Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 03 June 2020 01:58 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 385A83A11D7; Tue, 2 Jun 2020 18:58:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=UK9HzZgo; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=cisco.onmicrosoft.com header.b=WvOu0IB0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ufvuuQc8UioY; Tue, 2 Jun 2020 18:58:17 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41E173A11D6; Tue, 2 Jun 2020 18:58:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=34077; q=dns/txt; s=iport; t=1591149497; x=1592359097; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=5lYpdmanwZHTV9GbJPPj6Kb9cA4b7cqkYnz2K5Dyx2c=; b=UK9HzZgo+Cwo4mJ36y1no/4vaE8CAvjoAsVzzCf4x3LnzvQdyrXXfjEM QTU6iob9WxozN0ucxxwN9Lt8/tDR5N/vD+QP/7JUtna9sD1qwaq+7eqHy Z1Dzy3NyhX9Caa5agqqidPSl9hhFoodA9yeCEnoqIyoUMuP2RG0mgjQCR A=;
X-Files: signature.asc : 873
IronPort-PHdr: 9a23:y4+JVRBnobNXO/WPmo3SUyQJPHJ1sqjoPgMT9pssgq5PdaLm5Zn5IUjD/qw00A3GWIza77RPjO+F+6zjWGlV55GHvThCdZFXTBYKhI0QmBBoG8+KD0D3bZuIJyw3FchPThlpqne8N0UGF8P3ZlmUqXq3vnYeHxzlPl9zIeL4UofZk8Ww0bW0/JveKwVFjTawe/V8NhKz+A7QrcIRx4BlL/U8
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.73,466,1583193600"; d="asc'?scan'208,217";a="780459713"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 03 Jun 2020 01:58:15 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 0531wFqw006722 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 3 Jun 2020 01:58:15 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 20:58:15 -0500
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 20:58:14 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 2 Jun 2020 20:58:14 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=icqtzZeEteU2Pt36G8SOj8CsDJEooV79EKyes48sPOwsl1Uqotb3MKlxMnxvxELGzIHREmKhraWCo8yyz/MJyegGf3GnA+qRhBBfA3JRmZTdcm1pVWouhK1gr3cY972QUpAHqJSFaSM7CArpJ2jNPy2XBifXLhpKE50S8H0Op/dMLr5EN79PhGngBjDBu77pvGsYq5YTEXgwzmDbZ7TUgwy56DM38nVWSztiCvLq5ljjBMIyDxrjrQGxSm2aL2W1eeP/isNf9Fc/N/ScNl2RGZ67f6GbXmIOWJ6peuQSq9wT0iRGv5gAmfImHis4juLZdzJ3NXQJBTeMZKDxKLa1ng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GPS3Hy9uaP/1K3ArZYgpJy6/Qgdqw+rCSCFrFBusvgE=; b=KogZOGu3wfcCcMtOVU8pNavI2vIM73HwL4m8hrqHhZ2CUuyjFLKUYKhbKo7wq+udJs9rvMh5CxJ77848uLth39YxJxmC59+yhp0GRgNfJjhPkf8ffiZDEs2H1WGF6BrKdT8/3En9cMwofBejJXTmbtj9krOYUIsEawtDmjAA1j/lVJWHGRyOdMCtTC5HRvJl3a4VspCpQu+ja2uo9Pt4AligItrv/xBlKBnLT+fzguzy5D9kD7fp0aBxIoFgiHCGqZqnsq0UqyFT/o4VBZgBpeggzhqPkEb8/B30aWcFSvbNKxYKbB5vW0DYq0HnZ2Px1D+X6QcbYgSMETKm4Gtf2Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GPS3Hy9uaP/1K3ArZYgpJy6/Qgdqw+rCSCFrFBusvgE=; b=WvOu0IB0ZXl3ta7GsjJz50F1wVvH14GlwdyGiK3myZS3iuN05eNgMnym1uewYGFm5u6Gdctqo4DMYsRuO6rV4+Y6sMaE1x56kiPX0zV3uArM+DVehlgNdJ1y39D2qOPE7Wf35BzKq3++nMCV9IjXcTEuTpW0VjPPSovsrmzrdEk=
Received: from BN8PR11MB3635.namprd11.prod.outlook.com (2603:10b6:408:86::20) by BN8PR11MB3713.namprd11.prod.outlook.com (2603:10b6:408:8e::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3045.19; Wed, 3 Jun 2020 01:58:13 +0000
