Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Wed, 05 July 2023 05:34 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 685F7C14CF13; Tue, 4 Jul 2023 22:34:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2DJBgzJKXJcb; Tue, 4 Jul 2023 22:34:19 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.126.238]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C3F9C151070; Tue, 4 Jul 2023 22:34:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1688535259; x=1720071259; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:from; bh=8EYSTILl6g/H6SaVFpOv569k+gvMW01EwXN8z0G4TBI=; b=ZnT7ooZp+gbWJEpMW+aO+cJLw4B/4AmnP1Vx5N0P1lxAOKFTmObjSnM3 mDNZzu73DFgTyt0MMJl9YeagGmrUENSThlpMx+dwNTYLrlPFIh0OFpcOu Uzu0Xcz/+KOUEfyJ7JqorTUBMkbItegcyKxZ0jJ0Cb+jxiwOdho93wY/l /9d+NfrmL6B4MbohVnimL+3iiVb8ikzf/M0C1gr/BRcEX0/uysomIXaTY UYFsOX5gktf6Jc7pqt7w7JYkhQGS6wVPrgIWSUWLIuWqeua2Ct4UYIlLm SqSH0b22BC/JhCHN4lz5R42dEuHxInobONuIQ/pcDTZtWhaKs/krApdrw g==;
Received: from unknown (HELO opfedv1rlp0b.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 07:34:16 +0200
Received: from unknown (HELO opzinddimail5.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0b.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 07:34:16 +0200
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id EEFA71065176; Wed, 5 Jul 2023 07:34:15 +0200 (CEST)
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id DF21810612BB; Wed, 5 Jul 2023 07:34:15 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail5.si.fr.intraorange (Postfix) with ESMTPS; Wed, 5 Jul 2023 07:34:15 +0200 (CEST)
Received: from mail-db8eur05lp2108.outbound.protection.outlook.com (HELO EUR05-DB8-obe.outbound.protection.outlook.com) ([104.47.17.108]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 07:34:15 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by AS8PR02MB9162.eurprd02.prod.outlook.com (2603:10a6:20b:5b4::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.17; Wed, 5 Jul 2023 05:34:12 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::58f3:64de:5ef8:aba]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::58f3:64de:5ef8:aba%5]) with mapi id 15.20.6565.016; Wed, 5 Jul 2023 05:34:12 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.218.35.127-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR05-DB8-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.17.108 as