RE: Robert Wilton's Discuss on draft-ietf-bfd-unsolicited-11: (with DISCUSS and COMMENT)

"Rob Wilton (rwilton)" <rwilton@cisco.com> Tue, 18 April 2023 15:55 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80447C151540; Tue, 18 Apr 2023 08:55:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.593
X-Spam-Level:
X-Spam-Status: No, score=-9.593 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="e/KlKGFI"; dkim=pass (1024-bit key) header.d=cisco.com header.b="TpQU2InY"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dEnxtaT1ycyN; Tue, 18 Apr 2023 08:54:57 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59A21C151B09; Tue, 18 Apr 2023 08:54:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=75852; q=dns/txt; s=iport; t=1681833297; x=1683042897; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=UK6u3qJ2bpmnerkJ57pVqBNTHFNWPsBvaDSR2fUx8p0=; b=e/KlKGFI7o/YHSW89A7SELqsO4BjRLqL0UySt8KdJiNH/brEpMNC3QHp n0DMPLv06IsBY2obdjOlSVRBLlLmkK8/mycaNYZJxYEP41i9KoKB0cXD5 3kXtwsQifDSrO9IjR+R0mozC9r0zcRfz2kAGf6k2YnW0kDyM++hi92J7A k=;
X-IPAS-Result: A0BAAADzuz5kmJ1dJa1aHQEBAQEJARIBBQUBZYEWCAELAYEqMVJzAlk7RjGEIYNMA4ROX4gzA4J/iEySERSBEQNWDwEBAQ0BATsJBAEBhQYCFjQBBAEIhGMCJTQJDgECAgIBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFaA0IAQ4QgX2DXwEBAQEDEhEKEwEBNwEPAgEIEQQBASEBBgMCAgIwEwEJCAIEAQ0FCBMHglwBghUTAzEDAQ+fLwGBPwKKIHqBMoEBgggBAQYEBYFNQZ0TAwaBQQGJHwEBg2mBOIFwgQgnG4FJRIEVQ4JoPoIgQgEBA4EgCAESAQkaDAkWCQKDIzmCLo8Ci2eBNHaBIA6BPIEEAgkCEWuBEAhqgXlAAg1kCw5xgUmDKgQCFEQOGA0HNgNEHUADCzs6PTUUHwUEU4EZJAUDCxUqRwQIOAYbNBECCA8SDwYmRAxCNzMTBlwBKQsOEQNOgUcEL0SBFAoCBAEmJJxLgl0NKykJBCIZCAgIIFsERAgPDhoBAQEBLAEHAxEpjmoJgy8QCoNaikqOKZNNbwqDfotyjxIChh0Xg32MZgOXemKXdyCCLosFg26RJIURAgQCBAUCDgEBBoFjOi0+cHAVgm4BAQExUhkPjiAMDQkVgzuFFIpkAXU9AgcBCgEBAwmJBwuCMwEB
IronPort-PHdr: A9a23:Ql/kHhLHUHme/Ew3rtmcuaoyDhhOgF28FhQe5pxijKpBbeH5uZ/jJ 0fYo/5qiQyBUYba7qdcgvHN++D7WGMG6Iqcqn1KbpFWVhEEhMlX1wwtCcKIEwv6edbhbjcxG 4JJU1o2t2qjPx1tEd3lL0bXvmX06DcTHhvlMg8gPPv0HpLViey81vu5/NvYZAAbzDa4aKl5e Q2/th6Z9tFDmJZrMK831hrPrzNEev8Dw2RuKBPbk0P359y7+9ho9CE4hg==
IronPort-Data: A9a23:uc1ULaMduVuYnt/vrR2Ql8FynXyQoLVcMsEvi/4bfWQNrUoj32BSz GFMWmGBPv6NNzCjKdEibYuxpxkE7JaHmt5kHXM5pCpnJ55oRWUpJjg4wmPYZX76whjrFRo/h ykmQoCcaphyFBcwnz/1WlTbhSEUOZqgG/ytWYYoBggrHVU/EHt42Uo58wIEqtcAbeaRUlvlV eza+6UzCHf9s9KjGjtJg04rgEoHUMXa4Fv0jHRnDRx4lAO2e00uMX4qDfrZw00U7WVjNrXSq +7rlNlV945ClvsnIovNfr3TKiXmTlNOVOSDoiI+ZkSsvvRNjiwT+/c/Cv8WU3hwohCbvPN97 f8SkZPlHG/FPoWU8AgcewNTHyc7Nqpc9fqZZ3O+qseUiUbBdhMAwd03UxpwZtJeq70xWDwRn RAbAGhlghSrnf23xK68TMFnh98oK4/gO4Z3VnRIkW2HUKd2Hcurr6PiuMIJ8DUOq5tyJfPVP MUHbSJQbjnAbEgaUrsQIMtuwLj37pXlSBVCtF3Qr6Q7y2ne0AI316LiWPLfdNDPTsVcn1yDj mPL42q/BQsVXPST0zOL7jeti/PB2Cn1VMcPEqa/8v9hgUGeykQSBQEYE1yhrpGRi0OlVPpeJ lAavC00osAPGFeDVNLxWVizp2SJ+0BaUNtLGOp84waIokbJ3+qHLmglZ29FVtksjvARbBk49 XyFuvm2ITM65dV5Vkmh3ruTqDqzPw0cImkDeTIIQGM5Dz/L/dtbYvXnE48LLUKlsjHmMWqvn G3S/UDSk51W3JFbjfzqlbzSq2v0/sChc+Ij2unAsouYAu5RfoWpYcmj7kLWqKgGJ4eCRV7Ht 38B8yR/0AzsJc/U/MBuaLxddF1M2xpjGGaB6bKIN8J7nwlBA1b5IehtDMhWfS+FyPosdz7ze 1P0sghM/pJVN3bCRfYpM9vuVppwlvC7SYSNuhXogjxmP8cZmOivoX4GWKJs9zuFfLUEyPtmY s7LLa5A815LVf0PIMWKqxc1iO93mX9WKZL7TpHgxBPvyquFeHOQUt843KimMIgEAFe/iFyNq b53bpLSoz0GCbGWSneMq+Y7cwtVRUXX8Lir8aS7gMbZfFo/cIzgYteMqY4cl3tNxPkIzL+Up SHiASe1CjPX3BX6FOlDUVg6AJvHVpdkpnV9NispVWtEEVB6CWpzxM/zr6cKQIQ=
IronPort-HdrOrdr: A9a23:sROKy6Adu+A/qujlHegYsceALOsnbusQ8zAXPh9KKSC9I/b4qy nxppomPEfP+UgssREb9expOMG7MBXhHO1OkPgs1NaZLUXbUQ6TXeJfBOTZskfd8kHFh4pgPO JbAtdD4b7LfBdHZKTBkXSF+r8bqbHtms3Y55a6854ud3AXV0gK1XYBNu/vKDwMeOAwP+tAKH Pz3Lshm9OnQxsqR/X+IkNAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uEg9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+cyjpAJb4RGIFqjgpF5d1H22xa1O UkZC1QePib3kmhPF1dZyGdnTUIngxeskMKgmXo8UcL6faJNw7STfAxy76wtnDimhEdVBYW6t MS40uJ85VQFh/OhyL7+pzBUAxrjFO9pT44nfcUlGE3a/pUVFZ9l/1XwKpuKuZJIAvqrIQ8VO V+BsDV4/hbNVuccnDCp2FqhNihRG46EBuKSlUL/pX96UkaoFlpi08DgMAPlHYJ85wwD5FC+u TfK6xt0LVDVNUfY65xDPoIBcG3FmvOSxTRN3/6GyWsKIgXf3bW75Ln6rQ84++nPJQO0ZspgZ zEFEhVsGYjEnief/FmHKc7hSwlbF/NKQgFkPsulaSRkoeMMYbWDQ==
X-Talos-CUID: 9a23:Qvl9fmMk+GjVme5DWAhOpUoqH8ofTVr06WXzAEOdIzlNR+jA
X-Talos-MUID: 9a23:WTa9vg6dnA4O4kUZICbEsj4sxow1/vWCCn4gyqk+vsLfOjJ0IwifoTS4F9o=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Apr 2023 15:54:56 +0000
Received: from rcdn-opgw-2.cisco.com (rcdn-opgw-2.cisco.com [72.163.7.163]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 33IFsteM006799 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 18 Apr 2023 15:54:55 GMT
Received: from mail-dm3nam02lp2047.outbound.protection.outlook.com (HELO NAM02-DM3-obe.outbound.protection.outlook.com) ([104.47.56.47]) by rcdn-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2023 15:54:55 +0000
Received: from mail-dm3nam02lp2047.outbound.protection.outlook.com (HELO NAM02-DM3-obe.outbound.protection.outlook.com) ([104.47.56.47]) by rcdn-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2023 15:54:55 +0000
Authentication-Results: rcdn-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="5.99,207,1677542400"; d="scan'";a="282080"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GqDtKE16/VZaCPJ2SXEQFFhPbI19DAjm98WcViy4mVrmZiiuElzJ1HoJimOtw7FN7TN1G7QCMupZIchmIKQWwmTYRH59H17pnbeMzDJqxysI1Fe4lU5sRgrYcoIiWUjGqPTi9B2sJJpnIFqTtM85Dc1PiyFCpu7TMcmdgWJGysUH9DeR5z3bQIfhYrXNMxnEDDiBiyM9WKJTUQ5XPGRYAfd1b4Yq0Fos8trLtxce1lKID+cMaADcUAT6+vqdQ+3knObWIktWzYP5PXm8I427o+hPaIfJUZyygAiY8QMekM6mwsb8Etd+7rWw4P0udOvdI0/biFbfBq5t4JU6xkmz9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UK6u3qJ2bpmnerkJ57pVqBNTHFNWPsBvaDSR2fUx8p0=; b=GK6L0govfa5PzO8zLUqNidtS8fNE4U0aPcKuuuAeMDuJcIJ/bvrFUSENbsodmQez5F65T99XRA+iiV3fhMfKAjTlAQcH8iZQa4Syy5ZXDavc/wPaFeofP83TsQrv9SyUSGJbYDSL1LVtYcA7f8XynBeDx4ilcBeU92mgC/SNppQjyFnFv7Es8vyMCzHiofXsvq/3ak0Kmxo2Egf4TZheuI7AhFoRFIzGunecqRqPo/xDf8wmUJwHrlYTY8l4qwDDxqemBuc8iHAFKmqzk7CvHPhxvPnwavtigHbwuPgbQbh9MBEDiai71j94o/C5G/vpYrIpYhCsFv2LMEKcCrjUEg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UK6u3qJ2bpmnerkJ57pVqBNTHFNWPsBvaDSR2fUx8p0=; b=TpQU2InY0BLdm/JGWS60Jtiru/uF/3YGdqh+Rfph+dazgp18RtF7NIMREtYRJz3eIxowsdtq3S+eda8lcdjREYrmSgSIythSZPiVcZSVEDK80M1BUeccuuTuOs2p8tWdoyBZ1TlRzISEHwMD4QXWoC3xlRvary0MyXdjL/MvKYQ=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by SA2PR11MB4874.namprd11.prod.outlook.com (2603:10b6:806:f9::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6298.45; Tue, 18 Apr 2023 15:54:53 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::ef4:1432:b69e:19b2]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::ef4:1432:b69e:19b2%6]) with mapi id 15.20.6298.045; Tue, 18 Apr 2023 15:54:53 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Reshad Rahman <reshad@yahoo.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-bfd-unsolicited@ietf.org" <draft-ietf-bfd-unsolicited@ietf.org>, "bfd-chairs@ietf.org" <bfd-chairs@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Jeffrey Haas <jhaas@pfrc.org>
Subject: RE: Robert Wilton's Discuss on draft-ietf-bfd-unsolicited-11: (with DISCUSS and COMMENT)
Thread-Topic: Robert Wilton's Discuss on draft-ietf-bfd-unsolicited-11: (with DISCUSS and COMMENT)
Thread-Index: AQHZDkupO+tOPVlAVkiYFZtRKtWWpq8FDTiAgCzv1oA=
Date: Tue, 18 Apr 2023 15:54:53 +0000
Message-ID: <BY5PR11MB4196938E7A8CDA5F71E44C7CB59D9@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <167086459809.47152.7191645317039213428@ietfa.amsl.com> <1652627934.1602547.1679362309091@mail.yahoo.com>
In-Reply-To: <1652627934.1602547.1679362309091@mail.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|SA2PR11MB4874:EE_
x-ms-office365-filtering-correlation-id: 317757f6-74a0-4f1f-3744-08db40253fdf
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(376002)(396003)(136003)(39860400002)(366004)(346002)(451199021)(966005)(7696005)(478600001)(86362001)(110136005)(55016003)(71200400001)(83380400001)(33656002)(9686003)(6506007)(53546011)(186003)(166002)(38100700002)(38070700005)(122000001)(64756008)(76116006)(66556008)(66946007)(66476007)(316002)(66446008)(2906002)(4326008)(8936002)(5660300002)(8676002)(9326002)(52536014)(41300700001)(54906003)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4196938E7A8CDA5F71E44C7CB59D9BY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 317757f6-74a0-4f1f-3744-08db40253fdf
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2023 15:54:53.2197 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 27NfWRWFbW3qamQf+vsaIUw+DUaMJMklK+Unz7uJRTjVLhJC82DXk2sooqscLrv0pXHj0gvg/QjoozSMCREaeA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB4874
X-Outbound-SMTP-Client: 72.163.7.163, rcdn-opgw-2.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/sOKd0bPl1N5BQSwP20MLmqb34yk>
X-Mailman-Approved-At: Tue, 18 Apr 2023 08:58:49 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Apr 2023 15:55:02 -0000

Hi Reshad,

Apologies for the delay.

The changes that you have made are sufficient to clear my discuss.

As a non-discuss (and non-blocking) comment, I do still find this hierarchical configuration to be somewhat complex on two points:


  1.  The configuration is under optional feature statements both at the global level and the per-interface level, and I think that the model would allow neither feature to be specified, in which case the defaults would be ambiguous.  I’m sure that the WG has a good reason for why it is designed the way it is, but I can’t help wondering whether it would make the model cleaner/simpler to require support for the global level configuration, and only have per-interface level configuration under an optional feature.  I.e., if this was done, then logically, there are always well-defined default values without requiring evaluation of the must-statement.
  2.  I don’t think that the descriptions are necessarily clear about if, and how, single-interval on the interface is allowed to override desired-min-tx-interval and required-min-rx-interval configured globally, or vice-versa.  Please consider whether it would be helpful to update the descriptions of these fields under the interface configuration to clarify these semantics.

Regards,
Rob


From: Reshad Rahman <reshad@yahoo.com>
Sent: 21 March 2023 01:32
To: The IESG <iesg@ietf.org>; Rob Wilton (rwilton) <rwilton@cisco.com>
Cc: draft-ietf-bfd-unsolicited@ietf.org; bfd-chairs@ietf.org; rtg-bfd@ietf.org; Jeffrey Haas <jhaas@pfrc.org>
Subject: Re: Robert Wilton's Discuss on draft-ietf-bfd-unsolicited-11: (with DISCUSS and COMMENT)

Hi Rob,

I believe rev-12 addresses the 3 DISCUSS points below.

We still have to do further updates to the document.

Regards,
Reshad.

On Monday, December 12, 2022, 12:03:19 PM EST, Robert Wilton via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote:


Robert Wilton has entered the following ballot position for
draft-ietf-bfd-unsolicited-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bfd-unsolicited/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Hi,

Thanks for this document.

Please see my comments below for more details, but I'm balloting discuss on 3
points: (1) The document is somewhat unclear as to whether the configuration is
applied hierarchically (I presume that it is, if not then my second discuss
point is not valid and can be ignored). (2) As specified, I don't think that
the hierarchical configuration will work, because the interface level leaf
"defaults" will override an explicit value configured globally.  I.e.,
logically, the interface level leaf, if in scope, will always have a value. (3)
The document should provide an instance-data example in the appendix to
illustrate the use of this configuration.

Regards,
Rob


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Moderate level comments:

(1) p 3, sec 2.  Procedures for Unsolicited BFD

  When the passive side receives a BFD Control packet from the active
  side with 0 as "Your Discriminator" and does not find an existing BFD
  session, the passive side MAY create a matching BFD session toward
  the active side, if permitted by local configuration and policy.

I'm surprised that this is only a MAY and not a SHOULD or MUST.  I.e., if the
local configuration & policy allows passive BFD sessions why would they not be
created?

(2) p 4, sec 4.1.  Unsolicited BFD Hierarchy

  *  Globally, i.e. for all interfaces.  This requires support for the
      "unsolicited-params-global" feature.
  *  For specific interfaces.  This requires support for the
      "unsolicited-params-per-interface" feature.

>From this description, it is unclear to me whether the features enabling global
or per-interface configuration are meant to be an either/or (in which case, the
constraint could probably be expressed in the features), or whether a server is
allowed to support configuration both globally and override the global
configuration with interface specific configuration.  My subsequent discuss
comments assume the latter.  Either way, it would be helpful for this text in
this section (and probably the YANG module) to be a bit more explicit on this
regard.

(3) p 8, sec 4.2.  Unsolicited BFD Module

      augment "/rt:routing/rt:control-plane-protocols/"
            + "rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh/"
            + "bfd-ip-sh:interfaces" {
        if-feature bfd-unsol:unsolicited-params-per-interface;
        description
          "Augmentation for BFD unsolicited on IP single-hop interface";
        container unsolicited {
          description
            "BFD IP single-hop interface unsolicited top level
            container";
          leaf enabled {
            type boolean;
            default false;

I'm not sure that you want a default value specified in the YANG here since
this would have precedence over any explicitly configured global default value.

(4) p 8, sec 4.2.  Unsolicited BFD Module

            description
              "BFD unsolicited enabled on this interface.";
          }
          uses bfd-types:base-cfg-parms;

You have the same issue here as above, in that the default values directly
associated with the leaves in this grouping will always take precedence over
any configured global value.  I.e., the configuration, if properly implemented
cannot be hierarchical.  The pragmatic solution is to copy the used grouping
inline here and delete the default statements.  This has the advantage that the
descriptions can also make the hierarchical behavior of the configuration
explicit.

(5) p 9, sec 4.2.  Unsolicited BFD Module

    augment "/rt:routing/rt:control-plane-protocols/"
          + "rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh/"
          + "bfd-ip-sh:sessions/bfd-ip-sh:session" {
      description
        "Augmentation for BFD unsolicited on IP single-hop session";
        leaf role {
          type bfd-unsol:role;
          config false;
          description
            "Role of local system during BFD session initialization.";
        }
    }
  }
  <CODE ENDS>

Please add an instance data example to an appendix to illustrate the use of
this YANG model.  This helps readers and can further emphasize the hierarchical
nature of the configuration.

Minor level comments:

(6) p 3, sec 2.  Procedures for Unsolicited BFD

  Passive unsolicited BFD support MUST be disabled by default, and MUST
  require explicit configuration to be enabled.  On the passive side,
  the desired BFD parameters SHOULD be configurable.  The passive side
  MAY also choose to use the parameters that the active side uses in
  its BFD Control packets.  The "My Discriminator", however, MUST be
  chosen to allow multiple unsolicited BFD sessions.

Rather then configured values on the passive side, did the authors consider
setting minimum configuration limits?  E.g., rather than define desired
send/receive limits, instead, configure lower bounds on what the minimum tx
interval may be (to prevent DDOS attacks).

Nit level comments:

(7) p 3, sec 2.  Procedures for Unsolicited BFD

  The passive side MUST then start sending BFD Control packets and
  perform the necessary procedure for bringing up, maintaining and
  tearing down the BFD session.  If the BFD session fails to get
  established within certain specified time, or if an established BFD
  session goes down, the passive side SHOULD stop sending BFD Control
  packets and MAY delete the BFD session created until BFD Control
  packets are initiated by the active side again.

Nit, within certain specified => within a specified

(8) p 6, sec 4.2.  Unsolicited BFD Module

        Copyright (c) 2021 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

This copyright statement will need to be fixed.