Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 30 March 2022 17:49 UTC
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C3A63A1783; Wed, 30 Mar 2022 10:49:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.605
X-Spam-Level:
X-Spam-Status: No, score=-9.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=RYUNkFlv; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=OWvsf0PK
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qcpR49HUU8uV; Wed, 30 Mar 2022 10:49:45 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF2853A177F; Wed, 30 Mar 2022 10:49:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=59883; q=dns/txt; s=iport; t=1648662585; x=1649872185; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=EqBtRey20VXxKlVXIrPXfKLGrmOnPsHPh86/Tb5IyAA=; b=RYUNkFlvYa8VpHJAcNGt8cf1oDmr9EK5n10AbhNi3EDCWLbjhaewCyHq Woo/bcaW3bl8jjlQ/yu+GdyTHiv9REoaCTLcGOMdQdTR2gEDXzHHcKhs1 EXJPhfp4s58O7McwRQD4D7c5XHXbu/m+JhI0znVplekFTMDQSl6Ll12fk c=;
IronPort-PHdr: A9a23:kmcawBbCnXx53oI1FZELiCL/LTAphN3EVzX9orIriLNLJ6Kk+ZmqfEnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8ScJFUlIt/3yyPUVPXsjkYFiHqXyp5jlUERL6ZmJI
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AHAADSl0Ri/5ldJa1QChkBAQEBAQEBAQEBAQEBAQEBAQESAQEBAQEBAQEBAQEBggYEAQEBAQELAYEgMVYHd1o3RIRUg0oDhFlghRCDAgOLEoUxinSBLhSBEQNPBQsBAQENAQEsAQoMBAEBhQcCF4Q+AiU0CQ4BAgQBAQESAQEFAQEBAgEHBIEJE4VoDYZDAgEDAQEQCAkdAQElBwQHAQ8CAQYCDioBBgMCAgIfBgsUEQIEDgUigmIBgg5XAy4BDpJ7jzYBgToCgQ6JEXqBMYEBgggBAQYEBIE3ARNBgn8NC4I4AwaBPAGDEIMAgSUBAYEfhXMnHIFJRIEVJxyCZz6CIUIBAQOBIwUBBwsBIC4JgmQ3gi6YEwVtMTIBAxQOEAkIBwECBgILORUgCEIICAUEJAIQGBM4kW4bBoNSiWRujRKQRAF7Q2sKg0mLEI1pgQKFewUug3RIi26YIpZdgkmKT4NUkDwsBA5WAYQiAgQCBAUCDgEBBoFhPGlwcBU7KgGCCgEBMj4TGQ9WjUoJAxYVgzuFFIVKdTgCBgEKAQEDCZFgAQE
X-IronPort-AV: E=Sophos;i="5.90,223,1643673600"; d="scan'208,217";a="1016817620"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Mar 2022 17:49:42 +0000
Received: from mail.cisco.com (xfe-rcd-002.cisco.com [173.37.227.250]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 22UHnf9C021029 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 30 Mar 2022 17:49:42 GMT
Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Wed, 30 Mar 2022 12:49:40 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Wed, 30 Mar 2022 12:49:40 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m9YaT8KGp5fMd4oJkC4cOmx4zbTpNInMUjV04ZmaXErcd6vWxQZubssBnKW+ZE3cdeSJ9u8zfhCCQTMZQFhlaEYNmMFb+XICcO91XZDRD+pYpHmLUoT9SPLQAnbhn+9q6EXjr+HsZwpfSs/wUV5tDo1npUD+Ac96iFiDEvVWDOnBiz/uCxrO5rixK7i6SBSz9eyjM2cu+ZArWWFEbEaAHLK2xv9z3wVLJOkVmTyW0iOyyhqav48Ujz7YxeYfb/KBs4oD5ZsMLV0Fk7G1zmJ20V0e0CpRYc5NI3xj0Fo9soJct8oEcD/uRITu4/hTz2olCDPdKjoltdodcPcX/nL5jA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EqBtRey20VXxKlVXIrPXfKLGrmOnPsHPh86/Tb5IyAA=; b=aWSKIr+GRcaaMoBhAVUktKD9AleC7r/PblQnSfWFjfjMf6S4lMphn4qtdFMAe6x2F+R/i2jgbOaXszWskpw71eGvO/VVpLvnOMFnDtOFazSPq1jfxn7aadUtGyNzVK+0iOBmNnQLAvc76vj4BCChpbphUnv9Ml+aXauqmyxDwSxU9EYHbPRWFQ+4zVCT0fKU1h66pC/7YaPup4EB5LAh3980ceIV4QOFVnIee/Bw3tyYc0yTRs32eVVGVjtQ0h15rxLh0pR2S+Vz4kVI4ewhiixai5FxmbCNbkcLniimn6/Vnrm/MSLA0aowceJ3DjqwDwDN05yY4DLcjVl6RoD2ZA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EqBtRey20VXxKlVXIrPXfKLGrmOnPsHPh86/Tb5IyAA=; b=OWvsf0PKg7MURxpb1QmJVJWCZUBWL3LtZzNqAJYnNqaMkwd1U6fRzFtT+ybON3+eFIMPpJoehdbLmFpgZdTcNagv+p3l6EG+kDeWSaBVkEIvWVupV+eG2MDP+2N6qB2qgzP0Pg+Z5gqmWsuF6MqjeGQa2RY2pCDDwPhk7hcOs9Y=
Received: from LV2PR11MB5997.namprd11.prod.outlook.com (2603:10b6:408:17f::10) by SA2PR11MB5163.namprd11.prod.outlook.com (2603:10b6:806:113::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Wed, 30 Mar 2022 17:49:39 +0000
Received: from LV2PR11MB5997.namprd11.prod.outlook.com ([fe80::c5ab:d424:30e2:3827]) by LV2PR11MB5997.namprd11.prod.outlook.com ([fe80::c5ab:d424:30e2:3827%7]) with mapi id 15.20.5102.022; Wed, 30 Mar 2022 17:49:39 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
CC: "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
Thread-Index: AQHYPQpWm1YLTWvGAUuNuHaKfbvrO6zVAPuAgADygbCAAk98AA==
Date: Wed, 30 Mar 2022 17:49:38 +0000
Message-ID: <F321B3B1-95B9-47E6-BDD0-819F63F3DABA@cisco.com>
References: <202112031730532332374@zte.com.cn> <20220321095834.GQ13021@mit.edu> <6DE484E9-FE33-4C81-A947-46F7650755C1@cisco.com> <24150_1648536269_6242AACD_24150_180_1_b76192bca0f34e90b0cbccc58d0320c2@orange.com>
In-Reply-To: <24150_1648536269_6242AACD_24150_180_1_b76192bca0f34e90b0cbccc58d0320c2@orange.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.80.82.1.1)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d6339feb-f0d8-4d5b-5cfe-08da1275a981
x-ms-traffictypediagnostic: SA2PR11MB5163:EE_
x-microsoft-antispam-prvs: <SA2PR11MB5163441F6584B88CFCE5A2B6C71F9@SA2PR11MB5163.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV2PR11MB5997.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(166002)(316002)(36756003)(30864003)(86362001)(5660300002)(8676002)(91956017)(6916009)(76116006)(26005)(66446008)(66556008)(66946007)(64756008)(66476007)(71200400001)(186003)(54906003)(33656002)(38100700002)(38070700005)(508600001)(4326008)(83380400001)(122000001)(966005)(6512007)(6506007)(8936002)(2616005)(6486002)(2906002)(53546011)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_F321B3B195B947E6BDD0819F63F3DABAciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV2PR11MB5997.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d6339feb-f0d8-4d5b-5cfe-08da1275a981
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2022 17:49:39.0022 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WRIUz1t9RVwfEG0OtO3ZbSkSGxNv3G9iQPjdTNYf+OMw/ZHVPrSMXBlIiU2KM9A3krvXQ0xXjRAlWrELpnNDPA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB5163
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.250, xfe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/sQCsy3NfZkYP6ZCxmNHoradTq5c>
Subject: Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 17:49:51 -0000
Thank you Med! Useful insight. Which specific paragraphs or approaches from RFC 8979 do you think will be most useful? I can see the last paragraph of the Intro for example, and para 4-5 of the Security Considerations? Thanks! Carlos. On Mar 29, 2022, at 2:44 AM, mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> wrote: Hi Carlos, all, (restricting the discussion to the list) Ben has stepped down as AD. I guess the DISCUSS will be inherited by Paul. To fix this DISCUSS, I reiterate the proposal I made at:https://mailarchive.ietf.org/arch/msg/sfc/Fe5k0jVmYpoo7-8gZQ7Xu2nbxqA/ == The POLICY_ID and Tenant ID are likely to trigger similar discussion (at least by the IESG) as what is documented for Performance Policy Identification and Subscriber ID in draft-ietf-sfc-serviceid-header. The authors may grab whatever text recorded there, as appropriate. == The experience we had with other documents is that pointing to the discussion in 8300 is not sufficient. I suggest we leverage the text in RFC8979, either by copy-paste the relevant text or just adding a statement that similar considerations apply for the TLV draft. Thank you. Cheers, Med De : sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> De la part de Carlos Pignataro (cpignata) Envoyé : lundi 28 mars 2022 18:05 À : Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> Cc : wei.yuehua@zte.com.cn<mailto:wei.yuehua@zte.com.cn>; Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>; sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>; sfc@ietf.org<mailto:sfc@ietf.org>; The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>; draft-ietf-sfc-nsh-tlv@ietf.org<mailto:draft-ietf-sfc-nsh-tlv@ietf.org>; Martin Vigoureux <martin.vigoureux@nokia.com<mailto:martin.vigoureux@nokia.com>> Objet : Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT) Thank you Ben for this discussion — please see inline. On Mar 21, 2022, at 5:58 AM, Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> wrote: Hi Yuehua, My apologies for not replying until now. I think I saw the updated versions of the draft and did not notice that there were still some active topics in the email thread (not reflected in the draft yet). On Fri, Dec 03, 2021 at 05:30:53PM +0800, wei.yuehua@zte.com.cn<mailto:wei.yuehua@zte.com.cn> wrote: Dear Ben, Thank you. please see the commet resolution inline with Yuehua>> To Martin, I really appreciate if you could provide comments to Yuehua-2 and Yuehau-6. Best Regards, Yuehua Wei ZTE Corporation ------------------原始邮件------------------ 发件人:BenjaminKadukviaDatatracker 收件人:The IESG; 抄送人:draft-ietf-sfc-nsh-tlv@ietf.org<mailto:draft-ietf-sfc-nsh-tlv@ietf.org>;sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>;sfc@ietf.org<mailto:sfc@ietf.org>;gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>; 日 期 :2021年11月30日 02:59 主 题 :[sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT) Benjamin Kaduk has entered the following ballot position for draft-ietf-sfc-nsh-tlv-09: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/ for more information about how to handle DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-tlv/ ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- (1) RFC 8300 is pretty clear that "Metadata privacy and security considerations are a matter for the documents that define metadata format." Some of the metadata context headers defined in this document clearly have privacy considerations that need to be documented (e.g., policy ID and source/destination group serve to concretely identify flows that are related in some way), though some may not have much that needs documenting (e.g., the forwarding context metadata seems to just be extracting out information that is already present in the packet being wrapped). Regardless, we need to have some discussion of the privacy and security considerations of the new metadata context headers, even if that is just "no new considerations" for some of them. Yuehua-1>>Thank you, I update the section to ver10 per you, Stig and John's comments. please take a look and provide further comments Unfortunately, I don't think that even the text in the -13 is providing what is needed here. (It is good text to have, but is generic to attacks on context headers in general, and authentication of context headers in general.) My expectation is that for each of the seven context headers that this document defines, we take a careful look at them in turn and document any privacy and/or security considerations that apply to the information carried in that specific context header. (In some cases we may also have to consider the encoding used, in addition to the information content, but I do not remember that being relevant here.) This could, for example, take the form of a table or list that covers each context header in turn. (If, after having done the work, it ends up being a list of mostly "no special considerations", we might consider formatting it differently, but we definitely need to do the analysis on each context header in turn.) This is a good point indeed. First, we can always make more explicit the advice and requirements from rfc8300, and also rfc7665. The context is the SFC-Enabled domain (S4.4 of rfc7665). Looking at the seven context headers, as you highlight, policy ID and source/destination group serve are the most relevant for this discussion. In those two, the information elements are opaque values, which is inline with S8.2.2 of rfc8300 (NSH metadata heading, fifth paragraph). Is perhaps expanding and clearly writing down text aligned with these two paragraphs inline with your expectations? Thanks! Carlos. (2) I think we need to discuss the Flow ID context header further. Is it intended to just be a container to hold a flow identifier already present in the contained packet (such as the IPv6 Flow Label or MPLS Entropy Label that are called out), or can it also be used to apply a new flow identifier at the SFC layer? The named examples of a flow ID are both 20 bits long; if that is an exhaustive listing, shouldn't we update the figure accordingly (to include Length=3, four leading bits of padding, and a trailing byte of padding)? If that is not an exhaustive listing and longer flow identifiers are expected, how do we know what length of flow identifier is being conveyed? Yuehua-2>>You raised a good question. I prefer to add Context Type (CT) to distinguish different flow IDs. I'd appreciate your advice. An explicit Context Type to indicate the specific Flow ID used seems like it will be very helpful for extensibility. That would also allow each context type to specify how long in bits the useful Flow ID value is, since the NSH metadata framing only gives a length in bytes. If there was no in-band context type, a recipient would have to rely on out-of-band configuration to know how much padding is present, which is not very interoperable. (3) If we are to allow for specifying the "logical grouping of source and/or destination objects" in §4.6 (emphasis on "and/or"), but the context header always conveys both a source group and dest group field, do we need to reserve a dedicated value for "no group information specified"? Yuehua-3>>Very good observation. Shall we state that if there is "no group information specified" for the source or dest field, the field MUST be sent as zero and ignored on receipt Yes, please! ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Section 1 This document does not address metadata usage, updating/chaining of metadata, or other SFP functions. Those topics are described in [RFC8300]. I'm not entirely sure what is meant by "chaining of metadata" (unless it's just a synonym for "updating of metadata"?), and having reviewed all 18 instances of "chain" and 88 instances of "metadata" in RFC 8300, I am not sure which part you're intending to refer to by it. Could you please point to a more specific part of RFC 8300 (at least in this email thread for now, not necessarily in a document update)? Yuehua-4>> RFC8300 doesn't use “chain”to discribe multiple metadata. it mentions "If multiple mandatory-to-process Context Headers are required for a given SFP" and "If multiple instances of the same metadata are included in an NSH packet" in RFC8300 section 2.5.1 Further comments are welcome Mostly my comment here is that I don't know what you mean by "chaining of metadata". If it's just that there might be interdependencies or relations between two pieces of metadata in the same packet, we could clarify the text in one way; if it's relating to updating (modifying) a given piece of metadata along the path of the packet, we would do something else; etc. Section 4.1 I suggest putting a context (forgive the pun) indicator in the figure legends, e.g., "Figure 4: Forwarding Context - 2 (QinQ)". The information is already available elsewhere, but having it in the caption helps focus the reader on the important/relevant part of the figure. Yuehua-5>> Accepted, will update to ver10 Thanks! -Ben Section 4.3 It might be interesting to say something about when the SPI itself suffices to identify the ingress node vs. when this metadata context header is needed. Node ID: Represents an opaque value of the ingress network node ID. The structure and semantics of this field are deployment specific. For example, Node ID may be a 4 bytes IPv4 address Node ID, or a 16 bytes IPv6 address Node ID, or a 6 bytes MAC address, or 8 bytes MAC address (EUI-64), etc,. There seems to be some dissonance between saying this field is "an opaque value" and also saying that it might be an IP or MAC address. In the vein of Francesca's Discuss point, I don't think we can have interoperability if the NSH implementation is expected to process this as IP/MAC address information (as opposed to just an opaque identifier). Yuehua-6>> it has relation to Section 8.2 URLs for [GROUPBASEDPOLICY] and [GROUPPOLICY] would be helpful. Yuehua-7>> Accepted, will fix the problem to ver10 _______________________________________________ sfc mailing list sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc _________________________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you.
- [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-… Benjamin Kaduk via Datatracker
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… Martin Vigoureux
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… wei.yuehua
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… Benjamin Kaduk
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… Benjamin Kaduk
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… Carlos Pignataro (cpignata)
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… mohamed.boucadair
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… Carlos Pignataro (cpignata)
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… mohamed.boucadair
- Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-… Donald Eastlake