Re: [sfc] Regarding last call for draft-ietf-sfc-multi-layer-oam
"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 24 November 2021 16:09 UTC
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 5884E3A077C
for <sfc@ietfa.amsl.com>; Wed, 24 Nov 2021 08:09:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001,
RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001,
USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
header.d=cisco.com header.b=MCxsr6YU;
dkim=pass (1024-bit key)
header.d=cisco.onmicrosoft.com header.b=TBH6Eu2V
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id YtWFqjS2-Y8G for <sfc@ietfa.amsl.com>;
Wed, 24 Nov 2021 08:09:00 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90])
(using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id B8E5F3A0038
for <sfc@ietf.org>; Wed, 24 Nov 2021 08:08:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
d=cisco.com; i=@cisco.com; l=178037; q=dns/txt;
s=iport; t=1637770139; x=1638979739;
h=from:to:cc:subject:date:message-id:references:
in-reply-to:mime-version;
bh=mNddjtAvBpm9vfn2aI7saNtYGCQiAe09M1YeqJ8ODWA=;
b=MCxsr6YUw3107KuVdzRPDS9SImaWQlpHk+WNVs5/SxVfqmAniZHYTp3+
JA96pN6HS3RSyD8i9yBf5H8voBUDYGf9D1TNixIykqQ/Z2WM4JARNUGh9
7mXDbAEQSgEyzauQUMIoGW5+8FLEpp4JrfUUrgGO3oiYMyTPeuWzFaKnX U=;
X-IPAS-Result: =?us-ascii?q?A0BLAABaYp5h/4wNJK1QChwBAQEBAQEHAQESAQEEBAEBg?=
=?us-ascii?q?gUHAQELAYEgMSMGKAd3WjcxhAk+g0cDhFlgiBCLB4UlimSBLhSBEQNPBQsBA?=
=?us-ascii?q?QENAQEqAQwKBAEBhQQCF4JeAiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBA?=
=?us-ascii?q?QIBBgSBCROFaA2GQwIBAwEBCgYIAQIGHQEBJQcLAQ8CAQYCOAEGAwICAh8GC?=
=?us-ascii?q?xQRAgQOBRsHgk8BgX5XAy8BDkKSTY82AYE6AooPEHqBMYEBgggBAQYEBIFKQ?=
=?us-ascii?q?YJ/DQuCNQMGgToBgw2CfhNBSgEBgR6DO4ItJxyBSUSBFAEnDBCCZz6CIUIBA?=
=?us-ascii?q?QIBgSMFAQcLASAugms3gi6PXAEQAVoIFhoOGQsEDRAFBQgDEQ4CAh4CJAoLG?=
=?us-ascii?q?AgKDActCA0EAQELEwQBAQYJHwsLHhGRQhoEB4M/iRk7jR+REj1oCoM6ilOOR?=
=?us-ascii?q?oVrBS2DbYt1hk2LToUxlhaDdYkDg0iQQgQTCQFLhB4CBAIEBQIOAQEGgTAxO?=
=?us-ascii?q?2lwcBU7KgGCPj4TGQ+IIYV/DBaBBAECgklGhE6FSQF0AjYCBgEKAQEDCZNvA?=
=?us-ascii?q?QE?=
IronPort-PHdr: A9a23:VCDRDBzfE66S97HXCzPDngc9DxPP8537OwcU7twsjLcdOqig/pG3O
kvZ6L0tiVLSRozU5rpCjPaeqKHvX2EMoPPj+HAPeZBBTVkJ3MMRmQFzD8uMCEm9J/nvPGQ2G
c1YXwpj+He2eUFeBMf5YQjUpXu/pT4fExnyL0x7POPwT4XTlM+wkeu1/s67Xg==
IronPort-Data: A9a23:S7Pzb6p+QnPdHyaEMyIamCnPtyheBmJbZBIvgKrLsJaIsI4StFCzt
garIBmBa/6OYGegKNtxYIi+oRkG7JfUx4U3G1RvpHpgRnsTp+PIVI+TRqvS04x+DSFioGZPt
Zh2hgzodZhsJpPkS5PE3oHJ9RGQ74nQLlbHILOCan8ZqTNMEn970Es6wbJh2OaEvPDga++zk
YKqyyHgEAfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFJZH4rHpxdGlOjKmVi8kFWc
M6YpF2x1juxEx7AkbpJmJ6jGqEBaua60QRjFhO6VoD66iWuqBDe3Y4ybNoeb0pJ1A+Pht53l
+pdnoyNRzc2a/ikdOQ1C3G0Egl3OalAvbTAO3X67oqYzlbNdD3nxPAG4EMeZNJDvL0pRzgVs
6VEcFjhbTjb7w6y6LmjS+Zqj9gqBMLqJ4gY/HpnyFk1CN55EM2cEviTuIAwMDEYlsBcROjMQ
+AjM3lsSUvkYl5tG2kuB8dr9AuvrjylG9FCk3qXrK86+C7VigNs0bPtOcDZUtKXWdhPk1mVp
yTN+GGRKgoUP/SexCaLtHW2iYfnnyb7Ho4TDrCz6tZoh1CXxmUXEBAMUx2wpvzRokGkVt1eL
k0O4Sk/hac3/U2vCNL6WnWFTGWstxoYXZ9bFPc3rV7LwavP6AHfDW8BJtJcVOEbWAYNbWRC/
je0cxnBXFSDbJX9paqhy4qp
IronPort-HdrOrdr: A9a23:LS6roKy1H+iOctc7Xb1uKrPxj+skLtp133Aq2lEZdPULSK2lfp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X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.87,260,1631577600";
d="scan'208,217";a="795795157"
Received: from alln-core-7.cisco.com ([173.36.13.140])
by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA;
24 Nov 2021 16:08:57 +0000
Received: from mail.cisco.com (xbe-rcd-004.cisco.com [173.37.102.19])
by alln-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 1AOG8vJi006156
(version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK);
Wed, 24 Nov 2021 16:08:57 GMT
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-rcd-004.cisco.com
