Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Thu, 29 April 2021 14:10 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB94E3A3FE7; Thu, 29 Apr 2021 07:10:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.616
X-Spam-Level:
X-Spam-Status: No, score=-9.616 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=be11oRs1; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Q+tGS7Jd
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id suQAr6Ati_EB; Thu, 29 Apr 2021 07:10:16 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 596E83A3FE2; Thu, 29 Apr 2021 07:10:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=39436; q=dns/txt; s=iport; t=1619705416; x=1620915016; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=1XzvZz6oZWR/d6e6OafazHEtgoRwPZ2VmgAAlQcrS7s=; b=be11oRs1Fwp76ODLRwqqUYOsezbW2qhqZzto+g1PvS8DeK/hRxXAyYA4 saHfDcwHlizjNSqpvN7aILVUu0qLd0ILIAnauKOlRkGhFRr/j1U52nSkE vFNnsmZE3QxBlHXBVR/7268LwisAii+Q9dKypDUjc8kNNS6Ae+4+OAaaM g=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:RBxNuBM38wR5YyyU9eAl6nf3WUAX047cNxMJ6pchl7NFe7ii+JKnJ kHE+PFxlzfhUoDS6vYCgO3T4OjsWm0FtJCGtn1KMJlBTAQMhshemQs8SNWEBkv2IL+PDWQ6E c1OWUUj8yS9Nk5YS8n7blzW5Ha16G1aFhD2LwEgIOPzF8bbhNi20Obn/ZrVbk1IiTOxbKk0I g+xqFDat9Idhs1pLaNioiY=
IronPort-HdrOrdr: A9a23:eIdSPagzIpENe7HU21EI9NbAeHBQX4hx3DAbvn1ZSRFFG/Gwv/ uF2NwGyB75jysQUnk8mdaGfJKNW2/Y6IQd2+gsFJ+Ydk3DtHGzJI9vqbHjzTrpBjHk+odmu5 tIW5NVTOf9BV0St6nHySGzGdo43Z2j+Kenme/Rwx5WPH5XQotLhj0JbTqzOEtwWQVAGN4dHJ 2T+sJIq1ObCAoqR+68AWQIWPWGms3TmPvdEFA7LjMEyC3LtzOn77bmDwOVty1/bxpjyaovmF K16DDRyb6kt5iAu3rh/k/Vq69bgd7wjuZEbfb89vQ9DhXJpkKWaJ96W7uE1QpF4d2HzFoxit HDr1MBEq1ImgnsV1q4qxfsxAXsuQxGgxSJpDPo4gqAneXDSD03EMZHj45CGyGplnYIhs1206 5AwguixvxqJC7Ahyj06pzpUBxnhyOP0AIfuNMTlHBWXM8ibqZQp+UkjTpoOaoHdRiKjLwPIa 1LNoXx9fxWeVSVYzTypW902uGhWXw1A1OvXlUCktb96UkXoFlJi28jgOAPlHYJ85wwD7Ne4f 7fD6hunLZSCucLcKNGAvsbS8ffMB2PfTv8dEapZXj3HqAOPHzA77Tt5q8u2e2scJsUiLw/hY rGS1EdkWIpYUrhBYmv0fRwg1LwaVT4eQ6o5tBV5pB/tLG5bqHsKze/RFcnlNblrO4YBsHdRv avKJNbC/LuNgLVaMJ09jy7f6MXBWgVUcUTtNp+cUmJuNj3JorjsfGecPu7HsurLR8UHkfERl cTVjn6I8tNqmqxXGXjvRTXU3TxPkj2/Zd6FrnG7/EeobJ9cLFkg0wwsxCU98uLITpNvugdZ0 1lOo7qlau9uC2x5mbH72JgPxJHFUZL6LD8U3dHzDV6dn/cQPImgZGyaGpS1HyIKltUVMXNCj NSoFxx5OaqNZCK3DsjDNimK2qeiHMWqBuxPs4hs5zGwf2gVoIzD54gVqA0KB7CEAZtnx127E 1ZbhUfe0PZHjTyqKmsgZAOHtvDf91kjArDG78NlVvv8WGn4eAmXD8yQiOnW8//u3deexNkwn lKt5I5rJXFszC1Mmc7iPk/KzR3GRSqKYMDKh+EaoVSkq3sYydqQw6x9GenoiB2XHb2/EMPgW GkCiuYdZjwcwdgk0Ed9Lr2+1VpcWjYRWZMUzRRtI1wEnmugAco7caCerez32yNalEL3+EaN3 XfbSEPJx51rurHpyK9iXKME24ryY4pOfGYBLM/c6vL0nfoM4GQk7oadsUksapNJZTrsuURV/ iYdBLQJDTkC/kx0wj9nAdvBABk7H0lm+jvwhvr8Syx22M+G+PbJBBjS6sAK9+Rq2jiSPDg6u Qysfsl+e+xOH72cNiI1OXeaCNCMArapSquVP4zwKoky54apf92Bd3WQDHI3HZI0FE3K9r1jl oXROB+7KraMoFicsQOc0tijxYUvcXKKFFuvh39A+c4c11olXPdMt+T67fDqLYkACS61UPNEE ja9zcY8+bOXiOF27JfFrk5Jn5OblMgrHtl5+GPeuTreUqXXvAG+ED/NHCzcLVQEvfYXboRqw t3+NGOkauccTHi1AXZoDt8JeZP/g+cMLePKRPJHfQN9dqwfUmIiO+t5sW4iT/sUzu1a0gCn+ R+BAUtR9UGjiNnlZE91yi5V7f+rU0kmUZP+D0PrC+Z5qG2pGPAWVxcOQLXgp9KTSBeP3iBg8 PC6/WZ3h3GkU948IiGElxRcNFIE8URSYayLz4GE7ljgIKV
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,259,1613433600"; d="scan'208,217";a="677792948"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 Apr 2021 14:09:55 +0000
Received: from mail.cisco.com (xbe-aln-005.cisco.com [173.36.7.20]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 13TE9tMq002984 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 29 Apr 2021 14:09:55 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xbe-aln-005.cisco.com (173.36.7.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Thu, 29 Apr 2021 09:09:55 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 29 Apr 2021 10:09:54 -0400
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 29 Apr 2021 10:09:54 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H4OOICNz3KJVAGMnGAUq6CRiUyego0vMpT9ernpoMjSXdhMwlE9O4cuxq2z3rCCnfjrtpfmjyEJSsHb0DN/q0amKKig9yVgU4pwCjqXSc3U59RFAwdH34KpG3MP4izz4JQCrZH8veQJbRKQOqIDmWjwSJk/mkl10hoAc36jTnRzuya0J6QegYV3iiJE6kUWI+Q8SYbtXIeUC46pLnUKDfkWXPNDfa//qg1zoOPBCEp/QmEYIRq2O0ZU/88iEV7T+4zztRODLdp6IldVGWcw5tbiDw3/34hx1vv+Vlkj56oBlQMN3XQhm0U8Nxnuc6YEdzLxxMRtAxz1KnfJYeNm5BA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1XzvZz6oZWR/d6e6OafazHEtgoRwPZ2VmgAAlQcrS7s=; b=LVgeTPH9n9l5helYW2Ff2Vd2oyynHxsOEEosyJqmSKG9o926Colljcw7LydCePa7idMgDz5WGBBfX+wLjHRUMIT2i71vbSr1NYX9j78I5uArv21jClgKq7N1WS9WRkR2a/B/rM1dW4ZJ85xZfgTHD33e8fheFHE4ZZKwrWqy5Z+r2I9GowVT61C1F39zjcHMgZpV2XYIygyVEtw3Vw8VYsb/UY0aSanVWzpWlHbk6JcUgkE0ZSBf4cHmWUR/XGyBMxCnUQ6XPplOpnV8W/Vemf98Yhbqpc0sYEaLUnMoGn/xxipjOu4Is48IPGiyzCJ59f51vUgYt/Yb1O8KOhPjQw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1XzvZz6oZWR/d6e6OafazHEtgoRwPZ2VmgAAlQcrS7s=; b=Q+tGS7JdgwjPKJ0PFJTWzWUuCiZTU/61Kc3FAlDPj3cEt8JIkdiJ7benp9NLP4KfjESiyu7jQvPDyrn3vM+N0b+F/OVdxT37OMO3z9u9Qr/qnPTqaplUpjom8HpKfH7TG7FKFlFkTZ8TsmM4l7V9wWnQF7gqw6maHfnsEgcyh8o=
Received: from MW3PR11MB4570.namprd11.prod.outlook.com (2603:10b6:303:5f::22) by MWHPR11MB1279.namprd11.prod.outlook.com (2603:10b6:300:2a::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.21; Thu, 29 Apr 2021 14:08:39 +0000
Received: from MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5]) by MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5%5]) with mapi id 15.20.4065.027; Thu, 29 Apr 2021 14:08:39 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Dhruv Dhody <dhruv.ietf@gmail.com>
CC: James Guichard <james.n.guichard@futurewei.com>, "spring@ietf.org" <spring@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>
Thread-Topic: [spring] WGLC for draft-ietf-spring-segment-routing-policy
Thread-Index: AdcuvULnk99okXSERoCLmuuUCHnxwAOAoYgAAAFggFAABtYOAAAAN7Tg
Date: Thu, 29 Apr 2021 14:08:39 +0000
Message-ID: <MW3PR11MB457062613B7F61B6D977BB39C15F9@MW3PR11MB4570.namprd11.prod.outlook.com>
References: <MN2PR13MB4206EF1F6E9B1C01BDDCDD76D24D9@MN2PR13MB4206.namprd13.prod.outlook.com> <CAB75xn6mV0b6AT_6DQEGNBvhMw1bLm7Hr-X71+afe+zPMBxaPg@mail.gmail.com> <MW3PR11MB4570B64CAD44377A56D5C0EDC15F9@MW3PR11MB4570.namprd11.prod.outlook.com> <CAB75xn6rcP7QbCZEgANgT15956M5GW0RkGN7FcT+-DTQnAPs0w@mail.gmail.com>
In-Reply-To: <CAB75xn6rcP7QbCZEgANgT15956M5GW0RkGN7FcT+-DTQnAPs0w@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [72.163.220.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 301ad9e2-f898-4802-111f-08d90b1849de
x-ms-traffictypediagnostic: MWHPR11MB1279:
x-microsoft-antispam-prvs: <MWHPR11MB1279A943CC2C0A1E0608115FC15F9@MWHPR11MB1279.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4570.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(396003)(366004)(346002)(136003)(39860400002)(26005)(186003)(64756008)(8936002)(122000001)(9686003)(53546011)(316002)(966005)(7696005)(478600001)(9326002)(2906002)(6916009)(55016002)(166002)(83380400001)(33656002)(5660300002)(86362001)(4326008)(38100700002)(54906003)(52536014)(66476007)(6506007)(66446008)(66556008)(71200400001)(8676002)(76116006)(66946007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: BCgENo4fLJ0a2Z8rPw76Zd52VrX04acLj+eYxeslxh9mwArlyoY54jdU5Qdz7ePC7kij5/e4Rw8FWnxLuADXxEKy6EBVF3ESG0c/v8UjNxBShGCaT/iKnAqQaqC1oCLcU4ah2qF7PwknOlokWHpv97eH1GtVGD1q6cUVQYhYVZyZ9stmezi4Om5ZqtqlfCxBtTsIhJYgDRrbAqvk1jd367DA7X2m97C1gUjpiujxhv9yavngkc8loUV6Mz+ypKaXTVNNV7Psc1Udtd3kjAGW+gESb87EZFELNdTn9b5LHIFApNarlZ86WiIpy06LOcoOhjXm1TGBLVPI8QceFZa8TY0cDeDgOKD9lwL1qgrheb4xqZj+ToGiFsBIDJ4Tdabv4Q+ibzfnXSfw3BdfcwbdPaugor8B/Y0FYi5zsxC6pRneyURPjiZcb6EYy9IOCiQfagk5OXC7vJD2Ag10y9RGqE2X8CLGj1X1gJiy3rrExMo6zProAzR+/YsFIkV0SwQlGceSEyueNknydno38GGvM7rj8/2RSdYuWOYhX5JkwLZeXi6+99VOlK9H4KLZzBj6b5uTd99TC1CkxNXmZuqHAFo1t4Xczb9jidizbmAW7xO2yYwIL9hCCEPMBBPYTrp38m1QjtGC2tovR1CRTYtafqQRWfXlEOM3S7DrW9VuVtzEVW4QLlevASV/WsgJ6R/xuqmO1oQvo/tUIqNOw01DeukzOzW7ZH8GGWV8TwdSTVTSxnYYUmU8FinM55dfzxId6OW5jvOIeQkcT4+kjbqmRMU4JTQqnZRPPnNHOS5k3+L91v/PlTRGDGXvamBMZjj4TqwcLncpN+4cX3pmN8k8h9Y0uf5eoQVNzLQygfwkIG8DdtvdUvyEv+8BXGN1X2YYuuUxXqcLvbGdyblMOGPuomAoxRNr5Mc7R0cswefELVDbSeyywhtzFBS5PebyNa3qPKZJqRwZ5cJ/y9WA5e5C4774/lqUMcX2UmL5+8qEfueezcVMZiipafQM8iUXA4/hFrmvSYlKW91DFPcX7KQVpVvAgCRrquN3UacazBPlHPedcgVGHR6lC6mObNmkieLfso6jzTVZov7dGpXUX/rW9dIAvja7iCNv5lznN7NHiKjnp558l04ImmR0h4mupvUhql32M9JsimilFDnPCgx2jp+P6kP2qcrN1dEDDDJW/FNm1K0VAHu2JzvzKu5rJZ+wg+P3WqUDap4QkeHyZwbz5bQ9wO5CttJ4kRXIv8CCgXbCBsNFmkZ/Ga9t883vNnQa/rO9S/LKMpufx9fQVj06U4xGdQxISlPYZTcE3SC7+FvhAEGEgRhV8xdUv6/pJmjs
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MW3PR11MB457062613B7F61B6D977BB39C15F9MW3PR11MB4570namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4570.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 301ad9e2-f898-4802-111f-08d90b1849de
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Apr 2021 14:08:39.4194 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: exj/hKZjFSjMijUVTvq4SJtdB8mUToGbd1RGYpFU4HNlQEejkH5xMFJouHQI3l7H7BpgNgSxVR/BmFkoLwnb5g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1279
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xbe-aln-005.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/rj43-W2-cbtR0QY73YrrmYWLrHA>
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Apr 2021 14:10:22 -0000

Hi Dhruv,

Please check inline below.

From: Dhruv Dhody <dhruv.ietf@gmail.com>
Sent: 29 April 2021 15:46
To: Ketan Talaulikar (ketant) <ketant@cisco.com>
Cc: James Guichard <james.n.guichard@futurewei.com>; spring@ietf.org; spring-chairs@ietf.org
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

Hi Ketan,

Thanks for the discussion. Sniping to -


If a node is identified by multiple addresses, from the point of view of the SR policy they would be considered as different nodes, correct?
[KT] This relates to the computation of SR Policy which is outside the scope of this document. There was some text around computation aspects in an earlier version of the draft that has been moved into draft-filsfils-spring-sr-policy-considerations around the WG adoption time. To answer your question, the endpoint address can be mapped to a node which becomes the tail-end and then path is computed to that node. In that case, multiple addresses may all map to a single node. This would be an implementation aspect.

[Dhruv]: I was thinking from the SR policy identification point of view, i.e. <H1-IP1, color, endpoint> and <H1-IP2, color, endpoint> will be considered as different SR policies even though H1-IP1 and H1-IP2 belong to the same headend H1.
[KT] Yes, they would be different SR Policies.


- Section 2.3, What are the 8-bit values for the Protocol-Origin, is there an existing registry that is used here? Is it - https://datatracker.ietf.org/doc/html/draft-ietf-idr-te-lsp-distribution-14#section-9.4 , should it be listed in this document perhaps?
[KT] These are not code points but suggested default values for the Priority assigned to each protocol. An implementation may use a completely different scheme and/or make theme configurable. I see that https://datatracker.ietf.org/doc/html/draft-ietf-pce-segment-routing-policy-cp-04#section-5.2.2 does not clearly indicate this and perhaps the authors should clarify that the Protocol Origin in that PCEP TLV is used to tweak/signal the Priority value to be used for that particular CP in the tiebreaker.


[Dhruv]: I am referring to this text -

   Protocol-Origin of a candidate path is an 8-bit value which
   identifies the component or protocol that originates or signals the
   candidate path.

Which says that an "8-bit value" identifies the protocol as PCEP, BGP, etc. What you are describing is the priority associated with the protocol. I feel the term "Protocol-Origin" and "Protocol-Origin Priority" is used interchangeably, leading to this misunderstanding.

To confirm, in the example - Candidate-path CP1 <protocol-origin = 20, originator = 100:1.1.1.1, discriminator = 1>. The value 20 identify BGP or the Priority value associated with BGP? I am assuming it is the priority!

In which case some cleanup of text is needed to make things clear.
[KT] I see your point. The use of “priority” and that too inconsistently might be the cause for the confusion. Will clean-up the text around this.


- Section 10, It might be a good idea to acknowledge security considerations from the SR policy architecture point of view: how various SR policy parameters and attributes could be exploited to make a headend to forward the traffic incorrectly. It is better to add details that clearly show that the authors/WG have given it a thought and analyzed the implications.
[KT] As a reminder the SR Policy has been introduced in RFC8402 which covers these aspects of incorrect routing and other challenges associated with source routing. This document is only providing the details of the implementation construct/framework for the SR Policy.


[Dhruv]: In my reading, RFC 8402 security considerations are focused on the data plane and not much on the interaction between the controller and SR nodes where the SR policy architecture comes in.
[KT] This document does not cover the actual protocols used for interactions between controller and routers – that is covered via PCEP and BGP documents.


- Section 11, What is the range of the value for Segment Types? A-Z only? It would be good to be clear about this. With A-K already allocated, worth thinking if this is too restrictive and not future-proof. Perhaps we could think of the value as a string that is currently populated with a single alphabetic character.
[KT] String can become freeform. How about A-Z, then AA-AZ … ZA-ZZ – that should be a large enough space?

[Dhruv]: That works. Maybe you could add this to the table to clearly indicate the range:
L-Z: Unassigned
AA-ZZ: Unassigned
[KT] I’ll try to describe this in the text since the AA-ZZ might not be very clear.


Related question: is there a value in putting aside a few of these for Experimental Use?
[KT] I don’t think so because these are not signaled in any protocol.


- Since the I-D talks about policy configuration, explicit candidate paths, verification, SR-DB, etc. I don't want to add work for the authors but I do feel in this case a dedicated manageability consideration section would be useful :)
[KT] Good catch. I will add it. It is not much work really since we need to point to RFC8402 which introduced the SR Policy and an informative reference to draft-ietf-spring-sr-policy-yang that the WG is already working on.


[Dhruv]: That helps, but also think in lines of documenting some key considerations as per https://datatracker.ietf.org/doc/html/rfc5706#section-2
[KT] This is not really a new protocol per-se and I am not sure if this is necessary. However, if there are any text proposals, we can discuss within the WG.

Thanks,
Ketan

Hope the authors and WG find these suggestions useful.
[KT] Yes, definitely.

Thanks!
Dhruv



Thanks,
Ketan

Thanks!
Dhruv
On Fri, Apr 16, 2021 at 12:27 AM James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>> wrote:
Dear WG:

This email starts a 2 week Working Group Last Call for draft-ietf-spring-segment-routing-policy [1].

Please read this document if you haven’t read the most recent version and send your comments to the SPRING WG list no later than April 29th 2021.

If you are raising a point which you expect will be specifically debated on the mailing list, consider using a specific email/thread for this point.

Lastly, if you are an author or contributors for this document please response to the IPR call in the previous email thread.

Thanks!

Jim, Joel & Bruno


[1] https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing-policy/




_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring