Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Fri, 30 April 2021 07:25 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6420F3A183B; Fri, 30 Apr 2021 00:25:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.917
X-Spam-Level:
X-Spam-Status: No, score=-11.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=JrCYd+h7; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=eJ+swgEI
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bPM2vNvpn2pL; Fri, 30 Apr 2021 00:25:32 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C75C3A183A; Fri, 30 Apr 2021 00:25:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=56764; q=dns/txt; s=iport; t=1619767531; x=1620977131; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=u5NZlk4fJYW0HVvEFq8ukCDPQjLBU3XyIJI4dMFeZr4=; b=JrCYd+h7wG0bkeenafEn2fUl0x4HeM6+z+10FVEjqLdZNdo1pVG5pU4Q OMiOyDrfoyaQPkJ6jGUcWaESp3ZJOei6AclZ/D+HCDL46aMgKT6XiPtwQ caqZTPoNhYhhJYgBp621Ee9iCBcaMP0hHh5T19ws6PrBqoqdVN4kR8f2i 0=;
IronPort-PHdr: =?us-ascii?q?A9a23=3A8Rd3/hS/4LEz66n5r99xkLDbjdpso0/LVj590?= =?us-ascii?q?bIulq5Of6K//p/rIE3Y47B3gUTUWZnAg9pLjuPXt+brXmlTqZqCsXVXdptKW?= =?us-ascii?q?ldFjMgNhAUvDYaDDlGzN//laSE2XaEgHF9o9n22Kw5ZTcD5YVCBrXi77DpUE?= =?us-ascii?q?RL6ZkJ5I+3vEdvUiMK6n+m555zUZVBOgzywKbN/JRm7t0PfrM4T1IBjMa02j?= =?us-ascii?q?BDOpyggRg=3D=3D?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3AUiu0Dqwul2BisYDrzt1ZKrPxfu8kLtp033?= =?us-ascii?q?Aq2lEZdDV8Sebdv9yynfgdyB//gCsQXnZlotybJKycWxrnlKJdybI6eZOvRh?= =?us-ascii?q?PvtmftFoFt6oP+3ybtcheRysd07o0lSaR3DbTLYmRSpczx7BCkV/Mpx9ea+K?= =?us-ascii?q?6l7N2usEtFZysCUdAG0y5SDAGHHkpqACxPApQkHJSRj/A32QaIU3IRc8i9Gz?= =?us-ascii?q?05T/HOzue72q7OTDwnI1oc6AeIhS6187KSKXil9zoXTj8n+8ZYzUHriAr8j5?= =?us-ascii?q?/T1s2T6hiZ7GPL6oQTpd2J8Ko+OOWpquw4bgrhkRypYoMJYczCgBkQrPu04F?= =?us-ascii?q?gn1Pngyi1QRfhb0H/acmGrrRaF4WCJu1xChw6AuD2lqEDursDjSDUxB9Apv/?= =?us-ascii?q?MlTjLi90EisNtguZg7uV6xiptNARvM2AT76tTYPisa7nacnHs4neYfy0FYSI?= =?us-ascii?q?sVAYUh1LA3wUU9KuZlIAvKrKQcVMV+BsDV4/hbNXmAaWrCg2VpyNuwGlwuAx?= =?us-ascii?q?avWCE5y4yo+gkTuEo841oTxcQZkHtF3ok6UYN46+PNNbktvK1ST/URcbl2CI?= =?us-ascii?q?46MIiKI12IZSiJHHOZIFzhGq1CEWnKsYTL7LI84/zvX5AU0p0omtDkXElDvW?= =?us-ascii?q?A/P2LiYPf+nqFjw1ToeiGQTD7twsZR69xSobvnXofmNiWFVRQgiM2lr/IDAt?= =?us-ascii?q?DKWvq6NZ5MasWTaVfGKMJs5UnTSpNSIX4RXIk+odAgQW+DpcrNN8nru4XgAb?= =?us-ascii?q?HuDYuoNQxhdnL0A3MFUjS2Dt5H9FqXVnjxhwWUX3vsf0f47I9hCaSyxZlU9K?= =?us-ascii?q?E9cql39iQFg1Ww4c+GbRdYtLYtQUd4KLT71qWhpWe3+m7M535zOgVUC1tU5L?= =?us-ascii?q?mIaQIOmSY6d2fPNZoTsdSWfm5fmFGdIAVkcs/QGAlD40hs9bmvNJyWzyA6A9?= =?us-ascii?q?ehOmaX5kFj/U6iftM5oOmu9M3lcpQ3AtIaQ6R3DxzMDAEwsx1tsn1/ZAgNQV?= =?us-ascii?q?L/Gjvihb6+toEdAPjSerBH8V+WCP8RjUialE2H4ekzW3MQXleVIL+qqDdrYw?= =?us-ascii?q?ARu3pc3Os0hqGalTOmNG0l6d5IQGFkWSCwG7JJDAOMeYNOvKvkETsAFluitH?= =?us-ascii?q?i9lww5fHbs+gE0gGHsRBfkJM3jMx56pm1S1Lrs/RdPUlilO2h0anx8rORGZD?= =?us-ascii?q?77k35uzO6GYbey2WONal0EhvoQKi3BfCF6GHIc+/mnkBGSgzqMDnMg29EnOf?= =?us-ascii?q?HcFq0qd/XJ1mqqM5Dgr9BKI9ZEuJJkPsvpqOkFTKaWfBKUNirxD4oSqkeoj2?= =?us-ascii?q?dgPCl/s38/l/z0nBXj8WijxXY6Rf7fOk5vSb1eI9aS6QHfNry1+YQ8idI+pu?= =?us-ascii?q?2rNGrtLtaA1KHMdjZGbgrJvnTedZBflblE+aYp8LdjFZjSVjXFkHlBwRUlNc?= =?us-ascii?q?/x0EcTWr5y7rzNMpJmFvZiNx5x7x4sjpCCPUErugv5DqslcVYhg2TSMtmJ77?= =?us-ascii?q?DLwIBfSnGptU/1Ix2S4idd9/DKU2+fzrYcEbs3OnkTZ04m6nhuldnyOLH4GU?= =?us-ascii?q?GvbaVE81W7OHPmL+MYR6iBBLkKrhF1p9uPhPSaciLk2AbW+Tt3S5g+h1qPUI?= =?us-ascii?q?e3GkaLH+UN7tmxfVKLiaGu6NSojDj2RSCgAn5ozLFtZAgVdIBbljImjIcryS?= =?us-ascii?q?C8Raz8v1I9nzJlkERav0+o3pLj/XzSEk5HOxDIm5laXTFcNX6TkMTOmNLoo0?= =?us-ascii?q?jV8XxCwpnMFEBZY9FIFZwRV+HMXlVTFfQ=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DHAADwr4tg/4oNJK1QCh0BAQEBCQE?= =?us-ascii?q?SAQUFAYIEBwELAYEiMCMGKAd3WjYxC4Q5g0gDhTmIcgOKM48agS4UgREDTwU?= =?us-ascii?q?LAQEBDQEBHQEMCAIEAQGEDEQCF4FkAiU1CA4CBAEBDAEBBQEBAQIBBgRxE4V?= =?us-ascii?q?QDYZEAQEBBAEBGwYKEwEBLAYFAQ8CAQgRAQMBASEBBgMCAgIfBgsUAwYIAgQ?= =?us-ascii?q?OBQiCaoF+VwMvAQ6cMAKKH3qBMoEBggQBAQYEBIFIQYMqDQuCEwMGgToBgni?= =?us-ascii?q?ECQEBgROFQCccgUlCgRQBQ4FfgQA+gh5CAQECAYEjBQEHCwEjDBgHCYJhNoI?= =?us-ascii?q?rgVkQWwhfAwEDIiEIBgICIDkgYk4GNA+QU4NMh3qNCZEPWwqDEIl2jXOFVxC?= =?us-ascii?q?DVIsJhhyNR4JdoSiDG49bhGcCBAIEBQIOAQEGgVYCNmlwcBU7gmlQFwIOjh+?= =?us-ascii?q?BJAEHgkSFFIVJcwIBNQIGAQkBAQMJfIsDAYEPAQE?=
X-IronPort-AV: E=Sophos;i="5.82,260,1613433600"; d="scan'208,217";a="864629978"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Apr 2021 07:25:30 +0000
Received: from mail.cisco.com (xbe-aln-005.cisco.com [173.36.7.20]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 13U7PUqU020671 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 30 Apr 2021 07:25:30 GMT
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xbe-aln-005.cisco.com (173.36.7.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 30 Apr 2021 02:25:30 -0500
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 30 Apr 2021 02:25:30 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Fri, 30 Apr 2021 02:25:30 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UxTWRgmQ8jLHNkOK5TxAXqO1d1ACRgJVIqgP9d+kQrpbuec8h6HgGn/DLz7XIDysN32AAAz47+CWmJ/DWSh+L+v0ulyZewmZy01WxIEjymEi4s+HnA523POv4EjPj0mzi5UduTYhjV4QXLhTjPIjKJyIfzWj9mCU9Ate6zALVcqURrLgtLEx+0Hr8QaF7UHDK6NZenWd6fPY9877a432ZjEkOjEYZbJ8V2uJz+99XKSADN0booNq4W7e+tYu2rEbl7iEFnDsjaBbC4vLBIFwA8kdIV51LOkKMGdg6YcKeod1B9gjaIBa1fLhV95y86hNfUoaDyyHKGg8TUetqS0JEg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=u5NZlk4fJYW0HVvEFq8ukCDPQjLBU3XyIJI4dMFeZr4=; b=DM3DD/rw/KZDh4TPDOMrcOHbMzOo739IsLaUmvNqqwjNfsJ0JAOXUgTlyNBmY1DeOle2/NPD5pFNvqLd9H4eySpzn6VJLy28IP1OUK7BDCuY79ldUzK9xQMTxlvXmGKtcp/yl2DNwaI+wzH2WiFzVCJkv3PhfGl0tkbu+6fIAReLrK7y+nxfs4HceWXENnixvhpEOQhR6F/pxO26xRqoESrG9Vl75SM2MIBY/gRRXuiqdCq76EeJVpRhl9flBR3YpwD29hdEO4kdJ8W2EfvAglFgUj1yKSBIA7hIc6ak1jSsDGBEq1jSVlQ/hWC5BH5OJbcVFxqBAfwDJe/gKc3c4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=u5NZlk4fJYW0HVvEFq8ukCDPQjLBU3XyIJI4dMFeZr4=; b=eJ+swgEIfMVYhRHcPt1QxIixn0OUCENGG7OkZxX80lsv5Ars3+zPRkRpKaqZV1/K0RUcyOBqGr4T9Sso3HgEwHp9lLrE1g+1wG2wiineXJlqYuIzYB8xnOMH0RozPTebhTFcmN1+r1eX1+JGsZftlkvldFvzAw1IIQ3Z3Z20v44=
Received: from MW3PR11MB4570.namprd11.prod.outlook.com (2603:10b6:303:5f::22) by MWHPR1101MB2128.namprd11.prod.outlook.com (2603:10b6:301:55::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.26; Fri, 30 Apr 2021 07:25:28 +0000
Received: from MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5]) by MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5%5]) with mapi id 15.20.4065.027; Fri, 30 Apr 2021 07:25:28 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Dhruv Dhody <dhruv.ietf@gmail.com>
CC: James Guichard <james.n.guichard@futurewei.com>, "spring@ietf.org" <spring@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>
Thread-Topic: [spring] WGLC for draft-ietf-spring-segment-routing-policy
Thread-Index: AdcuvULnk99okXSERoCLmuuUCHnxwAOAoYgAAAFggFAABtYOAAAAN7TgACmS4oAAAd/PwA==
Date: Fri, 30 Apr 2021 07:25:28 +0000
Message-ID: <MW3PR11MB457004A6514A8E9194628554C15E9@MW3PR11MB4570.namprd11.prod.outlook.com>
References: <MN2PR13MB4206EF1F6E9B1C01BDDCDD76D24D9@MN2PR13MB4206.namprd13.prod.outlook.com> <CAB75xn6mV0b6AT_6DQEGNBvhMw1bLm7Hr-X71+afe+zPMBxaPg@mail.gmail.com> <MW3PR11MB4570B64CAD44377A56D5C0EDC15F9@MW3PR11MB4570.namprd11.prod.outlook.com> <CAB75xn6rcP7QbCZEgANgT15956M5GW0RkGN7FcT+-DTQnAPs0w@mail.gmail.com> <MW3PR11MB457062613B7F61B6D977BB39C15F9@MW3PR11MB4570.namprd11.prod.outlook.com> <CAB75xn5-4p5rbgSOEmNcu9=e3wAwb+7ENxxzAN=iBVik4GkORA@mail.gmail.com>
In-Reply-To: <CAB75xn5-4p5rbgSOEmNcu9=e3wAwb+7ENxxzAN=iBVik4GkORA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [72.163.220.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6ce85696-a3ca-431f-a58a-08d90ba92164
x-ms-traffictypediagnostic: MWHPR1101MB2128:
x-microsoft-antispam-prvs: <MWHPR1101MB212875B7C406B306FEA975CAC15E9@MWHPR1101MB2128.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: s4De70+q91H4w4M2vCtMpoJqCoPijPeDi5+Ym90L4hSUjOosyA+txhcURY+JSdfc7+xiLG6WFUBp+3HQCkWJg812BEJdLnsFznjCT4/UBnBTeJtSib3ixPRLUBjYfXxhxWYtgPGQiDSxeKF6D5Y7l+kVrPsj4qQZRhYkpgEsLz0CR6EiR2xf0NQ0DOubXDaFlwn51jfd1Zjiv/GCGRILMeQHh4fY4G/KSb/4Ka+1nhKeTiEhumSddZZIJLAP7THzylCK/whXAu9j9IPCGMgXTIwRVWvdCv034yKiQjix+Gw31ojlC7iYGI9DGLCCDUWCpH9dDYKWqnIZv6tAMGxw4L4UyXOBPWJetjRERtFe3wtHf9e4vqoJbDmX9hk1lwtsF4JLH4aazLqGil0cscy8hKGh8tlfHaSAhy4+bBMMgGSooP5l7JjE+8nm4xLbhI0Mpo0FnSyI3L4WE9qjFJEjHQ/syhFcVp+vURWB8X5GWH9uNBJdC97EfOMIYKH0HLAE+3NOlHSJlXACMr8g1Y6qXGb62fxqzeNfo/KODsjSg5a5r9aNPSOTq/vbY9Oc7rpwqLIXXLcjoJjguej1bQlvhBaRRVjpWPTqFCitU0zASEIEoardCriomQu2HFRa7DJjFv0G4Bw8n2yvStEq25ZBlIgY0oSka0QzWADBrZ4tD7srFFUuqKGx1E9ZzMGVZni4
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4570.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(136003)(39860400002)(376002)(346002)(366004)(396003)(52536014)(478600001)(2906002)(26005)(7696005)(966005)(6916009)(9326002)(186003)(166002)(38100700002)(9686003)(86362001)(54906003)(4326008)(66556008)(71200400001)(66446008)(122000001)(8676002)(33656002)(64756008)(66476007)(8936002)(55016002)(66946007)(53546011)(66574015)(316002)(6506007)(83380400001)(76116006)(5660300002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: N4uSZAgYeMSL5Gwx26PMQqWZAX1MWBRK5Dg9RBjke5pnOhqBBoykqh6cW5zfnyigUGbe5YIMxQ16ZgUdVXr7aLusEVMkP9MeIeNUWHLeT6QbwoQLVufheZe2hZesEH0+F95oThdeYwsmRxBE1XJrLFQwRncQ1ACzfH58qvSDuKkD/OpnDWL7roJKe7wxIfvgFgP11gO1FKrFqIGwOZ7PUDaxCvmNG5rQdUWnCx3EqWis+27cbZJJ2xHoNBxQacQD5FJHcn91uy2F3LeEwC6JDv18haV0mszw/1BRLpY3PL066WoiDbzA9mqiPbMrFJBV5WH4ju79E5OT1qYECwWE9BelcEuPnpgmhiANmvroNIYnAe/dbZUu8O0RIeYo+5e+49eyBTvaXFBAlaNbsKoA/cEPdEqC+625hW6/YIWLzoGth41FwiVIiTcpBV2FHL35w8h/bYYrqzw0fT5oC0RC33+cj78lPn1gO3tieGWDacTGsdWaCHlc4zuqT/lGytcOPwY/JIsmX3l6siNEXBUPoeiCZcFh5pwCluaj2tiNDhrz7MtgUnWIAO/FwJMsUCD1V+8SrXQqF+rNdspdnjrZ3N8qTcQC2rDDLMadwQ+1b11As9HXrU6OFX/5j4ZI9Yr61MBiIsZa5oQViElJWK9EwngK7aS0stiuW/NQbCSamO1S6ppNA1wZs+Tsrq5V124c6FOhP/cspm2Ec/Zb0/WIkOo7iWW/mfH+uVJ3j8i7u5s=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MW3PR11MB457004A6514A8E9194628554C15E9MW3PR11MB4570namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4570.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ce85696-a3ca-431f-a58a-08d90ba92164
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Apr 2021 07:25:28.4888 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6lgUbtPEiHGR2Nx3dSaGcpdmme+bmQyeJZwPj5rd/j8XoQimpgKJ/U3vRM/VIuhi1aokotG4T8bd4aR10rV+ew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1101MB2128
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xbe-aln-005.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/Ifi-t3VnS1L8gisbAEgw0et-fYU>
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Apr 2021 07:25:38 -0000

Hi Dhruv,

Please check inline below.

From: Dhruv Dhody <dhruv.ietf@gmail.com>
Sent: 30 April 2021 11:43
To: Ketan Talaulikar (ketant) <ketant@cisco.com>
Cc: James Guichard <james.n.guichard@futurewei.com>om>; spring@ietf.org; spring-chairs@ietf.org
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

Hi Ketan

Thanks for handling the comments. Just a final comment on the security/manageability considerations that explains my reasoning. I would let you/shepherd take a call!

This draft describes the SR Policy with a common informational model which has proven to be quite useful.
[KT] Agree.

I would like to see this approach extended to also capture the security and manageability aspects in a protocol-agnostic way.
[KT] Most of the considerations are covered by the base RFC8402. The security of the mechanism used between a controller and router is protocol specific. Same goes for the manageability aspect outside of the common YANG model. Perhaps it would help if there is some text proposal for us to evaluate or at least please point specific points that we should try to cover.

The configuration of SR policy, the verification rules, SR-DB handling, various policies that control active path selection, are all common and should be listed in this I-D.
[KT] Those aspects are covered by the draft already. Please do let know if any specific points that need inclusion.

You could also give clear requirements for the protocols to build on.
[KT] When it comes to the model and general things, yes. But there will be differences in protocols themselves.

There have been cases where the protocols have differed leading to issues. Having a section in this I-D that lays out clearly for protocols would be useful.
[KT] I want to make sure here that we are still talking about security and manageability? Or is there any other specific aspect?

As the work is distributed across WG, IMHO having a SPRING WG consensus on such a text would be nice.
[KT] Another aspect is a lot of the key protocol work is in fairly advance stages. We already have some PCEP specs published while others are quite mature with implementations and deployments. The BGP SRTE is also implemented and deployed – hopefully it gets into WGLC right after this. So we need to also look at the timing aspects for the specific points that we would like to see added.

Thanks,
Ketan

Just my 2 paisa :)
Stay Safe!

Thanks!
Dhruv


On Thu, Apr 29, 2021 at 7:40 PM Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi Dhruv,

Please check inline below.

From: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>
Sent: 29 April 2021 15:46
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>; spring@ietf.org<mailto:spring@ietf.org>; spring-chairs@ietf.org<mailto:spring-chairs@ietf.org>
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

Hi Ketan,

Thanks for the discussion. Sniping to -


If a node is identified by multiple addresses, from the point of view of the SR policy they would be considered as different nodes, correct?
[KT] This relates to the computation of SR Policy which is outside the scope of this document. There was some text around computation aspects in an earlier version of the draft that has been moved into draft-filsfils-spring-sr-policy-considerations around the WG adoption time. To answer your question, the endpoint address can be mapped to a node which becomes the tail-end and then path is computed to that node. In that case, multiple addresses may all map to a single node. This would be an implementation aspect.

[Dhruv]: I was thinking from the SR policy identification point of view, i.e. <H1-IP1, color, endpoint> and <H1-IP2, color, endpoint> will be considered as different SR policies even though H1-IP1 and H1-IP2 belong to the same headend H1.
[KT] Yes, they would be different SR Policies.


- Section 2.3, What are the 8-bit values for the Protocol-Origin, is there an existing registry that is used here? Is it - https://datatracker.ietf.org/doc/html/draft-ietf-idr-te-lsp-distribution-14#section-9.4 , should it be listed in this document perhaps?
[KT] These are not code points but suggested default values for the Priority assigned to each protocol. An implementation may use a completely different scheme and/or make theme configurable. I see that https://datatracker.ietf.org/doc/html/draft-ietf-pce-segment-routing-policy-cp-04#section-5.2.2 does not clearly indicate this and perhaps the authors should clarify that the Protocol Origin in that PCEP TLV is used to tweak/signal the Priority value to be used for that particular CP in the tiebreaker.


[Dhruv]: I am referring to this text -

   Protocol-Origin of a candidate path is an 8-bit value which
   identifies the component or protocol that originates or signals the
   candidate path.

Which says that an "8-bit value" identifies the protocol as PCEP, BGP, etc. What you are describing is the priority associated with the protocol. I feel the term "Protocol-Origin" and "Protocol-Origin Priority" is used interchangeably, leading to this misunderstanding.

To confirm, in the example - Candidate-path CP1 <protocol-origin = 20, originator = 100:1.1.1.1, discriminator = 1>. The value 20 identify BGP or the Priority value associated with BGP? I am assuming it is the priority!

In which case some cleanup of text is needed to make things clear.
[KT] I see your point. The use of “priority” and that too inconsistently might be the cause for the confusion. Will clean-up the text around this.


- Section 10, It might be a good idea to acknowledge security considerations from the SR policy architecture point of view: how various SR policy parameters and attributes could be exploited to make a headend to forward the traffic incorrectly. It is better to add details that clearly show that the authors/WG have given it a thought and analyzed the implications.
[KT] As a reminder the SR Policy has been introduced in RFC8402 which covers these aspects of incorrect routing and other challenges associated with source routing. This document is only providing the details of the implementation construct/framework for the SR Policy.


[Dhruv]: In my reading, RFC 8402 security considerations are focused on the data plane and not much on the interaction between the controller and SR nodes where the SR policy architecture comes in.
[KT] This document does not cover the actual protocols used for interactions between controller and routers – that is covered via PCEP and BGP documents.


- Section 11, What is the range of the value for Segment Types? A-Z only? It would be good to be clear about this. With A-K already allocated, worth thinking if this is too restrictive and not future-proof. Perhaps we could think of the value as a string that is currently populated with a single alphabetic character.
[KT] String can become freeform. How about A-Z, then AA-AZ … ZA-ZZ – that should be a large enough space?

[Dhruv]: That works. Maybe you could add this to the table to clearly indicate the range:
L-Z: Unassigned
AA-ZZ: Unassigned
[KT] I’ll try to describe this in the text since the AA-ZZ might not be very clear.


Related question: is there a value in putting aside a few of these for Experimental Use?
[KT] I don’t think so because these are not signaled in any protocol.


- Since the I-D talks about policy configuration, explicit candidate paths, verification, SR-DB, etc. I don't want to add work for the authors but I do feel in this case a dedicated manageability consideration section would be useful :)
[KT] Good catch. I will add it. It is not much work really since we need to point to RFC8402 which introduced the SR Policy and an informative reference to draft-ietf-spring-sr-policy-yang that the WG is already working on.


[Dhruv]: That helps, but also think in lines of documenting some key considerations as per https://datatracker.ietf.org/doc/html/rfc5706#section-2
[KT] This is not really a new protocol per-se and I am not sure if this is necessary. However, if there are any text proposals, we can discuss within the WG.

Thanks,
Ketan

Hope the authors and WG find these suggestions useful.
[KT] Yes, definitely.

Thanks!
Dhruv



Thanks,
Ketan

Thanks!
Dhruv
On Fri, Apr 16, 2021 at 12:27 AM James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>> wrote:
Dear WG:

This email starts a 2 week Working Group Last Call for draft-ietf-spring-segment-routing-policy [1].

Please read this document if you haven’t read the most recent version and send your comments to the SPRING WG list no later than April 29th 2021.

If you are raising a point which you expect will be specifically debated on the mailing list, consider using a specific email/thread for this point.

Lastly, if you are an author or contributors for this document please response to the IPR call in the previous email thread.

Thanks!

Jim, Joel & Bruno


[1] https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing-policy/




_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring