Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Mon, 10 June 2019 05:10 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C74CA12016C for <sfc@ietfa.amsl.com>; Sun, 9 Jun 2019 22:10:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.519
X-Spam-Level:
X-Spam-Status: No, score=-13.519 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_FONT_FACE_BAD=0.981, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=WdCx5ubI; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=RHrkprO1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ynw4FEMTWAxz for <sfc@ietfa.amsl.com>; Sun, 9 Jun 2019 22:10:15 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C73D912000E for <sfc@ietf.org>; Sun, 9 Jun 2019 22:10:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=58841; q=dns/txt; s=iport; t=1560143414; x=1561353014; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=5+EPESVmG3SE2hAf2SJ2aUDaEVSTsFr6d8af3tD+pFg=; b=WdCx5ubICoQ3QC/2PvTp+V2Y9+SKNmzA5MNY42geend5/rYtpBL0th0N 3Q8vpdquoGzNAf4KDqKMXrfyFR26ztYx32bpJJKFag54DmQMOMSV3G8/L rEsJsvl41i11vZ7NQ1Gyn8UtsUfdZYIOvCxXEjhzkQ27yyWBOd6kXq+eu 8=;
IronPort-PHdr: 9a23:4u0GnBBwFiqkV+P+95W7UyQJPHJ1sqjoPgMT9pssgq5PdaLm5Zn5IUjD/qs03kTRU9Dd7PRJw6rNvqbsVHZIwK7JsWtKMfkuHwQAld1QmgUhBMCfDkiuJ+brYCozAM1qX15+9Hb9Ok9QS47z
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BwBgAO5f1c/49dJa1lgyYBLlADalUgBAsohBWDRwOOXYwajW+BQoEQA1AECQEBAQwBARgBCQsCAQGBBV2CXgIXglQjOBMBAwEBBAEBAgEEbRwMhUsCBAEBEAgJHQEBLAsBDwIBBgI4AQYDAgICHwYLFBECBA4FGweCewQBAYEdTQMdAQIMilWQYAKBOIhfcYExgnkBAQWBRkFAgjIDCguCDwMGgTSLXReBQD+BEAEnH4FOfj6CGkcBAQIBARaBDzcYFkqCEzKCJotSEweCPIRsgh+GH4xvLD4JAoIPhkRmg3CEPYNrG4IlhnyNeo48hWqBY4o9F4JwAgQCBAUCDgEBBYFmIQ2BS3AVGiEqAYJBEyuBLYQUhRSFP3IBAQEBgSWMdCuBNm8BAQ
X-IronPort-AV: E=Sophos;i="5.63,573,1557187200"; d="scan'208,217";a="285108771"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Jun 2019 05:10:13 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x5A5ADHt012505 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 10 Jun 2019 05:10:13 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 10 Jun 2019 00:10:12 -0500
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 10 Jun 2019 00:10:12 -0500
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 10 Jun 2019 00:10:12 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5+EPESVmG3SE2hAf2SJ2aUDaEVSTsFr6d8af3tD+pFg=; b=RHrkprO15VFILQtp98tDUCnz6/C2i8eTxdZ7hFG2EZ7RJfve8T5U9RyzrUM6bk6ujCHNcjSMbOkhtPTkc4EbFrEw7xrID54ifLwPHPIOgXQuAParEAaZLq/CCHUfoibkjLWMb51YMtwt2nDJ9wUL5Ec/MhAfWw5s6NQvo6C9Kjo=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB3137.namprd11.prod.outlook.com (20.177.206.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.17; Mon, 10 Jun 2019 05:10:10 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::ec33:f4c1:227a:fcb3]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::ec33:f4c1:227a:fcb3%5]) with mapi id 15.20.1965.017; Mon, 10 Jun 2019 05:10:10 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: James Guichard <james.n.guichard@futurewei.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
Thread-Index: AQHVFWHG6SZyvEyD3EGGLNC6v36bBKaSD6uAgAJbG4A=
Date: Mon, 10 Jun 2019 05:10:09 +0000
Message-ID: <B0E8229E-C716-40EC-B754-CC1222D77C6C@cisco.com>
References: <BYAPR13MB25978FD458B59EB22067685FD21E0@BYAPR13MB2597.namprd13.prod.outlook.com> <CA+RyBmXctjcbT_x+RJjes88vKxTPygcz=RcHfJwNHJ_Brc-3rA@mail.gmail.com>
In-Reply-To: <CA+RyBmXctjcbT_x+RJjes88vKxTPygcz=RcHfJwNHJ_Brc-3rA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com;
x-originating-ip: [2001:420:c0c8:1001::506]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4a72da04-972e-450d-626e-08d6ed61e995
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB3137;
x-ms-traffictypediagnostic: BL0PR11MB3137:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <BL0PR11MB313777137F8562AD7B12DB47C7130@BL0PR11MB3137.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0064B3273C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(39860400002)(366004)(396003)(376002)(199004)(51444003)(189003)(14454004)(57306001)(446003)(2616005)(6246003)(1411001)(486006)(476003)(256004)(14444005)(11346002)(7736002)(86362001)(5070765005)(68736007)(6116002)(53936002)(5660300002)(81166006)(81156014)(83716004)(82746002)(8936002)(8676002)(50226002)(66446008)(64756008)(76116006)(73956011)(66946007)(66476007)(66556008)(91956017)(71190400001)(71200400001)(6436002)(46003)(606006)(54906003)(440504004)(517774005)(6916009)(30864003)(6486002)(229853002)(76176011)(99286004)(316002)(6306002)(25786009)(54896002)(53546011)(236005)(478600001)(6512007)(33656002)(4326008)(186003)(6506007)(102836004)(2906002)(966005)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3137; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: CR66y2twseOJ4cs08u/vMq0rwkyv2bWWzWItEMpAZIBLg1TQGFh+D0uyNnj6k/rf5pLDS8OuouGq8vD5/RcwSCvbuUqFaVKakigUq/r8YzEmevdbSDEz/Infxvzg9YBcF+0k32COXDGAKiTUp3D6gesciMkgJwNykz1bJPY/IwK3GJHNU3kOEVQ3UhOiPuiRsWAjR3e9YtqOt9RWLZRBWjlRxSIy3u7GBatkCtb2Rzfyw1SGRPrv0NaZXyt2tUpqvjnJAvp5zh37n8iUUQt5ML/6qFUXzZWULe+9IcI+03JvYpW/P3oU0e2qt1XykDtey6wjrgsMDgPSPU07dbpJazDTTNjbSvSIf/Nfr+iIoQHV5E0Mn9wIzBmBLXdqYX3a+9nM8MCuI7auscbJ83B62GNihaKtdSNgulsA3475c6U=
Content-Type: multipart/alternative; boundary="_000_B0E8229EC71640ECB754CC1222D77C6Cciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a72da04-972e-450d-626e-08d6ed61e995
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jun 2019 05:10:09.9759 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3137
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.16, xch-rcd-006.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/Xkngew2aNIBRTOGbv2sBinDZvi0>
Subject: Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jun 2019 05:10:25 -0000

Greg,

Thank you for taking the time to review this important document.

My analysis of your review is that the vast majority ((almost) all) of your comments are editorial in nature — from typos to readability suggestions. We will make updates to the document to address your comments and suggestions, and thus improve the readability of the document.

A new revision will address all the comments (all typos you called out, editorial issues and improvements, except where there’s only a personal editorial preference) as replied to below.

From the less editorial: We will also add some text to clarify "BFD applicability" and to clarity “Availability”, and all others have been responded to below including whether there were references missing (BTW we will move [ICMPv4] and [ICMPv6] as Informational as per Adrian’s comment).

Please see inline for some specific answers.

On Jun 8, 2019, at 1:11 PM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:

Dear Authors, Jim, Joel, et al.,
please find my comments to this draft below:

  *   Section 2
     *   An SFC layering model is introduced. I couldn't find it being mentioned in section 1.1, where the scope of the document is defined.

A model is explained, not introduced. This follows the SFC models.

     *   What VMx symbolize in Figure 1? To which layer of SFC they belong?

Virtual Machine.

     *   What is being symbolized by 'o' in Overlay network, Underlay network, and Link layers respectively?

What Adrian referred to as “legs”. We will slightly update this as per Adrian’s comment.

     *   What is the purpose of Figure 1 outside Section 2

I do not understand this question.

     *   what is the purpose of Section 2? For only one sentence in Section 3 that states the obvious:

The SFC operates at the service layer.

I apologize I do no follow the meaning of your note. But, S2 explains the model which is used in the doc, and “obvious” is in the eye of the beholder. Note that IETF documents have cross functional review, might not be obvious to all readers.

  *   Section 3
     *   In "testing the service functions from any SFC-aware network devices (i.e.classifiers, controllers, other service nodes)", what is the scope of testing expected? Testing, for example, NAT? Also, what are "other service nodes"? Neither RFC 7665 nor this draft define service nodes in SFC.

