Re: [tsvwg] Robert Wilton's No Objection on draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT)

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 04 December 2023 13:25 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1541BC14F5ED; Mon, 4 Dec 2023 05:25:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="JjBDM3e9"; dkim=pass (1024-bit key) header.d=cisco.com header.b="bfz8thHK"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7N8q7Nyb0YmR; Mon, 4 Dec 2023 05:25:53 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60269C14F5EF; Mon, 4 Dec 2023 05:25:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28130; q=dns/txt; s=iport; t=1701696353; x=1702905953; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=dvSOtZ/14A1II57LLDz4or5IWX22cCTRiVpby2COKvA=; b=JjBDM3e9oFh2lmIh4lOYNjTK/vEFmqrQP2funMORTL5kb+dLeQQrobLA GnqVTay/z+UEfJOhvQS+fNy7Vn4G2A6CV9l5LUNj76Ct1EEk2+fIIt22p Ai6p4koMfqG40lWjVAQSQ+nAe0bNMyMh9fp2xekduyh1nZO3SIskBw1bX E=;
X-CSE-ConnectionGUID: qwZ7zkSIQsip49vFrqm+mw==
X-CSE-MsgGUID: QqfdbFO3R9Gl1fqkPDkkow==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:/7+sphCe9wtDqFEtLqysUyQVoxdPi9zP1kY98JErjfdJaqu8usikN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7HvBY/Wk8Ox/+uz4JbUJQ5PgWn1bbZ7N h7jtQzKrYFWmd57N68rwx3Vo31FM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:LO0cDq8WqyEbS6Y6ku15DrUDS36TJUtcMsCJ2f8bNWPcYEJGY0x3m GcdUTqOPfreajH3L9l3bdy+9k1TvZHQx9RmSwRv/3tEQiMRo6IpJzg2wmQcns+2BpeeJK6yx 5xGMrEsFOhtEzmE4E/ra+C9xZVF/fngbqLmD+LZMTxGSwZhSSMw4TpugOdRbrRA2bBVOCvT/ 4uuyyHjEAX9gWUtaDpIs/vrRC5H5ZwehhtJ5jTSWtgT1LPuvyF9JI4SI6i3M0z5TuF8dgJtb 7+epF0R1jqxEyYFUrtJoJ6iGqE5auK60Ty1t5Zjc/PKbi6uCcAF+v1T2PI0MS+7gtgS9jx74 I0lWZeYEW/FMkBQ8QgQe0EwLs1wAUFJ0KbYEyetsvey9lbHaye93dt0FUR1OJJNr46bAUkWn RAZACoGYhbGjOWszffiDOJtnc8kasLsOevzuFk5kmqfVqlgEMuFGviQjTNb9G9YasRmB+nfY 9YebxJkbQ/LZFtEPVJ/5JcWxbrx2CClKGYGwL6TjZMu7WTZ4isq6unCNIPbY9+yacZWmVnN8 woq+EyiX0lFb4bAodafyVqgnObBgWb6VZ4cUaGj6OFlxUedzTJLVEULTVeyvfT8kU6/XvpeJ lAavC00osAa6Fe1Uda4VB2xoWSflh8RR9QWFPc1gCmR0bTL7C6YC3QKCDlbZ7QOtcItShQr2 0OH2dTzClRSXKa9U3mR8PKfqim/fHFTJm4ZbihCRgwAizX+nG0tpgvQfIlxE5WUt8b0AW2h3 R6QtS19gqpG2KbnyJ6H1VzAhjutoL3AQQg0+hjbUwqZAuVROtbNi2uAtwCz0BpQELt1WGVtq 5TtpiRzxPoFAZfInyuXTaBUWrqo/P2CdjbbhDaD/qXNFRzzpBZPnqgJvFmSwXuF1O5YI1cFh 2eP42tsCGd7ZifCUEOOS9vZ5z4W5abhD8/5cfvfc8BDZJN8HCfeo3k3OxTAhTC1wBV1+U3aB Xt9WZj0ZZr9Ifo+pAdau89EiNfHOwhnnDyMG8ijp/hZ+eHGOi/9pUg53KumNb1hs/je/205A v5UNtCBzF1EQfbibyzMuY8VJhZiEJTILc6eliCjTcbaelAOMDh4U5f5mOp9E6Q7xP49vrmTo RmAtrpwlQCXaYvvc1vaMxiOqdrHAP5CkJ7MFXVyYQz1iiJzPtjHAWV2X8JfQITLPddLlJZcZ /IEYM6HRP9IT1z6F/41MvERcKQKmMyXuD+z
IronPort-HdrOrdr: A9a23:rotnKK1zG97htlVmvbz05AqjBf1xeYIsimQD101hICG9Lfbo9P xGzc566farslcssSkb6KG90cm7LU819fZOkPAs1MSZLXnbUQqTXc5fBO7Zsl/d8kLFh5NgPM tbAs9D4ZjLfCZHZKXBkUeF+rQbsaW6GcmT7I+0oQYJPGVXguNbnnhE422gYzVLrXx9dOAE/e 2nl7F6TlSbCBIqR/X+LEMoG8LEoNrGno/nZxkpOz4LgTPlsRqYrJTBP1y9xBkxbxNjqI1OzY HCqWPEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwiy6zDb4RG4GqjXQQmqWC+VwqmN 7Dr1MLJMJo8U7ceWmzvF/ExxTg6jAz8HXvoGXowkcL4PaJBg7SOfAxwb6xQSGprHbIe+sMlp 6j6ljp8qa/yymwxRgVqeK4Dy2C3XDE0kbK2dRj/UC3F7FuKYO4aeckjRlo+FBqJlOg1Kk3VO ZpF83S//BQbBeTaG3YpHBmxJi2Um00BQrueDlJhiW56UkfoJlC9TpS+OUP2nMbsJ4tQZhN4O rJdqxuibFVV8cTKaZwHv0IT8e7AnHEBUukChPfHX33UKUcf37doZ/+57s4oOmsZZwT1ZM33J DMSklRu2I+c1/nTceOwJpI+BbQR3jVZ0Wh9uhOo5xi/rHsTrviNiOODFgojsu7uv0aRtbWXv 6iUagmSsML7VGeb7qh8zeOLKW6c0NuJfH9kuxLL26zng==
X-Talos-CUID: 9a23:xb/vCG/OE62vkbsB92eVv1cLKJ83cUb89WzROxPpF0hzUbjWTEDFrQ==
X-Talos-MUID: 9a23:878e4AiPNEHoeknRxRB5qcMpDd5m766ALxs3wLoC4sedNhRcODSak2Hi
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-9.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Dec 2023 13:25:50 +0000
Received: from rcdn-opgw-4.cisco.com (rcdn-opgw-4.cisco.com [72.163.7.165]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 3B4DPoBg028905 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 4 Dec 2023 13:25:50 GMT
X-CSE-ConnectionGUID: S2pTXv4YT0Ky5Zv92UBGFA==
X-CSE-MsgGUID: 0cG6fP5lSUG7JteDKnOzxg==
Authentication-Results: rcdn-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.04,249,1695686400"; d="scan'208,217";a="13820272"
Received: from mail-dm6nam11lp2168.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.168]) by rcdn-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Dec 2023 13:25:46 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=moHc5W8iGqQx5Y+o6ANGhURcbFGPZDnbd90xceizO9OalrgAoiu63XbdyA2+HO0Fkx4OgqTWJz8yQOqF/yaG7xxtOpms+qA2WGEY9ENRfEgJWIO9uyrsCGwwFBOh/VG2ruNL7+cKHLQ2D9n6/F4MI54xd0D3rjIJ6Lsxw3NTF4t0Zb5cK7dWyU7YeW2k6Qye3iH8uvsZ+ejznWoehmw/t/KWUjFcvmA9BKvP3N0nQJporhSrPIiMQ3BDvcWflAj4azOuL618yEuV6yTUekrevmY1rFYUm0T8icc+7C14ZMTtKchJq4mLizF4aaRGw1biAwMzPg/DND16G9I0K5SwbQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dvSOtZ/14A1II57LLDz4or5IWX22cCTRiVpby2COKvA=; b=DJvQif29lLflSrOq02NAAyVCYeM8aZGle5h9rwSB+OgIsm6XXCUz6G8kqB5wFVS39PyXGE847D7LMonBaHjHyZrfkANN9q2ILQih9nI/7SCxBGJF1wXlwSGTofmYLHvibv4MHXSWm0iJ+iGPyXdIsPZQVDxgcj5QzrR4cYiFiwUOz7QPEEISbljmiFA9ulSYE2UZJn/U5CTzroZ/HCDtccjk3V9HGc1vlLvnEPd/LLwQUC3Omb9d2sNg/uK40zhBFw4W1Wehk42unGibnlv2S4V26l7Y404/QHg9npTZA29USkITYV1e0ZlElY0/oYaUKNY1Qvt1axqbvtB2Q7HA4A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dvSOtZ/14A1II57LLDz4or5IWX22cCTRiVpby2COKvA=; b=bfz8thHK2GQx0EROA48/2XnFUvdGzc47vlmDPCgHBvzSICcYm2Vi0i32sdpNT5LEyyIRWXpiMNsHtsHYs7epea+Mh4oVMu+t1DP58BDRHDtzZSffsOr8wf0WOYogS4p312ZGjM9zQV8iuPIpxdWQV5ipXW7YZgrEtDQ+PkEbTO0=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by BN9PR11MB5241.namprd11.prod.outlook.com (2603:10b6:408:132::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.33; Mon, 4 Dec 2023 13:25:43 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::5554:29ce:b3d:4c44]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::5554:29ce:b3d:4c44%4]) with mapi id 15.20.7046.033; Mon, 4 Dec 2023 13:25:43 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Bob Briscoe <ietf@bobbriscoe.net>, The IESG <iesg@ietf.org>
CC: "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>, "tsvwg@ietf.org" <tsvwg@ietf.org>, "tsvwg-chairs@ietf.org" <tsvwg-chairs@ietf.org>, "draft-ietf-tsvwg-rfc6040update-shim@ietf.org" <draft-ietf-tsvwg-rfc6040update-shim@ietf.org>
Thread-Topic: [tsvwg] Robert Wilton's No Objection on draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT)
Thread-Index: AQHaHtcdbcTO91Yrw0mlU/BlZ078CLCVHzCAgAQFlxA=
Date: Mon, 04 Dec 2023 13:25:42 +0000
Message-ID: <BY5PR11MB4196C8061E68201A85DF8566B586A@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <170083120422.39897.10773838518629428052@ietfa.amsl.com> <cd0b649c-5566-4a8f-8540-c1eb066b0f0a@bobbriscoe.net>
In-Reply-To: <cd0b649c-5566-4a8f-8540-c1eb066b0f0a@bobbriscoe.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|BN9PR11MB5241:EE_
x-ms-office365-filtering-correlation-id: ab861cd7-4e74-42ba-fd9a-08dbf4cc8420
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(346002)(376002)(396003)(39860400002)(136003)(366004)(230922051799003)(64100799003)(1800799012)(186009)(451199024)(122000001)(4326008)(8676002)(8936002)(9326002)(9686003)(6506007)(7696005)(53546011)(55016003)(83380400001)(166002)(966005)(71200400001)(478600001)(66476007)(76116006)(66446008)(64756008)(66946007)(66556008)(54906003)(110136005)(316002)(33656002)(2906002)(41300700001)(38100700002)(38070700009)(52536014)(86362001)(5660300002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4196C8061E68201A85DF8566B586ABY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ab861cd7-4e74-42ba-fd9a-08dbf4cc8420
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Dec 2023 13:25:43.0195 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ru4gWEfMAjMAGHUGA/Yl1BCaIRD6WmkSpx3lDSDz1NsYSzNq2HPt1Ayw/SmHFowWiCamxmuV9eK/ODKiZa3VdA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR11MB5241
X-Outbound-SMTP-Client: 72.163.7.165, rcdn-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/nf6fKvQAwOTOaNQA-nIzcFFDtsg>
Subject: Re: [tsvwg] Robert Wilton's No Objection on draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Dec 2023 13:25:58 -0000

Hi Bob,

Please see inline …

From: Bob Briscoe <ietf@bobbriscoe.net>
Sent: Friday, December 1, 2023 11:31 PM
To: Rob Wilton (rwilton) <rwilton@cisco.com>; The IESG <iesg@ietf.org>
Cc: gorry@erg.abdn.ac.uk; tsvwg@ietf.org; tsvwg-chairs@ietf.org; draft-ietf-tsvwg-rfc6040update-shim@ietf.org
Subject: Re: [tsvwg] Robert Wilton's No Objection on draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT)

Robert, Thank you for these thoughts. Pls see [BB]
On 24/11/2023 13:06, Robert Wilton via Datatracker wrote:

Robert Wilton has entered the following ballot position for

draft-ietf-tsvwg-rfc6040update-shim-21: No Objection



When responding, please keep the subject line intact and reply to all

email addresses included in the To and CC lines. (Feel free to cut this

introductory paragraph, however.)





Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/

for more information about how to handle DISCUSS and COMMENT positions.





The document, along with other ballot positions, can be found here:

https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc6040update-shim/







----------------------------------------------------------------------

COMMENT:

----------------------------------------------------------------------



Hi,



Thanks for this document, I found it interesting to read.  A couple of minor

comments for you to consider:



(1) p 5, sec 4.  Making a non-ECN Tunnel Ingress Safe by Configuration



      Whether or not an ingress implementation claims compliance with

      RFC 6040, RFC 4301 or RFC3168, when the outer tunnel header is IP

      (v4 or v6), if possible, the operator MUST configure the ingress

      to zero the outer ECN field in any of the following cases:



As a minor comment, I wonder whether RFCs should be specifying requirements on

people (i.e., operators), or whether it would be better to place the

requirement on the deployment.

[BB] We (the WG) had to work out how to navigate this particularly tricky balancing act. The following paras at the end of §3 were intended to explain:
However, the ECN field is a non-optional part of the IP header (v4 and v6). So any implementation that creates an outer IP header has to give the ECN field some value. There is only one safe value a tunnel ingress can use if it does not know whether the egress supports propagation of the ECN field; it has to clear the ECN field in any outer IP header to 0b00.

However, an RFC has no jurisdiction over implementations that choose not to comply with it or cannot comply with it, including all those implementations that predated the RFC. Therefore it would have been unreasonable to add such a requirement to RFC 6040. Nonetheless, to ensure safe propagation of the ECN field over tunnels, it is reasonable to add requirements on operators, to ensure they configure their tunnels safely (where possible).

Perhaps your suggestion has taken this all into account, so you're suggesting that placing the requirement on the deployment would be better than on the operator (of the deployment). Perhaps, but I always prefer the active to the passive. "A deployment of an ingress SHOULD be configured to zero the outer," is less clear than, "The operator SHOULD configure the ingress to zero the outer."
[Rob Wilton (rwilton)]

I was perhaps thinking of something more like:


                    if possible, the ingress device SHOULD be configured to

        zero the outer ECN field in any of the following cases:

This text has the benefit of applying no matter how the configuration came into effect, e.g., perhaps it is being configured via a controller, or even as part of a configuration template produced by a controller manufacturer.


FWIW, I'm not sure what the problem is with placing requirements on people. I've seen drafts 'corrected' when they place requirements on implementers, rather than implementations. But is this practice actually documented anywhere, or is there any rationale to support it? I'm always willing to learn if there is.

[Rob Wilton (rwilton)]
Placing the requirement on the person seems to unnecessarily constrain compliance to only where a person is actively involved in the process.  Is that the goal here?  I.e., does the requirement still apply if the action is being taken by a machine, code, or some other automation?

Ultimately, I think that it doesn’t matter who takes the action, what really matters is how the protocol behaves and hence that is why I believe that it is more precise to place the constraints on the required resultant effect, not on the person/action to achieve that effect.

But this is also a non-blocking comment.  I.e., you can keep the text in the active tense if you wish, and I suspect folks will manage to infer the actual underlying intent.





(2) p 10, sec 6.1.1.  L2TP (v2 and v3) ECN Extension



   L2TP maintainers are RECOMMENDED to implement the ECN extension to

   L2TPv2 and L2TPv3 defined in Section 6.1.1.2 below, in order to

   provide the benefits of ECN [RFC8087], whenever a node within an L2TP

   tunnel becomes the bottleneck for an end-to-end traffic flow.



Similarly to my previous comment, should the RFC 2119 requirement be placed on

the maintainers, or should it be placed on an updated versions of L2TP?

[BB] Here, I agree with you. Proposed replacement text:



   Implementation of the ECN extension to L2TPv2 and L2TPv3 defined in Section

   6.1.1.2 below is RECOMMENDED, in order to provide the benefits of ECN...

Similarly, with the identically structured requirements in the GRE and AMT sections.

Thank you.


Bob

[Rob Wilton (rwilton)]
Regards,
Rob







Regards,

Rob









--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/