permitted sender) identity=mailfrom; client-ip=104.47.17.108; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:80.12.66.32/28 ip4:80.12.210.96/28 ip4:80.12.70.34/31 ip4:80.12.70.36 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR05-DB8-obe.outbound.protection.outlook.com designates 104.47.17.108 as permitted sender) identity=helo; client-ip=104.47.17.108; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR05-DB8-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/50 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:rUhlIKoAq9kIKkG/Q29ksmoW7/JeBmK1YhIvgKrLsJaIsI4StFCzt garIBnXO/yJZWv9fotwYIi/oR8EvpCGm4MwGgRkrS4xHn4X9pacVYWSI3mrMnLJJKUvbq7GA +byyDXkBJppJpMJjk71atANlVEliefSAOOU5NfsYkhZXRVjRDoqlSVtkus4hp8AqdWiCmthg /uqyyHkEAHjg2cc3l48sfrZ80sw5Kmq4Vv0g3RlDRx1lA6H/5UqJMJHTU2BByOQapVZGOe8W 9HCwNmRlo8O105wYj8Nuu+TnnwiGtY+DyDX4pZlc/HKbix5m8AH+v1T2Mzwyatgo27hc9hZk L2hvHErIOsjFvWkdO81C3G0H8ziVEFL0OevHJSxjSCc52P4dWa17tlLMH4vO6s+oLwsAVFS3 tVNfVjhbjjb7w636J+GcLExw+gJfIzsNo5ZvWx8xzbEC/pgWYrEX6jB+d5f2nE3m9xKGvHdI cEebFKDbjyZO0EJZghRUc14xb/47pX8W2UwRFa9oK036m3ewEp716XmOdbce8aiQt9cmEmV4 GnB+gwVBzlAa4XPlGLfmp6qrvHipXjUVJ1VKO2H0fBtnEGr10YUCiRDADNXptHi0xXlA4sFQ 6AOwQIht6U99UmqVML+TjW3pXeFulgXXN84O+Ak+QeGyaf86AeCDW9CRTlEAPQnudQ5bT0ny lHPmMnmbRRjqrSbVTec+6ua6Ci8Mm0QMGseZGoARBoI+ZzkqYQbjx/TQJBkCqHdpsb7EnT7w zmLtjMWhrgPg4gMzarT1UvJiBqtq4THCAkv6W3/UmWj5wd1IoOsfJCs4FvWxfhdMJuDQ0aMv T4PnM32xOxVAMqAzwSCRewMGPei4PPtGDbei1VHHoVn6j/2/jiuZuhtDCpWIU5oNoMIc2/kf VWL5AdJvsYLbD2tcLN9ZJ+3B4Iy16/8GN/5V/fSKN1Tfpx2cwzB9yZrDaKN44zzuGYSl7xmF Lu+Tfm1C1A8U/48zAqqbM5IhNfH2RsC7W/UQJn6yTGu3ryfeGOZRN85DbeeUgwqxP7f+16Ko 76zI+PPlU8CAbWWjjz/q9Z7ELwcEZQsLbHbwyC9XsKeKA5nHgnN4Nf9melJl2BNu6lUkPzU8 2vVZ6O14F/2hHmCJQ/aZ215MO7rRcwm9SJ9OjEwN1G13XRleZyo8KoUa5owe/8g6fBnyvl3C fICfq1s48ijqByXpVzxjrGk8+SOkShHYyrQY0JJhxBhJPZdq/ThoIOMQ+cW3HBm4tCLncU/u aa88QjQXIAOQQ9vZO6PNqL/kwLs4SNHwbkvN6ctHjW1UBS1mGSNA32p5sLb3+lWdn0vOxPGi F7IWUtE+oEhXadsrIGW3/3sQ3iV/xtWRRMBRDGCt95axAHf/2G5xpRHXvrAdCLATm6cxUlRT bQ98h0IC9VexAwim9MkTd5DlPtij/Ox/eMy5lo/Rh3jMQ/0Yo6M11HdgKGjQIUWmuQG0eZ3M 2rTkuRn1UKhYpK9TgFBdFZ+P4xuF5g8w1Hv0Bj8G22ijAcfwVZNeRw608Wk4MCcEFd0DG/h6 cocgpZLriCV2l8tONvAiT1I/WORKHBGS78gqpwRHI7sjEws101GZpvfTCTx5fljrv1SZ1IyL Gb8aLXq3txhKojqKxLf1kQhGcJan50Itx0Mx1gHT7hMssSQnec5hXW97hxrJjloIs177t9O
IronPort-HdrOrdr: A9a23:JEoc7aAQSifs5dflHemF55DYdb4zR+YMi2TDgXoBMSC9Ffbo8/ xG/c5rsCMd6l4qMk3I/OrsBEDuex/hHPJOjrX5Xo3SPjUO2lHJEGg41/qa/9SIIUSXndK1s5 0PT0EUMqySMbEVt6fHCKbTKada/DEqmprY4ts3bh1WPGdXV50=
X-Talos-CUID: 9a23:K3QOPG9o5f+dHxsQPjSVv2AqHN18X1H48EjJJWmeUzwySI2JYnbFrQ==
X-Talos-MUID: 9a23:QlXMew59TeJnwg2VuZaDLO+Cxox2zpz1J0wS1qlWhO6KMjBsAya3izaOF9o=
X-IronPort-AV: E=Sophos;i="6.01,182,1684792800"; d="scan'208,217";a="2718502"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NRayo6s2rTS1bnT0s7ze6l4DA5WMJ3BG+uaYFx+p/m3Rn8Hcr3Zrt6ldqy6eQJeDhSctMii+vngIQFwKLtnctFvg9oFwn7jNozgZuEGampxNuwFZEDV6ageHO1WuqhrkcK19emJDWApKbyGrpxUlAmtOBTQWSPwcJMqE1TINWPYS3hfBlsRz5nrDpIlP3Z2kpjejvzhTMiY6w2CazYGarq4fu7fYzGvkL5VngkNhf9Ep3XvuieYxmWj0O8qdgzLMKGE6UVJIzHFiGRAh6IIjGCzu+GrH6Bbh2tZiOk4hBk67kR5EwRBbjTryxnu5KsSFqX02hs81F6deL8vxG9nIGg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fY1D1XgIzQBcpY3NgrN1UBqv7JgdB/1kyMx0fRwuiXc=; b=FBRQqA1sK0oGhZ1q8hGFtLwFuruzRsy8BCHTQhrlsTXbGbjViqyTu1uoPdAaoxBShqcIUyBpywIWVh65oBlnFMVT9uQttS0OBCdvCsEXN1ZH3mdojXnju0nZ2apZLDjtiYzxdkJrnDOjR//eFaFQ/zr2hhXeOHP+VDUxTA6lcD9vIJ+ew/yXj3Ycr7RRQd8Gi1tEu0kZeb13/qaE8elSrKOYb0CQDPRgX2VjnBEqgQGGd7mfMMre064KUevhCHOsgf7SWpwVEuRVhvwV7URfsY734n0GarCveV7mrCsX34/z1zc1m0PQjT8kQLe9oqkZy57sv+0eiBUSUU27ziK35Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Greg Mirsky <gregimirsky@gmail.com>, Éric Vyncke <evyncke@cisco.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-sfc-multi-layer-oam@ietf.org" <draft-ietf-sfc-multi-layer-oam@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "donald.eastlake@futurewei.com" <donald.eastlake@futurewei.com>, "d3e3e3@gmail.com" <d3e3e3@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>
Thread-Topic: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)
Thread-Index: AQHZrt96W1FpfYMYy0uMyL6L2xsIaq+qiYcAgAAX7zA=
Content-Class:
Date: Wed, 05 Jul 2023 05:34:12 +0000
Message-ID: <DU2PR02MB101603730CBE1BE4832E3BE47882FA@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <168836524659.58404.6585102954286960584@ietfa.amsl.com> <CA+RyBmX7xNbzh7jaR0z-ztxic=duyB7Nekmm+VRbPoxKF44MDA@mail.gmail.com> <CA+RyBmUsDPoDj+OO8MYFa7ZkX9wpX7Z2YstAWb6rMp4hGsW7+g@mail.gmail.com>
In-Reply-To: <CA+RyBmUsDPoDj+OO8MYFa7ZkX9wpX7Z2YstAWb6rMp4hGsW7+g@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-07-05T05:14:48Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=01af7396-02ff-44b0-8a48-44d5873b6446; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|AS8PR02MB9162:EE_
x-ms-office365-filtering-correlation-id: c5373b6e-9d89-41e9-f72d-08db7d1976db
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(39860400002)(396003)(366004)(376002)(346002)(451199021)(41300700001)(8936002)(52536014)(110136005)(54906003)(224303003)(71200400001)(55016003)(316002)(5660300002)(2906002)(30864003)(7696005)(66556008)(64756008)(66446008)(66476007)(76116006)(4326008)(66574015)(478600001)(33656002)(966005)(38100700002)(38070700005)(186003)(86362001)(122000001)(66946007)(83380400001)(6506007)(166002)(26005)(53546011)(9686003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DU2PR02MB101603730CBE1BE4832E3BE47882FADU2PR02MB10160eu_"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c5373b6e-9d89-41e9-f72d-08db7d1976db
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2023 05:34:12.4253 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kowISs7GxWbPwBMEXoXFMM30NmScfEWAOumFkWXwQepiuirIOuCSUufY+fSZhCHgq54DNkK+1pBwrHoDDOlXOaetoKdrIAMK+EzsuJM7TVA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR02MB9162
X-TM-AS-ERS: 10.218.35.127-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27732.005
X-TMASE-Result: 10--49.212200-10.000000
X-TMASE-MatchedRID: 4lgKwWfF5n/uYusHgJkgynZljA0Gozoi0Z6fEMfqaev7Tdr4xDxETZEb Muqt4oaTXiyZQaZ3dvgcyLuN3X9JjIh/ebSxR/HnlwT0XposETW3Stk62MqiCPVHCCTgFgd/AaF gsQj+eMi5Zwu3tRBMgDcFasZFt/8/RcGHEV0WBxDLa0eANE7Nz+chHA04zz3zDkTGz/7bW0/Dns oAxbg1CIcr1Pluqvvr4bVbyN6yIMl85pjA/x1xfjoSfZud5+Gg1W2RXV2qbCnKIK75f7atWvHXp ClzLFidDufH6y1NjyWKx7xD7ImGeq5i3jK3KDOopR+m8tBi6ZK+y4Y487IcATb82EsUng9Vm6FD zvN+ckOqoYavcamf/KnL54M5CzEQzfqlpbtmcWj4qCLIu0mtIEukIs3g1HjeBDRH0loVrhor42o pkxdBfsr5AVdin4a1dJnR3Ohds36QJOFc+qyqKzTo+tTRi5wEtwi3bXRtaAi8a/0tAnldPE4VNX w2zDXVNZSC40Wc5VHvkJu04PYxt4b9ftid8kBc6Xvza9iv+QfoN8DSoota+ebd9j4+b6jITbnOp wQtkpIiqX6fAsb6UO5hZpeLIe443nHtGkYl/VrWN3XQ/7wsTzVjvc93O9dkXtaZyUU5NQA2t0O8 u1sAcZ/Giz5qRnf3WUOK5XsuMf7G+nS24MzHeWUfjhTZG7Xaz9i2rbaYP/lEotrrfbJfNIPKDFj gHKqOrrrg/ASgT6RVvaN1tUZ9M0TfhTClWQYReLLCA0PD7ag3FVLdHGCubgl9IWBxx+kB1LMIOZ Ba26PvI9v0KXM+PN7Rfb2Mc0ONDlgxb8s+r0B9LQinZ4QefLx5HT4ZzaY/IT3mlTBx7EzjCeE5v 4lH5OoKEDqVJEm+0u+wqOGzSV1v3qL6X6HuCl+j/RoZfoEMwt5o33NI92bwMUUgHNDhDSLiYnjV b876ftwZ3X11IV0=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/0dx0x1RSJ1RTgMUvdK-kXEEQZr4>
Subject: Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2023 05:34:24 -0000

Hi Greg,

I don’t think the following change you made is OK given that new errors can be (in theory) defined in the future:

CURRENT:
   The receiver of said Echo Request MUST set it to
   one of the values listed in Table 1 in the corresponding Echo Reply
   that it generates.

You may revert to your OLD wording or proceed as follows:

  *   Delete Table 1
  *   Update the text to point to the IANA registry in Section 10.3.4. This is better as you don’t need to have the same information twice in the doc.

# some nits

OLD:
   *  Reply via an IPv4/IPv6 UDP Packet (2).  If an SFC Echo Request is
      not encapsulated in IP/UDP, then this value requests the use of
      the Source ID TLV Section 6.3.1.
NEW:
   *  Reply via an IPv4/IPv6 UDP Packet (2).  If an SFC Echo Request is
      not encapsulated in IP/UDP, then this value requests the use of
      the Source ID TLV (Section 6.3.1).

OLD: Source ID - the value MUST be 1 Section 10.4.
NEW: Source ID - the value MUST be set to 1 (Section 10.4).

OLD: in Source ID TLV Section 6.3.1, against an access list before
NEW: in Source ID TLV (Section 6.3.1), against an access list before

Cheers,
Med

De : sfc <sfc-bounces@ietf.org> De la part de Greg Mirsky
Envoyé : mercredi 5 juillet 2023 05:49
À : Éric Vyncke <evyncke@cisco.com>
Cc : The IESG <iesg@ietf.org>; draft-ietf-sfc-multi-layer-oam@ietf.org; sfc-chairs@ietf.org; sfc@ietf.org; donald.eastlake@futurewei.com; d3e3e3@gmail.com; cjbc@it.uc3m.es
Objet : Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

Hi Eric,
upon further consideration, the authors decided:

  *   to remove the Version field from the SFC Echo Request/Reply message
  *   to extend the Version field in the SFC Active OAM reader to a four-bit length.
Attached, please find the updated versions of the working document and its diff with the previous version (-26).

Regards,
Greg

On Tue, Jul 4, 2023 at 6:21 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
Hi Eric,
thank you for your thorough review and thoughtful comments. Please find my responses below tagged GIM>>.

Regards,
Greg

On Sun, Jul 2, 2023 at 11:20 PM Éric Vyncke via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote:
Éric Vyncke has entered the following ballot position for
draft-ietf-sfc-multi-layer-oam-26: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


# Éric Vyncke, INT AD, comments for draft-ietf-sfc-multi-layer-oam-26

Thank you for the work put into this document.

Please find below one blocking DISCUSS points (very easy to address), some
non-blocking COMMENT points (but replies would be appreciated even if only for
my own education).

Other thanks to Carlos Bernardos, the Internet directorate reviewer (at my
request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-sfc-multi-layer-oam-26-intdir-telechat-bernardos-2023-06-28/
(and I have read Greg's reply, still waiting for a revised I-D though)
GIM>> I'll be glad to upload the next version. Perhaps that can be done right after your concerns get addressed.

Special thanks to Don Eastlake for the shepherd's detailed write-up including
the WG consensus and the justification of the intended status and the author
counts.

I hope that this review helps to improve the document,

Regards,

-éric

# DISCUSS

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion on the following topics:

## Section 6

As there two V header fields defined (one for Echo message and one for all OAM
messages), it is unclear whether the Echo V-field is set back to 0 when SFC OAM
header Version is incremented? Or in other words, should Echo with V=0 but with
OAM V != 0 be interpreted as specified in this document ?
GIM>> A very interesting scenario. The intention is to have independent versioning of the SFC OAM Header and SFC Echo Request/Reply (as well as any other active OAM protocol applied to SFC). Based on that, in the scenario you describe, SFC Echo with V == 0 just be interpreted as defined in this document. Would you suggest that this scenario be added to the description of the Version field of SFC Echo Request/Reply as an example of the relationship?
NEW TEXT:
      Versioning of SFC Echo Request/
      Reply is independent of the versioning of the SFC Active OAM
      header (Section 5).  For example, if a new SFC Active OAM header
      format with V = 1 is defined, an SFC Echo Request/Reply packet
      with V = 0 MUST be handled as described in this document.

Are the TLV type depending on the Version being 0 ?
GIM>> It seems unnecessary. Do you think that that should be explicitly noted in the document?


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


# COMMENTS

## Multi-layer ?

I wonder what is "multi-layer" (per the I-D title) aspect in the specification.
Suggest to either explain the "multi-layer" aspect or drop it from the draft
title.
GIM>> At the very early stage, the title of the draft did include "multi-layer". Later, it was changed to "Active OAM for Service Function Chaining (SFC)". Would you suggest that we change from draft-ietf-sfc-multi-layer-oam to, for example, draft-ietf-sfc-active-oam, at this stage?

## Section 3

Suggest to write that SFFI stands for SFF Instance in Figure 1.
GIM>> A good point, thank you. Added to the Acronyms:
SFI:        Service Function Instance
Updated the second para in Section 3 as follows:
OLD TEXT:
   The architecture example depicted in Figure 1 considers a service
   function chain that includes three distinct service functions.  In
   this example, the SFP traverses SFF1, SFF2, and SFF3.  Each SFF is
   connected to two instances of the same service function.
NEW TEXT:
    The architecture example depicted in Figure 1 considers a service
   function chain that includes three distinct service functions.  In
   this example, the SFP traverses SFF1, SFF2, and SFF3.  Each SFF is
   connected to two service function instances (SFIs) of the same
   service function.

Isn't `FM SFC OAM` a pleonasm ? I.e., either "FM" or "OAM" are redundant.
GIM>> OAM is a more general term that includes Fault Management and Performance Monitoring protocols.

`(e.g., NSH)` why `e.g.` when section 1 states the focus of this I-D to NSH ?
GIM>>  Our intention was to define an active OAM that is applicable to different SFC mechanisms and use SFC NSH as an example to illustrate the realization of SFC Echo Request/Reply.

About REQ#1, should this be a "MUST" rather than a "SHOULD" ?
GIM>> We need to consider that active SFC OAM excludes SFIs along the SFP1. On the other hand, the application of the SFI to a user packet can be re-classified and switched to another SFP2. To examine that SFP2, a different active SFC OAM packet can be transmitted from that Re-classifier. that is different from, for example, tracing in an ECMP environment and is why we feel that "SHOULD" is appropriate rather than MUST.

In REQ#8, `the initiator of such a request` should probably be more specific.
GIM>> Would the following update make the requirement more clear:
OLD TEXT:
      REQ#8: SFC OAM MUST be able to trigger on-demand FM with responses
      being directed towards the initiator of such a request.
NEW TEXT:
       REQ#8: SFC OAM MUST be able to trigger on-demand FM remotely with
      responses being directed toward the initiator of the remote
      request.


## Section 4

Isn't RFC 8300 a better reference for the O bit rather than an IETF draft ?
GIM>> Med helped me answer this question.

## Section 5

Please add a justification / actual data about `But extra IP/UDP headers,
especially in an IPv6 network, add noticeable overhead.`
GIM>> I propose the following update of that sentence:
OLD TEXT:
   But extra IP/
   UDP headers, especially in an IPv6 network, add noticeable overhead.
NEW TEXT:
   But an extra
   IP/UDP header, especially in an IPv6 network, adds overhead compared
   to the length of an active OAM control packet (e.g., BFD Control
   packet [RFC5880]).  In some environments, for example, when measuring
   performance metrics, it is beneficial to transmit OAM packets in a
   broad range of lengths to emulate application traffic closer.

Is the updated text acceptable?

I am really concerned by having only 2 bits to indicate the version while there
are 8 bits reserved on the side. This does not look too good for revisions.
GIM>> A very valid and practical point, thank you. Would you agree to increase the Version field to a four-bit length?

When can an implementation deviate from the SHOULD in Sender's Handle: `The
sender of the Echo Request SHOULD use a pseudo-random number generator ` ?
While I understand that this is an opaque value, and using a random number
prevents fingerprinting, I would assume that some implementations would like to
add some private semantics to this number.
GIM>> Yes, an implementation may use the Sender's Handle for some proprietary signaling as long as the system that receives SFC Echo Request doesn't alter the value of the Sender's Handle field but copies it into SFC Echo Reply. Do you feel that a note with that example needs to be added?

## Section 6

Suggest adding some text about the absence of TLVs based on the length of the
SFC OAM header.
GIM>> Would the following update match your expectation:
OLD TEXT:
    TLV is a variable-length construct whose length is multiple of four-
   octet words.  Multiple TLVs MAY be placed in an SFC Echo Request/
   Reply packet.  None, one or more sub-TLVs may be enclosed in the
   value part of a TLV, subject to the semantics of the (outer) TLV.
NEW TEXT:
   TLV is a variable-length construct whose length is multiple of four-
   octet words.  Multiple TLVs MAY be placed in an SFC Echo Request/
   Reply packet.  None, one or more sub-TLVs may be enclosed in the
   value part of a TLV, subject to the semantics of the (outer) TLV.  If
   no TLVs are included in an SFC Echo Request/Reply, the value of the
   Length field in the SFC Active OAM header MUST be 16 octets.

## Section 6.1

To avoid confusion s/TTL Exceeded/NSH TTL Exceeded/ (even if explained later in
the text).
GIM>> A good point. True, the proposed SFC Echo Request/Reply mechanism can be used in SFC NSH, we believe that it can also be applied in, for example, SFC based on RFC 8595<https://www.rfc-editor.org/rfc/rfc8595.html>, would s/TTL Exceeded/SFC TTL Exceeded/ be acceptable?

In `The receiver of said Echo Request can set it to one of the values` should
the "can" be replaced by a "MUST" ?
GIM>> Indeed, thank you for pointing this out. Done.

## Section 6.3

`If the NSH is used,` but section 1 specifies that this I-D is only about NSH.
GIM>> Our intention was to define an Echo Request/Reply mechanism for any technology that can realize SFC. NSH is one such technology. RFC 8595 defines how MPLS can be used to realize SFC. What would you suggest?

`Reply via an IPv4/IPv6 UDP Packet` is unclear when reading it. Please add a
forward reference to section 6.3.1 (I would also prefer to have 6.3.1 earlier
in the flow
GIM>> Added the reference as you suggested:
   *  Reply via an IPv4/IPv6 UDP Packet (2).  If an SFC Echo Request is
      not encapsulated in IP/UDP, then this value requests the use of
      the Source ID TLV Section 6.3.1.


## Section 6.5.2

How `If the NSH of the received SFC Echo Request includes the MAC Context
Header, the packet's authentication MUST be verified before using any data. `is
different to the text of section 6.4 about the MAC ?
GIM>> Yes, it appears as unnecessary duplication. Would backreference to Section 4 as follows to address your concern:

   If the NSH of the received SFC Echo Request includes the MAC Context
   Header, the packet's authentication MUST be verified before using any
   data as defined in Section 6.4.

`Sequence Number in the Echo Request sent matches to the Sequence Number in the
Echo Reply received` should it rather be a window of sequence number ? I.e.,
pipelined requests could be sent.
GIM>> A very good point, thank you. Update as follows:
OLD TEXT:
      the Sequence Number in the Echo
      Request sent matches to the Sequence Number in the Echo Reply
      received.
NEW TEXT:
      the Sequence Number in the Echo Reply
      received matches the Sequence Number of one of outstanding
      transmitted Echo Requests.

## Section 6.6

`Consistency Verification Request` this message is not defined before this
section and not in RFC 8300. If specified in this section, may I suggest to
rename the section to be about CVReq ?
GIM>> Thank you for the suggestion. Renamed the section to "The Use of Consistency Verification Request Message"

## Section 7

`if the underlay is an IPv6 network` what about IPv4 ? I would assume that
IPv[46] underlays can support AH/ESP.
GIM>> IPv6 is used as an example. Of course, AH and ESP are equally applicable in IPv4. Would you suggest re-wording like:
   If the underlay is an IPv4 or IPv6 network, IP Authentication Header
   [RFC4302] or IP Encapsulating Security Payload Header [RFC4303] can
   be used to provide integrity protection.

Should this be a SHOULD in `an implementation MAY check that the source of the
Echo Request is indeed part of the SFP`?
GIM>> In the course of the earlier discussion, that text got changed to the following:
   To protect against unauthorized sources trying to obtain information
   about the overlay and/or underlay, an implementation MUST have means
   to check that the source of the Echo Request is part of the SFP.
I hope that this change addresses your concern.
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.