Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Wed, 05 July 2023 09:45 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB62AC151085; Wed, 5 Jul 2023 02:45:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.592
X-Spam-Level:
X-Spam-Status: No, score=-9.592 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="DguyDywe"; dkim=pass (1024-bit key) header.d=cisco.com header.b="BRfbKcrZ"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kB2orJQLlhVB; Wed, 5 Jul 2023 02:45:42 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E890CC14CE2C; Wed, 5 Jul 2023 02:45:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=64507; q=dns/txt; s=iport; t=1688550342; x=1689759942; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=7MpVBasqCmY3lPelGOsaunTNDWesUTNqlxRaq4ycAbU=; b=DguyDyweGD3qV1y3f3kestgnTsxhUTFyEa91N6YSnRGUwis5Vg6a6sEF LpMRrIMWkUOwEIpawGth6EL0sP6DGbDNnNF5caGbitAMJ4KkNR8qTr+dq l26gEnyfoOf7LjsJLBJE2ksk/ms/G00+3ihSFiETOHN4PrzzjlvDYGJPZ 8=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:C1qrpxU46jW/iNURCFNUC+xIxTvV8K0xAWYlg6HPw5pUeailupP6M 1OavLNmjUTCWsPQ7PcXw+bVsqW1QWUb+t7Bq3ENdpVQSgUIwdsbhQ0uAcOJSAX7IffmYjZ8H ZFqX15+9Hb9Ok9QS47lf1OHmnSp9nYJHwnncw98J+D7AInX2smpxua5+JD7aARTjz37arR3f 126qAzLvZwOiJB5YuYpnwLUq2FBffhXw24gKVOIyhD74MrxtJI2+CVLsPVn/MlFOZg=
IronPort-Data: A9a23:Rp/aZaiMAMDHd1O+e+tU3Gn3X161VRAKZh0ujC45NGQN5FlHY01je htvXWyGb/+Pa2Xzf9kkPYvj/EkHv8DUy4A3Ggs6+XwwFStjpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKkYAL/En43HVYMpBsJ00o5wLZm2tMw2LBVPivU0 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pDTU2FFEYUd6EPdgKMq 0kv+5nilo/R109F5tpICd8XeGVSKlLZFVDmZna7x8FOjzAazhHe3JrXO9IZbRdOrzqDkupRz edR6sy7WSxuAur1zbF1vxlwS0mSPIVc87PBZHO4q8HWkQvNcmDnxLNlC0Re0Y8wo7ksRzoRs 61DbmlQMXhvhMruqF6/YuRyl8IoL8TDN4IEsXYmxjbcZRojacCZEv2WuI4HtNs2rs93LNP4V cYLUmtUQRfBRhxoIwssKJ1ryY9EgVGmI2EH9zp5v5Ef+GbY5A18zLarN8DaEvSRS84QlUaRp 3jd12X0Hh9cM8aQoRKJ6HuimqrOkD/1HZkcH/i96/p2gRiXz30eElgRXF6ToPSlhAi5Qd03A 00Z4SUGrKUu+gqsVNaVYvGjiGSPshhZUN1KHqhkrgqM0aHTpQ2eAwDoUwKtdvQjsJ8vYTMg2 2WpmuH1WmxkoJbSdTWko+L8QSyJBQAZKmoLZCkhRAQD4sX+rIxbsv4pZos+eEJSpoCrcQwc0 wxmvwBl2OpO1Z9jO7GTuAGY02j19/AlWyZsvl2PNl9J+D+Vc2JMWmBFwULQ4fAFJ4GDQxzf+ nMFgMOZqusJCPlhdRBhos1TRtlFBN7cYFUwZGKD+bF9rlxBHFb/JOhtDMlWfhsBDyr9UWaBj LXvkQ1Q/oRPG3ChcLV6ZYm8Y+xzk/iwSYW4CquIN4ETCnSUSONh1H82DaJ39z61+HXAbYlkU XtmWZ/2VC1DWfgPIMSeFrdAuVPU+szO7TqDGc+kp/hW+bGff3WSAawUK0eDa/tR0U93iFu9z jqrDOPTk083eLSnOkH/qNdPRXhUdiJTLc6t9KRqmhurf1AO9JcJUaGBmNvMuuVNwsxoqws/1 irsBB4HlwWv3CWvxMfjQikLVY4DlK1X9BoTFSctJl2vnXMkZO6SAG03KfPboZFPGDRf8MNJ
IronPort-HdrOrdr: A9a23:IKgWLKNq/H4C7cBcT2j155DYdb4zR+YMi2TDiHoRdfUFSKKlfp 6V88jzjSWE9wr5OEtLpTiBUJPwJk80hqQFn7X5XI3SEDUO3VHJEGgM1/qY/9SNIVyaygcZ79 YdT0EcMqy+MbEZt7eB3ODQKb9Jq7X3k9HLuQ6d9QYRcegAUdAH0+4NMHfiLqQAfng+OXNWLu v52iNAnVedUEVSSv7+KmgOXuDFqdGOvonhewQ6Cxku7xTLpS+06ZbheiLonys2Yndq+/MP4G LFmwv26uGIqPeg0CLR0GfV8tB/hMbh8N1eH8aB4/JlagkEyzzYJ7iJaYfy+Qzdk9vfrGrCV+ O85CvICv4DqU85uFvF5ycFlTOQiQrGoEWSuGNwyUGT0fARAghKRfaoQeliA0DkA41KhqAl7E oAtVjpxKZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5rD30XklWavoJhiKoLwPAa 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJgncw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cU7lutry+vE49euqcJsHwN87n4 nASkpRsSood0fnGaS1ret2G9D2MRKAtBjWu7VjDsJCy8/BrZLQQFi+dGw=
X-Talos-CUID: 9a23:PrT7ZGjxPpn+H8p5S+kCg14lbDJud3mN1VPfKUKCKWNbVOLFQk+7v58jqp87
X-Talos-MUID: 9a23:SBD18Qg2zH7vo/1MKeYZs8MpO/5ZxoKcBFI2wK4ruMihNAtpZwy9g2Hi
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 05 Jul 2023 09:45:22 +0000
Received: from rcdn-opgw-1.cisco.com (rcdn-opgw-1.cisco.com [72.163.7.162]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 3659jMCB005913 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 5 Jul 2023 09:45:22 GMT
Authentication-Results: rcdn-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,182,1684800000"; d="scan'208,217";a="3814160"
Received: from mail-bn8nam12lp2176.outbound.protection.outlook.com (HELO NAM12-BN8-obe.outbound.protection.outlook.com) ([104.47.55.176]) by rcdn-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 09:45:21 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JIsGbJWvHIKpxfEfc4oYeRUF1RAXYJaASNCLsw221x/bwRqBcp+wwOGsFc432Pk+0ihCL5KEQJNs/AX5ofqxffK6QpxSwOEzp859t34wv1iPEdoZOH4JNgmuHTDeddAWSGJu/Mtmumtc/dmnUBIVP8h9H1ppPyC0mtQxvY+jcFMqUguWt6XCNpQHvBJYlePCvus2rmfaFFP55VM4XYKHiy6a4Csej46OZ1fqCrR9jVoM7a5oH+HTKN2OBAZTor4PWvO0ewkJjJFrVrZKRCPalDyZ/dimujF4fuOtEnfC2lqtY56INWo6CD21+U1c8yDrIN6VFmOJfB75jGlWhEZmiQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7MpVBasqCmY3lPelGOsaunTNDWesUTNqlxRaq4ycAbU=; b=A0RIAS+d1vH9kv+NbpSDWPSXtuwD9jTfeJaFzT70DpefI56leTxDwCGGfJBX1CV+BE17CBvhv5CxLvcqcR5AqS0KBslZyJIZKk8YbVfqaaO3rLRFa+l4