Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
Greg Mirsky <gregimirsky@gmail.com> Fri, 09 August 2019 03:06 UTC
Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0230E12004E; Thu, 8 Aug 2019 20:06:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id no-jr0hbHrjK; Thu, 8 Aug 2019 20:06:41 -0700 (PDT)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DC9D1200D7; Thu, 8 Aug 2019 20:06:37 -0700 (PDT)
Received: by mail-lj1-x236.google.com with SMTP id v24so90932934ljg.13; Thu, 08 Aug 2019 20:06:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=lbQ6slnyBp2nHQtKSqSGeL47PB1PfTMZSiOScxCPd24=; b=dA5e2o0kOXE8AU+vUo35A/ceQNlo0D+rNCMA4bX2TlGEAhve2wFb7/ft46EEqRbGq9 ViqjCsIxcS+v22v/tKrWyzimuSutbob/1BAttUb3vPPEvD3obWuNOdQB136yY8+ot4ET w5/bLhQFZMMi1mAVWqN1TSrySo85HK2Iv3xHnW7ra1rCiSnY2zygReoaeKo0Jp1BZ5ob ThmyMQlXW0xS2azE68cOwVJNH3PY73wODRpko6wrEVkawdXi6WLjBlgJsacm/cZgfGAo NpCoTTORQLRnd0rRVbeklssllPnJeg6NBW3bD4DGs/XdIT3mf0OE9rxnGlaSnWo4KRst NBAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lbQ6slnyBp2nHQtKSqSGeL47PB1PfTMZSiOScxCPd24=; b=HzbPws9aHRtzbIl7AwgGrMeasx15DzC72drsxx0/bMk+hjM3S2abUd7SlycVTHEJO1 6mViYD5S8jmONzgxajLbhzh53voz5ZuuZfbwX1g+rUXXK/qCGt8mIo8MNbf3HjDZ2VTK sIuh1JxXotJ7wX0fcElSKmTXpSAQ2BPIjCGSzDPJE7t00fB0mqA5KNVYR9ShzwXzRiwM NKKgbeQYi9Soezh1BeYj2eJts87JghdD1yUaMR7y4KBVtJqYWmrQ1ZTaA9C9z9kG2ZVD QtKPRdRUf8eAMkadEQNCVBIuBmamMEhiTQfI/lI7dQfU5vrJkv7CD4cOg4yaTU3Kjptt bULQ==
X-Gm-Message-State: APjAAAV2cP20frYCJO4Aabcm2Ysn9omtcnyxbSCywmLvnuWcc71OX5dO jCj5pYTC8twikCakTCr3rtvTVAgPE/ehNkaj7fM=
X-Google-Smtp-Source: APXvYqyhCtnJcSCHVLSny4xq35K2efjVCZJPW3vxDj0esXY+Upj3+ufRHyVzOptNR2sPVzz/FFaTU0SKY3Myewxj2hw=
X-Received: by 2002:a2e:6c07:: with SMTP id h7mr4832457ljc.177.1565319995271; Thu, 08 Aug 2019 20:06:35 -0700 (PDT)
MIME-Version: 1.0
References: <BYAPR13MB25978FD458B59EB22067685FD21E0@BYAPR13MB2597.namprd13.prod.outlook.com> <CA+RyBmWUeNd5u1NPb9cy5-DxsPdCYcB5q5nQ904P8-n-CX3KOQ@mail.gmail.com> <1A1EA07A-94DB-4100-8149-119B7915E64B@cisco.com> <CA+RyBmWvo73X=ctYpEY7pCmbycUH8Qq5Vyx26d_dPAARikW0WA@mail.gmail.com>
In-Reply-To: <CA+RyBmWvo73X=ctYpEY7pCmbycUH8Qq5Vyx26d_dPAARikW0WA@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 08 Aug 2019 20:06:24 -0700
Message-ID: <CA+RyBmUAmy2eCn_4fU2+UNQnwrosU+x4xB0LCTV9FLwjxxFoOA@mail.gmail.com>
To: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
Cc: James Guichard <james.n.guichard@futurewei.com>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000473300058fa676e5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/V4T4VHKkk0hhc01cAnQ-gd2I9H4>
Subject: Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Aug 2019 03:06:47 -0000
Dear Nagendra, please kindly review my questions below. Looking forward to hearing from you soon. Regards, Greg On Tue, Jul 30, 2019 at 6:12 AM Greg Mirsky <gregimirsky@gmail.com> wrote: > Hi Nagendra, > much appreciate your responses. Please find my notes in-line tagged GIM>>. > > Regards, > Greg > > On Tue, Jul 23, 2019 at 1:58 PM Nagendra Kumar Nainar (naikumar) < > naikumar@cisco.com> wrote: > >> Hi Greg, >> >> >> >> Thank you for the comments. Please see our responses below. >> >> >> >> in regard to the applicability of ICMP the statement in Section 4.1.1 is >> "ICMP could be leveraged for connectivity function (defined in Section 4.1) >> to verify the availability of SF or SFC." When I looked through Section 4.1 >> I find some discussion of a Fault Management function but no clear >> definition of what is connectivity verification in SFC. >> >> >> >> <Authors> Section 4.1 already list some of the OAM functions that can be >> performed as part of connectivity function. >> > GIM>> My question was about the definition of the connectivity > verification function used in the document. Also, do you believe that > connectivity verification is a composite function that includes other OAM > functions? > >> >> >> More so, it appears that connectivity verification is being mixed with >> re-ordering detection, Path MTU Discovery, data integrity monitoring, >> >> >> >> <Authors> Please refer Section 2.2.7 of RFC7276 that explains MTU >> verification as part of Connectivity verification. Section 3.1.1 already >> explains the rationale behind including policy verification. >> > GIM>> Thank you for the reference to RFC 7276 but it does not state that > Path MTU Discovery (PMTUD) is part of CV. I believe that PMTUD can as well > be supported by the continuity check function and one of the examples is > the method described in draft-ietf-bfd-large-packets > <https://tools.ietf.org/html/draft-ietf-bfd-large-packets-00>. So, I > don't feel you've addressed my question. > >> >> >> and some sort of policy verification. Real kitchen sink. >> >> >> >> <Authors> The intention is to capture/highlight various OAM functions >> based on the unique characteristics of SFC. Please read section 3.1.1 about >> SF availability. It is already explained about what is (or why) policy >> verification for SF availability. Accordingly, we humbly deny on this >> comment. >> > GIM>> " Accordingly, we humbly deny on this comment." Which leaves me > with no other option but to state that you've failed to resolve my > technical comment. > >> >> >> At the same time, in other documents on network OAM, connectivity >> verification has been firmly defined as a function that verifies that data >> have been received only form the expected source over the expected path. In >> conjunction with this, a misconnection error is defined to indicate that >> packets from another connection have been received. In other words, the >> connectivity verification function verifies not only that packets from A >> reach node B but that they arrive only on the red wire, not on blue or >> yellow. Said all that, the interpretation of connectivity function in SFC >> may be different but, in my opinion, Section 4.1 does not provide anything. >> >> >> >> <Authors> We dont understand your concern here. SFC OAM components >> explains what is availability and PM for SF/SFC (Refer section 3.1.x and >> 3.2.x) and tied it up with the function in section 4. The relevant sections >> also highlight the difference in SFC (For example, what is availability in >> terms of SF). >> > GIM>> "SFC OAM components explains what is availability ..." > Can you provide the quote from this or other SFC OAM document that defines > the SFC availability? I've been asking for one to no avail. Thank you in > advance for clarifying this. > GIM>> "The relevant sections also highlight the difference in SFC (For > example, what is availability in terms of SF)." > So, do you believe that SFC availability has some differences from SF > availability? What are they? Is there a difference in measuring method or > measurement units between the availability of an SFC and an SF? Please > clarify. > >> >> >> Also, it is not clear how the last bullet "Proactively test alternate or >> protected paths to ensure reliability of network configurations" is >> specific to and requires the use of a connectivity function and why it >> cannot be addressed by, for example, continuity check function. >> >> >> >> <Authors> Thanks for highlighting this. We will add the same point under >> Section 4.2. Hope that satisfies your concern. >> > GIM>> Not really. Section 4.1 opens with "Connectivity is mainly an > on-demand function ..." and closes with "Proactively test alternate or > protected paths ..". That draws the question How on-demand function can be > used to proactively monitor a path? Perhaps you can add an example. > >> >> >> Also, the very last sentence of Section 4.1 concludes that ICMP in SFC >> "can be used for basic OAM functions". But I cannot find anywhere in the >> document where the term, notion of "basic OAM functions" has been discussed >> or defined. Which functions considered as basic? ICMP can be used as the >> fault management tool, to some extent because it is relatively processing >> extensive, but its value in performance monitoring is very low. Is PM OAM >> not part of the basic OAM functions? >> >> >> >> <Authors> Thanks. To avoid any confusion, we modified it as below. Does >> the below modification help? >> >> >> >> "It could be observed that ICMP at its current stage may not be able >> >> to perform all required SFC OAM functions, but as explained above, it >> >> can be used for some of the connectivity functions." >> > GIM>> The text is an improvement, thank you. But it refers to "all > required SFC OAM functions" and I cannot find such list in the document. > Can you propose another text? > >> >> >> >> >> Section 6.4.2, in my opinion, may provide some context to how to >> interpret the use of "availability". From "BFD or S-BFD could be leveraged >> to perform SF or SFC availability" it appears that the availability is >> viewed as part of Fault Management OAM. (I'm still awaiting a response to >> my earlier questions specifically on the interpretation of "availability" >> in the OAM Framework for SFC. >> >> >> >> <Authors> Thanks, this looks like a valid point. We can change the same >> as below: >> >> >> >> "BFD or S-BFD could be leveraged to perform continuity function for SF or >> SFC." >> > GIM>> Thank you, that works. > >> >> >> Further, in Section 6.4.2 the possible use is described as "Upon >> receiving the control packet, the last SFF in the SFC will reply back with >> relevant DIAG code." But this is not how BFD in the Asynchronous mode >> operates, that is how only S-BFD works. The first sentence of the second >> paragraph refers to both BFD and S-BFD. But the rest of the paragraph >> describes the operation of S-BFD only, not of BFD in Asynchronous mode. I >> believe that either the positioning statement must be modified or >> explanation of the operation of BFD in Asynchronous mode over SFP provided. >> >> >> >> <Authors> The intention is not to explain how it works for each BFD mode. >> But to explain the common behavior. AFAIK/R, setting relevant DIAG code in >> the response packet is common for both BFD and S-BFD. So we dont see any >> confusion here. >> > GIM>> I am not saying that there's "any confusion", I'm pointing to clear > technical mistake in the description of how BFD in Asynchronous mode > operates. You may split the description of the mechanism for BFD and S-BFD > or find another way to fix the erroneous text. > >> >> >> >> >> Section 6.4.3 includes the statement about the applicability of iOAM to >> availability: "In-Situ OAM could be used with O bit set to perform SF >> availability and SFC availability or performance measurement." I interpret >> this conclusion as the indication that availability is considered as part >> of the Fault Management OAM toolset. If that is the case, I question the >> value of using one-way OAM for fault management because only the egress >> node may have the state and even that is not demonstrated in existing iOAM >> documents. In order to detect path failure, a node must have information >> that can be used to detect the packet loss. That can be either >> monotonically increasing sequence numbers or the notion that packets must >> be arriving at pre-determined intervals. Which mechanism can be used by >> iOAM? Also, since iOAM, in regard to availability, appears as single-way FM >> OAM mechanism, that uses the actual data flow, what is its advantage >> comparing to, for example, collecting and comparing counters from ingress >> and egress? In other words, even if the egress can detect the loss of its >> availability for the particular SFP, how such a notion can be used? >> >> >> >> <Authors> Section 6.4 is all about the applicability of different tools. >> It neither concludes nor prefers one over the other. How the data is >> collected, interpreted, used for failure detection or signaled back to the >> Initiator are expected to be explained in the solution document that >> proposes iOAM as the tool for SFC OAM. As mentioned in the document scope, >> any solution specific info is outside the scope of this document and >> accordingly we dont see a reason to include those details in this document. >> > GIM>> I cannot find in your response what is being detected by iOAM. How, > from OAM PoV, is the reception of iOAM packet at the edge SFF is different > from receiving any data packet of the same flow? Without the clearly stated > distinction, without explaining the benefit of using iOAM for this function > the statement has no technical foundation and doesn't stand. > >> >> >> I, again, have to point out that Section 6.4.4 references the individual >> draft that had expired 3+ years ago. Usually, that is the indication that >> neither authors nor the community are interested in the idea. >> >> >> >> <Authors> This was already clarified by Carlos in different thread. The >> concept in the draft is already implemented and available in ODL. >> > GIM>> I cannot evaluate how the implementation is compared to the long-ago > expired draft, so using that draft as the reference is not helpful to a > reader. Can yu find another source? > >> >> >> Hope the above clarifies your queries. We are addressing the agreed >> comments and editorial comments that you raised in the other thread. We >> will submit a new version with the fixes. >> >> >> >> Thanks, >> >> Nagendra >> >> >> >> >> >> *From: *sfc <sfc-bounces@ietf.org> on behalf of Greg Mirsky < >> gregimirsky@gmail.com> >> *Date: *Monday, July 22, 2019 at 10:44 AM >> *To: *James Guichard <james.n.guichard@futurewei.com> >> *Cc: *"sfc@ietf.org" <sfc@ietf.org> >> *Subject: *Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06 >> >> >> >> Dear Jim, Joe, et al., >> >> I'd like to share my comments on Section of 6.4 of the draft. Much >> appreciate your consideration and response to my questions. >> >> - in regard to the applicability of ICMP the statement in Section >> 4.1.1 is "ICMP could be leveraged for connectivity function (defined in >> Section 4.1) to verify the availability of SF or SFC." When I looked >> through Section 4.1 I find some discussion of a Fault Management function >> but no clear definition of what is connectivity verification in SFC. More >> so, it appears that connectivity verification is being mixed with >> re-ordering detection, Path MTU Discovery, data integrity monitoring, and >> some sort of policy verification. Real kitchen sink. At the same time, in >> other documents on network OAM, connectivity verification has been firmly >> defined as a function that verifies that data have been received only form >> the expected source over the expected path. In conjunction with this, a >> misconnection error is defined to indicate that packets from another >> connection have been received. In other words, the connectivity >> verification function verifies not only that packets from A reach node B >> but that they arrive only on the red wire, not on blue or yellow. Said all >> that, the interpretation of connectivity function in SFC may be different >> but, in my opinion, Section 4.1 does not provide anything. Also, it is not >> clear how the last bullet "Proactively test alternate or protected paths to >> ensure reliability of network configurations" is specific to and requires >> the use of a connectivity function and why it cannot be addressed by, for >> example, continuity check function. >> - Also, the very last sentence of Section 4.1 concludes that ICMP in >> SFC "can be used for basic OAM functions". But I cannot find anywhere in >> the document where the term, notion of "basic OAM functions" has been >> discussed or defined. Which functions considered as basic? ICMP can be used >> as the fault management tool, to some extent because it is relatively >> processing extensive, but its value in performance monitoring is very low. >> Is PM OAM not part of the basic OAM functions? >> - Section 6.4.2, in my opinion, may provide some context to how to >> interpret the use of "availability". From "BFD or S-BFD could be leveraged >> to perform SF or SFC availability" it appears that the availability is >> viewed as part of Fault Management OAM. (I'm still awaiting a response to >> my earlier questions specifically on the interpretation of "availability" >> in the OAM Framework for SFC. >> - Further, in Section 6.4.2 the possible use is described as "Upon >> receiving the control packet, the last SFF in the SFC will reply back with >> relevant DIAG code." But this is not how BFD in the Asynchronous mode >> operates, that is how only S-BFD works. The first sentence of the second >> paragraph refers to both BFD and S-BFD. But the rest of the paragraph >> describes the operation of S-BFD only, not of BFD in Asynchronous mode. I >> believe that either the positioning statement must be modified or >> explanation of the operation of BFD in Asynchronous mode over SFP provided. >> - Section 6.4.3 includes the statement about the applicability of >> iOAM to availability: "In-Situ OAM could be used with O bit set to perform >> SF availability and SFC availability or performance measurement." I >> interpret this conclusion as the indication that availability is considered >> as part of the Fault Management OAM toolset. If that is the case, I >> question the value of using one-way OAM for fault management because only >> the egress node may have the state and even that is not demonstrated in >> existing iOAM documents. In order to detect path failure, a node must have >> information that can be used to detect the packet loss. That can be either >> monotonically increasing sequence numbers or the notion that packets must >> be arriving at pre-determined intervals. Which mechanism can be used by >> iOAM? Also, since iOAM, in regard to availability, appears as single-way FM >> OAM mechanism, that uses the actual data flow, what is its advantage >> comparing to, for example, collecting and comparing counters from ingress >> and egress? In other words, even if the egress can detect the loss of its >> availability for the particular SFP, how such a notion can be used? >> - I, again, have to point out that Section 6.4.4 references the >> individual draft that had expired 3+ years ago. Usually, that is the >> indication that neither authors nor the community are interested in the >> idea. >> >> Regards, >> >> Greg >> >> >> >> On Tue, May 28, 2019 at 10:37 AM James Guichard < >> james.n.guichard@futurewei.com> wrote: >> >> Dear WG: >> >> >> >> This message starts a new two week WG Last Call on advancing >> https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ >> <https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-sfc-oam-framework%2F&data=02%7C01%7Cjames.n.guichard%40futurewei.com%7Ce47e5eb13f224f18c46408d6e378b2f7%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636946504868870205&sdata=lkKvAgmKik7lkqGANQpnIvBRdbjKAqYtzTUdTfB9f3Y%3D&reserved=0> >> for publication as an Informational RFC. >> >> >> >> Substantive comments and statements of support for publishing this >> document should be directed to the mailing list. Editorial suggestions can >> be sent to the authors. This last call will end on 11th June 2019. >> >> >> >> Thanks! >> >> >> >> Jim & Joel >> >> >> >> >> >> >> >> >> >> _______________________________________________ >> sfc mailing list >> sfc@ietf.org >> https://www.ietf.org/mailman/listinfo/sfc >> >>
- [sfc] WG Last Call draft-ietf-sfc-oam-framework-06 James Guichard
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Nagendra Kumar Nainar (naikumar)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… mohamed.boucadair
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Andrew G. Malis
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Adrian Farrel
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Nagendra Kumar Nainar (naikumar)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Sam Aldrin
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Nagendra Kumar Nainar (naikumar)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… mohamed.boucadair
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Carlos Pignataro (cpignata)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Carlos Pignataro (cpignata)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… James Guichard
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… mohamed.boucadair
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Sami Boutros
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Anoop Ghanwani
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Nagendra Kumar Nainar (naikumar)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Carlos Pignataro (cpignata)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Sam Aldrin
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Vengada Prasad Govindan (venggovi)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Ashish Panda (aspanda)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Diego R. Lopez
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Jeff Tantsura
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Carlos Pignataro (cpignata)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… James Guichard
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Nagendra Kumar Nainar (naikumar)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Carlos Pignataro (cpignata)
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… James Guichard
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… James Guichard
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Greg Mirsky
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… James Guichard
- Re: [sfc] WG Last Call draft-ietf-sfc-oam-framewo… Carlos Pignataro (cpignata)