Re: [sfc] Progression of OAM work in the SFC WG - OAM Packet

"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 14 February 2022 14:10 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 327CC3A0E28 for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 06:10:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.814
X-Spam-Level:
X-Spam-Status: No, score=-7.814 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Si5B2jn0tCJe for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 06:10:08 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 721BD3A0E27 for <sfc@ietf.org>; Mon, 14 Feb 2022 06:10:08 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 4Jy5hb6x9Hz6GbKX; Mon, 14 Feb 2022 06:10:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1644847807; bh=12z2WuqePSmxfZxZPTF/GF8dcb3ZtCQ6Hy/CKkl7Dg8=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=GVxCEBNHw6OGyAQ4BjqyhbfztaAcvqpcpiERmaGLFkmdIIu7bBrseR0ZrGcHGCLGP /7iVvnOqwEfKRGL8zf/akynvpdFKMNU9MVgR/2tBA0b7ymkEEGLsBA5Ax0u/nVHzF6 ACR7JbIQP6USnAMDtujbVus4GLtmqZbUejtMI2o0=
X-Quarantine-ID: <ko3h_khf0fr2>
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.22.111] (50-233-136-230-static.hfc.comcastbusiness.net [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 4Jy5hb2vKpz6Gb3v; Mon, 14 Feb 2022 06:10:06 -0800 (PST)
Message-ID: <1e625c8b-31d2-924e-8557-bfb043554267@joelhalpern.com>
Date: Mon, 14 Feb 2022 09:10:05 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.0
Content-Language: en-US
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: "sfc@ietf.org" <sfc@ietf.org>
References: <MN2PR13MB4206A3B910C9CE55867DA10BD2279@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmWZU-OL-9kb7byfumcGZ_Xktb7Yp=dRQe3QRdCcTwBZcw@mail.gmail.com> <CABNhwV1Fcb9fmh82LeUKTHO7BdYeWp4HyP9aQBGS+x6FEL=fLA@mail.gmail.com> <a47de7f9-bfa3-979a-0e49-1f1c52161d72@joelhalpern.com> <CA+RyBmVY6PBeQ7O_vhtKO4M7bnZhCAdoVzPZJsd9f0jyaEvTWg@mail.gmail.com> <CABNhwV0-nkH5tV13X-G--qf8u0yi9TGYgo2ee+N8PNosm=b1xg@mail.gmail.com> <3CDEE749-5A40-44FF-9E3A-8C8EBBA94849@cisco.com> <c525b8fe-f82b-d658-9999-c1b9a3630e86@joelhalpern.com> <69B3DD8B-1A6D-4D07-B41E-A2958A117E33@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
In-Reply-To: <69B3DD8B-1A6D-4D07-B41E-A2958A117E33@cisco.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/Sq-66lF5CU_VhJgjIuLhCvQ38Ew>
Subject: Re: [sfc] Progression of OAM work in the SFC WG - OAM Packet
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Feb 2022 14:10:14 -0000

Hmm.  let me paraphrase to make sure I understood, and assuming I did, 
clarify my confusion.

You seem to be saying that a way to do SFP OAM is to use something 
carried in IP carried in an NSH, with the O bit set.

If I am reading this correctly, this means that you expect an SFF seeing 
a packet with the O bit is supposed to examine not only the carried 
protocol (indicated by the next protocol field in the NSH) but to 
examine the various fields of that protocol to decide if the inned 
content is OAM the SFF is supposed to pay attention to.

That does not match my understanding of expected behavior.  Particularly 
since that carried IP packet is likely not addressed to the SFF, and 
also will not be having its TTL or other fields checked.

Again, it would be good to hear from other WG participants as to whether 
they understand expect behavior of an SFF to include this (based on 8300).

Yours,
Joel

On 2/14/2022 8:02 AM, Carlos Pignataro (cpignata) wrote:
> Joel,
> 
> Happy to.
> 
> No, that is not what I meant. I am not sure where (or why) you added the 
> word “external”, but that was key to showing a disconnect (I might not 
> have been clear and/or you might not have read correctly).
> 
> Let me try different way:
> 
> There is an I-D now, sfc-multi-layer-oam, that sends “SFC Active OAM" 
> packets with a new SFC next protocol for a newly created protocol. In 
> this case, the SFC next protocol is not expected to be used in user 
> packets, at least for now (or people have not thought about that 
> in hierarchical cases)
> 
> Imagine now that BFD or ICMP want to be used as an SFC Active OAM 
> protocols, instead of the sfc-multi-layer-oam one. Those can be 
> encapsulated in IP (even with a 127/8 destination). Using the O-bit set 
> and SFC NP as IP is the RFC 8300 expected way. (I imagine creating a new 
> SFC next protocol for “BFD-in-IP-used-in-SFC” so as to avoid an SFC NP 
> expected on external packets would be an approach if there was no O-bit 
> defined)
> 
> Best,
> 
> Carlos.
> 
>> 2/14/22 午前7:05、Joel M. Halpern <jmh@joelhalpern.com 
>> <mailto:jmh@joelhalpern.com>>のメール:
>>
>> Thank you for taking the time to provide a careful reply.
>>
>> It appears, from your description of ICMP packets that your 
>> understanding of 8300 is that in SFC an external ICMP packet will get 
>> the O bit set in the NSH header.  Presumably, base on this, the SFF or 
>> SF are supposed to look through and notice this content?   (Otherwise, 
>> why set the bit?)  This seems an undesirable and expensive 
>> implications which other readers have not drawn from the RFC 8300 
>> text.  (It also requires the encapsulating node to do extra checking 
>> to discover this case.)
>>
>> Am I reading your expectation correctly?
>>
>> Yours,
>> Joel
>>
>> On 2/13/2022 11:06 PM, Carlos Pignataro (cpignata) wrote:
>>> Replying to this specific email in the thread, only because it is the 
>>> latest one at this point in time, but bundling comments from various 
>>> places on the thread. Please find some follow-up comments and 
>>> questions marked “CMP”, indicating the “From”, and organized 
>>> chronologically:
>>> *James N Guichard <james.n.guichard@futurewei.com 
>>> <mailto:james.n.guichard@futurewei.com> 
>>> <mailto:james.n.guichard@futurewei.com 
>>> <mailto:james.n.guichard@futurewei.com>>>:*
>>>> 1) The chairs have reviewed the O bit definition in RFC 8300.  That 
>>>> definition is at best open to interpretation and therefore 
>>>> incomplete.  For example, the clear intention is only to mark 
>>>> packets which are intended for SFC OAM at the SFC service layer.  
>>>> But that is not what the current text says.  There is also, 
>>>> unfortunately, ambiguity as to what constitutes an OAM packet.  So 
>>>> it is reasonable for documents to update 8300 to clarify the exact 
>>>> applicability and action for the O-bit.
>>> CMP: It is unclear to me what exact issues the chairs are calling 
>>> out. There are two issues mentioned:
>>> CMP: 1. "But that is not what the current text says.” —> what does 
>>> the text say precisely?  Can you point to the specific RFC 8300 text 
>>> that is believed to be incomplete, and a detailed use case that 
>>> showcases the potential issue? An extrapolated counter-example just 
>>> to make a point: the text does not  say what days of the week OAM 
>>> packets can be marked, yet there’s an expectation that they will work 
>>> Mondays and Saturdays all the same — even holidays.
>>> CMP: 2. What specifically is the ambiguity with what an OAM packet 
>>> is? Please grep the RFC series for “oam packet”, it is not a new term.
>>> CMP: Net-net, O-bit=1, OAM packet.
>>>> 2) However, related to point 1), we can't have multiple documents 
>>>> updating the definition differently.  As such, the authors of the 
>>>> SFC iOAM draft and the SFC multi-layer-oam draft need to come 
>>>> together and figure out what the clarification is for the definition 
>>>> of that bit. We do not believe as chairs that either of these 
>>>> documents can move forward from the WG until such clarity has been 
>>>> reached.
>>> CMP: If there is still believed to be an ambiguity or a clear 
>>> opportunity for improving the definition, I agree with consolidating 
>>> that update. I had suggested before that if such new text or real 
>>> clarification is agreed, a separate document that only makes that 
>>> O-bit clarification is the most clear and clean way to go. That doc 
>>> should be a one-pager or less. I’d be happy to contribute to that 
>>> minimal doc, if it is shown to be needed.
>>> CMP: For completeness also, the "SFC multi-layer-oam” document has 
>>> many outstanding issues besides the O-bit.
>>> *Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com> 
>>> <mailto:gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>>*
>>>> I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I 
>>>> understand these documents, the Active SFC OAM and IOAM are 
>>>> identified by the respective values for the NSH Next Protocol field 
>>>> (to be assigned by IANA).
>>> CMP: There is a major issue with the sentence above. Active SFC OAM 
>>> (as a category), as per RFC 8300, needs to be identified by setting 
>>> the O-bit. No way around that based on RFC 8300. However, the text 
>>> "the Active SFC OAM” creates confusion since it refer to a specific 
>>> OAM protocol which has the same name as a the category as well. That 
>>> name collision is quite unfortunate in my opinion.
>>>> At the same time, so far no OAM-specific meta data TLV has been 
>>>> defined. Thus, it appears that one way forward could be to not 
>>>> involve the O bit in the active SFC OAM or IOAM altogether. In other 
>>>> words, to deprecate the NSH O bit.
>>> CMP: RFC 8924 already includes ICMP and BFD as example SFC Action OAM 
>>> protocols. Those can be encapsulated in IP, in which the 
>>> Next-Protocol indicates IP — and (as per RFC 8300) the O-bit is set 
>>> to indicate an OAM packet.
>>> CMP: The proposal of deprecating the O-bit breaks those SFC OAM 
>>> protocols already included in an RFC.
>>> CMP: That proposal of deprecating the O-bit also breaks Section 4.1 
>>> of IOAM.
>>> CMP: This expired I-D yet implemented in open source uses the O-bit: 
>>> https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt 
>>> <https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt> 
>>> <https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt 
>>> <https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt>>
>>> *Gyan Mishra <hayabusagsm@gmail.com <mailto:hayabusagsm@gmail.com> 
>>> <mailto:hayabusagsm@gmail.com <mailto:hayabusagsm@gmail.com>>>*
>>>> I agree that what makes sense to me as a path forward is to 
>>>> deprecate the O bit and not use in SFC Multilayer OAM and SFC IOAM, 
>>>> as both SFC Multilayer OAM and SFC IOAM are identified by the 
>>>> respective values for the NSH Next Protocol field (to be assigned by 
>>>> IANA), as well as so far no OAM-specific meta data TLV has been yet 
>>>> defined.
>>> CMP: What is the “SFC Multilayer OAM”?
>>> CMP: The O-bit (reading RFC 8300) does not indicate if there is OAM 
>>> Metadata. It indicates an OAM packet.
>>> *"Joel M. Halpern" <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com> 
>>> <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>>*
>>>> As far as I can tell, if we deprecate the O-bit and rely on the next 
>>>> protocol field, we are saying that in practice (not by rule) NSH 
>>>> metadata can not be used for OAM.  That's fine with me as long as we 
>>>> agree on that.
>>> CMP: I do not fully follow this. Can you explain the relationship of 
>>> the O-bit with Metadata?
>>> CMP: Here’s an example: RFC 8924 shows ICMP as Active OAM. The SFC 
>>> next protocol is IP, the IP next protocol is ICMP, the O-bit needs to 
>>> be set.
>>> CMP: Consider the following document, independent submission and in 
>>> the RFC Publication queue already:
>>> CMP: 
>>> https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/ 
>>> <https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/> 
>>> <https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/ 
>>> <https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/>>
>>> CMP: Is a Timestamp in Metadata an OAM element?
>>> CMP: Consider this proposal 
>>> https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/ 
>>> <https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/> 
>>> <https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/ 
>>> <https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/>>
>>> CMP: Where the base header borrows a bit for an OAM function.
>>> CMP: Neither of those have any impact on the O-bit.
>>> *Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com> 
>>> <mailto:gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>>*
>>>> I agree that, as we find SFC NSH now, no OAM metadata has been 
>>>> defined. It appears to me that deprecating the O bit does not affect 
>>>> any of the already defined mechanisms in the SFC NSH.
>>> CMP: It actually does, see my example above.
>>>> I think that if a new, for example, MD Type = 2 TLV that is used for 
>>>> any OAM functionality to be proposed in the future, deprecated the O 
>>>> bit would not prevent using such NSH TLV.
>>> CMP: I agree with this — because there is no correlation between MD 
>>> Type field and O-bit as defined.
>>> Best,
>>> Carlos.
>>>> 2/13/22 午後12:32、Gyan Mishra <hayabusagsm@gmail.com 
>>>> <mailto:hayabusagsm@gmail.com> <mailto:hayabusagsm@gmail.com 
>>>> <mailto:hayabusagsm@gmail.com>>>のメール:
>>>>
>>>> Hi Joel
>>>>
>>>> I am in agreement as well with what you have stated that once the O 
>>>> bit is deprecated that NSH metadata cannot be used for OAM and that 
>>>> we would have to now from that point forward rely on the next 
>>>> protocol field as we will be doing for SFC Multilayer and SFC IOAM 
>>>> drafts as well as will have backwards compatible with any already 
>>>> existing defined mechanisms in SFC NSH.
>>>>
>>>> I don’t see any issues or impact with moving forward.
>>>>
>>>> Kind Regards
>>>>
>>>> Gyan
>>>>
>>>> On Sun, Feb 13, 2022 at 12:04 PM Greg Mirsky <gregimirsky@gmail.com 
>>>> <mailto:gregimirsky@gmail.com> <mailto:gregimirsky@gmail.com 
>>>> <mailto:gregimirsky@gmail.com>>> wrote:
>>>>
>>>>    Hi Joel,
>>>>    I agree that, as we find SFC NSH now, no OAM metadata has been
>>>>    defined. It appears to me that deprecating the O bit does not
>>>>    affect any of the already defined mechanisms in the SFC NSH. I
>>>>    think that if a new, for example, MD Type = 2 TLV that is used for
>>>>    any OAM functionality to be proposed in the future, deprecated the
>>>>    O bit would not prevent using such NSH TLV.
>>>>    What do you think?
>>>>
>>>>    Regards,
>>>>    Greg
>>>>
>>>>    On Sun, Feb 13, 2022 at 6:55 AM Joel M. Halpern
>>>>    <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com> 
>>>> <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>> wrote:
>>>>
>>>>        There is an implication of deprecating the O-bit that I would
>>>>        like to
>>>>        hear from more WG participants about.
>>>>
>>>>        As far as I can tell, if we deprecate the O-bit and rely on
>>>>        the next
>>>>        protocol field, we are saying that in practice (not by rule) NSH
>>>>        metadata can not be used for OAM.  That's fine with me as long
>>>>        as we
>>>>        agree on that.
>>>>
>>>>        Yours,
>>>>        Joel
>>>>
>>>>        On 2/13/2022 2:52 AM, Gyan Mishra wrote:
>>>>        >
>>>>        > Hi Jim, Joel & SFC WG,
>>>>        >
>>>>        > I agree that the RFC 8300 definition of O bit is incomplete
>>>>        and not
>>>>        > clear as to its intended use.
>>>>        >
>>>>        > That is a problem that I agree needs to be rectified.
>>>>        >
>>>>        > I understand that we need to get this resolved before we can
>>>>        progress
>>>>        > Multilayer SFC OAM draft-ietf-sfc-multi-layer-oam-18 and SFC
>>>>        IOAM.
>>>>        >
>>>>        > I agree that what makes sense to me as a path forward is to
>>>>        deprecate
>>>>        > the O bit and not use in SFC Multilayer OAM and SFC IOAM, as
>>>>        both SFC
>>>>        > Multilayer OAM and SFC IOAM are identified by the respective
>>>>        values for
>>>>        > the NSH Next Protocol field (to be assigned by IANA), as
>>>>        well as so far
>>>>        > no OAM-specific meta data TLV has been yet defined.
>>>>        >
>>>>        > So we have I believe solid solution and path forward and I
>>>>        support
>>>>        > deprecating the O bit.
>>>>        >
>>>>        > Kind Regards
>>>>        >
>>>>        > Gyan
>>>>        >
>>>>        > On Wed, Feb 2, 2022 at 5:42 PM Greg Mirsky
>>>>        <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com> 
>>>> <mailto:gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>
>>>>        > <mailto:gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>
>>>>        <mailto:gregimirsky@gmail.com 
>>>> <mailto:gregimirsky@gmail.com>>>> wrote:
>>>>        >
>>>>        >     Thank you, Jim and Joel, for guiding the SFC OAM work
>>>>        and pointing
>>>>        >     out the issue that must be addressed.
>>>>        >
>>>>        >     I've reviewed our SFC OAM documents and
>>>>        draft-ietf-sfc-nsh-tlv. As I
>>>>        >     understand these documents, the Active SFC OAM and IOAM are
>>>>        >     identified by the respective values for the NSH Next
>>>>        Protocol field
>>>>        >     (to be assigned by IANA). At the same time, so far no
>>>>        OAM-specific
>>>>        >     meta data TLV has been defined. Thus, it appears that
>>>>        one way
>>>>        >     forward could be to not involve the O bit in the active
>>>>        SFC OAM or
>>>>        >     IOAM altogether. In other words, to deprecate the NSH O 
>>>> bit.
>>>>        >
>>>>        >     I greatly appreciate your comments on the proposal to
>>>>        deprecate the
>>>>        >     NSH O bit.
>>>>        >
>>>>        >     Regards,
>>>>        >     Greg
>>>>        >
>>>>        >     On Wed, Feb 2, 2022 at 10:36 AM James Guichard
>>>>        >     <james.n.guichard@futurewei.com 
>>>> <mailto:james.n.guichard@futurewei.com>
>>>>        <mailto:james.n.guichard@futurewei.com 
>>>> <mailto:james.n.guichard@futurewei.com>>
>>>>        >     <mailto:james.n.guichard@futurewei.com 
>>>> <mailto:james.n.guichard@futurewei.com>
>>>>        <mailto:james.n.guichard@futurewei.com 
>>>> <mailto:james.n.guichard@futurewei.com>>>> wrote:
>>>>        >
>>>>        >         Hi WG:____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         Having reviewed all of the OAM related documents in
>>>>        our WG, the
>>>>        >         chairs would like to provide a few comments to 
>>>> hopefully
>>>>        >         generate discussion and forward progress of this
>>>>        work:____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         1) The chairs have reviewed the O bit definition in
>>>>        RFC 8300.
>>>>        >         That definition is at best open to interpretation
>>>>        and therefore
>>>>        >         incomplete.  For example, the clear intention is
>>>>        only to mark
>>>>        >         packets which are intended for SFC OAM at the SFC
>>>>        service
>>>>        >         layer.  But that is not what the current text says. 
>>>>         There is
>>>>        >         also, unfortunately, ambiguity as to what
>>>>        constitutes an OAM
>>>>        >         packet.  So it is reasonable for documents to update
>>>>        8300 to
>>>>        >         clarify the exact applicability and action for the
>>>>        O-bit.____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         2) However, related to point 1), we can't have multiple
>>>>        >         documents updating the definition differently.  As
>>>>        such, the
>>>>        >         authors of the SFC iOAM draft and the SFC
>>>>        multi-layer-oam draft
>>>>        >         need to come together and figure out what the
>>>>        clarification is
>>>>        >         for the definition of that bit. We do not believe as
>>>>        chairs that
>>>>        >         either of these documents can move forward from the
>>>>        WG until
>>>>        >         such clarity has been reached. ____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         3) Related to the SFC iOAM, we need a clear
>>>>        definition of iOAM.
>>>>        >         There seem to be differences between the definitions in
>>>>        >         published RFCs, the usage (which is not a
>>>>        definition) in the SFC
>>>>        >         draft, and the various ippm drafts.  Any such
>>>>        definition will
>>>>        >         need to be vetted with the ippm working group.____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         Again, it would be good if members of the working
>>>>        group beyond
>>>>        >         the two author teams spoke up about their readings
>>>>        of the
>>>>        >         documents, and their understandings of what we 
>>>> need.____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         Yours,____
>>>>        >
>>>>        >         Jim and Joel____
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         __ __
>>>>        >
>>>>        >         _______________________________________________
>>>>        >         sfc mailing list
>>>>        > sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org 
>>>> <mailto:sfc@ietf.org>> <mailto:sfc@ietf.org <mailto:sfc@ietf.org>
>>>>        <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>>
>>>>        > https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>
>>>>        <https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>>
>>>>        >         <https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>
>>>>        <https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>>>
>>>>        >
>>>>        >     _______________________________________________
>>>>        >     sfc mailing list
>>>>        > sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org 
>>>> <mailto:sfc@ietf.org>> <mailto:sfc@ietf.org <mailto:sfc@ietf.org>
>>>>        <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>>
>>>>        > https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>
>>>>        <https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>>
>>>>        >     <https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>
>>>>        <https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>>>
>>>>        >
>>>>        > --
>>>>        >
>>>>        > <http://www.verizon.com/ <http://www.verizon.com/> 
>>>> <http://www.verizon.com/ <http://www.verizon.com/>>>
>>>>        >
>>>>        > *Gyan Mishra*
>>>>        >
>>>>        > /Network Solutions A//rchitect /
>>>>        >
>>>>        > /Email gyan.s.mishra@verizon.com 
>>>> <mailto:gyan.s.mishra@verizon.com>
>>>>        <mailto:gyan.s.mishra@verizon.com 
>>>> <mailto:gyan.s.mishra@verizon.com>>
>>>>        <mailto:gyan.s.mishra@verizon.com 
>>>> <mailto:gyan.s.mishra@verizon.com>
>>>>        <mailto:gyan.s.mishra@verizon.com 
>>>> <mailto:gyan.s.mishra@verizon.com>>>//
>>>>        > /
>>>>        >
>>>>        > /M 301 502-1347
>>>>        >
>>>>        > /
>>>>        >
>>>>        >
>>>>
>>>> -- 
>>>>
>>>> <http://www.verizon.com/ <http://www.verizon.com/>>
>>>>
>>>> *Gyan Mishra*
>>>> /Network Solutions A//rchitect /
>>>> /Email gyan.s.mishra@verizon.com <mailto:gyan.s.mishra@verizon.com> 
>>>> <mailto:gyan.s.mishra@verizon.com <mailto:gyan.s.mishra@verizon.com>>//
>>>> /
>>>> /M 301 502-1347
>>>>
>>>> /
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org 
>>>> <mailto:sfc@ietf.org>>
>>>> https://www.ietf.org/mailman/listinfo/sfc 
>>>> <https://www.ietf.org/mailman/listinfo/sfc>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/sfc
>