Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Wed, 05 July 2023 21:38 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54300C1519A8; Wed, 5 Jul 2023 14:38:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.893
X-Spam-Level:
X-Spam-Status: No, score=-11.893 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="JZQV0qWU"; dkim=pass (1024-bit key) header.d=cisco.com header.b="YcnWgHeg"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KTWXETzBdxE6; Wed, 5 Jul 2023 14:38:28 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6F16C14CF17; Wed, 5 Jul 2023 14:38:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=91355; q=dns/txt; s=iport; t=1688593108; x=1689802708; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=vNVFlNM4L7SdLizVk0N+ynhYvn6OSflSM1id70uWNQA=; b=JZQV0qWU+qiF6JTlgY1geByL9LPcnaAgHNNGADCL50JGyYvbQBVqrLtY jZmRTxqBtp2+8yjphZ+3r0WObHpyiN1iga8gS2tH+s8TfCyPGcAXKurMP eQJRSdO51gp9+6NEmq00n6YFO+5aguP9XnGE5uE9CQoCf1ScZvCPejNu0 M=;
X-IPAS-Result: A0AJAAAP4qVkmIwNJK1aGwEBAQEBAQEBBQEBARIBAQEDAwEBAWWBFgYBAQELAYEvMVJzAlkTFxJHhFGDTAOETl+GOIIkA4Epii2FXYxAFIERA1YPAQEBDQEBPQcEAQGFBgIWhXsCJTQJDgECAgIBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUQDieFOwcmDYYEAQEBAQMSCAEIHQEBMAIFAQ8CAQgRAQIBAiEBBgMCAgIfERQDAwMIAgQOBRYMglwBghUTAzEDARCbZAGBQAKKJnqBMoEBggkBAQYEBYE8AgELAgJAAa4HDYJJAwaBQgGHXQR8YwEBgViBZYNdgREnG4FJRIEVJxyBZoECPoIgQgEBAQKBKAEBEQEHOg0JgyU5gi6JS4FXDQw0gi2DCIIPGC4HMoEbi2iBJ2+BHoEeegIJAhFngQgIX4FvPgINVAsLY4Ecgk4CAhEnExQFTngbAwcDgQUQLwcEMh0JBgkYGBclBlEHLSQJExVBBINYCoELPxUOEYJYIgIHNjwbTYJqCRcIO1OBARAzBBQNNgMZKx1AAwtwPTUUGwYmASAogVcwgT8KJCSiJSsDZoFOARBhAQFiBCILDggIBgIJC2cEBk8DAwQfAQQRAxYRCQIGEBcCA5IUJAEJCoMIAUeKcY43kyNHcAqEC4t9jxMEhgcEIwyEAYxsA4ZqimmGM2KGCZIbgk+LEIN0kH0pCBiEfAIEAgQFAg4BAQY1gS46a3BwFRpLAYIIAQEBMVIZD4oWhAoMDQkVgz2FFIpldQI5AgcBCgEBAwkBgjmGNYF7XgEB
IronPort-PHdr: A9a23:ZOxF1hGxa/Ms6KqM6UsAop1Gfu0Y04WdBeZdwpMjj7QLdbys4NG4e kfe/v5qylTOWNaT5/FFjr/Ourv7ESwb4JmHuWwfapEESRIfiMsXkgBhSM6IAEH2NrjrOgQxH d9JUxlu+HToeVNNFpPGbkbJ6ma38SZUHxz+MQRvIeGgF5DDic+02si5+obYZENDgz/uKb93J Q+9+B3YrdJewZM3M7s40BLPvnpOdqxaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:alNRWqBBxVXbAhVW/+vjw5YqxClBgxIJ4kV8jS/XYbTApDgn1DFRn 2dKCmuFPqqCMzSgct13Po3k/EgC65LczNRlOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4WGdIZuJpPljk/F3oLJ9RGQ7onWAOKlYAL4EnopH1Q8F3980U4Ld9MR2+aEv/DoW2thh vuqyyHvEAfNN+lcaz98Bwqr8XuDjdyq0N8qlgVWicNj4Dcyo0Io4Kc3fsldGZdXrr58RYZWT 86bpF2wE/iwEx0FUrtJmZ6jGqEGryK70QWm0hJrt6aebhdqoi8v0ppmDcomVQRH1jqJsPxu6 YlpnMnlIespFvWkdOU1Wh1cFWR1OrdLveCBKnmkusvVxErDG5fu66wxVwdtY8tBoaAuXTkmG f8wcFjhajiOmfOwy7G2YuJtnc8kasLsOevzv1kwl26FVKp3GvgvRY3mzNlo2C9qrPxEPtf7e tcWdWtNZxLfNkgn1lA/UcJiw7jAamPEWyZWo3qUqLY5pW/Jw2RZy7bmddHVc92QXu1Uk1qW4 GXc8AzRDgsTOsDayDeZ/De3iOSKmD7/RINXELSp++Qvh1SW7m0eFBNQUkG0ydG4h1Wxc9NSN 0JS/TAhxZXe72SiSt37Gha/unPB4VgXWsFbFKsx7wTlJrfoDxixAmsZTgIcUewciIwmGDMq+ XOWvo/NLGk62FGKck61+rCRpDK0HCEaK24eeCMJJTfpBfG+/unfaTqSEL5e/L6JYs7dQmugn mzWxMQqr/BC05Nahv3TEUXv3mrEm3TfcuIiCuw7tEqK5xl9bYipD2BDwQeGtaobRGp1o6Xog ZTps8Ga6OZLBpaXmWnSBu4MB7quof2CNVUwYGKD/bF8qlxBGFb6Iui8BQ2Swm81aq7onhe1O CfuVft5vsM7AZdTRfYfj3iNI8or17P8Mt/uS+rZaNFDCrAoKl/XoXE3NRLAgDy9+KTJrU3ZE cnDGSpLJShCYZmLMBLtLwvg+eZxn3tnlT+7qW7Tnkv6uVZhWJJlYe5VbATRBgzIxKiFuw7Su 81OLNeHzg43bQENSne/zGLnFnhTdSJTLcmv86R/L7fTSiI4QztJI6GKntscl3lNwv49ehHgp C/tAye1CTPX2BX6FOl9Qik/OOOxA8ol8iJT0O5FFQ/A5kXPqL2Htc83X5A2ZrIgsudkyJZJo zMtIa1s3twnpuz7xgkg
IronPort-HdrOrdr: A9a23:pw47FK4uGk9YRlCgpAPXwWGBI+orL9Y04lQ7vn2ZFiY1TiXIra 6TdaoguiMc0AxhJ03I+errBEGBKUmskqKdkrNhQ4tKPTOW9FdASbsD0WKM+UyaJ8STzJ856U 4kSdkDNDSSNyk0sS+Z2njDLz9I+rDum8zY5pa9854ud3AWV0gK1XYeNu/vKDwPeOAwP+tBKH Pz3Lsim9OnQxkqR/X+IkNAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uEg9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+cyjpAJb4RGIFqjgpF5d1H22xa1O UkZC1QePib3kmhPF1dZyGdnTUIngxeskMKgmXo8EcL6faJNA7STfAxy76wtnDimhEdVBYW6t MS44rS3aAnfi/ojWDz4cPFWAptkVfxqX0+kfQLh3gaSocGbqRNxLZvt3+9Pa1wVR4S0rpXWN VGHYXZ/rJbYFmaZ3fWsi1mx8GtRG06GlODTlIZssKY3jBKlDQhpnFoifA3jzMF7tYwWpNE7+ PLPuBhk6xPVNYfaeZ4CP0aScW6B2TRSVbHMX6UI17gCKYbUki94aLf8fEw/qWnaZYIxJw9lN DIV05Zr3c7fwb0BciHzPRwg2bwqaWGLEPQI+1lluxEU+fHNcjW2AW4OSUTr/c=
X-Talos-CUID: 9a23:snVZzGiitSxcb+JmUTEHHlvorDJudn7AzEuNGn+CNSV5FbKVZnOP2f9Aup87
X-Talos-MUID: 9a23:tt9SqQoQQDAMOP4dZ7Yezx1LMvds+/6ENEousLAbpsaYZA57PSjI2Q==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 05 Jul 2023 21:38:08 +0000
Received: from alln-opgw-2.cisco.com (alln-opgw-2.cisco.com [173.37.147.250]) by alln-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 365Lc5ZK028563 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 5 Jul 2023 21:38:08 GMT
Authentication-Results: alln-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,184,1684800000"; d="scan'208,217";a="3879439"
Received: from mail-mw2nam10lp2106.outbound.protection.outlook.com (HELO NAM10-MW2-obe.outbound.protection.outlook.com) ([104.47.55.106]) by alln-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 21:38:01 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aGi1En055yA+5IPwGIkZuMVgTlh7byLUb+KRlNV0g+kNXuEm8qG1Pa2enAN5JzavBJVWkPBX+sFQcW/qQFiqfHWkv5t3WwKdghI8bih7KXpMBl+NtbKedRZwRpC2xxMPlfIEbJDJ+UiWCLTUc5Rhpq6k/nU/Ahgk1Rcjrh3YypzcUs1tZ0GkxkJw1DwuhOvuDEc5uVwwPi7/vXdUgIDdIiB/F9l2UhaMePub3TbTy/LQ9fCvGwOOZlP0/Sfvo06S9ahYWPkDLnaikwlg7OI2NsJeqoEFXG7zfKyHqnkJrTBx3QvBuMI5/rd8b6ZcbDKHdlCesAO6TJXX4ga9+dp6Jw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vNVFlNM4L7SdLizVk0N+ynhYvn6OSflSM1id70uWNQA=; b=kkiqBaYZbNP6ZowYF7WghosIcvWDFF6Pz3J8YFZZlNjx/BriJEMeX1VbgFAPtM/2JtZgzWl5JZO35wBCwRRtcm8kCKiBpxoeyHr7IRzPpKrnEZBK3FYNnKRBIcuuGjygCKLtdLy1XpMntSx1U7H20HE0KoRlGLa7eu43Ra7sbYtCPH+DTIJlluy5GPNxKkniEneqU7zAKObKTj80CUtpQ+HHmPQRTSQ5IdFJic/6iXYUjjnML6bIxpiHYU5ibIbv6ssl3UBSCLzWYBwdTTZ2iQTDYeB1obbJ0nK0y8XXe81+DOGGHglCW1cHx4SH++Pvr4/r0uHATdCFkeGuCkJMug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vNVFlNM4L7SdLizVk0N+ynhYvn6OSflSM1id70uWNQA=; b=YcnWgHeg0QXjhMnUoXuPX5X3WiUwgCgRAapAU/mRphZ6YLXdTwjbjoBVJ7vjbXAF3GWAGWViBMZbgo4wMNYQtTJpasv8/rhQ8s7ctui4f4nbiLy+2w23BapJL39QObZ57ayxDa+dMLnxiRayqBq1mZkijNDFBVp5dIEDe7BTVLo=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH8PR11MB6973.namprd11.prod.outlook.com (2603:10b6:510:226::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.26; Wed, 5 Jul 2023 21:37:58 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6098:a11f:49e5:c244]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6098:a11f:49e5:c244%4]) with mapi id 15.20.6565.016; Wed, 5 Jul 2023 21:37:58 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-sfc-multi-layer-oam@ietf.org" <draft-ietf-sfc-multi-layer-oam@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "donald.eastlake@futurewei.com" <donald.eastlake@futurewei.com>, "d3e3e3@gmail.com" <d3e3e3@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)
