Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 30 March 2022 17:49 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C3A63A1783; Wed, 30 Mar 2022 10:49:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.605
X-Spam-Level:
X-Spam-Status: No, score=-9.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=RYUNkFlv; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=OWvsf0PK
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qcpR49HUU8uV; Wed, 30 Mar 2022 10:49:45 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF2853A177F; Wed, 30 Mar 2022 10:49:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=59883; q=dns/txt; s=iport; t=1648662585; x=1649872185; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=EqBtRey20VXxKlVXIrPXfKLGrmOnPsHPh86/Tb5IyAA=; b=RYUNkFlvYa8VpHJAcNGt8cf1oDmr9EK5n10AbhNi3EDCWLbjhaewCyHq Woo/bcaW3bl8jjlQ/yu+GdyTHiv9REoaCTLcGOMdQdTR2gEDXzHHcKhs1 EXJPhfp4s58O7McwRQD4D7c5XHXbu/m+JhI0znVplekFTMDQSl6Ll12fk c=;
IronPort-PHdr: A9a23:kmcawBbCnXx53oI1FZELiCL/LTAphN3EVzX9orIriLNLJ6Kk+ZmqfEnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8ScJFUlIt/3yyPUVPXsjkYFiHqXyp5jlUERL6ZmJI
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.90,223,1643673600"; d="scan'208,217";a="1016817620"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Mar 2022 17:49:42 +0000
Received: from mail.cisco.com (xfe-rcd-002.cisco.com [173.37.227.250]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 22UHnf9C021029 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 30 Mar 2022 17:49:42 GMT
Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Wed, 30 Mar 2022 12:49:40 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Wed, 30 Mar 2022 12:49:40 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m9YaT8KGp5fMd4oJkC4cOmx4zbTpNInMUjV04ZmaXErcd6vWxQZubssBnKW+ZE3cdeSJ9u8zfhCCQTMZQFhlaEYNmMFb+XICcO91XZDRD+pYpHmLUoT9SPLQAnbhn+9q6EXjr+HsZwpfSs/wUV5tDo1npUD+Ac96iFiDEvVWDOnBiz/uCxrO5rixK7i6SBSz9eyjM2cu+ZArWWFEbEaAHLK2xv9z3wVLJOkVmTyW0iOyyhqav48Ujz7YxeYfb/KBs4oD5ZsMLV0Fk7G1zmJ20V0e0CpRYc5NI3xj0Fo9soJct8oEcD/uRITu4/hTz2olCDPdKjoltdodcPcX/nL5jA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EqBtRey20VXxKlVXIrPXfKLGrmOnPsHPh86/Tb5IyAA=; b=aWSKIr+GRcaaMoBhAVUktKD9AleC7r/PblQnSfWFjfjMf6S4lMphn4qtdFMAe6x2F+R/i2jgbOaXszWskpw71eGvO/VVpLvnOMFnDtOFazSPq1jfxn7aadUtGyNzVK+0iOBmNnQLAvc76vj4BCChpbphUnv9Ml+aXauqmyxDwSxU9EYHbPRWFQ+4zVCT0fKU1h66pC/7YaPup4EB5LAh3980ceIV4QOFVnIee/Bw3tyYc0yTRs32eVVGVjtQ0h15rxLh0pR2S+Vz4kVI4ewhiixai5FxmbCNbkcLniimn6/Vnrm/MSLA0aowceJ3DjqwDwDN05yY4DLcjVl6RoD2ZA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EqBtRey20VXxKlVXIrPXfKLGrmOnPsHPh86/Tb5IyAA=; b=OWvsf0PKg7MURxpb1QmJVJWCZUBWL3LtZzNqAJYnNqaMkwd1U6fRzFtT+ybON3+eFIMPpJoehdbLmFpgZdTcNagv+p3l6EG+kDeWSaBVkEIvWVupV+eG2MDP+2N6qB2qgzP0Pg+Z5gqmWsuF6MqjeGQa2RY2pCDDwPhk7hcOs9Y=
