
From nobody Mon Jul  3 04:35:15 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 25E0913157D; Mon,  3 Jul 2017 04:35:14 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149908171411.740.12839980820285632414@ietfa.amsl.com>
Date: Mon, 03 Jul 2017 04:35:14 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/3c7-7oL44FhQAvEFH3DyxGu2dH8>
Subject: [Bier] I-D Action: draft-ietf-bier-ospf-bier-extensions-07.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jul 2017 11:35:14 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication of the IETF.

        Title           : OSPF Extensions for BIER
        Authors         : Peter Psenak
                          Nagendra Kumar
                          IJsbrand Wijnands
                          Andrew Dolganow
                          Tony Przygienda
                          Jeffrey Zhang
                          Sam Aldrin
	Filename        : draft-ietf-bier-ospf-bier-extensions-07.txt
	Pages           : 10
	Date            : 2017-07-03

Abstract:
   Bit Index Explicit Replication (BIER) is an architecture that
   provides multicast forwarding through a "BIER domain" without
   requiring intermediate routers to maintain multicast related per-flow
   state.  Neither does BIER require an explicit tree-building protocol
   for its operation.  A multicast data packet enters a BIER domain at a
   "Bit-Forwarding Ingress Router" (BFIR), and leaves the BIER domain at
   one or more "Bit-Forwarding Egress Routers" (BFERs).  The BFIR router
   adds a BIER header to the packet.  Such header contains a bit-string
   in which each bit represents exactly one BFER to forward the packet
   to.  The set of BFERs to which the multicast packet needs to be
   forwarded is expressed by the according set of bits set in BIER
   packet header.

   This document describes the OSPF protocol extension required for BIER
   with MPLS encapsulation.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-ospf-bier-extensions/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-ospf-bier-extensions-07
https://datatracker.ietf.org/doc/html/draft-ietf-bier-ospf-bier-extensions-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-ospf-bier-extensions-07


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Jul  3 14:22:27 2017
Return-Path: <erosen@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03A6312EBFD for <bier@ietfa.amsl.com>; Mon,  3 Jul 2017 14:22:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.022
X-Spam-Level: 
X-Spam-Status: No, score=-2.022 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GKg9d2k9SlSW for <bier@ietfa.amsl.com>; Mon,  3 Jul 2017 14:22:24 -0700 (PDT)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0108.outbound.protection.outlook.com [104.47.40.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4CDA9127058 for <bier@ietf.org>; Mon,  3 Jul 2017 14:22:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=5S/LLrOVFaDPsdrMuwqHKlc4qGByz42tHVuzwY9u/tE=; b=c7VC0HBoCIbN88HC8tU/X656rQxSnZdQ7ZI6nAunlTY75wYpoQ5QxbkwpwnuqtUHRnMCvnFBBcg+idXCGql4Cn8iHQ6x6CcQdDaXH3xQkDTkis1MTZ6Hl+hUPaIi/5jaL1ygAH3KE13bS45/ddeX2xV7jdS8WEODcKFW3RuhUOs=
Authentication-Results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.33.45] (66.129.241.14) by SN1PR05MB2189.namprd05.prod.outlook.com (10.169.124.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.6; Mon, 3 Jul 2017 21:22:22 +0000
From: Eric C Rosen <erosen@juniper.net>
To: BIER WG <bier@ietf.org>
Message-ID: <5ae27a8b-2ce7-ccf5-5a93-40030e30b9c1@juniper.net>
Date: Mon, 3 Jul 2017 17:22:18 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-Originating-IP: [66.129.241.14]
X-ClientProxiedBy: CY4PR22CA0068.namprd22.prod.outlook.com (10.173.187.30) To SN1PR05MB2189.namprd05.prod.outlook.com (10.169.124.137)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7d88ba45-9bed-4dc4-8695-08d4c2599867
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:SN1PR05MB2189; 
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2189; 3:N4fMV6BSTHYUujvzw1YX6LD5d2fHyIna1cKI8IOMVZzpRO4aFY2p+i46dgd+P18zBETpRM+x0yh2Khi5Yyw0pLWYS1ibkHsiBGFGlGZtqcwHiQRjR7Nxt0EBiCR7S/FNjtsFhPwuzQ/BP8Z5m28lUbGo0Fi9Oy1WAE+456pVToRsHUfFCN/lx2M6zj6+2oJ+zcGSwXKW8bB5zBC/hgMsA+yOpS8csdsFnlEeo86gJeoLxrI/1zjlJvYBpIGME7Xzg6bvGTOdEQN3Kh8UY6/0zs5bTmulyqrAXR+fAlyNjygND83Z8Sj4TM5XxIyGP9C+Lf6uP3FS8DHnZ3AdrpPBkJpEIV4ioNHhlMjk+Zw/JRgv7fzV0Fh7CupHKlBPse1C3kVcLGQzw3CEWD6xQaollBQK0P5GlkyGjj1GJ1YaJ+yu4KRzczIOXd6nHaldqe/b5csz579rBtZI+ghye9RKbRggKgnvaHI81t0Lj4wSfEd54TlCB+0SBUmHhqWn4oq+F/AV7n+H1kwlDJTbvtmojLsL94V2CrnCybjLkL5XvUMt2exOamUhU/RQmVJj4L5pn9YVdS+VGUxTJWaOrukHoPOIJ9tSt6xLET/cHvs7kPcpJucxlP3VjcoiG2rWYeprWHb7uFpmOxuMelwS+GJJw87+3mFjqzDHE/KcrKqRd30Zo1lY9Azkn+KHf4XTisH+eIhoz3xMuzfUp1C3S7wcssc9W0cDMzfNL8u58HpakVNagm20g/UG5YMM1G0WNndJaq4ped2ZNRmZ8BDxC+nopw==
X-MS-TrafficTypeDiagnostic: SN1PR05MB2189:
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2189; 25: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
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2189; 31: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
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2189; 20: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
X-Microsoft-Antispam-PRVS: <SN1PR05MB218964B8D8E5DE7ADFF5B7B2D4D60@SN1PR05MB2189.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(236129657087228)(148574349560750)(247924648384137); 
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(2017060910025)(3002001)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123562025)(20161123564025)(20161123555025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:SN1PR05MB2189; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:SN1PR05MB2189; 
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtTTjFQUjA1TUIyMTg5OzQ6WC9wZnJvRUVwejM5YUJzUHViTVM3SGNta3Qy?= =?utf-8?B?MHM1bm5aRTB3dzlJL2R6RGlGc3lRMHVEV0syTE91UkNRajBGRGZ3akFrZWlV?= =?utf-8?B?Q3B5RnBaS1l0VkFYRklHT3Q1OWhWdG4vdldYV1Y4VUlkWXlKTG9nUXBXN2V6?= =?utf-8?B?K2M4RVMySEZNcnQ0VWUxOFVyRHNLNmZDUEpIZ3V2REcrUGxLaHM3Z1Yzd293?= =?utf-8?B?Zi8wSVRQUWJQNXJkY2kvUm9WSWJ0VGFOcGVUSENwZEwwTitIUXN4czhxdjB1?= =?utf-8?B?R3JwK3lnVEJrOGZSUlo5aVV2aWZuYXhkdVBBUlRNM04rQStySkJxNWV3eXMr?= =?utf-8?B?a21jaGZuZlIwQ0hzQldEOXp3MFR4ajB5Y1dxYXdkUll0VnlXRGZ0ZStSMkFa?= =?utf-8?B?NEtBdUNqcCtRS016V3dxQ3A0VndqMGhVQUI5VFdjdmN5L0pmd1o0TEwyU1Q3?= =?utf-8?B?TUhoNjJSRlRERDE5aUdzbWI5LzhadkdldWNBMlJNWGFMaXE4ZnRrQXhUSEhk?= =?utf-8?B?ZEpTdFUvbkR5TFJ6YUJWbVJOYUR5YzZBQTYrMGFSblAwZHhiU245TXlzS1JN?= =?utf-8?B?TEhJd0pIU2pPNE9rRUkyaVNXU0wwL2EzcWV1cksrYmdJSktCbGJYN3J3Tyty?= =?utf-8?B?QXBmaDI4ZVpGOXYvMFl6ME1oTXBaK2ZsTlB2Ky82ZzRnZDdVWE5NT1I0VWFn?= =?utf-8?B?UStTQjhRQ2pYdmxqbXlLZVo4aXlLaWlzVzBqM3pNVkFoU0ZjcmVTZ2RLS0cv?= =?utf-8?B?UEJpZlVEWmZjVDlVdXRhZ2xXOG1nY0lIRlpaLzBtQ3JTUzNncnRoVkUzV0RG?= =?utf-8?B?cXh0dXBHK3pCTzhZdC9IdVVUamxRblhGM2VZd210b1UwUjVSRnpKSDJacWYv?= =?utf-8?B?dnV0dkt0enc5MzlET1VIcnhJZ2hVQ1RnSlNpRENBN0RHbDkyd01hb2l2aTRx?= =?utf-8?B?ZTVvSFcvZG9mTURlM3FLUmdUdW9zRFBZZ0s4VTgxL0ZndW90N1RkTnVSYVl3?= =?utf-8?B?OXBwQ0dYbXpURGFOS2NKVkpqQTZCWlZUa2c2Vjg4eFBMZVZHSXJIZG43Ymh4?= =?utf-8?B?RStRNk9yRFJLcUdMZ0V1SGxqek9TRW50eHFFOGdORzJ3K1hibDhpU3VrUkZB?= =?utf-8?B?amVGWHJaczc2cE14ZEN1OHZnWElYSzFBeUJhS2p6M2lYWEN4L0kzcnpXY1RX?= =?utf-8?B?YW1acmhIdmZQVVZCb3ZPcWJGRlFHdjVRYVo5UjZad0VDYkY1VmRhN01tMG1N?= =?utf-8?B?Q3FibHQwb3QrTjRNWGlKTTl1bWwzR3UreDRtTjJJZDVxc1NYa2F1alBFKzFH?= =?utf-8?B?d1NBcGJ0V3NnbnBlU25jWUNwRWFMTGlZemlyVFo3YnBhdFNIZzkyN0JhR2pu?= =?utf-8?B?eVFFbnR4bHR2bkFrZXF3RlNHV0oyN0pVZVFZNTl6UnVFb0VuNnU5ZkdkUVE0?= =?utf-8?B?UjhVU0xIeWdscnorRFdqbGhJRkxRMFFtbGV2Z2J3NWtyejBPU0cyTTV6OTNn?= =?utf-8?B?YWNRNzBDcjJsSXJ4aDNOWGZTSzQrNXVTVDdpaVdpbEhvajJ6SWJhVGVRZHZt?= =?utf-8?B?QmpEUmY4MlZ4SkV5RDlTbTQ1WlpuUVpONGlMRkJ6RFhxRHZyN2lJZVVwRFZD?= =?utf-8?B?VkRRTnhIQUhoODRUUkRQVCt6WGdWOGt3WS81a1BVYWtLYVpYK1p5OTliWWlV?= =?utf-8?B?bm8valpIK0M2NHNtL2kzZHFaWUFkd29lS2dwbWg4dHpCT2UvNHh3ZXdSWVJI?= =?utf-8?Q?UqqPsPxcaHyMfZd2FU4qpMFv6thRah4ImMpE=3D?=
X-Forefront-PRVS: 035748864E
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6009001)(6049001)(39410400002)(39850400002)(39400400002)(39450400003)(39840400002)(39860400002)(83506001)(86362001)(2906002)(31696002)(50466002)(65826007)(36756003)(4001350100001)(189998001)(478600001)(230783001)(3260700006)(25786009)(7736002)(50986999)(6666003)(38730400002)(54356999)(305945005)(230700001)(6916009)(8676002)(33646002)(81166006)(110136004)(90366009)(6486002)(77096006)(42186005)(561944003)(23676002)(47776003)(31686004)(53936002)(6116002)(3846002)(5660300001)(65956001)(66066001)(65806001); DIR:OUT; SFP:1102; SCL:1; SRVR:SN1PR05MB2189; H:[172.29.33.45]; FPR:; SPF:None; MLV:sfv; LANG:en; 
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtTTjFQUjA1TUIyMTg5OzIzOm5MZzlNREl0NTB3K0dDUFhvZ1MyU0JlYmRX?= =?utf-8?B?dUM2NnFqL3p2ayswUTAwYThubUhQbnFMTThjd1N6RDR6enI2bGovM2ZYL0pE?= =?utf-8?B?ay9MYTNmTnBEVFZWRGRRSU9oNUlJVEo5TndVVkRMK1ROZ3JNaS9sSkFKWEx1?= =?utf-8?B?djliOUhqZ2lQc0dNellMcXErNkJ0aVkrZnk2MFRlRHFkNGcrMmN6Vi8rek5M?= =?utf-8?B?TGdtdWdaLzhKRG5RSFAwMTFxYzRUKzMzc1l0Y0pjNVdseFMyVGp5M2tzQjE0?= =?utf-8?B?RUplUFBPY0swcGZtOGFlNXhCQkp1NzN3MDVLWUVSYzVUMjZDbEt6cXE5T0J4?= =?utf-8?B?Q0lobkdsUG1IbVFSWEtSTmY3VUJKYmxhMWZhSFFTQXFvL3BSL25aMWpkWXlr?= =?utf-8?B?YkZLQnEydzB6amhPME1WdGlqNlNzc1pOYjRkSFd2WXlwZk5YQm5MRVBJa2VP?= =?utf-8?B?RzBTU29XVzRYbmhpRWJma1hxejlzUzlTUXZDTzFhTmkvSk5LaVpyL2JWc3g1?= =?utf-8?B?SnBJSThsQk5MZ1FnVzRIeGdwYVkzaHp4MExDT1BqTUxxaEdDVWp2aEYyMVBp?= =?utf-8?B?M2FFcUEzWnY3Yk1pQW83OG9Oai8vT05oMGdHbDI5elBTMFN0SXdTcmVTdUdE?= =?utf-8?B?Q1V5SW03c0swcE5OZmxZYVZpMDFMQWdFUHBzRTlZeUkzM1RQZ1lHMGUydnRN?= =?utf-8?B?d0VHMzFEQ2pEb2RKdzdKaXNENjNZT2RISVFHZWp4cVErUDViL0NFVGFWcVky?= =?utf-8?B?UStvTEFlcTAxL2ZFazh3Q2FBNlBEdForMjAva2JlTnQ3Nm5oWGM1WDFGdWFP?= =?utf-8?B?MjMrM2dDamV1dVQ0OXVUbUthRkt2Y2cwZEFZV2tSOWpuWTljbEpMY2ZNSDl2?= =?utf-8?B?TXhzamI5L2Y0eittcXpxMm0xT2FBSzBTZWZpVUhsMGtVVDQvbW5wT05ZOGcx?= =?utf-8?B?V1JOSXorNlVVR1BubXhrUk9CV2R5ajFha0ZnZUJoU2Y4aG82UTFQUkxGZStI?= =?utf-8?B?L1ZwYlM1UEpxL0JEejl3SWJjNy9DVnUvYW1wejI0WFFnclhFVW0xTExtTGp0?= =?utf-8?B?aWUxMmtQT2x5eW8wY3pJeitWNk5vTHAySUZsb0s1ZklSWEtnUWhiRmlxSWx6?= =?utf-8?B?ZjdRMHM2UlA1Vld4K1FYRVZsck4xMjMzREh5YVZRUTdKM0NmdGkwU3p5OGtx?= =?utf-8?B?aGV6YlBsL1d4OGgzTWo3RWZ0cEl6YTVNVkYrbDRqS0MxaEsrRE12SjhhZnBh?= =?utf-8?B?dGRHYnZhUEQxNlB0RWZ3alBEWTM0dG1hcDY3UDRXeW5Gd2J3TktxalFRbldk?= =?utf-8?B?d1k3YW5NdER0V0FIcTI1WU9rNERsbnVIUlY4YTZNSUJGV0tmQTdrR2xGUmZs?= =?utf-8?B?RGJ2TlYwN1gvY3NaYnhJYkwwZTVrRDMwdVptS0pNS3BsOVNkTnk0Y3dMOE1B?= =?utf-8?B?VFhzN0hTZGdDZnI3ZkVtZExqUmJGbEtQQ0RadXNzaDlsTzJaNExYQ3JaMWJs?= =?utf-8?B?UE44RHU2VC9UYUhYUkc3clAzbDVvSkRzUSswS1BmNDY4cjcwa2xCTTFCeGM5?= =?utf-8?B?QmpDaE9ybWNRdUxrUUgyVTQvWXhmUENaUjcrdVM1VHo0akREQk9VT2EwdEJz?= =?utf-8?B?alRGNVRHRzhCeThScVBwdmFKdWw2ODhUbFhwQ05tK3lDb3hpamdpVGdRPT0=?=
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtTTjFQUjA1TUIyMTg5OzY6aVpKbUE5eFNEMUhsTnJXaWZia0FWV09JUGhv?= =?utf-8?B?SFptSWkxVEJJOWdQeGtidzZFSjBNd1pkYmthNUxqTmhITkxEeUpueW5FV08z?= =?utf-8?B?bVRVTkpuZ29HRmhjMDdiZS9iQUtHajdvM0JINVRBQTBTYS9KcjBuaW5KS3Bi?= =?utf-8?B?b3BBM0xJVmQ3MHpRRFgzckFPOTQyRml5bUM3VlpUL2l4dS9SMWI2dmlFaFd4?= =?utf-8?B?cDVqMTZuaGhlS3RGZU1BbTdNeDcyTGlnMENSQTRXMm90aW5rdnF1aFYvYnF1?= =?utf-8?B?T0xoT2tCMXlZSUoyMHRHc0xKMG55MzFQK2ZRcWM2TTFGSisySUZ6K3k1TEM3?= =?utf-8?B?QUsySGxIdDFRVDRaQitVWTVjV0xLK3FSMDNDSVpCbFZ6Y2Q3NElpcDBEMjRl?= =?utf-8?B?ZHJySWF1UU8zeDB6OHJKcVVpN0VBQWQ2RTIzMFRXWUt1MnAxQnpsYWc1TDNH?= =?utf-8?B?NGJiN0I4dlZhaW5RNFJzUmxRT0h4VWZSQm9Ra1ArSW5VV3ZyVk4rS2ZBVk03?= =?utf-8?B?ejgwS2kxdVZ6ZkI3aFVFa000UEdJc01zT0JrV0dUY2FKaWs1blpoaForZFk2?= =?utf-8?B?MERpVWs1cVVFajEwR1JBTmhLOUt3djFPakhRTlRFd2N6VTVUdFJkMnBLbC83?= =?utf-8?B?YlhHTFZjT055OGNUMlF6K3JKNk4zSTI2QVdoR1Ewa3gwR2I2aVNvQkRHMVd2?= =?utf-8?B?SmNWUjIzZlBieGVhb21PZWxHK2tnYmZhc0d2aUhqeFFOdGFjbzFxZlRicGpL?= =?utf-8?B?dWgwbXd6V0E2NGFtV1ZUQ1d0VnVyV0hVM2dndDhyWW83VXNURmUyWFNuU29r?= =?utf-8?B?dEp1azZaeC9rTS9ZamxSUENuWEJFQWwwbHlHNnA3MEVXV1ZQMDZFM3RCaDRm?= =?utf-8?B?TmVnay9FTW1KRmVZamZTdFBNcE5qRm8yQVEwbER0bERjK04wUjkxUndlWmFD?= =?utf-8?B?WklGWXBiTlhyclR0Y2owS1RBZUNlbjVUTkplS3YrSjh5SjlSSExYQVJSYnIw?= =?utf-8?B?a2l0bXNHaUY1cGFFUlpzOForSTloa2hTWGxDZmJpYXVucXZFaHVSTERqWFJR?= =?utf-8?B?TUVGN3g0WElZbk52QXczelIxT0Y3eXdxR2hyQ2ExeStTN3JnNWlDVGc0czdD?= =?utf-8?B?bTIrY1htMjdRR3pwbXBnQnZPbHFXelJmTU1VTk1TeTdXVmtLcDMzSDM1L2VT?= =?utf-8?B?MDdZd2xsV0UvbFpPZ2FNUFVtMy9wcUY5SFNTQjk4T3ljdDd1bGFXWVl5YmpH?= =?utf-8?B?eFlVa01DT0ZNamtGVXdaYnVMQ09EYkp2NFBlWFNtNWU5SVpGYWp5M21IUnBv?= =?utf-8?B?Nllrd1NyWXJKTXdTakhZSTFVK1BzZWZtcmt6UnZWK3VoRkdIUC9KYVhpZ0c3?= =?utf-8?Q?G35S2eu?=
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2189; 5: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; 24:f5oo5Yd0l+AufUasr3gW9xkQ7u8hWktR67fillPn8o6zanHvy7AMltTABvLchK99+rpp0UkDHxbsEuINeE2bouB+hvjWtFN9C3CN4VFfCzY=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2189; 7: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
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Jul 2017 21:22:22.4787 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR05MB2189
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/PLQXYJT6EZ1tdUw1C7GVP0HjHWE>
Subject: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jul 2017 21:22:26 -0000

It seems to me that what this draft really proposes is a way to use BIER 
to create an NBMA (Non-Broadcast Multiple Access) data link on which PIM 
can be run.

If one looks at it that way, there is no interaction with the MVPN layer 
at all.  To MVPN, it looks like the P-tunnels or default-MDTs/data-MDTs 
are created by PIM.  The fact that the network core is acting like an 
NBMA data link is invisible to the application layer.  Thus I don't 
really understand why sections 5 ("ASM") and 6 ("MVPN") are needed.

There are a few questions that might deserve some more attention:

- Part of the proposal is that the Join/Prune messages are unicast, 
using a BIER  header with a single bit set in the BitString.  That will 
certainly work, but it's an unusual way to create a unicast tunnel.  I 
realize it does have the advantage of already including the BFIR-id in 
the encapsulation header.

- Since the BIER edge routers are PIM neighbors of each other, it seems 
like they should be multicasting PIM Hellos to each other. (The draft 
doesn't really say how the BIER edge routers running PIM are expected to 
identify each other; once they do identify each other, multicasting 
Hellos using BIER should be simple.)

- The lack of Join Suppression is worth at least mentioning.

