Re: [sfc] Progression of OAM work in the SFC WG

mohamed.boucadair@orange.com Wed, 16 February 2022 09:58 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EF603A0D30 for <sfc@ietfa.amsl.com>; Wed, 16 Feb 2022 01:58:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.676
X-Spam-Level:
X-Spam-Status: No, score=-0.676 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL=1.31, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, UNPARSEABLE_RELAY=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id txi9uPpHh7Ko for <sfc@ietfa.amsl.com>; Wed, 16 Feb 2022 01:58:12 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7F493A08C2 for <sfc@ietf.org>; Wed, 16 Feb 2022 01:58:11 -0800 (PST)
Received: from opfedar02.francetelecom.fr (unknown [xx.xx.xx.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar20.francetelecom.fr (ESMTP service) with ESMTPS id 4JzD0y1mTsz8srq; Wed, 16 Feb 2022 10:58:10 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1645005490; bh=FSEH8z+I5uXNT+I4tPlpGevAZF3dsGZMLeDWnTwi0L0=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=K88AMk956u5qUeewK5d4wrl9zjsr7/2umZ0I04LJoKgfJlXEwAYUrsnogqkEn6lL5 hRGBSOsRrpFUZgGVt+Il9XahY2WAoPa64Q1EjWrErg5K0y62vERaGIxXnMPu6OkXTy NBTSzh5yr1LCPr63FTM0Me6/Co4fzlRabyJ+EDwA2ElnFj9aej1AyYaMt1JMMzO4gv B8Kv51ahWWUaAVzGXaXOpxZBDzdRR+hvbWwZR8Wpn15TuoD4jk2u+VUJDECUPfEu0v 3BRWcGPhvVX2Nrd2btPAMu3oUqq+f5X2nf1qkXP5VCOJQPtsk2xzJMqFyu8GsRWNFX B3KyqKUV7P5mQ==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar02.francetelecom.fr (ESMTP service) with ESMTPS id 4JzD0y0HGJzCqkv; Wed, 16 Feb 2022 10:58:10 +0100 (CET)
From: mohamed.boucadair@orange.com
To: James Guichard <james.n.guichard@futurewei.com>, "Carlos Pignataro (cpignata)" <cpignata=40cisco.com@dmarc.ietf.org>, Gyan Mishra <hayabusagsm@gmail.com>
CC: Greg Mirsky <gregimirsky@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Progression of OAM work in the SFC WG
Thread-Index: AdgYYtG+l/ju054uSCa0IEDodR5p4AAI1AYAAgogAwAADsqJgAAEeXQAAAD7PAAAFinEAAAVIwJwAFqOIOA=
Content-Class:
Date: Wed, 16 Feb 2022 09:58:08 +0000
Message-ID: <9274_1645005490_620CCAB2_9274_472_1_787AE7BB302AE849A7480A190F8B933035494AA7@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <MN2PR13MB4206A3B910C9CE55867DA10BD2279@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmWZU-OL-9kb7byfumcGZ_Xktb7Yp=dRQe3QRdCcTwBZcw@mail.gmail.com> <CABNhwV1Fcb9fmh82LeUKTHO7BdYeWp4HyP9aQBGS+x6FEL=fLA@mail.gmail.com> <a47de7f9-bfa3-979a-0e49-1f1c52161d72@joelhalpern.com> <CA+RyBmVY6PBeQ7O_vhtKO4M7bnZhCAdoVzPZJsd9f0jyaEvTWg@mail.gmail.com> <CABNhwV0-nkH5tV13X-G--qf8u0yi9TGYgo2ee+N8PNosm=b1xg@mail.gmail.com> <3CDEE749-5A40-44FF-9E3A-8C8EBBA94849@cisco.com> <MN2PR13MB420658D888711F1FC921556BD2339@MN2PR13MB4206.namprd13.prod.outlook.com>
In-Reply-To: <MN2PR13MB420658D888711F1FC921556BD2339@MN2PR13MB4206.namprd13.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2022-02-16T09:24:55Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=2ad6f3d1-ca61-4561-be90-fcbd4269ad06; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.247]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933035494AA7OPEXCAUBMA2corp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/Mdg10iKDjMZiKAvel5H5ffiOU9I>
Subject: Re: [sfc] Progression of OAM work in the SFC WG
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Feb 2022 09:58:17 -0000

Hi Jim, all,

We had many discussions in the past about the O-bit (including a proposal to tag the flag as reserved and define it when needed [1], deprecate the O-bit [2]) before finally agreeing on the text we have in 8300.

I don’t think we have new arguments to deprecate the O-bit. However, a clarification of intended meaning of “OAM packet” is worth to have. I’m happy to work with other volunteers on a short document that fixes that.

Cheers,
Med

[1] https://mailarchive.ietf.org/arch/msg/sfc/f4RbYlUKKHm53U1eaCvjhMypLc0/
[2] https://mailarchive.ietf.org/arch/msg/sfc/lyTfojhc7iispryG4bX66B7Fci4/

De : sfc <sfc-bounces@ietf.org> De la part de James Guichard
Envoyé : lundi 14 février 2022 15:28
À : Carlos Pignataro (cpignata) <cpignata=40cisco.com@dmarc.ietf.org>; Gyan Mishra <hayabusagsm@gmail.com>
Cc : Greg Mirsky <gregimirsky@gmail.com>; sfc@ietf.org
Objet : Re: [sfc] Progression of OAM work in the SFC WG

Hi Carlos,

Some responses in-line …

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> On Behalf Of Carlos Pignataro (cpignata)
Sent: Sunday, February 13, 2022 11:07 PM
To: Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>
Cc: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] Progression of OAM work in the SFC WG

Replying to this specific email in the thread, only because it is the latest one at this point in time, but bundling comments from various places on the thread. Please find some follow-up comments and questions marked “CMP”, indicating the “From”, and organized chronologically:

James N Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>:

1) The chairs have reviewed the O bit definition in RFC 8300.  That definition is at best open to interpretation and therefore incomplete.  For example, the clear intention is only to mark packets which are intended for SFC OAM at the SFC service layer.  But that is not what the current text says.  There is also, unfortunately, ambiguity as to what constitutes an OAM packet.  So it is reasonable for documents to update 8300 to clarify the exact applicability and action for the O-bit.

CMP: It is unclear to me what exact issues the chairs are calling out. There are two issues mentioned:
CMP: 1. "But that is not what the current text says.” —> what does the text say precisely?  Can you point to the specific RFC 8300 text that is believed to be incomplete, and a detailed use case that showcases the potential issue? An extrapolated counter-example just to make a point: the text does not  say what days of the week OAM packets can be marked, yet there’s an expectation that they will work Mondays and Saturdays all the same — even holidays.


Jim> Currently RFC8300 says “The O bit MUST be set for OAM packets and MUST NOT be set for non-OAM packets”. The first issue is does this mean the O bit should be set for ALL OAM packets regardless of whether they belong to the NSH service plane? Or should it only be set for SFC OAM packets? And what exactly is an SFC OAM packet as the earlier reference to RFC6291 is just a generate set of guidelines for the use of the term OAM. The second issue is that if that O bit is set then Greg’s document is in conflict with IOAM as both use the next protocol field and even if the O bit is set it is meaningless as the protocol action is based solely on the setting of the next protocol field. So in this case can their solutions simply ignore what RFC 8300 says e.g. MUST set the O bit? Or if they set the O bit to be conformant to what RFC 8300 says then do we need clearer rules stating what to do if the next protocol field is NOT an OAM next protocol such as the context headers should then be examined?


CMP: 2. What specifically is the ambiguity with what an OAM packet is? Please grep the RFC series for “oam packet”, it is not a new term.
CMP: Net-net, O-bit=1, OAM packet.

Jim> ambiguity is whether it is only SFC OAM packets that are being discussed or ALL OAM packets nothing that some might be at the service layer and some might not.

Jim

2) However, related to point 1), we can't have multiple documents updating the definition differently.  As such, the authors of the SFC iOAM draft and the SFC multi-layer-oam draft need to come together and figure out what the clarification is for the definition of that bit. We do not believe as chairs that either of these documents can move forward from the WG until such clarity has been reached.

CMP: If there is still believed to be an ambiguity or a clear opportunity for improving the definition, I agree with consolidating that update. I had suggested before that if such new text or real clarification is agreed, a separate document that only makes that O-bit clarification is the most clear and clean way to go. That doc should be a one-pager or less. I’d be happy to contribute to that minimal doc, if it is shown to be needed.

CMP: For completeness also, the "SFC multi-layer-oam” document has many outstanding issues besides the O-bit.

Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>

I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I understand these documents, the Active SFC OAM and IOAM are identified by the respective values for the NSH Next Protocol field (to be assigned by IANA).

CMP: There is a major issue with the sentence above. Active SFC OAM (as a category), as per RFC 8300, needs to be identified by setting the O-bit. No way around that based on RFC 8300. However, the text "the Active SFC OAM” creates confusion since it refer to a specific OAM protocol which has the same name as a the category as well. That name collision is quite unfortunate in my opinion.

At the same time, so far no OAM-specific meta data TLV has been defined. Thus, it appears that one way forward could be to not involve the O bit in the active SFC OAM or IOAM altogether. In other words, to deprecate the NSH O bit.

CMP: RFC 8924 already includes ICMP and BFD as example SFC Action OAM protocols. Those can be encapsulated in IP, in which the Next-Protocol indicates IP — and (as per RFC 8300) the O-bit is set to indicate an OAM packet.
CMP: The proposal of deprecating the O-bit breaks those SFC OAM protocols already included in an RFC.
CMP: That proposal of deprecating the O-bit also breaks Section 4.1 of IOAM.
CMP: This expired I-D yet implemented in open source uses the O-bit: https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-penno-sfc-trace-03.txt&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=z%2BkFgDqH24pyY47wH0JOJgeo2maLlCgfFSp3MZ5KzZc%3D&reserved=0>


Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>

I agree that what makes sense to me as a path forward is to deprecate the O bit and not use in SFC Multilayer OAM and SFC IOAM, as both SFC Multilayer OAM and SFC IOAM are identified by the respective values for the NSH Next Protocol field (to be assigned by IANA), as well as so far no OAM-specific meta data TLV has been yet defined.

CMP: What is the “SFC Multilayer OAM”?
CMP: The O-bit (reading RFC 8300) does not indicate if there is OAM Metadata. It indicates an OAM packet.


"Joel M. Halpern" <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>

As far as I can tell, if we deprecate the O-bit and rely on the next protocol field, we are saying that in practice (not by rule) NSH metadata can not be used for OAM.  That's fine with me as long as we agree on that.

CMP: I do not fully follow this. Can you explain the relationship of the O-bit with Metadata?
CMP: Here’s an example: RFC 8924 shows ICMP as Active OAM. The SFC next protocol is IP, the IP next protocol is ICMP, the O-bit needs to be set.

CMP: Consider the following document, independent submission and in the RFC Publication queue already:
CMP: https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-mymb-sfc-nsh-allocation-timestamp%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=B0%2FQPQTbQruTKzqXfin6ZfEYyauA2KZhq0m8YKSLtLE%3D&reserved=0>
CMP: Is a Timestamp in Metadata an OAM element?

CMP: Consider this proposal https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-mirsky-sfc-pmamm%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=JiikGgXG35%2FW518disuIxAvaWa5FuqvkKcG%2Fayg6R48%3D&reserved=0>
CMP: Where the base header borrows a bit for an OAM function.

CMP: Neither of those have any impact on the O-bit.


Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>

I agree that, as we find SFC NSH now, no OAM metadata has been defined. It appears to me that deprecating the O bit does not affect any of the already defined mechanisms in the SFC NSH.

CMP: It actually does, see my example above.

I think that if a new, for example, MD Type = 2 TLV that is used for any OAM functionality to be proposed in the future, deprecated the O bit would not prevent using such NSH TLV.

CMP: I agree with this — because there is no correlation between MD Type field and O-bit as defined.

Best,

Carlos.



2/13/22 午後12:32、Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>のメール:

Hi Joel

I am in agreement as well with what you have stated that once the O bit is deprecated that NSH metadata cannot be used for OAM and that we would have to now from that point forward rely on the next protocol field as we will be doing for SFC Multilayer and SFC IOAM drafts as well as will have backwards compatible with any already existing defined mechanisms in SFC NSH.

I don’t see any issues or impact with moving forward.

Kind Regards

Gyan

On Sun, Feb 13, 2022 at 12:04 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
Hi Joel,
I agree that, as we find SFC NSH now, no OAM metadata has been defined. It appears to me that deprecating the O bit does not affect any of the already defined mechanisms in the SFC NSH. I think that if a new, for example, MD Type = 2 TLV that is used for any OAM functionality to be proposed in the future, deprecated the O bit would not prevent using such NSH TLV.
What do you think?

Regards,
Greg

On Sun, Feb 13, 2022 at 6:55 AM Joel M. Halpern <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>> wrote:
There is an implication of deprecating the O-bit that I would like to
hear from more WG participants about.

As far as I can tell, if we deprecate the O-bit and rely on the next
protocol field, we are saying that in practice (not by rule) NSH
metadata can not be used for OAM.  That's fine with me as long as we
agree on that.

Yours,
Joel

On 2/13/2022 2:52 AM, Gyan Mishra wrote:
>
> Hi Jim, Joel & SFC WG,
>
> I agree that the RFC 8300 definition of O bit is incomplete and not
> clear as to its intended use.
>
> That is a problem that I agree needs to be rectified.
>
> I understand that we need to get this resolved before we can progress
> Multilayer SFC OAM draft-ietf-sfc-multi-layer-oam-18 and SFC IOAM.
>
> I agree that what makes sense to me as a path forward is to deprecate
> the O bit and not use in SFC Multilayer OAM and SFC IOAM, as both SFC
> Multilayer OAM and SFC IOAM are identified by the respective values for
> the NSH Next Protocol field (to be assigned by IANA), as well as so far
> no OAM-specific meta data TLV has been yet defined.
>
> So we have I believe solid solution and path forward and I support
> deprecating the O bit.
>
> Kind Regards
>
> Gyan
>
> On Wed, Feb 2, 2022 at 5:42 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>
> <mailto:gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>> wrote:
>
>     Thank you, Jim and Joel, for guiding the SFC OAM work and pointing
>     out the issue that must be addressed.
>
>     I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I
>     understand these documents, the Active SFC OAM and IOAM are
>     identified by the respective values for the NSH Next Protocol field
>     (to be assigned by IANA). At the same time, so far no OAM-specific
>     meta data TLV has been defined. Thus, it appears that one way
>     forward could be to not involve the O bit in the active SFC OAM or
>     IOAM altogether. In other words, to deprecate the NSH O bit.
>
>     I greatly appreciate your comments on the proposal to deprecate the
>     NSH O bit.
>
>     Regards,
>     Greg
>
>     On Wed, Feb 2, 2022 at 10:36 AM James Guichard
>     <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
>     <mailto:james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>> wrote:
>
>         Hi WG:____
>
>         __ __
>
>         Having reviewed all of the OAM related documents in our WG, the
>         chairs would like to provide a few comments to hopefully
>         generate discussion and forward progress of this work:____
>
>         __ __
>
>         1) The chairs have reviewed the O bit definition in RFC 8300.
>         That definition is at best open to interpretation and therefore
>         incomplete.  For example, the clear intention is only to mark
>         packets which are intended for SFC OAM at the SFC service
>         layer.  But that is not what the current text says.  There is
>         also, unfortunately, ambiguity as to what constitutes an OAM
>         packet.  So it is reasonable for documents to update 8300 to
>         clarify the exact applicability and action for the O-bit.____
>
>         __ __
>
>         2) However, related to point 1), we can't have multiple
>         documents updating the definition differently.  As such, the
>         authors of the SFC iOAM draft and the SFC multi-layer-oam draft
>         need to come together and figure out what the clarification is
>         for the definition of that bit. We do not believe as chairs that
>         either of these documents can move forward from the WG until
>         such clarity has been reached. ____
>
>         __ __
>
>         3) Related to the SFC iOAM, we need a clear definition of iOAM.
>         There seem to be differences between the definitions in
>         published RFCs, the usage (which is not a definition) in the SFC
>         draft, and the various ippm drafts.  Any such definition will
>         need to be vetted with the ippm working group.____
>
>         __ __
>
>         Again, it would be good if members of the working group beyond
>         the two author teams spoke up about their readings of the
>         documents, and their understandings of what we need.____
>
>         __ __
>
>         Yours,____
>
>         Jim and Joel____
>
>         __ __
>
>         __ __
>
>         __ __
>
>         _______________________________________________
>         sfc mailing list
>         sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
>         https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=R120rPMaYbbRLOv5jGA%2BiAJotLq4BO8fahg3452n2PU%3D&reserved=0>
>         <https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=%2FkotEwodgOcwwpPgrNIIyZ%2BY5tC3bIiegKAjzvo%2BpKI%3D&reserved=0>>
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
>     https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=%2FkotEwodgOcwwpPgrNIIyZ%2BY5tC3bIiegKAjzvo%2BpKI%3D&reserved=0>
>     <https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=%2FkotEwodgOcwwpPgrNIIyZ%2BY5tC3bIiegKAjzvo%2BpKI%3D&reserved=0>>
>
> --
>
> <http://www.verizon.com/<https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.verizon.com%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ONjfg3GZJ5atr1x8BR792XzO%2F9pozjN2GGJBA%2F5jK8w%3D&reserved=0>>
>
> *Gyan Mishra*
>
> /Network Solutions A//rchitect /
>
> /Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com> <mailto:gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>>//
> /
>
> /M 301 502-1347
>
> /
>
>
--
[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.verizon.com%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ONjfg3GZJ5atr1x8BR792XzO%2F9pozjN2GGJBA%2F5jK8w%3D&reserved=0>
Gyan Mishra
Network Solutions Architect
Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>
M 301 502-1347

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.