Received: from BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::c0e8:9942:9972:5590]) by BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::c0e8:9942:9972:5590%5]) with mapi id 15.20.3045.024; Wed, 3 Jun 2020 01:58:12 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: Service Function Chaining IETF list <sfc@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>
Thread-Topic: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
Thread-Index: AQHWNDmeVIt1YNUip0qgLxabcbg+LqjGAo6AgAAp3gA=
Date: Wed, 03 Jun 2020 01:58:12 +0000
Message-ID: <0A514F1F-342B-4DC7-B7E9-F81BE0AFEA02@cisco.com>
References: <159002475323.18843.9559672930298713998@ietfa.amsl.com> <CA+RyBmXXRoPkhXjhpneC8UyBDbxh8P81YDYpRTnbqQiLu64ogQ@mail.gmail.com> <D09FF572-A4CD-464A-BC09-81064B29E517@cisco.com> <CA+RyBmVObnN8=AbpWveoK0V9fZGDF=UFr+L=9iN5G-NxFq0vgg@mail.gmail.com>
In-Reply-To: <CA+RyBmVObnN8=AbpWveoK0V9fZGDF=UFr+L=9iN5G-NxFq0vgg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.129.159]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f35e725e-8350-4c39-9603-08d8076192d9
x-ms-traffictypediagnostic: BN8PR11MB3713:
x-microsoft-antispam-prvs: <BN8PR11MB3713945B8366C50EB7D50870C7880@BN8PR11MB3713.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 04238CD941
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: lc3w7aaJzbK6jOx1VRbKEYEWtsQPuhOlcXpcGnTkVdadESn+VSdlQB5IVrG+x+edC7BKgctOMI6HKHfDzV6JISN7xRDryggBfG+8yyl7IzQBFRxmiIW4drtUuzy2rDoNWs9qMa7tbZilhdHgC9POM8DXohpq9VJoHpeoQVnKWETNWs+f3YSEWseNVJAB2jJChXBnqtdoSFkueY+5WeoXb5HyfCzeTXmOk+kqX2aK+skS1O5QnrDoBXiw6CSld27IxjFfi2N+s2hpnF1nEmDO0SW7ySYiUwsHfv23GcIhK76hu6QL5JtlR5cQ6i5VuDoXxekVQWUIuZB4B/PUEHgoltrYk+KnCMuP8aOaHvDxtIKB+b5+3hgx0uCbLprF1xLnThjf9hqnkJWO0/Gb0kDavA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR11MB3635.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(396003)(376002)(136003)(346002)(39860400002)(366004)(2616005)(6486002)(478600001)(66574014)(166002)(76116006)(66476007)(66556008)(33656002)(66616009)(86362001)(64756008)(99936003)(66446008)(36756003)(91956017)(2906002)(71200400001)(66946007)(966005)(6916009)(6512007)(53546011)(26005)(5660300002)(15650500001)(186003)(6506007)(4326008)(8676002)(54906003)(83380400001)(316002)(8936002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; boundary="Apple-Mail=_0161D837-0634-47CC-8604-7BBB603D5D92"; protocol="application/pgp-signature"; micalg="pgp-sha256"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f35e725e-8350-4c39-9603-08d8076192d9
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jun 2020 01:58:12.8031 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ur4hRHHWA5L+KSNNM9fi+EZBFcQCPbQynAeVHfCVefa8rl6xXZ9w0zf5FOql3xclUZqT/wZQzODZKETg/wEAUA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3713
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/lNq0H5gFD-sERRR7KOFBqVR5ff0>
Subject: Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jun 2020 01:58:20 -0000

Dear Greg,

A top-level response first:

> GIM>> Will add the SFC OAM framework document as Informational Reference and clarify which functionality the proposed mechanism addresses.

This superficial patch does not address my deep and foundational concern, expressed initially 2 years ago before draft-ietf-sfc-multi-layer-oam adoption.

The idea is to start from the framework’s evaluation to understand what is needed based on that gap study, and produce a solutions that build on existent — not work in a vacuum, and then add an Informational Reference orthogonally.


~~~
As a complete aside, I got curious about the filename of this I-D, which has nothing to do with the content.

This document went from:
            Multi-Layering OAM for Service function Chaining
Abstract
   This document tries to discuss some problems in SFC OAM framework
   document and proposes the SFC OAM multi-layering requirements in SFC
   domain to improve the troubleshooting efficiency.

To something completely different.

It is as if the filename was reused to write 2 or 3 different drafts. Looking at diffs, there is not a single sentence that remained from earlier versions.
~~~

Comments inline.

> 2020/06/02 午後7:28、Greg Mirsky <gregimirsky@gmail.com>のメール:
> 
> Dear Carlos,
> please find my answers and notes in-line under the GIM>> tag.
> Please let me know if you have any further questions.
> 
> Regards,
> Greg
> 
> On Wed, May 27, 2020 at 8:15 AM Carlos Pignataro (cpignata) <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
> Dear Greg,
> 
>> We much appreciate your comments and questions.
> 
> 
> Thank you for asking and inviting commentary. Here’s some thoughts:
> 
> Hello, WG, Chairs,
> 
> I believe fundamental concerns with this work remain unanswered — examples:
> https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/ <https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/>
> https://mailarchive.ietf.org/arch/msg/sfc/TT3L-R05fbIGkfjr-x_oifBrhsc/ <https://mailarchive.ietf.org/arch/msg/sfc/TT3L-R05fbIGkfjr-x_oifBrhsc/>
> https://mailarchive.ietf.org/arch/msg/sfc/sSO2BcgXereje4PxnGY9Wv_pDOs/ <https://mailarchive.ietf.org/arch/msg/sfc/sSO2BcgXereje4PxnGY9Wv_pDOs/>
> And since some of those questions were asked during adoption, I’d recommend at least un-adopting this document.
> 
> Email threading in one-year-old and two-year-old emails is super hard to parse and follow, so some key concerns are:
> 1. This document describes an OAM solution, but ignores the WG’s SFC OAM framework which sits with the IESG.
> GIM>> Will add the SFC OAM framework document as Informational Reference and clarify which functionality the proposed mechanism addresses.

See above.

> 
> 2. Existing protocols can already provide solutions without the need of inventing a new protocol on paper. See #1 above.
> GIM>> Could you kindly reference a document that describes how existing protocols can be used to troubleshoot SFC NSH? If I look at the SFC OAM framework draft I can only find the sub-section about the potential use of ICMP that closes with the following:
>    It could be observed that ICMP at its current stage may not be able
>    to perform all required SFC OAM functions, but as explained above, it
>    can be used for some of the connectivity functions.
> If ICMP cannot be used, then what other, unnamed in the SFC OAM Framework document, existing protocol can be used as SFC NSH Echo Request/Reply mechanism?
> 

What I read in that paragraph is:
1. ICMP can as-is solve many (but not ALL) required OAM functions.
2. Adding to ICMP is the path of least resistance, it is largely there, but needs additions to support ALL OAM functions.

> 3. There are already documented SFC traceroute implementations but this document has no implementation experience. See #2 above.
> GIM>> As mentioned in the SFC OAM Framework draft, ICMP may not fully address all the needs of tracing SFP. Is there any other document mentioned in the framework that can?

Greg,
1. Yes, I-D.penno-sfc-trace has the indisputable running code proof.
2. Instead of copying MPLS LSP Ping into a brand new protocol, fill in the gaps based on existing modules.

The point here is implementation experience — could you answer the still unanswered question #1 here?
https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/ <https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/>


> 
> Dear Greg,
> 
> Could you please start responding to previous questions? Apologies in advance if I missed any of your responses.
> 
>> Per our analysis, existing OAM mechanisms cannot support both SFP ping and SFP traceroute.
> 
> Which analysis? Perhaps you could share that analysis?
> GIM>> Gladly. I was referring to ICMP over SFC NSH. As noted in the framework draft, ICMP can be used to ping an SFC entity along the SFP if the sender knows the IP address of that entity and the number of IP hops to that distance (rather impractical but theoretically achievable). But can ICMP be used to trace the given SFP without the upfront knowledge of IP addresses of SFC entities along the SFP? Based on our analysis, not. Assume that the destination IP address is set to the IP address of the last SFF (similar to how ICMP traceroute works in IP network) and TTL in NSH is set to 1. The first downstream from the sender SFF will remove the NSH and forward the ICMP packet to its destination over the IP network.

NOT.

As I had pointed out earlier, there are MANY ways of intercepting a packet. Use an IP option or a flag in the NSH.

Problems with your logic:
1. When you say ICMP you are thinking unmodified ICMP Echo packet. Think outside that box.
2. Whatever you use you need to intercept.

> Similarly, when NSH' TTL incremented, the second SFF will remove NSH and forward ICMP packet to its destination, i.e. the last SFF. As a result, all ICMP echo replies the sender will receive will be from the same SFF, from the last SFF in the given SFP. Clearly, that is not what a traceroute tool should produce.
> 
>> Consider ICMP. When encapsulated in NSH, it supports the ping function but, per our analysis, cannot be used as an SFP tracing tool.
> 
> What exactly did you need to add to have that functionality as opposed to your consideration of ICMP?
> GIM>> A dedicated to SFC NSH OAM protocol type.
> 

Incorrect again. There is no technical need to add an SFC NSH OAM protocol type. There are many ways of marking a pak as OAM and demultiplexing the protocol.

I do understand you have a solution in mind.

Carlos.

> Thanks!
> 
> Carlos.
> 
> 
> 
>> 2020/05/20 午後10:51、Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>のメール:
>> 
>> Dear All,
>> this version includes a minor update to the Security Considerations section.
>> We, the authors, believe that the draft is ready for the WG LC. It defines an essential function of SFC OAM - SFP Echo request/reply. Per our analysis, existing OAM mechanisms cannot support both SFP ping and SFP traceroute. Consider ICMP. When encapsulated in NSH, it supports the ping function but, per our analysis, cannot be used as an SFP tracing tool.
>> We much appreciate your comments and questions.
>> 
>> Dear Jim and Joel,
>> please kindly consider the WG LC for this draft.
>> 
>> Regards,
>> Greg
>> 
>> ---------- Forwarded message ---------
>> From: <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>> Date: Wed, May 20, 2020 at 6:32 PM
>> Subject: New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
>> To: Bhumip Khasnabish <vumip1@gmail.com <mailto:vumip1@gmail.com>>, Cui(Linda) Wang <lindawangjoy@gmail.com <mailto:lindawangjoy@gmail.com>>, Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>, Wei Meng <meng.wei2@zte.com.cn <mailto:meng.wei2@zte.com.cn>>
>> 
>> 
>> 
>> A new version of I-D, draft-ietf-sfc-multi-layer-oam-05.txt
>> has been successfully submitted by Greg Mirsky and posted to the
>> IETF repository.
>> 
>> Name:           draft-ietf-sfc-multi-layer-oam
>> Revision:       05
>> Title:          Active OAM for Service Function Chains in Networks
>> Document date:  2020-05-20
>> Group:          sfc
>> Pages:          18
>> URL:            https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-05.txt <https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-05.txt>
>> Status:         https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/ <https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/>
>> Htmlized:       https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-05 <https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-05>
>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam <https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam>
>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-05 <https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-05>
>> 
>> Abstract:
>>    A set of requirements for active Operation, Administration and
>>    Maintenance (OAM) of Service Function Chains (SFCs) in networks is
>>    presented.  Based on these requirements an encapsulation of active
>>    OAM message in SFC and a mechanism to detect and localize defects
>>    described.  Also, this document updates RFC 8300 in the definition of
>>    O (OAM) bit in the Network Service Header (NSH) and defines how the
>>    active OAM message identified in SFC NSH.
>> 
>> 
>> 
>> 
>> Please note that it may take a couple of minutes from the time of submission
>> until the htmlized version and diff are available at tools.ietf.org <http://tools.ietf.org/>.
>> 
>> The IETF Secretariat
>> 
>> 
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc <https://www.ietf.org/mailman/listinfo/sfc>