Re: [sfc] [ippm] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/

Shwetha Bhandari <shwetha.bhandari@thoughtspot.com> Wed, 04 May 2022 00:26 UTC

Return-Path: <shwetha.bhandari@thoughtspot.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30453C157B5B for <sfc@ietfa.amsl.com>; Tue, 3 May 2022 17:26:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.996
X-Spam-Level:
X-Spam-Status: No, score=-6.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=thoughtspot.com header.b=TV2u0zIN; dkim=pass (2048-bit key) header.d=thoughtspot-com.20210112.gappssmtp.com header.b=Z7SgaXIP
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iTsHx5E4oVL7 for <sfc@ietfa.amsl.com>; Tue, 3 May 2022 17:26:42 -0700 (PDT)
Received: from mx0b-0055fe01.pphosted.com (mx0b-0055fe01.pphosted.com [205.220.176.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22F17C159484 for <sfc@ietf.org>; Tue, 3 May 2022 17:26:40 -0700 (PDT)
Received: from pps.filterd (m0211452.ppops.net [127.0.0.1]) by mx0b-0055fe01.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 2440CA45018286 for <sfc@ietf.org>; Tue, 3 May 2022 17:26:39 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thoughtspot.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=proofpoint; bh=FitU3vLI+INcbgNKilU4hw+CMOr+6gq3CwU/2EzUEtc=; b=TV2u0zINhGNQhqQNsvR0PHhd7MMH8QdcxiYOlcdipBh5lnwICyYAAGCcRQbbftKxOtF1 u9J3iIhc0mPLWFpYoqhKDE1vfuJrp7RaSCNiJ2sEbJ6KI4Y2gzddwZBZOKxldx+E50U3 /ijCqJBp5//t+1AcSCUtr2kb1gewZhCjC6xm8uXpfOF5vGhbUJX0F+Rx3aM2DnKIHzcE OUTUoBBsT7J3q3ZlztFPiXTD3j/tALDebXIU16uMD4GMjt6q0XN+mUqKcIJTlllWDHZT ya2jk/ORcNipfXs/cBwbLY5T+Mdz2xXcV4VL5kpTBhLnM0P1tpIV4qZaifGtroRY/QjK EA==
Received: from mail-qt1-f199.google.com (mail-qt1-f199.google.com [209.85.160.199]) by mx0b-0055fe01.pphosted.com (PPS) with ESMTPS id 3fs4kk8ak5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <sfc@ietf.org>; Tue, 03 May 2022 17:26:39 -0700
Received: by mail-qt1-f199.google.com with SMTP id n4-20020ac85b44000000b002f3940d55eeso10337054qtw.19 for <sfc@ietf.org>; Tue, 03 May 2022 17:26:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thoughtspot-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FitU3vLI+INcbgNKilU4hw+CMOr+6gq3CwU/2EzUEtc=; b=Z7SgaXIPpbsyn7yA0F1hPu73tx77croi3Ji6XPKOD/uZC1MA+pxUApHpYzD8KUdyOy SLnqF0itWVAZVQNxkXty9v/tnaJ6XRDONZ5giE5UCXhK8ZBs5cBJ2NwU/nZMwVeFY2m6 9sWbUD9BEMgOuTPprayjE3jJIjdwBwxzqI70XgWZOSfqWcqfEiSXMSydF77Y+34Ixgw+ nkxomRb/yoFAOxAO10vdXuONHvBjMbDtQhWGpYwNyGm9oXxQZnVfajog9c3xcLvCoKH5 hIM8Xdy1SzatHbuL//6lqTSKLwpsQs4JHx+eoYG/yeihK/6GYFjH4oULC5pRtCJyG1sm 2snA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FitU3vLI+INcbgNKilU4hw+CMOr+6gq3CwU/2EzUEtc=; b=JJCAlJNjl7wUGJg/t80i/Xsea95kpH9cfwpbuuCDPMCSwso2X65LYiHXa3kyZuQu1k 8o6Fp6pm1VvfGLtICXfwRKRdm0qXH81G+xzHQDxVlHs22akziOCVHLb+fqTTEccrGY98 fFfqtXgXoTcWXBFEIJTaU3dX5yBpm5PyY2tOldXBLJ5QyrObTFVSu5o6i95wQGIXxH+u cYSQS6gDOvh19/PlSijTPQU637D6xYrcXm0kk/wfhi17ZoD8VTikHRW4fwXQMHcNPb94 UwGZ5REiY8FdaNUfqbrCaV/8VrWvggQOORTsA721YO2uq0xOIgcAVWiO1IL+zc4k8e20 tKgg==
X-Gm-Message-State: AOAM531cJHHHkG4IzrqBAXe3ao+NJOvkP/mTvDE6gRJy6Va0aqUVzK+z hf2tQ3WH2jbcO87HAFiPBlftQgzYkQ6nDwkToLytwImn6B/WlHzNRLJkY0vHBdedLDHAYaklQzA /oRcP3Aj96Qjh2cJ4vR4=
X-Received: by 2002:a05:6214:528e:b0:45a:95ff:337f with SMTP id kj14-20020a056214528e00b0045a95ff337fmr7856088qvb.78.1651623998125; Tue, 03 May 2022 17:26:38 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJwVRrRNZjq/QTIQtm42v+utFS4eAIhMW3l/mRXcxsrR8+N2hIFck/G1l6BwQERrtXs3TJgj2LDV+sFtQi5qyAY=
X-Received: by 2002:a05:6214:528e:b0:45a:95ff:337f with SMTP id kj14-20020a056214528e00b0045a95ff337fmr7856075qvb.78.1651623997804; Tue, 03 May 2022 17:26:37 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR13MB4206C91446BA5FBBDA69E233D2FF9@MN2PR13MB4206.namprd13.prod.outlook.com> <CAMFZu3NCCmj4u75taEzBiMmkMQ0YrmK5KsUToSOKfwX1yBxePA@mail.gmail.com> <26916_1649050778_624A849A_26916_245_1_aa5a0049026247d9980f4ebbc8c5ac0b@orange.com> <CY4PR11MB1672FCF27DA2A4822C6E1B40DAED9@CY4PR11MB1672.namprd11.prod.outlook.com> <11111_1649774342_62558F05_11111_493_4_a734de5265ca498bbabf9805a6eaf91d@orange.com> <CAMFZu3N03E-nWYJNik91e+X=gr3s2TVF03ZCM8i02ru4_Q82og@mail.gmail.com> <CA+RyBmWUZcUN2jnpUuyhTmkNpwvh=2prBZDGinWe2v-b3n8+MQ@mail.gmail.com> <CAMFZu3N5+GdFk13oWbi8F1qhgRNsKpSFwza61SG2oeMW9TvaLQ@mail.gmail.com> <525_1649935673_62580539_525_487_2_d0a4949b3d9c4424a0261012c7ce6188@orange.com> <CA+RyBmX3MdqVX5=hEsO+9SMbpXw+enwnm_qb4+-6smqbsTPPwg@mail.gmail.com> <CAMFZu3NZBgKXHrktn04LbwW33S+j+kGG5hx2A+1+jJ8aasCRag@mail.gmail.com> <14665_1651047374_6268FBCD_14665_484_6_addb2a5f712d4307a463d0582cc0a8a0@orange.com> <CAMFZu3O-vEAnrBE6rhuFh_POPD5E2i_bHvdBx=GUjRKxk3AOYw@mail.gmail.com> <3dba81e6-3a42-3643-dc98-a750891d47f5@joelhalpern.com> <CA+RyBmU+o5spc8M_54Voe+4E_A2M+Q2oE6LyJgSN4+=MCtVrcg@mail.gmail.com>
In-Reply-To: <CA+RyBmU+o5spc8M_54Voe+4E_A2M+Q2oE6LyJgSN4+=MCtVrcg@mail.gmail.com>
From: Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
Date: Wed, 04 May 2022 05:56:25 +0530
Message-ID: <CAMFZu3MxRx5T3XgTJfBoCpgz1pH_4tNKSdk=NJ0DXELgnCRFxw@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: Joel Halpern <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>, James Guichard <james.n.guichard@futurewei.com>, sfc@ietf.org, ippm@ietf.org
Content-Type: multipart/alternative; boundary="000000000000b1289405de24ad9c"
X-Proofpoint-ORIG-GUID: EIoyX00ue3RXONdxe26GuynkrE30c0T5
X-Proofpoint-GUID: EIoyX00ue3RXONdxe26GuynkrE30c0T5
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.858,Hydra:6.0.486,FMLib:17.11.64.514 definitions=2022-05-03_10,2022-05-02_03,2022-02-23_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 phishscore=0 priorityscore=1501 spamscore=0 mlxscore=0 mlxlogscore=999 bulkscore=5 adultscore=0 impostorscore=0 clxscore=1015 suspectscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2205040000
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/WyOWAzNNekrHjj4YU2SfvFWRVww>
Subject: Re: [sfc] [ippm] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 May 2022 00:26:46 -0000

Hi Greg, Joel,

The purpose of these options are different. Reiterating the use cases
described in the draft-ietf-ippm-ioam-deployment draft : hop by hop tracing
related options are -pre-allocated, incremental,direct export. The
edge-to-edge option is not collecting trace but metrics at the edge and
helps in correlation e.g sequence number is inserted and used to identify
packet loss rate. The proof-of-transit option is used to prove that the
packet has traversed the check points in the networks.
There is also IOAM namespace that is used to collect specific data types in
trace options and a node can be configured to process trace options with a
specific namespace, this is useful when we have nodes with varying
implementation of trace option data types defined.
Restricting IOAM option in NSH to a specific number will make it difficult
to deploy. Hence I don't see a need to update the current draft to add any
of this restrictions. Let's use draft-ietf-ippm-ioam-deployment to
understand the use cases and deployment modes.

Thanks
Shwetha


On Wed, May 4, 2022, 3:01 AM Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Joel,
> thank you for highlighting this question, I've missed it.
>
> As we've discussed earlier, several IOAM trace options have been defined:
>
>    - pre-allocated
>    - incremental
>    - edge-to-edge
>    - proof-of-transit
>    - direct export
>    - hybrid two-step
>
> I cannot find a scenario when using more than one IOAM trace option that
> could be beneficial, and useful for an operator. I think that if there is
> no use case, then the restricting number of IOAM trace options used is
> reasonable and helps implementors in developing interoperable
> implementations.
>
> Regards,
> Greg
>
> On Mon, May 2, 2022 at 2:42 PM Joel Halpern <jmh@joelhalpern.com> wrote:
>
>> (Sorry, catching up on some emails I missed.)
>>
>> If we want to allow multiple iOAM headers (up to the WG) then I think the
>> document needs to be clear on the meaning.  If there are multiple are all
>> supposed to be processed, just the top one until something removes it, a
>> random one of the receivers choice?  (Yes, that last is unlikely.)
>>
>> Yours,
>>
>> Joel
>> On 4/27/2022 4:44 AM, Shwetha Bhandari wrote:
>>
>> Hi Med,
>>
>> Thanks for the confirmation and quick review.
>>
>> On,
>>
>>> This means the new requested TBD_IOAM value will also be a valid next
>>> protocol. However, I wonder whether IOAM in IOAM in NSH is really something
>>> you want to have. If not, I suggest the text is updated to exclude it from
>>> the allowed value in the above excerpt.
>>
>> Per earlier discussion in this thread, quoting Frank's mail here for reference:
>>
>> In addition, I don’t think that draft-ietf-sfc-ioam-nsh would be the
>>> appropriate place to discuss and restrict deployment options. E.g., I’m not
>>> sure why we’d want to restrict a deployment to using a single IOAM header
>>> only. E.g., one could think of using different headers for different
>>> namespaces or groups of namespaces for operational reasons. IMHO, such a
>>> discussion – if we really need it - would belong into
>>> draft-ietf-ippm-ioam-deployment, rather than into a draft that defines the
>>> encap of IOAM into NSH.
>>
>> I think the text on Next Protocol should be as is. We should not add
>> restrictions on number of IOAM headers that could be added to the packet.
>>
>> Thanks,
>> Shwetha
>>
>>
>>
>>
>> On Wed, Apr 27, 2022 at 1:46 PM <mohamed.boucadair@orange.com> wrote:
>>
>>> Hi Shwetha, all,
>>>
>>>
>>>
>>> The changes look great. Thanks.
>>>
>>>
>>>
>>> There is one specific point not addressed in previous replies. This is
>>> related to this text:
>>>
>>>
>>>
>>>       Next Protocol:  8-bit unsigned integer that determines the type of
>>>
>>>          header following IOAM.  The semantics of this field are
>>>
>>>          identical to the Next Protocol field in [RFC8300].
>>>
>>>
>>>
>>> This means the new requested TBD_IOAM value will also be a valid next protocol. However, I wonder whether IOAM in IOAM in NSH is really something you want to have. If not, I suggest the text is updated to exclude it from the allowed value in the above excerpt.
>>>
>>>
>>>
>>> Other than that, I think that the draft is ready to move forward.
>>>
>>>
>>>
>>> Cheers,
>>>
>>> Med
>>>
>>>
>>>
>>> *De :* Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
>>> *Envoyé :* mercredi 27 avril 2022 10:06
>>> *À :* James Guichard <james.n.guichard@futurewei.com>;
>>> sfc-chairs@ietf.org
>>> *Cc :* BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>;
>>> Frank Brockners (fbrockne) <fbrockne=40cisco.com@dmarc.ietf.org>;
>>> sfc@ietf.org; ippm@ietf.org; Tal Mizrahi <tal.mizrahi.phd@gmail.com>;
>>> draft-ietf-sfc-ioam-nsh@ietf.org; Greg Mirsky <gregimirsky@gmail.com>
>>> *Objet :* Re: [sfc] WGLC for
>>> https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>>> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/__;!!MZ3Fw45to5uY!NGDq-VFOnDYhCxrwRIz1KbT5hb_RKKqKigks-nyqK1RKq5UgpwytWb7clzmlN3o0X0XBWL0KnE3aQfL7wrrx5ZezQN_YdhHpnETuWA$>
>>>
>>>
>>>
>>> Dear SFC chairs,
>>>
>>>
>>>
>>> A new version of the draft I-D.ietf-sfc-ioam-nsh has been submitted per
>>> the discussion in this thread.
>>>
>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-ioam-nsh-09
>>> <https://urldefense.com/v3/__https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-ioam-nsh-09__;!!MZ3Fw45to5uY!NGDq-VFOnDYhCxrwRIz1KbT5hb_RKKqKigks-nyqK1RKq5UgpwytWb7clzmlN3o0X0XBWL0KnE3aQfL7wrrx5ZezQN_YdhFd29kDew$>
>>>
>>>
>>> Can we please progress this draft to IESG if there are no further
>>> comments?
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Shwetha
>>>
>>>
>>>
>>> On Thu, Apr 14, 2022 at 6:41 PM Greg Mirsky <gregimirsky@gmail.com>
>>> wrote:
>>>
>>> Hi Shwetha,
>>>
>>> thank you for the proposed resolution. I agree with Med, direct
>>> normative reference to I-D.ietf-sfc-oam-packet seems like the logical
>>> conclusion of our discussion of the use of the NSH O bit. Please note that
>>> we're referring to I-D.ietf-sfc-oam-packet in the Active SFC OAM draft,
>>> e.g.,:
>>>
>>> The O bit in NSH MUST be set, according to [I-D.ietf-sfc-oam-packet].
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Thu, Apr 14, 2022 at 4:27 AM <mohamed.boucadair@orange.com> wrote:
>>>
>>> Hi Shwetha,
>>>
>>>
>>>
>>> I prefer we go for an explicit reference to I-D.ietf-sfc-oam-packet
>>> rather than “any update to RFC8300”. This is consistent with the usage in
>>> the other OAM draft.
>>>
>>>
>>>
>>> Thank you.
>>>
>>>
>>>
>>> Cheers,
>>>
>>> Med
>>>
>>>
>>>
>>> *De :* Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
>>> *Envoyé :* jeudi 14 avril 2022 12:06
>>> *À :* Greg Mirsky <gregimirsky@gmail.com>
>>> *Cc :* BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>;
>>> Frank Brockners (fbrockne) <fbrockne=40cisco.com@dmarc.ietf.org>;
>>> sfc-chairs@ietf.org; sfc@ietf.org; ippm@ietf.org; James Guichard <
>>> james.n.guichard@futurewei.com>; Tal Mizrahi <tal.mizrahi.phd@gmail.com>;
>>> draft-ietf-sfc-ioam-nsh@ietf.org
>>> *Objet :* Re: [sfc] WGLC for
>>> https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>>> <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/__;!!MZ3Fw45to5uY!LWQuxxxKpUum5gUoK44-znjehj2YRtlGMOATxfRVSc-7JOrPsk4BA4iP0oLQE4d0rObPhOCG_1iiipywftwMIMOEWh8lJI4$>
>>>
>>>
>>>
>>> Hi Med, Greg,
>>>
>>>
>>>
>>> How about this text :
>>>
>>>
>>>
>>> “The O-bit MUST be handled following the rules in and any updates
>>> to [RFC8300] ."
>>>
>>>
>>>
>>> Given that I-D.ietf-sfc-oam-packet  will update RF8300 and there could
>>> be others in future?
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Shwetha
>>>
>>>
>>>
>>> On Tue, Apr 12, 2022 at 9:24 PM Greg Mirsky <gregimirsky@gmail.com>
>>> wrote:
>>>
>>> Hi Shwetha,
>>>
>>> I believe that the text you've quoted is helpful. I would suggest
>>> changing references from [RFC8300] to [I-D.ietf-sfc-oam-packet] throughout
>>> that paragraph.
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Tue, Apr 12, 2022 at 7:56 AM Shwetha Bhandari <
>>> shwetha.bhandari@thoughtspot.com> wrote:
>>>
>>> Med,
>>>
>>>
>>>
>>> Thanks for the details: this is exactly what we had before the latest
>>> revision:
>>>
>>> *4.2 <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-ietf-sfc-ioam-nsh-06*section-4.2__;Iw!!MZ3Fw45to5uY!NBsrzhHEf0Y_-Sindy74K4QDA6EWJjx35STSH-UxEi3eYIX0GVli9Sn1azrOPJVcI2qUzWfezK_1D2RpyFB_FOIpJPfzrvI$>.  IOAM and the use of the NSH O-bit*
>>>
>>>
>>>
>>>    [RFC8300] defines an "O bit" for OAM packets.  Per [RFC8300 <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8300__;!!MZ3Fw45to5uY!NBsrzhHEf0Y_-Sindy74K4QDA6EWJjx35STSH-UxEi3eYIX0GVli9Sn1azrOPJVcI2qUzWfezK_1D2RpyFB_FOIpEB5AbbE$>] the O
>>>
>>>    bit must be set for OAM packets and must not be set for non-OAM
>>>
>>>    packets.  Packets with IOAM data included MUST follow this
>>>
>>>    definition, i.e. the O bit MUST NOT be set for regular customer
>>>
>>>    traffic which also carries IOAM data and the O bit MUST be set for
>>>
>>>    OAM packets which carry only IOAM data without any regular data
>>>
>>>    payload.
>>>
>>>
>>>
>>> This was removed as per the discussion in this thread. Please check
>>> https://mailarchive.ietf.org/arch/msg/sfc/srMit5zE8UseNOhxknAw_dqvj6M/
>>> <https://urldefense.com/v3/__https:/mailarchive.ietf.org/arch/msg/sfc/srMit5zE8UseNOhxknAw_dqvj6M/__;!!MZ3Fw45to5uY!NBsrzhHEf0Y_-Sindy74K4QDA6EWJjx35STSH-UxEi3eYIX0GVli9Sn1azrOPJVcI2qUzWfezK_1D2RpyFB_FOIp-CeLfeA$>
>>>
>>> It looks like we are going in a loop here. This definition of SFC OAM
>>> packet to include the OAM data that comes in inner packets via the next
>>> protocol header chain is introduced in draft-ietf-sfc-oam-packet to update
>>> the RFC8300.
>>>
>>> Jim, What are you thoughts on this? Should we reintroduce the above text
>>> ?
>>>
>>> Thanks,
>>> Shwetha
>>>
>>>
>>>
>>> _________________________________________________________________________________________________________________________
>>>
>>>
>>>
>>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>>>
>>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>>>
>>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>>>
>>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>>
>>>
>>>
>>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>>>
>>> they should not be distributed, used or copied without authorisation.
>>>
>>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>>>
>>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>>>
>>> Thank you.
>>>
>>> _________________________________________________________________________________________________________________________
>>>
>>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>>
>>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>>> they should not be distributed, used or copied without authorisation.
>>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>>> Thank you.
>>>
>>> _______________________________________________
>> ippm mailing list
>> ippm@ietf.org
>> https://www.ietf.org/mailman/listinfo/ippm
>>
>> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ippm__;!!MZ3Fw45to5uY!KzP7tEXj2r_E1qNyQ90q9rykJ0iG0HA0CecIGBFXEIXiWITYay7wwoC0HbiFfO2GyUarxht3JEY45vcV4uCtZ8Xkud0uv58$>
>>
>