- There are various PIM procedures that may or may not need to be 
modified to deal with an NBMA data link: DR election, Assert, etc.  If 
the usual PIM procedures need to be modified, that has to be discussed.  
(Even if they don't need to be modified, this should be discussed.)

- When a data packet is received, is it necessary to do an RPF check 
against the BFIR-id?  If so, then there is an issue of just what happens 
when a BFER (for a given data flow) changes from one tree to another 
(e.g., changes from the shared tree to the source tree); is the RPF 
check altered when a new Join is sent, or when the first data packet of 
the flow is received from the newly chosen tree, or somewhere in between?

- Will this work with BIDIR-PIM, or is that out of scope?



From nobody Mon Jul  3 15:07:07 2017
Return-Path: <ben@nostrum.com>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B22C13154D; Mon,  3 Jul 2017 15:07:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Ben Campbell <ben@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149911962555.16149.18220562584747883686.idtracker@ietfa.amsl.com>
Date: Mon, 03 Jul 2017 15:07:05 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/ZxI6oDiljLOmzEHpVwL_Xl_OJto>
Subject: [Bier] Ben Campbell's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jul 2017 22:07:05 -0000

Ben Campbell has entered the following ballot position for
draft-ietf-bier-architecture-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

It's not clear why this is experimental. What is the purpose or nature of the
experiment? What does one hope to learn from the results?

The document seems to go well beyond what I think of as architecture. Please
consider clarifying that in the title and intro.



From nobody Wed Jul  5 10:23:18 2017
Return-Path: <alissa@cooperw.in>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B59E0131DA3; Wed,  5 Jul 2017 10:23:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Alissa Cooper <alissa@cooperw.in>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149927538373.13537.9199064503158854739.idtracker@ietfa.amsl.com>
Date: Wed, 05 Jul 2017 10:23:03 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/V7O-iMeAYmqwqa1439rOjoFM9Uk>
Subject: [Bier] Alissa Cooper's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 17:23:07 -0000

Alissa Cooper has entered the following ballot position for
draft-ietf-bier-architecture-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I'm a bit confused about the experimental status of this document as well,
given that the other WG drafts that define protocol extensions to support BIER
seem to be headed for the standards track. If what is documented here really is
the only experimental part, this seems like the place to document the
experiment.



From nobody Wed Jul  5 10:24:28 2017
Return-Path: <alissa@cooperw.in>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC0C3131D4F; Wed,  5 Jul 2017 10:24:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level: 
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cooperw.in header.b=dz8xIFpN; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=lb/jum1I
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iHfmlfIfoycK; Wed,  5 Jul 2017 10:24:24 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C468131D93; Wed,  5 Jul 2017 10:24:23 -0700 (PDT)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id EB3B420A50; Wed,  5 Jul 2017 13:24:22 -0400 (EDT)
Received: from frontend1 ([10.202.2.160]) by compute7.internal (MEProxy); Wed, 05 Jul 2017 13:24:22 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cooperw.in; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc:x-sasl-enc; s=fm1; bh=6tY44R7HbYOpl3PstB /w70qokOg1mIilIqG/cGSnaVE=; b=dz8xIFpN75ULli5zV729YryvOply3sY+aQ qtcZUa9GcQAp66pW0+iFTMCRe2i//4048UuPHVIJDBoTYqGmTaljBvX5qAQykd3S jPj2YZVzAtRC+loD7x++6NGOK2G85fEPuLwvdLWdUhtpB7g80rby4luvImuOjXLA U+/C6BwVVIx8unQX+Tf6GDkK1T7kQrdgnfLbDxq0rVUTJXsuxUMBkwuZ3uJJUptw +vV78x6QovM+rJSso3lA9nLP/GYdOL9BFVrvx9rLjCM0WYI/wYIqdSiVxEs/nhc8 LGH4cTYbBEtcF+LA8iZzQbgHYSWQYojvNjXiMya8/KUvqf8BP6uA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc:x-sasl-enc; s= fm1; bh=6tY44R7HbYOpl3PstB/w70qokOg1mIilIqG/cGSnaVE=; b=lb/jum1I ika3kcpLWqORsNYQl4PdPGYf/SsNN5O3IJe5iE6h6QN8wyVecifHjHiMqQ/ufN6g 0hszlVOQ31acFHWxGOx2YxS/P5e9+sjZ+0cLXtx56ZTcj+IpPBSCHvDpSmUkycO7 EjVeHSjCDU9xun3kLVubeeH4cl1DAxm5V9rsVJQEEMBzqLsGPDcy1XblYVVE+pgQ WhXZsYDFpukoAY8h6FS/uhbAqlvfpQyuN44YNKodSmP4QI5AMQToD1qseiHiBjcl GrKIDMtls2nULQrawwNcSSsepantN5sjozmQDQw7QmVkzP/dQT6+kx5mJ0ECxH4v B8VlGPIVgxjE+g==
X-ME-Sender: <xms:xiBdWWlgX_xusl3pgAvzTKSFvqbefMvcDznZAW7D-SQ1HO4vTRPivQ>
X-Sasl-enc: FBlMYr5SFDy4jTkDbokHdlGJcUJUpB9r2DJO2bYfJmfs 1499275462
Received: from sjc-alcoop-8814.cisco.com (unknown [128.107.241.163]) by mail.messagingengine.com (Postfix) with ESMTPA id DC8737E6EE; Wed,  5 Jul 2017 13:24:21 -0400 (EDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Alissa Cooper <alissa@cooperw.in>
In-Reply-To: <149838804788.3251.829139224134758886@ietfa.amsl.com>
Date: Wed, 5 Jul 2017 13:24:19 -0400
Cc: gen-art <gen-art@ietf.org>, bier@ietf.org, draft-ietf-bier-architecture.all@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <B29AE477-E0B9-4245-9407-4FD7B805FAA3@cooperw.in>
References: <149838804788.3251.829139224134758886@ietfa.amsl.com>
To: Dan Romascanu <dromasca@gmail.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/4_GOpZnvw8j9rxZ34YWBZpDvHZ4>
Subject: Re: [Bier] [Gen-art] Genart last call review of draft-ietf-bier-architecture-07
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 17:24:27 -0000

Dan, thanks for your review. Authors, thanks for engaging with Dan=E2=80=99=
s review. I have entered a No Objection ballot position.

Alissa


> On Jun 25, 2017, at 6:54 AM, Dan Romascanu <dromasca@gmail.com> wrote:
>=20
> Reviewer: Dan Romascanu
> Review result: Ready with Issues
>=20
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
>=20
> For more information, please see the FAQ at
>=20
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
>=20
> Document: draft-ietf-bier-architecture-??
> Reviewer: Dan Romascanu
> Review Date: 2017-06-25
> IETF LC End Date: 2017-06-29
> IESG Telechat date: 2017-07-06
>=20
> Summary:
>=20
> This document specifies a new architecture known as "Bit Index =
Explicit
> Replication" (BIER) for the forwarding of multicast data packets =
through a
> "multicast domain".  It does not require a protocol for explicitly =
building
> multicast distribution trees, nor does it require intermediate nodes =
to
> maintain any per-flow state. This architecture is .  While the =
Abstract and
> Introduction of the document mentions Architecture as the principal =
scope, this
> document goes well beyond the scope of a typical architectural =
document.
> including detailed definitions of the procedures, terminology and =
normative
> algorithms required for BIER.
>=20
> The document is clear and detailed. Because of its structure, I am =
missing some
> information that usually can be found in architecture documents. I =
included
> these in the 'minor issues' list. Although none of these may be a =
show-stopper,
> I believe that addressing these before document approval can improve =
the
> quality of the document and of the overall BIER work.
>=20
> Major issues:
>=20
> Minor issues:
>=20
> 1. As the document is targeting 'Experimental' it would be useful to =
mention
> what is the scope of the experiment. The charter actually says:
>=20
> ' The scope of the experiment will be
> documented in the output of the Working Group.'
>=20
> Would not the Architecture document be the right place for this? If =
not, is
> there another document that deals or is planned to define the scope of =
the
> experiment?
>=20
> 2. While the Abstract and Introduction of the document mentions =
Architecture as
> the principal scope, this document is different from a typical =
architectural
> document. While it defines well the procedures, terminology and =
normative
> algorithms required for BIER Intra-domain forwarding, it goes well =
beyond the
> level of detail that other similar documents go. Specifications of the
> procedures and normative algorithm should be mentioned in Abstract and
> Introduction, they occupy the same or more space than architecture.
>=20
> 3. On the other hand I am missing the relationship with other work =
items in the
> BIER charter - there is no manageability section for example, there is =
no
> reference to the performance impact in networks. Maybe these are dealt =
with in
> a different document or documents or BIER, if so it would be good at =
least to
> mention and reference these here.
>=20
> 4. I also would have expected the architecture document to refer the =
use cases
> document and note which of the use cases are being addressed and how -
> draft-ietf-bier-use-cases is not even included in the references.
>=20
> 5. Sections 3 to 6 mentioned repeatedly provisioning. As there is no =
Operations
> and Manageability section as in many other Routing Area documents, it =
is not
> clear how this is expected to happen. For example =
draft-ietf-bier-bier-yang is
> not mentioned or referred. I suggest adding a note (and maybe =
references) for
> clarity.
>=20
> 6. In section 8 I found:
>=20
> 'Every BFR must be provisioned to know which of its interfaces lead to
>   a BIER domain and which do not.  If two interfaces lead to different
>   BIER domains, the BFR must be provisioned to know that those two
>   interfaces lead to different BIER domains. '
>=20
> It seems that the two 'must' in these sentences would rather be =
capitalized.
>=20
> Nits/editorial comments:
>=20
>=20
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art


From nobody Wed Jul  5 10:33:12 2017
Return-Path: <akatlas@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 606DC131D79; Wed,  5 Jul 2017 10:33:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ozdJbb04maRZ; Wed,  5 Jul 2017 10:33:07 -0700 (PDT)
Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com [IPv6:2a00:1450:400c:c0c::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 44B9C13013C; Wed,  5 Jul 2017 10:33:07 -0700 (PDT)
Received: by mail-wr0-x232.google.com with SMTP id c11so266851086wrc.3; Wed, 05 Jul 2017 10:33:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ShH10azF8DPSvXY8oNTs3Ntwhhu9msg8xnFuK6ctOSo=; b=Df84TpSSjHgOet4J07dQaSAAr8hEe4ZE1zG7jEC9q18Drh6s4Csvrm3CwnUbAoOG0b I0b6vuqfhs8sHiVnVxl6it9PWJfr7ZBqhC/yExzTtGA4Rfo/0VhkUkQfS01QvcOGN1Sr FPs6vHfF+tXdG+lVGUn4/A18q4H4jpuciz9gNBcDFqFlmbZ8/ghT+f6vrNOKiEVw86ZZ DrySBFMo1kfYcwFm4skFpSTjoaAxsvsFx8LQRRVi2wWkuOHX0fICzMtz8PoiIXdb7Vbm /euCsXqW5T3xb7klobH4KdsxwD/d+jLtf1y2pQGnjOhDhlyfb0WuRg7KUIc0T/vSoH+e LXPw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ShH10azF8DPSvXY8oNTs3Ntwhhu9msg8xnFuK6ctOSo=; b=M0V+6LvECAgE6wbbVpQxKH0nOChYAoDLNyxzGLBBqYKiueVsVJXXqscWV1Wk9KXzb1 luYZiSuHfPcwKM9X7ecliclfq1w0gGPplKU0l0xdvU7a+YyZyrvs+0ENa1IAxnoVK+yU hVzCWEJJf49q9m9kEhwr1bf3oZTHwHpcJ3p5wDG6/BnRxIkayeAFhDpuqpvZI7cQ9EV9 DCVYR0epjUcej35Zs+UIULBjECV3SCb5EYr3m0pvSSrTVGlpqStCoK7bna4oONGCP9FK mPDlMHwto7F4+5u+pEJbs1JHMsaQ6Yvq6BxGWoniN7ZW3MChzYyIJKR4qoTp9cBUsAdO kBfA==
X-Gm-Message-State: AKS2vOy0aXcd3maf2oqVnS9UA0LaHEBy6rK+2NgeI3hT5m6p5Te3+OXC Hp67UV4ZJFVM+5vyWmDYVYnHsdsQd5G2
X-Received: by 10.223.133.99 with SMTP id 90mr41798046wrh.44.1499275985665; Wed, 05 Jul 2017 10:33:05 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.130.179 with HTTP; Wed, 5 Jul 2017 10:33:05 -0700 (PDT)
In-Reply-To: <149927538373.13537.9199064503158854739.idtracker@ietfa.amsl.com>
References: <149927538373.13537.9199064503158854739.idtracker@ietfa.amsl.com>
From: Alia Atlas <akatlas@gmail.com>
Date: Wed, 5 Jul 2017 13:33:05 -0400
Message-ID: <CAG4d1re4gRbJrLVZ_vP81pjWJa3MMkKtzymohzr-HG5BuQ7huQ@mail.gmail.com>
To: Alissa Cooper <alissa@cooperw.in>
Cc: The IESG <iesg@ietf.org>, draft-ietf-bier-architecture@ietf.org,  Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, bier-chairs@ietf.org
Content-Type: multipart/alternative; boundary="94eb2c0d293e8bc67f0553956476"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Bl71kYOVHM5FC0GgqtZq-Nhnwvc>
Subject: Re: [Bier] Alissa Cooper's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 17:33:10 -0000

--94eb2c0d293e8bc67f0553956476
Content-Type: text/plain; charset="UTF-8"

The entire WG is chartered as Experimental.  There is a document in the
charter (item 9) to justify progressing this work onto the Standards
Track.  The protocol extension drafts are going to be Experimental for now
as well. This is precisely at the narrow point of the hourglass - a
multicast encapsulation to go with IP.

Regards,
Alia

On Wed, Jul 5, 2017 at 1:23 PM, Alissa Cooper <alissa@cooperw.in> wrote:

> Alissa Cooper has entered the following ballot position for
> draft-ietf-bier-architecture-07: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> I'm a bit confused about the experimental status of this document as well,
> given that the other WG drafts that define protocol extensions to support
> BIER
> seem to be headed for the standards track. If what is documented here
> really is
> the only experimental part, this seems like the place to document the
> experiment.
>
>
>

--94eb2c0d293e8bc67f0553956476
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">The entire WG is chartered as Experimental.=C2=A0 There is=
 a document in the charter (item 9) to justify progressing this work onto t=
he Standards Track.=C2=A0 The protocol extension drafts are going to be Exp=
erimental for now as well. This is precisely at the narrow point of the hou=
rglass - a multicast encapsulation to go with IP. =C2=A0<div><br></div><div=
>Regards,</div><div>Alia</div></div><div class=3D"gmail_extra"><br><div cla=
ss=3D"gmail_quote">On Wed, Jul 5, 2017 at 1:23 PM, Alissa Cooper <span dir=
=3D"ltr">&lt;<a href=3D"mailto:alissa@cooperw.in" target=3D"_blank">alissa@=
cooperw.in</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Alissa C=
ooper has entered the following ballot position for<br>
draft-ietf-bier-architecture-<wbr>07: No Objection<br>
<br>
When responding, please keep the subject line intact and reply to all<br>
email addresses included in the To and CC lines. (Feel free to cut this<br>
introductory paragraph, however.)<br>
<br>
<br>
Please refer to <a href=3D"https://www.ietf.org/iesg/statement/discuss-crit=
eria.html" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/iesg/<=
wbr>statement/discuss-criteria.<wbr>html</a><br>
for more information about IESG DISCUSS and COMMENT positions.<br>
<br>
<br>
The document, along with other ballot positions, can be found here:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/" =
rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/=
draft-ietf-bier-<wbr>architecture/</a><br>
<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
COMMENT:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
I&#39;m a bit confused about the experimental status of this document as we=
ll,<br>
given that the other WG drafts that define protocol extensions to support B=
IER<br>
seem to be headed for the standards track. If what is documented here reall=
y is<br>
the only experimental part, this seems like the place to document the<br>
experiment.<br>
<br>
<br>
</blockquote></div><br></div>

--94eb2c0d293e8bc67f0553956476--


From nobody Wed Jul  5 10:59:38 2017
Return-Path: <warren@kumari.net>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 22FF6131563; Wed,  5 Jul 2017 10:59:26 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Warren Kumari <warren@kumari.net>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149927756613.15707.13754544986148742324.idtracker@ietfa.amsl.com>
Date: Wed, 05 Jul 2017 10:59:26 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/7K5fkGa4x_vqGDZ_zoa3O84NtoE>
Subject: [Bier] Warren Kumari's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 17:59:26 -0000

Warren Kumari has entered the following ballot position for
draft-ietf-bier-architecture-07: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

I agree with Ben, but feel more strongly than him - why is this Experimental?
Where is the experiment / how do you determine if it is successful? The
shepherd writeup says: "(1) Experimental, as per charter. The document title
page header indicates experimental. ", but this doesn't really answer the
question; the charter says: "BIER is initially chartered to do experimental
work on this new multicast forwarding mechanism as follows:

1) BIER architecture: The WG will publish an architecture, based
upon draft-wijnands-bier-architecture-04...."

I really think that this document should be Informational or PS, or something.
I can understand the *work* to be experimental in nature, but the document
*itself* seems like it shouldn't be - it doesn't (really) explain how to
implement.

I'm making this a DISCUSS, but am more than happy to clear if the chairs / AD
says that the've considered this and Experimental really is best.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Notes:
Section 1:
"If the packet also needs to be sent to a BFER whose BFR-id is 257, the BFIR
would have to create a second copy of the packet, and the BIER encapsulation
would specify an SI of 1, and a BitString with bit 1 set and all the other bits
clear." - while reading this it seemed to me that it would be much simpler to
do away with the SI completely and just make the BitString N bits longer
(instead of having e.g a one octet SI and 2 octet BitString, concatenate this
and have a 3 octet BitString). It was only when I got down to Section 3 that I
discovered that this is (kinda) discussed, and that each SI can have a
different BitString length. I'd suggest adding a refernce (like: "and a
BitString with bit 1 set and all the other bits clear (see Section 3 for more
details)."

Section 4.1.  The Routing Underlay:
"Alternatively, one could deploy a routing underlay that creates a
multicast-specific tree of some sort, perhaps a Steiner tree." A reference for
Steiner trees would be nice -- best I could find was probably the WA page at:
Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource.
http://mathworld.wolfram.com/SteinerTree.html Please note: I'd pay good money
for a router doing Steiner optimizations using the soap and surface tension
trick.

Nits and notes:
1: " A router that supports BIER is known as a "Bit-Forwarding Router" (BFR)."
-- this makes me sad; the BFR acronym was already in use, and had interesting
history behind it (Big er... Fast Router) -
http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A

2: "MVPN signaling also has several components that depend on the
   type of "tunneling technology" used to carry multicast data though
   the network." -- though the network what?! I suspect you meant "through" :-)
3: Section 6.1.  Overview
"If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and
BitString identify that BFR itself, ..." -- identifies.

O: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it
of course decapsulates..." P: "When BIER on a BFER is to pass a packet to the
multicast flow overlay, it, of course decapsulates" C: Missing a comma. I
suspect: "When BIER on a BFER is to pass a packet to the multicast flow
overlay, it decapsulates..." would be even better.

Section 6.9.  When Some Nodes do not Support BIER
"In this section, we assume that the routing underlay is an SPF-based IGP that
computes a shortest path tree from each node to all other nodes in the domain."
C: I *think* that this should actually be "the shortest path", but I'm not
sure; everything talks about e.g Dijkstra's algorithm finding the shortest
path, but what if there are multiple equal cost paths? But, this is a singular
tree, but may not be unique, so any SP tree will... erk... Good this this is a
nit and I can move on :-)

Section 6.10.3.  Transitioning from One BitStringLength to Another
Typo:  Dispostion ->  Disposition



From nobody Wed Jul  5 11:11:01 2017
Return-Path: <akatlas@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77B1E131D80; Wed,  5 Jul 2017 11:10:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4t18HpsnoJnY; Wed,  5 Jul 2017 11:10:56 -0700 (PDT)
Received: from mail-wr0-x230.google.com (mail-wr0-x230.google.com [IPv6:2a00:1450:400c:c0c::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E801312EBF9; Wed,  5 Jul 2017 11:10:55 -0700 (PDT)
Received: by mail-wr0-x230.google.com with SMTP id k67so266541550wrc.2; Wed, 05 Jul 2017 11:10:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=kJn+UWXdSoSaHMBDMT0uEqlp1fzyvFudSkiIZtZbi8A=; b=q8nWDTkKc0vAGB/wmfyfhQ8e8YsCe07c7NoFNDq0d2WcAYHnfJluUUGwXj449PWZwP InjfczE/rr2V1Y5tMYWj10gqvI3peL2/B3sOp6OtvRkOvifG48ax947D+vYm0PlqWEVT fDfie5MblV1sHsUisgUFQ/cUi/dT1ishTgUSOxJIwXLi31C9A4QDO2wYMqlHuY1Reyu3 nQ4YiVWFLs0urxWwcrtwhQSBEUCo2DoC8sm2fMz9xs+jPH8RBmWIq1nPey0YczifpMqT zbmTo5cxKvJ6NDDd+V3jHieTWsoIwp0l3u0MqCjShHLdS7UGu36O7B4RWniYm5GGjKzg 7rRQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=kJn+UWXdSoSaHMBDMT0uEqlp1fzyvFudSkiIZtZbi8A=; b=KODp0RT51Pryc0+ONZl/9+9Jbq6F4b5qUPqcCwhuJ/cbpPTXvCH4AuMFz6yWt+mFwO WIBLImVUQqZE5aRAuJ6F3LDuu4RzekadK8hArUVDrRttSlDuxQeBNOSUMYXESLjft30/ XdRH4Guj0twsXPhVkgba6jpltKtoHgkxDUQX2C5E6mcfjT8Vor8U/+FOgY0u3go+pcQ1 yC52ZHjWKH/6fZ6dHi9lMuT1HUEFafnShl0VqEYRnpvHqM9sQqDHwK+De+EeckXrKle8 bSBfBwyBYZc1ulP6QX3YsbTeaRXDttSu5t4PgkPrwgqSP9uru41FhiNcO8fiLlp9+GId AIHA==
X-Gm-Message-State: AKS2vOyeN9WXetjtKQJ6FmHDLnGWMFaO2rtwoTx9H83dPQtUUFmrT8hA 0ZPVkjjo1xVqnWJGqegIJwBrIJrPHg==
X-Received: by 10.223.179.193 with SMTP id x1mr31147237wrd.86.1499278254338; Wed, 05 Jul 2017 11:10:54 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.130.179 with HTTP; Wed, 5 Jul 2017 11:10:53 -0700 (PDT)
In-Reply-To: <149927756613.15707.13754544986148742324.idtracker@ietfa.amsl.com>
References: <149927756613.15707.13754544986148742324.idtracker@ietfa.amsl.com>
From: Alia Atlas <akatlas@gmail.com>
Date: Wed, 5 Jul 2017 14:10:53 -0400
Message-ID: <CAG4d1reQ+8=6-n1YLMSrOy5tPGYBmkmm6m_fQXm6QOHYArS81Q@mail.gmail.com>
To: Warren Kumari <warren@kumari.net>
Cc: The IESG <iesg@ietf.org>, draft-ietf-bier-architecture@ietf.org,  Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, bier-chairs@ietf.org
Content-Type: multipart/alternative; boundary="f40304389718c50410055395ebb3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/KLrSYQIpaB29bXL2jB_dByUWLeI>
Subject: Re: [Bier] Warren Kumari's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 18:11:00 -0000

--f40304389718c50410055395ebb3
Content-Type: text/plain; charset="UTF-8"

Hi Warren,

On Wed, Jul 5, 2017 at 1:59 PM, Warren Kumari <warren@kumari.net> wrote:

> Warren Kumari has entered the following ballot position for
> draft-ietf-bier-architecture-07: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> I agree with Ben, but feel more strongly than him - why is this
> Experimental?
> Where is the experiment / how do you determine if it is successful? The
> shepherd writeup says: "(1) Experimental, as per charter. The document
> title
> page header indicates experimental. ", but this doesn't really answer the
> question; the charter says: "BIER is initially chartered to do experimental
> work on this new multicast forwarding mechanism as follows:
>
> 1) BIER architecture: The WG will publish an architecture, based
> upon draft-wijnands-bier-architecture-04...."
>
> I really think that this document should be Informational or PS, or
> something.
> I can understand the *work* to be experimental in nature, but the document
> *itself* seems like it shouldn't be - it doesn't (really) explain how to
> implement.
>

The document is defining a novel look-up and forwarding mechanism to use for
multicast that replaces longest-prefix-match used for unicast.  This is
where it is
defined.  That needs to experimental or standards track.

In the BIER Charter, work item 9 describes a document based on deployment
experience that can justify moving the BIER work from Experimental to
Standards
Track.  When I chartered the WG, it wasn't clear whether it was merely a
good idea
or a good idea with enough motivations towards deployment that it is worth
complicating
the architecture at the narrow point of the IP hourglass.

If the IESG wants to discuss whether it makes sense to recharter in the
absence of
deployment experience such that BIER will need to be considered for the
Internet
architecture moving forwards, I am certainly willing to have that
discussion.

I did discuss with the BIER WG that it is possible to do a status update to
move a
document from Experimental to Proposed Standard without needing to update
the RFC.
That is what I would anticipate happening with this document and others (in
my queue
and soon to be in ours) if and when BIER is rechartered to do Standards
Track work.

Regards,
Alia


> I'm making this a DISCUSS, but am more than happy to clear if the chairs /
> AD
> says that the've considered this and Experimental really is best.
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Notes:
> Section 1:
> "If the packet also needs to be sent to a BFER whose BFR-id is 257, the
> BFIR
> would have to create a second copy of the packet, and the BIER
> encapsulation
> would specify an SI of 1, and a BitString with bit 1 set and all the other
> bits
> clear." - while reading this it seemed to me that it would be much simpler
> to
> do away with the SI completely and just make the BitString N bits longer
> (instead of having e.g a one octet SI and 2 octet BitString, concatenate
> this
> and have a 3 octet BitString). It was only when I got down to Section 3
> that I
> discovered that this is (kinda) discussed, and that each SI can have a
> different BitString length. I'd suggest adding a refernce (like: "and a
> BitString with bit 1 set and all the other bits clear (see Section 3 for
> more
> details)."
>
> Section 4.1.  The Routing Underlay:
> "Alternatively, one could deploy a routing underlay that creates a
> multicast-specific tree of some sort, perhaps a Steiner tree." A reference
> for
> Steiner trees would be nice -- best I could find was probably the WA page
> at:
> Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource.
> http://mathworld.wolfram.com/SteinerTree.html Please note: I'd pay good
> money
> for a router doing Steiner optimizations using the soap and surface tension
> trick.
>
> Nits and notes:
> 1: " A router that supports BIER is known as a "Bit-Forwarding Router"
> (BFR)."
> -- this makes me sad; the BFR acronym was already in use, and had
> interesting
> history behind it (Big er... Fast Router) -
> http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A
>
> 2: "MVPN signaling also has several components that depend on the
>    type of "tunneling technology" used to carry multicast data though
>    the network." -- though the network what?! I suspect you meant
> "through" :-)
> 3: Section 6.1.  Overview
> "If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and
> BitString identify that BFR itself, ..." -- identifies.
>
> O: "When BIER on a BFER is to pass a packet to the multicast flow overlay,
> it
> of course decapsulates..." P: "When BIER on a BFER is to pass a packet to
> the
> multicast flow overlay, it, of course decapsulates" C: Missing a comma. I
> suspect: "When BIER on a BFER is to pass a packet to the multicast flow
> overlay, it decapsulates..." would be even better.
>
> Section 6.9.  When Some Nodes do not Support BIER
> "In this section, we assume that the routing underlay is an SPF-based IGP
> that
> computes a shortest path tree from each node to all other nodes in the
> domain."
> C: I *think* that this should actually be "the shortest path", but I'm not
> sure; everything talks about e.g Dijkstra's algorithm finding the shortest
> path, but what if there are multiple equal cost paths? But, this is a
> singular
> tree, but may not be unique, so any SP tree will... erk... Good this this
> is a
> nit and I can move on :-)
>
> Section 6.10.3.  Transitioning from One BitStringLength to Another
> Typo:  Dispostion ->  Disposition
>
>
>

--f40304389718c50410055395ebb3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Warren,<div class=3D"gmail_extra"><br><div class=3D"gma=
il_quote">On Wed, Jul 5, 2017 at 1:59 PM, Warren Kumari <span dir=3D"ltr">&=
lt;<a href=3D"mailto:warren@kumari.net" target=3D"_blank">warren@kumari.net=
</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Warren Kumari has =
entered the following ballot position for<br>
draft-ietf-bier-architecture-<wbr>07: Discuss<br>
<br>
When responding, please keep the subject line intact and reply to all<br>
email addresses included in the To and CC lines. (Feel free to cut this<br>
introductory paragraph, however.)<br>
<br>
<br>
Please refer to <a href=3D"https://www.ietf.org/iesg/statement/discuss-crit=
eria.html" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/iesg/<=
wbr>statement/discuss-criteria.<wbr>html</a><br>
for more information about IESG DISCUSS and COMMENT positions.<br>
<br>
<br>
The document, along with other ballot positions, can be found here:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/" =
rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/=
draft-ietf-bier-<wbr>architecture/</a><br>
<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
DISCUSS:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
I agree with Ben, but feel more strongly than him - why is this Experimenta=
l?<br>
Where is the experiment / how do you determine if it is successful? The<br>
shepherd writeup says: &quot;(1) Experimental, as per charter. The document=
 title<br>
page header indicates experimental. &quot;, but this doesn&#39;t really ans=
wer the<br>
question; the charter says: &quot;BIER is initially chartered to do experim=
ental<br>
work on this new multicast forwarding mechanism as follows:<br>
<br>
1) BIER architecture: The WG will publish an architecture, based<br>
upon draft-wijnands-bier-<wbr>architecture-04....&quot;<br>
<br>
I really think that this document should be Informational or PS, or somethi=
ng.<br>
I can understand the *work* to be experimental in nature, but the document<=
br>
*itself* seems like it shouldn&#39;t be - it doesn&#39;t (really) explain h=
ow to<br>
implement.<br></blockquote><div><br></div><div>The document is defining a n=
ovel look-up and forwarding mechanism to use for</div><div>multicast that r=
eplaces longest-prefix-match used for unicast.=C2=A0 This is where it is</d=
iv><div>defined.=C2=A0 That needs to experimental or standards track.</div>=
<div><br></div><div>In the BIER Charter, work item 9 describes a document b=
ased on deployment</div><div>experience that can justify moving the BIER wo=
rk from Experimental to Standards</div><div>Track.=C2=A0 When I chartered t=
he WG, it wasn&#39;t clear whether it was merely a good idea</div><div>or a=
 good idea with enough motivations towards deployment that it is worth comp=
licating</div><div>the architecture at the narrow point of the IP hourglass=
.</div><div><br></div><div>If the IESG wants to discuss whether it makes se=
nse to recharter in the absence of</div><div>deployment experience such tha=
t BIER will need to be considered for the Internet</div><div>architecture m=
oving forwards, I am certainly willing to have that discussion.</div><div><=
br></div><div>I did discuss with the BIER WG that it is possible to do a st=
atus update to move a</div><div>document from Experimental to Proposed Stan=
dard without needing to update the RFC.</div><div>That is what I would anti=
cipate happening with this document and others (in my queue</div><div>and s=
oon to be in ours) if and when BIER is rechartered to do Standards Track wo=
rk.=C2=A0</div><div><br></div><div>Regards,</div><div>Alia</div><div>=C2=A0=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex">
I&#39;m making this a DISCUSS, but am more than happy to clear if the chair=
s / AD<br>
says that the&#39;ve considered this and Experimental really is best.<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
COMMENT:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
Notes:<br>
Section 1:<br>
&quot;If the packet also needs to be sent to a BFER whose BFR-id is 257, th=
e BFIR<br>
would have to create a second copy of the packet, and the BIER encapsulatio=
n<br>
would specify an SI of 1, and a BitString with bit 1 set and all the other =
bits<br>
clear.&quot; - while reading this it seemed to me that it would be much sim=
pler to<br>
do away with the SI completely and just make the BitString N bits longer<br=
>
(instead of having e.g a one octet SI and 2 octet BitString, concatenate th=
is<br>
and have a 3 octet BitString). It was only when I got down to Section 3 tha=
t I<br>
discovered that this is (kinda) discussed, and that each SI can have a<br>
different BitString length. I&#39;d suggest adding a refernce (like: &quot;=
and a<br>
BitString with bit 1 set and all the other bits clear (see Section 3 for mo=
re<br>
details).&quot;<br>
<br>
Section 4.1.=C2=A0 The Routing Underlay:<br>
&quot;Alternatively, one could deploy a routing underlay that creates a<br>
multicast-specific tree of some sort, perhaps a Steiner tree.&quot; A refer=
ence for<br>
Steiner trees would be nice -- best I could find was probably the WA page a=
t:<br>
Weisstein, Eric W. &quot;Steiner Tree.&quot; From MathWorld--A Wolfram Web =
Resource.<br>
<a href=3D"http://mathworld.wolfram.com/SteinerTree.html" rel=3D"noreferrer=
" target=3D"_blank">http://mathworld.wolfram.com/<wbr>SteinerTree.html</a> =
Please note: I&#39;d pay good money<br>
for a router doing Steiner optimizations using the soap and surface tension=
<br>
trick.<br>
<br>
Nits and notes:<br>
1: &quot; A router that supports BIER is known as a &quot;Bit-Forwarding Ro=
uter&quot; (BFR).&quot;<br>
-- this makes me sad; the BFR acronym was already in use, and had interesti=
ng<br>
history behind it (Big er... Fast Router) -<br>
<a href=3D"http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A" rel=
=3D"noreferrer" target=3D"_blank">http://photos.kumari.net/<wbr>Technology/=
Networking/i-<wbr>k4vCdwv/A</a><br>
<br>
2: &quot;MVPN signaling also has several components that depend on the<br>
=C2=A0 =C2=A0type of &quot;tunneling technology&quot; used to carry multica=
st data though<br>
=C2=A0 =C2=A0the network.&quot; -- though the network what?! I suspect you =
meant &quot;through&quot; :-)<br>
3: Section 6.1.=C2=A0 Overview<br>
&quot;If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and=
<br>
BitString identify that BFR itself, ...&quot; -- identifies.<br>
<br>
O: &quot;When BIER on a BFER is to pass a packet to the multicast flow over=
lay, it<br>
of course decapsulates...&quot; P: &quot;When BIER on a BFER is to pass a p=
acket to the<br>
multicast flow overlay, it, of course decapsulates&quot; C: Missing a comma=
. I<br>
suspect: &quot;When BIER on a BFER is to pass a packet to the multicast flo=
w<br>
overlay, it decapsulates...&quot; would be even better.<br>
<br>
Section 6.9.=C2=A0 When Some Nodes do not Support BIER<br>
&quot;In this section, we assume that the routing underlay is an SPF-based =
IGP that<br>
computes a shortest path tree from each node to all other nodes in the doma=
in.&quot;<br>
C: I *think* that this should actually be &quot;the shortest path&quot;, bu=
t I&#39;m not<br>
sure; everything talks about e.g Dijkstra&#39;s algorithm finding the short=
est<br>
path, but what if there are multiple equal cost paths? But, this is a singu=
lar<br>
tree, but may not be unique, so any SP tree will... erk... Good this this i=
s a<br>
nit and I can move on :-)<br>
<br>
Section 6.10.3.=C2=A0 Transitioning from One BitStringLength to Another<br>
Typo:=C2=A0 Dispostion -&gt;=C2=A0 Disposition<br>
<br>
<br>
</blockquote></div><br></div></div>

--f40304389718c50410055395ebb3--


From nobody Wed Jul  5 12:23:13 2017
Return-Path: <warren@kumari.net>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D9295131479; Wed,  5 Jul 2017 12:22:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Warren Kumari <warren@kumari.net>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com>
Date: Wed, 05 Jul 2017 12:22:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/j3Q8XQ0lVEPlDJanEZkl_tYBvBw>
Subject: [Bier] Warren Kumari's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 19:22:56 -0000

Warren Kumari has entered the following ballot position for
draft-ietf-bier-architecture-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

[ After response from Alia I'm clearing my discuss. I still somewhat feel that
an Architecture document which discusses an experimental protocol / idea
doesn't need to be Experimental itself, but a: I don't feel it very strongly /
could be wrong, and b: her "I did discuss with the BIER WG that it is possible
to do a status update to move a document from Experimental to Proposed Standard
without needing to update the RFC." makes me happy.  I'm copying my original
discuss comment below for hysterical raisins. ]

Notes:
Section 1:
"If the packet also needs to be sent to a BFER whose BFR-id is 257, the BFIR
would have to create a second copy of the packet, and the BIER encapsulation
would specify an SI of 1, and a BitString with bit 1 set and all the other bits
clear." - while reading this it seemed to me that it would be much simpler to
do away with the SI completely and just make the BitString N bits longer
(instead of having e.g a one octet SI and 2 octet BitString, concatenate this
and have a 3 octet BitString). It was only when I got down to Section 3 that I
discovered that this is (kinda) discussed, and that each SI can have a
different BitString length. I'd suggest adding a refernce (like: "and a
BitString with bit 1 set and all the other bits clear (see Section 3 for more
details)."

Section 4.1.  The Routing Underlay:
"Alternatively, one could deploy a routing underlay that creates a
multicast-specific tree of some sort, perhaps a Steiner tree." A reference for
Steiner trees would be nice -- best I could find was probably the WA page at:
Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource.
http://mathworld.wolfram.com/SteinerTree.html Please note: I'd pay good money
for a router doing Steiner optimizations using the soap and surface tension
trick.

Nits and notes:
1: " A router that supports BIER is known as a "Bit-Forwarding Router" (BFR)."
-- this makes me sad; the BFR acronym was already in use, and had interesting
history behind it (Big er... Fast Router) -
http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A

2: "MVPN signaling also has several components that depend on the
   type of "tunneling technology" used to carry multicast data though
   the network." -- though the network what?! I suspect you meant "through" :-)
3: Section 6.1.  Overview
"If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and
BitString identify that BFR itself, ..." -- identifies.

O: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it
of course decapsulates..." P: "When BIER on a BFER is to pass a packet to the
multicast flow overlay, it, of course decapsulates" C: Missing a comma. I
suspect: "When BIER on a BFER is to pass a packet to the multicast flow
overlay, it decapsulates..." would be even better.

Section 6.9.  When Some Nodes do not Support BIER
"In this section, we assume that the routing underlay is an SPF-based IGP that
computes a shortest path tree from each node to all other nodes in the domain."
C: I *think* that this should actually be "the shortest path", but I'm not
sure; everything talks about e.g Dijkstra's algorithm finding the shortest
path, but what if there are multiple equal cost paths? But, this is a singular
tree, but may not be unique, so any SP tree will... erk... Good this this is a
nit and I can move on :-)

Section 6.10.3.  Transitioning from One BitStringLength to Another
Typo:  Dispostion ->  Disposition

------ ORIGINAL DISCUSS TEXT ----
I agree with Ben, but feel more strongly than him - why is this Experimental?
Where is the experiment / how do you determine if it is successful? The
shepherd writeup says: "(1) Experimental, as per charter. The document title
page header indicates experimental. ", but this doesn't really answer the
question; the charter says: "BIER is initially chartered to do experimental
work on this new multicast forwarding mechanism as follows:

1) BIER architecture: The WG will publish an architecture, based
upon draft-wijnands-bier-architecture-04...."

I really think that this document should be Informational or PS, or something.
I can understand the *work* to be experimental in nature, but the document
*itself* seems like it shouldn't be - it doesn't (really) explain how to
implement.

I'm making this a DISCUSS, but am more than happy to clear if the chairs / AD
says that the've considered this and Experimental really is best.



From nobody Wed Jul  5 13:08:32 2017
Return-Path: <erosen@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F40C612EA58; Wed,  5 Jul 2017 13:08:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.021
X-Spam-Level: 
X-Spam-Status: No, score=-2.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id avYwIrFMihKr; Wed,  5 Jul 2017 13:08:24 -0700 (PDT)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0120.outbound.protection.outlook.com [104.47.32.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5A9C131A36; Wed,  5 Jul 2017 13:08:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=JnqORcpe2aqa4qeNkcG7QNZw/lbhfmfnqw7I/bj6KnM=; b=S2P+hdMvTVFcRtUNF4yPzvTFAL600E5R95U2+wNKGQtY05f/dAuydOkLzSqBoCV3Ef0kLibnFLgaRrRMGHYTCq9UtwpiuYMSJoAC2b3HpD4CkxuO5qH9IMWSd68p9V3IaVZy8gVu1THFk66roVBb4z8MeCLYkPN+rY/1lbLqx0w=
Authentication-Results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.33.45] (66.129.241.14) by BL2PR05MB2177.namprd05.prod.outlook.com (2a01:111:e400:c74e::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.6; Wed, 5 Jul 2017 20:08:18 +0000
To: Warren Kumari <warren@kumari.net>, The IESG <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, bier@ietf.org
References: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <46b9c2e5-f4dc-7fbd-7b6b-72de693af9ae@juniper.net>
Date: Wed, 5 Jul 2017 16:08:08 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-Originating-IP: [66.129.241.14]
X-ClientProxiedBy: DM5PR21CA0012.namprd21.prod.outlook.com (2603:10b6:3:ac::22) To BL2PR05MB2177.namprd05.prod.outlook.com (2a01:111:e400:c74e::9)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8a67efb2-2aa3-4bc5-eecc-08d4c3e194e5
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BL2PR05MB2177; 
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2177; 3: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
X-MS-TrafficTypeDiagnostic: BL2PR05MB2177:
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2177; 25: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
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2177; 31: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
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2177; 20: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
X-Microsoft-Antispam-PRVS: <BL2PR05MB2177EFFB02717C2030E7418DD4D40@BL2PR05MB2177.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(133145235818549)(236129657087228)(48057245064654)(247924648384137); 
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(6055026)(6041248)(20161123555025)(20161123560025)(20161123562025)(20161123564025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BL2PR05MB2177; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BL2PR05MB2177; 
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTDJQUjA1TUIyMTc3OzQ6ejkzSWxHYVdla2ZtZUlFMERKK1N5dXJ5aE1L?= =?utf-8?B?cXYyV3NUemgraGtVV0NwQjJKNHlIOXhUOExNSUJvKzBBZ285bWx3WDNJUG9r?= =?utf-8?B?V3FEaXkveUxVZjNDVVNZM0FPaTE5czhGc0FGekhFNHQxRll3MWpsSlJ1anhh?= =?utf-8?B?L1lpK1NHZC81OE9SZ1Mzbm8vNU5aa3haZXp2YWFQdjBRT0xFSTdXb1c5SzlZ?= =?utf-8?B?Uy9HM1A4V1RsVVZWNHZWcVNNTGxnK09sZ01DSVJvUUt0VVNEUTZRb3YzaGM1?= =?utf-8?B?MWhhcythMjVFd21UM1hubXQ1UnErMzc0ZkV5MFNtMDFwMFArazA5a1MxbGNM?= =?utf-8?B?NjY0WVlvcTZPWFRlY1V5RkpXQnVCa3NTQ1o4UlFiYUZVYTltQ3lyWTA5Mi95?= =?utf-8?B?Q1A4QWkvQU9TWnkveFVOaXIzdzJ0Y256bW1GbTlQbDlMTGhxazV0K056TkpJ?= =?utf-8?B?d3FmVktsV1gzTWZjZVNyYlFleWdJUjVrYVpEd0dWdk9BM1N6aUt2U0xGZmxD?= =?utf-8?B?YlJacWs4dW5oZTU2NjhIUXplT0UxcVpxOS9ZRXlVcVV6RTEzN0FXNjZPbXZT?= =?utf-8?B?aEZtU0tldFc2WFYrTG1iRHREcTJoS3NJNHpWdUkvV1V5bENRWE96MkZYTlBT?= =?utf-8?B?ZkZWVzZXN2NZanl0MU5wU1hYSGQ3N0NUaUZSczFYM3JwSjRxcXM5L2VJb0lx?= =?utf-8?B?VHZVVXdQbmhrMHNPM3phMkZaQmVDdndXQVEwTW5taG91RWtjcWFLdFlSTzRk?= =?utf-8?B?VGpZeGJtS2VReVhaWjFwL0hITUV4UXMxOXd2UHF2T3l3citGcnRNak5kTE9m?= =?utf-8?B?NTRZWXpYWlY4WnBBdzJtZUkveW5lMWIycWZnR0pxZ0xjWDc2VDhKcVY3QTdI?= =?utf-8?B?eVdJWHRxdXdPZmM0bWl0ME9YR1BlUGN4OXZSaUpFQ0FuUTZYMGtVSmY2N1ph?= =?utf-8?B?VlBMMDhjRFhHdDk3TDZDQUZCNmc1QktNVjQvWW5uWkw1Vmt1LzBPSVJscTVo?= =?utf-8?B?ZFBYcS9PYWRXOUV5QkR1VmpjYzNnMlh0a3VxU3NIM3lMK0hZekkvc0hGT21z?= =?utf-8?B?amlGc0VaYkxuRmc0bmJrRGZhUlY0T2E3bHM2SDVBMW9YZTRyYUdmV21iZUhx?= =?utf-8?B?RmVaU01BbzNzeCtETkRMUjNCSG9HK1psSHRsWWlIM0lSSmk5aDNabnh2Wkh4?= =?utf-8?B?S204dkRuSTVZMUVPZS9SelNrSHY3ajBIV3EyclI0TFlkeWdGa0p4UU1VdlZS?= =?utf-8?B?eFljeUttWDFSeXNudHEzbmdEc1BXU1lnaGYxMVZVSVFtQVZGT2x5Y3h0b2V2?= =?utf-8?B?aDhKd09vMCt6NDBQRk9CVGIzamZDSTNOQjVXZmFWUFgrdmtydUcydWRJWTl1?= =?utf-8?B?WHAwSEpCeDNRK1NSa1kvMk9jZFVmRStTdVFWdTMvTExPUU1Jb001TEJNc1lh?= =?utf-8?B?a0s4N1p2Q3BhVEh6U2doM2pQZitKeDNWMnVodkl2aXN0V2pmWTdXdzlvNmNK?= =?utf-8?B?TmEreDVnNmFnT0NIL3kyV1Zwbkk1MHI1d3M4Zi9ieHN2T1plQ1BybVZnSVpM?= =?utf-8?B?bm5QdHFISzVmeHFjcHl4dEpUNW1BVHFUV1lvb2Vjc2tlcUkvSkdCMTNZbG80?= =?utf-8?B?amlkTU5iQWducVZGNWRIN0V0S2xrWWtFSXh5SG02QXY1c1d6SGEwR2JrN2g0?= =?utf-8?B?MU9iWmVZUjdjejdiQjhORFhNRnB6cEJNYUtXUE9qOFNSMStzNm9Ub0hHQ2Za?= =?utf-8?Q?M8VLDnF89J8+Hjfu316FWRXmD3TsVgKd54Rk=3D?=
X-Forefront-PRVS: 0359162B6D
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6009001)(6049001)(39840400002)(39450400003)(39400400002)(39850400002)(39410400002)(39860400002)(377454003)(24454002)(83506001)(4326008)(86362001)(50466002)(31696002)(5660300001)(230700001)(47776003)(6116002)(189998001)(478600001)(53546010)(38730400002)(23676002)(25786009)(3260700006)(65956001)(6246003)(966005)(81166006)(3846002)(66066001)(8676002)(36756003)(42186005)(2906002)(31686004)(54356999)(7736002)(76176999)(53936002)(50986999)(229853002)(6486002)(6306002)(230783001)(33646002)(2950100002)(64126003)(77096006)(4001350100001)(305945005)(6666003); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2PR05MB2177; H:[172.29.33.45]; FPR:; SPF:None; MLV:sfv; LANG:en; 
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTDJQUjA1TUIyMTc3OzIzOjU2YjZrMjIvSmtsOFR0OUlYUktXc25oRXdF?= =?utf-8?B?aVp4eU5YNkZSZUNmSERwV01xbFJ0S0UzNHducG9Db3M2ZDA2ZUg0TUd4ZXdN?= =?utf-8?B?aXFWQ1djZDE0WFU2NmQ3TnYrYmZic1hGTU45cFprWjljZVFXUGV1eWJyUXlH?= =?utf-8?B?RVVrUVdaRXF6d1Q2b2Qzby9mZ3BYK1VYSWdIdHU1ZTdtU2JDclJHcHlqcDFl?= =?utf-8?B?UkpGTUhpcFI3bmFGa2c3ME4vZDdqekJjM1hCdC9vcjJlTkt2ZlNxcmJ0RFJ0?= =?utf-8?B?V1B3bG94cmdZQnhkVlN0T3phU25UejFrQ1pxZHE2YVBidFFwdGsrRUtmRGRI?= =?utf-8?B?Qnd0dWFnK1VkSm9lRUxmR2thM2VreHIwTHhwK0FyOEdKYUZINkh0VGtxUWM4?= =?utf-8?B?eXlxWlI3SlRFaFpubjl3Wm1lb1F4MjFCNlNqcmQyaVB2TC9EME8yN1FuakVQ?= =?utf-8?B?L29VbDdZS2w2ejYxN1BCcGRxUE9kZ0pRTEF1Rk9IY1lFYXp6ZkVYSWt1am4x?= =?utf-8?B?V3ZURllJNU54Z1hDTDYzSzRLMGp1UUZtOUNZVHd4U1p0WWVXaStXdThRYlRY?= =?utf-8?B?TC9aWExmSlR1ZVNVd3pYQXpuSWIyaG1Ic3o1SmFHLzlPZGdnSDU3UG1ZdmIw?= =?utf-8?B?OXFoNjdvQzlJUDU2aVdvcHoraU9sRnJsL081U3Yya2N5citURGg0UWwrY3dr?= =?utf-8?B?REMrckpUZ0FFWGt0Wklqb0NRenRFRENHN2ovK2ZQRzdsY0kvbGdpVUkwckp5?= =?utf-8?B?MFloZ1MxdkNiMUdIMERqUHlJbG5WU0JKMVZMYXByVUZjMEgxMVZ6eWhyMzFX?= =?utf-8?B?bXhyRmlIUU55Y3JZQ0JUSW9jbWZaVkNISCtaU0hDZWx4cW9XY3RWOXNFMElT?= =?utf-8?B?akt2YmNHcWx0dXJldGNrdVNTc2lHQzlUazdpdFhhU3lPN1pMbENNY3Q1Qmow?= =?utf-8?B?UWRmM2xSZU9rTkM3U2Q5WVZXU2lBNGF4bHhNcUpDR0t1WFZNYVJDa3RUc1hL?= =?utf-8?B?TSt3ZjNkZFZJbDlEZnF4TFlUaU5XRis0RVU4MUIvSG13eHJzMmJUbERmVlkv?= =?utf-8?B?TXFmVzF3Z0FiVEZ3cWMwQzdRZWVXTGpwNTdkWUdrdTVlQ3hsbzQxYURtckd1?= =?utf-8?B?VHdJKy9QSDBnSjNCbE4rNVo1YUdsRHM0MjZSK2xXUHpMUUVCN0Q2dzRyanI5?= =?utf-8?B?aEJKQmRNTnJJNVozSmw5VEtkemlsdW4wZUZyQjRaR3EwMmtieUk2cUdHUTUx?= =?utf-8?B?aVFVM3R2TXc0ekVVdjRqTlRHMGgrTGxYbVlxSWVDdW9HSDAxTFpPc0pEN200?= =?utf-8?B?cG9GZk9YWDFSMnJ2WnVEWlljWHNPL0p5Y0RyMUZJVU83eUsrVWhpditleStV?= =?utf-8?B?RFlYd29WeE9zZVZiOW9WMk1VUEtKQ2QxSXl6RVpiOXZCV296cjlmcHBSQmYw?= =?utf-8?B?TXljOWVFQzhyaWdPeDJCNHdSR3BEYWhLQnlBbXQrYU1qbTFhcEU4SXAxN0d3?= =?utf-8?B?SXc2amR3Tk9iZndMTG1DcmlYblpFcXY3c0Rwc21TNTVVamJnYzJScDg0QUFp?= =?utf-8?B?UE00OS9rRVBGT2ZCSlNKT0hGL0NITG1hMXZjcm1RZTJnc2gySUVpZ2ZVTWVL?= =?utf-8?B?dmJHTzNzbXhLRzRPWkhmTHBtd3IvbHRkY3Rtclo0Z3B1ZjlULy9DR2NuajBS?= =?utf-8?B?VGlCMXc1bzBRbHFQbUp4Y3ZMR1dRUVdqMC9jTzlKeFVNQjZtQ0NHeThVdUNF?= =?utf-8?B?aXFjNW5kbDJPZWZ3M1J4MVJZY0lHeDNTOGJqS0dqc05wLytBcjlNYTVKVjd5?= =?utf-8?Q?/G+6rCxW+ENfg?=
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTDJQUjA1TUIyMTc3OzY6L1JHR28vYVVmY216ZzRGL2RNNjFWRFNyV3pL?= =?utf-8?B?WG5KbmhEQklTWktBUjhxRkV4aE5YQkhDazM4NjBxSms0akllLy8zSzlaVHhl?= =?utf-8?B?WndtaTB5VURHK0JmSlY2YWc0SnJkTnEvYWdyNzlsYmt5Q1ROc2p3NlNhNkdn?= =?utf-8?B?N0R5ZHM4WEwwRGRTMG9EMVI5SzZ2ZWtoTW1BVFM4SDRxVmdqakxLRENrT1lx?= =?utf-8?B?cmgwMU1YVVFNRjRMek9yUi9zWTkvVlpZa2lPb2krblp6eGs5U3FuZUFDL3pT?= =?utf-8?B?OG1NSXQ4SHR0VTZpZzRPZGNqbk5ody9jNnJ1eFora2VXbnBPbnlDVEVVdjBj?= =?utf-8?B?UnRVRDU0QWJVQmtQQmZmVU5mOEpmbmhqZGZ4NDVIOEk1WUl1L0RBU1ZRUUVY?= =?utf-8?B?SmRmV3NVS3MxZWhZWWJBQkJhVWVTWVRvS0FkUW93WFFkaktQWmZxTU9yazJw?= =?utf-8?B?Z1FFNEVrUHdPWUlxN2FZUDkwMWdULy8wSXZsV2xKbWNISldVcDFIQnRheEZ5?= =?utf-8?B?dG96T2ZEWWxXQzhhbitFcytxL1ArYlJnb1ZGZkJZbWRLTDZ5NUp4YzQvV0Rl?= =?utf-8?B?ZFAyME8rQTJUc25oOTEzNmNwVkNOQjZBd0Zuc0VYOUpKMHhhZ0xNV1pONUpo?= =?utf-8?B?NGJ1bFZkWlNDaWlJVkVtZjJjQXFlTFdRRzhvK2J0alFhcU52L2FNNjJySHAy?= =?utf-8?B?V1MrQldySHFEWXVrcVpVdUw3NTA3SzU5RWVtTnNxNFN5VzNLK0MzRGpUOXVv?= =?utf-8?B?NU5kQ1prRzJPN3RsemRNSXlJNm56UjlMQ3RrdDI1S0xHV3JOVG1PakJmSzcw?= =?utf-8?B?UjhyL0MzWGNoL2MzSHRvOCsvUXdCcjRQY2xYL1FNVFl5OE56VkQzaEVrZjMz?= =?utf-8?B?ejNkdFpYVDE1dFNZOWlUOWx5QXdqYlBCZzF5aGtPbG9lekQzS1AvNXpValFM?= =?utf-8?B?VVhRTXZPOTA4N25IOE4vckx5TmRNMDNmbGFzaDhzT1BJUHV3RGhvWXViVU9X?= =?utf-8?B?bjZFd2ZEQjU2K3NPUEFnZVpYUHl3RmkzWWNxajlROGs2Z0lUL1ZINzRsR0xQ?= =?utf-8?B?Umc3TU9LWkRPblFkRkU0VU1CK2RjVGRsSGt2aDlpdFIxdzVCdjdxcUpQdGlQ?= =?utf-8?B?VGlIa3lrUnBaN1gxZVdKakxRQkhVTVBHdDloc0Jrb2lZSk1CSFZaSnRzeGNk?= =?utf-8?B?R1ZBRlIrVW8xOEFMbXBzeTRzYzBmMjlzdnVkR0xhNUlCOTZZaVZGRzZPTEdh?= =?utf-8?B?ZmVYWFk3Vy9ZLzJ2eE5UZkNsNGdkc1hGQUhyZ1N1RW9lZExSV25QTDVNd1pG?= =?utf-8?B?aktLUFpJMjdQem5abEg5QUxHUWRUdEJiZnAvTHNrTzBqYytPZGJJdlNLY3lH?= =?utf-8?Q?b7duCYg?=
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2177; 5:dKcVQpQp9JZSsiT1LxAf96e1bZBjgy+ebwQsBtcEZ4gf0wcMgwJFpKznhbaElUQats6Vwgu2wRNgk2RdAO5fX78rJsyMpBl7yl/k+ypmEccXzjGqqPS7jddmmYj5P93XKjDl6oyhbHHZ9vfFlaIeYBQeQV+S9IVeJulm26jH0ZQ5dv8qGfeMSkpbsqWUGMhgAFdM2SqOJigQd2SWyPs5SwbsXM8r+UEDLy4ftu3iLcqqU8DeE+erJf9lBdX6di1XLsWQm4crkPULztqGtc0EQwgAX5NohuSAPbNccpLi3AIj+sZTuMSbkQuNejmzYeUe0yQmCUbOFfHJxN2hafjU1U9ZlmBNsPLC7rkZXIulgscN5dH9aXEe75rUgmrEWbq38ns9jUvJHdyAC8j/UcDFSuH2Lv9+gA3tw0mDK2u+B0HPuKgC4wUFU8BwopW0e7HmXOy4WnQg3Rs+mzz3buqWV5jsXgNR8rLZHNoTmZQQUnlr6iEsdMC4pQ2yTyltzsL6; 24:xREMii6D42zl2I+yQIvQWjKVzNHdM1oMgmuAFBMix7aXxpiKyBAJBBU3nBhFUCI4rZvDKogG9oLF5uadEIEa/qbzrd40yYdZrkMGEBIShXk=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2177; 7: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
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Jul 2017 20:08:18.6736 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR05MB2177
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Tml1vU5itlQlskd5T22IBuvVoCM>
Subject: Re: [Bier] Warren Kumari's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 20:08:26 -0000

On 7/5/2017 3:22 PM, Warren Kumari wrote:
> Notes:
> Section 1:
> "If the packet also needs to be sent to a BFER whose BFR-id is 257, the BFIR
> would have to create a second copy of the packet, and the BIER encapsulation
> would specify an SI of 1, and a BitString with bit 1 set and all the other bits
> clear." - while reading this it seemed to me that it would be much simpler to
> do away with the SI completely and just make the BitString N bits longer

The size of the BitString is really determined by the capabilities of 
the forwarding hardware.  And the encapsulations (at least, those 
specified in draft-ietf-bier-mpls-encapsulation) support only certain 
sizes.  If your hardware supports only a BitStringLength of 256, and you 
have 257 BFERs, you can't just say, "hey let's use a longer BitString".  
Even if your hardware supports the next larger BitStringLength, 512, you 
might not want to use a BitStringLength of 512 when you only have 257 BFERs.

> (instead of having e.g a one octet SI and 2 octet BitString, concatenate this
> and have a 3 octet BitString).

A 3-octet BitString would allow you to identify 24 BFERs (3*8), whereas 
a 1-octet SI and a 2-octet BitString allow you to identify 4096 BFERs 
(256*16).  BTW, the BitStringLengths that are envisioned are all larger 
than two octets.  I wouldn't expect to see less than 64 bits, and 256 is 
more likely.

> It was only when I got down to Section 3 that I
> discovered that this is (kinda) discussed, and that each SI can have a
> different BitString length.

Sub-domains can have different BitStringLengths, the SI is relative to a 
single sub-domain.  The fact that sub-domains can have different 
BitStringLengths may be useful if you have hardware that supports 
multiple BitStringLengths, but that's really orthogonal to whether the 
SI is needed.

> "Alternatively, one could deploy a routing underlay that creates a
> multicast-specific tree of some sort, perhaps a Steiner tree." A reference for
> Steiner trees would be nice -- best I could find was probably the WA page at:
> Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource.
> http://mathworld.wolfram.com/SteinerTree.html  

I think it is probably best to remove the mention of Steiner trees and 
instead just say that the routing underlay could be some sort of 
multicast tree.


From nobody Wed Jul  5 13:49:27 2017
Return-Path: <warren@kumari.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64C3E131DDF for <bier@ietfa.amsl.com>; Wed,  5 Jul 2017 13:49:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xqio5CBH9Z93 for <bier@ietfa.amsl.com>; Wed,  5 Jul 2017 13:49:24 -0700 (PDT)
Received: from mail-ua0-x231.google.com (mail-ua0-x231.google.com [IPv6:2607:f8b0:400c:c08::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17359131DDA for <bier@ietf.org>; Wed,  5 Jul 2017 13:49:21 -0700 (PDT)
Received: by mail-ua0-x231.google.com with SMTP id g40so385769uaa.3 for <bier@ietf.org>; Wed, 05 Jul 2017 13:49:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=oQ8lBvo36EuwAt/wWZnYPdOovwnaoAP4t2tcSNEHR5k=; b=wEndIurSPXbZIesTdKsSDwrLFCJX2b0cCsFqOOwIzws77S2ClR+fwLhsI1WkmNJc+Y I/8sRzxNxXp2bLVdOcQWE4P9gyuS00BPzbiIer2iFthgMAHTO5oLOcOr4EZeB1Lua4Zb cmUlpUi1DyroJs790nNjZ2kRPz51oPyX6Mwh17/m1U650hLw1fPRkqBYKUhLVBBV5j0l 2a4eYoRHCwC3HUy8VwoXC/IFg38wzW5FfoDmHu0vssJPJJ23KJB3Ss0coFxM0liFc8zL OfSLDdRhYno2KmxzXUkZ/QpOsYMr/HROpc14PJ4idgSnVvfWuidpgoxQsV2LfmLUcCVM QRbg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=oQ8lBvo36EuwAt/wWZnYPdOovwnaoAP4t2tcSNEHR5k=; b=eUfgm6fdx1lx6kkKUJesK2TNWiIlEEqKZBj4X6Zj0HB/5KatoTE5r+NEWTZlioMw8l F1Rq/RQuNn7oYWdNivrow9Sj0e+tO5mLGUs6puNqiySRptVx7falLnu9farLMkUdXhHS Qg0QiRP56UbmtkKH/SV0yBDhF6Z1gwNCSGCwlOm8//kiRMwSji2/A9KthHD2fNDuE/PP 1EGkfwv8Qia1hqoR5YycyK5z3Xfwzvqum1G16eyTgJOTS9Nzue0QxvQ8mTeatBos/taB SOuZAdaO3WPeyKKX+45PxDqEMF3iOrGzU6+0YwWWhO4HsyfP/kJtT14i4qjpfTHVkZ+L ysWA==
X-Gm-Message-State: AKS2vOxfoyEZNFSHhQXfhVudf/+ZaKKQxbA5Pqv/r6/02pk4kHwa0JI/ BXPzmnzFZoFmgmGUIog+sjPmAlO9PHwd
X-Received: by 10.159.59.93 with SMTP id j29mr24595454uah.155.1499287759909; Wed, 05 Jul 2017 13:49:19 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.159.39.165 with HTTP; Wed, 5 Jul 2017 13:48:39 -0700 (PDT)
In-Reply-To: <46b9c2e5-f4dc-7fbd-7b6b-72de693af9ae@juniper.net>
References: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com> <46b9c2e5-f4dc-7fbd-7b6b-72de693af9ae@juniper.net>
From: Warren Kumari <warren@kumari.net>
Date: Wed, 5 Jul 2017 16:48:39 -0400
Message-ID: <CAHw9_iLzRVy+AVMJKbvVr7UXGMzit0ttXZ5mgzHzRb86anZtjw@mail.gmail.com>
To: Eric C Rosen <erosen@juniper.net>
Cc: The IESG <iesg@ietf.org>, draft-ietf-bier-architecture@ietf.org,  Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, bier@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Tl3doTbVBMsTjWwPjyTg7Red7ho>
Subject: Re: [Bier] Warren Kumari's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 20:49:25 -0000

On Wed, Jul 5, 2017 at 4:08 PM, Eric C Rosen <erosen@juniper.net> wrote:
> On 7/5/2017 3:22 PM, Warren Kumari wrote:
>>
>> Notes:
>> Section 1:
>> "If the packet also needs to be sent to a BFER whose BFR-id is 257, the
>> BFIR
>> would have to create a second copy of the packet, and the BIER
>> encapsulation
>> would specify an SI of 1, and a BitString with bit 1 set and all the other
>> bits
>> clear." - while reading this it seemed to me that it would be much simpler
>> to
>> do away with the SI completely and just make the BitString N bits longer
>
>
> The size of the BitString is really determined by the capabilities of the
> forwarding hardware.

Oh. Yeah, that is obvious (now :-)).

>  And the encapsulations (at least, those specified in
> draft-ietf-bier-mpls-encapsulation) support only certain sizes.  If your
> hardware supports only a BitStringLength of 256, and you have 257 BFERs, you
> can't just say, "hey let's use a longer BitString".  Even if your hardware
> supports the next larger BitStringLength, 512, you might not want to use a
> BitStringLength of 512 when you only have 257 BFERs.
>
>> (instead of having e.g a one octet SI and 2 octet BitString, concatenate
>> this
>> and have a 3 octet BitString).
>
>
> A 3-octet BitString would allow you to identify 24 BFERs (3*8), whereas a
> 1-octet SI and a 2-octet BitString allow you to identify 4096 BFERs
> (256*16).  BTW, the BitStringLengths that are envisioned are all larger than
> two octets.  I wouldn't expect to see less than 64 bits, and 256 is more
> likely.
>
>> It was only when I got down to Section 3 that I
>> discovered that this is (kinda) discussed, and that each SI can have a
>> different BitString length.
>
>
> Sub-domains can have different BitStringLengths, the SI is relative to a
> single sub-domain.  The fact that sub-domains can have different
> BitStringLengths may be useful if you have hardware that supports multiple
> BitStringLengths, but that's really orthogonal to whether the SI is needed.
>
>> "Alternatively, one could deploy a routing underlay that creates a
>> multicast-specific tree of some sort, perhaps a Steiner tree." A reference
>> for
>> Steiner trees would be nice -- best I could find was probably the WA page
>> at:
>> Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource.
>> http://mathworld.wolfram.com/SteinerTree.html
>
>
> I think it is probably best to remove the mention of Steiner trees and
> instead just say that the routing underlay could be some sort of multicast
> tree.

Awww. I really wanted a router with a big bucket of water and some
soap, but your solutiuon works too.

Thanks,
W



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf


From nobody Wed Jul  5 19:02:26 2017
Return-Path: <prz@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E74BE129ADD; Wed,  5 Jul 2017 19:02:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.022
X-Spam-Level: 
X-Spam-Status: No, score=-2.022 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H39vESZFJ5rW; Wed,  5 Jul 2017 19:02:15 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0119.outbound.protection.outlook.com [104.47.38.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B56DD126D85; Wed,  5 Jul 2017 19:02:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=VVCewwsEQzDn+535K/zJfRtEIsYLaLcvvwzw0vm5lQs=; b=Sc52MOX2XjmiemTyFDuLRXBhKD0BwDaWiL0W5+WUBhRfmxjUDHDTCYcizaoUFmfKr3dc7YzpnmpNqOEZmaHKP4lNTP+rsQ9vaXwD2GgZ55+TBlXKAoDQ8R9AEtg+paeFem9U6leK4Xwl6Jez/SEr8fVvzmknW+yl3hF0Au8QBoI=
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com (10.161.224.148) by DM2PR0501MB1034.namprd05.prod.outlook.com (10.160.25.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.6; Thu, 6 Jul 2017 02:02:12 +0000
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444]) by DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444%14]) with mapi id 15.01.1240.013; Thu, 6 Jul 2017 02:02:11 +0000
From: Antoni Przygienda <prz@juniper.net>
To: Warren Kumari <warren@kumari.net>, Eric Rosen <erosen@juniper.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-bier-architecture@ietf.org" <draft-ietf-bier-architecture@ietf.org>, Greg Shepherd <gjshep@gmail.com>, "bier-chairs@ietf.org" <bier-chairs@ietf.org>, "bier@ietf.org" <bier@ietf.org>
Thread-Topic: Warren Kumari's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
Thread-Index: AQHS9cQbbs6vuPvgwkCMIWQ34yNVyaJFqU4AgAALUoD//9rNgA==
Date: Thu, 6 Jul 2017 02:02:11 +0000
Message-ID: <C8D5C0C3-C1DD-485B-92C6-2A11C88C9579@juniper.net>
References: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com> <46b9c2e5-f4dc-7fbd-7b6b-72de693af9ae@juniper.net> <CAHw9_iLzRVy+AVMJKbvVr7UXGMzit0ttXZ5mgzHzRb86anZtjw@mail.gmail.com>
In-Reply-To: <CAHw9_iLzRVy+AVMJKbvVr7UXGMzit0ttXZ5mgzHzRb86anZtjw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.20.0.170309
authentication-results: kumari.net; dkim=none (message not signed) header.d=none;kumari.net; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [66.129.239.13]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM2PR0501MB1034; 7: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
x-forefront-antispam-report: SFV:SKI; SCL:-1SFV:NSPM; SFS:(10019020)(6009001)(39450400003)(39850400002)(39410400002)(39840400002)(39860400002)(39400400002)(377454003)(24454002)(7736002)(83506001)(3846002)(38730400002)(53936002)(8676002)(68736007)(99286003)(4326008)(229853002)(4001350100001)(6246003)(3660700001)(82746002)(39060400002)(53546010)(102836003)(6116002)(5250100002)(83716003)(6436002)(86362001)(6506006)(66066001)(3280700002)(2906002)(5660300001)(50986999)(14454004)(189998001)(2900100001)(6486002)(25786009)(8936002)(76176999)(6306002)(81166006)(1941001)(33656002)(36756003)(6512007)(6636002)(54356999)(54906002)(230783001)(966005)(478600001)(2950100002)(305945005)(372894003)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB1034; H:DM2PR0501MB1438.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en; 
x-ms-office365-filtering-correlation-id: bf53faa3-9d21-45ab-9c67-08d4c413042a
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM2PR0501MB1034; 
x-ms-traffictypediagnostic: DM2PR0501MB1034:
x-microsoft-antispam-prvs: <DM2PR0501MB10345225F7A25C04A65BD5BDACD50@DM2PR0501MB1034.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(133145235818549)(236129657087228)(138986009662008)(48057245064654)(247924648384137);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910040)(8121501046)(5005006)(100000703101)(100105400095)(10201501046)(93006095)(93001095)(3002001)(6055026)(6041248)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123564025)(20161123560025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM2PR0501MB1034; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM2PR0501MB1034; 
x-forefront-prvs: 03607C04F0
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <97CD340A4116DC48814122B6C576A257@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jul 2017 02:02:11.8937 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB1034
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/ujh9XJ4R7lytPYbh2VXo5d5budo>
Subject: Re: [Bier] Warren Kumari's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 02:02:18 -0000
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From nobody Wed Jul  5 19:07:20 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB94A129ABE; Wed,  5 Jul 2017 19:07:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zOHEqXfvja34; Wed,  5 Jul 2017 19:07:18 -0700 (PDT)
Received: from mail-wr0-x230.google.com (mail-wr0-x230.google.com [IPv6:2a00:1450:400c:c0c::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B2881242F7; Wed,  5 Jul 2017 19:07:18 -0700 (PDT)
Received: by mail-wr0-x230.google.com with SMTP id r103so8476978wrb.0; Wed, 05 Jul 2017 19:07:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=j3HzydeOB0xC9bF8mQhbhgeJSe642XMJ3PcZKgx4RJ0=; b=NBoYsqSMERbbvcZJYSOqQk35F+lBy2pfi7nnE2gVtkRzmv6WXMV2ZeUDe50MTPwwPj PB0ZgYk18/Axm04MT0PbiJZZOQZhcoBI8pUvgAcmUdGxnY9aHteEIs3OOrI0EtjYsYNE +PkM1r70f6VVYw9Tdm60NxDr3Nqt4ej5EfKbnxqyQ8u4w+9PpHsuO1ArzImrehN4XG13 Ndp8vRpZ2BoJUaW02joJ21wL6Itkw4cQT5LmwFB82IW0cqen1QOsVBC6D/CDSlTEx/GX hhuE2LPj1NVm4sPGmNzdAfKEdppI8bfIMyh1TlR+xX/EVS+zJccRFX5LQqubLZ/H3QVb REuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=j3HzydeOB0xC9bF8mQhbhgeJSe642XMJ3PcZKgx4RJ0=; b=bu6YiEqhpyOQKEVsx4Iuqp4fugleaYvbicKCPrksuH6mh4S1uYQmYFx8uoxRnER0lC yvVEO3hORDw41bvh9/EC9GlvMaCvY6sWAnhJ2bw1ZCjt6SajV7FS68PECxNfDJ5DUGVF vwlsJJbFneGarAKtrwk8rjzYTKxDvGfE4Svp5LrkIFf3rgi1OB3woGDjHz6Cn07e+DIA 5W5pHVbUPDb4JhzxNS19l+qEd/J5JCltxTnzfkZxoqVozMgA4j3LR5g1LupHBUMJ6c8h zcBhg0quelMYO6BmA6CwwJqqhjKfPNufglYVuk/tzZCBeJ+9ChdtrSOFX5JV9HkdA605 f0+g==
X-Gm-Message-State: AKS2vOzUTJmE+gm5CMm6ZW0DbifRL7NTtVtMmo7DY5kCub4DrQJTFZyR smH5d0YW3pJC4NNgBqIiggptOVDFlTf/1/w=
X-Received: by 10.80.137.45 with SMTP id e42mr24006708ede.67.1499306836604; Wed, 05 Jul 2017 19:07:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.183.131 with HTTP; Wed, 5 Jul 2017 19:06:36 -0700 (PDT)
From: Tony Przygienda <tonysietf@gmail.com>
Date: Wed, 5 Jul 2017 19:06:36 -0700
Message-ID: <CA+wi2hNyOnXYnw=R2LvAiw0ONg5c431pYhoaatC9AYxUys6uog@mail.gmail.com>
To: "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>
Content-Type: multipart/alternative; boundary="f403045c107667bdaf05539c930c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/FKm6RC3dSh1DSdb8e5FxiMXUO30>
Subject: [Bier] Early allocation points for ISIS draft ...
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 02:07:19 -0000

--f403045c107667bdaf05539c930c
Content-Type: text/plain; charset="UTF-8"

On Wed, Jul 5, 2017 at 7:23 PM, Amanda Baber via RT <
iana-prot-param-comment@iana.org> wrote:

> Tony, Alia, draft-ietf-bier-isis-extensions authors:
>
> In accordance with the IS-IS-specific procedure established in RFC 7370,
> we've added the following early allocation to the IS-IS Sub-TLVs for TLVs
> 135, 235, 236, and 237 registry:
>
> Type: 32
> Description: BIER Info (TEMPORARY - registered 2017-07-05, expires
> 2018-07-05)
> 135: y
> 235: y
> 236: y
> 237: y
> Reference: [draft-ietf-bier-isis-extensions]
>
> Best regards,
>
> Amanda Baber
> Lead IANA Services Specialist
>


thanks

-- tony

--f403045c107667bdaf05539c930c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_signature"><div dir=3D"ltr"><div class=
=3D"gmail_quote" style=3D"color:rgb(0,0,0);font-family:-webkit-standard">On=
 Wed, Jul 5, 2017 at 7:23 PM, Amanda Baber via RT=C2=A0<span dir=3D"ltr">&l=
t;<a href=3D"mailto:iana-prot-param-comment@iana.org" target=3D"_blank">ian=
a-prot-param-comment@iana.org</a>&gt;</span>=C2=A0wrote:<br><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;=
border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex=
">Tony, Alia, draft-ietf-bier-isis-<wbr>extensions authors:<br><br>In accor=
dance with the IS-IS-specific procedure established in RFC 7370, we&#39;ve =
added the following early allocation to the IS-IS Sub-TLVs for TLVs 135, 23=
5, 236, and 237 registry:<br><br>Type: 32<br>Description: BIER Info (TEMPOR=
ARY - registered 2017-07-05, expires 2018-07-05)<br>135: y<br>235: y<br>236=
: y<br>237: y<br>Reference: [draft-ietf-bier-isis-<wbr>extensions]<br><br>B=
est regards,<br><br>Amanda Baber<br>Lead IANA Services Specialist<br></bloc=
kquote><div><br></div><div><br></div><div>thanks=C2=A0</div><div><br></div>=
<div>-- tony=C2=A0</div></div></div></div>
</div>

--f403045c107667bdaf05539c930c--


From nobody Thu Jul  6 03:19:34 2017
Return-Path: <ietf@kuehlewind.net>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA97129AD2; Thu,  6 Jul 2017 03:19:28 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: =?utf-8?q?Mirja_K=C3=BChlewind?= <ietf@kuehlewind.net>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149933636848.22745.8471715109955096421.idtracker@ietfa.amsl.com>
Date: Thu, 06 Jul 2017 03:19:28 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Mt8uExH5E1SxXO2Fk8zG_sQOoKU>
Subject: [Bier] =?utf-8?q?Mirja_K=C3=BChlewind=27s_No_Objection_on_draft-i?= =?utf-8?q?etf-bier-architecture-07=3A_=28with_COMMENT=29?=
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 10:19:29 -0000

Mirja Kühlewind has entered the following ballot position for
draft-ietf-bier-architecture-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I also initially expected that this document should be informational because it
specifies an architecture, however, will reading I realized that is rather
specifies abstract mechanisms and a data model. So it's basically an abstract
protocol spec without defining the on the wire format. Maybe it would be
helpful to describe the content of this document this way, rather than speaking
of an architecture. However, I guess the word architecture is rather board
though.

Thanks for a well-written doc; especially the ECMP part is very clear!



From nobody Thu Jul  6 06:14:04 2017
Return-Path: <bclaise@cisco.com>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EDEC131752; Thu,  6 Jul 2017 06:13:56 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Benoit Claise <bclaise@cisco.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org, victor@jvknet.com
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149934683636.2270.10065032311656213669.idtracker@ietfa.amsl.com>
Date: Thu, 06 Jul 2017 06:13:56 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Z-hZbqZefyo2-O43u8affoOyxgI>
Subject: [Bier] Benoit Claise's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 13:13:56 -0000

Benoit Claise has entered the following ballot position for
draft-ietf-bier-architecture-07: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

1. I want to come back to the experimental status.

I have seen Alia's reply:

    In the BIER Charter, work item 9 describes a document based on deployment
    experience that can justify moving the BIER work from Experimental to
    Standards Track.  When I chartered the WG, it wasn't clear whether it was
    merely a good idea or a good idea with enough motivations towards
    deployment that it is worth complicating the architecture at the narrow
    point of the IP hourglass.

>From the writeup, it seems that the experiment is successful already:

    The vendors are being quite tight lipped about current implementations.
    Operator feedback indicates there are at least two implementations
    currently, with others in the works. There are currently five vendors
    collaborating on the work in the IETF.

However, I've not been following the specifications development and
implementation to provide a definitive answer.

At the minimum, the document needs to describe what the criteria are for a
successful experiment.
    Implementations (RFC7942?)?
    two interop implementations?
    hardware implementation?
    "deployment experience" (to cite the charter text)?
    impact analysis?
    something else?

The ideal BIER document for this explanation is this architecture doc.
A reference to the charter Item 9 would be a good start.

Examples:
https://tools.ietf.org/html/rfc7360#section-1.3
https://tools.ietf.org/html/rfc7499#section-2

2. operations and management section
I'm sure there are such considerations:
    - configuration
    - sub-domain management
    - BFR-id management
    - adding new BFIR/BFER device to the domain
    - logging
    - troubleshooting
    - OAM
    - etc.

There are also two other management documents that should be referenced:
chartered item 6 and 7. There are some management sentences, from time to time,
in the doc. Ex: avoiding a second copy is an important from an operational
point of view

   It is generally advantageous to assign the BFR-ids of a given sub-
   domain so that as many BFERs as possible can be represented in a
   single bit string.

   ...

   In order to minimize the number of copies that must be made of a
   given multicast packet, it is RECOMMENDED that the BFR-ids be
   assigned "densely" (see Section 2) from the numbering space...

    Btw, I guess you meant: assigned densely per subdomain, right?

What this "operations and management section" should contain is the points that
operators, who will deploy this technology, have to pay attention to. An
architecture document is typically the first document people will read. RFC
5706 appendix A provide typical questions from an OPS point of view. I
understand that this is an experiment and you might not have all the answers at
this point in time.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

-   Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
   to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
   (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
   BFR-prefix be a loopback address of the BFR.

Just one observation. Was thinking, so it's like an (OSPF) routerId, except
that it's called a prefix. Then I understood, reading further. It's not called
a routerId because this address/prefix must be routable

- Was wondering. Is this mechanism only for multicast packets? What about
anycast/unicast? End of section 4 you have an example about MVPN over
ingress/egress PEs. Some multicast packets would take BIER encap, while others
packets would take a different encap From a troubleshooting point of view, does
it make sense (is it even allowed) to send non multicast traffic over BIER.

Victor Kuarsing performed the OPS-DIR review, copied below. Discussion is
ongoing.

First, there were no textual changes recommended as part of this
review.  The document seems to be well written and had undergone
previous review/updates.  Given the nature of this document, there are
limited operational specific points made as part of this review
however three points are noted for follow-up with the actors.

(1). Security Considerations

It was not 100% clear to the reviewer (me) if the use case of how the
BIER architecture (or guidance for future implementation) may avoid
certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
may have missed specific text which addresses the point made herein
(if so, please disregard my first point and please make reference
where it is addressed).  The concern is if a packet is introduced into
the system by a host (compromised perhaps) which fabricates packets
(may or may not have valid payload inside the BIER encapsulation) that
attempts to starve resources in the system.  One way of doing this
(which may require control plane access - maybe) would be to
set/create packets which forces additional replication at BFRs (i.e.
set a single  - or all bits -  for all SIs).  This would then create
the maximum amount of replication within the system.  Perhaps this use
case is addressed as noted.

I was no able to find specific operations/functions which scrutinized
incoming packets and/or guard for bad NBRs.  Could this be an issue
from the authors standpoint?  In more traditional networks, there are
methods operators use to ensure that illegitimate traffic is not
introduced into the system.  I wanted to make sure there was thoughts
on how to do this with BIER.

(2). SPF assumed.

I agree most places where the BIER architecture would likely live (say
in Enterprises and SP networks) the network would operate a standard
IGP.  However, in some use cases, like modern DCs, some are designing
fabrics which don’t use a traditional IGP.  These networks use all BGP
(eBGP) with full sets of neighbor relationships.  This helps reduce
the amount of running protocols within the underlay, but may (or may
not) cause issues with BIER in relation distribution of system
information.  Do the authors consider this use case one that can be
address with BIER as it’s currently outlined, or would additional
considerations be needed?

I reviewed the “draft-ietf-bier-use-cases” document and did not see
text that specifically help or hinder the operational mode I described
above.

(3) Broadcast Video Operation. (more of a question then a point of note)

I did noticed in the use case document (as noted above in point 2),
that considers more traditional broadcast video networks was
described.  So my question is, would an operational model which
required two simultaneous M/C flows from separate sources (normally
two packagers/encryptors etc) be supported by the BIER architecture as
described?  My best estimate would be that the operator would use two
sub-domains that would allow each BFER to potentially get two of each
packet (which are sourced by two different injection points / BIFRs).
This mode of operation is common in some places to allow the M/C
broadcast feed to be “pinned” to the egress router/device to allow for
fast switchover in case of network failure (where normal network level
detection and re-routing is not sufficient).



From nobody Thu Jul  6 07:46:19 2017
Return-Path: <erosen@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B03E7131648; Thu,  6 Jul 2017 07:46:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.022
X-Spam-Level: 
X-Spam-Status: No, score=-2.022 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GccUpjJURP1p; Thu,  6 Jul 2017 07:46:06 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0097.outbound.protection.outlook.com [104.47.37.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A66F7129B37; Thu,  6 Jul 2017 07:46:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=wj3ILs5O8VeL+PEdy6mpgH2Wg2Ps4AKlIXc+H9fVfv4=; b=i5f7TBYtbWoFKMaVpW2chSZX09odGAKOcZN1Dzjr/Fma8c4iNlh3f+PNr91BG4Q7tZ9DdBEfROym6pDWk3p+kYnSH4KXwqtxjUBMpIwK4RlATWKiaAdIdW7X7rsoX0Cuy4i/hHRlLxH2J6BHMQ+4Gk1CMaT1pJ5qwTT2aYiUmbE=
Authentication-Results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.39.5] (66.129.241.10) by BL2PR05MB2180.namprd05.prod.outlook.com (2a01:111:e400:c74e::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.6; Thu, 6 Jul 2017 14:46:02 +0000
To: Benoit Claise <bclaise@cisco.com>, The IESG <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, bier@ietf.org, victor@jvknet.com
References: <149934683636.2270.10065032311656213669.idtracker@ietfa.amsl.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <a3b1141a-dce6-6cd0-215c-b7fd5074879a@juniper.net>
Date: Thu, 6 Jul 2017 10:45:57 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <149934683636.2270.10065032311656213669.idtracker@ietfa.amsl.com>
Content-Type: multipart/mixed; boundary="------------6033769A55711F9B97E358B2"
Content-Language: en-US
X-Originating-IP: [66.129.241.10]
X-ClientProxiedBy: CY4PR13CA0027.namprd13.prod.outlook.com (2603:10b6:903:99::13) To BL2PR05MB2180.namprd05.prod.outlook.com (2a01:111:e400:c74e::12)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2c57dfbe-753b-4f3d-86bb-08d4c47dba74
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(49563074)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BL2PR05MB2180; 
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 3: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
X-MS-TrafficTypeDiagnostic: BL2PR05MB2180:
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 25: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
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 31: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
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 20:wWzvHYG2KvFd5IOAMNRvnRe278K1NzNzBGGrEcubOf30zpfK5jnIoTnrRRqY2EOmZHv2/mlN6Ceo4NZb+6KiS6ei/E/lVaEl62tMWYTvpFoXuCqr/h8lIqktiu+BZw4Ee1yeLL0GGfoddi6UBdUStr1Otq2BaK6IOdDrtIO4NqW3MPLUqfrp5Wc1+sBkJSqr0mb5D3DafRiWn3PojQcRLfi4smDFf268UHvOfyB1sN7pxjirtJEq+Iuo4JbAOu7Nr+zInKp7rBIBy1+lfX7XvFbNrL9XipP1OrWsbxXht1LD//rYjFD5uOpQ3Ph5Sxq2ZZpw/2gklS8r/ZquDtXUJqsWjcwJX7JJBgISidPx8btXDiCr0nbLbCdf7fXpO9pnh6zxtjWTTBXNE1H9MnHf5H69eYSCawZmzOvJYmspeSQl2WLO283SFR5em+ksEm/zCYqAlg+lSqZv9VaDF7wnCp/IaKt+IiF/BMlZ9+4yduRik6K+laoa71MTc4gYam2ax+pMghifZFGVpGoTPRrgAkKkIzUgnDuMiliBTjq/OqrCKK9SfL046+lis/Z10FQhT+53+ZNrnnB6rhaqp93FnZwPXOqrScSThZs/eFsNd0k=
X-Microsoft-Antispam-PRVS: <BL2PR05MB2180C856375ED11A3F4CD5C9D4D50@BL2PR05MB2180.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(278178393323532)(236129657087228)(192374486261705)(148574349560750)(247924648384137)(17755550239193);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(102415395)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(6055026)(6041248)(20161123564025)(20161123558100)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BL2PR05MB2180; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BL2PR05MB2180; 
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR05MB2180; 4:O+VYra+OUWGF5nPCk++fac6T5PEmoivFs57sDHs3sx?= =?us-ascii?Q?p+SIlucZhJKwE3ntPRKF7qryJeSBPtnosR5OCpAUc45ddNQXponO1FrD4P+k?= =?us-ascii?Q?wqXJDlo6rycuR5Ofogmg30v3vLJP5XgBgOk8wqucp7J+nadavwqh0o7IYHbk?= =?us-ascii?Q?46VM3pGEkNJPBXtevMDsez3p3r3JGu44bU4MkaP0JuiHsI+V6MBR2MXZzz7W?= =?us-ascii?Q?ygfBWiYm6OpMpvYAQakhRtrG+/vHMWshy6U27V/S5UWLH318n5DD4Vn/4QxD?= =?us-ascii?Q?D0ZptJD+mRXO6gf6C5qdgoEEE6E1TVNJtuy6Fp8p3urb1FR3OGVpNw/QJRdW?= =?us-ascii?Q?XiSCzutzAcc+sPtujDYaeJF011BoUBjBWyfNghVtAC9oh0bjHXzfXFq7ldlF?= =?us-ascii?Q?NKXNg4JbAqBrUdHbh+waL0vkCXvwpT/boVcPIIo3xbNw333WKsQyu96hM/vH?= =?us-ascii?Q?sD6Y6V2hjJSMqcofe5pIsb4B9othmo2dhRkeFm7HS1NTdC79K6H2arCgYdlT?= =?us-ascii?Q?Irz5wdmH7TvmiSIhI8fs4U1R9H5ut8myYM8UtJe/ddBSi8ihY3UPCwsCvCxg?= =?us-ascii?Q?7sic+iiJ1jXxr5ksu8Knwkxf6CHUkRCatYHSKx01RRlMeBRmoyzTtvD04C2i?= =?us-ascii?Q?PSx2bzSlOUj8pvmIAtenMSm0jFmQZ7BQ8j7e7S+j0QzWqm4Urc9AtphHshCi?= =?us-ascii?Q?Ql50hm3tdHZYXdDieON2xZ1zga1V/i+FdrbeoldFu4ZBxmCE+7z5HAIJK7mf?= =?us-ascii?Q?0/POsRYPOexRIwUnBvcj9WJS7CbJ28bkfKNZ2ua0og+/yGutIOADlTTzSySI?= =?us-ascii?Q?M5xbgWx0P+wbdMHcpYJbJyfJMIJD/eST0KLxk/9CRK9WdsgH3UNyokx6DERX?= =?us-ascii?Q?yYZNew3Desv5cVNadQr8Yh4mouinCFej5eY7dp2a9a3ZNEkMUV8mRhqKPf/c?= =?us-ascii?Q?7OKdqrlahpRiAU7IkQimSMHzKbT4FPX1YXZPmxyowXl2j+7tbBCwWL1zXEPg?= =?us-ascii?Q?tb2jecrNhFaY/MzvkvMGqwguUaw5AAUkelShWnVJ9AS9/2qs2UISrBh/wzd8?= =?us-ascii?Q?0HYRFpcOwfIzZWtTuVYNADSdHcTLg3Vmh6YMSgdQtkSFfgEVrERDP7WOXmlB?= =?us-ascii?Q?ePoi86d675IuRsj+V3d70n/fwho68U/VjZlAndFwZSMINLIKnNN+kkU2VssX?= =?us-ascii?Q?spEBuLisiT+NSvzi4JHIDMJAAv6Cb+NvCwUq/19H1D2pMkSz66zuNOqWGlAN?= =?us-ascii?Q?EpvP7iwrD2NdJOHuNc4A1u61YV/1BiTtL6K3SjrNdo5UGzn7+yf3oL0KwllG?= =?us-ascii?Q?Kri+nbcXRvVX/333IHtosMx4Uy+tA0CJttwJa+fprjpD1ywtyWyOHZ1v6SXI?= =?us-ascii?Q?88OKI24nC9oPfaE6UsTizfH2DBc5oF05yK0sLIbjpvyGaU?=
X-Forefront-PRVS: 03607C04F0
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6049001)(6009001)(39450400003)(39850400002)(39840400002)(39400400002)(39410400002)(39860400002)(377454003)(24454002)(2950100002)(568964002)(42186005)(478600001)(31686004)(36756003)(2906002)(25786009)(6666003)(33646002)(6246003)(6486002)(4810100001)(270700001)(53546010)(229853002)(38730400002)(53936002)(77096006)(4326008)(305945005)(7736002)(5660300001)(8676002)(31696002)(3846002)(65956001)(6116002)(189998001)(81166006)(230783001)(4001350100001)(65826007)(66066001)(65806001)(2476003)(54356999)(4610100001)(50986999)(84326002)(83506001)(76176999)(86362001)(5890100001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2PR05MB2180; H:[172.29.39.5]; FPR:; SPF:None;  MLV:sfv; LANG:en; 
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR05MB2180; 23:L0+0cLMp1GWLd5+/p7m95Tuj+U4sf4h2hpu4o80LY?= =?us-ascii?Q?GWA9X/45yz3VmQu7X488A8s3CRyVzpTROc5tCfWxinJQUW1AdYHKD7rA1872?= =?us-ascii?Q?w3/GxjLsKYcFjSEpnxYljs2lUFYPEqw5AMsmK9mfAnWJFDZOA+uc8itRdMHu?= =?us-ascii?Q?u4Ct3VicGfJGGU3mLCJgmu072DjrUzdv4YakqiYDUP+gX3zXiKT0sfzO8n+i?= =?us-ascii?Q?xt7DwFm3zuhzw0AOp+oa7Zj1dlCNQO4NYmqssyjy8TapSlhZ6yeGoiN8lwqE?= =?us-ascii?Q?xKnNerCL+GYtHwJ7P9Ea75JPNSVrf//+ghUmP0UjCSbTW5rIBXiR+3qc6Ia6?= =?us-ascii?Q?KFqRUb8khwGa1G5KtfXatT9w6oinEoJ2tB/3BWNvxAG21V1AfHGdEBnaL7F+?= =?us-ascii?Q?RCb5e25PWxHDdjQSsgCswFQ97uvqjcuMZbvZUMvJ5ETlCX7VxApMBPMUDGwS?= =?us-ascii?Q?1608gGWg4V9WPKKhzPh0q1nZqx4G8dJ5t+mNUwcmUdFB7ApAIMlRo8Ib9RHm?= =?us-ascii?Q?atTzFkqIZjpMxZZ3p1gGokOs+Nu2g0nyaWZkHtx9NE629lMy8g5lqRWGiVsE?= =?us-ascii?Q?7lT2kjkqZEcEL+xaDY4KiJUSxS5G3CJjcvuDQZ3UTtjCwjmGMSsP2RF0uSnV?= =?us-ascii?Q?CPDFmbs4c7F1y0AJ017xcGuapZVREjJtbnWNaPxVwWYRTuv3XRSY0Pxq4jf2?= =?us-ascii?Q?TF+8mQ9U78537IOfbNUIzKNxgfz9ydj3avYB3OcE9+wmj+pUXk/ENytpCX+c?= =?us-ascii?Q?RZgpl+KMyIKDQtUL8++s3uCJNhpynymZW+E/tldXO/rBK5G7PRXg1Rj/fhVa?= =?us-ascii?Q?HhYIOhIyGDBbacBwLn55r6OgJCbttBzUEI09KyOZsoJQbi0pyTDevt+SGSXZ?= =?us-ascii?Q?sUif5sWPH8Q9SC8820EeODGg/sHsIJjNyOaDUh9STyowt2/YYb6XkFWMaYK3?= =?us-ascii?Q?oZ3b8eXkyH9jDrGLL2+OHccqqcFDyoLgyNnditn6n+VP0xlyl6kBsn/6jQPY?= =?us-ascii?Q?KD7CGpseAUmNtHZ+B5BAJFOBb+PkhOU/KUY7J6FdUzIB7rXyvNHPl6cmYXgl?= =?us-ascii?Q?6Wtk2qaJIGdQAgWu2HmRwJZ0fg2WYM4oWbK3IxfbxHhHSipusPUALCRD4J+V?= =?us-ascii?Q?fq9PPlJsgJJT///OHi2ICKTOGaL613I9C9sYqf6KvNOSAg+pMcDVNwp3CGjE?= =?us-ascii?Q?E8+pbGWwgsujnkjqxyHXFvWIIXx/ov6J4UupdQUsDOgBA0UI4Cb/f4EFFbm0?= =?us-ascii?Q?EtephAvv0WCSAXVwQTHGewJKOMUDa+jzNP3UBye5KHAZKsiwjbI7l//ZZ7q/?= =?us-ascii?Q?lUuTlKoaY8kaTi8ScqR1OSMxjhzbUHivewNgJhqB2RVeeBKyBsLmpD08dQcc?= =?us-ascii?Q?jeglNnnnWz+OiJX+m3RvRXNm1o=3D?=
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR05MB2180; 6:0pXSEcexNGmJ2uYw0OsP6zavdEhvXec4MYXuVXjoda?= =?us-ascii?Q?NDyiHRq0uvf3fkX9WJpxftJW6ynuvf+tya3c9CaLLQQjnCIzhlPDGexkvO+N?= =?us-ascii?Q?thCJ/urdvoUicA4L+0icXOfimFxd51FibHP2tSP4K2/2qQlyV4PARuN4YxWR?= =?us-ascii?Q?UqYZSYgyRBVFfoZ+SXznZ+EDHYVyiwEXn7yk9rn2WaP3ZcJgP0+hBlUB2KIU?= =?us-ascii?Q?W3rO+pjvhSunFlqEsTBXy53lkG5Z/pattXXvKlI//tqORoVGdoHJlYi1DTRx?= =?us-ascii?Q?uxE0GMs59n9HzBJAddwNydIfOo8IR+QF+yf+C1XkJCttjWFJmHHedP0O5oCE?= =?us-ascii?Q?5s0UUIZ53MMkgVilZ091szVAMjFMcg4a/VwyEkhTMibToQZ4nxM9imGDRoy5?= =?us-ascii?Q?2+tl++dssQ1KVHvSBDw6/vp/W5XjUfVggNR949CZHdRFN2Ex0gMlM26H5fCx?= =?us-ascii?Q?BgVwYfrI7uQAkvrxyykCRI4PDNplnlgqXolhg3rj2gIpTwYyFBglfj+ufIBT?= =?us-ascii?Q?5E64WHG4C9GsZjdmfI8QVMyVqrvj4beIFDZrljdWcqWEFQucYcIBTz9kHB8u?= =?us-ascii?Q?W21HiqUwxXssLUITWX/+RYzoUX+IOn77J8o/6YEWlKmN4DvEWKX3Ma6xCsyt?= =?us-ascii?Q?L+0wLnlX2NzHkbv148Rv0NphpTpcszWOROjfRX8eiatdXDxVxcz6Hg4Tn+Uu?= =?us-ascii?Q?MsFj/JFQqf78bd0XygBqMwpatBnVRXIGlY1IpifR3Ndp6pmYXJnGDq5iZ436?= =?us-ascii?Q?e+fXdtViEI2WdDd7cc2HiCCiMFPINCZdopvO8qSLs/2byPfxsfTY9ySzSzgl?= =?us-ascii?Q?2FA00pLF2BSr3Dp2M3lc9DFY5k6+GMk2L28MaARRvLjGCWlkbND67El93xt2?= =?us-ascii?Q?QPUureCBlTuVkSLA3epuOwcUIUaKBC6QRAjnbBaeTFda1O9IrUzj8hvHiJv+?= =?us-ascii?Q?p/oTW3ULvtVfHPuWdts8mu3jQbsYRprfANWNNwqpZVWLgvtQAn1tVZ5bsDlY?= =?us-ascii?Q?Iaejqtwktx3tCRJ6JKuE5E?=
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 5: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; 24:SEbYX1REp0AfUUfUdrAjLOb630+mQUDleNhmBcOU4guj94xFiYHJb19CTLKVmhdXveQ629E3J1IAwafMOsYqCWx4smwxRYeq/nrTMvPPpjI=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 7: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
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Jul 2017 14:46:02.6893 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR05MB2180
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/CTpoR3vRkO-azRa5GkcjUCMinCs>
Subject: Re: [Bier] Benoit Claise's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 14:46:12 -0000

This is a multi-part message in MIME format.
--------------6033769A55711F9B97E358B2
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

On 7/6/2017 9:13 AM, Benoit Claise wrote:
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> 1. I want to come back to the experimental status.

The status of the document is a political issue that should not impact 
the content of the document.

>
> I have seen Alia's reply:
>
>      In the BIER Charter, work item 9 describes a document based on deployment
>      experience that can justify moving the BIER work from Experimental to
>      Standards Track.  When I chartered the WG, it wasn't clear whether it was
>      merely a good idea or a good idea with enough motivations towards
>      deployment that it is worth complicating the architecture at the narrow
>      point of the IP hourglass.
>
> >From the writeup, it seems that the experiment is successful already:
>
>      The vendors are being quite tight lipped about current implementations.
>      Operator feedback indicates there are at least two implementations
>      currently, with others in the works. There are currently five vendors
>      collaborating on the work in the IETF.
>
> However, I've not been following the specifications development and
> implementation to provide a definitive answer.
>
> At the minimum, the document needs to describe what the criteria are for a
> successful experiment.
>      Implementations (RFC7942?)?
>      two interop implementations?
>      hardware implementation?
>      "deployment experience" (to cite the charter text)?
>      impact analysis?
>      something else?
>
> The ideal BIER document for this explanation is this architecture doc.

The above is all entirely outside the scope of this document.

> 2. operations and management section
> I'm sure there are such considerations:
>      - configuration
>      - sub-domain management
>      - BFR-id management
>      - adding new BFIR/BFER device to the domain
>      - logging
>      - troubleshooting
>      - OAM
>      - etc.

I am unaware of any RFC that requires such a section to be included in a 
document like this.  These topics are outside the scope of this document.

> There are also two other management documents that should be referenced:
> chartered item 6 and 7.

These are outside the scope of the architecture document.

> There are some management sentences, from time to time,
> in the doc. Ex: avoiding a second copy is an important from an operational
> point of view
>
>     It is generally advantageous to assign the BFR-ids of a given sub-
>     domain so that as many BFERs as possible can be represented in a
>     single bit string.
>
>     ...
>
>     In order to minimize the number of copies that must be made of a
>     given multicast packet, it is RECOMMENDED that the BFR-ids be
>     assigned "densely" (see Section 2) from the numbering space...
>
>      Btw, I guess you meant: assigned densely per subdomain, right?

Correct, I'll add some clarifying text.

>
> What this "operations and management section" should contain is the points that
> operators, who will deploy this technology, have to pay attention to. An
> architecture document is typically the first document people will read. RFC
> 5706 appendix A provide typical questions from an OPS point of view. I
> understand that this is an experiment and you might not have all the answers at
> this point in time.

This would be the topic for a different document.

>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> -   Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
>     to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
>     (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
>     BFR-prefix be a loopback address of the BFR.
>
> Just one observation. Was thinking, so it's like an (OSPF) routerId, except
> that it's called a prefix. Then I understood, reading further. It's not called
> a routerId because this address/prefix must be routable
>
> - Was wondering. Is this mechanism only for multicast packets? What about
> anycast/unicast?

You could use BIER to do a unicast, by setting only one bit in the 
BitString.  However, there are other more efficient encapsulations for 
unicast tunnels.

> End of section 4 you have an example about MVPN over
> ingress/egress PEs. Some multicast packets would take BIER encap, while others
> packets would take a different encap

I'm not sure what you're referring to.

>  From a troubleshooting point of view, does
> it make sense (is it even allowed) to send non multicast traffic over BIER.
>
> Victor Kuarsing performed the OPS-DIR review, copied below. Discussion is
> ongoing.

Attached are my reply to Victor and his response.  I did make a few 
changes in response to his comments, but the latest revision has not 
been posted yet.

>
> First, there were no textual changes recommended as part of this
> review.  The document seems to be well written and had undergone
> previous review/updates.  Given the nature of this document, there are
> limited operational specific points made as part of this review
> however three points are noted for follow-up with the actors.
>
> (1). Security Considerations
>
> It was not 100% clear to the reviewer (me) if the use case of how the
> BIER architecture (or guidance for future implementation) may avoid
> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
> may have missed specific text which addresses the point made herein
> (if so, please disregard my first point and please make reference
> where it is addressed).  The concern is if a packet is introduced into
> the system by a host (compromised perhaps) which fabricates packets
> (may or may not have valid payload inside the BIER encapsulation) that
> attempts to starve resources in the system.  One way of doing this
> (which may require control plane access - maybe) would be to
> set/create packets which forces additional replication at BFRs (i.e.
> set a single  - or all bits -  for all SIs).  This would then create
> the maximum amount of replication within the system.  Perhaps this use
> case is addressed as noted.
>
> I was no able to find specific operations/functions which scrutinized
> incoming packets and/or guard for bad NBRs.  Could this be an issue
> from the authors standpoint?  In more traditional networks, there are
> methods operators use to ensure that illegitimate traffic is not
> introduced into the system.  I wanted to make sure there was thoughts
> on how to do this with BIER.
>
> (2). SPF assumed.
>
> I agree most places where the BIER architecture would likely live (say
> in Enterprises and SP networks) the network would operate a standard
> IGP.  However, in some use cases, like modern DCs, some are designing
> fabrics which don’t use a traditional IGP.  These networks use all BGP
> (eBGP) with full sets of neighbor relationships.  This helps reduce
> the amount of running protocols within the underlay, but may (or may
> not) cause issues with BIER in relation distribution of system
> information.  Do the authors consider this use case one that can be
> address with BIER as it’s currently outlined, or would additional
> considerations be needed?
>
> I reviewed the “draft-ietf-bier-use-cases” document and did not see
> text that specifically help or hinder the operational mode I described
> above.
>
> (3) Broadcast Video Operation. (more of a question then a point of note)
>
> I did noticed in the use case document (as noted above in point 2),
> that considers more traditional broadcast video networks was
> described.  So my question is, would an operational model which
> required two simultaneous M/C flows from separate sources (normally
> two packagers/encryptors etc) be supported by the BIER architecture as
> described?  My best estimate would be that the operator would use two
> sub-domains that would allow each BFER to potentially get two of each
> packet (which are sourced by two different injection points / BIFRs).
> This mode of operation is common in some places to allow the M/C
> broadcast feed to be “pinned” to the egress router/device to allow for
> fast switchover in case of network failure (where normal network level
> detection and re-routing is not sufficient).
>
>


--------------6033769A55711F9B97E358B2
Content-Type: message/rfc822;
 name="Attached Message"
Content-Transfer-Encoding: 8bit
Content-Disposition: attachment;
 filename="Attached Message"

Received: from BY2PR05MB2183.namprd05.prod.outlook.com (10.162.230.159) by
 CY1PR05MB2187.namprd05.prod.outlook.com with HTTPS via
 BLUPR19CA0021.NAMPRD19.PROD.OUTLOOK.COM; Fri, 30 Jun 2017 15:13:00 +0000
Authentication-Results: juniper.net; dkim=none (message not signed)
 header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.39.106] (66.129.241.11) by
 BY2PR05MB2183.namprd05.prod.outlook.com (10.166.112.11) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id
 15.1.1240.6; Fri, 30 Jun 2017 15:12:57 +0000
Subject: Re: Ops-Dir Review of Draft-ietf-bier-architecture-07
To: Victor Kuarsingh <victor@jvknet.com>, Warren Kumari <warren@kumari.net>,
 Benoit Claise <bclaise@cisco.com>, ops-dir@ietf.org,
 draft-ietf-bier-architecture.all@ietf.org, gjshep@gmail.com,
 prz@juniper.net, Alia Atlas <akatlas@gmail.com>
References: <CAJc3aaNTCm1DMGU-8O5TSP=PiPUvRaB6r05NFbawkQaTrrdsrA@mail.gmail.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <64d0754b-d763-f080-c1df-cd82c30742fc@juniper.net>
Date: Fri, 30 Jun 2017 11:12:53 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
 Thunderbird/52.2.1
In-Reply-To: <CAJc3aaNTCm1DMGU-8O5TSP=PiPUvRaB6r05NFbawkQaTrrdsrA@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-MS-Exchange-Organization-Network-Message-Id: 185db8f2-e52e-4563-49af-08d4bfca7e5e
X-MS-Exchange-Organization-AuthSource: BY2PR05MB2183.namprd05.prod.outlook.com
X-MS-Exchange-Organization-AuthAs: Internal
X-MS-Exchange-Organization-AuthMechanism: 06
X-Originating-IP: [66.129.241.11]
X-ClientProxiedBy: DM5PR0101CA0004.prod.exchangelabs.com (10.174.180.17) To
 BY2PR05MB2183.namprd05.prod.outlook.com (10.166.112.11)
Return-Path: erosen@juniper.net
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 185db8f2-e52e-4563-49af-08d4bfca7e5e
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(48565401081)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:BY2PR05MB2183;
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;3: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
X-MS-TrafficTypeDiagnostic: BY2PR05MB2183:
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;25: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
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;31: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
X-MS-Exchange-Organization-SCL: -1
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;20: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
X-Exchange-Antispam-Report-Test: UriScan:(278178393323532)(236129657087228)(192374486261705)(48057245064654)(247924648384137)(17755550239193);
X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(9101524173)(601004)(2401047)(8121501046)(10201501046)(3002001)(100000703101)(100105400095)(93006095)(93001095)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:BY2PR05MB2183;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:BY2PR05MB2183;
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCWTJQUjA1TUIyMTgzOzQ6ZGJYQ1VteEI5QXBGRVkrUlVLcE1HSmVZdTZS?=
 =?utf-8?B?VXV5SDhSSDdmNFRRdUNWdjZVTnEvU3c2cDA2enBNVzI1R2ttM2NaSDFjbktI?=
 =?utf-8?B?eHRQeTJjZERXNVp4dUsyM29RbUVKNEF5bkk1TjByTUd2eVhsVEFRQ1NsYjJP?=
 =?utf-8?B?SUd6T2k2NDY0U1FvNzRYa2pQMjhhcGYyTXEwZmdTZmZuQ2ZsYU5JckV5YkU2?=
 =?utf-8?B?VkZIU0RPSi9Wckt1QWpHWjlRK3kxdXJ6akozazl0ZUJXVnd0bDZFUzBPTStV?=
 =?utf-8?B?dThrSFhSb2NnSURQN3VRSVJ2T2REa0tVbnNlczFPNGdBcjc3RE5hcnhDWitV?=
 =?utf-8?B?UnM4TEhoQTQzTWdIcW1hZDl1aDhDamgwdVBaUzBjanBLKzhFaXRFRVdtZ01V?=
 =?utf-8?B?ZUxIQytKQXUzM2lzRzVYYm1wcXJXQm9ndTA1Q1dBQjVGSmNwN1MyeDhQUG4y?=
 =?utf-8?B?WWZ2bkdpZmFOOS9tbnM1QW95d0UzRVcwVWhrMmRXVjAxU2dMcVlsOVlKbkdr?=
 =?utf-8?B?c0dGWnNLMVlzcDlwZnRtdDZRMmxtbHQ5RUpPWXk5MXZtYXB1Q1F5cGYzV2JS?=
 =?utf-8?B?YzFQZUdGKzZyQUZ0cDJ3cFJHZVFnK2NJTjlXa0wyOVRKcFY4WUI2L0FGeG5w?=
 =?utf-8?B?RUVuVVJJRFNobTE0Q09ZcjRhbTdFb0E1L09qRzA0dU9McFBuU0U2ZVZvTnA0?=
 =?utf-8?B?bGhJWWhNMzJmZGFPMzFnWmlITnFBYUtKRDlOam9vUG9GMFQ1VlkwcUtYbUhj?=
 =?utf-8?B?d1AyVVlQaUZJZ3E5WGc0TDFwK0ZjV0RTZGM3aU5BSEJlSGtEbUkwVkVQQnhQ?=
 =?utf-8?B?MVRiRzJWOXVhVHpSdzI2NFpzZUV0U21LSThWcGZmTzZBYXhsQUZqYm1LR3dn?=
 =?utf-8?B?eGU4citLWklVVDFoUmhzWFBhTDYwNklOM00rTjZ6bzc4QXBpNkdJR3hqcTBU?=
 =?utf-8?B?WnhRaDA2VUZGZFBrRWRuaW1ObUo5enlKSlp0aDhDY0NibTMzTjBheEFJdWx1?=
 =?utf-8?B?blhWNDl0Z2tRWDNJNUJBV0R5bTNpaVl2SDRDdWhUMVdFMUFWWUZUUXVTelFF?=
 =?utf-8?B?Zkd5WWpWbkdzN3VOclpsREd5VENZcEFxYzMyMjJKUk8vMjlhakV5Ny9DS2FZ?=
 =?utf-8?B?VUJoU1ZDU0ovbEtyUjRhSGVtamt5SlJMNUNFbGRuSmtVWHNEYXNleExleHRR?=
 =?utf-8?B?N1VmU3FkQWpBdXdhRnNBcm5COXJVWk5CR0FoYmVUN0t5dXk5WWxXcGhRM3Vo?=
 =?utf-8?B?MlRCL09ZYWFGdDkwQWNiS0M3WUI0VWt6ZjhBSDU1bFFibU9PL1UzdTdzU3FS?=
 =?utf-8?B?OE9JUkNFamJJb2dmMTFEQk0rdUphSTV5cVB6N0RyOWh0QVNlemUrNENxU09R?=
 =?utf-8?Q?Rr9GYt0?=
X-Forefront-Antispam-Report: SFV:SKI;SFS:;DIR:INB;SFP:;SCL:-1;SRVR:BY2PR05MB2183;H:[172.29.39.106];FPR:;SPF:None;LANG:en;
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;23:yR3oWsu1rKhruwgJYxhjMdKZbA5MyuFg5ud2YIpHYtcB0xAFFdpqxdkPORGyj/QmvVvCS5KyW7MhgQnU0mT0ZNefIqtBanu33Kl3FKPn0sNqrZKTMr9jfulqurj+Eri5FkyLTneXVwBlr1ey6EoefQ==
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;6: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
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;5: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;24:6/M+b/yYfdJZgaqUZ7xe9kxa97dsgzpWrR76HeNy7KCmY4jJK3a3Pf3l/y8CvhHP60s/+Ffxcy32U53bOr76NYqmohWy03a2ilexRVHSzxU=
SpamDiagnosticOutput: 1:0
X-Microsoft-Exchange-Diagnostics: 1;BY2PR05MB2183;7:YAnZEuJ96IBXeUgPosGxT0eb5PpSmWcuhuGzv7Snmy0HL2SGG9XTAuStJlLVB4irgru+ij+qOxTgEc8sH5Z3a5//VWu1hzvVousedkU2xBrUs4lIeIYyePGATeW2lY9OZfO9gu3Mkq5K4v8UqXGICRwASJ7rb9mOEFb1UBNFTE/9hYvexgXeZTAqwZlTLGhW9hxtoZ0hGpPP8G42ab473X7QItCk9msuUtftupw9uCskUaLYpRHvLZNI+NFBd4OxWRO8tv9WeivUoCQFRIn8tQk89K0NzIGrUdD9tQFMwhK5H2KkFSuKqX2f9vGFYEi8judZhrVY/UZFn2oOzYLmrXh8QoAuedzqEZ859ETyaPWQd3LycvOnGfFw1JepzG5YNmoQ1l0IPh8FuYWSM9SwcrrJ4qBzv2JpqRJ37u3ggfWhDz3PaCNlup/Fa7c+467wnJxWCwjq18Jh4ckZ0kWxXd3fXKxPfkQPTjDkytfFixs9reRHUcVr5D7vPDxEcTPtvBvokQRb2HURwViuEFuSZ4zcohUUnDIwScUPXH+vqs6BuhzkB3PUdiVb++xfs2eNkgQlovgHFS2L9q/PP/a+oJFZuso/hP5DFTjoXmldGbj6HgSoKrtTo6HC8zYDUwk0KleZztBKUboYmPGsJoFy937lSKZLEiTYXZ8M6wQhy8E7RARw4q3Bb5FZKyTAai6bVZ7iyvbsvDWcpuKn3Bq/VNghMMUQR9km7RNzh9zUzZzjSNdkBnx5Q73AR6VkDb2wSPuW5ZNkwmg/+VWUPav85nQk3ISHtugcN+IMnX1i6Vs=
X-MS-Exchange-Organization-Recipient-P2-Type: Bcc
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jun 2017 15:12:57.3301
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR05MB2183
X-MS-Exchange-Organization-MessageDirectionality: Originating
X-MS-Exchange-Transport-EndToEndLatency: 00:00:03.0160990
X-MS-Exchange-Processed-By-BccFoldering: 15.01.1240.000
X-Microsoft-Exchange-Diagnostics: 1;CY1PR05MB2187;27:J2XsButWc/xySceQpAFLjUm0rOWJsQXVixOXOerz8G2N12xh/7LX4B1JmgMA0KO77SXUp9anBEoNhes8VvlmhO1B933inVxCkfC9+SbYIKlTiFyrPmN7MVkeKwpsc5gfPtNJ6nuiZBd0gGar/IyxnQ==
MIME-Version: 1.0

Victor, thanks for taking the time to do this review.

> (1). Security Considerations
>
>
> It was not 100% clear to the reviewer (me) if the use case of how the
> BIER architecture (or guidance for future implementation) may avoid
> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
> may have missed specific text which addresses the point made herein
> (if so, please disregard my first point and please make reference
> where it is addressed).  The concern is if a packet is introduced into
> the system by a host (compromised perhaps) which fabricates packets
> (may or may not have valid payload inside the BIER encapsulation) that
> attempts to starve resources in the system.  One way of doing this
> (which may require control plane access - maybe) would be to
> set/create packets which forces additional replication at BFRs (i.e.
> set a single  - or all bits -  for all SIs).  This would then create
> the maximum amount of replication within the system.  Perhaps this use
> case is addressed as noted.

The security considerations do say that every BFR must be provisioned ot 
know which of its interfaces lead to a BIER domain and which do not.   I 
can say a little more explicitly that one shouldn't accept 
BIER-encapsulated packets from outside the domain. That addresses one 
sort of threat.

The security consideratons do point out that modification of the BIER 
encapsulation through error or malfeasance cause misdelivery. I can add 
that certain sorts of modifications, such as setting all the bits in the 
BitString, are potential vectors for DoS attacks.

It is probably worth pointing out as well that when the initial BIER 
encapsulation is imposed, certain errors, such as setting all the bits 
in the BitString, can result in DoS attacks (intended or unintended).

> I was not able to find specific operations/functions which scrutinized
> incoming packets and/or guard for bad NBRs.  Could this be an issue
> from the authors standpoint?  In more traditional networks, there are
> methods operators use to ensure that illegitimate traffic is not
> introduced into the system.  I wanted to make sure there was thoughts
> on how to do this with BIER.

The only check like this is at the boundaries of a BIER domain, where 
BIER-encapsulated packets are not accepted from interfaces that lead 
outside the domain.  I'm not sure what else one would do.

>
>
> (2). SPF assumed.
>
>
> I agree most places where the BIER architecture would likely live (say
> in Enterprises and SP networks) the network would operate a standard
> IGP.  However, in some use cases, like modern DCs, some are designing
> fabrics which don’t use a traditional IGP.  These networks use all BGP
> (eBGP) with full sets of neighbor relationships.  This helps reduce
> the amount of running protocols within the underlay, but may (or may
> not) cause issues with BIER in relation distribution of system
> information.  Do the authors consider this use case one that can be
> address with BIER as it’s currently outlined, or would additional
> considerations be needed?

With regard to the control plane, there is a draft that explains how to 
use BGP to distribute the same information (labels, BFR-ids, 
BFR-prefixes) that is distributed via OSPF or ISIS extensions.  I don't 
think anything explicit needs to be said in the architecture; the 
architecture uses IGP-based distribution as an example, but I don't 
think there is any text there that requires the control plane to be 
IGP-based.

In the data plane, the document does focus on the case where the 
"routing underlay" is IGP-based (link-state-based), but I think it is 
clear that all the routing underlay really needs to provide is the 
mapping from BFR-id to BFR-prefix to set of next hops.  Some of the 
techniques discussed for tunneling around non-BFR neighbors or for 
routing around failed neighbors do assume link state routing, but these 
techniques are optional.

So to answer your question, I don't think anything additional needs to 
be added to the architecture to accommodate non-traditional routing 
underlays.  I'll do another read-through to make sure it's clear that 
OSPF/IS-IS are not portrayed as strict requirements.

> I reviewed the “draft-ietf-bier-use-cases” document and did not see
> text that specifically help or hinder the operational mode I described
> above.

I won't comment on the "use cases" document.

>
>
> (3) Broadcast Video Operation. (more of a question then a point of note)
>
>
> I did noticed in the use case document (as noted above in point 2),
> that considers more traditional broadcast video networks was
> described.  So my question is, would an operational model which
> required two simultaneous M/C flows from separate sources (normally
> two packagers/encryptors etc) be supported by the BIER architecture as
> described?  My best estimate would be that the operator would use two
> sub-domains that would allow each BFER to potentially get two of each
> packet (which are sourced by two different injection points / BIFRs).
> This mode of operation is common in some places to allow the M/C
> broadcast feed to be “pinned” to the egress router/device to allow for
> fast switchover in case of network failure (where normal network level
> detection and re-routing is not sufficient).

If a flow enters the BIER domain at two different ingress points, and 
each ingress point knows the egress points for that flow, there is 
nothing to stop both ingress points from using BIER to multicast the 
flow to the same set of egress points.  The egress node would have to be 
able to tell when it was receiving two copies of the flow, so that it 
could choose one copy as the one to forward further.  The BIER 
encapsulations (not described in the architecture) do carry the BFIR-id 
in the BIER header, which makes this possible.  If the flow from one 
ingress node fails, the egress node could switch to the other flow.  How 
it determines when to do this is outside the scope of BIER, of course.

If it is desired that the two copies of a given flow travel through the 
network along disjoint paths, one would have to set up two different 
"routing underlays", each disjoint from the other.  This would require 
two sub-domains.  This really becomes a network design issue, but could 
certainly be handled by BIER.

So to answer your question, I believe the architecture handles these 
cases, but BIER is only a piece of the solution.



--------------6033769A55711F9B97E358B2
Content-Type: message/rfc822;
 name="Attached Message"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
 filename="Attached Message"