Good editorial point, we can change “service node” throughout the document if it makes it easier, bu RFC 8300 does use the term “service node”.

     *   In "validate the correlation between a Service Function Chain and the actual forwarding path followed by a packet matching that SFC, etc.", is "the actual forwarding path followed" Rendered Service Path? If it is so, then what is validated? That RSP is part of SFP? Also, what "etc." refers to? Anything else?

What is tested is the correlation. We can add RSP and remove the etc as editorial comments.


     *   Figure 2, SF OAM.. I can envision a Controller generating test packets for the specific SF, SF3 in the figure. But where OAM packets come from for SF3 and SF5 (line interconnecting two SFs)?

This figure is exemplary and ilustrative for highlighting the three defined components.

  *   Section 3.1.1
     *   I hoped to find the definition of availability, which is a performance metric, and how it is measured in SFC OAM. For example, MEF defines Availability Performance in MEF 10.3 (it's rather lengthy to quote all, so just two sentences):

Availability Performance is the percentage of time within a specified time interval T during which the Frame Loss Ratio is small.

Availability Performance is based on Service Frame loss during a sequence of consecutive small time intervals.


I’m not sure of the relevance of the MEF comment, but solutions can define what they measure.

If you have a specific suggestion as a replacement for “availability’, please share. However, I’ll say that “availability” is used in other RFCs as a general term.

  *   Section 3.1.2
     *   It opens with "Second SFC OAM requirement ..." but I couldn't find where the first requirement was listed.

Section 3.1.1 begins with “One SFC OAM requirement”.


     *   Then the text explains that the scope of performance measurement of a service function component is "check the loss and delay induced by a specific service function". Would delay variation be of interest too? Also, as noted above, availability is another performance metric that characterizes the loss ratio over a period of time. Should it be discussed in the same paragraph or this paragraph title specifically refer to loss and delay performance metrics since only these two metrics being discussed?

Section 3.1.1 is about availability / uptime, Section 3.1.2. about specific PM such as delay, loss.

  *   Section 3.2.1
     *   The text slides into the discussion of path connectivity verification and tracing RSPs. These are essential OAM functions but, I believe, are not part of measuring the availability of an SFC.

Only Section 3.1.1 is about availability. Section 3.2.1 is parallel to 3.1.1 and a different topic.

  *   Section 3.3
     *   Is validation of a Classifier functioning is all that is required in Classifier OAM? Where are Classifier performance metrics, e.g., loss ratio, delay, and availability?

Are there specific OAM functions on the classifier that you believe are missing? Do you believe delay in the classifier is important? Please share some text about it.

  *   Section 4
     *   In the first sentence s/is/are

Agreed. Thank you.

     *   Could you kindly help me understand "which many will be applicable to”?

Yes. Many functions applicable to many components. We can reword for ease of clarity.

     *   "Various SFC OAM requirements listed in Section 3<https://tools.ietf.org/html/draft-ietf-sfc-oam-framework-06#section-3>" I found only one explicitly called out, in Section 3.1.2. Where are others?

Section 3.1.1 for example.

     *   "Many of the OAM functions at different layers are already defined and in existence." Could you please support this statement with references?

We can do better — see Section 5.1.

     *   Besides s/service/the service/ something else seems missing in the closing of the sentence "In order to apply such OAM functions at service layer, they have to be enhanced to operate a single SF/SFF to multiple SFs/SFFs in an SFC and also in multiple SFCs.”

We will fix this editorial.

  *   Section 4.1
     *   I think that the first sentence be would be clearer if it opens with "Connectivity verification …”

It would be redundant with “ function to verify"

     *   I cannot agree that "Connectivity is mainly an on-demand function". If that's your view, in which category you place CFM (IEEE 802.1ag)? Also, ping is not actual connectivity verification function as it doesn't detect misconnection.

We can change to LSP Ping.

     *   In the last bullet, is it suggesting to use ping as proactive CC?

No.

  *   Section 4.2
     *   CC OAM, e.g., BFD, does not monitor a device but, using positioning statement from RFC 5880, "path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves.”

Good point, we can remove “device"

     *   The last bullet reads awkwardly "Notifying the failure upon failure detection for other OAM functions to take appropriate action." Also, can other applications receive failure notification?

We can reword if you find it confusing.

  *   Section 4.3
     *   I think that the first two bullets should apply to any arbitrary set of SFC elements, not only to every component of the given SFC.
  *   Section 4.4
     *   I think that the second sentence can be improved by s/measurements/performance metrics/, so that it reads "These performance metrics could be measured pro-actively and on-demand."
     *   Second para, first sentence. s/perform/measure/?
     *   What the third and fourth sentences of the second para trying to convey? What is "approximation of packet loss"? Can you define it or give the reference to the definition of this performance metric?

Yes, we can make these editorial suggestions above.

     *   The definition of a delay in SFC in the third para is confusing. What does it mean "delay is measured from time"? And when the second timestamp at the egress SFF should be taken?

Can you please provide a definition?

     *   Delay variation, I believe, is calculated, not measured.

OK.

     *   What are resolution and accuracy for the delay and delay variation SFC PM OAM tools are required to provide, given that you expect to measure them for an SF? I believe that would be very helpful to state in the document.
     *   Also, considering the scale of measuring a delay introduced by an SF, what are the methods of obtaining accurate ToD?
  *   Section 5.1
     *   Again, regarding "connectivity" and "continuity".. None of IP, MPLS (except MPLS-TP), or overlay OAM tools so far provides actual connectivity verification. If these terms are used interchangeably in this document, that must be clearly stated. Alternatively, definitions of terms must be provided, preferably with references to well-established in the industry documents.

We are using IETF nomenclatures.

     *   Information in Table 3 is outdated. With SFC WG draft on Active OAM, Ping and Trace columns must be set to Yes.

No. This table covers existing OAM Functions fully defined, and/or with running code. This include OAM functions that can actually be used (normatively in documents or in practice on an actual wire).

     *   Why in Table 4 Netconf is not listed in the Notification column?

Good point! Will add.

     *   Assuming SF and SFC have data models and thus can be configured using, for example, Netconf. Why the same models cannot be used for orchestration? And how certain you are that there are no TOSCA models for orchestration?

If you know of any additional model, please share.

     *   What prevents an implementation of SF or SFC from generating syslog notification?

Someone defining it and someone coding it?

  *   Section 6.1
     *   It refers only to RFC 8300 SFC NSH.

See the last sentence of the Abstract of RFC 8300.

     *   Any consideration is given for RFC 8595 An MPLS-Based Forwarding Plane for Service Function Chaining?

Do you have any suggestion beyond the existing text that says that
   Any other overlay encapsulations used in future must have a way to
   mark the packet as OAM packet.



  *   Section 6.2
     *   RFC 5880 has no definition for "BFD reply packet". Please clarify.

Typo. Will fix.

  *   Section 6.4.1
     *   Without clear definition of the terms "SFF availability" and "SF availability" it is hard to agree that ICMP can be used to measure this performance metric (see my notes at the top).
     *   "...it can be used for basic OAM functions." Could you provide the reference to the document that defines the list of "basic OAM functions". Or provide the list itself in this draft.

We will clarify these both editorially.

  *   Section 6.4.2
     *   Applicability of S-BFD is discussed but not of BFD, as defined in RFC 5880. I couldn't find the explanation for excluding BFD from consideration.

The text already mentions BFD, but we can expand a bit.

  *   Section 6.4.3
     *      Without the definition of availability for this draft, the following statement is subjective, at best "In-Situ OAM could be used with O bit set and perform SF availability, SFC availability of performance measurement.”

See above.

  *   Section 6.4.4
     *   Clearly is missing reference to draft-ietf-sfc-multilayer-oam. Surprisingly, the sectin refers to the draft that expired April 2, 2016.

Not surprising, and not missing. See above.

 After reviewing how fundamental are outstanding, in my opinion, questions, how numerous are problems with the text and how many statements are not supported by definitions or proper references, I believe that the document cannot be published in its current form.

Thank you again for taking time to review this document. See above.


Regards,
Greg


On Tue, May 28, 2019 at 7:37 AM James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>> wrote:

Dear WG:



This message starts a new two week WG Last Call on advancing https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/<https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-sfc-oam-framework%2F&data=02%7C01%7Cjames.n.guichard%40futurewei.com%7Ce47e5eb13f224f18c46408d6e378b2f7%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636946504868870205&sdata=lkKvAgmKik7lkqGANQpnIvBRdbjKAqYtzTUdTfB9f3Y%3D&reserved=0> for publication as an Informational RFC.



Substantive comments and statements of support for publishing this document should be directed to the mailing list. Editorial suggestions can be sent to the authors.

Please let me know if there’s anything that was missed on this reply.

Thanks,

Carlos.

This last call will end on 11th June 2019.



Thanks!



Jim & Joel




_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc
_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc