
From nobody Tue Dec  1 15:06:16 2015
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F1CA1B29EB; Tue,  1 Dec 2015 15:06:07 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151201230607.18661.33492.idtracker@ietfa.amsl.com>
Date: Tue, 01 Dec 2015 15:06:07 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/h0TXklOb8XgcDpIxkayGajeD0c4>
Cc: lisp-chairs@ietf.org, lisp@ietf.org, draft-ietf-lisp-impact.all@ietf.org, draft-ietf-lisp-impact@ietf.org, rfc-editor@rfc-editor.org, The IESG <iesg@ietf.org>
Subject: [lisp] Document Action: 'LISP Impact' to Informational RFC (draft-ietf-lisp-impact-05.txt)
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2015 23:06:07 -0000

The IESG has approved the following document:
- 'LISP Impact'
  (draft-ietf-lisp-impact-05.txt) as Informational RFC

This document is the product of the Locator/ID Separation Protocol
Working Group.

The IESG contact persons are Alvaro Retana, Alia Atlas and Deborah
Brungard.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-impact/





Technical Summary

 The Locator/Identifier Separation Protocol (LISP) aims at improving the Internet scalability
 properties leveraging on three simple principles: address role separation, encapsulation, and
 mapping. LISP comprises both a tunnel-based data plane and a distributed control plane for the
 Internet, and requires some new functionalities, such as RLOC reachability mechanisms. The
 main goal of LISP is to make the Internet more  scalable by reducing the number of prefixes
 announced in the Default Free Zone (DFZ). However, as LISP relies on mapping and encapsulation,
 it turns out that it provides more benefits than just increased scalability. LISP architecture facilitates
 routing in environments where there is little to no correlation between network endpoints and
 topological location. In service provider environment this use is evident in a range of consumer
 use cases which require an inline anchor in-order to deliver a service to a subscribers.  Inline
 anchors provide one of three types of capabilities:

  o  enable mobility of subscriber end points
  o  enable chaining of middle-box functions and services
  o  enable seamless scale-out of functions

Working Group Summary

 There was no major controversy. The WG had a debate on the impact of cache
 size, i.e., cache performance, control overhead and scalability of control plane
 (related to results published in one particular research paper [CCD12]), which
 triggered two revisions of the document. 

Document Quality

   Are there existing implementations of the protocol? 
   Yes, there are multiple implementations of LISP (at least 3)
  
  Have a significant number of vendors indicated their plan to implement
  the specification?
  At least one major vendor (Cisco) has already implemented LISP specification. 
 
  Are there any reviewers that merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a conclusion that the document had no
  substantive issues?
  Review by Ross Callon triggered two revisions of the document but without major changes.
  Reviewer was satisfied with version 03 of the document

  If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)?
  In the case of a Media Type review, on what date was the request posted?
  This document does not require a MIB doctor

Personnel
Wassim Haddad is the document shepherd. The responsible area director is Deborah Brungard.


From nobody Fri Dec  4 10:55:26 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 00A591B321F; Fri,  4 Dec 2015 10:55:26 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151204185525.9579.29234.idtracker@ietfa.amsl.com>
Date: Fri, 04 Dec 2015 10:55:25 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/dAOXB6AlMUHB-hIQ66sWkQ_NIiA>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-crypto-03.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Dec 2015 18:55:26 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Locator/ID Separation Protocol Working Group of the IETF.

        Title           : LISP Data-Plane Confidentiality
        Authors         : Dino Farinacci
                          Brian Weis
	Filename        : draft-ietf-lisp-crypto-03.txt
	Pages           : 17
	Date            : 2015-12-04

Abstract:
   This document describes a mechanism for encrypting LISP encapsulated
   traffic.  The design describes how key exchange is achieved using
   existing LISP control-plane mechanisms as well as how to secure the
   LISP data-plane from third-party surveillance attacks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-crypto/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-crypto-03

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-crypto-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri Dec  4 10:58:03 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9051E1B3256 for <lisp@ietfa.amsl.com>; Fri,  4 Dec 2015 10:58:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.598
X-Spam-Level: 
X-Spam-Status: No, score=-0.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_COMMENT_SAVED_URL=1.391, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_HTML_ATTACH=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lt402EHnQBOR for <lisp@ietfa.amsl.com>; Fri,  4 Dec 2015 10:57:53 -0800 (PST)
Received: from mail-pa0-x230.google.com (mail-pa0-x230.google.com [IPv6:2607:f8b0:400e:c03::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 33FEF1B3252 for <lisp@ietf.org>; Fri,  4 Dec 2015 10:57:53 -0800 (PST)
Received: by pacdm15 with SMTP id dm15so90725148pac.3 for <lisp@ietf.org>; Fri, 04 Dec 2015 10:57:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:subject:message-id:date:to:mime-version; bh=W7nHngMOY1VO6mJ97JD19m2kUobSoY6B4sfJb2Uc6JM=; b=cf4CJpQPyNnmnu9LKfpBVD0Q5n7ej/H75kEpbsEPO1sxg3CmXEDnuT1qe33FN1V+Tp FM1CahPPt6EynKrvhtaJtDWw2WA/ZvM/K5zlWGebh0pygkInZ9e6vgJaX7lkSF9NBS6I FPMl0QN4T1wRBGevg3a76xBCVVThjK1T3aY+nc4nxvjJxG7jcw7umRJ5dvVpFp/jYudj oDwV32dLfat2S5FYvKpiLkX6TBSDg/inbthnVJFV+Cxt02o3wLviCP8u/EvXWjex5SwW bmk9Onidc2v/MpXY2bR+P7Qlz4vGtWHy09ivrieju9WekGyJ6At/YTpZqq7I35TCRwzq 9Weg==
X-Received: by 10.66.192.42 with SMTP id hd10mr23415293pac.111.1449255472761;  Fri, 04 Dec 2015 10:57:52 -0800 (PST)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id c1sm18675390pas.1.2015.12.04.10.57.49 for <lisp@ietf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 04 Dec 2015 10:57:51 -0800 (PST)
From: Dino Farinacci <farinacci@gmail.com>
Content-Type: multipart/mixed; boundary="Apple-Mail=_93271C04-11AF-4AFB-BD49-27B450724A2A"
Message-Id: <1DE57D39-BCC6-4FF5-80D4-E0B6301D319F@gmail.com>
Date: Fri, 4 Dec 2015 10:57:53 -0800
To: LISP mailing list list <lisp@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
X-Mailer: Apple Mail (2.3096.5)
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/V1nN1B74Lrge6oHoZOY9DMOzArc>
Subject: [lisp] New draft-ietf-lisp-crypto-03 update
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Dec 2015 18:58:00 -0000

--Apple-Mail=_93271C04-11AF-4AFB-BD49-27B450724A2A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Brian, Ilari, and I have put in some substantial time for this draft. =
Changes include:

B.1.  Changes to draft-ietf-lisp-crypto-03.txt

   o  Posted December 2015.

   o  Changed cipher suite allocations.  We now have 2 AES-CBC cipher
      suites for compatibility, 3 AES-GCM cipher suites that are faster
      ciphers that include AE and a Chacha20-Poly1305 cipher suite which
      is the fastest but not totally proven/accepted..

   o  Remove 1024-bit DH keys for key exchange.

   o  Make clear that AES and chacha20 ciphers use AEAD so part of
      encrytion/decryption does authentication.

   o  Make it more clear that separate key pairs are used in each
      direction between xTRs.

   o  Indicate that the IV length is different per cipher suite.

   o  Use a counter based IV for every packet for AEAD ciphers.
      Previously text said to use a random number.  But CBC ciphers, use
      a random number.

   o  Indicate that key material is sent in network byte order (big
      endian).

   o  Remove A-bit from Security Type LCAF.  No need to do
      authentication only with the introduction of AEAD ciphers.  These
      ciphers can do authentication.  So you get ciphertext for free.

   o  Remove language that refers to "encryption-key" and "integrity-
      key".  Used term "AEAD-key" that is used by the AEAD cipher suites
      that do encryption and authenticaiton internal to the cipher.

Thanks,
Dino/Brian


--Apple-Mail=_93271C04-11AF-4AFB-BD49-27B450724A2A
Content-Disposition: attachment;
	filename=rfcdiff.html
Content-Type: text/html;
	name="rfcdiff.html"
Content-Transfer-Encoding: 7bit


<!-- saved from url=(0029)http://tools.ietf.org/rfcdiff -->
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"></head><body>Content-Type: text/html


 
<!-- Generated by rfcdiff 1.42: rfcdiff  --> 
<!-- <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional" > -->
<!-- System: Linux dechaunac 3.2.0-4-amd64 #1 SMP Debian 3.2.68-1+deb7u2 x86_64 GNU/Linux --> 
<!-- Using awk: /usr/bin/gawk: GNU Awk 4.1.1, API: 1.1 (GNU MPFR 3.1.3, GNU MP 6.0.0) --> 
<!-- Using diff: /usr/bin/diff: diff (GNU diffutils) 3.3 --> 
<!-- Using wdiff: /usr/bin/wdiff: wdiff (GNU wdiff) 1.2.2 --> 
 
 
   
  <meta http-equiv="Content-Style-Type" content="text/css"> 
  <title>Diff: draft-ietf-lisp-crypto-02.txt - draft-ietf-lisp-crypto-03.txt</title> 
  <style type="text/css"> 
    body    { margin: 0.4ex; margin-right: auto; } 
    tr      { } 
    td      { white-space: pre; font-family: monospace; vertical-align: top; font-size: 0.86em;} 
    th      { font-size: 0.86em; } 
    .small  { font-size: 0.6em; font-style: italic; font-family: Verdana, Helvetica, sans-serif; } 
    .left   { background-color: #EEE; } 
    .right  { background-color: #FFF; } 
    .diff   { background-color: #CCF; } 
    .lblock { background-color: #BFB; } 
    .rblock { background-color: #FF8; } 
    .insert { background-color: #8FF; } 
    .delete { background-color: #ACF; } 
    .void   { background-color: #FFB; } 
    .cont   { background-color: #EEE; } 
    .linebr { background-color: #AAA; } 
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; text-align: right; padding: 0 2px; } 
    .elipsis{ background-color: #AAA; } 
    .left .cont { background-color: #DDD; } 
    .right .cont { background-color: #EEE; } 
    .lblock .cont { background-color: #9D9; } 
    .rblock .cont { background-color: #DD6; } 
    .insert .cont { background-color: #0DD; } 
    .delete .cont { background-color: #8AD; } 
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px 0; } 
  </style> 
 
 
  <table border="0" cellpadding="0" cellspacing="0"> 
  <tbody><tr bgcolor="orange"><th></th><th><a href="http://tools.ietf.org/rfcdiff?url2=draft-ietf-lisp-crypto-02.txt" style="color:#008; text-decoration:none;">&lt;</a>&nbsp;<a href="https://tools.ietf.org/html/draft-ietf-lisp-crypto-02.txt" style="color:#008">draft-ietf-lisp-crypto-02.txt</a>&nbsp;</th><th> </th><th>&nbsp;<a href="https://tools.ietf.org/html/draft-ietf-lisp-crypto-03.txt" style="color:#008">draft-ietf-lisp-crypto-03.txt</a>&nbsp;<a href="http://tools.ietf.org/rfcdiff?url1=draft-ietf-lisp-crypto-03.txt" style="color:#008; text-decoration:none;">&gt;</a></th><th></th></tr> 
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Internet Engineering Task Force                             D. Farinacci</td><td> </td><td class="right">Internet Engineering Task Force                             D. Farinacci</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Internet-Draft                                               lispers.net</td><td> </td><td class="right">Internet-Draft                                               lispers.net</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Intended status: Experimental                                    B. Weis</td><td> </td><td class="right">Intended status: Experimental                                    B. Weis</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0001"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">Expires: <span class="delete">March 11,</span> 2016                                    cisco Systems</td><td> </td><td class="rblock">Expires: <span class="insert">June 6,</span> 2016                                      cisco Systems</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                       <span class="delete">September 8,</span> 2015</td><td> </td><td class="rblock">                                                        <span class="insert">December 4,</span> 2015</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                    LISP Data-Plane Confidentiality</td><td> </td><td class="right">                    LISP Data-Plane Confidentiality</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0002"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                       draft-ietf-lisp-crypto-0<span class="delete">2</span></td><td> </td><td class="rblock">                       draft-ietf-lisp-crypto-0<span class="insert">3</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Abstract</td><td> </td><td class="right">Abstract</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This document describes a mechanism for encrypting LISP encapsulated</td><td> </td><td class="right">   This document describes a mechanism for encrypting LISP encapsulated</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   traffic.  The design describes how key exchange is achieved using</td><td> </td><td class="right">   traffic.  The design describes how key exchange is achieved using</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   existing LISP control-plane mechanisms as well as how to secure the</td><td> </td><td class="right">   existing LISP control-plane mechanisms as well as how to secure the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   LISP data-plane from third-party surveillance attacks.</td><td> </td><td class="right">   LISP data-plane from third-party surveillance attacks.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Status of This Memo</td><td> </td><td class="right">Status of This Memo</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l2"><small>skipping to change at</small><em> page 1, line 34</em></a></th><th> </th><th><a name="part-r2"><small>skipping to change at</small><em> page 1, line 34</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are working documents of the Internet Engineering</td><td> </td><td class="right">   Internet-Drafts are working documents of the Internet Engineering</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Task Force (IETF).  Note that other groups may also distribute</td><td> </td><td class="right">   Task Force (IETF).  Note that other groups may also distribute</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   working documents as Internet-Drafts.  The list of current Internet-</td><td> </td><td class="right">   working documents as Internet-Drafts.  The list of current Internet-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td> </td><td class="right">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are draft documents valid for a maximum of six months</td><td> </td><td class="right">   Internet-Drafts are draft documents valid for a maximum of six months</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and may be updated, replaced, or obsoleted by other documents at any</td><td> </td><td class="right">   and may be updated, replaced, or obsoleted by other documents at any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   time.  It is inappropriate to use Internet-Drafts as reference</td><td> </td><td class="right">   time.  It is inappropriate to use Internet-Drafts as reference</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   material or to cite them other than as "work in progress."</td><td> </td><td class="right">   material or to cite them other than as "work in progress."</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0003"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   This Internet-Draft will expire on <span class="delete">March 11</span>, 2016.</td><td> </td><td class="rblock">   This Internet-Draft will expire on <span class="insert">June 6</span>, 2016.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Copyright Notice</td><td> </td><td class="right">Copyright Notice</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Copyright (c) 2015 IETF Trust and the persons identified as the</td><td> </td><td class="right">   Copyright (c) 2015 IETF Trust and the persons identified as the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   document authors.  All rights reserved.</td><td> </td><td class="right">   document authors.  All rights reserved.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td class="right">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Provisions Relating to IETF Documents</td><td> </td><td class="right">   Provisions Relating to IETF Documents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td> </td><td class="right">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   publication of this document.  Please review these documents</td><td> </td><td class="right">   publication of this document.  Please review these documents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l3"><small>skipping to change at</small><em> page 2, line 12</em></a></th><th> </th><th><a name="part-r3"><small>skipping to change at</small><em> page 2, line 12</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the Trust Legal Provisions and are provided without warranty as</td><td> </td><td class="right">   the Trust Legal Provisions and are provided without warranty as</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   described in the Simplified BSD License.</td><td> </td><td class="right">   described in the Simplified BSD License.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Table of Contents</td><td> </td><td class="right">Table of Contents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2</td><td> </td><td class="right">   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   2.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td> </td><td class="right">   2.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   3.  Diffie-Hellman Key Exchange . . . . . . . . . . . . . . . . .   3</td><td> </td><td class="right">   3.  Diffie-Hellman Key Exchange . . . . . . . . . . . . . . . . .   3</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   4.  Encoding and Transmitting Key Material  . . . . . . . . . . .   4</td><td> </td><td class="right">   4.  Encoding and Transmitting Key Material  . . . . . . . . . . .   4</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   5.  Shared Keys used for the Data-Plane . . . . . . . . . . . . .   7</td><td> </td><td class="right">   5.  Shared Keys used for the Data-Plane . . . . . . . . . . . . .   7</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0004"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   6.  Data-Plane Operation  . . . . . . . . . . . . . . . . . . . .   <span class="delete">8</span></td><td> </td><td class="rblock">   6.  Data-Plane Operation  . . . . . . . . . . . . . . . . . . . .   <span class="insert">9</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   7.  Procedures for Encryption and Decryption  . . . . . . . . . .  10</td><td> </td><td class="right">   7.  Procedures for Encryption and Decryption  . . . . . . . . . .  10</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   8.  Dynamic Rekeying  . . . . . . . . . . . . . . . . . . . . . .  11</td><td> </td><td class="right">   8.  Dynamic Rekeying  . . . . . . . . . . . . . . . . . . . . . .  11</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   9.  Future Work . . . . . . . . . . . . . . . . . . . . . . . . .  12</td><td> </td><td class="right">   9.  Future Work . . . . . . . . . . . . . . . . . . . . . . . . .  12</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   10. Security Considerations . . . . . . . . . . . . . . . . . . .  12</td><td> </td><td class="right">   10. Security Considerations . . . . . . . . . . . . . . . . . . .  12</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     10.1.  SAAG Support . . . . . . . . . . . . . . . . . . . . . .  12</td><td> </td><td class="right">     10.1.  SAAG Support . . . . . . . . . . . . . . . . . . . . . .  12</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     10.2.  LISP-Crypto Security Threats . . . . . . . . . . . . . .  12</td><td> </td><td class="right">     10.2.  LISP-Crypto Security Threats . . . . . . . . . . . . . .  12</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   11. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  13</td><td> </td><td class="right">   11. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  13</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .  13</td><td> </td><td class="right">   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .  13</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     12.1.  Normative References . . . . . . . . . . . . . . . . . .  13</td><td> </td><td class="right">     12.1.  Normative References . . . . . . . . . . . . . . . . . .  13</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     12.2.  Informative References . . . . . . . . . . . . . . . . .  14</td><td> </td><td class="right">     12.2.  Informative References . . . . . . . . . . . . . . . . .  14</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  15</td><td> </td><td class="right">   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  15</td><td> </td><td class="right">   Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0005"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     B.1.  Changes to <span class="delete">draft-ietf-lisp-crypto-01.txt</span>  . . . . . . . .  15</td><td> </td><td class="rblock">     B.1.  Changes to <span class="insert">draft-ietf-lisp-crypto-03.txt</span>  . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     B.2.  Changes to <span class="delete">draft-ietf-lisp-crypto-01.txt</span>  . . . . . . . .  <span class="delete">15</span></td><td> </td><td class="rblock">     B.2.  Changes to <span class="insert">draft-ietf-lisp-crypto-02.txt</span>  . . . . . . . .  <span class="insert">16</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     B.3.  Changes to <span class="delete">draft-ietf-lisp-crypto-00.txt</span>  . . . . . . . .  <span class="delete">15</span></td><td> </td><td class="rblock">     B.3.  Changes to <span class="insert">draft-ietf-lisp-crypto-01.txt</span>  . . . . . . . .  <span class="insert">16</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     B.4.  Changes to <span class="delete">draft-farinacci-lisp-crypto-01.txt</span> . . . . . .  <span class="delete">15</span></td><td> </td><td class="rblock">     B.4.  Changes to <span class="insert">draft-ietf-lisp-crypto-00.txt</span>  . . . . . . <span class="insert">. .  16</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     B.5.  Changes to <span class="delete">draft-farinacci-lisp-crypto-00.txt</span> . . . . . .  16</td><td> </td><td class="rblock">     B.5.  Changes to <span class="insert">draft-farinacci-lisp-crypto-01.txt</span> . . . . . .  16</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">16</span></td><td> </td><td class="rblock">     <span class="insert">B.6.  Changes to draft-farinacci-lisp-crypto-00.txt . . . . . .  17</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">17</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">1.  Introduction</td><td> </td><td class="right">1.  Introduction</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The Locator/ID Separation Protocol [RFC6830] defines a set of</td><td> </td><td class="right">   The Locator/ID Separation Protocol [RFC6830] defines a set of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   functions for routers to exchange information used to map from non-</td><td> </td><td class="right">   functions for routers to exchange information used to map from non-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   routable Endpoint Identifiers (EIDs) to routable Routing Locators</td><td> </td><td class="right">   routable Endpoint Identifiers (EIDs) to routable Routing Locators</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (RLOCs).  LISP ITRs and PITRs encapsulate packets to ETRs and RTRs.</td><td> </td><td class="right">   (RLOCs).  LISP ITRs and PITRs encapsulate packets to ETRs and RTRs.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Packets that arrive at the ITR or PITR are typically not modified.</td><td> </td><td class="right">   Packets that arrive at the ITR or PITR are typically not modified.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Which means no protection or privacy of the data is added.  If the</td><td> </td><td class="right">   Which means no protection or privacy of the data is added.  If the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   source host encrypts the data stream then the encapsulated packets</td><td> </td><td class="right">   source host encrypts the data stream then the encapsulated packets</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l4"><small>skipping to change at</small><em> page 3, line 37</em></a></th><th> </th><th><a name="part-r4"><small>skipping to change at</small><em> page 3, line 40</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   ITR needs to obtain the RLOC of an ETR, it will get security material</td><td> </td><td class="right">   ITR needs to obtain the RLOC of an ETR, it will get security material</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to compute a shared secret with the ETR.</td><td> </td><td class="right">   to compute a shared secret with the ETR.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The ITR can compute 3 shared-secrets per ETR the ITR is encapsulating</td><td> </td><td class="right">   The ITR can compute 3 shared-secrets per ETR the ITR is encapsulating</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to.  And when the ITR encrypts a packet before encapsulation, it will</td><td> </td><td class="right">   to.  And when the ITR encrypts a packet before encapsulation, it will</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   identify the key it used for the crypto calculation so the ETR knows</td><td> </td><td class="right">   identify the key it used for the crypto calculation so the ETR knows</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   which key to use for decrypting the packet after decapsulation.  By</td><td> </td><td class="right">   which key to use for decrypting the packet after decapsulation.  By</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   using key-ids in the LISP header, we can also get real-time rekeying</td><td> </td><td class="right">   using key-ids in the LISP header, we can also get real-time rekeying</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   functionality.</td><td> </td><td class="right">   functionality.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0006"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">When an ETR (when it is also an ITR) encapsulates packets to this ITR</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   (when it is also an ETR), a separate key exchange and shared-secret</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   computation is performed.  The key management described in this</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   documemnt is unidirectional from the ITR (the encapsulator) to the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   ETR (the decapsultor).</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">3.  Diffie-Hellman Key Exchange</td><td> </td><td class="right">3.  Diffie-Hellman Key Exchange</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   LISP will use a Diffie-Hellman [RFC2631] key exchange sequence and</td><td> </td><td class="right">   LISP will use a Diffie-Hellman [RFC2631] key exchange sequence and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   computation for computing a shared secret.  The Diffie-Hellman</td><td> </td><td class="right">   computation for computing a shared secret.  The Diffie-Hellman</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   parameters will be passed via Cipher Suite code-points in Map-Request</td><td> </td><td class="right">   parameters will be passed via Cipher Suite code-points in Map-Request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and Map-Reply messages.</td><td> </td><td class="right">   and Map-Reply messages.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Here is a brief description how Diff-Hellman works:</td><td> </td><td class="right">   Here is a brief description how Diff-Hellman works:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   +----------------------------+---------+----------------------------+</td><td> </td><td class="right">   +----------------------------+---------+----------------------------+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l5"><small>skipping to change at</small><em> page 5, line 12</em></a></th><th> </th><th><a name="part-r5"><small>skipping to change at</small><em> page 5, line 12</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Map-Reply messages.  Diffie-Hellman parameters are encoded in the</td><td> </td><td class="right">   Map-Reply messages.  Diffie-Hellman parameters are encoded in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   LISP Security Type LCAF [LCAF].</td><td> </td><td class="right">   LISP Security Type LCAF [LCAF].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     0                   1                   2                   3</td><td> </td><td class="right">     0                   1                   2                   3</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td class="right">     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    |           AFI = 16387         |     Rsvd1     |     Flags     |</td><td> </td><td class="right">    |           AFI = 16387         |     Rsvd1     |     Flags     |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    |   Type = 11   |      Rsvd2    |             6 + n             |</td><td> </td><td class="right">    |   Type = 11   |      Rsvd2    |             6 + n             |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0007"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">    |   Key Count   |      Rsvd3    |<span class="delete">A| Cipher Suite</span>|   Rsvd4     |R|</td><td> </td><td class="rblock">    |   Key Count   |      Rsvd3    |<span class="insert"> Cipher Suite  </span>|   Rsvd4     |R|</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    |           Key Length          |     Public Key Material ...   |</td><td> </td><td class="right">    |           Key Length          |     Public Key Material ...   |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    |                    ... Public Key Material                    |</td><td> </td><td class="right">    |                    ... Public Key Material                    |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    |              AFI = x          |       Locator Address ...     |</td><td> </td><td class="right">    |              AFI = x          |       Locator Address ...     |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Cipher Suite field contains DH Key Exchange and Cipher/Hash Functions</td><td> </td><td class="right">   Cipher Suite field contains DH Key Exchange and Cipher/Hash Functions</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The 'Key Count' field encodes the number of {'Key-Length', 'Key-</td><td> </td><td class="right">   The 'Key Count' field encodes the number of {'Key-Length', 'Key-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Material'} fields included in the encoded LCAF.  The maximum number</td><td> </td><td class="right">   Material'} fields included in the encoded LCAF.  The maximum number</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   of keys that can be encoded are 3, each identified by key-id 1,</td><td> </td><td class="right">   of keys that can be encoded are 3, each identified by key-id 1,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   followed by key-id 2, an finally key-id 3.</td><td> </td><td class="right">   followed by key-id 2, an finally key-id 3.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The 'R' bit is not used for this use-case of the Security Type LCAF</td><td> </td><td class="right">   The 'R' bit is not used for this use-case of the Security Type LCAF</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   but is reserved for [LISP-DDT] security.</td><td> </td><td class="right">   but is reserved for [LISP-DDT] security.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0008"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">When the A-bit is set, it indicates that Authentication only is</span></td><td> </td><td class="rblock">  Cipher <span class="insert">Suite 0:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   performed according to the Integrity hash function defined in the</span></td><td> </td><td class="rblock"><span class="insert">    Reserved</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher <span class="delete">Suites.  That is an encapsulator will perform an Integrity</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   computation over an unencrypted packet and include an ICV value.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Since the packet contains no ciphertext, there is no IV value</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   included in the message.  The 7-bit 'Cipher Suite' field defines the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   following code-points:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0009"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher Suite <span class="delete">0:</span></td><td> </td><td class="rblock">  Cipher Suite <span class="insert">1:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     Reserved</span></td><td> </td><td class="rblock"><span class="insert">    Diffie-Hellman Group: 2048-bit MODP [RFC3526]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    Encryption:           AES with 128-bit keys in CBC mode [AES-CBC]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    Integrity:            Integrated with [AES-CBC] AEAD [RFC5116] encryption</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    IV length:            16 bytes</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0010"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher Suite <span class="delete">1:</span></td><td> </td><td class="rblock">  Cipher Suite <span class="insert">2:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Diffie-Hellman Group: <span class="delete">1024-bit Modular Exponential (MODP) [RFC2409]</span></td><td> </td><td class="rblock">    Diffie-Hellman Group: <span class="insert">256-bit Elliptic-Curve 25519 [CURVE25519]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Encryption:           AES with 128-bit keys in CBC mode [AES-CBC]</td><td> </td><td class="rblock">    Encryption:           AES with 128-bit keys in CBC mode [AES-CBC]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Integrity:            HMAC-SHA1-96 [RFC2404]</td><td> </td><td class="rblock">    Integrity:            HMAC-SHA1-96 [RFC2404]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">    <span class="insert">IV length:            16 bytes</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0011"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher Suite <span class="delete">2:</span></td><td> </td><td class="rblock">  Cipher Suite <span class="insert">3:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Diffie-Hellman Group: 2048-bit MODP [RFC3526]</td><td> </td><td class="rblock">    Diffie-Hellman Group: 2048-bit MODP [RFC3526]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Encryption:           AES with 128-bit keys in <span class="delete">CBC</span> mode <span class="delete">[AES-CBC]</span></td><td> </td><td class="rblock">    Encryption:           AES with 128-bit keys in <span class="insert">GCM</span> mode <span class="insert">[AES-GCM]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Integrity:            <span class="delete">HMAC-SHA1-96 [RFC2404]</span></td><td> </td><td class="rblock">    Integrity:            <span class="insert">Integrated with [AES-GCM] AEAD [RFC5116] encryption</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    IV length:            12 bytes</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0012"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher Suite <span class="delete">3:</span></td><td> </td><td class="rblock"> Cipher Suite <span class="insert">4:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Diffie-Hellman Group: 3072-bit MODP [RFC3526]</td><td> </td><td class="rblock">    Diffie-Hellman Group: 3072-bit MODP [RFC3526]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Encryption:           AES with 128-bit keys in <span class="delete">CBC</span> mode <span class="delete">[AES-CBC]</span></td><td> </td><td class="rblock">    Encryption:           AES with 128-bit keys in <span class="insert">GCM</span> mode <span class="insert">[AES-GCM]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Integrity:            <span class="delete">HMAC-SHA1-96 [RFC2404]</span></td><td> </td><td class="rblock">    Integrity:            <span class="insert">Integrated with [AES-GCM] AEAD [RFC5116] encryption</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    IV length:            12 bytes</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0013"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher Suite <span class="delete">4:</span></td><td> </td><td class="rblock"> Cipher Suite <span class="insert">5:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]</td><td> </td><td class="rblock">    Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Encryption:           AES with 128-bit keys in <span class="delete">CBC</span> mode <span class="delete">[AES-CBC]</span></td><td> </td><td class="rblock">    Encryption:           AES with 128-bit keys in <span class="insert">GCM</span> mode <span class="insert">[AES-GCM]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Integrity:            <span class="delete">HMAC-SHA1-96 [RFC2404]</span></td><td> </td><td class="rblock">    Integrity:            <span class="insert">Integrated with [AES-GCM] AEAD [RFC5116] encryption</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    IV length:            12 bytes</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0014"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Cipher Suite <span class="delete">5:</span></td><td> </td><td class="rblock"> Cipher Suite <span class="insert">6:</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]</td><td> </td><td class="rblock">    Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">Encryption:</span>           Chacha20-Poly1305 [CHACHA-POLY]</td><td> </td><td class="rblock">    <span class="insert">Encryption/Integrity:</span> Chacha20-Poly1305 [CHACHA-POLY] <span class="insert">[RFC7539]</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     Integrity:            <span class="delete">HMAC-SHA1-96 [RFC2404]</span></td><td> </td><td class="rblock">    Integrity:            <span class="insert">Integrated with Chacha20-Poly1305 AEAD [RFC1116] encryption</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">    IV length:            8 bytes</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The "Public Key Material" field contains the public key generated by</td><td> </td><td class="right">   The "Public Key Material" field contains the public key generated by</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   one of the Cipher Suites defined above.  The length of the key in</td><td> </td><td class="right">   one of the Cipher Suites defined above.  The length of the key in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   octets is encoded in the "Key Length" field.</td><td> </td><td class="right">   octets is encoded in the "Key Length" field.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When an ITR or PITR send a Map-Request, they will encode their own</td><td> </td><td class="right">   When an ITR or PITR send a Map-Request, they will encode their own</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   RLOC in the Security Type LCAF format within the ITR-RLOCs field.</td><td> </td><td class="right">   RLOC in the Security Type LCAF format within the ITR-RLOCs field.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a ETR or RTR sends a Map-Reply, they will encode their RLOCs in</td><td> </td><td class="right">   When a ETR or RTR sends a Map-Reply, they will encode their RLOCs in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Security Type LCAF format within the RLOC-record field of each EID-</td><td> </td><td class="right">   Security Type LCAF format within the RLOC-record field of each EID-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   record supplied.</td><td> </td><td class="right">   record supplied.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l6"><small>skipping to change at</small><em> page 7, line 16</em></a></th><th> </th><th><a name="part-r6"><small>skipping to change at</small><em> page 7, line 28</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">5.  Shared Keys used for the Data-Plane</td><td> </td><td class="right">5.  Shared Keys used for the Data-Plane</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When an ITR or PITR receives a Map-Reply accepting the Cipher Suite</td><td> </td><td class="right">   When an ITR or PITR receives a Map-Reply accepting the Cipher Suite</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   sent in the Map-Request, it is ready to create data plane keys.  The</td><td> </td><td class="right">   sent in the Map-Request, it is ready to create data plane keys.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   same process is followed by the ETR or RTR returning the Map-Reply.</td><td> </td><td class="right">   same process is followed by the ETR or RTR returning the Map-Reply.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The first step is to create a shared secret, using the peer's shared</td><td> </td><td class="right">   The first step is to create a shared secret, using the peer's shared</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diffie-Hellman Public Key Material combined with device's own private</td><td> </td><td class="right">   Diffie-Hellman Public Key Material combined with device's own private</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   keying material as described in Section 3.  The Diffie-Hellman group</td><td> </td><td class="right">   keying material as described in Section 3.  The Diffie-Hellman group</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0015"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   used is defined in the <span class="delete">Cipher S</span>uite sent in the Map-Request and</td><td> </td><td class="rblock">   used is defined in the <span class="insert">cipher s</span>uite sent in the Map-Request and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   copied into the Map-Reply.</td><td> </td><td class="right">   copied into the Map-Reply.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0016"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The resulting shared secret is used to compute <span class="delete">Encryption and</span></td><td> </td><td class="rblock">   The resulting shared secret is used to compute <span class="insert">an AEAD-key</span> for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Integrity keys</span> for the algorithms specified in the <span class="delete">Cipher Suite.</span>  A</td><td> </td><td class="rblock">   algorithms specified in the <span class="insert">cipher suite.</span>  A Key Derivation Function</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Key Derivation Function (KDF) in counter mode as specified by</td><td> </td><td class="rblock">   (KDF) in counter mode as specified by [NIST-SP800-108] is used to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   [NIST-SP800-108] is used to generate the data-plane keys.  The amount</td><td> </td><td class="rblock">   generate the data-plane keys.  The amount of keying material that is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   of keying material that is derived depends on the algorithms in the</td><td> </td><td class="rblock">   derived depends on the algorithms in the cipher suite.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   cipher suite.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The inputs to the KDF are as follows:</td><td> </td><td class="right">   The inputs to the KDF are as follows:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  KDF function.  This is HMAC-SHA-256.</td><td> </td><td class="right">   o  KDF function.  This is HMAC-SHA-256.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0017"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   o  A key for the KDF function.  This is the <span class="delete">most significant 16</span></td><td> </td><td class="rblock">   o  A key for the KDF function.  This is the computed Diffie-Hellman</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      octets of the</span> computed Diffie-Hellman shared secret.</td><td> </td><td class="rblock">      shared secret.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Context that binds the use of the data-plane keys to this session.</td><td> </td><td class="right">   o  Context that binds the use of the data-plane keys to this session.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      The context is made up of the following fields, which are</td><td> </td><td class="right">      The context is made up of the following fields, which are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      concatenated and provided as the data to be acted upon by the KDF</td><td> </td><td class="right">      concatenated and provided as the data to be acted upon by the KDF</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      function.</td><td> </td><td class="right">      function.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Context:</td><td> </td><td class="right">   Context:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  A counter, represented as a two-octet value in network-byte order.</td><td> </td><td class="right">   o  A counter, represented as a two-octet value in network-byte order.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  The null-terminated string "lisp-crypto".</td><td> </td><td class="right">   o  The null-terminated string "lisp-crypto".</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0018"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   o  The ITR's nonce from the the Map-Request the <span class="delete">Cipher S</span>uite was</td><td> </td><td class="rblock">   o  The ITR's nonce from the the Map-Request the <span class="insert">cipher s</span>uite was</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      included in.</td><td> </td><td class="right">      included in.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  The number of bits of keying material required (L), represented as</td><td> </td><td class="right">   o  The number of bits of keying material required (L), represented as</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      a two-octet value in network byte order.</td><td> </td><td class="right">      a two-octet value in network byte order.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The counter value in the context is first set to 1.  When the amount</td><td> </td><td class="right">   The counter value in the context is first set to 1.  When the amount</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   of keying material exceeds the number of bits returned by the KDF</td><td> </td><td class="right">   of keying material exceeds the number of bits returned by the KDF</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   function, then the KDF function is called again with the same inputs</td><td> </td><td class="right">   function, then the KDF function is called again with the same inputs</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   except that the counter increments for each call.  When enough keying</td><td> </td><td class="right">   except that the counter increments for each call.  When enough keying</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   material is returned, it is concatenated and used to create keys.</td><td> </td><td class="right">   material is returned, it is concatenated and used to create keys.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l7"><small>skipping to change at</small><em> page 8, line 39</em></a></th><th> </th><th><a name="part-r7"><small>skipping to change at</small><em> page 8, line 50</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   key-material-2 = HMAC-SHA-256(dh-shared-secret, context)</td><td> </td><td class="right">   key-material-2 = HMAC-SHA-256(dh-shared-secret, context)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       where: context = 0x0002 || "lisp-crypto" || &lt;itr-nonce&gt; || 0x0200</td><td> </td><td class="right">       where: context = 0x0002 || "lisp-crypto" || &lt;itr-nonce&gt; || 0x0200</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   key-material = key-material-1 || key-material-2</td><td> </td><td class="right">   key-material = key-material-1 || key-material-2</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the key-material is longer than the required number of bits (L),</td><td> </td><td class="right">   If the key-material is longer than the required number of bits (L),</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   then only the most significant L bits are used.</td><td> </td><td class="right">   then only the most significant L bits are used.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0019"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   From the derived key-material, the most significant bits are used for</td><td> </td><td class="rblock">   From the derived key-material, the most significant <span class="insert">256</span> bits are used</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the <span class="delete">Encryption key, and least significant bits are used for the</span></td><td> </td><td class="rblock">   for the <span class="insert">AEAD-key by AEAD ciphers.  The 256-bit AEAD-key is divided</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Integrity key.  For example, if the Cipher Suite contains both AES</span></td><td> </td><td class="rblock"><span class="insert">   into a</span> 128-bit encryption <span class="insert">key</span> and <span class="insert">a</span> 128-bit <span class="insert">integrity-check key</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   with</span> 128-bit <span class="delete">keys and HMAC-SHA1-96, the most significant 128 bits</span></td><td> </td><td class="rblock"><span class="insert">   internal to the cipher used by</span> the <span class="insert">ITR.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   become the ITR's data-plane</span> encryption <span class="delete">key,</span> and <span class="delete">the next</span> 128-bit</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">become</span> the <span class="delete">ITR's Integrity key.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">6.  Data-Plane Operation</td><td> </td><td class="right">6.  Data-Plane Operation</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The LISP encapsulation header [RFC6830] requires changes to encode</td><td> </td><td class="right">   The LISP encapsulation header [RFC6830] requires changes to encode</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the key-id for the key being used for encryption.</td><td> </td><td class="right">   the key-id for the key being used for encryption.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     0                   1                   2                   3</td><td> </td><td class="right">     0                   1                   2                   3</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td class="right">     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">  / |       Source Port = xxxx      |       Dest Port = 4341        |</td><td> </td><td class="right">  / |       Source Port = xxxx      |       Dest Port = 4341        |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">  \ |           UDP Length          |        UDP Checksum           |</td><td> </td><td class="right">  \ |           UDP Length          |        UDP Checksum           |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0020"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">L / |N|L|E|V|I|P|K|K|            Nonce/Map-Version                  | \</td><td> </td><td class="rblock">L / |N|L|E|V|I|P|K|K|            Nonce/Map-Version                  | \  <span class="insert">\</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">I   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  |</td><td> </td><td class="rblock">I   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  |  <span class="insert">AD</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">S \ |                 Instance ID/Locator-Status-Bits               |  |</td><td> </td><td class="rblock">S \ |                 Instance ID/Locator-Status-Bits               |  | <span class="insert">/</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">P   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  |</td><td> </td><td class="right">P   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    |                   Initialization Vector (IV)                  |  I</td><td> </td><td class="right">    |                   Initialization Vector (IV)                  |  I</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">E   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  C</td><td> </td><td class="right">E   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  C</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">n / |                                                               |  V</td><td> </td><td class="right">n / |                                                               |  V</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">c   |                                                               |  |</td><td> </td><td class="right">c   |                                                               |  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">r   |                Packet Payload with EID Header ...             |  |</td><td> </td><td class="right">r   |                Packet Payload with EID Header ...             |  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">y   |                                                               |  |</td><td> </td><td class="right">y   |                                                               |  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">p \ |                                                               | /</td><td> </td><td class="right">p \ |                                                               | /</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">t   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class="right">t   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0021"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">    <span class="delete">|                   Integrity Check Value (ICV)                 |</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">        K-bits indicate when packet is encrypted and which key used</td><td> </td><td class="right">        K-bits indicate when packet is encrypted and which key used</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When the KK bits are 00, the encapsulated packet is not encrypted.</td><td> </td><td class="right">   When the KK bits are 00, the encapsulated packet is not encrypted.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When the value of the KK bits are 1, 2, or 3, it encodes the key-id</td><td> </td><td class="right">   When the value of the KK bits are 1, 2, or 3, it encodes the key-id</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   of the secret keys computed during the Diffie-Hellman Map-Request/</td><td> </td><td class="right">   of the secret keys computed during the Diffie-Hellman Map-Request/</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Map-Reply exchange.  When the KK bits are not 0, the payload is</td><td> </td><td class="right">   Map-Reply exchange.  When the KK bits are not 0, the payload is</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0022"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   prepended with an Initialization Vector <span class="delete">(IV) and appended with an</span></td><td> </td><td class="rblock">   prepended with an Initialization Vector <span class="insert">(IV).</span>  The length of the IV</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Integrity Check Value (ICV).</span>  The length of the IV <span class="delete">and ICV fields</span></td><td> </td><td class="rblock">   <span class="insert">field is based</span> on the <span class="insert">cipher suite used.  Since all cipher suites</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   depend</span> on the <span class="delete">Cipher Suite negotiated</span> in the <span class="delete">control-plane.</span></td><td> </td><td class="rblock"><span class="insert">   defined in this document do Authenticated Encryption (AEAD), an ICV</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   field does not need to be present in the packet since it is included</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   in the <span class="insert">ciphertext.  The Additional Data (AD) used for the ICV is</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   shown above and includes the LISP header, the IV field and the packet</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   payload.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When an ITR or PITR receives a packet to be encapsulated, they will</td><td> </td><td class="right">   When an ITR or PITR receives a packet to be encapsulated, they will</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   first decide what key to use, encode the key-id into the LISP header,</td><td> </td><td class="right">   first decide what key to use, encode the key-id into the LISP header,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and use that key to encrypt all packet data that follows the LISP</td><td> </td><td class="right">   and use that key to encrypt all packet data that follows the LISP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   header.  Therefore, the outer header, UDP header, and LISP header</td><td> </td><td class="right">   header.  Therefore, the outer header, UDP header, and LISP header</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   travel as plaintext.</td><td> </td><td class="right">   travel as plaintext.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   There is an open working group item to discuss if the data</td><td> </td><td class="right">   There is an open working group item to discuss if the data</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   encapsulation header needs change for encryption or any new</td><td> </td><td class="right">   encapsulation header needs change for encryption or any new</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   applications.  This draft proposes changes to the existing header so</td><td> </td><td class="right">   applications.  This draft proposes changes to the existing header so</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   experimentation can continue without making large changes to the</td><td> </td><td class="right">   experimentation can continue without making large changes to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   data-plane at this time.</td><td> </td><td class="right">   data-plane at this time.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">7.  Procedures for Encryption and Decryption</td><td> </td><td class="right">7.  Procedures for Encryption and Decryption</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When an ITR, PITR, or RTR encapsulate a packet and have already</td><td> </td><td class="right">   When an ITR, PITR, or RTR encapsulate a packet and have already</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0023"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   computed an <span class="delete">encryption-key and integrity-key</span> (detailed in section</td><td> </td><td class="rblock">   computed an <span class="insert">AEAD-key</span> (detailed in section Section 5) that is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Section 5) that is associated with a destination RLOC, the following</td><td> </td><td class="rblock">   associated with a destination RLOC, the following encryption and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   encryption and encapsulation procedures are performed:</td><td> </td><td class="rblock">   encapsulation procedures are performed:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0024"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   1.  The encapsulator creates <span class="delete">a random number used as the IV.</span></td><td> </td><td class="rblock">   1.  The encapsulator creates <span class="insert">an IV and prepends</span> the IV value to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       Prepends</span> the IV value to the packet being encapsulated.  <span class="delete">The</span> IV</td><td> </td><td class="rblock">       packet being encapsulated.  <span class="insert">For GCM and Chacha cipher suites, the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       is incremented for every packet sent to the destination RLOC.</td><td> </td><td class="rblock">       IV is incremented for every packet <span class="insert">(beginning with a value of 1</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       in the first packet) and sent to the destination RLOC.  For CBC</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       cipher suites, the IV is a new random number for every packet</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">       sent to the destination RLOC.  <span class="insert">For the Chacha cipher suite, the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       IV is an 8-byte random value that is appended to a 4-byte counter</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       that is incremented for every packet (beginning with a value of 1</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       in the first packet).</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0025"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   2.  Next encrypt with cipher function <span class="delete">AES-CBC</span> using the <span class="delete">encryption-</span></td><td> </td><td class="rblock">   2.  Next encrypt with cipher function <span class="insert">AES or Chacha20</span> using the <span class="insert">AEAD-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       key over the packet <span class="delete">payload.</span>  This does not include the IV.  The</td><td> </td><td class="rblock">       key over the packet <span class="insert">payload following the AEAD specification</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       IV must be transmitted as plaintext so the decrypter can use it</td><td> </td><td class="rblock"><span class="insert">       referenced in the cipher suite definition.</span>  This does not include</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       as input to the decryption cipher.  The payload should be padded</td><td> </td><td class="rblock">       the IV.  The IV must be transmitted as plaintext so the decrypter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       to an integral number of bytes a block cipher may require.</td><td> </td><td class="rblock">       can use it as input to the decryption cipher.  The payload should</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">       be padded to an integral number of bytes a block cipher may</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">       require.  <span class="insert">The result of the AEAD operation may contain an ICV,</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       the size of which is defined by the referenced AEAD</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       specification.  Note that the AD (i.e. the LISP header exactly as</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       will be prepended in the next step and the IV) must be given to</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       the AEAD encryption function as the "associated data" argument.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   3.  Prepend the LISP header.  The key-id field of the LISP header is</td><td> </td><td class="right">   3.  Prepend the LISP header.  The key-id field of the LISP header is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       set to the key-id value that corresponds to key-pair used for the</td><td> </td><td class="right">       set to the key-id value that corresponds to key-pair used for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0026"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       encryption <span class="delete">cipher and for the ICV hash.</span></td><td> </td><td class="rblock">       encryption <span class="insert">cipher.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   4.  Next compute the ICV value by hashing the packet (which includes</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       the LISP header, the IV, and the packet payload) with the HMAC-</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       SHA1 function using the integrity-key.  The resulting ICV value</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       is appended to the packet.  The ICV is not ciphertext so a fast</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       integrity check can be performed without decryption at the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       receiver.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0027"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">5</span>.  Lastly, prepend the UDP header and outer IP header onto the</td><td> </td><td class="rblock">   <span class="insert">4</span>.  Lastly, prepend the UDP header and outer IP header onto the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       encrypted packet and send packet to destination RLOC.</td><td> </td><td class="right">       encrypted packet and send packet to destination RLOC.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When an ETR, PETR, or RTR receive an encapsulated packet, the</td><td> </td><td class="right">   When an ETR, PETR, or RTR receive an encapsulated packet, the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   following decapsulation and decryption procedures are performed:</td><td> </td><td class="right">   following decapsulation and decryption procedures are performed:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0028"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   1.  The outer IP <span class="delete">header and</span> UDP <span class="delete">header</span> are stripped from the start of</td><td> </td><td class="rblock">   1.  The outer IP <span class="insert">header,</span> UDP <span class="insert">header, LISP header, and IV field</span> are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       the <span class="delete">packet and the ICV is stripped from the end of the</span> packet.</td><td> </td><td class="rblock">       stripped from the start of the packet.  The LISP header and IV</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock">       <span class="insert">are retained and given to</span> the <span class="insert">AEAD decryption operation as</span> the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">2.  Next the ICV is computed by running the Integrity function from</span></td><td> </td><td class="rblock">       <span class="insert">"associated data" argument.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       the cipher suite using the integrity-key over the packet (which</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       includes the LISP header, the IV and packet payload) using the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       integrity-key.  If the result does not match the ICV value from</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       the packet, the packet was been tampered with, and is dropped,</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       and an optional log message may be issued.</span>  The <span class="delete">integrity-key is</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       obtained from a local-cache associated with the key-id value from</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       the LISP header.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   3.  If the hashed result matches the ICV value from the packet, then</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       the</span> LISP header <span class="delete">is stripped</span> and <span class="delete">decryption occurs over the packet</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       payload using the plaintext</span> IV <span class="delete">in</span> the <span class="delete">packet.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   4.  The IV is stripped from</span> the <span class="delete">packet.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0029"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">5.</span>  The packet is decrypted using the <span class="delete">encryption-key</span> and the IV from</td><td> </td><td class="rblock">   <span class="insert">2.</span>  The packet is decrypted using the <span class="insert">AEAD-key</span> and the IV from the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       the packet.  The <span class="delete">encryption-key</span> is obtained from a local-cache</td><td> </td><td class="rblock">       packet.  The <span class="insert">AEAD-key</span> is obtained from a local-cache associated</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       associated with the key-id value from the LISP header.  The</td><td> </td><td class="rblock">       with the key-id value from the LISP header.  The result of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       result of the decryption function is a plaintext packet <span class="delete">payload.</span></td><td> </td><td class="rblock">       decryption function is a plaintext packet <span class="insert">payload if the cipher</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       returned a verified ICV.  Otherwise, the packet has been tampered</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       with, is dropped, and an optional log message may be issued.  If</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       the AEAD specification included an ICV, the AEAD decryption</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       function will locate the ICV in the ciphertext and compare it to</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       a version of the ICV that the AEAD decryption function computes.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       If the computed ICV is different than the ICV located in the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">       ciphertext, then it will be considered tampered.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0030"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">6.  The resulting</span> packet is forwarded to the destination EID.</td><td> </td><td class="rblock">   <span class="insert">3.  If the packet was not tampered with, the decrypted</span> packet is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">       forwarded to the destination EID.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">8.  Dynamic Rekeying</td><td> </td><td class="right">8.  Dynamic Rekeying</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Since multiple keys can be encoded in both control and data messages,</td><td> </td><td class="right">   Since multiple keys can be encoded in both control and data messages,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   an ITR can encapsulate and encrypt with a specific key while it is</td><td> </td><td class="right">   an ITR can encapsulate and encrypt with a specific key while it is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   negotiating other keys with the same ETR.  Soon as an ETR or RTR</td><td> </td><td class="right">   negotiating other keys with the same ETR.  Soon as an ETR or RTR</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   returns a Map-Reply, it should be prepared to decapsulate and decrypt</td><td> </td><td class="right">   returns a Map-Reply, it should be prepared to decapsulate and decrypt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   using the new keys computed with the new Diffie-Hellman parameters</td><td> </td><td class="right">   using the new keys computed with the new Diffie-Hellman parameters</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   received in the Map-Request and returned in the Map-Reply.</td><td> </td><td class="right">   received in the Map-Request and returned in the Map-Reply.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l8"><small>skipping to change at</small><em> page 12, line 18</em></a></th><th> </th><th><a name="part-r8"><small>skipping to change at</small><em> page 12, line 23</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">9.  Future Work</td><td> </td><td class="right">9.  Future Work</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For performance considerations, newer Elliptic-Curve Diffie-Hellman</td><td> </td><td class="right">   For performance considerations, newer Elliptic-Curve Diffie-Hellman</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (ECDH) groups can be used as specified in [RFC4492] and [RFC6090] to</td><td> </td><td class="right">   (ECDH) groups can be used as specified in [RFC4492] and [RFC6090] to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reduce CPU cycles required to compute shared secret keys.</td><td> </td><td class="right">   reduce CPU cycles required to compute shared secret keys.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For better security considerations as well as to be able to build</td><td> </td><td class="right">   For better security considerations as well as to be able to build</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   faster software implementations, newer approaches to ciphers and</td><td> </td><td class="right">   faster software implementations, newer approaches to ciphers and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   authentication methods will be researched and tested.  Some examples</td><td> </td><td class="right">   authentication methods will be researched and tested.  Some examples</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0031"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   are <span class="delete">chacha20 and poly1305 [CHACHA-POLY</span>].</td><td> </td><td class="rblock">   are <span class="insert">Chacha20 and Poly1305 [CHACHA-POLY] [RFC7539</span>].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">10.  Security Considerations</td><td> </td><td class="right">10.  Security Considerations</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">10.1.  SAAG Support</td><td> </td><td class="right">10.1.  SAAG Support</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The LISP working group has and will continue to seek help from the</td><td> </td><td class="right">   The LISP working group has and will continue to seek help from the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   SAAG working group for security advice.  The SAAG has been involved</td><td> </td><td class="right">   SAAG working group for security advice.  The SAAG has been involved</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   early in the design process so they have early input and review.</td><td> </td><td class="right">   early in the design process so they have early input and review.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">10.2.  LISP-Crypto Security Threats</td><td> </td><td class="right">10.2.  LISP-Crypto Security Threats</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l9"><small>skipping to change at</small><em> page 14, line 15</em></a></th><th> </th><th><a name="part-r9"><small>skipping to change at</small><em> page 14, line 19</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC6090]  McGrew, D., Igoe, K., and M. Salter, "Fundamental Elliptic</td><td> </td><td class="right">   [RFC6090]  McGrew, D., Igoe, K., and M. Salter, "Fundamental Elliptic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Curve Cryptography Algorithms", RFC 6090,</td><td> </td><td class="right">              Curve Cryptography Algorithms", RFC 6090,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              DOI 10.17487/RFC6090, February 2011,</td><td> </td><td class="right">              DOI 10.17487/RFC6090, February 2011,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              &lt;http://www.rfc-editor.org/info/rfc6090&gt;.</td><td> </td><td class="right">              &lt;http://www.rfc-editor.org/info/rfc6090&gt;.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC6830]  Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The</td><td> </td><td class="right">   [RFC6830]  Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Locator/ID Separation Protocol (LISP)", RFC 6830,</td><td> </td><td class="right">              Locator/ID Separation Protocol (LISP)", RFC 6830,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              DOI 10.17487/RFC6830, January 2013,</td><td> </td><td class="right">              DOI 10.17487/RFC6830, January 2013,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              &lt;http://www.rfc-editor.org/info/rfc6830&gt;.</td><td> </td><td class="right">              &lt;http://www.rfc-editor.org/info/rfc6830&gt;.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0032"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">[RFC7539]  Nir, Y. and A. Langley, "ChaCha20 and Poly1305 for IETF</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">              Protocols", RFC 7539, DOI 10.17487/RFC7539, May 2015,</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">              &lt;http://www.rfc-editor.org/info/rfc7539&gt;.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">12.2.  Informative References</td><td> </td><td class="right">12.2.  Informative References</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [AES-CBC]  McGrew, D., Foley, J., and K. Paterson, "Authenticated</td><td> </td><td class="right">   [AES-CBC]  McGrew, D., Foley, J., and K. Paterson, "Authenticated</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Encryption with AES-CBC and HMAC-SHA", draft-mcgrew-aead-</td><td> </td><td class="right">              Encryption with AES-CBC and HMAC-SHA", draft-mcgrew-aead-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              aes-cbc-hmac-sha2-05.txt (work in progress).</td><td> </td><td class="right">              aes-cbc-hmac-sha2-05.txt (work in progress).</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [CHACHA-POLY]</td><td> </td><td class="right">   [CHACHA-POLY]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Langley, A., "ChaCha20 and Poly1305 based Cipher Suites</td><td> </td><td class="right">              Langley, A., "ChaCha20 and Poly1305 based Cipher Suites</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              for TLS", draft-agl-tls-chacha20poly1305-00 (work in</td><td> </td><td class="right">              for TLS", draft-agl-tls-chacha20poly1305-00 (work in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              progress).</td><td> </td><td class="right">              progress).</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l10"><small>skipping to change at</small><em> page 15, line 7</em></a></th><th> </th><th><a name="part-r10"><small>skipping to change at</small><em> page 15, line 17</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              "LISP-Secuirty (LISP-SEC)", draft-ietf-lisp-sec-06 (work</td><td> </td><td class="right">              "LISP-Secuirty (LISP-SEC)", draft-ietf-lisp-sec-06 (work</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              in progress).</td><td> </td><td class="right">              in progress).</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [NIST-SP800-108]</td><td> </td><td class="right">   [NIST-SP800-108]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              "National Institute of Standards and Technology,</td><td> </td><td class="right">              "National Institute of Standards and Technology,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              "Recommendation for Key Derivation Using Pseudorandom</td><td> </td><td class="right">              "Recommendation for Key Derivation Using Pseudorandom</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Functions NIST SP800-108"", NIST SP 800-108, October 2009.</td><td> </td><td class="right">              Functions NIST SP800-108"", NIST SP 800-108, October 2009.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Appendix A.  Acknowledgments</td><td> </td><td class="right">Appendix A.  Acknowledgments</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0033"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The <span class="delete">author</span> would like to thank Dan Harkins, Joel Halpern, Fabio</td><td> </td><td class="rblock">   The <span class="insert">authors</span> would like to thank Dan Harkins, Joel Halpern, Fabio</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Maino, Ed Lopez, Roger Jorgensen, <span class="delete">Watson Ladd,</span> and <span class="delete">Ilari Liusvaara</span></td><td> </td><td class="rblock">   Maino, Ed Lopez, Roger Jorgensen, and <span class="insert">Watson Ladd</span> for their interest,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   for their interest, suggestions, and discussions about LISP <span class="delete">data-</span></td><td> </td><td class="rblock">   suggestions, and discussions about LISP <span class="insert">data-plane</span> security.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   plane</span> security.</td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">The authors would like to give a special thank you to Ilari Liusvaara</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   for his extensive commentary and discussion.  He has contributed his</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   security expertise to make lisp-crypto as secure as the state of the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   art in cryptography.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   In addition, the support and suggestions from the SAAG working group</td><td> </td><td class="right">   In addition, the support and suggestions from the SAAG working group</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   were helpful and appreciative.</td><td> </td><td class="right">   were helpful and appreciative.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Appendix B.  Document Change Log</td><td> </td><td class="right">Appendix B.  Document Change Log</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0034"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">B.1.  Changes to <span class="delete">draft-ietf-lisp-crypto-01.txt</span></td><td> </td><td class="rblock">B.1.  Changes to <span class="insert">draft-ietf-lisp-crypto-03.txt</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Posted December 2015.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Changed cipher suite allocations.  We now have 2 AES-CBC cipher</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      suites for compatibility, 3 AES-GCM cipher suites that are faster</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      ciphers that include AE and a Chacha20-Poly1305 cipher suite which</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      is the fastest but not totally proven/accepted..</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Remove 1024-bit DH keys for key exchange.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Make clear that AES and chacha20 ciphers use AEAD so part of</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      encrytion/decryption does authentication.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Make it more clear that separate key pairs are used in each</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      direction between xTRs.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Indicate that the IV length is different per cipher suite.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Use a counter based IV for every packet for AEAD ciphers.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      Previously text said to use a random number.  But CBC ciphers, use</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      a random number.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Indicate that key material is sent in network byte order (big</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      endian).</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Remove A-bit from Security Type LCAF.  No need to do</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      authentication only with the introduction of AEAD ciphers.  These</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      ciphers can do authentication.  So you get ciphertext for free.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   o  Remove language that refers to "encryption-key" and "integrity-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      key".  Used term "AEAD-key" that is used by the AEAD cipher suites</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      that do encryption and authenticaiton internal to the cipher.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">B.2.  Changes to draft-ietf-lisp-crypto-02.txt</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Posted September 2015.</td><td> </td><td class="right">   o  Posted September 2015.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Add cipher suite for Elliptic Curve 25519 DH exchange.</td><td> </td><td class="right">   o  Add cipher suite for Elliptic Curve 25519 DH exchange.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0035"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   o  Add cipher suite for Chacha20/<span class="delete">p</span>oly1305 ciphers.</td><td> </td><td class="rblock">   o  Add cipher suite for Chacha20/<span class="insert">P</span>oly1305 ciphers.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0036"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">B.<span class="delete">2</span>.  Changes to draft-ietf-lisp-crypto-01.txt</td><td> </td><td class="rblock">B.<span class="insert">3</span>.  Changes to draft-ietf-lisp-crypto-01.txt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Posted May 2015.</td><td> </td><td class="right">   o  Posted May 2015.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Create cipher suites and encode them in the Security LCAF.</td><td> </td><td class="right">   o  Create cipher suites and encode them in the Security LCAF.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Add IV to beginning of packet header and ICV to end of packet.</td><td> </td><td class="right">   o  Add IV to beginning of packet header and ICV to end of packet.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  AEAD procedures are now part of encrpytion process.</td><td> </td><td class="right">   o  AEAD procedures are now part of encrpytion process.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0037"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">B.<span class="delete">3</span>.  Changes to draft-ietf-lisp-crypto-00.txt</td><td> </td><td class="rblock">B.<span class="insert">4</span>.  Changes to draft-ietf-lisp-crypto-00.txt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Posted January 2015.</td><td> </td><td class="right">   o  Posted January 2015.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Changing draft-farinacci-lisp-crypto-01 to draft-ietf-lisp-crypto-</td><td> </td><td class="right">   o  Changing draft-farinacci-lisp-crypto-01 to draft-ietf-lisp-crypto-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      00.  This draft has become a working group document</td><td> </td><td class="right">      00.  This draft has become a working group document</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Add text to indicate the working group may work on a new data</td><td> </td><td class="right">   o  Add text to indicate the working group may work on a new data</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      encapsulation header format for data-plane encryption.</td><td> </td><td class="right">      encapsulation header format for data-plane encryption.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0038"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">B.<span class="delete">4</span>.  Changes to draft-farinacci-lisp-crypto-01.txt</td><td> </td><td class="rblock">B.<span class="insert">5</span>.  Changes to draft-farinacci-lisp-crypto-01.txt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Posted July 2014.</td><td> </td><td class="right">   o  Posted July 2014.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Add Group-ID to the encoding format of Key Material in a Security</td><td> </td><td class="right">   o  Add Group-ID to the encoding format of Key Material in a Security</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Type LCAF and modify the IANA Considerations so this draft can use</td><td> </td><td class="right">      Type LCAF and modify the IANA Considerations so this draft can use</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      key exchange parameters from the IANA registry.</td><td> </td><td class="right">      key exchange parameters from the IANA registry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Indicate that the R-bit in the Security Type LCAF is not used by</td><td> </td><td class="right">   o  Indicate that the R-bit in the Security Type LCAF is not used by</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      lisp-crypto.</td><td> </td><td class="right">      lisp-crypto.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray"><td></td><th><a name="part-l11"><small>skipping to change at</small><em> page 16, line 23</em></a></th><th> </th><th><a name="part-r11"><small>skipping to change at</small><em> page 17, line 23</em></a></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      process.</td><td> </td><td class="right">      process.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Add text indicating that when RLOC-probing is used for RLOC</td><td> </td><td class="right">   o  Add text indicating that when RLOC-probing is used for RLOC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reachability purposes and rekeying is not desired, that the same</td><td> </td><td class="right">      reachability purposes and rekeying is not desired, that the same</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      key exchange parameters should be used so a reallocation of a</td><td> </td><td class="right">      key exchange parameters should be used so a reallocation of a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      pubic key does not happen at the ETR.</td><td> </td><td class="right">      pubic key does not happen at the ETR.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Add text to indicate that ECDH can be used to reduce CPU</td><td> </td><td class="right">   o  Add text to indicate that ECDH can be used to reduce CPU</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      requirements for computing shared secret-keys.</td><td> </td><td class="right">      requirements for computing shared secret-keys.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0039"></a></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">B.<span class="delete">5</span>.  Changes to draft-farinacci-lisp-crypto-00.txt</td><td> </td><td class="rblock">B.<span class="insert">6</span>.  Changes to draft-farinacci-lisp-crypto-00.txt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Initial draft posted February 2014.</td><td> </td><td class="right">   o  Initial draft posted February 2014.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Authors' Addresses</td><td> </td><td class="right">Authors' Addresses</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Dino Farinacci</td><td> </td><td class="right">   Dino Farinacci</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   lispers.net</td><td> </td><td class="right">   lispers.net</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   San Jose, California  95120</td><td> </td><td class="right">   San Jose, California  95120</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   USA</td><td> </td><td class="right">   USA</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>

     <tr><td></td><td class="left"></td><td> </td><td class="right"></td><td></td></tr>
     <tr bgcolor="gray"><th colspan="5" align="center"><a name="end">&nbsp;End of changes. 39 change blocks.&nbsp;</a></th></tr>
     <tr class="stats"><td></td><th><i>118 lines changed or deleted</i></th><th><i> </i></th><th><i>169 lines changed or added</i></th><td></td></tr>
     <tr><td colspan="5" align="center" class="small"><br>This html diff was produced by rfcdiff 1.42. The latest version is available from <a href="http://www.tools.ietf.org/tools/rfcdiff/">http://tools.ietf.org/tools/rfcdiff/</a> </td></tr>
   </tbody></table>
   
   
<!-- args: {'--oldcolour': 'red', '--width': '', 'difftype': '--html', 'url1': '', 'submit': 'Generate diff', 'url2': '', '--newcolour': 'green'} --></body></html>
--Apple-Mail=_93271C04-11AF-4AFB-BD49-27B450724A2A
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii




--Apple-Mail=_93271C04-11AF-4AFB-BD49-27B450724A2A--


From nobody Fri Dec  4 17:01:21 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35ADC1B34BB for <lisp@ietfa.amsl.com>; Fri,  4 Dec 2015 17:01:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n1LdBOPbJQ4C for <lisp@ietfa.amsl.com>; Fri,  4 Dec 2015 17:01:17 -0800 (PST)
Received: from mail-pa0-x229.google.com (mail-pa0-x229.google.com [IPv6:2607:f8b0:400e:c03::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1FD51B34BA for <lisp@ietf.org>; Fri,  4 Dec 2015 17:01:17 -0800 (PST)
Received: by pabfh17 with SMTP id fh17so97160025pab.0 for <lisp@ietf.org>; Fri, 04 Dec 2015 17:01:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=skiA66HCNkH9NJDg3htREyiuIGgT+fI/zEGopJsGs4I=; b=GhniAf5LL3gyiMB8RRGhQ79M5kjHX3d9QQ9wuCBaEI4p8NZft7S6p68aGCLWVel7I/ 01JpQhuXn5x8wNkEuaHnaz0CVx2WAs5QRh3SIU0p5rDSM6BlcrIIA0eK73rIcbgby481 zovu4aNurLBxxR99KhPrpE8bWp3/nDCgbPuhZz8xZ5QZmOI1K7kQVdu1r7C7CIhhVAaE KXNgmkObhNEo9f7te3ZHrj9yEv3MG4MxNE+eRQ2ZWQ6R5kzsbJYPF46mUEQcR0Jg+B8x i71czzzniOTOcExX9NEytxDwA4UlXUnhUiUx4zrWFSE/IM2kIhf3Us9sQ2/sI0916NvI rnxw==
X-Received: by 10.66.120.47 with SMTP id kz15mr25436868pab.84.1449277277383; Fri, 04 Dec 2015 17:01:17 -0800 (PST)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id h9sm19447945pfj.69.2015.12.04.17.01.15 for <lisp@ietf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 04 Dec 2015 17:01:16 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <C9072737-4C1A-4AA6-817E-21E6F4BDE18E@gmail.com>
Date: Fri, 4 Dec 2015 17:01:12 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <143E50D2-ACA1-442A-A997-638D56055E66@gmail.com>
References: <20151130124204.32281.43652.idtracker@ietfa.amsl.com> <C9072737-4C1A-4AA6-817E-21E6F4BDE18E@gmail.com>
To: LISP mailing list list <lisp@ietf.org>
X-Mailer: Apple Mail (2.3096.5)
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/EDSNOHv7V7vwqN9lTRD78BS3KkY>
Subject: Re: [lisp] Expiration impending: <draft-farinacci-lisp-signal-free-multicast-03.txt>
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Dec 2015 01:01:20 -0000

I have not received a response. Does silence mean consent? Chairs?

Dino

> On Nov 30, 2015, at 10:04 AM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>=20
> Folks, I presented this at many WG meetings and felt it is ready for =
working group document. I asked this in Yokohama and want to follow-up =
now on the list.
>=20
> Since the individual submission is about to expire, I am wonder if I =
can resubmit it as draft-ietf-lisp-signal-free-multicast-00?
>=20
> Chairs?
>=20
> Dino
>=20
>> Begin forwarded message:
>>=20
>> From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
>> Date: November 30, 2015 at 4:42:04 AM PST
>> To: <draft-farinacci-lisp-signal-free-multicast@ietf.org>
>> Subject: Expiration impending: =
<draft-farinacci-lisp-signal-free-multicast-03.txt>
>>=20
>> The following draft will expire soon:
>>=20
>> Name:     draft-farinacci-lisp-signal-free-multicast
>> Title:    Signal-Free LISP Multicast
>> State:    I-D Exists
>> Expires:  2015-12-10 (in 1 week, 2 days)
>>=20
>=20


From nobody Sat Dec  5 06:12:53 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AECA71AC39A for <lisp@ietfa.amsl.com>; Sat,  5 Dec 2015 06:12:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rzKqEiGsfyqA for <lisp@ietfa.amsl.com>; Sat,  5 Dec 2015 06:12:50 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65D0E1A701A for <lisp@ietf.org>; Sat,  5 Dec 2015 06:12:50 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id F3AAC240719; Sat,  5 Dec 2015 06:12:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1449324770; bh=VLEYeonnRL5gfa3jO87SuaSbuLDZW0ni/DJzL4WnF4g=; h=Subject:To:References:From:Date:In-Reply-To:From; b=PoUR4gaExHtORz+NpaKYmzS31hRGqQIsjVG0i9tvxVoItv34Ui1e7rOAUjgl7tZNo D0gkVAYnKLYGtizbGhSKHcoHjmWmzPVJTp2HHnvN6v+CkieNvC/BtOQF6THl0PQaE5 xG8HRoqbCj186Qshf1xAJXaM+san1U3Pbwy3WD88=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [94.200.20.251]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id E6EC4240474; Sat,  5 Dec 2015 06:12:48 -0800 (PST)
To: Dino Farinacci <farinacci@gmail.com>, LISP mailing list list <lisp@ietf.org>
References: <20151130124204.32281.43652.idtracker@ietfa.amsl.com> <C9072737-4C1A-4AA6-817E-21E6F4BDE18E@gmail.com> <143E50D2-ACA1-442A-A997-638D56055E66@gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5662F0DD.208@joelhalpern.com>
Date: Sat, 5 Dec 2015 09:12:45 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
In-Reply-To: <143E50D2-ACA1-442A-A997-638D56055E66@gmail.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/Yw_CCd_BHeajWv7SH06Sg3sU050>
Subject: Re: [lisp] Expiration impending: <draft-farinacci-lisp-signal-free-multicast-03.txt>
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Dec 2015 14:12:51 -0000

Unfortunately, silence does not mean consent.
So let me send a separate more formal call for adoption.

On 12/4/15 8:01 PM, Dino Farinacci wrote:
> I have not received a response. Does silence mean consent? Chairs?
>
> Dino
>
>> On Nov 30, 2015, at 10:04 AM, Dino Farinacci <farinacci@gmail.com> wrote:
>>
>> Folks, I presented this at many WG meetings and felt it is ready for working group document. I asked this in Yokohama and want to follow-up now on the list.
>>
>> Since the individual submission is about to expire, I am wonder if I can resubmit it as draft-ietf-lisp-signal-free-multicast-00?
>>
>> Chairs?
>>
>> Dino
>>
>>> Begin forwarded message:
>>>
>>> From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
>>> Date: November 30, 2015 at 4:42:04 AM PST
>>> To: <draft-farinacci-lisp-signal-free-multicast@ietf.org>
>>> Subject: Expiration impending: <draft-farinacci-lisp-signal-free-multicast-03.txt>
>>>
>>> The following draft will expire soon:
>>>
>>> Name:     draft-farinacci-lisp-signal-free-multicast
>>> Title:    Signal-Free LISP Multicast
>>> State:    I-D Exists
>>> Expires:  2015-12-10 (in 1 week, 2 days)
>>>
>>
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>


From nobody Sat Dec  5 06:14:24 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD6F61B2A57 for <lisp@ietfa.amsl.com>; Sat,  5 Dec 2015 06:14:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5-Emvu4Uo06o for <lisp@ietfa.amsl.com>; Sat,  5 Dec 2015 06:14:21 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BCCC1ACDC6 for <lisp@ietf.org>; Sat,  5 Dec 2015 06:14:21 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 1C6DD240719 for <lisp@ietf.org>; Sat,  5 Dec 2015 06:14:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1449324861; bh=0CZ91Wbotl7FPRhJd4tiCmlII+pplXa8t7HUk86xG2w=; h=To:From:Subject:Date:From; b=QHKJSA7rI+OaCyfei1PAJMOmc5spUAyE8xGuprg3ZPK6vXKGEC2ycq+FiZdZ2Uc9v Mu85WKZ9KmdAICHyQq6eAfvHzjhnV5JWLGY8kkxn/ykEIy6v9vRKDv178/vnUS6OcD OHrA621o5j8KMNO5xJsEdsmlu61omYDoqJSTIFuw=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [94.200.20.251]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 6C9C624017E for <lisp@ietf.org>; Sat,  5 Dec 2015 06:14:20 -0800 (PST)
To: "lisp@ietf.org" <lisp@ietf.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5662F139.6080601@joelhalpern.com>
Date: Sat, 5 Dec 2015 09:14:17 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/CjZyNvrb7ir3wquBSNKIbxQ4j0Q>
Subject: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Dec 2015 14:14:22 -0000

This is a call for adoption  of draft-farinacci-lisp-signal-free-multicast.
Please speak up if you support or oppose adoption of this document.  It 
has been presented multiple times to the working group, generally to 
positive reception as far as I can tell.

This call will last two weeks, until CoB 21-December-2015.

Yours,
Joel


From nobody Sun Dec  6 11:01:18 2015
Return-Path: <renwei.li@huawei.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0606E1B2AA4 for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 11:01:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iUL7jFbiAGn1 for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 11:01:15 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B97541B2AA2 for <lisp@ietf.org>; Sun,  6 Dec 2015 11:01:14 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CBG24680; Sun, 06 Dec 2015 19:01:12 +0000 (GMT)
Received: from SJCEML703-CHM.china.huawei.com (10.218.25.36) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Sun, 6 Dec 2015 19:01:11 +0000
Received: from SJCEML701-CHM.china.huawei.com ([169.254.3.81]) by SJCEML703-CHM.china.huawei.com ([169.254.5.130]) with mapi id 14.03.0235.001;  Sun, 6 Dec 2015 11:01:07 -0800
From: Richard Li <renwei.li@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
Thread-Index: AQHRL2dLQqWnV+OrMU+iNFtbjvvDoJ6+Uh12
Date: Sun, 6 Dec 2015 19:01:06 +0000
Message-ID: <A3E91F89-6BF6-4E83-9102-DB8D8E7CF304@huawei.com>
References: <5662F139.6080601@joelhalpern.com>
In-Reply-To: <5662F139.6080601@joelhalpern.com>
Accept-Language: en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.566485F8.0113, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.3.81, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 41767f29ff7d30e6837d2131ec7b89bf
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/C2DpEZ2xNCnLHxpQkO9XbWWHivU>
Cc: "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Dec 2015 19:01:17 -0000

Support.

Renwei

> =1B$B:_=1B(B Dec 5, 2015=1B$B!$=1B(B6:14 AM=1B$B!$=1B(B"Joel M. Halpern" =
<jmh@joelhalpern.com> =1B$B<LF;!'=1B(B
>=20
> This is a call for adoption  of draft-farinacci-lisp-signal-free-multicas=
t.
> Please speak up if you support or oppose adoption of this document.  It h=
as been presented multiple times to the working group, generally to positiv=
e reception as far as I can tell.
>=20
> This call will last two weeks, until CoB 21-December-2015.
>=20
> Yours,
> Joel
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Sun Dec  6 11:42:25 2015
Return-Path: <sbarkai@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40CFB1A88E6 for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 11:42:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TLJzkAdOLzE2 for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 11:42:21 -0800 (PST)
Received: from mail-pa0-x22a.google.com (mail-pa0-x22a.google.com [IPv6:2607:f8b0:400e:c03::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A671F1A88DE for <lisp@ietf.org>; Sun,  6 Dec 2015 11:42:21 -0800 (PST)
Received: by pabfh17 with SMTP id fh17so116172594pab.0 for <lisp@ietf.org>; Sun, 06 Dec 2015 11:42:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=75J8OvuVgBVMiQckbbI6aeFyQSUcfUH2MG9p+qbuInk=; b=V+nOlZTV3qni/h3H9jFfNoiu+R2zakPiZRAgl/5Woounh/Te3VxVV9DF+KKL3zJEhj UD91y5j5i1alXkx/v4HPDpVgtFT/iHUNxnvC1aNR28WrIhDSh3BKnEaogpEnauBQ0Thj zafq2UVRux0CZZ7Vl1gJR7Fb8K7eJZEXh63eN+JGpzVV2cmskNzKlEtFdbgoE0Z32N73 gl6p0vfb6mFtVq6ekMi1b3dTP2ENOISznyNE5HWzGAiuw/XrQKVBeaonk/RVajgfGVuo riJ979GvRauHW8W8P/ygL/aoPrKxwPSJDbvcBE2kSvMbs1/Tt/r977PZ1jgpwE6rheRb huhg==
X-Received: by 10.66.251.193 with SMTP id zm1mr37265281pac.154.1449430941296;  Sun, 06 Dec 2015 11:42:21 -0800 (PST)
Received: from [100.86.54.79] (85.sub-70-197-9.myvzw.com. [70.197.9.85]) by smtp.gmail.com with ESMTPSA id o2sm29793346pap.31.2015.12.06.11.42.19 (version=TLSv1/SSLv3 cipher=OTHER); Sun, 06 Dec 2015 11:42:19 -0800 (PST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Sharon <sbarkai@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <A3E91F89-6BF6-4E83-9102-DB8D8E7CF304@huawei.com>
Date: Sun, 6 Dec 2015 11:42:18 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <6E5EDE66-9C85-4285-BC76-5812B05A72AA@gmail.com>
References: <5662F139.6080601@joelhalpern.com> <A3E91F89-6BF6-4E83-9102-DB8D8E7CF304@huawei.com>
To: Richard Li <renwei.li@huawei.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/cm7YfBsZzbn-peyLD4_Sxh6b5_c>
Cc: "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Dec 2015 19:42:23 -0000

Support=20
What about adding global load balancing to this using similar signal free me=
thods

--szb

> On Dec 6, 2015, at 11:01 AM, Richard Li <renwei.li@huawei.com> wrote:
>=20
> Support.
>=20
> Renwei
>=20
>> =E5=9C=A8 Dec 5, 2015=EF=BC=8C6:14 AM=EF=BC=8C"Joel M. Halpern" <jmh@joel=
halpern.com> =E5=86=99=E9=81=93=EF=BC=9A
>>=20
>> This is a call for adoption  of draft-farinacci-lisp-signal-free-multicas=
t.
>> Please speak up if you support or oppose adoption of this document.  It h=
as been presented multiple times to the working group, generally to positive=
 reception as far as I can tell.
>>=20
>> This call will last two weeks, until CoB 21-December-2015.
>>=20
>> Yours,
>> Joel
>>=20
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Sun Dec  6 11:45:48 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1B371A8908 for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 11:45:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZHZhXjf1HP_w for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 11:45:45 -0800 (PST)
Received: from mail-pa0-x232.google.com (mail-pa0-x232.google.com [IPv6:2607:f8b0:400e:c03::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 831D11A88E8 for <lisp@ietf.org>; Sun,  6 Dec 2015 11:45:45 -0800 (PST)
Received: by pacej9 with SMTP id ej9so113256172pac.2 for <lisp@ietf.org>; Sun, 06 Dec 2015 11:45:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=nj+2qZ70NkXObdGM0/EB0aqae7lkIPmRRqP4AQrPK3s=; b=1E0Sl39Tm6IoDg5vpTfAL3fZd9bjyOGWhPWqsqSIXNL5FW+nuAMwEmxKX2X5cahnKV gKgyll/D/4cCwT7qeFubLn7pJPLqI7yn14eCu/mGeixIvP36EHXU3htH4BdHekUX/7Ld 0KIA8HboX4Jb8Mlfuj0vgRR9Xbfz/+1WcOu7Za8cHs8qOkCLJYx+/GVwTQooepo1iZ// ZyFPUFNo1Xnf9xELeOcxDPrYbUo5TqgAvCfJlA4U2t59nhLevdcjrtfOTw6r1C1+2P0A topejpuE0LzhUYZxhdr2Sz8CWVVRhslIHQIqEdQFZ3LBPwwlrbWOMT72vYBCYcYhBtr+ bvbg==
X-Received: by 10.66.240.4 with SMTP id vw4mr37939053pac.9.1449431145236; Sun, 06 Dec 2015 11:45:45 -0800 (PST)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id sg4sm29777637pac.48.2015.12.06.11.45.43 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 06 Dec 2015 11:45:44 -0800 (PST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <6E5EDE66-9C85-4285-BC76-5812B05A72AA@gmail.com>
Date: Sun, 6 Dec 2015 11:45:50 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <752526D8-F8DF-4ECE-AF58-5B4F17B97842@gmail.com>
References: <5662F139.6080601@joelhalpern.com> <A3E91F89-6BF6-4E83-9102-DB8D8E7CF304@huawei.com> <6E5EDE66-9C85-4285-BC76-5812B05A72AA@gmail.com>
To: Sharon Barkai <sbarkai@gmail.com>
X-Mailer: Apple Mail (2.3096.5)
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/TxazlqsrXy-cpgRnc3tSrH60Eac>
Cc: "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Dec 2015 19:45:47 -0000

> Support=20
> What about adding global load balancing to this using similar signal =
free methods

That kinda works by default. By putting multiple RLOC-records in a =
Map-Reply where each is encoded as an RLE.=20

But with flexible LCAF encoding, you could have a single RLOC-record =
made up of an RLE encoding like this:

A
B, B=E2=80=99
C
M

Where the ITR replicates to A, B, C, and the group address M. But for =
the second replication list entry (B, B=E2=80=99), it could be encoded =
as an AFI-list to avoid the multi-record case:

Record-1:
A
B
C
M

Record-2:
A
B=E2=80=99
C
M

Dino

>=20
> --szb
>=20
>> On Dec 6, 2015, at 11:01 AM, Richard Li <renwei.li@huawei.com> wrote:
>>=20
>> Support.
>>=20
>> Renwei
>>=20
>>> =E5=9C=A8 Dec 5, 2015=EF=BC=8C6:14 AM=EF=BC=8C"Joel M. Halpern" =
<jmh@joelhalpern.com> =E5=86=99=E9=81=93=EF=BC=9A
>>>=20
>>> This is a call for adoption  of =
draft-farinacci-lisp-signal-free-multicast.
>>> Please speak up if you support or oppose adoption of this document.  =
It has been presented multiple times to the working group, generally to =
positive reception as far as I can tell.
>>>=20
>>> This call will last two weeks, until CoB 21-December-2015.
>>>=20
>>> Yours,
>>> Joel
>>>=20
>>> _______________________________________________
>>> lisp mailing list
>>> lisp@ietf.org
>>> https://www.ietf.org/mailman/listinfo/lisp
>>=20
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Sun Dec  6 16:25:28 2015
Return-Path: <fcoras.lists@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A107C1A8AC7 for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 16:25:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GqnvhZjX2JXs for <lisp@ietfa.amsl.com>; Sun,  6 Dec 2015 16:25:25 -0800 (PST)
Received: from mail-pa0-x233.google.com (mail-pa0-x233.google.com [IPv6:2607:f8b0:400e:c03::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A3631A8AC4 for <lisp@ietf.org>; Sun,  6 Dec 2015 16:25:25 -0800 (PST)
Received: by pacej9 with SMTP id ej9so115447399pac.2 for <lisp@ietf.org>; Sun, 06 Dec 2015 16:25:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=mpDIw+l0ede3y6Ee6tjtMjBY7tGiMVwqsAGdkf7BT9c=; b=aCSEOHXiu/zoxbaB8xg7ZfPCxwkmMlXRvhQSOqNvk47er99j8R7tkOZnZwzasvjjan 2cxjEpF8VrjJ7RBpbZfpCa14GCT5GqL1eaBxT2vfkSTQ6IsqWn1pjUiFysYvZKjhN+cm +mIWOd8HxFTFmiwHLDeuad7bplLQROpt9RF9zf1Sbog8qgv4zavH6XtEDt5RyVuQvptF Q044mSyDuiZZFB/lI+lNV6dZZtSM7IUHEFnsEffzAVt/oE5frG6Ke+Qs/3LgFqw+K5vY Eu05OZ35f1p3tWf0WCCa0kFn39W0BHcSEwP551tk6ip2o0kyUFQfChY32cgDwMF7kyiy Tknw==
X-Received: by 10.66.140.4 with SMTP id rc4mr11286953pab.96.1449447924918; Sun, 06 Dec 2015 16:25:24 -0800 (PST)
Received: from ?IPv6:2001:420:c0c8:1003::1f5? ([2001:420:c0c8:1003::1f5]) by smtp.gmail.com with ESMTPSA id m20sm30287044pfi.80.2015.12.06.16.25.23 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 06 Dec 2015 16:25:24 -0800 (PST)
Mime-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
Content-Type: text/plain; charset=us-ascii
From: Florin Coras <fcoras.lists@gmail.com>
In-Reply-To: <5662F139.6080601@joelhalpern.com>
Date: Mon, 7 Dec 2015 01:25:20 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <4D0D5D20-9DD3-4800-A326-8858685F5ADB@gmail.com>
References: <5662F139.6080601@joelhalpern.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
X-Mailer: Apple Mail (2.3096.5)
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/C9vf0lk9gynX3gXCFvnNlrWRHGw>
Cc: "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Dec 2015 00:25:26 -0000

Support.=20

Florin

> On Dec 5, 2015, at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>=20
> This is a call for adoption  of =
draft-farinacci-lisp-signal-free-multicast.
> Please speak up if you support or oppose adoption of this document.  =
It has been presented multiple times to the working group, generally to =
positive reception as far as I can tell.
>=20
> This call will last two weeks, until CoB 21-December-2015.
>=20
> Yours,
> Joel
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Mon Dec  7 10:13:36 2015
Return-Path: <rogerj@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 405FF1B38E5 for <lisp@ietfa.amsl.com>; Mon,  7 Dec 2015 10:13:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level: 
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FDCNH8-ykwpz for <lisp@ietfa.amsl.com>; Mon,  7 Dec 2015 10:13:33 -0800 (PST)
Received: from mail-lb0-x233.google.com (mail-lb0-x233.google.com [IPv6:2a00:1450:4010:c04::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92BD41B38E4 for <lisp@ietf.org>; Mon,  7 Dec 2015 10:13:32 -0800 (PST)
Received: by lbpu9 with SMTP id u9so32244803lbp.2 for <lisp@ietf.org>; Mon, 07 Dec 2015 10:13:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=HyL5vnF8d6004xkZxvGlqt9DlTArNEuAcZtEVLkjP28=; b=OUIrR5IW659qxPfsogIQhlsYJzNrwIvxPhSFCVRfW0FGCO5q/Tz6uEALzouKmvMIve 7HG31yRsoqrMjLCneN7MM1kqC7+gQ2ezdIlJiy9ShMSD7llWf70V2hzv71Sxwoij7Rax i+blAtlUDMm6NrBbJF3j12wBrCft+FFCQNG+MYTZ8FM93EtrbBk6avDkpD7NadLfqmo+ 4AO1ODyuzsAEqowJmh+3ZZPisFTnhwK9c6OlAMkpP8d8nKdD9B0c6iRVbAnAsLdliO2s 1xYtlFSn7JNDnm5ZzIdRvd7v2bSozEPOZRUM/ds3qwYvr5IIgIJUWLM9SYwM291xBu2F 2mLA==
MIME-Version: 1.0
X-Received: by 10.112.198.131 with SMTP id jc3mr11972018lbc.129.1449512010739;  Mon, 07 Dec 2015 10:13:30 -0800 (PST)
Received: by 10.25.91.208 with HTTP; Mon, 7 Dec 2015 10:13:30 -0800 (PST)
Date: Mon, 7 Dec 2015 19:13:30 +0100
Message-ID: <CAKFn1SF64vzPHd7XyBaPLaZyNQ4Fey7oYLKfqvgVHbb+QDSPYQ@mail.gmail.com>
From: =?UTF-8?Q?Roger_J=C3=B8rgensen?= <rogerj@gmail.com>
To: "lisp@ietf.org" <lisp@ietf.org>
Content-Type: text/plain; charset=UTF-8
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/qmFbD8G9johvw8gF8iO1KyEFdmY>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Dec 2015 18:13:34 -0000

On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
> This is a call for adoption  of draft-farinacci-lisp-signal-free-multicast.
> Please speak up if you support or oppose adoption of this document.  It has
> been presented multiple times to the working group, generally to positive
> reception as far as I can tell.

support



-- 

Roger Jorgensen           | ROJO9-RIPE
rogerj@gmail.com          | - IPv6 is The Key!
http://www.jorgensen.no   | roger@jorgensen.no


From nobody Mon Dec  7 11:03:53 2015
Return-Path: <wassim.haddad@ericsson.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60AF21B39C9 for <lisp@ietfa.amsl.com>; Mon,  7 Dec 2015 11:03:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k9TZf-mgqbsJ for <lisp@ietfa.amsl.com>; Mon,  7 Dec 2015 11:03:50 -0800 (PST)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F4291B39C0 for <lisp@ietf.org>; Mon,  7 Dec 2015 11:03:50 -0800 (PST)
X-AuditID: c6180641-f799c6d000007d66-6e-5665d811c122
Received: from EUSAAHC005.ericsson.se (Unknown_Domain [147.117.188.87]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 4C.65.32102.118D5665; Mon,  7 Dec 2015 20:03:45 +0100 (CET)
Received: from [10.155.105.13] (147.117.188.8) by smtp-am.internal.ericsson.com (147.117.188.89) with Microsoft SMTP Server id 14.3.248.2; Mon, 7 Dec 2015 14:03:48 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_580AD61B-B2B6-4620-8CCC-84789B24EBDA"
MIME-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
From: Wassim Haddad <wassim.haddad@ericsson.com>
In-Reply-To: <CAKFn1SF64vzPHd7XyBaPLaZyNQ4Fey7oYLKfqvgVHbb+QDSPYQ@mail.gmail.com>
Date: Mon, 7 Dec 2015 11:03:57 -0800
Message-ID: <AA91400B-8632-49B0-A79E-5E4FD2BDE253@ericsson.com>
References: <CAKFn1SF64vzPHd7XyBaPLaZyNQ4Fey7oYLKfqvgVHbb+QDSPYQ@mail.gmail.com>
To: "lisp@ietf.org" <lisp@ietf.org>
X-Mailer: Apple Mail (2.3096.5)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrPLMWRmVeSWpSXmKPExsUyuXRPuK7gjdQwg20nZS2mnFV3YPRYsuQn UwBjFJdNSmpOZllqkb5dAlfG98dz2Ao+yFRMvTKBrYFxjWQXIyeHhICJxN7r1xkhbDGJC/fW s3UxcnEICRxhlOg4eZcdwlnLKLFk8R92kCpmgSSJR1c/MIHYvAIGEmemnmEGsYUFPCS69q5m BbHZgOJfl58FszkFAiVeXfvKBmKzCKhI/Nn2gwVijp7Eo9u9QL0cQHPsJdobk0DCQgIBEq1P l4IdJCKgLHG+r4UZ4jh5iZ8rG5ggatQlptyawDKBUWAWkotmIbkIIq4tsWzhayCbA8jWlFi/ Sx9VGMTWkGidM5d9ASPbKkaO0uKCnNx0I8NNjMBgPSbB5riDcW+v5yFGAQ5GJR5eg+upYUKs iWXFlbmHGCU4mJVEeGUzgUK8KYmVValF+fFFpTmpxYcYpTlYlMR5GRkYGIQE0hNLUrNTUwtS i2CyTBycUg2MTGsc/i25lhtx2sJx05mpykpTPgd+SEriuT+HjaNk86TPfqUybx1Zj3UvvaHY UHY/b1dwwkXPRKX3STtPxFvfNtj43i5K8fVhk10b6nfc4E6r4fC7orVrf9Xp+LOhhW9EV600 qbtVNXv+geovU7iXfjvZyHE1aXEGj9f6K0vrNbaZiPlkrzxaq8RSnJFoqMVcVJwIAM1eM3JS AgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/RnK1FLBJ29PnW8Q3oOBiuzCnhHA>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Dec 2015 19:03:52 -0000

--Apple-Mail=_580AD61B-B2B6-4620-8CCC-84789B24EBDA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

+1





> On Dec 7, 2015, at 10:13, Roger J=C3=B8rgensen <rogerj@gmail.com> =
wrote:
>=20
> On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>> This is a call for adoption  of =
draft-farinacci-lisp-signal-free-multicast.
>> Please speak up if you support or oppose adoption of this document.  =
It has
>> been presented multiple times to the working group, generally to =
positive
>> reception as far as I can tell.
>=20
> support
>=20
>=20
>=20
> --=20
>=20
> Roger Jorgensen           | ROJO9-RIPE
> rogerj@gmail.com          | - IPv6 is The Key!
> http://www.jorgensen.no   | roger@jorgensen.no
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


--Apple-Mail=_580AD61B-B2B6-4620-8CCC-84789B24EBDA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">+1<div class=3D""><br class=3D""></div><div class=3D""><div =
apple-content-edited=3D"true" class=3D""><div style=3D"color: rgb(0, 0, =
0); letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><div class=3D""><br =
class=3D""></div></div><br class=3D"Apple-interchange-newline"><br =
class=3D"Apple-interchange-newline">

</div>
<br class=3D""><div style=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Dec 7, 2015, at 10:13, Roger J=C3=B8rgensen &lt;<a =
href=3D"mailto:rogerj@gmail.com" class=3D"">rogerj@gmail.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"">On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern &lt;<a =
href=3D"mailto:jmh@joelhalpern.com" class=3D"">jmh@joelhalpern.com</a>&gt;=
 wrote:<br class=3D""><blockquote type=3D"cite" class=3D"">This is a =
call for adoption &nbsp;of =
draft-farinacci-lisp-signal-free-multicast.<br class=3D"">Please speak =
up if you support or oppose adoption of this document. &nbsp;It has<br =
class=3D"">been presented multiple times to the working group, generally =
to positive<br class=3D"">reception as far as I can tell.<br =
class=3D""></blockquote><br class=3D"">support<br class=3D""><br =
class=3D""><br class=3D""><br class=3D"">-- <br class=3D""><br =
class=3D"">Roger Jorgensen =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
ROJO9-RIPE<br class=3D""><a href=3D"mailto:rogerj@gmail.com" =
class=3D"">rogerj@gmail.com</a> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| - IPv6 is The =
Key!<br class=3D""><a href=3D"http://www.jorgensen.no" =
class=3D"">http://www.jorgensen.no</a> &nbsp;&nbsp;| <a =
href=3D"mailto:roger@jorgensen.no" class=3D"">roger@jorgensen.no</a><br =
class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">lisp mailing list<br class=3D""><a =
href=3D"mailto:lisp@ietf.org" class=3D"">lisp@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/lisp<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_580AD61B-B2B6-4620-8CCC-84789B24EBDA--


From nobody Tue Dec  8 00:02:16 2015
Return-Path: <damien.saucez@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0E751A007C for <lisp@ietfa.amsl.com>; Tue,  8 Dec 2015 00:02:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.65
X-Spam-Level: 
X-Spam-Status: No, score=-0.65 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HELO_EQ_FR=0.35, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v1TQ9_zOBYGU for <lisp@ietfa.amsl.com>; Tue,  8 Dec 2015 00:02:13 -0800 (PST)
Received: from mail-wm0-x22c.google.com (mail-wm0-x22c.google.com [IPv6:2a00:1450:400c:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E03491A006D for <lisp@ietf.org>; Tue,  8 Dec 2015 00:02:12 -0800 (PST)
Received: by wmww144 with SMTP id w144so170733578wmw.1 for <lisp@ietf.org>; Tue, 08 Dec 2015 00:02:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=HPPgyMMA0TjrLliDY7mIkItwmSNKJw9NNkL22rdSk68=; b=zKaL86rmzXq9sry6Dw+pzhYIvlFnNzB0WmBV6dlCSd+DatMsvn3VYiIZVrMmS7zqq7 z7zEi6zqJp0RRzJeDjJzEDGOpzxiCa70U5V+s/vx3uF4R/AmgpN4n9XdFldRQ6Mxh+6/ SUIOBUfdetkarZhAv75XIBFrFTS/kpirBBxN79lK3DHti5Y71TEp5b2zuQLiKHCnEO4q QpaGxq6wI44kuOHNLe8anAjSBO+QyK/vs5JOAieqa+8osEbQamunoKDkh/Tp2txx0+AS Ev8rBc6GCv472bD+smtV7IOnoDrMq8p23HOMCjMljD8JewheCxQ910UwjbbLpLEmMgnE 2zBg==
X-Received: by 10.28.188.84 with SMTP id m81mr24509573wmf.38.1449561730570; Tue, 08 Dec 2015 00:02:10 -0800 (PST)
Received: from eduroam-173a.sophia.inria.fr (eduroam-173a.sophia.inria.fr. [193.51.208.173]) by smtp.gmail.com with ESMTPSA id gj2sm1741511wjb.40.2015.12.08.00.02.08 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 08 Dec 2015 00:02:09 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Damien Saucez <damien.saucez@gmail.com>
In-Reply-To: <AA91400B-8632-49B0-A79E-5E4FD2BDE253@ericsson.com>
Date: Tue, 8 Dec 2015 09:02:08 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <DC7A098B-674E-4AA0-92CC-C5CB0F7F3B7A@gmail.com>
References: <CAKFn1SF64vzPHd7XyBaPLaZyNQ4Fey7oYLKfqvgVHbb+QDSPYQ@mail.gmail.com> <AA91400B-8632-49B0-A79E-5E4FD2BDE253@ericsson.com>
To: Wassim Haddad <wassim.haddad@ericsson.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/_UtaS2DqbRycnGeG8Tqiht7tkOE>
Cc: LISP mailing list list <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2015 08:02:14 -0000

+1

Damien Saucez=20
On 07 Dec 2015, at 20:03, Wassim Haddad <wassim.haddad@ericsson.com> =
wrote:

> +1
>=20
>=20
>=20
>=20
>=20
>> On Dec 7, 2015, at 10:13, Roger J=F8rgensen <rogerj@gmail.com> wrote:
>>=20
>> On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>>> This is a call for adoption  of =
draft-farinacci-lisp-signal-free-multicast.
>>> Please speak up if you support or oppose adoption of this document.  =
It has
>>> been presented multiple times to the working group, generally to =
positive
>>> reception as far as I can tell.
>>=20
>> support
>>=20
>>=20
>>=20
>> --=20
>>=20
>> Roger Jorgensen           | ROJO9-RIPE
>> rogerj@gmail.com          | - IPv6 is The Key!
>> http://www.jorgensen.no   | roger@jorgensen.no
>>=20
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Tue Dec  8 08:24:56 2015
Return-Path: <kiranmak@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DCF01B2FB9 for <lisp@ietfa.amsl.com>; Tue,  8 Dec 2015 08:24:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.51
X-Spam-Level: *
X-Spam-Status: No, score=1.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=1.488, MISSING_HEADERS=1.021, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I8NXo5K8xpje for <lisp@ietfa.amsl.com>; Tue,  8 Dec 2015 08:24:53 -0800 (PST)
Received: from mail-qg0-x22d.google.com (mail-qg0-x22d.google.com [IPv6:2607:f8b0:400d:c04::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F7FC1B2E28 for <lisp@ietf.org>; Tue,  8 Dec 2015 08:24:53 -0800 (PST)
Received: by qgeb1 with SMTP id b1so23630819qge.1 for <lisp@ietf.org>; Tue, 08 Dec 2015 08:24:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:references:in-reply-to:from:date:message-id:subject:cc :content-type; bh=JXl/cvjn1Ar3JDo1hqu10dWKmjhj2pQyW2kG5P70SBc=; b=p1UBDLWUC0+KULMkXMhNG4treQwRehajGIfcm5Rup4EHtVPf7DB80yegn/G6V3yBX6 KuU0gaSpw9q/ehdYcAXeutKJJQSSszqj/FPFhQR2MG+TtybBGL3jPZPhscvlH6ejWBYt fSDMGqSSD3J/r2fEj6TDQ7UoFBc2iiIG59OHnf33+qotcL69mOdS4MsZF+i1lFFZHPcl 0OYwSw5IOaGOjPr1TrYo1eLqs68lN1+et05zqbzR2QPQ1zhDPHeZsAahADdW4fH1YEIX JTDQ+1rh6KalqbfIL8XeMXSKtJa7ZtH/dMuVavFgCDn0R5zVUft0+VqCIPQMCrtwVs2e kGxQ==
X-Received: by 10.140.97.229 with SMTP id m92mr626153qge.22.1449591892377; Tue, 08 Dec 2015 08:24:52 -0800 (PST)
MIME-Version: 1.0
References: <CAKFn1SF64vzPHd7XyBaPLaZyNQ4Fey7oYLKfqvgVHbb+QDSPYQ@mail.gmail.com> <AA91400B-8632-49B0-A79E-5E4FD2BDE253@ericsson.com> <DC7A098B-674E-4AA0-92CC-C5CB0F7F3B7A@gmail.com>
In-Reply-To: <DC7A098B-674E-4AA0-92CC-C5CB0F7F3B7A@gmail.com>
From: Kiran Makhijani <kiranmak@gmail.com>
Date: Tue, 08 Dec 2015 16:24:43 +0000
Message-ID: <CAEZ-O0n5-CzBxzV_4-O2Q7A+yE9jfRhCYy8dFHg0OgRwYiBNHQ@mail.gmail.com>
Cc: LISP mailing list list <lisp@ietf.org>
Content-Type: multipart/alternative; boundary=001a113a61ced08a310526656979
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/EXzwARCmo2vH2clYsI80XjcS7eg>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2015 16:24:54 -0000

--001a113a61ced08a310526656979
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Support.
Kiran

On Tue, Dec 8, 2015 at 12:02 AM Damien Saucez <damien.saucez@gmail.com>
wrote:

> +1
>
> Damien Saucez
> On 07 Dec 2015, at 20:03, Wassim Haddad <wassim.haddad@ericsson.com>
> wrote:
>
> > +1
> >
> >
> >
> >
> >
> >> On Dec 7, 2015, at 10:13, Roger J=C3=B8rgensen <rogerj@gmail.com> wrot=
e:
> >>
> >> On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com>
> wrote:
> >>> This is a call for adoption  of
> draft-farinacci-lisp-signal-free-multicast.
> >>> Please speak up if you support or oppose adoption of this document.
> It has
> >>> been presented multiple times to the working group, generally to
> positive
> >>> reception as far as I can tell.
> >>
> >> support
> >>
> >>
> >>
> >> --
> >>
> >> Roger Jorgensen           | ROJO9-RIPE
> >> rogerj@gmail.com          | - IPv6 is The Key!
> >> http://www.jorgensen.no   | roger@jorgensen.no
> >>
> >> _______________________________________________
> >> lisp mailing list
> >> lisp@ietf.org
> >> https://www.ietf.org/mailman/listinfo/lisp
> >
> > _______________________________________________
> > lisp mailing list
> > lisp@ietf.org
> > https://www.ietf.org/mailman/listinfo/lisp
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>
--=20
Kiran

--001a113a61ced08a310526656979
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Support.<div>Kiran<br><br><div class=3D"gmail_quote"><div =
dir=3D"ltr">On Tue, Dec 8, 2015 at 12:02 AM Damien Saucez &lt;<a href=3D"ma=
ilto:damien.saucez@gmail.com">damien.saucez@gmail.com</a>&gt; wrote:<br></d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex">+1<br>
<br>
Damien Saucez<br>
On 07 Dec 2015, at 20:03, Wassim Haddad &lt;<a href=3D"mailto:wassim.haddad=
@ericsson.com" target=3D"_blank">wassim.haddad@ericsson.com</a>&gt; wrote:<=
br>
<br>
&gt; +1<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;&gt; On Dec 7, 2015, at 10:13, Roger J=C3=B8rgensen &lt;<a href=3D"mail=
to:rogerj@gmail.com" target=3D"_blank">rogerj@gmail.com</a>&gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt; On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern &lt;<a href=3D"mai=
lto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&gt; wrot=
e:<br>
&gt;&gt;&gt; This is a call for adoption=C2=A0 of draft-farinacci-lisp-sign=
al-free-multicast.<br>
&gt;&gt;&gt; Please speak up if you support or oppose adoption of this docu=
ment.=C2=A0 It has<br>
&gt;&gt;&gt; been presented multiple times to the working group, generally =
to positive<br>
&gt;&gt;&gt; reception as far as I can tell.<br>
&gt;&gt;<br>
&gt;&gt; support<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; --<br>
&gt;&gt;<br>
&gt;&gt; Roger Jorgensen=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| ROJO9-RI=
PE<br>
&gt;&gt; <a href=3D"mailto:rogerj@gmail.com" target=3D"_blank">rogerj@gmail=
.com</a>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 | - IPv6 is The Key!<br>
&gt;&gt; <a href=3D"http://www.jorgensen.no" rel=3D"noreferrer" target=3D"_=
blank">http://www.jorgensen.no</a>=C2=A0 =C2=A0| <a href=3D"mailto:roger@jo=
rgensen.no" target=3D"_blank">roger@jorgensen.no</a><br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; lisp mailing list<br>
&gt;&gt; <a href=3D"mailto:lisp@ietf.org" target=3D"_blank">lisp@ietf.org</=
a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"nore=
ferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/lisp</a><br=
>
&gt;<br>
&gt; _______________________________________________<br>
&gt; lisp mailing list<br>
&gt; <a href=3D"mailto:lisp@ietf.org" target=3D"_blank">lisp@ietf.org</a><b=
r>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/mailman/listinfo/lisp</a><br>
<br>
_______________________________________________<br>
lisp mailing list<br>
<a href=3D"mailto:lisp@ietf.org" target=3D"_blank">lisp@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/lisp</a><br>
</blockquote></div></div></div><div dir=3D"ltr">-- <br></div><div dir=3D"lt=
r">Kiran</div>

--001a113a61ced08a310526656979--


From nobody Tue Dec  8 09:51:57 2015
Return-Path: <fmaino@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CFED1A0461 for <lisp@ietfa.amsl.com>; Tue,  8 Dec 2015 09:51:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bg7DxvywsJ0h for <lisp@ietfa.amsl.com>; Tue,  8 Dec 2015 09:51:52 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACAD41A0469 for <lisp@ietf.org>; Tue,  8 Dec 2015 09:51:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=565; q=dns/txt; s=iport; t=1449597112; x=1450806712; h=subject:to:references:from:message-id:date:mime-version: in-reply-to:content-transfer-encoding; bh=LDAt1yN2fr9T+VoBzcI4eb/kytzTID2OxQ6a+//SRIY=; b=elU1PdzMPpoL65NgHc3qQhXl5iZN4JWzEHPwAHuInrjfZLWoIDpuB1yz Xf/3zGRloieQTNllklhL3mcX9bUwQxlaathqBQ5BAdlUNyqwxqJpKNRmS vmc7A3eYgJy+SancIDs3zurmp+Jm3vz//w6sFjw2C33pZY2UXEnb0zg4Q Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BHAgDqF2dW/5xdJa1egzpTbr1AAQ1ag?= =?us-ascii?q?RQXCoVtAoE+OBQBAQEBAQEBgQqENQEBBAEBARoGFTYKEQsYAgIFFgsCAgkDAgE?= =?us-ascii?q?CARUwEwYCAQGIKw2vNpBwAQEBAQEFAQEBAQEaBIEBhVOEfYUnglCBRAEEjh+EW?= =?us-ascii?q?INqjTyBW4RDgwOTTB8BAUKEJR00hW8BAQE?=
X-IronPort-AV: E=Sophos;i="5.20,400,1444694400"; d="scan'208";a="53741459"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Dec 2015 17:51:51 +0000
Received: from [10.24.65.138] ([10.24.65.138]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tB8Hpp6M008426 for <lisp@ietf.org>; Tue, 8 Dec 2015 17:51:51 GMT
To: lisp@ietf.org
References: <5662F139.6080601@joelhalpern.com>
From: Fabio Maino <fmaino@cisco.com>
Message-ID: <566718B6.6090507@cisco.com>
Date: Tue, 8 Dec 2015 09:51:50 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <5662F139.6080601@joelhalpern.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/QdFhRfHGcGJI7IG4laomwUp15Gs>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2015 17:51:57 -0000

support.

Fabio

On 12/5/15 6:14 AM, Joel M. Halpern wrote:
> This is a call for adoption  of 
> draft-farinacci-lisp-signal-free-multicast.
> Please speak up if you support or oppose adoption of this document.  
> It has been presented multiple times to the working group, generally 
> to positive reception as far as I can tell.
>
> This call will last two weeks, until CoB 21-December-2015.
>
> Yours,
> Joel
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Wed Dec  9 02:37:07 2015
Return-Path: <arnatal@ac.upc.edu>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 685451A01CB for <lisp@ietfa.amsl.com>; Wed,  9 Dec 2015 02:37:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.589
X-Spam-Level: 
X-Spam-Status: No, score=-3.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8m_4f_EoehfX for <lisp@ietfa.amsl.com>; Wed,  9 Dec 2015 02:37:03 -0800 (PST)
Received: from roura.ac.upc.es (roura.ac.upc.edu [147.83.33.10]) by ietfa.amsl.com (Postfix) with ESMTP id 000A91A01A3 for <lisp@ietf.org>; Wed,  9 Dec 2015 02:37:02 -0800 (PST)
Received: from gw-3.ac.upc.es (gw-3.ac.upc.es [147.83.30.9]) by roura.ac.upc.es (8.13.8/8.13.8) with ESMTP id tB98rdjg013721 for <lisp@ietf.org>; Wed, 9 Dec 2015 09:53:39 +0100
Received: from mail-lf0-f49.google.com (mail-lf0-f49.google.com [209.85.215.49]) by gw-3.ac.upc.es (Postfix) with ESMTPSA id 1C728836 for <lisp@ietf.org>; Wed,  9 Dec 2015 11:37:01 +0100 (CET)
Received: by lfdl133 with SMTP id l133so31033867lfd.2 for <lisp@ietf.org>; Wed, 09 Dec 2015 02:37:00 -0800 (PST)
X-Received: by 10.25.21.151 with SMTP id 23mr1497450lfv.165.1449657420114; Wed, 09 Dec 2015 02:37:00 -0800 (PST)
MIME-Version: 1.0
Received: by 10.112.124.202 with HTTP; Wed, 9 Dec 2015 02:36:40 -0800 (PST)
In-Reply-To: <5662F139.6080601@joelhalpern.com>
References: <5662F139.6080601@joelhalpern.com>
From: Alberto Rodriguez-Natal <arnatal@ac.upc.edu>
Date: Wed, 9 Dec 2015 11:36:40 +0100
X-Gmail-Original-Message-ID: <CA+YHcKHEPoDtUYW7utK_7_VzB+1EDWi0qvZXTRsS-j_WQC-i3w@mail.gmail.com>
Message-ID: <CA+YHcKHEPoDtUYW7utK_7_VzB+1EDWi0qvZXTRsS-j_WQC-i3w@mail.gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary=001a11406aae92750e052674abd5
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/5ajpIYx1iy3Aj86jfbwJ3h5IhL0>
Cc: "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Dec 2015 10:37:06 -0000

--001a11406aae92750e052674abd5
Content-Type: text/plain; charset=UTF-8

Support

On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:

> This is a call for adoption  of draft-farinacci-lisp-signal-free-multicast.
> Please speak up if you support or oppose adoption of this document.  It
> has been presented multiple times to the working group, generally to
> positive reception as far as I can tell.
>
> This call will last two weeks, until CoB 21-December-2015.
>
> Yours,
> Joel
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>

--001a11406aae92750e052674abd5
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Support<br></div><div class=3D"gmail_extra"><br><div class=
=3D"gmail_quote">On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@j=
oelhalpern.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">This=
 is a call for adoption=C2=A0 of draft-farinacci-lisp-signal-free-multicast=
.<br>
Please speak up if you support or oppose adoption of this document.=C2=A0 I=
t has been presented multiple times to the working group, generally to posi=
tive reception as far as I can tell.<br>
<br>
This call will last two weeks, until CoB 21-December-2015.<br>
<br>
Yours,<br>
Joel<br>
<br>
_______________________________________________<br>
lisp mailing list<br>
<a href=3D"mailto:lisp@ietf.org" target=3D"_blank">lisp@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/lisp</a><br>
</blockquote></div><br></div>

--001a11406aae92750e052674abd5--


From nobody Fri Dec 11 01:35:08 2015
Return-Path: <vimoreno@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B0F81ACE51 for <lisp@ietfa.amsl.com>; Fri, 11 Dec 2015 01:35:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level: 
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JMzkpmiWeVh7 for <lisp@ietfa.amsl.com>; Fri, 11 Dec 2015 01:35:05 -0800 (PST)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F96B1A8732 for <lisp@ietf.org>; Fri, 11 Dec 2015 01:35:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3576; q=dns/txt; s=iport; t=1449826505; x=1451036105; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=agVt3G8FpomR1TlLk+jxoL6nSTuTDL4RxitWG9Y/dBM=; b=MV8TsIig8pmcmlsE8+hGjSXjttUv1MVOawfsHlzqh6RcsLPRI4flPeBc EYhg2Ge+pX1to3WqRrGq06X56T3OmxFH7kc2wTb7Xl0x9KQGRKU/d2JFx ZXkQW7AHmlqZyM+DLQ30xRR3E/1vZAOprshencJXjm6MHuIdojfFEUrs0 A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AQAgBml2pW/4kNJK1eDoMsU24GvSgBD?= =?us-ascii?q?YFiFwEJhW4CgS04FAEBAQEBAQGBCoQ1AQEEAQEBGlELEAIBCAQ7BycLFBECBA4?= =?us-ascii?q?FiC8NvnYBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZWgg+CboUIgx6BGgWWcQGNQ?= =?us-ascii?q?4FbhEWWbgEfAQFCg0Y+coRQgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,412,1444694400";  d="scan'208,217";a="215663686"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 11 Dec 2015 09:35:04 +0000
Received: from XCH-RCD-011.cisco.com (xch-rcd-011.cisco.com [173.37.102.21]) by alln-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id tBB9Z4dr010660 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 11 Dec 2015 09:35:04 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-011.cisco.com (173.37.102.21) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 11 Dec 2015 03:35:03 -0600
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1104.009; Fri, 11 Dec 2015 03:35:03 -0600
From: "Victor Moreno (vimoreno)" <vimoreno@cisco.com>
To: Alberto Rodriguez-Natal <arnatal@ac.upc.edu>
Thread-Topic: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
Thread-Index: AQHRL2dBkiV2A7LrYUasfVVEwxMaU57C4MAAgAMTdAA=
Date: Fri, 11 Dec 2015 09:35:03 +0000
Message-ID: <26B9AAFE-38F5-4789-80FC-D2F1EDF544D0@cisco.com>
References: <5662F139.6080601@joelhalpern.com> <CA+YHcKHEPoDtUYW7utK_7_VzB+1EDWi0qvZXTRsS-j_WQC-i3w@mail.gmail.com>
In-Reply-To: <CA+YHcKHEPoDtUYW7utK_7_VzB+1EDWi0qvZXTRsS-j_WQC-i3w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.81.105]
Content-Type: multipart/alternative; boundary="_000_26B9AAFE38F5478980FCD2F1EDF544D0ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/D1sP7q81hLr0fBA-xtV_ValTKEc>
Cc: "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] Adopting draft-farinacci-lisp-signal-free-multicast?
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2015 09:35:07 -0000

--_000_26B9AAFE38F5478980FCD2F1EDF544D0ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Support

-v

On Dec 9, 2015, at 2:36 AM, Alberto Rodriguez-Natal <arnatal@ac.upc.edu<mai=
lto:arnatal@ac.upc.edu>> wrote:

Support

On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern <jmh@joelhalpern.com<mailto=
:jmh@joelhalpern.com>> wrote:
This is a call for adoption  of draft-farinacci-lisp-signal-free-multicast.
Please speak up if you support or oppose adoption of this document.  It has=
 been presented multiple times to the working group, generally to positive =
reception as far as I can tell.

This call will last two weeks, until CoB 21-December-2015.

Yours,
Joel

_______________________________________________
lisp mailing list
lisp@ietf.org<mailto:lisp@ietf.org>
https://www.ietf.org/mailman/listinfo/lisp

_______________________________________________
lisp mailing list
lisp@ietf.org<mailto:lisp@ietf.org>
https://www.ietf.org/mailman/listinfo/lisp


--_000_26B9AAFE38F5478980FCD2F1EDF544D0ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <B13C0F80B4A58E42B3BF967F917CD689@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;" class=3D"">
Support
<div class=3D""><br class=3D"">
</div>
<div class=3D"">-v</div>
<div class=3D""><br class=3D"">
<div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Dec 9, 2015, at 2:36 AM, Alberto Rodriguez-Natal &lt;<a =
href=3D"mailto:arnatal@ac.upc.edu" class=3D"">arnatal@ac.upc.edu</a>&gt; wr=
ote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div dir=3D"ltr" class=3D"">Support<br class=3D"">
</div>
<div class=3D"gmail_extra"><br class=3D"">
<div class=3D"gmail_quote">On Sat, Dec 5, 2015 at 3:14 PM, Joel M. Halpern =
<span dir=3D"ltr" class=3D"">
&lt;<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank" class=3D"">jmh=
@joelhalpern.com</a>&gt;</span> wrote:<br class=3D"">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
This is a call for adoption&nbsp; of draft-farinacci-lisp-signal-free-multi=
cast.<br class=3D"">
Please speak up if you support or oppose adoption of this document.&nbsp; I=
t has been presented multiple times to the working group, generally to posi=
tive reception as far as I can tell.<br class=3D"">
<br class=3D"">
This call will last two weeks, until CoB 21-December-2015.<br class=3D"">
<br class=3D"">
Yours,<br class=3D"">
Joel<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
lisp mailing list<br class=3D"">
<a href=3D"mailto:lisp@ietf.org" target=3D"_blank" class=3D"">lisp@ietf.org=
</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"noreferrer" t=
arget=3D"_blank" class=3D"">https://www.ietf.org/mailman/listinfo/lisp</a><=
br class=3D"">
</blockquote>
</div>
<br class=3D"">
</div>
_______________________________________________<br class=3D"">
lisp mailing list<br class=3D"">
<a href=3D"mailto:lisp@ietf.org" class=3D"">lisp@ietf.org</a><br class=3D""=
>
https://www.ietf.org/mailman/listinfo/lisp<br class=3D"">
</div>
</blockquote>
</div>
<br class=3D"">
</div>
</body>
</html>

--_000_26B9AAFE38F5478980FCD2F1EDF544D0ciscocom_--


From nobody Fri Dec 11 05:03:05 2015
Return-Path: <bclaise@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3FAD1A8A96; Fri, 11 Dec 2015 05:03:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level: 
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HPAUW6K9hxHM; Fri, 11 Dec 2015 05:03:00 -0800 (PST)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 932651A8A9E; Fri, 11 Dec 2015 05:02:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8539; q=dns/txt; s=iport; t=1449838980; x=1451048580; h=to:from:subject:cc:message-id:date:mime-version; bh=41DCR/r+RkB97rQ+LZfsD/JQdGDTU1RxIBzj3Cg2aco=; b=jGtkwHii61Nwqkd+INwtKnGfqwqxvsLOyetKt9GsVJ5BHYRtac3MFdfJ E/xEmbQaCcdBgrMUcpPZm8XZz33Rmus6cAgwYZqeSH2V/b3U8vtXGIgB0 cMaOagWek/raXUgmPTTVyZoY0UywVd9yMLtGtmftuNA8l+b3RMnZ019vH Y=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DOAQBoyGpW/xbLJq1ehA1uuxaCGQENg?= =?us-ascii?q?WIXAQuFbIFoFAEBAQEBAQGBCoQ3JyYwPCECEQJZBgIBAYgrDaxPkgEBAQEHAQE?= =?us-ascii?q?BAQEehlaJP0aCNToTgTYFjTOJP4U1iA+BW0mHAY94g3MfAQFChAU9NAGFVgEBA?= =?us-ascii?q?Q?=
X-IronPort-AV: E=Sophos;i="5.20,413,1444694400";  d="scan'208,217";a="633691100"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Dec 2015 13:02:57 +0000
Received: from [10.60.67.86] (ams-bclaise-8915.cisco.com [10.60.67.86]) by aer-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tBBD2uT3028742; Fri, 11 Dec 2015 13:02:56 GMT
To: lisp@ietf.org
From: Benoit Claise <bclaise@cisco.com>
Message-ID: <566AC980.10909@cisco.com>
Date: Fri, 11 Dec 2015 14:02:56 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------070601090605050801030805"
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/cyF_9ssE3lDmFs18wwlVFf6-6bI>
Cc: draft-ietf-lisp-yang@ietf.org, "yang-coord@ietf.org" <yang-coord@ietf.org>
Subject: [lisp] YANG data models in LISP: extraction and compilation feedback
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2015 13:03:02 -0000

This is a multi-part message in MIME format.
--------------070601090605050801030805
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Dear all,

I looked at the YANG model in the LISP WG document, from a compilation 
point of view (NOT a YANG design point of view):
https://tools.ietf.org/html/draft-ietf-lisp-yang-00

First of, we can't extract your YANG models from the draft.

Here are the extraction error messages:
xym.py draft-ietf-lisp-yang-00.txt
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 138 - Yang module 'ietf-lisp' 
with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1193 - Yang module 'lisp-itr' 
with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1630 - Yang module 'lisp-etr' 
with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2363 - Yang module 
'lisp-map-server' with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2638 - Yang module 
'lisp-map-resolver' with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3291 - Yang module 
'lisp-pitr' with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3548 - Yang module 
'lisp-petr' with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3651 - Yang module 
'lisp-address-types' with no <CODE BEGINS> and not starting with 'example-'

As mentioned in 
https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05, the correct 
way to use <CODE BEGINS> <CODE ENDS> is

    The "<CODE BEGINS>" tag SHOULD be followed by a string identifying
    the file name specified in Section 5.2 of
    [I-D.ietf-netmod-rfc6020bis 
<https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05#ref-I-D.ietf-netmod-rfc6020bis>].  The following example is for the
    '2010-01-18' revision of the 'ietf-foo' module:

      <CODE BEGINS> file"ietf-foo@2010-01-18.yang"
        module ietf-foo {
          // ...
          revision 2010-01-18 {
            description "Latest revision";
            reference "RFC XXXX";
          }
          // ...
        }
      <CODE ENDS>


Note that the example YANG models should use the "example-" prefix, and 
no <CODE BEGINS> <CODE ENDS>


Now, if I extract those modules anyway, you have some compilation errors:
pyang --ietf *.yang
lisp-address-types.yang:1: warning: RFC 6087: 4.1: the module name 
should start with one of the strings "ietf-" or "iana-"
lisp-etr.yang:1: warning: RFC 6087: 4.1: the module name should start 
with one of the strings "ietf-" or "iana-"
lisp-itr.yang:1: warning: RFC 6087: 4.1: the module name should start 
with one of the strings "ietf-" or "iana-"
lisp-map-resolver.yang:1: warning: RFC 6087: 4.1: the module name should 
start with one of the strings "ietf-" or "iana-"
lisp-map-server.yang:1: warning: RFC 6087: 4.1: the module name should 
start with one of the strings "ietf-" or "iana-"
lisp-petr.yang:1: warning: RFC 6087: 4.1: the module name should start 
with one of the strings "ietf-" or "iana-"
lisp-pitr.yang:1: warning: RFC 6087: 4.1: the module name should start 
with one of the strings "ietf-" or "iana-"

Once you correct the extraction issues, the YANG models, along with some 
remaining compilation errors, will appear at 
http://www.claise.be/IETFYANGPageCompilation.html

Finally, note that www.yangvalidator.com is your friend._
_
Regards, Benoit

--------------070601090605050801030805
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Dear all,<br>
    <br>
    I looked at the YANG model in the LISP WG document, from a
    compilation point of view (NOT a YANG design point of view):<br>
    <a class="moz-txt-link-freetext"
href="http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/">Â Â Â 
      https://tools.ietf.org/html/draft-ietf-lisp-yang-00</a><br>
    <br>
    First of, we can't extract your YANG models from the draft.<br>
    <br>
    Here are the extraction error messages:<br>
    xym.py draft-ietf-lisp-yang-00.txt<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 138 - Yang module
    'ietf-lisp' with no &lt;CODE BEGINS&gt; and not starting with
    'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1193 - Yang module
    'lisp-itr' with no &lt;CODE BEGINS&gt; and not starting with
    'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1630 - Yang module
    'lisp-etr' with no &lt;CODE BEGINS&gt; and not starting with
    'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2363 - Yang module
    'lisp-map-server' with no &lt;CODE BEGINS&gt; and not starting with
    'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2638 - Yang module
    'lisp-map-resolver' with no &lt;CODE BEGINS&gt; and not starting
    with 'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3291 - Yang module
    'lisp-pitr' with no &lt;CODE BEGINS&gt; and not starting with
    'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3548 - Yang module
    'lisp-petr' with no &lt;CODE BEGINS&gt; and not starting with
    'example-'<br>
    ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3651 - Yang module
    'lisp-address-types' with no &lt;CODE BEGINS&gt; and not starting
    with 'example-'<br>
    <br>
    As mentioned in <a class="moz-txt-link-freetext"
      href="https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05">https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05</a>,
    the correct way to use &lt;CODE BEGINS&gt; &lt;CODE ENDS&gt; is <br>
    <br>
    <pre class="newpage">   The "&lt;CODE BEGINS&gt;" tag SHOULD be followed by a string identifying
   the file name specified in Section 5.2 of
   [<a href="https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05#ref-I-D.ietf-netmod-rfc6020bis">I-D.ietf-netmod-rfc6020bis</a>].  The following example is for the
   '2010-01-18' revision of the 'ietf-foo' module:

     &lt;CODE BEGINS&gt; file <a class="moz-txt-link-rfc2396E" href="mailto:ietf-foo@2010-01-18.yang">"ietf-foo@2010-01-18.yang"</a>
       module ietf-foo {
         // ...
         revision 2010-01-18 {
           description "Latest revision";
           reference "RFC XXXX";
         }
         // ...
       }
     &lt;CODE ENDS&gt;</pre>
    <br>
    Note that the example YANG models should use the "example-" prefix,
    and no &lt;CODE BEGINS&gt; &lt;CODE ENDS&gt;<br>
    <br>
    <br>
    Now, if I extract those modules anyway, you have some compilation
    errors:<br>
    pyang --ietf *.yang<br>
    lisp-address-types.yang:1: warning: RFC 6087: 4.1: the module name
    should start with one of the strings "ietf-" or "iana-"<br>
    lisp-etr.yang:1: warning: RFC 6087: 4.1: the module name should
    start with one of the strings "ietf-" or "iana-"<br>
    lisp-itr.yang:1: warning: RFC 6087: 4.1: the module name should
    start with one of the strings "ietf-" or "iana-"<br>
    lisp-map-resolver.yang:1: warning: RFC 6087: 4.1: the module name
    should start with one of the strings "ietf-" or "iana-"<br>
    lisp-map-server.yang:1: warning: RFC 6087: 4.1: the module name
    should start with one of the strings "ietf-" or "iana-"<br>
    lisp-petr.yang:1: warning: RFC 6087: 4.1: the module name should
    start with one of the strings "ietf-" or "iana-"<br>
    lisp-pitr.yang:1: warning: RFC 6087: 4.1: the module name should
    start with one of the strings "ietf-" or "iana-"<br>
    <br>
    Once you correct the extraction issues, the YANG models, along with
    some remaining compilation errors, will appear at <a
      class="moz-txt-link-freetext"
      href="http://www.claise.be/IETFYANGPageCompilation.html"><a class="moz-txt-link-freetext" href="http://www.claise.be/IETFYANGPageCompilation.html">http://www.claise.be/IETFYANGPageCompilation.html</a></a><br>
    <br>
    Finally, note that <a class="moz-txt-link-abbreviated" href="http://www.yangvalidator.com">www.yangvalidator.com</a> is your friend.<u><br>
    </u> <br>
    Regards, Benoit
  </body>
</html>

--------------070601090605050801030805--


From nobody Thu Dec 17 21:18:33 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 498A61B332E; Thu, 17 Dec 2015 21:18:31 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151218051831.12149.39755.idtracker@ietfa.amsl.com>
Date: Thu, 17 Dec 2015 21:18:31 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/Md2rVerDad9Z6PNbVcY1geLzun8>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-yang-01.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Dec 2015 05:18:31 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Locator/ID Separation Protocol Working Group of the IETF.

        Title           : LISP Configuration YANG Model
        Authors         : Vina Ermagan
                          Alberto Rodriguez-Natal
                          Florin Coras
                          Carl Moberg
                          Albert Cabellos-Aparicio
                          Fabio Maino
	Filename        : draft-ietf-lisp-yang-01.txt
	Pages           : 82
	Date            : 2015-12-17

Abstract:
   This document describes a YANG data model to use with the Locator/ID
   Separation Protocol (LISP).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-yang/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-yang-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-yang-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Dec 17 21:27:13 2015
Return-Path: <vermagan@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 047C31B3345; Thu, 17 Dec 2015 21:27:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pTr5-p2EPC2N; Thu, 17 Dec 2015 21:27:08 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 839421B3344; Thu, 17 Dec 2015 21:27:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11554; q=dns/txt; s=iport; t=1450416428; x=1451626028; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=mRNDGgxqi7Dd1WN0Pl2w335aa/XrGp3YgvFAzJvKu+g=; b=grIJO7YRlDDJ+0IzwA1dNCotpECEJSSaytglko1xhiBcQNjng0mK8s9L cN0V1L/7NIm3XhG6RR+x5LarmfP7kpYDD2BlEuG6qMwpIf059SzdzNPuI KBHoev9K/3nD4929ZuxyFOBgIAMP/IJyo/9pjVmVx4i1m81HpUqLDa7ci 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BFAgCDmHNW/5xdJa1egm5MUm0Guz2CG?= =?us-ascii?q?QENgWIjhWoCgTs4FAEBAQEBAQGBCoQ0AQEBBEkwEAIBCBEDAQIoBzIUCQgCBAE?= =?us-ascii?q?NBYgvDr08AQEBAQEBAQEBAQEBAQEBAQEBAQEBGIZWhH6EQjkNEYQnBY02iUcBh?= =?us-ascii?q?TiID4FcSZcEg3MBIAEBQoQEcgGDYYEIAQEB?=
X-IronPort-AV: E=Sophos; i="5.20,444,1444694400"; d="scan'208,217"; a="54516761"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Dec 2015 05:27:07 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tBI5R7Bj016981 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 18 Dec 2015 05:27:07 GMT
Received: from xch-rcd-019.cisco.com (173.37.102.29) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 17 Dec 2015 23:27:06 -0600
Received: from xch-rcd-019.cisco.com ([173.37.102.29]) by XCH-RCD-019.cisco.com ([173.37.102.29]) with mapi id 15.00.1104.009; Thu, 17 Dec 2015 23:27:06 -0600
From: "Vina Ermagan (vermagan)" <vermagan@cisco.com>
To: "Benoit Claise (bclaise)" <bclaise@cisco.com>, "lisp@ietf.org" <lisp@ietf.org>
Thread-Topic: [lisp] YANG data models in LISP: extraction and compilation feedback
Thread-Index: AQHRNBRJF9on5tG5FUiS3MnuV81WLp7QH8aA
Date: Fri, 18 Dec 2015 05:27:06 +0000
Message-ID: <D298D824.7245C%vermagan@cisco.com>
References: <566AC980.10909@cisco.com>
In-Reply-To: <566AC980.10909@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.4.3.140616
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.60.136]
Content-Type: multipart/alternative; boundary="_000_D298D8247245Cvermaganciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/RSxJhUkGzXVjR3aeEb-YEw-sVaw>
Cc: "draft-ietf-lisp-yang@ietf.org" <draft-ietf-lisp-yang@ietf.org>, "yang-coord@ietf.org" <yang-coord@ietf.org>
Subject: Re: [lisp] YANG data models in LISP: extraction and compilation feedback
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Dec 2015 05:27:11 -0000

--_000_D298D8247245Cvermaganciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Beniot,

Thanks for the notification. The errors below should be fixed in the new re=
vision draft-ietf-lisp-yang-01 published today. I also tested the new versi=
on with yangvalidator, and all seems to be fine.

Thank you,
Vina

From: "Benoit Claise (bclaise)" <bclaise@cisco.com<mailto:bclaise@cisco.com=
>>
Date: Friday, December 11, 2015 5:02 AM
To: "lisp@ietf.org<mailto:lisp@ietf.org>" <lisp@ietf.org<mailto:lisp@ietf.o=
rg>>
Cc: "draft-ietf-lisp-yang@ietf.org<mailto:draft-ietf-lisp-yang@ietf.org>" <=
draft-ietf-lisp-yang@ietf.org<mailto:draft-ietf-lisp-yang@ietf.org>>, "yang=
-coord@ietf.org<mailto:yang-coord@ietf.org>" <yang-coord@ietf.org<mailto:ya=
ng-coord@ietf.org>>
Subject: [lisp] YANG data models in LISP: extraction and compilation feedba=
ck

Dear all,

I looked at the YANG model in the LISP WG document, from a compilation poin=
t of view (NOT a YANG design point of view):
    https://tools.ietf.org/html/draft-ietf-lisp-yang-00<http://datatracker.=
ietf.org/doc/draft-ietf-i2rs-yang-network-topo/>

First of, we can't extract your YANG models from the draft.

Here are the extraction error messages:
xym.py draft-ietf-lisp-yang-00.txt
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 138 - Yang module 'ietf-lisp' wi=
th no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1193 - Yang module 'lisp-itr' wi=
th no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1630 - Yang module 'lisp-etr' wi=
th no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2363 - Yang module 'lisp-map-ser=
ver' with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2638 - Yang module 'lisp-map-res=
olver' with no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3291 - Yang module 'lisp-pitr' w=
ith no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3548 - Yang module 'lisp-petr' w=
ith no <CODE BEGINS> and not starting with 'example-'
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3651 - Yang module 'lisp-address=
-types' with no <CODE BEGINS> and not starting with 'example-'

As mentioned in https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05=
, the correct way to use <CODE BEGINS> <CODE ENDS> is


   The "<CODE BEGINS>" tag SHOULD be followed by a string identifying
   the file name specified in Section 5.2 of
   [I-D.ietf-netmod-rfc6020bis<https://tools.ietf.org/html/draft-ietf-netmo=
d-rfc6087bis-05#ref-I-D.ietf-netmod-rfc6020bis>].  The following example is=
 for the
   '2010-01-18' revision of the 'ietf-foo' module:

     <CODE BEGINS> file "ietf-foo@2010-01-18.yang"<mailto:ietf-foo@2010-01-=
18.yang>
       module ietf-foo {
         // ...
         revision 2010-01-18 {
           description "Latest revision";
           reference "RFC XXXX";
         }
         // ...
       }
     <CODE ENDS>

Note that the example YANG models should use the "example-" prefix, and no =
<CODE BEGINS> <CODE ENDS>


Now, if I extract those modules anyway, you have some compilation errors:
pyang --ietf *.yang
lisp-address-types.yang:1: warning: RFC 6087: 4.1: the module name should s=
tart with one of the strings "ietf-" or "iana-"
lisp-etr.yang:1: warning: RFC 6087: 4.1: the module name should start with =
one of the strings "ietf-" or "iana-"
lisp-itr.yang:1: warning: RFC 6087: 4.1: the module name should start with =
one of the strings "ietf-" or "iana-"
lisp-map-resolver.yang:1: warning: RFC 6087: 4.1: the module name should st=
art with one of the strings "ietf-" or "iana-"
lisp-map-server.yang:1: warning: RFC 6087: 4.1: the module name should star=
t with one of the strings "ietf-" or "iana-"
lisp-petr.yang:1: warning: RFC 6087: 4.1: the module name should start with=
 one of the strings "ietf-" or "iana-"
lisp-pitr.yang:1: warning: RFC 6087: 4.1: the module name should start with=
 one of the strings "ietf-" or "iana-"

Once you correct the extraction issues, the YANG models, along with some re=
maining compilation errors, will appear at <http://www.claise.be/IETFYANGPa=
geCompilation.html> http://www.claise.be/IETFYANGPageCompilation.html

Finally, note that www.yangvalidator.com<http://www.yangvalidator.com> is y=
our friend.

Regards, Benoit

--_000_D298D8247245Cvermaganciscocom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <949F34B59D751D4F96FEB43A7B292537@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif; ">
<div>Hi Beniot,</div>
<div><br>
</div>
<div>Thanks for the notification. The errors below should be fixed in the n=
ew revision draft-ietf-lisp-yang-01 published today. I also tested the new =
version with yangvalidator, and all seems to be fine.</div>
<div><br>
</div>
<div>Thank you,</div>
<div>Vina</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>&quot;Benoit Claise (bclaise)=
&quot; &lt;<a href=3D"mailto:bclaise@cisco.com">bclaise@cisco.com</a>&gt;<b=
r>
<span style=3D"font-weight:bold">Date: </span>Friday, December 11, 2015 5:0=
2 AM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:lisp@ie=
tf.org">lisp@ietf.org</a>&quot; &lt;<a href=3D"mailto:lisp@ietf.org">lisp@i=
etf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>&quot;<a href=3D"mailto:draft-i=
etf-lisp-yang@ietf.org">draft-ietf-lisp-yang@ietf.org</a>&quot; &lt;<a href=
=3D"mailto:draft-ietf-lisp-yang@ietf.org">draft-ietf-lisp-yang@ietf.org</a>=
&gt;, &quot;<a href=3D"mailto:yang-coord@ietf.org">yang-coord@ietf.org</a>&=
quot;
 &lt;<a href=3D"mailto:yang-coord@ietf.org">yang-coord@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>[lisp] YANG data models in=
 LISP: extraction and compilation feedback<br>
</div>
<div><br>
</div>
<blockquote id=3D"MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE" style=3D"BORDER-LEFT:=
 #b5c4df 5 solid; PADDING:0 0 0 5; MARGIN:0 0 0 5;">
<div>
<div bgcolor=3D"#FFFFFF" text=3D"#000000">Dear all,<br>
<br>
I looked at the YANG model in the LISP WG document, from a compilation poin=
t of view (NOT a YANG design point of view):<br>
<a class=3D"moz-txt-link-freetext" href=3D"http://datatracker.ietf.org/doc/=
draft-ietf-i2rs-yang-network-topo/">&nbsp;&nbsp;&nbsp; https://tools.ietf.o=
rg/html/draft-ietf-lisp-yang-00</a><br>
<br>
First of, we can't extract your YANG models from the draft.<br>
<br>
Here are the extraction error messages:<br>
xym.py draft-ietf-lisp-yang-00.txt<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 138 - Yang module 'ietf-lisp' wi=
th no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1193 - Yang module 'lisp-itr' wi=
th no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1630 - Yang module 'lisp-etr' wi=
th no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2363 - Yang module 'lisp-map-ser=
ver' with no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2638 - Yang module 'lisp-map-res=
olver' with no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3291 - Yang module 'lisp-pitr' w=
ith no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3548 - Yang module 'lisp-petr' w=
ith no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3651 - Yang module 'lisp-address=
-types' with no &lt;CODE BEGINS&gt; and not starting with 'example-'<br>
<br>
As mentioned in <a class=3D"moz-txt-link-freetext" href=3D"https://tools.ie=
tf.org/html/draft-ietf-netmod-rfc6087bis-05">
https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05</a>, the correc=
t way to use &lt;CODE BEGINS&gt; &lt;CODE ENDS&gt; is
<br>
<br>
<pre class=3D"newpage">   The &quot;&lt;CODE BEGINS&gt;&quot; tag SHOULD be=
 followed by a string identifying
   the file name specified in Section 5.2 of
   [<a href=3D"https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05#=
ref-I-D.ietf-netmod-rfc6020bis">I-D.ietf-netmod-rfc6020bis</a>].  The follo=
wing example is for the
   '2010-01-18' revision of the 'ietf-foo' module:

     &lt;CODE BEGINS&gt; file <a class=3D"moz-txt-link-rfc2396E" href=3D"ma=
ilto:ietf-foo@2010-01-18.yang">&quot;ietf-foo@2010-01-18.yang&quot;</a>
       module ietf-foo {
         // ...
         revision 2010-01-18 {
           description &quot;Latest revision&quot;;
           reference &quot;RFC XXXX&quot;;
         }
         // ...
       }
     &lt;CODE ENDS&gt;</pre>
<br>
Note that the example YANG models should use the &quot;example-&quot; prefi=
x, and no &lt;CODE BEGINS&gt; &lt;CODE ENDS&gt;<br>
<br>
<br>
Now, if I extract those modules anyway, you have some compilation errors:<b=
r>
pyang --ietf *.yang<br>
lisp-address-types.yang:1: warning: RFC 6087: 4.1: the module name should s=
tart with one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
lisp-etr.yang:1: warning: RFC 6087: 4.1: the module name should start with =
one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
lisp-itr.yang:1: warning: RFC 6087: 4.1: the module name should start with =
one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
lisp-map-resolver.yang:1: warning: RFC 6087: 4.1: the module name should st=
art with one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
lisp-map-server.yang:1: warning: RFC 6087: 4.1: the module name should star=
t with one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
lisp-petr.yang:1: warning: RFC 6087: 4.1: the module name should start with=
 one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
lisp-pitr.yang:1: warning: RFC 6087: 4.1: the module name should start with=
 one of the strings &quot;ietf-&quot; or &quot;iana-&quot;<br>
<br>
Once you correct the extraction issues, the YANG models, along with some re=
maining compilation errors, will appear at
<a class=3D"moz-txt-link-freetext" href=3D"http://www.claise.be/IETFYANGPag=
eCompilation.html">
</a><a class=3D"moz-txt-link-freetext" href=3D"http://www.claise.be/IETFYAN=
GPageCompilation.html">http://www.claise.be/IETFYANGPageCompilation.html</a=
><br>
<br>
Finally, note that <a class=3D"moz-txt-link-abbreviated" href=3D"http://www=
.yangvalidator.com">
www.yangvalidator.com</a> is your friend.<u><br>
</u><br>
Regards, Benoit </div>
</div>
</blockquote>
</span>
</body>
</html>

--_000_D298D8247245Cvermaganciscocom_--


From nobody Fri Dec 18 01:24:58 2015
Return-Path: <bclaise@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 235CA1B34D5; Fri, 18 Dec 2015 01:24:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0RpYiqLjui1J; Fri, 18 Dec 2015 01:24:51 -0800 (PST)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 805891B34D3; Fri, 18 Dec 2015 01:24:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13814; q=dns/txt; s=iport; t=1450430691; x=1451640291; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to; bh=LeYu2r6EkT/LDuJjbw1pFvj5nHp3kyzF/xIsWcFWUJs=; b=BLGBDedVkuhZ3341kDTZhbY0vnXhaIQxJknXe91L/STqirwYUB7tNEiy /vV9hZsf9J64UxQNQBjCAjIwb1XMwNS2QIKz51K63eTvAYwoVGlHvJoF8 khccdzRjxgoMGBrybzBmDeg2wOBbbLMrP20p8hkX88MkYlVw3jPAIy02H w=;
X-IronPort-AV: E=Sophos;i="5.20,445,1444694400";  d="scan'208,217";a="609132378"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Dec 2015 09:24:47 +0000
Received: from [10.60.67.86] (ams-bclaise-8915.cisco.com [10.60.67.86]) by aer-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tBI9OkRQ021354; Fri, 18 Dec 2015 09:24:47 GMT
To: "Vina Ermagan (vermagan)" <vermagan@cisco.com>, "lisp@ietf.org" <lisp@ietf.org>
References: <566AC980.10909@cisco.com> <D298D824.7245C%vermagan@cisco.com>
From: Benoit Claise <bclaise@cisco.com>
Message-ID: <5673D0DE.1040402@cisco.com>
Date: Fri, 18 Dec 2015 10:24:46 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
In-Reply-To: <D298D824.7245C%vermagan@cisco.com>
Content-Type: multipart/alternative; boundary="------------030507080900050906050405"
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/9e8jdag3_8voyM0xlN2kMoSmpdI>
Cc: "draft-ietf-lisp-yang@ietf.org" <draft-ietf-lisp-yang@ietf.org>, "yang-coord@ietf.org" <yang-coord@ietf.org>
Subject: Re: [lisp] YANG data models in LISP: extraction and compilation feedback
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Dec 2015 09:24:55 -0000

This is a multi-part message in MIME format.
--------------030507080900050906050405
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit

Thanks Vina,

Well done.

Regards, Benoit.
> Hi Beniot,
>
> Thanks for the notification. The errors below should be fixed in the 
> new revision draft-ietf-lisp-yang-01 published today. I also tested 
> the new version with yangvalidator, and all seems to be fine.
>
> Thank you,
> Vina
>
> From: "Benoit Claise (bclaise)" <bclaise@cisco.com 
> <mailto:bclaise@cisco.com>>
> Date: Friday, December 11, 2015 5:02 AM
> To: "lisp@ietf.org <mailto:lisp@ietf.org>" <lisp@ietf.org 
> <mailto:lisp@ietf.org>>
> Cc: "draft-ietf-lisp-yang@ietf.org 
> <mailto:draft-ietf-lisp-yang@ietf.org>" <draft-ietf-lisp-yang@ietf.org 
> <mailto:draft-ietf-lisp-yang@ietf.org>>, "yang-coord@ietf.org 
> <mailto:yang-coord@ietf.org>" <yang-coord@ietf.org 
> <mailto:yang-coord@ietf.org>>
> Subject: [lisp] YANG data models in LISP: extraction and compilation 
> feedback
>
>     Dear all,
>
>     I looked at the YANG model in the LISP WG document, from a
>     compilation point of view (NOT a YANG design point of view):
>     https://tools.ietf.org/html/draft-ietf-lisp-yang-00
>
>     First of, we can't extract your YANG models from the draft.
>
>     Here are the extraction error messages:
>     xym.py draft-ietf-lisp-yang-00.txt
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 138 - Yang module
>     'ietf-lisp' with no <CODE BEGINS> and not starting with 'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1193 - Yang module
>     'lisp-itr' with no <CODE BEGINS> and not starting with 'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1630 - Yang module
>     'lisp-etr' with no <CODE BEGINS> and not starting with 'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2363 - Yang module
>     'lisp-map-server' with no <CODE BEGINS> and not starting with
>     'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2638 - Yang module
>     'lisp-map-resolver' with no <CODE BEGINS> and not starting with
>     'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3291 - Yang module
>     'lisp-pitr' with no <CODE BEGINS> and not starting with 'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3548 - Yang module
>     'lisp-petr' with no <CODE BEGINS> and not starting with 'example-'
>     ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3651 - Yang module
>     'lisp-address-types' with no <CODE BEGINS> and not starting with
>     'example-'
>
>     As mentioned in
>     https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05, the
>     correct way to use <CODE BEGINS> <CODE ENDS> is
>
>         The "<CODE BEGINS>" tag SHOULD be followed by a string identifying
>         the file name specified in Section 5.2 of
>         [I-D.ietf-netmod-rfc6020bis
>     <https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05#ref-I-D.ietf-netmod-rfc6020bis>].  The following example is for the
>         '2010-01-18' revision of the 'ietf-foo' module:
>
>           <CODE BEGINS> file"ietf-foo@2010-01-18.yang"
>             module ietf-foo {
>               // ...
>               revision 2010-01-18 {
>                 description "Latest revision";
>                 reference "RFC XXXX";
>               }
>               // ...
>             }
>           <CODE ENDS>
>
>
>     Note that the example YANG models should use the "example-"
>     prefix, and no <CODE BEGINS> <CODE ENDS>
>
>
>     Now, if I extract those modules anyway, you have some compilation
>     errors:
>     pyang --ietf *.yang
>     lisp-address-types.yang:1: warning: RFC 6087: 4.1: the module name
>     should start with one of the strings "ietf-" or "iana-"
>     lisp-etr.yang:1: warning: RFC 6087: 4.1: the module name should
>     start with one of the strings "ietf-" or "iana-"
>     lisp-itr.yang:1: warning: RFC 6087: 4.1: the module name should
>     start with one of the strings "ietf-" or "iana-"
>     lisp-map-resolver.yang:1: warning: RFC 6087: 4.1: the module name
>     should start with one of the strings "ietf-" or "iana-"
>     lisp-map-server.yang:1: warning: RFC 6087: 4.1: the module name
>     should start with one of the strings "ietf-" or "iana-"
>     lisp-petr.yang:1: warning: RFC 6087: 4.1: the module name should
>     start with one of the strings "ietf-" or "iana-"
>     lisp-pitr.yang:1: warning: RFC 6087: 4.1: the module name should
>     start with one of the strings "ietf-" or "iana-"
>
>     Once you correct the extraction issues, the YANG models, along
>     with some remaining compilation errors, will appear at
>     http://www.claise.be/IETFYANGPageCompilation.html
>
>     Finally, note that www.yangvalidator.com is your friend._
>     _
>     Regards, Benoit
>
> . 


--------------030507080900050906050405
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">Thanks Vina,<br>
      <br>
      Well done.<br>
      <br>
      Regards, Benoit.<br>
    </div>
    <blockquote cite="mid:D298D824.7245C%25vermagan@cisco.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      <div>Hi Beniot,</div>
      <div><br>
      </div>
      <div>Thanks for the notification. The errors below should be fixed
        in the new revision draft-ietf-lisp-yang-01 published today. I
        also tested the new version with yangvalidator, and all seems to
        be fine.</div>
      <div><br>
      </div>
      <div>Thank you,</div>
      <div>Vina</div>
      <div><br>
      </div>
      <span id="OLK_SRC_BODY_SECTION">
        <div style="font-family:Calibri; font-size:11pt;
          text-align:left; color:black; BORDER-BOTTOM: medium none;
          BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT:
          0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;
          BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
          <span style="font-weight:bold">From: </span>"Benoit Claise
          (bclaise)" &lt;<a moz-do-not-send="true"
            href="mailto:bclaise@cisco.com">bclaise@cisco.com</a>&gt;<br>
          <span style="font-weight:bold">Date: </span>Friday, December
          11, 2015 5:02 AM<br>
          <span style="font-weight:bold">To: </span>"<a
            moz-do-not-send="true" href="mailto:lisp@ietf.org"><a class="moz-txt-link-abbreviated" href="mailto:lisp@ietf.org">lisp@ietf.org</a></a>"
          &lt;<a moz-do-not-send="true" href="mailto:lisp@ietf.org">lisp@ietf.org</a>&gt;<br>
          <span style="font-weight:bold">Cc: </span>"<a
            moz-do-not-send="true"
            href="mailto:draft-ietf-lisp-yang@ietf.org"><a class="moz-txt-link-abbreviated" href="mailto:draft-ietf-lisp-yang@ietf.org">draft-ietf-lisp-yang@ietf.org</a></a>"
          &lt;<a moz-do-not-send="true"
            href="mailto:draft-ietf-lisp-yang@ietf.org">draft-ietf-lisp-yang@ietf.org</a>&gt;,
          "<a moz-do-not-send="true" href="mailto:yang-coord@ietf.org">yang-coord@ietf.org</a>"
          &lt;<a moz-do-not-send="true"
            href="mailto:yang-coord@ietf.org">yang-coord@ietf.org</a>&gt;<br>
          <span style="font-weight:bold">Subject: </span>[lisp] YANG
          data models in LISP: extraction and compilation feedback<br>
        </div>
        <div><br>
        </div>
        <blockquote id="MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE"
          style="BORDER-LEFT: #b5c4df 5 solid; PADDING:0 0 0 5; MARGIN:0
          0 0 5;">
          <div>
            <div bgcolor="#FFFFFF" text="#000000">Dear all,<br>
              <br>
              I looked at the YANG model in the LISP WG document, from a
              compilation point of view (NOT a YANG design point of
              view):<br>
              <a moz-do-not-send="true" class="moz-txt-link-freetext"
href="http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/">   
                https://tools.ietf.org/html/draft-ietf-lisp-yang-00</a><br>
              <br>
              First of, we can't extract your YANG models from the
              draft.<br>
              <br>
              Here are the extraction error messages:<br>
              xym.py draft-ietf-lisp-yang-00.txt<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 138 - Yang
              module 'ietf-lisp' with no &lt;CODE BEGINS&gt; and not
              starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1193 - Yang
              module 'lisp-itr' with no &lt;CODE BEGINS&gt; and not
              starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 1630 - Yang
              module 'lisp-etr' with no &lt;CODE BEGINS&gt; and not
              starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2363 - Yang
              module 'lisp-map-server' with no &lt;CODE BEGINS&gt; and
              not starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 2638 - Yang
              module 'lisp-map-resolver' with no &lt;CODE BEGINS&gt; and
              not starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3291 - Yang
              module 'lisp-pitr' with no &lt;CODE BEGINS&gt; and not
              starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3548 - Yang
              module 'lisp-petr' with no &lt;CODE BEGINS&gt; and not
              starting with 'example-'<br>
              ERROR: 'draft-ietf-lisp-yang-00.txt', Line 3651 - Yang
              module 'lisp-address-types' with no &lt;CODE BEGINS&gt;
              and not starting with 'example-'<br>
              <br>
              As mentioned in <a moz-do-not-send="true"
                class="moz-txt-link-freetext"
                href="https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05">
https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05</a>, the
              correct way to use &lt;CODE BEGINS&gt; &lt;CODE ENDS&gt;
              is
              <br>
              <br>
              <pre class="newpage">   The "&lt;CODE BEGINS&gt;" tag SHOULD be followed by a string identifying
   the file name specified in Section 5.2 of
   [<a moz-do-not-send="true" href="https://tools.ietf.org/html/draft-ietf-netmod-rfc6087bis-05#ref-I-D.ietf-netmod-rfc6020bis">I-D.ietf-netmod-rfc6020bis</a>].  The following example is for the
   '2010-01-18' revision of the 'ietf-foo' module:

     &lt;CODE BEGINS&gt; file <a moz-do-not-send="true" class="moz-txt-link-rfc2396E" href="mailto:ietf-foo@2010-01-18.yang">"ietf-foo@2010-01-18.yang"</a>
       module ietf-foo {
         // ...
         revision 2010-01-18 {
           description "Latest revision";
           reference "RFC XXXX";
         }
         // ...
       }
     &lt;CODE ENDS&gt;</pre>
              <br>
              Note that the example YANG models should use the
              "example-" prefix, and no &lt;CODE BEGINS&gt; &lt;CODE
              ENDS&gt;<br>
              <br>
              <br>
              Now, if I extract those modules anyway, you have some
              compilation errors:<br>
              pyang --ietf *.yang<br>
              lisp-address-types.yang:1: warning: RFC 6087: 4.1: the
              module name should start with one of the strings "ietf-"
              or "iana-"<br>
              lisp-etr.yang:1: warning: RFC 6087: 4.1: the module name
              should start with one of the strings "ietf-" or "iana-"<br>
              lisp-itr.yang:1: warning: RFC 6087: 4.1: the module name
              should start with one of the strings "ietf-" or "iana-"<br>
              lisp-map-resolver.yang:1: warning: RFC 6087: 4.1: the
              module name should start with one of the strings "ietf-"
              or "iana-"<br>
              lisp-map-server.yang:1: warning: RFC 6087: 4.1: the module
              name should start with one of the strings "ietf-" or
              "iana-"<br>
              lisp-petr.yang:1: warning: RFC 6087: 4.1: the module name
              should start with one of the strings "ietf-" or "iana-"<br>
              lisp-pitr.yang:1: warning: RFC 6087: 4.1: the module name
              should start with one of the strings "ietf-" or "iana-"<br>
              <br>
              Once you correct the extraction issues, the YANG models,
              along with some remaining compilation errors, will appear
              at
              <a moz-do-not-send="true" class="moz-txt-link-freetext"
                href="http://www.claise.be/IETFYANGPageCompilation.html">
              </a><a moz-do-not-send="true"
                class="moz-txt-link-freetext"
                href="http://www.claise.be/IETFYANGPageCompilation.html">http://www.claise.be/IETFYANGPageCompilation.html</a><br>
              <br>
              Finally, note that <a moz-do-not-send="true"
                class="moz-txt-link-abbreviated"
                href="http://www.yangvalidator.com">
                www.yangvalidator.com</a> is your friend.<u><br>
              </u><br>
              Regards, Benoit </div>
          </div>
        </blockquote>
      </span>
      .
    </blockquote>
    <br>
  </body>
</html>

--------------030507080900050906050405--


From nobody Sun Dec 20 06:37:07 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C3B81B2DB0; Sun, 20 Dec 2015 06:37:06 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151220143706.23737.72234.idtracker@ietfa.amsl.com>
Date: Sun, 20 Dec 2015 06:37:06 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/VVJtxv5HeuqD4V1FwdQGeEhVyxM>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-threats-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Dec 2015 14:37:06 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Locator/ID Separation Protocol Working Group of the IETF.

        Title           : LISP Threats Analysis
        Authors         : Damien Saucez
                          Luigi Iannone
                          Olivier Bonaventure
	Filename        : draft-ietf-lisp-threats-14.txt
	Pages           : 21
	Date            : 2015-12-20

Abstract:
   This document provides a threat analysis of the Locator/Identifier
   Separation Protocol (LISP).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-threats/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-threats-14

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-threats-14


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Dec 21 08:28:14 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1141A90BD for <lisp@ietfa.amsl.com>; Mon, 21 Dec 2015 08:28:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gi_2W9x_f2BA for <lisp@ietfa.amsl.com>; Mon, 21 Dec 2015 08:28:12 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F18861A90BB for <lisp@ietf.org>; Mon, 21 Dec 2015 08:28:11 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id DE8CD25E333 for <lisp@ietf.org>; Mon, 21 Dec 2015 08:28:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1450715291; bh=47c1s+6wHfmHZOmZmChWZam/5Z9IjBIsw2fRLf0TCbw=; h=To:From:Subject:Date:From; b=Z9owvexY9B4wzeOji7bjrw6QiyDRKE/UJr16NCxyWnHsiD6XIksm/lqcI9oBjL4Of LmXaiyUWLmKRC8spFBufSAAbOs2yhvBo3Bp4M7qeh5bQ34tLi9Bxtq6v90RuznuMcO QMYSv9RGdyoXnYT+ENFvCD3+cAFqHQ6ozJw84+mo=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 9EE4525DF97 for <lisp@ietf.org>; Mon, 21 Dec 2015 08:28:11 -0800 (PST)
To: "lisp@ietf.org" <lisp@ietf.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <56782897.8010006@joelhalpern.com>
Date: Mon, 21 Dec 2015 11:28:07 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/MievP8ldixkOBTzbZ7lv7Vy6ENg>
Subject: Re: [lisp] Adoption of draft-farinacci-lisp-signal-free-multicast
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Dec 2015 16:28:13 -0000

The call for adoption of this document has ended.  There were no 
objections expressed, and sufficient support, so this document will 
become a working group document.

Thank you,
Joel


From nobody Mon Dec 21 11:59:07 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D08621ACC7F; Mon, 21 Dec 2015 11:58:58 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151221195858.12321.21263.idtracker@ietfa.amsl.com>
Date: Mon, 21 Dec 2015 11:58:58 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/FXlH89jhX5wUNXePi1xYNE2SWiI>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-signal-free-multicast-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Dec 2015 19:58:59 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Locator/ID Separation Protocol Working Group of the IETF.

        Title           : Signal-Free LISP Multicast
        Authors         : Victor Moreno
                          Dino Farinacci
	Filename        : draft-ietf-lisp-signal-free-multicast-00.txt
	Pages           : 17
	Date            : 2015-12-21

Abstract:
   When multicast sources and receivers are active at LISP sites, the
   core network is required to use native multicast so packets can be
   delivered from sources to group members.  When multicast is not
   available to connect the multicast sites together, a signal-free
   mechanism can be used to allow traffic to flow between sites.  The
   mechanism within here uses unicast replication and encapsulation over
   the core network for the data-plane and uses the LISP mapping
   database system so encapsulators at the source LISP multicast site
   can find de-capsulators at the receiver LISP multicast sites.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-signal-free-multicast/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-signal-free-multicast-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Dec 31 09:01:59 2015
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id F3D8F1A21A1; Thu, 31 Dec 2015 09:01:58 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <iesg-secretary@ietf.org>
Message-ID: <20151231170158.16118.42311.idtracker@ietfa.amsl.com>
Date: Thu, 31 Dec 2015 09:01:58 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/lisp/hzh4vhdJB4c9TBqfiP97wvARaiQ>
Cc: draft-ietf-lisp-threats@ietf.org, lisp@ietf.org, lisp-chairs@ietf.org
Subject: [lisp] Last Call: <draft-ietf-lisp-threats-14.txt> (LISP Threats Analysis) to Informational RFC
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: ietf@ietf.org
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Dec 2015 17:01:59 -0000

The IESG has received a request from the Locator/ID Separation Protocol
WG (lisp) to consider the following document:
- 'LISP Threats Analysis'
  <draft-ietf-lisp-threats-14.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-01-15. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document provides a threat analysis of the Locator/Identifier
   Separation Protocol (LISP).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lisp-threats/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-lisp-threats/ballot/


No IPR declarations have been submitted directly on this I-D.


