Re: [sfc] I-D Action: draft-ietf-sfc-nsh-13.txt

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Fri, 07 July 2017 15:02 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71CA8127873 for <sfc@ietfa.amsl.com>; Fri, 7 Jul 2017 08:02:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Level:
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hqp9rneOsxru for <sfc@ietfa.amsl.com>; Fri, 7 Jul 2017 08:02:49 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EAE0131610 for <sfc@ietf.org>; Fri, 7 Jul 2017 08:02:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=93802; q=dns/txt; s=iport; t=1499439769; x=1500649369; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=zm5EEo9aONSEFXr70IiVYuGOZtBZc5AgbK0SHQiKUm8=; b=KT/lnYEzPyR/Tz19wsjoYC7Ld7ZJOM21c1+eNiyR56zBcLgFtp5tCKX5 N+HyujDbuJDJo/ieuIdO5COy2cmSkeqmPxqY7/pwpMy5o+Jn+mo/zXNYy 5QW7pzKMvf6HVx+/aQA6sGhKevQXrezl2l2rbbnq+qJC4u3PbViAM6G9D o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AyAQAlol9Z/4QNJK1cGQEBAQEBAQEBAQEBBwEBAQEBgy0tZIEUB4NphCWFdJFIIpYDghEhAQyCDgGDXwIagys/GAECAQEBAQEBAWsohRgBAQEBAwEBGAEIRAcLEAIBCA4DAQIBAiEBBgMCAgIlCxQDBggCBA4FCYlCZBCwAYImizIBAQEBAQEBAQEBAQEBAQEBAQEBAQEdgyiDTIFhKwuCboMmgRUSAQYtCR6CGD0wgjEFkE+OTgKHRoxCggxXhHSKSYwgiRkBHzh/C3UVHyoSAYcDdgGGbYEjgQ0BAQE
X-IronPort-AV: E=Sophos;i="5.40,323,1496102400"; d="scan'208,217";a="449581758"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 07 Jul 2017 15:02:36 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id v67F2Z1K006866 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 7 Jul 2017 15:02:35 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Fri, 7 Jul 2017 11:02:34 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1210.000; Fri, 7 Jul 2017 11:02:34 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
CC: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] I-D Action: draft-ietf-sfc-nsh-13.txt
Thread-Index: AQHS9zIQ8HkorgkJMkK6NCg9C66wsg==
Date: Fri, 07 Jul 2017 15:02:34 +0000
Message-ID: <9DD7C695-BCA5-4170-A641-14F5921702BD@cisco.com>
References: <149882241880.4694.1755169430753503252@ietfa.amsl.com> <0982ba88-4bc1-0993-f539-f4930e376948@joelhalpern.com> <787AE7BB302AE849A7480A190F8B93300A000DED@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B93300A000DED@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.150.49.207]
Content-Type: multipart/alternative; boundary="_000_9DD7C695BCA54170A64114F5921702BDciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/CplPpfriRRcCcjpJ7yRYFse0ioU>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-nsh-13.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jul 2017 15:02:58 -0000

Hi, Med, WG,

Just an early Ack on this email. I am currently working through the points and preparing an item-by-item reply.

Thanks,

— Carlos.

On Jul 5, 2017, at 5:30 AM, mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> wrote:

Hi Joel, all,

The document is almost stable. Below my review of the version:

Major:

(1) Indicate that the spec does not assume nor preclude the MD type can changed on path. For example, this can be added as follows:

NEW:
  NSH implementations MUST support MD type =  0x1 and MD Type 0x2 (where
  the length is of value 0x2).  NSH implementations SHOULD support MD
  Type 0x2 with length > 0x2.  There exists, however, a middle ground,
  wherein a device will support MD Type 0x1 (as per the MUST) metadata,
  yet be deployed in a network with MD Type 0x2 metadata packets.  In
  that case, the MD Type 0x1 node, MUST utilize the base header length
  field to determine the original payload offset if it requires access
  to the original packet/frame.

OLD:
  NSH implementations MUST support MD type 0x1 and MD Type 0x2 (where
  the length is of value 0x2).  NSH implementations SHOULD support MD
  Type 0x2 with length > 0x2.  There exists, however, a middle ground,
  wherein a device will support MD Type 0x1 (as per the MUST) metadata,
  yet be deployed in a network with MD Type 0x2 metadata packets.  In
  that case, the MD Type 0x1 node, MUST utilize the base header length
  field to determine the original payload offset if it requires access
  to the original packet/frame. This specification does not assume nor
                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  preclude that the same MD Type is maintained or changed along
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  a service path; it is deployment-specific.
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

(2) The IANA section is not aligned with the core text with regards to assigned MD type values:

OLD:

  This document defines two MD Type values:

  0x1 - which indicates that the format of the header includes a fixed
  length Context Header (see Figure 4 below).

  0x2 - which does not mandate any headers beyond the Base Header and
  Service Path Header, but may contain optional variable length Context
  Header(s).  The semantics of the variable length Context Header(s)
  are not defined in this document

The text should be updated to refer to these experimental values: 15 (Experiment 1) and 16 (Experiment 2).
Some words about the usage of those values would be appropriate, too.

(3) The IANA section is not aligned with the core text with regards to assigned Next Protocol values:

OLD:
  This document defines the following Next Protocol values:

  0x1: IPv4
  0x2: IPv6
  0x3: Ethernet
  0x4: NSH
  0x5: MPLS

NEW:
  0x1: IPv4
  0x2: IPv6
  0x3: Ethernet
  0x4: NSH
  0x5: MPLS
  0xFE: Experiment 1
  0xFF: Experiment 2

Further, the document does not include some text about the use of 254/255 values.

(4) The document states the following:

OLD:
12.1.  NSH EtherType

  An IEEE EtherType, 0x894F, has been allocated for NSH.

But no entry is found at https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml!

Unless I'm mistaken, an action is needed form IANA. Thus, I suggest the following NEW text:

NEW:
12.1.  NSH EtherType

  IANA is requested to register the IEEE EtherType, 0x894F, for NSH in https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml.

==
Minor:
==

* Title: I suggest this modification
OLD: Network Service Header
NEW: Network Service Header (NSH)

* Abstract:

OLD:
  This document describes a Network Service Header (NSH) inserted onto
  packets or frames to realize service function paths.  NSH also
  provides a mechanism for metadata exchange along the instantiated
  service path.  NSH is the SFC encapsulation required to support the
  Service Function Chaining (SFC) Architecture (defined in RFC7665).
NEW:
  This document describes a Network Service Header (NSH) inserted onto
  packets or frames to realize service function paths.  NSH also
  provides a mechanism for metadata exchange along the instantiated
  service paths.  NSH is the SFC encapsulation required to support the
              ^^
  Service Function Chaining (SFC) architecture (defined in RFC7665).
                                 ^^

* Introduction:

(1)

OLD:
  Service functions are widely deployed and essential in many networks.
  These service functions provide a range of features such as security,
  WAN acceleration, and server load balancing.  Service functions may
  be instantiated at different points in the network infrastructure
  such as the wide area network, data center, campus, and so forth.

NEW:
  Service functions are widely deployed and essential in many networks.
  These service functions provide a range of features such as security,
  WAN (Wide Area Network) acceleration (REF), and server load balancing.  Service functions may
  be instantiated at different points in the network infrastructure
  such as the wide area network [I-D.ietf-sfc-use-case-mobility],
  data center [I-D.ietf-sfc-dc-use-cases], campus, and so forth.

- expand an acronym
- cite the use case drafts to illustrate the use of SFs
- Given that WAN acceleration may not be that clear, citing a reference where this is defined will be helpful.

(2) Expand an acronym on first use:

OLD:
  NSH defines a new service plane protocol specifically for the
  creation of dynamic service chains and is composed of the following
  elements:

  1.  Service Function Path identification

NEW:
  Network Service Header (NSH) defines a new service plane protocol specifically for the
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  creation of dynamic service chains and is composed of the following
  elements:

  1.  Service Function Path identification.
                                          ^^

*  Section 2.1

(1)

OLD:
  Network Locator:  dataplane address, typically IPv4 or IPv6, used to
     send and receive network traffic.

NEW:
  Network Locator:  dataplane address, typically IPv4 or IPv6, used to
     send and receive traffic.

- Not sure what is meant by "network traffic"

(2)

OLD:
  Network Node/Element:  Device that forwards packets or frames based
     on outer header (i.e. transport) information.

NEW:
  Network Node/Element:  Device that forwards packets or frames based
     on the outer header (i.e., transport) information.
        ^^^^                  ^^

(3)

OLD:
  Network Overlay:  Logical network built on top of existing network
     (the underlay).  Packets are encapsulated or tunneled to create
                                              ^^^^^^^^^^^^
     the overlay network topology.

NEW:
  Network Overlay:  Logical network built on top of existing network
     (the underlay).  Packets are encapsulated to create
     the overlay network topology.

(4)

Position the "Service Classifier" entry right after SFP given that the text uses SFs and SFFs acronyms that are introduced later in the section.

* Section 2.2: NSH is already expanded.

OLD:
  Network Service Header (NSH) addresses several limitations associated
  with service function deployments.
NEW:
  NSH addresses several limitations associated
  with service function deployments.

* Section 2.3: Transport area folks may be "hurted" by this "network transport protocol" wording. I suggest to use transport encapsulation as per the SFC arch RFC.

OLD:
  5.  Transport Agnostic: NSH is transport independent.  An appropriate
      (for a given deployment) network transport protocol can be used
      to transport NSH-encapsulated traffic.  This transport may form
      an overlay network and if an existing overlay topology provides
      the required service path connectivity, that existing overlay may
      be used.

NEW:
  5.  Transport Agnostic: NSH is transport-independent.  An appropriate
                                        ^^^^^^
      (for a given deployment) network transport encapsulation scheme can be used
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
      to transport NSH-encapsulated traffic.  This transport may form
      an overlay network and if an existing overlay topology provides
      the required service path connectivity, that existing overlay may
      be used.

* Section 3:

(1)

OLD:
  A Network Service Header (NSH) contains service path information and
  ^^^^^^^^^^^^^^^^^^^^^^^^
  optionally metadata that are added to a packet or frame and used to
  create a service plane.  An outer transport header is imposed, on NSH^
                   ^^^^^^
  and the original packet/frame, for network forwarding.
^
NEW:
  NSH contains service path information and
  optionally metadata that are added to a packet or frame and used to
  create a service path.  An outer transport header is imposed, on NSH
  and the original packet/frame, for network forwarding.

(2)

OLD:
  A Service Classifier adds NSH.  NSH is removed by the last SFF in the
  service chain or by a SF that consumes the packet.

NEW:
  A Service Classifier adds NSH.  NSH is removed by the last SFF in the
  service chain or by an SF that consumes the packet.
                      ^^

* Section 3.1

(1)

OLD:
  Service Path Header: provide path identification and location within
  a service path.

NEW:
  Service Path Header: provides path identification and location within
                       ^^^^^^^^
  a service path.

(2)

OLD:
  Context header: carry metadata (i.e. context data) along a service
  path.

NEW:
  Context header: carries metadata (a.k.a., context data) along a service
                  ^^^^^^^^         ^^^^^^^^
  path.

* Section 3.2.

(1)
Add this text before Figure 2

NEW:
Figure 2 depicts the NSH base header:

(2)

OLD:
  Version: The version field is used to ensure backward compatibility
  going forward with future NSH updates.  It MUST be set to 0x0 by the
  sender, in this first revision of NSH.  Given the widespread
  implementation of existing hardware that uses the first nibble after
  an MPLS label stack for ECMP decision processing, this document
  reserves version 01 and this value MUST NOT be used in future
  versions of the protocol.  Please see [RFC7325] for further
  discussion of MPLS-related forwarding requirements.

NEW:
  Version: The version field is used to ensure backward compatibility
  going forward with future NSH specification updates.  It MUST be set to 0x0 by the
                            ^^^^^^^^^^^^^^^^^^
  sender, in this first revision of NSH.  Given the widespread
  implementation of existing hardware that uses the first nibble after
  an MPLS label stack for ECMP decision processing, this document
  reserves version 01 and this value MUST NOT be used in future
  versions of the protocol.  Please see [RFC7325] for further
  discussion of MPLS-related forwarding requirements.

(3)

OLD:
  SF/SFF/SFC Proxy/Classifer implementations that do not support SFC
  OAM procedures SHOULD discard packets with O-bit set, but MAY support
  a configurable parameter to enable forwarding received SFC OAM
  packets unmodified to the next element in the chain.  Forwarding OAM

NEW:
  SF/SFF/SFC Proxy/Classifier implementations that do not support SFC
                  ^^^^^^^^^^
  OAM procedures SHOULD discard packets with O-bit set, but MAY support
  a configurable parameter to enable forwarding received SFC OAM
  packets unmodified to the next element in the chain.  Forwarding OAM

(4)

OLD:
  All other flag fields are reserved for future use.  Reserved bits
  MUST be set to zero upon origination and MUST be preserved unmodified
  by other NSH supporting elements.  Elements which do not understand
  the meaning of any of these bits MUST not modify their actions based
  on those unknown bits.

NEW:
  All other flag fields are reserved for future use.  Reserved bits
  MUST be set to zero upon origination and MUST be preserved unmodified
  by other NSH supporting elements.  Elements which do not understand
  the meaning of any of these bits MUST NOT modify their actions based
                                        ^^^^
  on those unknown bits.

(5)

OLD:
  0x1 - which indicates that the format of the header includes a fixed
  length Context Header (see Figure 4 below).

NEW:
  0x1 - which indicates that the format of the header includes a fixed
  length Context Header (see Figure 4).

(6)

OLD:
  0x2 - which does not mandate any headers beyond the Base Header and
  Service Path Header, but may contain optional variable length Context
  Header(s).  The semantics of the variable length Context Header(s)
  are not defined in this document

NEW:
  0x2 - which does not mandate any headers beyond the Base Header and
  Service Path Header, but may contain optional variable length Context
  Header(s).  The semantics of the variable length Context Header(s)
  are not defined in this document.
                                  ^^
  A generic format of the variable length Context Header is provided in Section 3.5.1.
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

(7)

OLD:
  NSH implementations MUST support MD type =  0x1 and MD Type 0x2 (where
  the length is of value 0x2).

NEW1:
  NSH implementations MUST support MD type 0x1 and MD Type 0x2 (where
  the length is of value 0x2).

Or
NEW2:
  NSH implementations MUST support MD type = 0x1 and MD Type = 0x2 (where
  the length is of value 0x2).

(8)

OLD:
  Next Protocol: indicates the protocol type of the encapsulated data.
  NSH does not alter the inner payload, and the semantics on the inner
  protocol remain unchanged due to NSH service function chaining.
  Please see IANA Considerations section below.

NEW:
  Next Protocol: indicates the protocol type of the encapsulated data.
  NSH does not alter the inner payload, and the semantics on the inner
  protocol remain unchanged due to NSH service function chaining.
  Please see IANA Considerations (Section 12.2.5).

* Section 3.3:

(1)

Add this new text right before Figure 3:

NEW:
Figure 3 shows the format of the Service Path Header:

(2)

Add this NEW text right after Figure 3:

NEW:
The meaning of these fields is as follows:

(3)

OLD:
  SI is used in conjunction with Service Path Identifier for Service
  Function Path Selection and for determining the next SFF/SF in the
  path.  Service Index (SI) is also valuable when troubleshooting/
        ^^^^^^^^^^^^^^^^^^^
  reporting service paths.  In addition to indicating the location
  within a Service Function Path, SI can be used for service plane loop
  detection.

NEW:
  SI is used in conjunction with Service Path Identifier for Service
  Function Path Selection and for determining the next SFF/SF in the
  path.  SI is also valuable when troubleshooting/
  reporting service paths.  In addition to indicating the location
  within a Service Function Path, SI can be used for service plane loop
  detection.

* Section 3.4:

OLD:
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Ver|O|R|    TTL    |   Length  |R|R|R|R|MD Type| Next Protocol |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |          Service Path Identifer               | Service Index |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   |                 Fixed Length Context Header                   |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

NEW:
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Ver|O|R|    TTL    |   Length  |R|R|R|R|MD Type| Next Protocol |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |          Service Path Identifier               | Service Index |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   |                 Fixed Length Context Header                   |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

* Section 3.5: Figure 5 is not called in the text.

OLD:
  When the base header specifies MD Type= 0x2, zero or more Variable
  Length Context Headers MAY be added, immediately following the
  Service Path Header.

NEW:
  When the base header specifies MD Type= 0x2, zero or more Variable
  Length Context Headers MAY be added, immediately following the
  Service Path Header (Figure 5).

* Section 3.5.1:

(1)

OLD:
  Metadata Class (MD Class): The MD Class defines the scope of the
  'Type' field to provide a hierarchical namespace.  The IANA
  Considerations section defines how the MD Class values can be
  allocated to standards bodies, vendors, and others.

NEW:
  Metadata Class (MD Class): defines the scope of the
  'Type' field to provide a hierarchical namespace.  Section 12.2.4 defines how the MD Class values can be
  allocated to standards bodies, vendors, and others.

(2)

OLD:
  Length: Length of the variable metadata, in single byte words.
NEW:
  Length: indicates the length of the variable metadata, in single byte words.

* Section 4

(1)

OLD:
These nodes have several possible header related
  actions:

NEW:
These nodes have several possible NSH-related
  actions:

(2)

(1)

OLD:
  1.  Insert or remove NSH: These actions can occur at the start and

NEW:
  1.  Insert or remove NSH: can occur at the start and

(2) a classifier is a function, so "logical classifier" sounds weird to me.

OLD:
      Multiple logical classifiers may exist within a given service
      path.
NEW:
      Multiple classifiers may exist within a given service
      path.

* Section 5: Not sure I would maintain this section. At least, the title should be updated to reflect the few points that are cited.

OLD: 5.  NSH Encapsulations
NEW: 5.  NSH & Transport Encapsulations

* Section 7.1

(1)

OLD:
  As described above, NSH contains a Service Path Identifier (SPI) and
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  a Service Index (SI).  The SPI is, as per its name, an identifier.^
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  The SPI alone cannot be used to forward packets along a service path.
  Rather the SPI provide a level of indirection between the service
  path/topology and the network transport.  Furthermore, there is no^
  ^^^^^^^^^^^^
  requirement, or expectation of an SPI being bound to a pre-determined
  or static network path.

NEW:
  The SPI alone cannot be used to forward packets along a service path.
  Rather the SPI provides a level of indirection between the service
                 ^^^^^^^^
  path and the network transport.  Furthermore, there is no
  requirement, or expectation of an SPI being bound to a pre-determined
  or static network path.

(2) Use consistent terminology:

OLD:

 This indirection --- path ID to overlay -- creates a true service
                      ^^^^^^^^
  plane.

NEW:
  This indirection --- SPI to overlay -- creates a true service
  plane.

* Section 9:

Add this NEW text at the end of the 4th paragraph:

NEW:

Means to prevent leaking privacy-related information outside an administrative domain are supported by NSH given that the last SFF of a path will systematically remove the NSH header before forwarding a packet upstream.


Cheers,
Med

-----Message d'origine-----
De : sfc [mailto:sfc-bounces@ietf.org] De la part de Joel Halpern
Envoyé : lundi 3 juillet 2017 02:14
À : sfc@ietf.org<mailto:sfc@ietf.org>
Objet : [sfc] Fwd: I-D Action: draft-ietf-sfc-nsh-13.txt

Below is the announcement of -13 of the NSH document.
To the best of the chairs and editors ability, this reflects all
comments we have received, in accordance with the rough consensus of the
WG as best the chairs were able to determine it.

We think it is done.
Please take a look.

Our goal is to hand this document to the IESG by the IETF meeting.  As
such, we would like all comments to be in by 14-July-2017.

Yours,
Joel and Jim

PS: Unless someone objects, we will accept the OAM clarification Andy
Malis sent to the list.


-------- Forwarded Message --------
Subject: I-D Action: draft-ietf-sfc-nsh-13.txt
Date: Fri, 30 Jun 2017 04:33:38 -0700
From: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>
Reply-To: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
CC: sfc@ietf.org<mailto:sfc@ietf.org>


A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the Service Function Chaining of the IETF.

        Title           : Network Service Header
        Authors         : Paul Quinn
                          Uri Elzur
Filename        : draft-ietf-sfc-nsh-13.txt
Pages           : 37
Date            : 2017-06-30

Abstract:
   This document describes a Network Service Header (NSH) inserted onto
   packets or frames to realize service function paths.  NSH also
   provides a mechanism for metadata exchange along the instantiated
   service path.  NSH is the SFC encapsulation required to support the
   Service Function Chaining (SFC) Architecture (defined in RFC7665).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sfc-nsh-13
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-nsh-13

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-nsh-13


Please note that it may take a couple of minutes from the time of
submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

—
Carlos Pignataro, carlos@cisco.com<mailto:carlos@cisco.com>

“Sometimes I use big words that I do not fully understand, to make myself sound more photosynthesis."