Thread-Index: AQHZruCrDJKvzZeVbkSP5yyg9B7bWq+rDpYAgABn1QCAAF9GAA==
Date: Wed, 05 Jul 2023 21:37:58 +0000
Message-ID: <E403782F-52B8-461F-837E-518988079C78@cisco.com>
References: <168836524659.58404.6585102954286960584@ietfa.amsl.com> <CA+RyBmX7xNbzh7jaR0z-ztxic=duyB7Nekmm+VRbPoxKF44MDA@mail.gmail.com> <940A12AF-DF57-4295-A57A-9E16DFFFA6EC@cisco.com> <CA+RyBmVPHKGLcQUDCjaRQErWJKbWXAJrmGABbV0-prHmSAsAnQ@mail.gmail.com>
In-Reply-To: <CA+RyBmVPHKGLcQUDCjaRQErWJKbWXAJrmGABbV0-prHmSAsAnQ@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.74.23061800
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|PH8PR11MB6973:EE_
x-ms-office365-filtering-correlation-id: 7d466b56-47db-4016-439c-08db7da019e7
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: QtM5qwNJCMq+VnWu8QtcKY81G4F8re/XEK5rnrdWMSV1IbUTW9cz4lp87HdcWLPbs+AHMQorC3RCE10COQ+pGV1Q9MRFScetlGZ9BWl7TF7IxCe4C/ec/DOnDdydBrfX+s5jBGkBYPyEExukn+3dC3UNUwyhauRC0//aEkUjcpDk7+FS2YurhZGWvKJJ8qmh/4ia0iGi6zX1RsRLIv10t7XIdjQRnz6nUne8/bi9lusBenPfj3njbQTDoHMhyKvCXsDDEIM3L8MH9yjk49FlNjTCepVqdhQzIU4Uzu7Vy81Jaz9BH+IwQvmUIHvKk+ro7PME85ANkn5DerZnWZnorg6loZiC3vrINQipLS4kkP8BUCrfCI4/lyhpXWSQ/ZTwj94L5921pw+iHevh6KvvQflW/A72Y0K/7lHXDVh3JXvh6ei3ci4MAasdI4V4Mn+n0dKxR87XzDAqBeJRjyfPI/7FFghIxSF9KAWSmBfFfIcQ0JRS35tvQzTR2t8TZfx0d698GE3FWvQ/o5rSjj/StIebtY//TeJE4Y8eob8dDgqdBRzXOjqXOZ2lCes4046NqJhLZBtvN1GY3IREvPJNdO8GiecOfIE5qVJsrjHDhPf0eH0dRLltiBcQ+uK+H+PLhXbUCsC9Gp2BMU3KdB/ovu5dz5+u09ytj12dXk8DxXhS6XPTzz/wj/EE1k4yvMXV
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(346002)(376002)(396003)(39860400002)(366004)(451199021)(66574015)(6486002)(71200400001)(2616005)(478600001)(91956017)(6506007)(966005)(54906003)(2906002)(83380400001)(186003)(36756003)(21615005)(166002)(76116006)(66446008)(122000001)(316002)(6916009)(8936002)(33656002)(6512007)(30864003)(4326008)(66946007)(66556008)(66476007)(38100700002)(5660300002)(224303003)(38070700005)(86362001)(41300700001)(64756008)(53546011)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: aYvFwwrxVpg8Jh81q8QjJx0by5i0GdwDYuj6js3rGsO4DEFvCskQnahRkPk0+9gi6FFsmYf5PcRiqRNuTODiG9XxQ+peMlYAAw1Ahyw1vt2oYny75kPu4sOgP7NywnIp6S8+kKcu7YbpU7SMGoi0Ii++L+xruw+yTK9wPqisouOLsk42uwY3QHSgpdUzdzAxoCxzsHbOJRmPzj0xyWWRK5agKJfkfwzgxsO2BrIboNtupxDTwYSNyfq2oVOru2195ACIpnbAP/qelS5EpzMTDJU1xGGIQqQQyT38Xn57ZE8gziSbXrBuXCbaanym5dbr0K4KJvsew32yRqHvetC8fhlbMFsjsEXWuvgToltdKb8Rd1kK/ZpGvmXoD+Cwe2IkMoKMr+KOewVmIc7nmCywNk7pOG0ATNVXwCmx7/HpCVl3/nfVSx0EA6b5fcO4saO1vim6P4xjDyRHrz/5+3PaQVQQAYxyI2VZL6lnzhkXm9qWrA+7Ee8vxXhFk+LBHFBR9JpsK1rMP6YxFtAw87BvZJvQ1As+Dv2z5ynG6nLcFd1bQitmzMKtrkb26/Tw0SaSLmTsAPqJO4hRBJdT6RIpx+aoa64ZBNtlgBAACEOlbz76bp5JXLvX76cImiYh/XbE/D+KrjwOXKxFNx5WN/CACK9Fn79GQXgNCSxGkKu/wVUllBPywG43IaHtnrHwzqOzQeQ3Y0Lov2a7cADPZmFrDG35vxPA+UwimkXnsBxiwqMRau91wCqQmTy/DLREfkBN5797lMA1f3QRc3Oyu1j3VDckk4d1E5sFh1y1/66C22TNE/co/EpyMztfqu+a79/RGRZF0uHAI+/+tcnahwvxdR95PhxNeqczXs834tJ86v/sdDsciS2HDtsDuiGfXAaTdST9TES7PQ5YPj3MTjQ7RQ0rW77aj+smmTfOAkD6apF0V3DZ3qhOTPKvfnL53jJ9t4njGvhLajpru/2nrF9zszUPO6cOUsCLXn2ugnJ/Q+jbGjJT4ScypY2tTalK9IARrvJQv4D2gtu5DLw3/3mGv+HVmzieuUasHu9WwGFwv6g3Xxx0dcAkn3+e9Ziu9BQWWsdnElfPZN9CcX3aMJNdHWh9f2qELkzpeLiG4VbVaGhQBLnbubF0gxcBCHYo57HqhWqwv2xK2ISDTIIh5kD5SEzznQdj67fxj11h3UFgSXjCl+KcbJl0yhlglbN6eO3rxn3W2d//RwF6EJnah7r6lBCQtbiPjX3k+pmdb+t9XRglgHul/2zCkTHqXMHZRQ8M0tfD11DiHwZgqcn3nw+5CvpIJu4SLyaDSJ3v++DeSRewHoNK5QItHLtI9qWreKHTPJAmttos0FtUWugFscZrncPxuAj2bybMB198qO7yk7sGIPIedkO4V48PSoE8vqfHddb18BYOvyw0MqxS4jGQvTnYfSyGK74V1tn7FvRz1SPwZLtHle5Xfnum+5erBb3zWovMjlIjOvXfY/qveOrj7u4IS+LLCSnL6jVLg98IpYppRuCCY1d4g3NjrK4SoESTnGfJ1/JEKNG0AKjU7d8Hj7C03ly/CG9wrIFJ8rpWEQKHzP/VzfQkANEGo5GFUrExPL6fsqIl4GiM3xHdQWoZSjkdLnFm4KbImLUVmHuNE/LqwENZdQoSR5SRq03chyfi
Content-Type: multipart/alternative; boundary="_000_E403782F52B8461F837E518988079C78ciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d466b56-47db-4016-439c-08db7da019e7
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2023 21:37:58.5732 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7VVRsgtWkVMLhotolgb+J0tekOXPNmr8qzwHSTAnQKqZ8cFHjBRJ2obQC3nZZiY7g5Mb+Dhi4tFl8KZTgMbi4A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR11MB6973
X-Outbound-SMTP-Client: 173.37.147.250, alln-opgw-2.cisco.com
X-Outbound-Node: alln-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/PGKFbgxle-0rXyXJ2vrtLB8aO5E>
Subject: Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2023 21:38:32 -0000

Greg,

You have seen by now that I have cleared by DISCUSS.

Thanks again for the discussions on the DISCUSS, I have appreciated it.

See below for EV2>

Regards

-éric


From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wednesday, 5 July 2023 at 19:57
To: Eric Vyncke <evyncke@cisco.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-sfc-multi-layer-oam@ietf.org" <draft-ietf-sfc-multi-layer-oam@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "donald.eastlake@futurewei.com" <donald.eastlake@futurewei.com>, "d3e3e3@gmail.com" <d3e3e3@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

Hi Eric,
thank you for your timely response. I've applied several additional updates following your latest suggestions (I flagged them below with GIM2>> tag). Thank you for the discussion and help in improving the document.

Regards,
Greg

On Wed, Jul 5, 2023 at 2:45 AM Eric Vyncke (evyncke) <evyncke@cisco.com<mailto:evyncke@cisco.com>> wrote:
Hello Greg

Thank you for your prompt reply, very much appreciated.

As you will see below, the proposed changes (and the one in your other email -- even better) will address my blocking DISCUSS point. I.e., as soon as a revised I-D with the changes is uploaded, I am clearing my DISCUSS into a NOOBJ.

See below for EV>

Regards

-éric

From: iesg <iesg-bounces@ietf.org<mailto:iesg-bounces@ietf.org>> on behalf of Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
Date: Wednesday, 5 July 2023 at 03:33
To: Eric Vyncke <evyncke@cisco.com<mailto:evyncke@cisco.com>>
Cc: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>, "draft-ietf-sfc-multi-layer-oam@ietf.org<mailto:draft-ietf-sfc-multi-layer-oam@ietf.org>" <draft-ietf-sfc-multi-layer-oam@ietf.org<mailto:draft-ietf-sfc-multi-layer-oam@ietf.org>>, "sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>" <sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>>, "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>, "donald.eastlake@futurewei.com<mailto:donald.eastlake@futurewei.com>" <donald.eastlake@futurewei.com<mailto:donald.eastlake@futurewei.com>>, "d3e3e3@gmail.com<mailto:d3e3e3@gmail.com>" <d3e3e3@gmail.com<mailto:d3e3e3@gmail.com>>, "cjbc@it.uc3m.es<mailto:cjbc@it.uc3m.es>" <cjbc@it.uc3m.es<mailto:cjbc@it.uc3m.es>>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

Hi Eric,
thank you for your thorough review and thoughtful comments. Please find my responses below tagged GIM>>.

Regards,
Greg

On Sun, Jul 2, 2023 at 11:20 PM Éric Vyncke via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote:
Éric Vyncke has entered the following ballot position for
draft-ietf-sfc-multi-layer-oam-26: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


# Éric Vyncke, INT AD, comments for draft-ietf-sfc-multi-layer-oam-26

Thank you for the work put into this document.

Please find below one blocking DISCUSS points (very easy to address), some
non-blocking COMMENT points (but replies would be appreciated even if only for
my own education).

Other thanks to Carlos Bernardos, the Internet directorate reviewer (at my
request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-sfc-multi-layer-oam-26-intdir-telechat-bernardos-2023-06-28/
(and I have read Greg's reply, still waiting for a revised I-D though)
GIM>> I'll be glad to upload the next version. Perhaps that can be done right after your concerns get addressed.

EV> nothing urgent, let's indeed focus on the DISCUSS, then the COMMENTs


Special thanks to Don Eastlake for the shepherd's detailed write-up including
the WG consensus and the justification of the intended status and the author
counts.

I hope that this review helps to improve the document,

Regards,

-éric

# DISCUSS

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion on the following topics:

## Section 6

As there two V header fields defined (one for Echo message and one for all OAM
messages), it is unclear whether the Echo V-field is set back to 0 when SFC OAM
header Version is incremented? Or in other words, should Echo with V=0 but with
OAM V != 0 be interpreted as specified in this document ?
GIM>> A very interesting scenario. The intention is to have independent versioning of the SFC OAM Header and SFC Echo Request/Reply (as well as any other active OAM protocol applied to SFC). Based on that, in the scenario you describe, SFC Echo with V == 0 just be interpreted as defined in this document. Would you suggest that this scenario be added to the description of the Version field of SFC Echo Request/Reply as an example of the relationship?
NEW TEXT:
      Versioning of SFC Echo Request/
      Reply is independent of the versioning of the SFC Active OAM
      header (Section 5).  For example, if a new SFC Active OAM header
      format with V = 1 is defined, an SFC Echo Request/Reply packet
      with V = 0 MUST be handled as described in this document.

EV> this new text, or even the more radical change in your other email, are enough to address the above DISCUSS.




Are the TLV type depending on the Version being 0 ?
GIM>> It seems unnecessary. Do you think that that should be explicitly noted in the document?

EV> this would be nicer I think, when rereading myself, this should have been a non-blocking COMMENT though.
GIM2>> It seems to me that after removing the Version field from the SFC Echo Request/Reply message, the applicability of defined and future TLVs became a moot point. WDYT?

EV2> correct



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


# COMMENTS

## Multi-layer ?

I wonder what is "multi-layer" (per the I-D title) aspect in the specification.
Suggest to either explain the "multi-layer" aspect or drop it from the draft
title.
GIM>> At the very early stage, the title of the draft did include "multi-layer". Later, it was changed to "Active OAM for Service Function Chaining (SFC)". Would you suggest that we change from draft-ietf-sfc-multi-layer-oam to, for example, draft-ietf-sfc-active-oam, at this stage?

EV> thanks for the explanation, let's no change the filename now as it is too late


## Section 3

Suggest to write that SFFI stands for SFF Instance in Figure 1.
GIM>> A good point, thank you. Added to the Acronyms:
SFI:        Service Function Instance
Updated the second para in Section 3 as follows:
OLD TEXT:
   The architecture example depicted in Figure 1 considers a service
   function chain that includes three distinct service functions.  In
   this example, the SFP traverses SFF1, SFF2, and SFF3.  Each SFF is
   connected to two instances of the same service function.
NEW TEXT:
    The architecture example depicted in Figure 1 considers a service
   function chain that includes three distinct service functions.  In
   this example, the SFP traverses SFF1, SFF2, and SFF3.  Each SFF is
   connected to two service function instances (SFIs) of the same
   service function.

Isn't `FM SFC OAM` a pleonasm ? I.e., either "FM" or "OAM" are redundant.
GIM>> OAM is a more general term that includes Fault Management and Performance Monitoring protocols.

`(e.g., NSH)` why `e.g.` when section 1 states the focus of this I-D to NSH ?
GIM>>  Our intention was to define an active OAM that is applicable to different SFC mechanisms and use SFC NSH as an example to illustrate the realization of SFC Echo Request/Reply.

EV> understood based on your previous reply above, still suggest to remove '(e.g., NSH)' as the I-D is only about NSH.
GIM2>> Agree, removed.


About REQ#1, should this be a "MUST" rather than a "SHOULD" ?
GIM>> We need to consider that active SFC OAM excludes SFIs along the SFP1. On the other hand, the application of the SFI to a user packet can be re-classified and switched to another SFP2. To examine that SFP2, a different active SFC OAM packet can be transmitted from that Re-classifier. that is different from, for example, tracing in an ECMP environment and is why we feel that "SHOULD" is appropriate rather than MUST.

EV> fair enough

In REQ#8, `the initiator of such a request` should probably be more specific.
GIM>> Would the following update make the requirement more clear:
OLD TEXT:
      REQ#8: SFC OAM MUST be able to trigger on-demand FM with responses
      being directed towards the initiator of such a request.
NEW TEXT:
       REQ#8: SFC OAM MUST be able to trigger on-demand FM remotely with
      responses being directed toward the initiator of the remote
      request.

EV> perfect, thanks


## Section 4

Isn't RFC 8300 a better reference for the O bit rather than an IETF draft ?
GIM>> Med helped me answer this question.

EV> fair enough as well and thanks to Med ;-)


## Section 5

Please add a justification / actual data about `But extra IP/UDP headers,
especially in an IPv6 network, add noticeable overhead.`
GIM>> I propose the following update of that sentence:
OLD TEXT:
   But extra IP/
   UDP headers, especially in an IPv6 network, add noticeable overhead.
NEW TEXT:
   But an extra
   IP/UDP header, especially in an IPv6 network, adds overhead compared
   to the length of an active OAM control packet (e.g., BFD Control
   packet [RFC5880]).  In some environments, for example, when measuring
   performance metrics, it is beneficial to transmit OAM packets in a
   broad range of lengths to emulate application traffic closer.

Is the updated text acceptable?

EV> I would have prefer to put byte counts and compare IPv4/UDP and IPv6/UDP wrt the actual OAM packets


I am really concerned by having only 2 bits to indicate the version while there
are 8 bits reserved on the side. This does not look too good for revisions.
GIM>> A very valid and practical point, thank you. Would you agree to increase the Version field to a four-bit length?

EV> Much better, it even matches the 4-bit version field in IPv[46] header


When can an implementation deviate from the SHOULD in Sender's Handle: `The
sender of the Echo Request SHOULD use a pseudo-random number generator ` ?
While I understand that this is an opaque value, and using a random number
prevents fingerprinting, I would assume that some implementations would like to
add some private semantics to this number.
GIM>> Yes, an implementation may use the Sender's Handle for some proprietary signaling as long as the system that receives SFC Echo Request doesn't alter the value of the Sender's Handle field but copies it into SFC Echo Reply. Do you feel that a note with that example needs to be added?

EV> it was mainly for my own education to be honest. I.e., up to the authors to add some text.


## Section 6

Suggest adding some text about the absence of TLVs based on the length of the
SFC OAM header.
GIM>> Would the following update match your expectation:
OLD TEXT:
    TLV is a variable-length construct whose length is multiple of four-
   octet words.  Multiple TLVs MAY be placed in an SFC Echo Request/
   Reply packet.  None, one or more sub-TLVs may be enclosed in the
   value part of a TLV, subject to the semantics of the (outer) TLV.
NEW TEXT:
   TLV is a variable-length construct whose length is multiple of four-
   octet words.  Multiple TLVs MAY be placed in an SFC Echo Request/
   Reply packet.  None, one or more sub-TLVs may be enclosed in the
   value part of a TLV, subject to the semantics of the (outer) TLV.  If
   no TLVs are included in an SFC Echo Request/Reply, the value of the
   Length field in the SFC Active OAM header MUST be 16 octets.

EV> thanks


## Section 6.1

To avoid confusion s/TTL Exceeded/NSH TTL Exceeded/ (even if explained later in
the text).
GIM>> A good point. True, the proposed SFC Echo Request/Reply mechanism can be used in SFC NSH, we believe that it can also be applied in, for example, SFC based on RFC 8595<https://www.rfc-editor.org/rfc/rfc8595.html>, would s/TTL Exceeded/SFC TTL Exceeded/ be acceptable?

EV> better indeed


In `The receiver of said Echo Request can set it to one of the values` should
the "can" be replaced by a "MUST" ?
GIM>> Indeed, thank you for pointing this out. Done.

## Section 6.3

`If the NSH is used,` but section 1 specifies that this I-D is only about NSH.
GIM>> Our intention was to define an Echo Request/Reply mechanism for any technology that can realize SFC. NSH is one such technology. RFC 8595 defines how MPLS can be used to realize SFC. What would you suggest?

EV> suggest removing 'IF the NSH is used' completely as it is redundant with the abstract/intro


`Reply via an IPv4/IPv6 UDP Packet` is unclear when reading it. Please add a
forward reference to section 6.3.1 (I would also prefer to have 6.3.1 earlier
in the flow
GIM>> Added the reference as you suggested:
   *  Reply via an IPv4/IPv6 UDP Packet (2).  If an SFC Echo Request is
      not encapsulated in IP/UDP, then this value requests the use of
      the Source ID TLV Section 6.3.1.


## Section 6.5.2

How `If the NSH of the received SFC Echo Request includes the MAC Context
Header, the packet's authentication MUST be verified before using any data. `is
different to the text of section 6.4 about the MAC ?
GIM>> Yes, it appears as unnecessary duplication. Would backreference to Section 4 as follows to address your concern:

   If the NSH of the received SFC Echo Request includes the MAC Context
   Header, the packet's authentication MUST be verified before using any
   data as defined in Section 6.4.

EV> perfect


`Sequence Number in the Echo Request sent matches to the Sequence Number in the
Echo Reply received` should it rather be a window of sequence number ? I.e.,
pipelined requests could be sent.
GIM>> A very good point, thank you. Update as follows:
OLD TEXT:
      the Sequence Number in the Echo
      Request sent matches to the Sequence Number in the Echo Reply
      received.
NEW TEXT:
      the Sequence Number in the Echo Reply
      received matches the Sequence Number of one of outstanding
      transmitted Echo Requests.

EV> perfect


## Section 6.6

`Consistency Verification Request` this message is not defined before this
section and not in RFC 8300. If specified in this section, may I suggest to
rename the section to be about CVReq ?
GIM>> Thank you for the suggestion. Renamed the section to "The Use of Consistency Verification Request Message"

## Section 7

`if the underlay is an IPv6 network` what about IPv4 ? I would assume that
IPv[46] underlays can support AH/ESP.
GIM>> IPv6 is used as an example. Of course, AH and ESP are equally applicable in IPv4. Would you suggest re-wording like:
   If the underlay is an IPv4 or IPv6 network, IP Authentication Header
   [RFC4302] or IP Encapsulating Security Payload Header [RFC4303] can
   be used to provide integrity protection.

EV> better


Should this be a SHOULD in `an implementation MAY check that the source of the
Echo Request is indeed part of the SFP`?
GIM>> In the course of the earlier discussion, that text got changed to the following:
   To protect against unauthorized sources trying to obtain information
   about the overlay and/or underlay, an implementation MUST have means
   to check that the source of the Echo Request is part of the SFP.
I hope that this change addresses your concern.

EV> yes, thank you