subject: Re: [OSPF] AD review of draft-ietf-ospf-encapsulation-cap-03
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Jun 2017 15:30:24 -0000
Hi Bruno, On Fri, Jun 30, 2017 at 8:31 AM, <bruno.decraene@orange.com> wrote: > Hi Alia, > > > > More inline [Bruno2] > > > > *From:* Alia Atlas [mailto:akatlas@gmail.com] > *Sent:* Thursday, June 29, 2017 11:09 PM > *To:* DECRAENE Bruno IMT/OLN > *Cc:* OSPF List; draft-ietf-ospf-encapsulation-cap@ietf.org; Xuxiaohu > *Subject:* Re: AD review of draft-ietf-ospf-encapsulation-cap-03 > > > > Hi Bruno, > > > > Thanks for the updated draft - more in-line. > > > > On Mon, Jun 26, 2017 at 5:59 AM, <bruno.decraene@orange.com> wrote: > > Hi Alia, > > Many thanks for the useful review. > -04 has just been published. I believe it address your first pass of > comments. > Htmlized: https://datatracker.ietf.org/doc/html/draft-ietf-ospf- > encapsulation-cap-04 > Diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-ospf- > encapsulation-cap-04 > > > > Main changes: > - aligning with I-D.ietf-idr-tunnel-encaps rather than RFC 5512. > - adding 2 sub-TLV coming from I-D.ietf-idr-tunnel-encaps: IP QoS Field, > UDP Destination Port. Note that the first one is currently called "IPv4 DS > Field" in the IDR draft. I've commented on IDR that this is IPv4 specific > with no IPv6 counterpart. > > > > [Alia] The text for the UDP Destination Port (Sec 6.6) is wrong - it's > just copied from Sec 6.5. > > [Bruno2] thanks, fixed > > I agree with you on the need for the IP QoS field to represent both IPv6 > as well as IPv4; it also just talks about the DS field - but that's 6 > bits. Are the ECN bits included? That's a conversation for IDR. > > [Bruno2] agreed (that’s for IDR) > > > > Waiting for the resolution. We need the BGP and IGP draft to be aligned. > - removed registry "IGP Tunnel Encapsulation Type" and pointing to > existing registry "BGP Tunnel Encapsulation Type" > - (editorial) Sub-TLV of the Tunnel Encapsulation Attribute are grouped in > a dedicated section (§6) > - clarification that for all but one, those sub-TLV are defined in > I-D.ietf-idr-tunnel-encaps, from a syntax, semantic and usage standpoint. > - color Sub-TLV better defined (as not aligned with the IDR draft) > - added a section about the usage of the Tunnel Encapsulation attribute > (§7) > - a significant rule added: " A tunnel MUST NOT be used if there is no > route toward the IP address > specified in the Endpoint Sub-TLV or if the route is not advertised > by the router advertising the Tunnel Encapsulation attribute > advertising this tunnel. " > > > Some follow up on some of your points that I had missed in previous answer: > > > From: Alia Atlas [mailto:akatlas@gmail.com] > > Sent: Thursday, June 15, 2017 12:56 AM > [...] > > (does variable length fields based upon the allocated type cause issues > for OSPF sub-TLV parsing???) > > I guess that you are referring to > " o Sub-TLV Length (1 or 2 octets): the total number of octets of the > sub-TLV value field. The Sub-TLV Length field contains 1 octet if > the Sub-TLV Type field contains a value in the range from 1-127. > The Sub-TLV Length field contains two octets if the Sub-TLV Type > field contains a value in the range from 128-254." > https://datatracker.ietf.org/doc/html/draft-ietf-idr- > tunnel-encaps-06#section-2 > > The IGP draft does not use this. It uses a fixed 1-octet length field: > " Sub-TLV Length (1 octet): Unsigned 8-bit integer indicating the > total number of octets of the Sub-TLV value field." > https://datatracker.ietf.org/doc/html/draft-ietf-ospf- > encapsulation-cap-04#section-5 > > > > [Alia] I think that there is still clarification on what to do if (in the > future) a sub-TLV that > > used the 2-octet length couldn't fit into a 1-octet length. I know this is > currently hypothetical, > > so all I'm looking for is a statement about the difference and that such > sub-TLVs are not supported > > without further extensions. > > > > [Bruno2] There are 2 “Tunnel Encapsulation Attribute Types” registries: > > - one for BGP, which allow length of 1 or 2 octets (as per the > draft-ietf-idr-tunnel-encaps-06 because RFC 5512 only allowed for 1 octet) > > - one for IGP, which allow length of 1 octet > > > > For the IGP, there is no provision/future possibility to use a two-octets > length sub-TLV. > > So yes, the length is limited, but this is not specific to this sub-TLV. > All IGP/IETF/ISO…. TLVs share the same limitation that the size of the > length field is predefined and fixed. So nothing new IMHO. > > The only specific thing with this document is the filiation with the BGP > document. If BGP were to define a two-octets length sub-TLV, it could not > be retro-fitted in the IGP. One option would be to split the information > into multiple sub-TLVs, but this is still limited. Is this this relation > with the BGP sub-TLV that you’d like to be highlighted? If so, I can > propose a new section > > “6.7 Future sub-TLV > > draft-ietf-idr-tunnel-encaps similarly defines Tunnel Encapsulation > Attribute Sub-TLVs but IGP and BGP have separate IANA registries allowing > for separate sub-TLV definitions. If the same information is to be > advertised for both IGP and BGP tunnel encapsulation, it’s RECOMMENDED to > use the same syntax, semantic and code point. However, it is to be noted > that the "BGP Tunnel > > Encapsulation Attribute Sub-TLVs" registry allows for sub-TLV with two > octets of length, while the “IGP Tunnel Encapsulation Attribute Types” > registry only allows to octet of length. Hence the two-octets BGP Tunnel > > Encapsulation Attribute Sub-TLVs won’t be able to be defined for IGP > Tunnels. Eventually, their information may be split over multiple > sub-TLVs.” > > > > Is this what you are looking for? > > Alternatively the IGP registry could also define such two lengths, but to > be honest, I’m reluctant to introduce such a “hack” in IGP. I would fear > bugs with the introduction of a type having a two-octet length, with > possibly significant consequences in a link state IGP. > > > > BTW, I’ve just noticed that BGP and IGP registries have different names as > the name of the BGP registry has changed since RFC 5512. I’m fixing this > > OLD: IGP Tunnel Encapsulation Attribute Types > > NEW: IGP Tunnel Encapsulation Attribute Sub-TLVs > > [Alia] I thought the draft was now using the BGP Tunnel Encapsulation Attribute Sub-TLVs?? This draft just needs a statement that says "In BGP, as defined in [draft-ietf-idr-tunnel-encaps], Sub-TLVs with types 128-254 have a two-octet length field. In OSPF, there is no support for a two-octet length field; sub-TLVs in this range cannot be used in OSPF unless the value field's length is known to fit in one octet." > > > > Semantics and behavior need to be specified - not just the encodings > > Agreed. > Note however that the behavior is more complex in the BGP draft, because > the Tunnel Attribute is attached to BGP routes, which can be of various > SAFI with their own semantic and usage (e.g. GRT vs VPN/overlay case, > labeled/unlabeled...) and their interaction with the different kind of > tunnels (GRT vs VPN, labeled vs unlabeled). This is not the case in the IGP > draft which only signals the tunnel itself (discovery, parameters). > > > > [Alia] Sure - Sec 7 helps a lot. > > What isn't clear though is how tunnels that require setup are handled. In > Sec 5 of draft-ietf-idr-tunnel-encaps-06, I see > > "The tunnel type is supported (i.e., router R knows how to set up tunnels > of that type, how to create the encapsulation header for tunnels of that > type, etc.)" as part of the discussion of what is a "feasible" tunnel. > Similar language would help in Sec 7. > > [Bruno2] > > Both IDR and OSPF drafts have the same text regarding tunnel setup: “ Note that some tunnel types may require the execution of an explicit > > tunnel setup protocol before they can be used for carrying data. > > Other tunnel types may not require any tunnel setup protocol.” > > > As the IDR draft defines the IANA registry for encapsulation type, it also have the following sentence “Whenever a new Tunnel Type TLV is defined, the specification of that > > TLV must describe (or reference) the procedures for creating the > > encapsulation header used to forward packets through that tunnel > > type. » I don’t think that this is needed in the IGP draft since it does not define such registry. > > > > > > Since you specifically refer to a text in section 5 of > draft-ietf-idr-tunnel-encaps-06, I think that for the ospf draft the > related text is in section 7 and I’m proposing the following change > > OLD: The decision to use that tunnel, is driven by policy on the ingress > router. > > NEW: The decision to use that tunnel is driven by the capability of the > ingress router to support the encapsulation type and the policy on the > ingress router. > [Alia] That sounds good. > > [Alia] Finally, from a process perspective, I think that there has been > sufficient technical change that another short WGLC is appropriate. Please > do update the draft first. Then, we can do an IETF Last Call targeting an > IESG telechat in August. > > [Bruno2] ok. Waiting for your feedback before uploading the new version. > [Alia] Please do. > Thanks, > > Regards, > > --Bruno > > > > Regards, > > Alia > > > > > > > Thanks again for the careful review and the useful comments. > > Regards, > --Bruno > > > From: Alia Atlas [mailto:akatlas@gmail.com] > Sent: Tuesday, June 20, > 2017 5:27 PM > > > > On Mon, Jun 19, 2017 at 9:19 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote: > > > > > Hi Alia, > > > > > > > > > > > > Thanks a lot for your AD review. Please see our response inline. > > > > > > > > > > > > *发件人**:* Alia Atlas [mailto:akatlas@gmail.com <akatlas@gmail.com>] > > > *发送时间**:* 2017年6月15日 6:56 > > > *收件人**:* OSPF List; draft-ietf-ospf-encapsulation-cap@ietf.org > > > *主题**:* AD review of draft-ietf-ospf-encapsulation-cap-03 > > > > > > > > > > > > > As is customary, I have done my AD review of draft-ietf-ospf- > > > encapsulation-cap-03. > > > > > > First, I would like to thank the authors - Xiaohu, Bruno, Robert, > Luis, > > > and Luay - for their work on this useful document. > > > > > > > > > > > > I do have a few concerns that need addressing before the draft can > > > progress. > > > > > > > > > > > > [Bruno/Xiaohu] Many thanks for your useful comments. > > > > > > Following your comments, we believe it would be simpler and better to > not > > > create a new IANA registry for ”IGP Tunnel Encapsulation Attribute > Types” > > > but rather reuse the existing BGP one: > > > > > > https://www.iana.org/assignments/bgp-parameters/ > > > bgp-parameters.xhtml#tunnel-types > > > > > > > Given that the sub-TLVs available depend on the tunnel type, I think > this > > makes sense. > > > > > > > > > [Bruno/Xiaohu] BTW when this OSPF extension has been defined, it has > been > > > modeled based on RFC 5512. However, as of today, the BGP extension is > been > > > redefined in draft-ietf-idr-tunnel-encaps, sometimes. Which normative > > > reference should be use? > > > > > > - as of today, RFC 5512 is probably the right one as > > > draft-ietf-idr-tunnel-encaps has not passed WG LC and may never be > > > published as RFC (IDR requires 2 implementations. I think RFC 5512 > has not > > > been implemented hence we may question whether > draft-ietf-idr-tunnel-encaps > > > will be…) > > > > > > - in some hypothetical future, draft-ietf-idr-tunnel-encaps may > obsolete > > > RFC 5512 > > > > > > > Judging from the two partial implementations in the IDR wiki, I'm not > quite > > as concerned. That said, are you certain that there aren't explanations > > and behaviors that are clarified in draft-ietf-idr-tunnel-encaps that > > aren't in RFC 5512? Certainly, some of the tunnel types that were > > mentioned in the OSPF registry are from the former. > > > > > > > Major: > > > > > > > > > > > > 1) First, the draft talks about what information is sent - but > nothing > > > about how it is to be understood or used. That'd be ok if there were > a > > > clear reference to a document that discussed the related procedures. > A > > > quick scan of draft-ietf-idr-tunnel-encaps-06 seems that it may be > the > > > right place to start - but it's procedures are BGP-focused and while > there > > > are many similarities, there may be interesting differences as well. > > > > > > > > > > > > [Bruno/Xiaohu] We’ll clarify that the 3 sub-TLV (§5.1-§5.3) are > > > normatively defined in RFC 5512, from a format, semantic and usage > > > standpoint. And that there code point are allocated in respectively > the > > > following IANA registries: BGP Tunnel Encapsulation Attribute Tunnel > Types, > > > BGP Tunnel Encapsulation Attribute Sub-TLVs. As per you comment, we > need to > > > clarify the 5.4 color Sub-TLV. Proposed text: > > > > > > The Color Sub-TLV value is a 4-octet unsigned integer. Its semantic > and > > > usage are the same as the Color Value, from the Color Sub-TLV defined > in > > > RFC 5512 section 4.3 (*) > > > > > > > > > > > > For instance, for the Color sub-TLV, is the 4 byte color value > expected to > > > represent the same meaning in OSPF as in BGP? > > > > > > > > > > > > [Bruno/Xiaohu]Yes. > > > > > > > > > > > > Can a BGP route with a particular color extended community then > have the > > > OSPF tunnel to use selected from only those tunnels with the same > color? > > > > > > > > > > > > What does the Color TLV mean in a purely OSPF context? > > > > > > > > > > > > [Bruno/Xiaohu] idem as in the IDR context. It’s a color used to > define > > > policy. The application using those tunnels, may use this color as an > input > > > for its policy when choosing the tunnel to use (or not use). > > > > > > We can add this text if needed. > > > > > > > > Yes, I think that is needed. In BGP, since a route can have > communities, > > it is easy to just have a "must match color" rule (though one could > picture > > a community that means match-any-tunnel-but-this-color). For OSPF, if > the > > intention of the use for this information is an external application, > that > > needs to be clearly stated. > > > > There needs to be enough text so that two implementations can actually > use > > the functionality - not merely signal it - and that is generally what is > > missing in the document. > > > > Sec 7 of draft-ietf-idr-tunnel-encaps-06 ("However, suppose that > one of > > > the TLVs in U2's Tunnel Encapsulation attribute contains the Color > > > Sub-TLV. In that case, packet P SHOULD > > > > > > NOT be sent through the tunnel identified in that TLV, unless U1 is > > > carrying the Color Extended Community that is identified in U2's > > > Color Sub-TLV.") doesn't seem to strictly apply. > > > > > > > > > > > > [Bruno/Xiaohu] Would new clarification added above (*) be enough? If > not, > > > a priori, I’d rather improve the definition of section 5.4 defining > this > > > color sub-TLV, in order for it to generally apply to any text. > (rather than > > > trying to patch the specific above text from Sec 7) > > > > > > > I would be happy for you to fix it where makes the most sense to you. > My > > review suffers from the usual issue of commenting mostly on what is > there > > in the order and location it is presented. > > > > > > > Semantics and behavior need to be specified - not just the encodings, > and > > > that is all this draft currently has. > > > > > > > > > > > > > > > > > > 2) Sec 5.1 and Sec 5.2 refer to the format of the Encapsulation > Sub-TLV > > > and Protocol Sub-TLV coming from draft-ietf-idr-tunnel-encaps-06 - > but > > > that draft defines not merely the format, but allocates an IANA > registry > > > for additional sub-types that can appear and defines the format and > > > contents of the sub-TLV based upon the tunnel type. I'm nearly > certain > > > > that you mean that these sub-tlvs use not merely the same format > (*does > > > variable length fields based upon the allocated type cause issues for > OSPF > > > sub-TLV parsing???*) but can contain any values and sub-TLVs defined > in > > > the relevant IANA registry. As it is written now, there is no > reference to > > > the registry or ability to easily support more tunnel types in the > future > > ____________________________________________________________ > _____________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez > recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages > electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou > falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and > delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been > modified, changed or falsified. > Thank you. > > > > _________________________________________________________________________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or privileged information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. > Thank you. > >
- [OSPF] AD review of draft-ietf-ospf-encapsulation… Alia Atlas
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Acee Lindem (acee)
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Xuxiaohu
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Acee Lindem (acee)
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Alia Atlas
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… bruno.decraene
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Acee Lindem (acee)
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Alia Atlas
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… bruno.decraene
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Alia Atlas
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Acee Lindem (acee)
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Alia Atlas
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… bruno.decraene
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… bruno.decraene
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Acee Lindem (acee)
- Re: [OSPF] AD review of draft-ietf-ospf-encapsula… Carlos Pignataro (cpignata)