CV/3eqtCutY4oaqivNLfgbkBTZAnH/N632gLcnD65KWj+eMqI/3am9d2NWNCyTDB6/iqL3gUQcmM8epPVcJmhf4YJjzEt6Ti0C9qKkZgtxsJPClwxNm25Io/1opP60RtVRBDdHF+JHcGH6D40P9Z2rcqwfuIsnozo6apBSTmku6exgich0hdMU9JWms8ywp7nehHwrmhcNy+3Ie+fy5uepQDn88CuE9jtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7MpVBasqCmY3lPelGOsaunTNDWesUTNqlxRaq4ycAbU=; b=BRfbKcrZNib8iAzEta1rDzrxrL10uiCzzVxPrZzYSDUSMi7E+QiWdr8H06k7Ts0CLe0phEs7MR4ub7a5vpZzDsqYhBj4V4sVqE238lKvClvqAW0RPNikwZyhF5HXX81p7298Rgv/F9lakqTK+W2Kza5D2sgjHFeo3D5T9nPcCnc=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by SN7PR11MB6800.namprd11.prod.outlook.com (2603:10b6:806:260::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6544.24; Wed, 5 Jul 2023 09:45:19 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6098:a11f:49e5:c244]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6098:a11f:49e5:c244%4]) with mapi id 15.20.6565.016; Wed, 5 Jul 2023 09:45:19 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-sfc-multi-layer-oam@ietf.org" <draft-ietf-sfc-multi-layer-oam@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "donald.eastlake@futurewei.com" <donald.eastlake@futurewei.com>, "d3e3e3@gmail.com" <d3e3e3@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)
Thread-Index: AQHZruCrDJKvzZeVbkSP5yyg9B7bWq+rDpYA
Date: Wed, 05 Jul 2023 09:45:19 +0000
Message-ID: <940A12AF-DF57-4295-A57A-9E16DFFFA6EC@cisco.com>
References: <168836524659.58404.6585102954286960584@ietfa.amsl.com> <CA+RyBmX7xNbzh7jaR0z-ztxic=duyB7Nekmm+VRbPoxKF44MDA@mail.gmail.com>
In-Reply-To: <CA+RyBmX7xNbzh7jaR0z-ztxic=duyB7Nekmm+VRbPoxKF44MDA@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.74.23061800
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|SN7PR11MB6800:EE_
x-ms-office365-filtering-correlation-id: db8555ad-be19-400e-1bdd-08db7d3c8b6f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(346002)(39860400002)(396003)(376002)(366004)(136003)(451199021)(478600001)(6506007)(966005)(6512007)(71200400001)(86362001)(2616005)(186003)(53546011)(66556008)(38100700002)(54906003)(66476007)(64756008)(4326008)(6916009)(66946007)(66446008)(66574015)(83380400001)(91956017)(76116006)(6486002)(166002)(122000001)(316002)(8936002)(21615005)(38070700005)(30864003)(41300700001)(2906002)(5660300002)(33656002)(36756003)(224303003)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: t4/yX5LhLgm8O2wU5G8uJEzloS6dgH26XxPQ+GYJ3RWvJ83o2hc41ewp0UUYwhFCPR/SvP5ymyp2Zb/3DznbKE7ADxgk4Nb9q9i8CSZ4da4BWARZnjt2Z8YBGSDDYfMttuTkGKww7Lz2oBIWeEbjx+gwuQvO0Aq7eKaF+Jrwk6lXGVRMaAcIgCp62uL9ua0pojWCuAJKwNc/gIYGOF+GxmuJys27tnhtxAENeykNMlbquD74XajqcqOoLSYZobaEL9wuygtdj3SMbFG5zkvx6rYhTObdPOiW5K5fvZiUc4m/5yoZMP2PMPmYRh7lK4ylcjle754UfTnNNv9Q4f+ZAx4gkiXe+DT9yuPkk2Of5c9LlBEuoonk3b03izpCiCdRcIqkv7GlSTtI6/hjexzlY86y+melT42RNAwldsgyS/uNl1wVRgU+fBatOqtCIUHyUw5j+5vKqnx0WC6xxZavKva8TJeEMJQtzS+7Jk9Hinz7Bm+k+UWOvGqQ/t8K8n098O87v9GmQmF80V/TlkHnzGZamX3eUZ5VXrD5+5lF8e8EWGReIz34e4UxfKTsR8zgSYoFCPD7D3II4atwuZNFwQMNE0daAkLOhv1CYDytGWt4/SqmQQqYBS6Gekd9xQmpKC4z+18YGAsH+A1sBVMMUowIwFGcPKqnfU43qbl+o2EYUvlnygmr2r8Vkql3AIq2Fb5e3nh9tBu60cQs4SfwiuGnJsVoBsR6LmdyUqnDUfVWwRNiflJKclXEszuA6wes0BE3DdAAuCjnSvsjqhOUYWDyI7DBcIbEW1Npa+yIXrWOWJ6MvbVXQw8THnH3uL9lUOFMr59NmQkFDt7Fg8rfOgdkGlxlHKZX1/GFvleuvJBGH33WBbSt+2L3fXP8r9wX2+ccwhkshbj7lowJZX2YQRQ6CJs1YivmOx1Z9uWi/DAWraEsI1zXV1ARwstH+wC0fCvbaXJDG6fPkkiJ3rdObGZh0IajpujqxH7y+sHMwpXf0LhVUDxy+TgJA18m8Nhy3mLtYexPphjsDiDLfFkewkW/tzI3KKEcAw9bura4KEHQJGJRCkCAq0ySd1MQ0scpB/ycGMEkZ4OyPCaEKiPVd61znZE3RoABC33N0+XVMnxmJGyjpDAR5S5T/CF/Hi2+gcp5fMC14SrQOmx1VP1Ao8vjbsbRn9kBiNzMEJd19OiRqEtjtnI1uuFNEJy3cMwpoiq/iVSr7a8WuwGVOzIIns8hM02HBxGIE22b0g4/m7y3rn9svGf6YQNEL/hIER26/pTZrMgPQY3zFS+CqlPgIcr8Lft9MvMBFXg/IQJm4drS6yv8Z1Apyi4FoieUVCjNOCZBdnbgyRAvfnXb1YMS0PtG9gxTdnzDQtzC4bpBvGOQF4M8ECZqG1vZ4KbmiV2GMjY2egG5uA1I2XPWgn6aphlP+s6HohNLq49lgtq/ZeNgpdvDnvb+reCYkJYqXCineeFbo7Gliri/8YVzglcRqHx1XNPw4rIbMuNKtNFeLiOn+IqGd+UCV88DG8Ki8X/+em5ASsiCTdS3DNl6vqnMkdio1Z1eYSCvJHsblrQlUo1c/awFGoX0B8BW23tvZfHynkOyYKIprmBQMYTjj+JiytFG1pXo0lwC9NpdtMjWuoaJmUexVgK452IQ5lpIiZyp
Content-Type: multipart/alternative; boundary="_000_940A12AFDF574295A57A9E16DFFFA6ECciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: db8555ad-be19-400e-1bdd-08db7d3c8b6f
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2023 09:45:19.3669 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3dqSj6Tg+fn62/ZsaswLTCXXDvGCK3WWSswcORWy8G2StKNyv8ogTxFVjorSnhZYwiLkHTbdXErBjdJh1pKL9g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB6800
X-Outbound-SMTP-Client: 72.163.7.162, rcdn-opgw-1.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/uC2VVYu99CH96PurT8OFW9-7muI>
Subject: Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2023 09:45:47 -0000

Hello Greg

Thank you for your prompt reply, very much appreciated.

As you will see below, the proposed changes (and the one in your other email -- even better) will address my blocking DISCUSS point. I.e., as soon as a revised I-D with the changes is uploaded, I am clearing my DISCUSS into a NOOBJ.

See below for EV>

Regards

-éric

From: iesg <iesg-bounces@ietf.org> on behalf of Greg Mirsky <gregimirsky@gmail.com>
Date: Wednesday, 5 July 2023 at 03:33
To: Eric Vyncke <evyncke@cisco.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-sfc-multi-layer-oam@ietf.org" <draft-ietf-sfc-multi-layer-oam@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "donald.eastlake@futurewei.com" <donald.eastlake@futurewei.com>, "d3e3e3@gmail.com" <d3e3e3@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-sfc-multi-layer-oam-26: (with DISCUSS and COMMENT)

Hi Eric,
thank you for your thorough review and thoughtful comments. Please find my responses below tagged GIM>>.

Regards,
Greg

On Sun, Jul 2, 2023 at 11:20 PM Éric Vyncke via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote:
Éric Vyncke has entered the following ballot position for
draft-ietf-sfc-multi-layer-oam-26: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


# Éric Vyncke, INT AD, comments for draft-ietf-sfc-multi-layer-oam-26

Thank you for the work put into this document.

Please find below one blocking DISCUSS points (very easy to address), some
non-blocking COMMENT points (but replies would be appreciated even if only for
my own education).

Other thanks to Carlos Bernardos, the Internet directorate reviewer (at my
request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-sfc-multi-layer-oam-26-intdir-telechat-bernardos-2023-06-28/
(and I have read Greg's reply, still waiting for a revised I-D though)
GIM>> I'll be glad to upload the next version. Perhaps that can be done right after your concerns get addressed.

EV> nothing urgent, let's indeed focus on the DISCUSS, then the COMMENTs


Special thanks to Don Eastlake for the shepherd's detailed write-up including
the WG consensus and the justification of the intended status and the author
counts.

I hope that this review helps to improve the document,

Regards,

-éric

# DISCUSS

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion on the following topics:

## Section 6

As there two V header fields defined (one for Echo message and one for all OAM
messages), it is unclear whether the Echo V-field is set back to 0 when SFC OAM
header Version is incremented? Or in other words, should Echo with V=0 but with
OAM V != 0 be interpreted as specified in this document ?
GIM>> A very interesting scenario. The intention is to have independent versioning of the SFC OAM Header and SFC Echo Request/Reply (as well as any other active OAM protocol applied to SFC). Based on that, in the scenario you describe, SFC Echo with V == 0 just be interpreted as defined in this document. Would you suggest that this scenario be added to the description of the Version field of SFC Echo Request/Reply as an example of the relationship?
NEW TEXT:
      Versioning of SFC Echo Request/
      Reply is independent of the versioning of the SFC Active OAM
      header (Section 5).  For example, if a new SFC Active OAM header
      format with V = 1 is defined, an SFC Echo Request/Reply packet
      with V = 0 MUST be handled as described in this document.

EV> this new text, or even the more radical change in your other email, are enough to address the above DISCUSS.




Are the TLV type depending on the Version being 0 ?
GIM>> It seems unnecessary. Do you think that that should be explicitly noted in the document?

EV> this would be nicer I think, when rereading myself, this should have been a non-blocking COMMENT though.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


# COMMENTS

## Multi-layer ?

I wonder what is "multi-layer" (per the I-D title) aspect in the specification.
Suggest to either explain the "multi-layer" aspect or drop it from the draft
title.
GIM>> At the very early stage, the title of the draft did include "multi-layer". Later, it was changed to "Active OAM for Service Function Chaining (SFC)". Would you suggest that we change from draft-ietf-sfc-multi-layer-oam to, for example, draft-ietf-sfc-active-oam, at this stage?

EV> thanks for the explanation, let's no change the filename now as it is too late


## Section 3

Suggest to write that SFFI stands for SFF Instance in Figure 1.
GIM>> A good point, thank you. Added to the Acronyms:
SFI:        Service Function Instance
Updated the second para in Section 3 as follows:
OLD TEXT:
   The architecture example depicted in Figure 1 considers a service
   function chain that includes three distinct service functions.  In
   this example, the SFP traverses SFF1, SFF2, and SFF3.  Each SFF is
   connected to two instances of the same service function.
NEW TEXT:
    The architecture example depicted in Figure 1 considers a service
   function chain that includes three distinct service functions.  In
   this example, the SFP traverses SFF1, SFF2, and SFF3.  Each SFF is
   connected to two service function instances (SFIs) of the same
   service function.

Isn't `FM SFC OAM` a pleonasm ? I.e., either "FM" or "OAM" are redundant.
GIM>> OAM is a more general term that includes Fault Management and Performance Monitoring protocols.

`(e.g., NSH)` why `e.g.` when section 1 states the focus of this I-D to NSH ?
GIM>>  Our intention was to define an active OAM that is applicable to different SFC mechanisms and use SFC NSH as an example to illustrate the realization of SFC Echo Request/Reply.

EV> understood based on your previous reply above, still suggest to remove '(e.g., NSH)' as the I-D is only about NSH


About REQ#1, should this be a "MUST" rather than a "SHOULD" ?
GIM>> We need to consider that active SFC OAM excludes SFIs along the SFP1. On the other hand, the application of the SFI to a user packet can be re-classified and switched to another SFP2. To examine that SFP2, a different active SFC OAM packet can be transmitted from that Re-classifier. that is different from, for example, tracing in an ECMP environment and is why we feel that "SHOULD" is appropriate rather than MUST.

EV> fair enough

In REQ#8, `the initiator of such a request` should probably be more specific.
GIM>> Would the following update make the requirement more clear:
OLD TEXT:
      REQ#8: SFC OAM MUST be able to trigger on-demand FM with responses
      being directed towards the initiator of such a request.
NEW TEXT:
       REQ#8: SFC OAM MUST be able to trigger on-demand FM remotely with
      responses being directed toward the initiator of the remote
      request.

EV> perfect, thanks


## Section 4

Isn't RFC 8300 a better reference for the O bit rather than an IETF draft ?
GIM>> Med helped me answer this question.

EV> fair enough as well and thanks to Med ;-)


## Section 5

Please add a justification / actual data about `But extra IP/UDP headers,
especially in an IPv6 network, add noticeable overhead.`
GIM>> I propose the following update of that sentence:
OLD TEXT:
   But extra IP/
   UDP headers, especially in an IPv6 network, add noticeable overhead.
NEW TEXT:
   But an extra
   IP/UDP header, especially in an IPv6 network, adds overhead compared
   to the length of an active OAM control packet (e.g., BFD Control
   packet [RFC5880]).  In some environments, for example, when measuring
   performance metrics, it is beneficial to transmit OAM packets in a
   broad range of lengths to emulate application traffic closer.

Is the updated text acceptable?

EV> I would have prefer to put byte counts and compare IPv4/UDP and IPv6/UDP wrt the actual OAM packets


I am really concerned by having only 2 bits to indicate the version while there
are 8 bits reserved on the side. This does not look too good for revisions.
GIM>> A very valid and practical point, thank you. Would you agree to increase the Version field to a four-bit length?

EV> Much better, it even matches the 4-bit version field in IPv[46] header


When can an implementation deviate from the SHOULD in Sender's Handle: `The
sender of the Echo Request SHOULD use a pseudo-random number generator ` ?
While I understand that this is an opaque value, and using a random number
prevents fingerprinting, I would assume that some implementations would like to
add some private semantics to this number.
GIM>> Yes, an implementation may use the Sender's Handle for some proprietary signaling as long as the system that receives SFC Echo Request doesn't alter the value of the Sender's Handle field but copies it into SFC Echo Reply. Do you feel that a note with that example needs to be added?

EV> it was mainly for my own education to be honest. I.e., up to the authors to add some text.


## Section 6

Suggest adding some text about the absence of TLVs based on the length of the
SFC OAM header.
GIM>> Would the following update match your expectation:
OLD TEXT:
    TLV is a variable-length construct whose length is multiple of four-
   octet words.  Multiple TLVs MAY be placed in an SFC Echo Request/
   Reply packet.  None, one or more sub-TLVs may be enclosed in the
   value part of a TLV, subject to the semantics of the (outer) TLV.
NEW TEXT:
   TLV is a variable-length construct whose length is multiple of four-
   octet words.  Multiple TLVs MAY be placed in an SFC Echo Request/
   Reply packet.  None, one or more sub-TLVs may be enclosed in the
   value part of a TLV, subject to the semantics of the (outer) TLV.  If
   no TLVs are included in an SFC Echo Request/Reply, the value of the
   Length field in the SFC Active OAM header MUST be 16 octets.

EV> thanks


## Section 6.1

To avoid confusion s/TTL Exceeded/NSH TTL Exceeded/ (even if explained later in
the text).
GIM>> A good point. True, the proposed SFC Echo Request/Reply mechanism can be used in SFC NSH, we believe that it can also be applied in, for example, SFC based on RFC 8595<https://www.rfc-editor.org/rfc/rfc8595.html>, would s/TTL Exceeded/SFC TTL Exceeded/ be acceptable?

EV> better indeed


In `The receiver of said Echo Request can set it to one of the values` should
the "can" be replaced by a "MUST" ?
GIM>> Indeed, thank you for pointing this out. Done.

## Section 6.3

`If the NSH is used,` but section 1 specifies that this I-D is only about NSH.
GIM>> Our intention was to define an Echo Request/Reply mechanism for any technology that can realize SFC. NSH is one such technology. RFC 8595 defines how MPLS can be used to realize SFC. What would you suggest?

EV> suggest removing 'IF the NSH is used' completely as it is redundant with the abstract/intro


`Reply via an IPv4/IPv6 UDP Packet` is unclear when reading it. Please add a
forward reference to section 6.3.1 (I would also prefer to have 6.3.1 earlier
in the flow
GIM>> Added the reference as you suggested:
   *  Reply via an IPv4/IPv6 UDP Packet (2).  If an SFC Echo Request is
      not encapsulated in IP/UDP, then this value requests the use of
      the Source ID TLV Section 6.3.1.


## Section 6.5.2

How `If the NSH of the received SFC Echo Request includes the MAC Context
Header, the packet's authentication MUST be verified before using any data. `is
different to the text of section 6.4 about the MAC ?
GIM>> Yes, it appears as unnecessary duplication. Would backreference to Section 4 as follows to address your concern:

   If the NSH of the received SFC Echo Request includes the MAC Context
   Header, the packet's authentication MUST be verified before using any
   data as defined in Section 6.4.

EV> perfect


`Sequence Number in the Echo Request sent matches to the Sequence Number in the
Echo Reply received` should it rather be a window of sequence number ? I.e.,
pipelined requests could be sent.
GIM>> A very good point, thank you. Update as follows:
OLD TEXT:
      the Sequence Number in the Echo
      Request sent matches to the Sequence Number in the Echo Reply
      received.
NEW TEXT:
      the Sequence Number in the Echo Reply
      received matches the Sequence Number of one of outstanding
      transmitted Echo Requests.

EV> perfect


## Section 6.6

`Consistency Verification Request` this message is not defined before this
section and not in RFC 8300. If specified in this section, may I suggest to
rename the section to be about CVReq ?
GIM>> Thank you for the suggestion. Renamed the section to "The Use of Consistency Verification Request Message"

## Section 7

`if the underlay is an IPv6 network` what about IPv4 ? I would assume that
IPv[46] underlays can support AH/ESP.
GIM>> IPv6 is used as an example. Of course, AH and ESP are equally applicable in IPv4. Would you suggest re-wording like:
   If the underlay is an IPv4 or IPv6 network, IP Authentication Header
   [RFC4302] or IP Encapsulating Security Payload Header [RFC4303] can
   be used to provide integrity protection.

EV> better


Should this be a SHOULD in `an implementation MAY check that the source of the
Echo Request is indeed part of the SFP`?
GIM>> In the course of the earlier discussion, that text got changed to the following:
   To protect against unauthorized sources trying to obtain information
   about the overlay and/or underlay, an implementation MUST have means
   to check that the source of the Echo Request is part of the SFP.
I hope that this change addresses your concern.

EV> yes, thank you