Received: from LV2PR11MB5997.namprd11.prod.outlook.com (2603:10b6:408:17f::10) by SA2PR11MB5163.namprd11.prod.outlook.com (2603:10b6:806:113::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Wed, 30 Mar 2022 17:49:39 +0000
Received: from LV2PR11MB5997.namprd11.prod.outlook.com ([fe80::c5ab:d424:30e2:3827]) by LV2PR11MB5997.namprd11.prod.outlook.com ([fe80::c5ab:d424:30e2:3827%7]) with mapi id 15.20.5102.022; Wed, 30 Mar 2022 17:49:39 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
CC: "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
Thread-Index: AQHYPQpWm1YLTWvGAUuNuHaKfbvrO6zVAPuAgADygbCAAk98AA==
Date: Wed, 30 Mar 2022 17:49:38 +0000
Message-ID: <F321B3B1-95B9-47E6-BDD0-819F63F3DABA@cisco.com>
References: <202112031730532332374@zte.com.cn> <20220321095834.GQ13021@mit.edu> <6DE484E9-FE33-4C81-A947-46F7650755C1@cisco.com> <24150_1648536269_6242AACD_24150_180_1_b76192bca0f34e90b0cbccc58d0320c2@orange.com>
In-Reply-To: <24150_1648536269_6242AACD_24150_180_1_b76192bca0f34e90b0cbccc58d0320c2@orange.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.80.82.1.1)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d6339feb-f0d8-4d5b-5cfe-08da1275a981
x-ms-traffictypediagnostic: SA2PR11MB5163:EE_
x-microsoft-antispam-prvs: <SA2PR11MB5163441F6584B88CFCE5A2B6C71F9@SA2PR11MB5163.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Odq7Jzv5qwUIHvf1SQL+UEW+oU68dBZg3FE2HQrvnJ3c2R9/1f8kJzALzRuFQ2knuan8Ld4WGuODrZ6BS9vXdnLSpzFL/RUFZdaH8MNLGp5vQUxoMNGzcMKqNI0ZnMbcB+roMVIuR3E73qZbPQ60Unkf4nrh49W4ln7aWOYTIyD0NiTa8gkK81CA6vBwuFfSn/Hxwogr270P46SAKK4fcPdGacNnByxyLdl7Sy8AKV39T7pAVt9AaYl6nqCXD8gZ0c712qPjI7Chn/5VzORyoY24EAYRkWq+QZmqhsW9mbKfXa/BnrNX7f3KDHXgnpn0RMMxTzBnAYh+yOm8sTPiN2Sfh+ec/0xjrXITaiSt5i8Tvij0ckmolIn4bJFNh6aFKK02WwyS7b54RgnRd69J1iPUtudqtE2eJNl20Pfrl9gIJniyLzm4ppxw7jaYTLPtXAbRedRNBd9EqGKM66+7p9pNfAk6sl7tDJdqDbKPbFX8a5B9DYjsifvsmNAIqdGiimzSbri92f73ofgjs7zzQrA4Ql/jLumiTKPcgwv9imtM2m0pY4ocet22Iiao2OYQZUoOccKhz/Tv2bnKiJP4RmXY41FhczfgvE+BvdporxhilGeg7UzHOAGUmxTK9VvdVFWC6+6PM25yn8dwcg35QpeUuYUCMbivLJJWJlSFs+i34z2zx4htVsT8vxSBTnSDUACA4GEaR0Fulbvj6VeUVYhEhXnoAzMf2tw9zOUd4ORaFRssEuiuuBXYwq0eFfNVNXxIGDXc1DRSagzMxq+wrzLcU7OPzsz3PEkUhcMZ1aguKMeDkaTk8KI6SMSmxEF3zTN2UGu1BecVH3sbkPGf9P7KJd+fMkGLeTUms0zB20o=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV2PR11MB5997.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(166002)(316002)(36756003)(30864003)(86362001)(5660300002)(8676002)(91956017)(6916009)(76116006)(26005)(66446008)(66556008)(66946007)(64756008)(66476007)(71200400001)(186003)(54906003)(33656002)(38100700002)(38070700005)(508600001)(4326008)(83380400001)(122000001)(966005)(6512007)(6506007)(8936002)(2616005)(6486002)(2906002)(53546011)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: Y/CCIcCU12rMXGmjMVw4H4Y20U6JFwUX+omYaev9CD55p01pMd755c79WF2MBtsM/o5At6DzSg4cVykB1E/NAu6rlQyk9lmMQBg+1QSm1MO2ex+ZbDluqPi2r3e7Of8040vMU+mHCypm4Z+o8f4icwLIz1FPCRYDjIz4jVsnU2X9GToJulghOLVpG/nvbGjs9g998J2jHQvVEG1pmMsVz0eAwh60XLcbUkXdigSzDhNbMoq34pLvBqhHtaU+iSOoAxV5AW6KqIoXUXI0+l8Plu/PuW6PIU4qpWhgf8BlYFTQN2hxNsopPIa7nx9dUnkIvaYDYagxisvfJb4ilyDvg7iuqU0oUduLi2bcTKjIAUZDDoMHQrixkbENrtL+TTHRiGWn3yWa0FOmCWXLtmp+q67rJ8X7HcNIAjMjMcxeuKUvRFmmBLD8aKBSeT+nprTadlfxzluNv/vydyn+yrvU3eVPaZhGi5yh6c8ox9xZkd99p0s90D5DI4CIinZEobbAO8d950Lp8NmtfmW72QsOe8DSekyIpejwV8GvEWuKq+Lwtt0x2KYf/71k6UIz9HBYIgrDWJtQvEWrepIUcgjWNHyS2oe0YHCOdNSuol5W0SuiJKie93hsZKw1oOOagaDnDAaGtaHixTPt+YWV1LZwXblJx68HkytSXv176FjLFm8mivxrLVFqo4n/d3FfZBfTDHvc/2/o/C5yr1wkEs7AXncNBIGhww4pns9axWpsooFz1YFXfcms0rmYwR0T+mSWfiiGVw3tg1wit0m7MASnBkS9P+I9rLj3GyYz6TwOrVO/lQlBEFthuOuL1NSqz/0n/1AgHSv9rQsAYdfPotw0D8eWAXoLvqA8Sn3JcfpILYg3A7PPcSdQbL1BDrwqeri1AiItlo6lJY47LWvXToj/oBNgY/eecnd4O3tPSJJUH4rmRbVvgXOHR1g/q0tSJBQ5/vaSNdzMVgybOEi56GVN3OaZ++ZQLzXMbs1tFWX59UdNToKhABv0MJbV143AF9D1npaJrocJTeK/xH1CZq209hsyauQRPKQr+dgJmTHpdTmUBqvJ4YKM0wrLmWv/wljWqkiNbFYRiLiF7stmvnCckwgrQGmFQswsXLbf0eXH1Gx/BVYLI2BrxvcDydvTKMoIeXrM7AZ1HTKOtTQKxxnM6y8fQYLS/7rUFcTeeaGsg8xhkYEQ+pJvurL4ZpVb10nAmWy7zCqycUhVOeRXv+nX2FS3spmwOTpnow/83hjDFGFTS2YSFwSWG5df+MkFH+g+35gm/YKnXWU/7vYj0hl/NSU2IJU7pSxhH8WCjiIe/tuRbCfGF9FcDXAAhsZRp6k+wKSLTdJsEDlZEZLTljCV7MHnWxbbsdzueRcWUJXih3nc1ydptRzBhImVAksbQwGUWXFO8ZbvVe5Rz3eHhb33GezfZ2WPXHQn78GHv1ZHLbyiFMTf2kG1CEAoN7rkpJMrT2mrdc1sqbqz5uDq7xUCZ8RXc4s+XndeE2RETHYjMiFD/Rraq2Ph6PMpmB0xwfhZuObxbp8jDAxv4gBAxhiK2pGFSAOvbQD/FKrozv0K8gddhyR0kRor6r2ralR/Z00vErJP6k5FIO7o+rxdpN3siPJ/rZPULVkWU5Wj68F9SJjGj/cviW9UYJ4LIKkBYARnKgnamHSbyLBiCQ/02mpyOtHVNn9aX1e0p0pbMRBX6SKra+ygyv313V1qwj2GWf+vZFpYEBI9h1WINNQWicAhwgDC9TNr/kWD2yd81KA6ftk=
Content-Type: multipart/alternative; boundary="_000_F321B3B195B947E6BDD0819F63F3DABAciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV2PR11MB5997.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d6339feb-f0d8-4d5b-5cfe-08da1275a981
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2022 17:49:39.0022 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WRIUz1t9RVwfEG0OtO3ZbSkSGxNv3G9iQPjdTNYf+OMw/ZHVPrSMXBlIiU2KM9A3krvXQ0xXjRAlWrELpnNDPA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB5163
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.250, xfe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/sQCsy3NfZkYP6ZCxmNHoradTq5c>
Subject: Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 17:49:51 -0000

Thank you Med! Useful insight.

Which specific paragraphs or approaches from RFC 8979 do you think will be most useful?

I can see the last paragraph of the Intro for example, and para 4-5 of the Security Considerations?

Thanks!

Carlos.

On Mar 29, 2022, at 2:44 AM, mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> wrote:

Hi Carlos, all,

(restricting the discussion to the list)

Ben has stepped down as AD. I guess the DISCUSS will be inherited by Paul.

To fix this DISCUSS, I reiterate the proposal I made at:https://mailarchive.ietf.org/arch/msg/sfc/Fe5k0jVmYpoo7-8gZQ7Xu2nbxqA/

==
The POLICY_ID and Tenant ID are likely to trigger similar discussion (at least by the IESG) as what is documented for Performance Policy Identification and Subscriber ID in draft-ietf-sfc-serviceid-header. The authors may grab whatever text recorded there, as appropriate.
==

The experience we had with other documents is that pointing to the discussion in 8300 is not sufficient. I suggest we leverage the text in RFC8979, either by copy-paste the relevant text or just adding a statement that similar considerations apply for the TLV draft.

Thank you.

Cheers,
Med

De : sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> De la part de Carlos Pignataro (cpignata)
Envoyé : lundi 28 mars 2022 18:05
À : Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>
Cc : wei.yuehua@zte.com.cn<mailto:wei.yuehua@zte.com.cn>; Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>; sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>; sfc@ietf.org<mailto:sfc@ietf.org>; The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>; draft-ietf-sfc-nsh-tlv@ietf.org<mailto:draft-ietf-sfc-nsh-tlv@ietf.org>; Martin Vigoureux <martin.vigoureux@nokia.com<mailto:martin.vigoureux@nokia.com>>
Objet : Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)

Thank you Ben for this discussion — please see inline.


On Mar 21, 2022, at 5:58 AM, Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> wrote:

Hi Yuehua,

My apologies for not replying until now. I think I saw the updated
versions of the draft and did not notice that there were still some active
topics in the email thread (not reflected in the draft yet).

On Fri, Dec 03, 2021 at 05:30:53PM +0800, wei.yuehua@zte.com.cn<mailto:wei.yuehua@zte.com.cn> wrote:

Dear Ben,
Thank you. please see the commet resolution inline with Yuehua>>

To Martin, I really appreciate if you could provide comments to Yuehua-2 and Yuehau-6.

Best Regards,
Yuehua Wei
ZTE Corporation
------------------原始邮件------------------
发件人:BenjaminKadukviaDatatracker
收件人:The IESG;
抄送人:draft-ietf-sfc-nsh-tlv@ietf.org<mailto:draft-ietf-sfc-nsh-tlv@ietf.org>;sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>;sfc@ietf.org<mailto:sfc@ietf.org>;gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>;
日 期 :2021年11月30日 02:59
主 题 :[sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
Benjamin Kaduk has entered the following ballot position for
draft-ietf-sfc-nsh-tlv-09: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-tlv/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

(1) RFC 8300 is pretty clear that "Metadata privacy and security
considerations are a matter for the documents that define metadata
format." Some of the metadata context headers defined in this document
clearly have privacy considerations that need to be documented (e.g.,
policy ID and source/destination group serve to concretely identify
flows that are related in some way), though some may not have much that
needs documenting (e.g., the forwarding context metadata seems to just
be extracting out information that is already present in the packet
being wrapped). Regardless, we need to have some discussion of the
privacy and security considerations of the new metadata context headers,
even if that is just "no new considerations" for some of them.

Yuehua-1>>Thank you, I update the section to ver10 per you, Stig and John's comments. please take a look and provide further comments

Unfortunately, I don't think that even the text in the -13 is providing
what is needed here. (It is good text to have, but is generic to attacks
on context headers in general, and authentication of context headers in
general.) My expectation is that for each of the seven context headers
that this document defines, we take a careful look at them in turn and
document any privacy and/or security considerations that apply to the
information carried in that specific context header. (In some cases we may
also have to consider the encoding used, in addition to the information
content, but I do not remember that being relevant here.) This could, for
example, take the form of a table or list that covers each context header
in turn. (If, after having done the work, it ends up being a list of
mostly "no special considerations", we might consider formatting it
differently, but we definitely need to do the analysis on each context
header in turn.)

This is a good point indeed. First, we can always make more explicit the advice and requirements from rfc8300, and also rfc7665. The context is the SFC-Enabled domain (S4.4 of rfc7665).

Looking at the seven context headers, as you highlight, policy ID and source/destination group serve are the most relevant for this discussion. In those two,  the information elements are opaque values, which is inline with S8.2.2 of rfc8300 (NSH metadata heading, fifth paragraph).

Is perhaps expanding and clearly writing down text aligned with these two paragraphs inline with your expectations?

Thanks!

Carlos.




(2) I think we need to discuss the Flow ID context header further. Is
it intended to just be a container to hold a flow identifier already
present in the contained packet (such as the IPv6 Flow Label or MPLS
Entropy Label that are called out), or can it also be used to apply a
new flow identifier at the SFC layer?

The named examples of a flow ID are both 20 bits long; if that is an
exhaustive listing, shouldn't we update the figure accordingly (to
include Length=3, four leading bits of padding, and a trailing byte of
padding)? If that is not an exhaustive listing and longer flow
identifiers are expected, how do we know what length of flow identifier
is being conveyed?

Yuehua-2>>You raised a good question. I prefer to add Context Type (CT) to distinguish different flow IDs. I'd appreciate your advice.

An explicit Context Type to indicate the specific Flow ID used seems like
it will be very helpful for extensibility. That would also allow each
context type to specify how long in bits the useful Flow ID value is, since
the NSH metadata framing only gives a length in bytes. If there was no
in-band context type, a recipient would have to rely on out-of-band
configuration to know how much padding is present, which is not very
interoperable.


(3) If we are to allow for specifying the "logical grouping of source and/or
destination objects" in §4.6 (emphasis on "and/or"), but the context
header always conveys both a source group and dest group field, do we
need to reserve a dedicated value for "no group information specified"?

Yuehua-3>>Very good observation. Shall we state that if there is "no group information specified" for the source or dest field, the field MUST be sent as zero and ignored on receipt

Yes, please!


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Section 1

This document does not address metadata usage, updating/chaining of
metadata, or other SFP functions. Those topics are described in
[RFC8300].

I'm not entirely sure what is meant by "chaining of metadata" (unless
it's just a synonym for "updating of metadata"?), and having reviewed
all 18 instances of "chain" and 88 instances of "metadata" in RFC 8300,
I am not sure which part you're intending to refer to by it. Could you
please point to a more specific part of RFC 8300 (at least in this email
thread for now, not necessarily in a document update)?

Yuehua-4>> RFC8300 doesn't use “chain”to discribe multiple metadata.
it mentions "If multiple mandatory-to-process Context Headers are required for a given SFP" and "If multiple instances of the same metadata are included in an NSH packet" in RFC8300 section 2.5.1
Further comments are welcome

Mostly my comment here is that I don't know what you mean by "chaining of
metadata". If it's just that there might be interdependencies or relations
between two pieces of metadata in the same packet, we could clarify the
text in one way; if it's relating to updating (modifying) a given piece of
metadata along the path of the packet, we would do something else; etc.



Section 4.1

I suggest putting a context (forgive the pun) indicator in the figure
legends, e.g., "Figure 4: Forwarding Context - 2 (QinQ)". The
information is already available elsewhere, but having it in the caption
helps focus the reader on the important/relevant part of the figure.

Yuehua-5>> Accepted, will update to ver10

Thanks!

-Ben


Section 4.3

It might be interesting to say something about when the SPI itself
suffices to identify the ingress node vs. when this metadata context
header is needed.

Node ID: Represents an opaque value of the ingress network node
ID. The structure and semantics of this field are deployment
specific. For example, Node ID may be a 4 bytes IPv4 address Node
ID, or a 16 bytes IPv6 address Node ID, or a 6 bytes MAC address,
or 8 bytes MAC address (EUI-64), etc,.

There seems to be some dissonance between saying this field is "an
opaque value" and also saying that it might be an IP or MAC address. In
the vein of Francesca's Discuss point, I don't think we can have
interoperability if the NSH implementation is expected to process this
as IP/MAC address information (as opposed to just an opaque identifier).

Yuehua-6>> it has relation to

Section 8.2

URLs for [GROUPBASEDPOLICY] and [GROUPPOLICY] would be helpful.
Yuehua-7>> Accepted, will fix the problem to ver10


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.