(173.37.102.19) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Wed, 24 Nov
2021 10:08:57 -0600
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xfe-rcd-004.cisco.com
(173.37.227.252) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Wed, 24 Nov
2021 10:08:56 -0600
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (173.37.151.57)
by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14
via Frontend Transport; Wed, 24 Nov 2021 10:08:56 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=FpdWDaMtuJtXKKRLOwdRaWcwTloLbfV46h4y9gQZC7oeyslMcfbA+o5RHAA/6lYY9gWcPHgwB+5wn7TqFi2rf1ZgtOev/F9CmbK/WNpL1KZy1CgouJVl3geEKr7Dhq8XuW0aTdU8Bx42WehEn0tjzlTd3tkG0gLLayVHQt82ZGsi691LfYI4uOoR6xGOIHxsfYCFFRw85dsTjrdrhzs6e80rcikv1a3jC8wqIPNVMYUXakyrNdaD0qEvHbj3RL/MTQF3RQKqVlYpJuNHmtZNR9UQz1ME570Wq0FMTDqhEQdVUaI3nRdpA62FtzjCsuUbQ0kky2tTAdYpm4ysDN6a5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=mNddjtAvBpm9vfn2aI7saNtYGCQiAe09M1YeqJ8ODWA=;
b=JD1HUL35bVzmk12U8VY9/4toLIY2wKA7/vEemw2VThPoclc8vi7X59fMQrToto+QNzWVaXQMOJht4DQ8OvcKmPobhXRKo3WPjoeknZglRO7IfzRDWm8xXAE8sW3QvEgbD/1Nx/lz49dQ4r8ua2Jb7oyLTz6YQoca/n/LYeMDcqjTr6qd9gb+bMO68spMRn49UiXhk16bxwEmFipol3qYANNyugYte0gzLd5oTxff3o5LeTYYja3gG3QwRvh/TH1ltzwQWjgnmETEdZcQEX0KrdUufA/CdcqBBxIxKAqqd5i0rPnGuzuTqiY7fUdDrhlgFNKLX20u755+q7/i5FYNfw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com;
dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;
s=selector2-cisco-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=mNddjtAvBpm9vfn2aI7saNtYGCQiAe09M1YeqJ8ODWA=;
b=TBH6Eu2V+tk2zLChsJ2zaDsz5NCUkRLJXQWCrbM/ll+FYcQsMmXOX60rP8kBKlaO+egWEnXWU7Z1dCoP+ZuurPq/BEgBgI3IoP8mKjurKd56MhuNfsHFsPXcitVivI3qt/Ybn3oDBJixEwQiMDNgXKRr8LsnIPeM/xWvZmfvgXo=
Received: from SJ0PR11MB5629.namprd11.prod.outlook.com (2603:10b6:a03:3ab::13)
by SJ0PR11MB5599.namprd11.prod.outlook.com (2603:10b6:a03:3af::21)
with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4669.15; Wed, 24 Nov
2021 16:08:54 +0000
Received: from SJ0PR11MB5629.namprd11.prod.outlook.com
([fe80::852:6fc4:7dcc:331d]) by SJ0PR11MB5629.namprd11.prod.outlook.com
([fe80::852:6fc4:7dcc:331d%3]) with mapi id 15.20.4713.025; Wed, 24 Nov 2021
16:08:54 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: Joel Halpern Direct <jmh.direct@joelhalpern.com>, "sfc@ietf.org"
<sfc@ietf.org>, James N Guichard <james.n.guichard@futurewei.com>
Thread-Topic: [sfc] Regarding last call for draft-ietf-sfc-multi-layer-oam
Thread-Index: AQHXz1F5VJOSQmp5JUWoFDH4F9jk5KwCudcAgAjtvoCAABcDgIAHNwmAgAAG4oA=
Date: Wed, 24 Nov 2021 16:08:54 +0000
Message-ID: <AE15E454-5D37-4B4F-8974-D22CD5B469EE@cisco.com>
References: <4bb5abb4-a8dc-c8f0-9b99-549f683e7729@joelhalpern.com>
<05FDF1D8-6CBD-403B-8F51-88E51346A36F@cisco.com>
<CA+RyBmXHhjyqTtc0pVtwmTRku-SV+0cFf7tFL_xOHnQ56xBvfQ@mail.gmail.com>
<BD6EBECC-E7C7-4A80-8972-9DD008FF81B1@cisco.com>
<CA+RyBmWbkrbnnEh0mGrfSUyO4=2eGRo=KNR1vXz8sf9LnsUBYw@mail.gmail.com>
In-Reply-To: <CA+RyBmWbkrbnnEh0mGrfSUyO4=2eGRo=KNR1vXz8sf9LnsUBYw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.20.0.1.32)
authentication-results: gmail.com; dkim=none (message not signed)
header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a8b47f2f-d91b-4566-56b5-08d9af64b6b0
x-ms-traffictypediagnostic: SJ0PR11MB5599:
x-microsoft-antispam-prvs: <SJ0PR11MB5599F6FC079B1F95ED55C0ABC7619@SJ0PR11MB5599.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6430;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM;
H:SJ0PR11MB5629.namprd11.prod.outlook.com; PTR:; CAT:NONE;
SFS:(366004)(38070700005)(2906002)(2616005)(6486002)(26005)(86362001)(6916009)(83380400001)(36756003)(33656002)(66946007)(64756008)(54906003)(8936002)(8676002)(91956017)(53546011)(76116006)(4326008)(966005)(71200400001)(6512007)(30864003)(66476007)(66446008)(316002)(6506007)(66556008)(5660300002)(122000001)(186003)(508600001)(166002)(38100700002)(69594002)(45980500001)(559001)(579004);
DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?aFZIbG5GeHJ1dnhkUTJmalhBMHk2Vktwa1dlVTJpQ1V0K2tWWXpDei9XTjVw?=
=?utf-8?B?SkM2REJXV0dlaXZqNlRnQ1hDRlNFeUZHbm9uZTl5UXZzOEw1dXcwSS9WdnVv?=
=?utf-8?B?SzZzenhVNk1hZ3ZsYjZFN3Y3YmJ6VDY3REE2Kyt1RStEbEhTRXAzVDBZbUVz?=
=?utf-8?B?cDIrV3lYaC9UV0VOTVZKWjBkSFJLZmlUVXBPdEYwQmRodFJ0WXRkM1FDbm9V?=
=?utf-8?B?dzlhYXZNWThLYmZ6TENReWx2U09RYlMzWUVjWTdRL2xQc3lrMjdxOFNkY3VO?=
=?utf-8?B?VGl6aHNoS215NHRxRWtBU2xmTVFtaWdOZ1BTVVpzak1CZTRlNGJoNklmbGlZ?=
=?utf-8?B?OWlLVnYrY2ZNaWFwOUU3VWJwdkFacFlwODR3ZmhybkFrcFVOaTFOMU0wUFpR?=
=?utf-8?B?VjVEME81c1M3bldqcUNhb2FWODk5Y1BiYUdtOVRqczQwYjFrWUpEU1ZrZmhv?=
=?utf-8?B?cFJML3dieEpFOVBoNWFvNnhFbk1jeU5nSk9nR2pwS2hReUFrRnhiNVdqSUEw?=
=?utf-8?B?YjN4eWNHSlkzUmFYYzdJRjRPMzFWVUV4U0RCZ0pCVFUrNlM5c3lWdXF2aEsz?=
=?utf-8?B?eTRWR1cxTmUxNjlpbGlsamtTZkVVaEFqeHlUd1pkbmIwRkVZbGthWDBJMnJS?=
=?utf-8?B?b0g3L3BqaGoxMzREM0RieHdCbVNGYWVsUW9FWUJuZ0pWeDZxY0lWNitKTGRX?=
=?utf-8?B?bGNrUWxoaXllL3liL1NqNUF3TlVSUzNxc0NIV1IyUXNnMDJmYXAxN2tXSFZ0?=
=?utf-8?B?TkM5NWp6RzF1Ymdjd1o5YXZibU1qT3dielRHU3Mrekg0djhYMnNDV1Q1YVZT?=
=?utf-8?B?SW0wNHB0dkQvOVNvVTYyVk9ib2IrY2p0czZwOTBnQ0FFQUtYOVoxZEUrQ0Fa?=
=?utf-8?B?UzFzR1dPcHhDenlpZSt0aXNnUDZLbExFUkVWUTJYSkI0cHdiYytEbk5XMk56?=
=?utf-8?B?ZzFLUTVrbGxFOVhXTlhxK25sOTR6KzBCSmJQOS9zdUJUa3Y0NnBZS3ZzcERy?=
=?utf-8?B?S3ByaldRa0Y2SjRRVlJibkt6OVNhL3ZUb2xFZndZbTVIQ1VwV2p5KzJxekxQ?=
=?utf-8?B?UnBHemNINHpJZTRXZVFEUkUydmlvZXVaOGtFdmRJQWZScU15bmRnRlRFU0hh?=
=?utf-8?B?U3dkT1JUN3oyZUo5ZWlaMSszeGNVZXl1dGYvWS83eWdiUkxvdlhIQUdDTlpK?=
=?utf-8?B?eUV2ei9acnU3YVNSNjk5cEo0SURHNFE5TWFrYlc2RkR3emhPVnRQOWMvbm5N?=
=?utf-8?B?STFzbVVpbjk0Y1BqeExJeFFPeithQTg2b243cmdYQVphdTdKaG5zRENTK2FQ?=
=?utf-8?B?MmZpb0JlSVRBOWJsY3JvUkFRdTBEV1lnRzBIT2FWWGI5bUliVTA5ZEYydUpH?=
=?utf-8?B?QWpVeVkwajVFUkdFaWMvbjFHcTVvZ0s2L2Y2clRVZzFlZldrZDM1OC8wbXFH?=
=?utf-8?B?ZmY1VHNKekdHVFJXOXJpMjdPTk9pa1lPUzVTbnkyWXBHZTQ3VlYwZGpQVWJV?=
=?utf-8?B?OVdkR0J2MERGdUJZZ2loUGVwM2VoS3RBUE9ZeG5ra2tIdDhxa0U3VDhHTFk0?=
=?utf-8?B?TUpvM0FOcUNHMlVQeTNwc1ViMXRsQTVZWVFKZ2lIZXVUK0tjOHRCVmMzMWox?=
=?utf-8?B?Q2lTUjNJRmVKQ0NNWHBJUmNXaWZsaHRJRWZZMTFxQVp1ckFDa2RxRzNMNlhD?=
=?utf-8?B?SER2clFITzZaVXV3K0NoNlI4QzRmRU9xZnpmekpQcDc2THIrY0E5alNMQWVh?=
=?utf-8?B?UE8vYjdHWkRlR2tHS3gvNEdCQlhMQUxZWVk2d1ZWRXM3UmMya2J2WnRFQUV4?=
=?utf-8?B?bVJJbW9rS2x3VlhvSVNiaDI0ek55MUdXTDhaaTZYUithNXRsZE5EdS9iaUVs?=
=?utf-8?B?T1ZXOGR1L0Y4VllwK3J1YU9OQ2FlREJlWDBUYXFaVEVMODVzSGFSSFhvYUxF?=
=?utf-8?B?YmFlelhsUVdCV3pjMUpqRDJWcDl0SVNKOVJOKzFpSk1OZWdZMUZPU2ZkVXIx?=
=?utf-8?B?NGNoYlVMeFNrUU9rZnphM2thYTZEbENoTGRFektBQmhaRzV1NUNkRENGcCs3?=
=?utf-8?B?WlpDdmZ4dVV5MFRCOUM0VUFCbnRFcFhva21qR0dIT2JLM3AyNnF3NGU2Yzkx?=
=?utf-8?B?dXgzK1VUZFBnaWNvSHlDWFNlUmxiOVlYTTU1d0w2N2p1Rm1seDRPSElmbzBC?=
=?utf-8?Q?HUN1VbZ1VmzbLdhqkHgZaSwKiGrn7+04VUt32SA/gelh?=
Content-Type: multipart/alternative;
boundary="_000_AE15E4545D374B4F8974D22CD5B469EEciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5629.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a8b47f2f-d91b-4566-56b5-08d9af64b6b0
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Nov 2021 16:08:54.4125 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fXo+rwrmn+QlehM8uoWv1erGQG8feXSilhhtxGzU2/gVVGuGSllWBuaFmqKKhVZFiAHBd+dyXBJhcK5lBSdZJw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5599
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.19, xbe-rcd-004.cisco.com
X-Outbound-Node: alln-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/FIN_10VQcKcVf9g5WjM8mUfUi5A>
Subject: Re: [sfc] Regarding last call for draft-ietf-sfc-multi-layer-oam
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>,
<mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>,
<mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Nov 2021 16:09:07 -0000
Dear Greg,
Please see inline.
Best,
Carlos.
On Nov 24, 2021, at 10:44 AM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
Dear Carlos,
please find more responses in-line below under the GIM2>> tag.
Regards,
Greg
On Fri, Nov 19, 2021 at 5:33 PM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
Dear Greg,
Thank you for replying to my email. Please find a couple follow-ups inline, as I invite other WG interested parties to the discussion.
11/19/21 午後7:11、Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>のメール:
Dear Carlos,
thank you for your thorough review and detailed comments. Please find responses in-lined below under the GIM>> tag.
Regards,
Greg (on behalf of the authors)
On Sat, Nov 13, 2021 at 11:50 PM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
Hello, WG,
In reviewing draft-ietf-sfc-multi-layer-oam-16, I find that the issues listed below are such that I cannot support publication.
Observing what appears to be a single non-author response to the original WGLC email, and one more after this extension, I also perceive the energy level to work on this to be low.
Please find some review comments and observations, I hope these are useful:
Active OAM for Service Function Chaining
draft-ietf-sfc-multi-layer-oam-16
Abstract
A set of requirements for active Operation, Administration, and
Maintenance (OAM) of Service Function Chains (SFCs) in a network is
presented in this document. Based on these requirements, an
encapsulation of active OAM messages in SFC and a mechanism to detect
and localize defects are described.
First, a generic comment on the whole document: Even though the WG produces an SFC OAM framework in rfc8924, I cannot find exactly how draft-ietf-sfc-multi-layer-oam follows or maps to such framework.
* rfc8924 lists requirements in S4, but this document mentions them in passing. Instead, as per the Abstract above, this document creates new requirements and based on them creates a new OAM protocol.
GIM>> We've followed the requirements listed in RFC 8924 and used them when designing SFC Echo Request/Reply. SFC Echo Request/Reply addresses the essential requirements in Section 4 of RFC 8924.
CMP: That’s an issue, those are not requirements for a new protocol. Neither for a single protocol to perform all functions.
CMP: Specifically, RFC 8924 says:
CMP: “7. Candidate SFC OAM Tools”
CMP: Why were candidates descarted? When it is shown how they can address some of the functions.
GIM2>> I don't think that the proposed mechanism discards or negates any of the tools listed in RFC 8924. SFC NSH Echo Request/Reply is targeted to specifically SFC NSH operational needs is not to replace but to complement other OAM tools. The choice of which tool from the SFC OAM toolbox to use is, as always, with vendors and operators.
CMP2: Sorry if I was not clear, let me ask differently. Where is the documented tradeoff and decision for creating a new protocol versus extending existing ones which partially address requirements? Indeed, I agree operators and vendors have a choice, my question is in regards to the WG decision to build new vs. extend.
* rfc8924 lists candidate SFC OAM tools, but this document does not consider them. Or compare requirements to options. Perhaps I could be pointed to the discussion on the list?
GIM>> RFC 8924 already provides the analysis and pointed out gaps in listed protocols. RFC 8924 has concluded that none of the available tools complies with the requirements.
CMP: I do not see that conclusion in RFC 8924, perhaps you can quote / copy/paste the relevant text. The specific text that includes a conclusion. And specific text that says that none of the tools comply with the requirements.
CMP: In any case, there is also no implication that creating a new protocol for all requirements and ignoring the analysis of existing protocols that can be used or extended is in the best interest of SFC’s OAM.
CMP: Additionally, I did not see the discussion on the list of this comparison (since it does not exist in the draft).
CMP2: You seem to have missed these 3 comments. Could you please address?
Additionally, I wonder: Why the file name “sfc-multi-layer-oam”?
GIM>> It is historical.
Active OAM tools,
conformant to the requirements listed in Section 3, improve, for
example, troubleshooting efficiency and defect localization in SFP
because they specifically address the architectural principles of
NSH. For that purpose, SFC Echo Request and Echo Reply are specified
in Section 6.
I do not fully follow these cause-consequence pair of sentences. They seem to be foundational to the rational of the document, is this why a new OAM protocol is used?
GIM>> Indeed. Based on the analysis in RFC 8924, we've learned that none of the available OAM tools can address the requirements for active SFP OAM. The SFC Echo Request/Reply is specifically designed to address these requirements.
CMP: This is a very useful response. As I responded above, there’s no implication that if no existing tools address all requirements, the path is to create a brand new one ignoring the existing ones.
GIM2>> I believe that the WG has demonstrated its support for the proposed solution.
CMP2: I thought statements like these are within the scope of a WG chair.
CMP2: From a technical perspective, it is a useful engineering piece of data to understand why a new protocol.
Anyone can propose an alternative technical solution in the traditional IETF form.
Specifically, I feel this document over-reaches in that it presumes that the only “Active OAM” protocol for NSH SFCs is this new protocol, whereas some of the existing protocols listed in rfc8924 are also “Active OAM”.
GIM>> I think that the document is positioned not as a general active OAM protocol but as one of the active SFC NSH OAM protocols.
This mechanism enables on-demand Continuity Check,
Connectivity Verification, among other operations over SFC in
networks, addresses functionalities discussed in Sections 4.1, 4.2,
and 4.3 of [RFC8924].
This could be well the case — however many others (including existing) mechanisms also enable in these broad terms all the connectivity+continuity+trace functions.
GIM>> We are not questioning that there are other solutions. But these mechanisms are not supported by specifications that ensure independent interoperable implementations.
CMP: Can you please point to independent interoperable implementations of draft-ietf-sfc-multi-layer-oam?
GIM2>> I was told of interest in developing implementations based on the mechanism defined. Certain hesitation to be an early adopter is understandable to me.
CMP2: Shall I understand this as you cannot point to any implementation?
CMP: Part of my point is that any partial solution can be extended interoperably.
At the same time, this mechanisms is very complex.
I would like to see a study of comparative benefits of this added complexity vis-a-vis existing approaches that can be extended.
GIM>> In the face of absence of sufficient and up to date documentation describing proprietary solutions, I don't see that any comparison can be comprehensive.
CMP: I am not sure if you are answering a different question, but there’s no reference to any proprietary solutions.
CMP: ICMP, BFD, iOAM, SFC-Tracceroute, all documented in I-Ds and with open source implementations.
GIM2>> Looking at this list, the SFC NSH Echo Request/Reply mechanism is not an alternative to BFD or IOAM.
CMP2: ICMP?
The ingress may be
capable of recovering from the failure, e.g., using redundant SFC
elements. Thus, it is beneficial for the egress to signal the new
defect state to the ingress, which in this example is the Classifier.
Hence the following requirement:
REQ#3: SFC OAM MUST support Remote Defect Indication notification
by the egress to the ingress.
I see a gap between “it is beneficial” and “MUST”. What is "Remote Defect Indication” in the context of SFC OAM since it is not in the OAM framework? Is this "Remote Defect Indication” the only way to achieve the rerouting or redundancy triggering?
GIM>> That is one of possible solutions. Other mechanisms may conform to the requirement using different approach.
4. Active OAM Identification in the NSH
The O bit in the NSH is defined in [RFC8300] as follows:
O bit: Setting this bit indicates an OAM packet.
This document updates that definition as follows:
O bit: Setting this bit indicates an OAM command and/or data in
the NSH Context Header or packet payload.
Active SFC OAM is defined as a combination of OAM commands and/or
data included in a message that immediately follows the NSH. To
identify the active OAM message, the "Next Protocol" field MUST be
set to Active SFC OAM (TBA1) (Section 9.1).
This is an example of over-reach. A “Next Protocol” pointing to IPv4, in turn pointing to ICMP, in turn pointing to Echo is already one example of “Active SFC OAM”. I wonder if this new protocol might be best served by choosing a name that is not so generic? It could be called “One of many active SFC OAM protocols” :-)
GIM>> Will clarify that throughout the document "active OAM" and "active SFC OAM" refers to specially constructed packets that immediately follow the SFC Active OAM Header (Figure 2).
CMP: The “SFC Active OAM Header” is therefore not part of the “active SFC OAM” packet?
GIM2>> SFC Active OAM Header is a part of an active SFC NSH OAM packet.
CMP2: In that case, shall I understand that the “SFC Active OAM Header” cannot be part of other OAM packet. In that case I am very confused as I read:
CMP2: " Msg Type - six bits long field identifies OAM protocol, e.g., Echo"
CMP2: " Request/Reply or Bidirectional Forwarding Detection."
CMP2: Why would BFD be carried in the middle of SFC Active OAM? Why not use the NSH Next Protocol as intended?
Otherwise, the “MUST” in the last sentence seems to not follow.
The rules for
interpreting the values of the O bit and the "Next Protocol" field
are as follows:
I am extremely concerned about this attempted re-definition (of the O-bit and Protocol fields). On several fronts as explained below. During RFC8300 the WG evaluated these and provided a solution already.
* O bit set and the "Next Protocol" value does not match one of
identifying active or hybrid OAM protocols (per classification
defined in [RFC7799]), e.g., defined in Section 9.1 Active SFC OAM
(TBA1).
This potentially breaks the concept of nodes not understanding OAM (i.e,. Partial deployment of a new protocol)
GIM>> Can you clarify what do you mean by "nodes not understanding OAM"? Partial deployment is, in my opinion, an operational issue. An operator plans deployments of new releases according to new features and their intended use.
CMP: Apologies, I meant not s/understanding/parsing/.
CMP: I agree it is an operational issue — an issue of operations. Like the “O” in “OAM”. Should Operational Considerations be included as well?
GIM2>> I think that it is helpful to provide some operational suggestions in the Operational Considerations section. Will work with co-authors.
- a Fixed-Length Context Header or Variable-Length Context
Header(s) contain an OAM command or data.
- the "Next Protocol" field determines the type of payload.
The semantic of Context Headers is outside this definition. For example the types in MD Type 2 define the variable headers.
This potentially breaks also OAM, since things like ECMP can be encoded in context headers that the OAM needs. (e.g., "Flow ID” from draft-ietf-sfc-nsh-tlv).
GIM>> As I understand it, MD Type 2 Flow ID TLV is recommended to identify a flow in SFC NSH. The document makes the use of this method.
CMP: How?
GIM2>> In Section 6.5.4 of the draft:
Suppose a specialized information element (e.g., IPv6 Flow Label
[RFC6437] or Flow ID [I-D.ietf-sfc-nsh-tlv]) is used for distributing
the load across Equal Cost Multi-Path or Link Aggregation Group
paths. In that case, such an element MAY also be used for the SFC
OAM traffic. Doing so is meant to induce the SFC Echo Request to
follow the same RSP as the monitored flow.
CMP2: I may have misunderstood — if so apologies in advance — however, when I read "a Fixed-Length Context Header or Variable-Length Context Header(s) contain an OAM command or data” I thought Context Header (e.g., MD Type 1) was user for OAM, it could not be used for Flow ID as well.
Further, is this describing a Hybrid OAM use?
GIM>> No, the document does not describe the use of hybrid OAM (per RFC 7799).
* O bit set and the "Next Protocol" value matches one of identifying
active or hybrid OAM protocols:
- the payload that immediately follows the NSH MUST contain an
OAM command or data.
This is also unclear — what is an OAM command or data? If the O-bit is set, it is an OAM packet.
GIM>> What is an OAM packet? Is an SFC NSH packet with IOAM an OAM packet or not? If an SFC NSH packet is part of flow under the Alternate Marking, is it an OAM packet because the Alternate Marking method is an example of the hybrid OAM?
CMP: This reads like not answering by asking questions.
GIM2>> I am trying to understand the question. RFC 7799, as I understand it, defines an active OAM packet as a specifically constructed test packet.
CMP2: RFC 7799 does not include the terms “OAM Command” or “OAM Data"
CMP: A user packet with marking, implicitly or explicitly, is not an OAM packet.
GIM2>> Frank has brought very good points and suggested excluding hybrid OAM. Now the text is applicable only to active SFC NSH OAM:
CMP2: I agree with removing any Hybrid OAM from the “SFC Active OAM” document. For sure.
CMP2: at the same time, what specifically needs to be redefined for the O-bit (as opposed to say “use it as intended in 8300”)?
The rules for
interpreting the values of the O bit and the "Next Protocol" field
are as follows:
* O bit set and the "Next Protocol" value does not match the value
Active SFC OAM (TBA1), defined in Section 9.1:
- An SFC NSH Context Header(s) contain an OAM command or data.
- The "Next Protocol" field determines the type of the payload.
* O bit set and the "Next Protocol" value matches Active SFC OAM
(TBA1) value:
- The payload that immediately follows the NSH MUST be the
Active OAM Header (Section 5).
* O bit is clear:
- No OAM in an SFC NSH Context Header(s).
- The payload determined by the "Next Protocol" field MUST be
present.
* O bit is clear, and the "Next Protocol" field is set to Active SFC
OAM (TBA1):
- Erroneous combination. An implementation MUST report it.
The notification mechanism is outside the scope of this
specification. The packet SHOULD be dropped. An
implementation MAY have control to enable processing of the OAM
payload.
* O bit is clear:
- no OAM in a Fixed-Length Context Header or Variable-Length
Context Header(s).
- the payload determined by the "Next Protocol" field MUST be
present.
It is unclear the rational for this.
GIM>> Can you please clarify your interpretation, so we can look for ways to improve the text?
CMP: Same as above. It is unclear why these rules. It is not a matter of interpretation.
* O bit is clear, and the "Next Protocol" field identifies active or
hybrid OAM protocol MUST be identified and reported as an
erroneous combination. An implementation MAY have control to
enable processing of the OAM payload.
This seems to break the existing usage in draft-ietf-sfc-ioam-nsh. Section 4.2 of draft-ietf-sfc-ioam-nsh says clearly:
GIM>> I don't see any problem. In fact, both definitions are in sync. According to draft-ietf-sfc-ioam-nsh if the Next Protocol field identifies a use data payload, e.g., IPv6, then O bit MUST NOT be set. If the Next Protocol is set to IOAM, then the O-bit MUST be set.
CMP: Sorry, but you do not seem to be actually reading draft-ietf-sfc-ioam-nsh. Please refer to:
CMP: https://datatracker.ietf.org/doc/html/draft-ietf-sfc-ioam-nsh#section-4.2
CMP: 4.2. IOAM and the use of the NSH O-bit
[RFC8300] defines an "O bit" for OAM packets. Per [RFC8300] the O
bit must be set for OAM packets and must not be set for non-OAM
packets. Packets with IOAM data included MUST follow this
definition, i.e. the O bit MUST NOT be set for regular customer
traffic which also carries IOAM data and the O bit MUST be set for
OAM packets which carry only IOAM data without any regular data
payload.
CMP: Please note the “MUST NOT” in the paragraph immediately above.
GIM2>> We've agreed with Frank to not discuss hybrid SFC NSH OAM in this draft.
CMP2: Sounds good — why does the O-bit need to be discussed in any case?
We agree in how O-bit works in presence of IOAM that accompanies user data and without it.
CMP: I do not see that agreement.
4.2. IOAM and the use of the NSH O-bit
[RFC8300] defines an "O bit" for OAM packets. Per [RFC8300] the O
bit must be set for OAM packets and must not be set for non-OAM
packets. Packets with IOAM data included MUST follow this
definition, i.e. the O bit MUST NOT be set for regular customer
traffic which also carries IOAM data and the O bit MUST be set for
OAM packets which carry only IOAM data without any regular data
payload.
5. Active SFC OAM Header
As demonstrated in Section 4 [RFC8924] and Section 3 of this
document, SFC OAM is required to perform multiple tasks. Several
active OAM protocols could be used to address all the requirements.
When IP/UDP encapsulation of an SFC OAM control message is used,
protocols can be demultiplexed using the destination UDP port number.
But extra IP/UDP headers, especially in an IPv6 network, add
noticeable overhead. This document defines Active OAM Header
(Figure 2) to demultiplex active OAM protocols on an SFC.
Does this paragraph imply that the main reason for this protocol is this perceived overhead? If so, experience seems to show that in practice IP-encaped OAM works fine (as e.g., for LSP Ping).
GIM>> Isn't IP/UDP encapsulation, and IPv6 in particular, is a larger overhead?
CMP: I am sorry Greg to call this out, but you are choosing again to not answer the question and instead ask another one.
CMP: I am happy to answer: it is larger. It also does not matter. And further it is proven to work in LSP Ping.
CMP: My question again: is the whole purpose of this new protocol to be overhead efficient? I am sure there are ways of encasulating that are more overhead-efficient than draft-ietf-sfc-multi-layer-oam.
GIM2>> The purpose of the specification is to address specific SFC NSH OAM requirements. The proposed solution is one of possible that can be implemented. Encapsulation efficiency is a benefit.
Alternatively, “Next Protocols” could be defined for “raw” existing protocols.
Msg Type - six bits long field identifies OAM protocol, e.g., Echo
Request/Reply or Bidirectional Forwarding Detection.
Why does BFD get encapsulated in this new protocol, as opposed to using a “Next Protocol” for it? That looks like unnecessary overhead and indirection.
GIM>> Are you proposing assigning different Next Protocol values for every possible active OAM protocol?
CMP: I am not proposing anything. I am simply asking a question.
GIM2>> draft-ietf-sfc-multi-layer-oam does not include BFD in SFC NSH in its scope.
CMP2: The text in the document that I quoted above seems to contradict your statement.
Flags - eight bits long field carries bit flags that define
optional capability and thus processing of the SFC active OAM
control packet, e.g., optional timestamping.
Does this timestamp conflict with context header timestamps? E.g., rfc8592 or draft-mymb-sfc-nsh-allocation-timestamp.
GIM>> What do you see as a potential conflict?
CMP: Two timestamps in different parts of a packet.
GIM2>> RFC 8592 has been published through the Independent Stream Editor. As I understand it, draft-mymb-sfc-nsh-allocation-timestamp is also in the ISE track. I'll reach out to the authors of draft-mymb-sfc-nsh-allocation-timestamp to see if any considerations should be added in their document.
CMP2: I would suggest that this document also needs to figure out non-clashing proposals.
6. Echo Request/Echo Reply for SFC
Echo Request/Reply is a well-known active OAM mechanism extensively
used to verify a path's continuity, detect inconsistencies between a
state in control and the data planes, and localize defects in the
data plane. ICMP ([RFC0792] for IPv4 and [RFC4443] for IPv6
networks, respectively) and [RFC8029] are examples of broadly used
active OAM protocols based on the Echo Request/Reply principle. The
SFC Echo Request/Reply defined in this document addresses several
requirements listed in Section 3. Specifically, it can be used to
check the continuity of an SFP, trace an SFP, or localize the failure
within an SFP. The SFC Echo Request/Reply control message format is
presented in Figure 3.
This seems to be an important paragraph — would be useful to also understand how other existing and broadly used protocols cannot fulfill requirements.
GIM>> RFC 8924 already provided a comprehensive analysis and concluded that none of the available tools can fully conform to the requirements listed in Section 4.
CMP: As per above, I do not see that conclusion.
CMP: And frankly even if that was the case, there’s no implication that using the existing pieces is not sufficient, or that it is not easier to extend the candidate protocols.
GIM2>> I think that RFC 8924 has firmly established that none of the analyzed OAM tools completely addresses all the SFC NSH OAM requirements. Can a combination of tools do the job? I don't know. What is easier seems a subjective issue. If anyone has an alternative technical solution, I'll be glad to discuss that. Otherwise, it appears as hypothetical.
CMP2: I disagree with this approach in principle, as I’d expect the WG to compare feasibility and ROI of approaches before embarking in text. Just my humble opinion.
Length - two-octet-long field equal to the Value field's length in
octets.
There are several nested lengths defined in this document — would be useful to analyze that they do not result in issues such as piggybacking unaccounted data.
GIM>> Do you see any scenario when that might be the case?
6.3.1. Source TLV
Responder to the SFC Echo Request encapsulates the SFC Echo Reply
message in IP/UDP packet if the Reply mode is "Reply via an IPv4/IPv6
UDP Packet". Because the NSH does not identify the ingress node that
generated the Echo Request, the source ID MUST be included in the
message and used as the IP destination address and destination UDP
port number of the SFC Echo Reply. The sender of the SFC Echo
Request MUST include an SFC Source TLV (Figure 5).
This seems to negate the benefit of less overhead, if the IP/UDP fields are embedded as OAM TLVs.
GIM>> Only the Source ID is required, not the whole set of IP and UDP headers.
This also seems to be a bit of an invitation for an attack.
6.4.1. Errored TLVs TLV
I wonder at this point if it is easier to use LSP Ping directly instead of re-define it.
GIM>> If someone wants to explore that option, of course.
6.5.1. SFC Reply Path TLV
…
* Service Index: the value for the Service Index field in the NSH of
the SFC Echo Reply message.
How is the service index in a reply constructed?
GIM>> It is provided by the sender of the SFC Echo Request.
CMP: Does this mean it skips hops? Apologies I do not understand.
GIM2>> The sender of the SFC Echo Request includes SFC Reply Path TLV. The responder must use the Service Index field in the NSH that encapsulates SFC NSH Echo Reply. I hope that clarifies how the Service Index field is used.
CMP2: I am sorry, it doesn’t. How does the sender of the request (i.e., based on what criteria) chooses the Service Index field value in the SFC Reply Path TLV in the SFC Active OAM packet?
6.5.3. SFC Echo Reply Reception
An SFF SHOULD NOT accept SFC Echo Reply unless the received message
passes the following checks:
* the received SFC Echo Reply is well-formed;
* it has an outstanding SFC Echo Request sent from the UDP port that
matches destination UDP port number of the received packet;
Is the demultiplexing based on UDP, OAM handle, or combination?
GIM>> The values of the Sender's Handle and Sequence Number fields can be used.
CMP: I understand several values can be used.
CMP: Which one is actually used?
CMP: If the Handles and sequences match but not the port?
GIM2>> I assume you are thinking of IP/UDP encapsulation of SFC NSH. The receiver of SFC NSH Echo Reply would not check for port. Or are you referring to a different port?
CMP2: I am referring to the port that S6.5.3 of draft-ietf-sfc-multi-layer-oam mentions. "it has an outstanding SFC Echo Request sent from the UDP port that matches destination UDP port number of the received packet;”
CMP2: Based on that the question stands.
6.6. Verification of the SFP Consistency
* Collect information of the traversed by the CVReq packet SFs and
send it to the ingress SFF as CVRep packet over IP network;
What if NSH is not over IP?
GIM>> Then the operator will specify another method using the Reply mode.
CMP: Sorry that does not answer my question. The text in question is not contextual to a specified reply mode.
GIM2>> We'll address that in the new Operational Considerations section.
CMP2: Look forward to reviewing. The text in Section 6.6 still has issues.
SF Type: Two octets long field. It is defined in [RFC9015] and
indicates the type of SF, e.g., Firewall, Deep Packet Inspection, WAN
optimization controller, etc.
Is RFC 9015 a hard dependency to implement this OAM?
GIM>> RFC 9015 established the IANA registry of SF Type and any new SF types must be registered.
IANA is requested to assign a new type from the SFC Active OAM
Message Type sub-registry as follows:
+=======+=============================+===============+
| Value | Description | Reference |
+=======+=============================+===============+
| TBA2 | SFC Echo Request/Echo Reply | This document |
+-------+-----------------------------+---------------+
Is there a single value for both Request and Reply?
GIM>> Yes, it is a single value. Echo Request and Echo Reply are identified in the Message Type field (Figure 3).
CMP: Is this document defining a full 64k space for a single value? If so it appears to be wasteful.
CMP2: You seem to have skipped this comment.
9.2.1. Version in the Active SFC OAM Header
9.3.1. SFC Echo Request/Reply Version
There seems to be a version for the OAM and a version for the msg type. Is this correct? Are they hierarchical versions? Or independent?
This seems to overly complicate parsing and compliance.
GIM>> All versions are independent.
CMP: This seems like an operational unnecessary complexity, in keeping a matrix of supported combination of versions. If there was an Operational Considerations section, this should be included.
GIM2>> Thank you for the suggestion. We'll mention that in the Operational Considerations section.
9.3.3. SFC Echo Request/Echo Reply Message Types
Does this mean that there’s a protocol number for “Active OAM” with a protocol number for “Request/Reply” with a protocol number for either request or reply?
GIM>> These are not all protocol numbers. Only the Active OAM is a new protocol number. Others are message types.
CMP: Apologies I was not clear.
CMP: The “SFC Active OAM” is actually a "SFC Next Protocol”.
CMP: My intention of using “protocol number” is in a generic way. To get to some OAM function, a node needs to recursively parse 3 TLVs. Correct? This seems overly complex.
GIM2>> The NSH's Next Protocol field is in the fixed position. Getting to SFC NSH active OAM doesn't seem to require parsing TLVs, SFC NSH Context Headers can be simply skipped.
CMP2: Concern stands. What is the value of this linked protocol identification check?
CMP2: Thanks again, and best,
CMP2: Carlos.
Values defined for the Return Codes sub-registry are listed in
Table 14.
Various values in this table are not defined in the document. The procedures seem lacking.
GIM>> Other specifications may define additional code points in the registry.
CMP: Thank you. The procedures still seem lacking.
CMP: Best,
CMP: — Carlos.
9.7. SF Identifier Types
This document seems to be creating a space for identifying SFs — which I thought was mostly outside the scope of OAM to test SFs.
GIM>> The registry is of SF Identifiers, not of SF Types (that already exists). Hope that clarifies the issue.
Does this further imply that there’s a new requirement to have unique identifiers within the domain for all SFs?
I hope these comments and review questions and concerns are useful for the WG discussion and consideration.
Thanks,
Carlos.
Nov 1, 2021 2:50 PM、Joel Halpern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelhalpern.com>>のメール:
I have received a polite request with explanation for delay asking for more time to read and review the subject document. Given the state of the working group, i want to encourage any and all review. So I am extending the last call by two additional weeks.
Please read and review the document.
Also, if you are willing to serve as shepherd for this, please let the chairs know. (Don't worry if you have not shepherded a document before. The chairs are more than happy to help you with the process.)
Thank you,
Joel
_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc
- [sfc] Regarding last call for draft-ietf-sfc-mult… Joel Halpern Direct
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Dirk.von-Hugo
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Donald Eastlake
- Re: [sfc] Regarding last call for draft-ietf-sfc-… wei.yuehua
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Gyan Mishra
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Gyan Mishra
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Gyan Mishra
- [sfc] SFC OAM gap analysis [Was Re: Regarding las… Greg Mirsky
- Re: [sfc] SFC OAM gap analysis [Was Re: Regarding… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Linda Dunbar
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Dirk.von-Hugo
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Huzhibo
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Joel Halpern Direct
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Joel Halpern Direct
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Joel M. Halpern
- Re: [sfc] Regarding last call for draft-ietf-sfc-… mohamed.boucadair