Re: [sfc] TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt

"Joel M. Halpern" <jmh@joelhalpern.com> Thu, 24 February 2022 14:02 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 680973A0D29 for <sfc@ietfa.amsl.com>; Thu, 24 Feb 2022 06:02:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.812
X-Spam-Level:
X-Spam-Status: No, score=-2.812 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CMAooxjwM_3u for <sfc@ietfa.amsl.com>; Thu, 24 Feb 2022 06:02:42 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E57AB3A0D1C for <sfc@ietf.org>; Thu, 24 Feb 2022 06:02:14 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4K4F2t53wzz1pMNt; Thu, 24 Feb 2022 06:02:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1645711334; bh=j4gFaENo366zIrPYDeVMDVxZQwSbus98FmYPiu4aEms=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=M86XsxFJl8scadXFOakVpgQZdDatTjVKd/UCo4FvHuOXUjbR289G0Ujt8ITqrZML5 Gpk6PcHrk1IJw/i+VqCLdI8d0Ay3ThZG5A7VGFNjAZJ9q68iw86ly3yn63FpxXr3MV 9PTtXNHJmfm42aEIpZgTZ+KNaXIpduSlEHfbU+Fk=
X-Quarantine-ID: <7Ow6boHMxXf0>
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [192.168.22.111] (50-233-136-230-static.hfc.comcastbusiness.net [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 4K4F2t0vdNz1pGfr; Thu, 24 Feb 2022 06:02:13 -0800 (PST)
Message-ID: <5067aa77-1131-987c-4420-993137e09c29@joelhalpern.com>
Date: Thu, 24 Feb 2022 09:02:12 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.1
Content-Language: en-US
To: mohamed.boucadair@orange.com
Cc: "sfc@ietf.org" <sfc@ietf.org>
References: <164502226599.23621.11371897310173936133@ietfa.amsl.com> <CA+RyBmXTSUdfovvnSpQjoo_Svwm-amC-bRm0eyscUHgY2hYx9g@mail.gmail.com> <30956_1645025435_620D189B_30956_353_1_787AE7BB302AE849A7480A190F8B933035494DD5@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CA+RyBmWg=-ksKup=-7UkCAW_wxWHUFYF3Q6_pven6=tCMCjRPQ@mail.gmail.com> <3535_1645028520_620D24A8_3535_225_1_787AE7BB302AE849A7480A190F8B933035494EAE@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <5efa6354-4396-d1b1-bec3-122d2aa148c2@joelhalpern.com> <26440_1645082031_620DF5AF_26440_39_1_787AE7BB302AE849A7480A190F8B9330354954F7@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <16224_1645689365_62173A15_16224_31_1_787AE7BB302AE849A7480A190F8B933035498F45@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <a61f9edc-d74c-0548-5c1b-06deafbbc935@joelhalpern.com> <18342_1645711161_62178F39_18342_314_1_787AE7BB302AE849A7480A190F8B9330354992A9@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
In-Reply-To: <18342_1645711161_62178F39_18342_314_1_787AE7BB302AE849A7480A190F8B9330354992A9@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/DXEzg1m6tJEBCPxSLez73HOUqzc>
Subject: Re: [sfc] TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Feb 2022 14:02:48 -0000

Thanks.  I think that captures it nicely.

Yours,
Joel

On 2/24/2022 8:59 AM, mohamed.boucadair@orange.com wrote:
> Re-,
> 
> Sure. I made some minor edits. The NEW text looks as follows:
> 
>        When an OAM data is included in the inner packet, the Next
>        Protocol field is set to reflect the structure of that inner OAM
>        packet.  The setting and processing of the O bit neither assumes
>        nor expects detailed analysis of the content of any inner IP
>        packet carried by the NSH.  As such, SFFs, SFC-aware SFs, and SFC
>        Proxies SHOULD discard any NSH packets with the O bit set and Next
>        Protocol set to something that is not itself an OAM protocol.
>        This includes discarding the packet when the O bit is set and the
>        Next Protocol is set to 0x01 (IPv4), 0x02 (IPv6), 0x03 (MPLS), or
>        0x05 (Ethernet).
> 
> Thanks.
> 
> Cheers,
> Med
> 
>> -----Message d'origine-----
>> De : Joel M. Halpern <jmh@joelhalpern.com>
>> Envoyé : jeudi 24 février 2022 14:40
>> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>om>; Greg
>> Mirsky <gregimirsky@gmail.com>
>> Cc : sfc@ietf.org
>> Objet : Re: [sfc] TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt
>>
>> May a suggest a small refinement?
>>       The setting and processing of the O bit neither assumes nor expects
>> detailed analysis of the contents of any IP packets carried by NSH.  As
>> such, SFFs and SFs SHOULD discard any NSH packets with the O bit set and
>> Next protocol set to something that is not itself an OAM protocol.  THis
>> includes discarding the packet when O bit is set and the Next Protocol
>> is set to 0x01 (IPv4), 0x02 (IPv6), 0x03 (MPLS), or 0x05 (Ethernet).
>>
>> Yours,
>> Joel
>>
>> On 2/24/2022 2:56 AM, mohamed.boucadair@orange.com wrote:
>>> Hi Joel, all,
>>>
>>> FWIW, I updated -02 with the following to reflect one of the points
>> discussed below:
>>>
>>>         When an OAM data is included in the inner packet, the Next
>>>         Protocol field is set to reflect the structure of that inner
>>>         packet.  By default, SFFs SHOULD discard NSH packets with O bit
>>>         set and Next Protocol set to 0x1 (IPv4), 0x2 (IPv6), 0x3
>> (MPLS),
>>>         or 0x5 (Ethernet).
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : sfc <sfc-bounces@ietf.org> De la part de
>>>> mohamed.boucadair@orange.com Envoyé : jeudi 17 février 2022 08:14 À :
>>>> Joel M. Halpern <jmh@joelhalpern.com>om>; Greg Mirsky
>>>> <gregimirsky@gmail.com> Cc : sfc@ietf.org Objet : Re: [sfc] TR: I-D
>>>> Action: draft-boucadair-sfc-oam-packet-00.txt
>>>>
>>>> Hi Joel,
>>>>
>>>>> If the NSH payload is an IP packet, and that packet is addressed to
>>>>> something other than this node, and that packet is carrying  an ICMP
>>>>> echo, is that an SFC OAM packet requiring the O-bit being set?
>>>>
>>>> Med: The NSH can be added by a classifier or directly by an SFC OAM
>>>> controller that issues the packet. If the original IP/ICMP packet is
>>>> received by a classifier, the classifier must not set the O bit as
>>>> per draft-boucadair-sfc-oam-packet because that packet is seen as
>>>> data packet.
>>>>
>>>> Let's now focus on the SFC OAM controller case:
>>>> * Does it makes sense for an SFC OAM controller to "leverage" IP/ICMP
>>>> for SFC OAM purposes while it can do it directly using ICMP (without
>>>> the IP header)?
>>>>
>>>> I personally don't see any.
>>>>
>>>> * Does it makes sense for an SFC OAM controller to "supply" an
>>>> IP/ICMP as an input for specific OAM purposes?
>>>>
>>>> This is in theory possible for SF testing purposes (e.g., test the
>>>> behavior of a firewall against such packet. The output of the test
>>>> will be used to assess if the FW configuration is OK/NOK). However,
>>>> such test OAM packets have to be unambiguously identified as such.
>>>> The Next Protocol won't be set to IP but to the value assigned to an
>>>> OAM protocol.
>>>>
>>>>     And
>>>>> conversely, is an SFF required to check for that case if it sees an
>>>>> NSH with the O-bit set?
>>>>
>>>> Med: SFFs have to support policies whether some OAM messages can be
>>>> forwarded to SFs. These policies may include a filter on valid next
>>>> protocol values. I don't have an objection to discard by default
>>>> packets with O bit set and next protocol = IP/MPLS/Ethernet
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Joel M. Halpern <jmh@joelhalpern.com> Envoyé : mercredi 16
>>>>> février 2022 17:30 À : BOUCADAIR Mohamed INNOV/NET
>>>>> <mohamed.boucadair@orange.com>om>; Greg Mirsky <gregimirsky@gmail.com>
>>>> Cc
>>>>> : sfc@ietf.org Objet : Re: [sfc] TR: I-D Action:
>>>>> draft-boucadair-sfc-oam-packet-00.txt
>>>>>
>>>>> Thank you for writing this.  I look forward to more dscussion by
>>>>> more WG members.
>>>>>
>>>>> I want to ask one clarifying quesiton about an example that was
>>>>> raised earlier.
>>>>>
>>>>> If the NSH payload is an IP packet, and that packet is addressed to
>>>>> something other than this node, and that packet is carrying  an ICMP
>>>>> echo, is that an SFC OAM packet requiring the O-bit being set?  And
>>>>> conversely, is an SFF required to check for that case if it sees an
>>>>> NSH with the O-bit set?
>>>>>
>>>>> Yours,
>>>>> Joel
>>>>>
>>>>> On 2/16/2022 11:21 AM, mohamed.boucadair@orange.com wrote:
>>>>>> Re-,
>>>>>>
>>>>>> This is determined by the entity that issues the OAM packet. This
>>>>>> is typically a dedicated OAM controller or an SFC element
>>>>>> (classifier for the ioam case, for example).
>>>>>>
>>>>>> BTW, I updated the draft to reflect your comments and also those
>>>>>> from
>>>>>> Jim:
>>>>>> https://www.ietf.org/rfcdiff?url2=draft-boucadair-sfc-oam-packet-01
>>>>>> <https://www.ietf.org/rfcdiff?url2=draft-boucadair-sfc-oam-packet-0
>>>>>> 1
>>>>>>>
>>>>>>
>>>>>> Cheers,
>>>>>>
>>>>>> Med
>>>>>>
>>>>>> *De :* Greg Mirsky <gregimirsky@gmail.com> *Envoyé :* mercredi 16
>>>>>> février 2022 16:52 *À :* BOUCADAIR Mohamed INNOV/NET
>>>>>> <mohamed.boucadair@orange.com> *Cc :* sfc@ietf.org *Objet :* Re:
>>>>>> [sfc]
>>>>>> TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt
>>>>>>
>>>>>> Hi Med,
>>>>>>
>>>>>> thank you for your expedient response. I have a follow-up question:
>>>>>>
>>>>>>       How does one determine the nature, OAM or not-OAM, of data
>>>>> elements
>>>>>>       in the NSH Context header?
>>>>>>
>>>>>> As I understand it, draft-ietf-sfc-nsh-tlv does not provide that.
>>>>>> Do we need to add it? Appreciate your thoughts on that.
>>>>>>
>>>>>> Regards,
>>>>>>
>>>>>> Greg
>>>>>>
>>>>>> On Wed, Feb 16, 2022 at 7:30 AM <mohamed.boucadair@orange.com
>>>>>> <mailto:mohamed.boucadair@orange.com>> wrote:
>>>>>>
>>>>>>       Hi Greg,
>>>>>>
>>>>>>       Please see inline.
>>>>>>
>>>>>>       Cheers,
>>>>>>
>>>>>>       Med
>>>>>>
>>>>>>       *De :* Greg Mirsky <gregimirsky@gmail.com
>>>>>>       <mailto:gregimirsky@gmail.com>>
>>>>>>       *Envoyé :* mercredi 16 février 2022 16:13
>>>>>>       *À :* BOUCADAIR Mohamed INNOV/NET
>> <mohamed.boucadair@orange.com
>>>>>>       <mailto:mohamed.boucadair@orange.com>>
>>>>>>       *Cc :* sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>       *Objet :* Re: [sfc] TR: I-D Action:
>>>>>>       draft-boucadair-sfc-oam-packet-00.txt
>>>>>>
>>>>>>       Hi Med,
>>>>>>
>>>>>>       many thanks for taking the lead and putting the proposal on
>>>>>> the
>>>>> table.
>>>>>>
>>>>>>       I have a question on the proposed new text for the O bit and
>> its
>>>>>>       possible effect on IOAM:
>>>>>>
>>>>>>           O bit:  Setting this bit indicates an SFC OAM packet.
>>>>>> Such a packet
>>>>>>
>>>>>>              is any NSH-encapasulated packet that exclusively
>>>>>> includes an OAM
>>>>>>
>>>>>>              command and/or OAM data.
>>>>>>
>>>>>>       My understanding of the new definition of the O bit is that
>>>>>> the
>>>>> NSH
>>>>>>       includes and/or encapsulates only OAM command and/or data.
>>>>>> IOAM,
>>>>> as
>>>>>>       I understand its application in NSH, may follow the NSH and
>> have
>>>>>>       user payload after the IOAM data.
>>>>>>
>>>>>>       *//*
>>>>>>
>>>>>>       */[Med] Packets that include also user data are not considered
>>>> as
>>>>>>       “OAM packets” as per the new definition./*
>>>>>>
>>>>>>       And another scenario, if Flow ID TLV is used to influence user
>>>>> data
>>>>>>       through SFP, OAM will apply the same Flow ID value. Would such
>>>>>>       packet still be considered as "exclusively includes OAM
>> command
>>>>>>       and/or data"?
>>>>>>
>>>>>>       *//*
>>>>>>
>>>>>>       */[Med] Yes, they are. Flow id is just a constraint, if you
>>>> will,
>>>>>>       that is used to influence how OAM commands will be executed.
>>>>>> /*
>>>>>>
>>>>>>       Regards,
>>>>>>
>>>>>>       Greg
>>>>>>
>>>>>>       On Wed, Feb 16, 2022 at 6:40 AM <mohamed.boucadair@orange.com
>>>>>>       <mailto:mohamed.boucadair@orange.com>> wrote:
>>>>>>
>>>>>>           Hi all,
>>>>>>
>>>>>>           A proposal to clarify the intent of SFC OAM packet.
>>>>>> Comments
>>>>> are
>>>>>>           welcome.
>>>>>>
>>>>>>           Cheers,
>>>>>>           Med
>>>>>>
>>>>>>           -----Message d'origine-----
>>>>>>           De : I-D-Announce <i-d-announce-bounces@ietf.org
>>>>>>           <mailto:i-d-announce-bounces@ietf.org>> De la part de
>>>>>>           internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
>>>>>>           Envoyé : mercredi 16 février 2022 15:38
>>>>>>           À : i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
>>>>>>           Objet : I-D Action: draft-boucadair-sfc-oam-packet-00.txt
>>>>>>
>>>>>>
>>>>>>           A New Internet-Draft is available from the on-line
>>>>>>           Internet-Drafts directories.
>>>>>>
>>>>>>
>>>>>>                    Title           : Clarifying Ambiguity related to
>>>>>>           Network Service Header (NSH) OAM Packet
>>>>>>                    Author          : Mohamed Boucadair
>>>>>>                    Filename        : draft-boucadair-sfc-oam-packet-
>>>>> 00.txt
>>>>>>                    Pages           : 5
>>>>>>                    Date            : 2022-02-16
>>>>>>
>>>>>>           Abstract:
>>>>>>               This document clarifies an ambiguity in the Network
>>>>> Service
>>>>>>           Header
>>>>>>               (NSH) specification related to the handling of O-
>>>> bit.  In
>>>>>>           particular,
>>>>>>               this document clarifies the meaning of "OAM packet".
>>>>>>
>>>>>>               This document updates RFC8300.
>>>>>>
>>>>>>
>>>>>>           The IETF datatracker status page for this draft is:
>>>>>>           https://datatracker.ietf.org/doc/draft-boucadair-sfc-oam-
>>>>> packet/
>>>>>>
>>>>>> <https://datatracker.ietf.org/doc/draft-boucadair-sfc-oam-packet/>
>>>>>>
>>>>>>           There is also an htmlized version available at:
>>>>>>
>>>>>> https://datatracker.ietf.org/doc/html/draft-boucadair-sfc-oam-
>>>>> packet-00
>>>>>>
>>>>>> <https://datatracker.ietf.org/doc/html/draft-boucadair-sfc-oam-pack
>>>>>> e
>>>>>> t-
>>>>>> 00>
>>>>>>
>>>>>>
>>>>>>           Internet-Drafts are also available by rsync at
>>>>>>           rsync.ietf.org::internet-drafts
>>>>>>
>>>>>>
>>>>>>           _______________________________________________
>>>>>>           I-D-Announce mailing list
>>>>>>           I-D-Announce@ietf.org <mailto:I-D-Announce@ietf.org>
>>>>>>           https://www.ietf.org/mailman/listinfo/i-d-announce
>>>>>>           <https://www.ietf.org/mailman/listinfo/i-d-announce>
>>>>>>           Internet-Draft directories:
>> http://www.ietf.org/shadow.html
>>>>>>           <http://www.ietf.org/shadow.html> or
>>>>>>           ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>>>>>>           <ftp://ftp.ietf.org/ietf/1shadow-sites.txt>
>>>>>>
>>>>>>
>>>>>> ___________________________________________________________________
>>>>>> _ __ ___________________________________________________
>>>>>>
>>>>>>           Ce message et ses pieces jointes peuvent contenir des
>>>>>>           informations confidentielles ou privilegiees et ne doivent
>>>>> donc
>>>>>>           pas etre diffuses, exploites ou copies sans autorisation.
>> Si
>>>>>>           vous avez recu ce message par erreur, veuillez le signaler
>>>>>>           a l'expediteur et le detruire ainsi que les pieces
>> jointes.
>>>>> Les
>>>>>>           messages electroniques etant susceptibles d'alteration,
>>>>>>           Orange decline toute responsabilite si ce message a ete
>>>>> altere,
>>>>>>           deforme ou falsifie. Merci.
>>>>>>
>>>>>>           This message and its attachments may contain confidential
>> or
>>>>>>           privileged information that may be protected by law;
>>>>>>           they should not be distributed, used or copied without
>>>>>>           authorisation.
>>>>>>           If you have received this email in error, please notify
>> the
>>>>>>           sender and delete this message and its attachments.
>>>>>>           As emails may be altered, Orange is not liable for
>>>>>> messages
>>>>> that
>>>>>>           have been modified, changed or falsified.
>>>>>>           Thank you.
>>>>>>
>>>>>>           _______________________________________________
>>>>>>           sfc mailing list
>>>>>>           sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>           https://www.ietf.org/mailman/listinfo/sfc
>>>>>>           <https://www.ietf.org/mailman/listinfo/sfc>
>>>>>>
>>>>>>
>>>>>> ___________________________________________________________________
>>>>>> _ __ ___________________________________________________
>>>>>>
>>>>>>       Ce message et ses pieces jointes peuvent contenir des
>>>>>> informations confidentielles ou privilegiees et ne doivent donc
>>>>>>
>>>>>>       pas etre diffuses, exploites ou copies sans autorisation. Si
>>>>>> vous avez recu ce message par erreur, veuillez le signaler
>>>>>>
>>>>>>       a l'expediteur et le detruire ainsi que les pieces jointes.
>>>>>> Les messages electroniques etant susceptibles d'alteration,
>>>>>>
>>>>>>       Orange decline toute responsabilite si ce message a ete
>>>>>> altere,
>>>>> deforme ou falsifie. Merci.
>>>>>>
>>>>>>       This message and its attachments may contain confidential or
>>>>>> privileged information that may be protected by law;
>>>>>>
>>>>>>       they should not be distributed, used or copied without
>>>>> authorisation.
>>>>>>
>>>>>>       If you have received this email in error, please notify the
>>>>>> sender
>>>>> and delete this message and its attachments.
>>>>>>
>>>>>>       As emails may be altered, Orange is not liable for messages
>>>>>> that
>>>>> have been modified, changed or falsified.
>>>>>>
>>>>>>       Thank you.
>>>>>>
>>>>>> ___________________________________________________________________
>>>>>> _ __ ___________________________________________________
>>>>>>
>>>>>> Ce message et ses pieces jointes peuvent contenir des informations
>>>>>> confidentielles ou privilegiees et ne doivent donc pas etre
>>>>>> diffuses, exploites ou copies sans autorisation. Si vous avez recu
>>>>>> ce message par erreur, veuillez le signaler a l'expediteur et le
>>>>>> detruire ainsi
>>>>> que les pieces jointes. Les messages electroniques etant
>>>>> susceptibles d'alteration, Orange decline toute responsabilite si ce
>>>>> message a ete altere, deforme ou falsifie. Merci.
>>>>>>
>>>>>> This message and its attachments may contain confidential or
>>>>>> privileged information that may be protected by law; they should
>>>>>> not
>>>>> be distributed, used or copied without authorisation.
>>>>>> If you have received this email in error, please notify the sender
>>>>>> and
>>>>> delete this message and its attachments.
>>>>>> As emails may be altered, Orange is not liable for messages that
>>>>>> have
>>>>> been modified, changed or falsified.
>>>>>> Thank you.
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _____________________________________________________________________
>>>> ___ _________________________________________________
>>>>
>>>> Ce message et ses pieces jointes peuvent contenir des informations
>>>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>>>> exploites ou copies sans autorisation. Si vous avez recu ce message
>>>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi
>>>> que les pieces jointes. Les messages electroniques etant susceptibles
>>>> d'alteration, Orange decline toute responsabilite si ce message a ete
>>>> altere, deforme ou falsifie. Merci.
>>>>
>>>> This message and its attachments may contain confidential or
>>>> privileged information that may be protected by law; they should not
>>>> be distributed, used or copied without authorisation.
>>>> If you have received this email in error, please notify the sender
>>>> and delete this message and its attachments.
>>>> As emails may be altered, Orange is not liable for messages that have
>>>> been modified, changed or falsified.
>>>> Thank you.
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> ______________________________________________________________________
>>> ___________________________________________________
>>>
>>> Ce message et ses pieces jointes peuvent contenir des informations
>>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>>> exploites ou copies sans autorisation. Si vous avez recu ce message
>>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi
>> que les pieces jointes. Les messages electroniques etant susceptibles
>> d'alteration, Orange decline toute responsabilite si ce message a ete
>> altere, deforme ou falsifie. Merci.
>>>
>>> This message and its attachments may contain confidential or
>>> privileged information that may be protected by law; they should not
>> be distributed, used or copied without authorisation.
>>> If you have received this email in error, please notify the sender and
>> delete this message and its attachments.
>>> As emails may be altered, Orange is not liable for messages that have
>> been modified, changed or falsified.
>>> Thank you.
>>>
> 
> _________________________________________________________________________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>