Received: from SN1PR05MB2192.namprd05.prod.outlook.com (10.162.230.167) by
 CY1PR05MB2187.namprd05.prod.outlook.com with HTTPS via
 BLUPR19CA0029.NAMPRD19.PROD.OUTLOOK.COM; Fri, 30 Jun 2017 15:22:20 +0000
Received: from BN3PR05CA0014.namprd05.prod.outlook.com (10.174.64.24) by
 SN1PR05MB2192.namprd05.prod.outlook.com (10.169.124.140) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id
 15.1.1220.5; Fri, 30 Jun 2017 15:22:19 +0000
Received: from CO1NAM05FT061.eop-nam05.prod.protection.outlook.com
 (2a01:111:f400:7e50::207) by BN3PR05CA0014.outlook.office365.com
 (2603:10b6:400::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.6 via
 Frontend Transport; Fri, 30 Jun 2017 15:22:19 +0000
Authentication-Results: spf=none (sender IP is 74.125.82.42)
 smtp.mailfrom=jvknet.com; juniper.net; dkim=pass (signature was verified)
 header.d=jvknet-com.20150623.gappssmtp.com;juniper.net; dmarc=none
 action=none header.from=jvknet.com;
Received-SPF: None (protection.outlook.com: jvknet.com does not designate
 permitted sender hosts)
Received: from mail-wm0-f42.google.com (74.125.82.42) by
 CO1NAM05FT061.mail.protection.outlook.com (10.152.96.179) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id
 15.1.1220.9 via Frontend Transport; Fri, 30 Jun 2017 15:22:19 +0000
Received: by mail-wm0-f42.google.com with SMTP id z75so25774907wmc.0
        for <erosen@juniper.net>; Fri, 30 Jun 2017 08:22:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=jvknet-com.20150623.gappssmtp.com; s=20150623;
        h=mime-version:in-reply-to:references:from:date:message-id:subject:to
         :cc:content-transfer-encoding;
        bh=nkFnyYyQuS7lmrkm+FjqQXxe+7n8HLrAzVDkA4529CE=;
        b=bYcEzJk3nOPlpp3v8woVo/03exPaWyNvYLtthxcny3UQTn1HmIGqN5d5OXak+hE6Ry
         uJHz6cTzNXvp62ANbyfvxOcPD3AcTAL/LjOTvWh32mHvCRZAUTk+s1mDnzOUjPFymbY+
         e3TYGbh6YAqKa2iT+z/5uu3f9q8M6W/Q7cPxx8Ax6FNxb028EwdVjBUsK+hclsbwdvb/
         dXlryvnmFBH3um3k41Z0gTPYv6QQPRdwRLKUsHfoDb3YJrKiO1V1HUc24kuLkriX5Uhf
         4y1Ru4sYNQ4DLF0CaXACEuGr5egXIi4rrMaB16hwMmN8vyFYECgILpWBscEe7xX6Vo3W
         b7Tw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:in-reply-to:references:from:date
         :message-id:subject:to:cc:content-transfer-encoding;
        bh=nkFnyYyQuS7lmrkm+FjqQXxe+7n8HLrAzVDkA4529CE=;
        b=qjSfdwkSC+UZB0jJcPBeN1HFWMiU8Mt5h4c6MlBZXzs4m3o2VkW4deS4Xl+QAjB20E
         JyJHWXe1fQApheZfWmV4HX67rC7JKgsBIs7l9f0t5+cWavkn2brqIIYMkB5xX3GYl+rP
         tuxcQndFhU+mJoXksyff3dYIZKBNx3IAk+nc46T7qruNPzHwalN9NpsZAPPgTsDjZNWk
         zLsT/q2YPHbqe9QAjbUDISPns2sfM6Zzj3nCZ0KxKCZugm02MtTjzQMVxg/jNOUUCQ5C
         Drt1iA+NdnP8qsG1g2pRtLcabK0Bz70XryC7KXH2irfnlhjV5Fdw9raxYO6EIPQgapgp
         RmNg==
X-Gm-Message-State: AKS2vOwrmxEXZHftQ38YZP2wXt1jvNvhaFui6VbQDNTiB0jd0LE+xAQ8
	Njed113FB3XnME35CPm8wbhdB1sQkWSj
X-Received: by 10.28.133.80 with SMTP id h77mr4261439wmd.96.1498836137399;
 Fri, 30 Jun 2017 08:22:17 -0700 (PDT)
Received: by 10.28.16.141 with HTTP; Fri, 30 Jun 2017 08:22:16 -0700 (PDT)
In-Reply-To: <64d0754b-d763-f080-c1df-cd82c30742fc@juniper.net>
References: <CAJc3aaNTCm1DMGU-8O5TSP=PiPUvRaB6r05NFbawkQaTrrdsrA@mail.gmail.com>
 <64d0754b-d763-f080-c1df-cd82c30742fc@juniper.net>
From: Victor Kuarsingh <victor@jvknet.com>
Date: Fri, 30 Jun 2017 11:22:16 -0400
Message-ID: <CAJc3aaM2HSBvPW_kMeRgDawxo4Ba9G0oTAYLw_PePWBnpexxQg@mail.gmail.com>
Subject: Re: Ops-Dir Review of Draft-ietf-bier-architecture-07
To: Eric C Rosen <erosen@juniper.net>
Cc: Warren Kumari <warren@kumari.net>, Benoit Claise <bclaise@cisco.com>, ops-dir@ietf.org, 
	draft-ietf-bier-architecture.all@ietf.org, gjshep@gmail.com, prz@juniper.net, 
	Alia Atlas <akatlas@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Return-Path: victor@jvknet.com
X-MS-Exchange-Organization-Network-Message-Id: 55d4a914-6f0f-4c23-14d4-08d4bfcbcc3a
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: bea78b3c-4cdb-4130-854a-1d193232e5f4:0
X-MS-Exchange-Organization-MessageDirectionality: Incoming
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:74.125.82.42;IPV:NLI;CTRY:US;EFV:NLI;SFV:NSPM;SFS:(6009001)(8156002)(2980300002)(428002)(189002)(199003)(51694002)(377454003)(24454002)(51444003)(5660300001)(189998001)(54906002)(101416001)(42186005)(8666007)(498394004)(7596002)(73180200002)(305945005)(9686003)(16003)(956001)(107886003)(110136004)(47776003)(230783001)(93516999)(229853002)(54356999)(50986999)(76176999)(50466002)(23676002)(61726006)(55446002)(1096003)(8746002)(9896002)(6916009)(8676002)(2950100002)(106466001)(7636002)(53546010)(105586002)(86362001)(5820100001)(356003)(4326008)(55456009);DIR:INB;SFP:;SCL:1;SRVR:SN1PR05MB2192;H:mail-wm0-f42.google.com;FPR:;SPF:None;MLV:sfv;MX:1;A:1;LANG:en;
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDTzFOQU0wNUZUMDYxOzE6dzVqdmlaK1pUUmZ1VDZNbnU4V2I2U0U0MWU5?=
 =?utf-8?B?M0Z5UzVBcVVMMXkxREFZWStSV0UzaldPeXQzRXg4NFJUNmtMOXE4ZWw2S1Bp?=
 =?utf-8?B?K2FCdmRkUVE5aXNjc1dXZHhTTzB5MTF3Lzd5dEpoeHFvZmxiYUxQTkFtd1o2?=
 =?utf-8?B?Z3FHTHQyUFNYQ1lBMEpJV1BZWGRSNUREUGpkUzJkNXZremxVbDFIK2JtM2tX?=
 =?utf-8?B?c2ZsTWt1ZGc4TGovVzlQdEVPY0hCd3k0cVZ1QStYOG1VWnVkcTgzUCt3UjRO?=
 =?utf-8?B?Yy9tb2tTQ1QvT0dOQTBwTC93VGVNVUJ2QjJ4U0pEcUFrejZZMExiMEVnbFND?=
 =?utf-8?B?S2QvYVV1UGpYWjB4UWE0ZFQvKy9ydk5peVc4SVAyekRSS0VZUXhpVjNpSU9Q?=
 =?utf-8?B?d0plT3RaWUloNW1Hc0xoRHU5aitTazU4M3h2ZitpV21UUUtIa1M0bDBCMFE0?=
 =?utf-8?B?RzdHcmJDOXVPVVdwRVpBVWhuZTArRzYrZ1ljMlQyTGxYMHNWS1htaHZsZTZJ?=
 =?utf-8?B?VzdiNHN1bytUeHFsZk5QTG9sUHM2OUNDMWM2V2ZSRFk0NVlnTHVmRDUvUU80?=
 =?utf-8?B?NmNNRDBaM3RWa21BR3Ztc2tPZEpnd1d3NERpRy9pcHd2QlVuUys1WVNXWnFO?=
 =?utf-8?B?dHpTcC9ib01VZnZTWUdOa3BzRjJFbTY3UTJ1RVhDbGFDelVWOFNvVEZGWWp1?=
 =?utf-8?B?azgyd0kzSUJDaTd0YXAyYW56TjE4VmFoV3JzS3dPc2J0QnVseE9aUU9sTUJr?=
 =?utf-8?B?UzZINk1UT3JhcklPMFdWOFROZURiL3UybGNwS1FCR2JBYk44MWVmSFVyOTVr?=
 =?utf-8?B?UDFmMWdENWlvamc2S0pQTFVLcmNUZHF1N1FwNG5lM0pxSEorK1RSNzlRUGwy?=
 =?utf-8?B?bFFUcStMT1BnSDJXbmU1WTZseFlVeE5KUDJIbnNZcVozSlgvMmF6ODlzOENZ?=
 =?utf-8?B?VVFqZ2M0SE9uSUF5RXhCbW83OWMyZlRDY0hrSm1JQnNTYy91Y3Y4eWl1aVRu?=
 =?utf-8?B?dXpQellEajN0ZTd6NjdDdnZYYTRPQ3pqMGtFemJaSHlvcWFaa3RQQWxRQmZQ?=
 =?utf-8?B?Uk5vTXZSTW1UQkpGcy8rZnJtMzQ0ejEvdTRNRTIyNjRvUnJDZ3J4QmNBd1I1?=
 =?utf-8?B?TXJBdzI5UU4zTi9HUTlQc0xBTCtDMTlCeHZkeE14N2NORGtzdDZYRjIzRFR3?=
 =?utf-8?B?ZFJ0UDFkeUN2T0tJOXRDcC9Gc2VDZVowOUxCQVgvdCsxK0UvWklPRXhIN09o?=
 =?utf-8?B?aE9VUEhIcVdzc05sdEF2aHYvYlg4NTIrYjVZMy9mRDNuRmVBeTZhTUgwQ0Y5?=
 =?utf-8?Q?RkHvw/VSkccSgIQNg//oQNCBNpCGnz8=3D?=
X-MS-Exchange-Organization-AuthSource: CO1NAM05FT061.eop-nam05.prod.protection.outlook.com
X-MS-Exchange-Organization-AuthAs: Anonymous
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 55d4a914-6f0f-4c23-14d4-08d4bfcbcc3a
X-DkimResult-Test: Passed
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(23075)(300000502095)(300135100095)(3001016)(300000503095)(300135400095)(71702078)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:SN1PR05MB2192;
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;3: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
X-MS-TrafficTypeDiagnostic: SN1PR05MB2192:
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;25: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
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;31: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
X-JNPR-Received-From: outside
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;20: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
X-Exchange-Antispam-Report-Test: UriScan:(278178393323532)(236129657087228)(192374486261705)(138986009662008)(48057245064654)(247924648384137)(17755550239193);
X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(601004)(2401047)(13016025)(13018025)(8121501046)(9101536074)(3002001)(100000703101)(100105400095)(93006095)(93005095)(10201501046)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:SN1PR05MB2192;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:SN1PR05MB2192;
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtTTjFQUjA1TUIyMTkyOzQ6SXgzQ1VNdnpvcFRwK0czVWV3L0ZtZWhjZURK?=
 =?utf-8?B?N0dCU2Z6TUp3ak5UaUJ3VFAzcWZybllKRWl6MWhsRVVSaUxSSDNWNEpaaFJC?=
 =?utf-8?B?bW9MeHJjVXpqb1ljWkJnSWNzMmlXSlR1eTBYMk5lV2JYbGRDcW1pQTZYSms4?=
 =?utf-8?B?eUVoSXJuK2JzMHhEcUVHaUNsN0p0V1lWS056OW4zUDBGUGRXMG9sYnJqU29H?=
 =?utf-8?B?eVFnRjljOEROdGdNOFBKMzlrOCtZZTE5VUthVGZTRG1MR2JXdGlvNlh6QXln?=
 =?utf-8?B?MlM1KzVHSzU1dWxjWmF5dm43b0lTdUR4Y0NVQWpPN0RGeUV0bHJxRWZXWHcx?=
 =?utf-8?B?cnFCc0x5MnFNYWVUUzhJQ3ljVWtGeGdwTzVod3YzampaQjNUcWZLK2ZVV0xP?=
 =?utf-8?B?UTRwOHYxSFNhWTFBblFjTlFtYzc0UnBodyswMS9keXZOMUE3S21lK0ZYTmsy?=
 =?utf-8?B?NGRYNTBMTmhnRDh5V2owUnM1aGpzNStYdER5SElubVJRejFPUXdrcXMzRGwr?=
 =?utf-8?B?MFo4eDFHUXVXZjB3em9tcGlnVlBIdVdhL2lvYXUxc21iSmxISi9Xa1RNbVB3?=
 =?utf-8?B?ZjZ1MUc4eW5lK3p2OW1RWWRCNXBZODZyMGRiUG9SSThxU1F6L0ZDb0czL0tU?=
 =?utf-8?B?d1YwdjJIREIrbzdsNlNTNHhiVjdaVmxGbk4vZEFURTUxUE51SEh6YUhkSXJm?=
 =?utf-8?B?SXY2K1RVb1lxWjVKZTZmcjNOSFFUeW5jVDdDMmJGelM5dlltTmxsWk4zQnRl?=
 =?utf-8?B?dlpabnhsQlVRa3luZ0Njc1NubnVjai9hSkhLMnViOVpnZEZjaThDY3IzY29Q?=
 =?utf-8?B?dytleVRsWEFkNU11QVozRjJOK3laY2htQk1NU1BSTkZJTENqbGJySVFiT3ZM?=
 =?utf-8?B?N3NmajVOMTNVelp4N2dhMW91YldoYVJjNGt5bW5FdVJweVRuU2V0L1p3YlIr?=
 =?utf-8?B?RFRjZ1dWWXQ4dXhaSkVQZU81RExNSWdoNFZ1Zkw2U0VQRkE5bVNFRkptY0FX?=
 =?utf-8?B?REltMjhtT0liQUpLMkxFWTQ0Zm9hekZxNDJFWXhlK202WHR4NHRsenRzNSsv?=
 =?utf-8?B?Nkp4aHJVU1dGb25IQ3FvbkJRWHlFRlhqUFBjanJTdlJaWkhEcHNnYk9ITER0?=
 =?utf-8?B?R2docDhINU5JdmJ2Q05PcDAzRmNlWDNRNzl5NXhGNVRRWnA5aGJmSlRYWUht?=
 =?utf-8?B?UGRXRFpkbWxYcWlOd3pSL3RrcCt0RHhKNWtqeDUzb0phVXc4a1E0RHVDQ3V1?=
 =?utf-8?B?WUlZN3Byd0hHSEpPbWdDU210SE1UZnNMcHBzVC9TcnZZenBGNGg2UEZ0eTZ0?=
 =?utf-8?B?Q2JIc2xiVUFlNTNoL0NCSytoNFZ0dkE0NXBjbjcxQzRxUWNQNC9tWVY5RkI2?=
 =?utf-8?B?cDJ2SXdMZnkvV2JEYkdKZ2JOSHRxN1JHbUF1MzV5R29rODM3V2RRRHZDaExX?=
 =?utf-8?Q?QcTY4cMVPYToF1SL9z7l/5PMon?=
X-MS-Exchange-Organization-SCL: 1
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtTTjFQUjA1TUIyMTkyOzIzOmVxTnVjQ0VGbW8xMUF3S0xyL3JmOS9tb1I5?=
 =?utf-8?B?OHRacjdwdGJxR0Y5Snl3aDV2YTZ5Z3pyc1hIYnBFcGZyMDNzV0dvVWQ5dzZm?=
 =?utf-8?B?UnM5S2U4dUVEU2R2T1M2ZkREWlhlaFFHNGd5YkZtNGRWTmx6M3N3UHA5QlVk?=
 =?utf-8?B?eXFEVDFrc3M0N3BuWUFBY2tnUUlVVEtKK2tESlJqSmZKUGpaaXlBdGoxbVRs?=
 =?utf-8?B?K2crQWxCQnlWVll5blJJRzJ5Q3U3OXJlRUl1MFc1OUhJZ3d6ZWlYNXpvdUN1?=
 =?utf-8?B?bnBqK1A2ejNCcndTUHk1U0hRRDY1Y1lLdmVXbVZNQkc1aTB3SWVaTGNKenVn?=
 =?utf-8?B?dEFpNmRHd3c4ZUVjbEpwRUc0a1FEMWVuV1hKK0ExOWQxanc2RVgwUDZpbFl2?=
 =?utf-8?B?NVlOOW1aTlNIcU5qSm5iRDl3dWFLWGs4cU9hUDNQb21FVnBScWViZDdFaEdM?=
 =?utf-8?B?M0FObDQxSFBVVnMyUXVLeUJ2UVhkbk5JRnpwUGZFd0NtTGsxUmJMSm5KWnNL?=
 =?utf-8?B?QzhpU1FyQm5GakpxSnpUTldyTzhXYUNOdHI5YU1jYitMc3liaTlmU1NFTnZ2?=
 =?utf-8?B?RUI2UWcvaTZJc2s0L1hDa0p2UFBPWjRucFV1aG0wVlc3aW5nNVQ5YjB6UWM2?=
 =?utf-8?B?eGd1ZXEyaldWcUlPVFhCSGNhQnNIYyt6Mk5TMzVFNEhhcjdaWGNFRmxYREFK?=
 =?utf-8?B?RHI0N0haNkdPNW02ZWM2Q2dTYm5GRnBGZ25KYUV6NlJnM1FuTHhOWHZ0akdZ?=
 =?utf-8?B?RG9BNGIxYTNnZ3M1S3JRYWZMb3pQcDZDZG90ck9XYUFscjZERUlsaTZKbXR5?=
 =?utf-8?B?TitBTjBtMzJhU1VRQmJuMGE5VUNSZ0VvZW9TcmMyS0p0cXBSVzZ0ZlEwYTFw?=
 =?utf-8?B?Y25ZT29WdTU2VU9PMFZyclR2UlJBb2J4MWovbndFU0l1OGhBNmFpdGlYdGJN?=
 =?utf-8?B?aVZGeS9rQVVjY1N2RndFOCt6SmJyZUJVUnJBWEx5dUhTclR6RTgwdmY3QlVh?=
 =?utf-8?B?WFRDYjlQY2tKLzZmVC96M1RXdkFpdCs1N21RY3BDQzQrdjMzMUdwR09RUjFI?=
 =?utf-8?B?a2FrUndTR0xuamlaVWZUSU1VRzlnaHRwQ2RJY0pGZm5oSjRjbzlRWXJuT2ky?=
 =?utf-8?B?NDYxUFliZENCRExGUnZXRWswWHBRTjNhTzgxdVVkbFBpcG84eGgrUUgwMnRv?=
 =?utf-8?B?alAwKzJ2S0h5ODB3c0JRc2lCcXdkdDE2dDRZL1RwVUE4V0Z4KzJLc0U3T2V5?=
 =?utf-8?B?dzJSSUNYWDdZQVJDWXBBVGN2MVlyTVFVVTVOQnhzN3lia2FVRFhZdEl3WkVr?=
 =?utf-8?B?ajBxOWpoM1NWUVdzMDdFdVlLRmxFY2dOZHU1c1pPS0ZQYUJ3NzZBK1FlS21r?=
 =?utf-8?B?Z3hkTDFhWTBvdnVYeTZsRXVaZGo4STI2NWpkUzM0em9CQ0NDRGJXY1lDZTVx?=
 =?utf-8?B?dzlKWnJUdHVKaTlUcmVpS21jcmNVMjY2MjVSeHdhd3d4d1dzYko1dzdLZWta?=
 =?utf-8?B?UERLQnJ6Y1BQbUZtblhRTW5JdHUyRkZGb3NDSlA3MXdJdmN4RlJUQ1AwdmRr?=
 =?utf-8?B?ZTRjVDdtSkNGckYwS2JzS2JmZ1NyUlhTSnZxQjErc1lKbFVYb1pydGg4dHNv?=
 =?utf-8?Q?yufwceuch+swtmi57VpR?=
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;6: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
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;5: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;24:GbpM9s6mwHSts3t7cCK5Iy5L0H+nYyoJRgzrH2hj5uXC4QgrMbwbtKiCaN+6uQIoUP33J+XTHIK8ttmDsjxdUSsEwwIYuShQtmZbBa/M3Vk=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2192;7: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
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jun 2017 15:22:19.0926
 (UTC)
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR05MB2192
X-MS-Exchange-Transport-EndToEndLatency: 00:00:01.1779742
X-MS-Exchange-Processed-By-BccFoldering: 15.01.1240.000
X-Microsoft-Exchange-Diagnostics: 1;CY1PR05MB2187;27:RpDkHPJWiABgyfG/k05+w039dTfinSoaOsdVGX/WhcxUPrCp0BzVth6Nyji68IWVfW3E0drg4FRno8owwPPQLvCtbmuLNawL07E8TGtp/ebiS8HtzbcJuBdVq8+0+qPTqJLrLK37KxB0TlwqqMyiSg==
MIME-Version: 1.0

On Fri, Jun 30, 2017 at 11:12 AM, Eric C Rosen <erosen@juniper.net> wrote:
> Victor, thanks for taking the time to do this review.
>
>> (1). Security Considerations
>>
>>
>> It was not 100% clear to the reviewer (me) if the use case of how the
>> BIER architecture (or guidance for future implementation) may avoid
>> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
>> may have missed specific text which addresses the point made herein
>> (if so, please disregard my first point and please make reference
>> where it is addressed).  The concern is if a packet is introduced into
>> the system by a host (compromised perhaps) which fabricates packets
>> (may or may not have valid payload inside the BIER encapsulation) that
>> attempts to starve resources in the system.  One way of doing this
>> (which may require control plane access - maybe) would be to
>> set/create packets which forces additional replication at BFRs (i.e.
>> set a single  - or all bits -  for all SIs).  This would then create
>> the maximum amount of replication within the system.  Perhaps this use
>> case is addressed as noted.
>
>
> The security considerations do say that every BFR must be provisioned ot
> know which of its interfaces lead to a BIER domain and which do not.   I =
can
> say a little more explicitly that one shouldn't accept BIER-encapsulated
> packets from outside the domain. That addresses one sort of threat.
>
> The security consideratons do point out that modification of the BIER
> encapsulation through error or malfeasance cause misdelivery. I can add t=
hat
> certain sorts of modifications, such as setting all the bits in the
> BitString, are potential vectors for DoS attacks.
>
> It is probably worth pointing out as well that when the initial BIER
> encapsulation is imposed, certain errors, such as setting all the bits in
> the BitString, can result in DoS attacks (intended or unintended).


Sure, I think that helps.


>
>> I was not able to find specific operations/functions which scrutinized
>> incoming packets and/or guard for bad NBRs.  Could this be an issue
>> from the authors standpoint?  In more traditional networks, there are
>> methods operators use to ensure that illegitimate traffic is not
>> introduced into the system.  I wanted to make sure there was thoughts
>> on how to do this with BIER.
>
>
> The only check like this is at the boundaries of a BIER domain, where
> BIER-encapsulated packets are not accepted from interfaces that lead outs=
ide
> the domain.  I'm not sure what else one would do.
>
>>
>>
>> (2). SPF assumed.
>>
>>
>> I agree most places where the BIER architecture would likely live (say
>> in Enterprises and SP networks) the network would operate a standard
>> IGP.  However, in some use cases, like modern DCs, some are designing
>> fabrics which don=E2=80=99t use a traditional IGP.  These networks use a=
ll BGP
>> (eBGP) with full sets of neighbor relationships.  This helps reduce
>> the amount of running protocols within the underlay, but may (or may
>> not) cause issues with BIER in relation distribution of system
>> information.  Do the authors consider this use case one that can be
>> address with BIER as it=E2=80=99s currently outlined, or would additiona=
l
>> considerations be needed?
>
>
> With regard to the control plane, there is a draft that explains how to u=
se
> BGP to distribute the same information (labels, BFR-ids, BFR-prefixes) th=
at
> is distributed via OSPF or ISIS extensions.  I don't think anything expli=
cit
> needs to be said in the architecture; the architecture uses IGP-based
> distribution as an example, but I don't think there is any text there tha=
t
> requires the control plane to be IGP-based.
>
> In the data plane, the document does focus on the case where the "routing
> underlay" is IGP-based (link-state-based), but I think it is clear that a=
ll
> the routing underlay really needs to provide is the mapping from BFR-id t=
o
> BFR-prefix to set of next hops.  Some of the techniques discussed for
> tunneling around non-BFR neighbors or for routing around failed neighbors=
 do
> assume link state routing, but these techniques are optional.
>
> So to answer your question, I don't think anything additional needs to be
> added to the architecture to accommodate non-traditional routing underlay=
s.
> I'll do another read-through to make sure it's clear that OSPF/IS-IS are =
not
> portrayed as strict requirements.

Sure, that makes sense.  I was just my read.  Again, not a big item.
But thanks for double checking.


>
>> I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and =
did not see
>> text that specifically help or hinder the operational mode I described
>> above.
>
>
> I won't comment on the "use cases" document.
>
>>
>>
>> (3) Broadcast Video Operation. (more of a question then a point of note)
>>
>>
>> I did noticed in the use case document (as noted above in point 2),
>> that considers more traditional broadcast video networks was
>> described.  So my question is, would an operational model which
>> required two simultaneous M/C flows from separate sources (normally
>> two packagers/encryptors etc) be supported by the BIER architecture as
>> described?  My best estimate would be that the operator would use two
>> sub-domains that would allow each BFER to potentially get two of each
>> packet (which are sourced by two different injection points / BIFRs).
>> This mode of operation is common in some places to allow the M/C
>> broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/devic=
e to allow for
>> fast switchover in case of network failure (where normal network level
>> detection and re-routing is not sufficient).
>
>
> If a flow enters the BIER domain at two different ingress points, and eac=
h
> ingress point knows the egress points for that flow, there is nothing to
> stop both ingress points from using BIER to multicast the flow to the sam=
e
> set of egress points.  The egress node would have to be able to tell when=
 it
> was receiving two copies of the flow, so that it could choose one copy as
> the one to forward further.  The BIER encapsulations (not described in th=
e
> architecture) do carry the BFIR-id in the BIER header, which makes this
> possible.  If the flow from one ingress node fails, the egress node could
> switch to the other flow.  How it determines when to do this is outside t=
he
> scope of BIER, of course.
>
> If it is desired that the two copies of a given flow travel through the
> network along disjoint paths, one would have to set up two different
> "routing underlays", each disjoint from the other.  This would require tw=
o
> sub-domains.  This really becomes a network design issue, but could
> certainly be handled by BIER.
>
> So to answer your question, I believe the architecture handles these case=
s,
> but BIER is only a piece of the solution.

Fair.  Again, no action was necessarily required per say.  Just wanted
to validate.

>
>


regards,

Victor K

--------------6033769A55711F9B97E358B2--


From nobody Thu Jul  6 07:50:20 2017
Return-Path: <bclaise@cisco.com>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id F0F13131648; Thu,  6 Jul 2017 07:50:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Benoit Claise <bclaise@cisco.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-bier-architecture@ietf.org, Greg Shepherd <gjshep@gmail.com>, bier-chairs@ietf.org, gjshep@gmail.com, bier@ietf.org, victor@jvknet.com
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149935260597.2282.13769939557972164314.idtracker@ietfa.amsl.com>
Date: Thu, 06 Jul 2017 07:50:05 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/CZKtfuaw3YH5xPt8Z9g8uZBR9PQ>
Subject: [Bier] Benoit Claise's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 14:50:12 -0000

Benoit Claise has entered the following ballot position for
draft-ietf-bier-architecture-07: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

1. operations and management section
I'm sure there are such considerations:
    - configuration
    - sub-domain management
    - BFR-id management
    - adding new BFIR/BFER device to the domain
    - logging
    - troubleshooting
    - OAM
    - etc.

There are also two other management documents that should be referenced:
chartered item 6 and 7. There are some management sentences, from time to time,
in the doc. Ex: avoiding a second copy is an important from an operational
point of view

   It is generally advantageous to assign the BFR-ids of a given sub-
   domain so that as many BFERs as possible can be represented in a
   single bit string.

   ...

   In order to minimize the number of copies that must be made of a
   given multicast packet, it is RECOMMENDED that the BFR-ids be
   assigned "densely" (see Section 2) from the numbering space...

    Btw, I guess you meant: assigned densely per subdomain, right?

What this "operations and management section" should contain is the points that
operators, who will deploy this technology, have to pay attention to. An
architecture document is typically the first document people will read. RFC
5706 appendix A provide typical questions from an OPS point of view. I
understand that this is an experiment and you might not have all the answers at
this point in time.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Next point moved from DISCUSS to COMMENT after the IESG telechat:
1. I want to come back to the experimental status.

I have seen Alia's reply:

    In the BIER Charter, work item 9 describes a document based on deployment
    experience that can justify moving the BIER work from Experimental to
    Standards Track.  When I chartered the WG, it wasn't clear whether it was
    merely a good idea or a good idea with enough motivations towards
    deployment that it is worth complicating the architecture at the narrow
    point of the IP hourglass.

>From the writeup, it seems that the experiment is successful already:

    The vendors are being quite tight lipped about current implementations.
    Operator feedback indicates there are at least two implementations
    currently, with others in the works. There are currently five vendors
    collaborating on the work in the IETF.

However, I've not been following the specifications development and
implementation to provide a definitive answer.

At the minimum, the document needs to describe what the criteria are for a
successful experiment.
    Implementations (RFC7942?)?
    two interop implementations?
    hardware implementation?
    "deployment experience" (to cite the charter text)?
    impact analysis?
    something else?

The ideal BIER document for this explanation is this architecture doc.
A reference to the charter Item 9 would be a good start.

Examples:
https://tools.ietf.org/html/rfc7360#section-1.3
https://tools.ietf.org/html/rfc7499#section-2

-   Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
   to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
   (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
   BFR-prefix be a loopback address of the BFR.

Just one observation. Was thinking, so it's like an (OSPF) routerId, except
that it's called a prefix. Then I understood, reading further. It's not called
a routerId because this address/prefix must be routable

- Was wondering. Is this mechanism only for multicast packets? What about
anycast/unicast? End of section 4 you have an example about MVPN over
ingress/egress PEs. Some multicast packets would take BIER encap, while others
packets would take a different encap From a troubleshooting point of view, does
it make sense (is it even allowed) to send non multicast traffic over BIER.

Victor Kuarsing performed the OPS-DIR review, copied below. Discussion is
ongoing.

First, there were no textual changes recommended as part of this
review.  The document seems to be well written and had undergone
previous review/updates.  Given the nature of this document, there are
limited operational specific points made as part of this review
however three points are noted for follow-up with the actors.

(1). Security Considerations

It was not 100% clear to the reviewer (me) if the use case of how the
BIER architecture (or guidance for future implementation) may avoid
certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
may have missed specific text which addresses the point made herein
(if so, please disregard my first point and please make reference
where it is addressed).  The concern is if a packet is introduced into
the system by a host (compromised perhaps) which fabricates packets
(may or may not have valid payload inside the BIER encapsulation) that
attempts to starve resources in the system.  One way of doing this
(which may require control plane access - maybe) would be to
set/create packets which forces additional replication at BFRs (i.e.
set a single  - or all bits -  for all SIs).  This would then create
the maximum amount of replication within the system.  Perhaps this use
case is addressed as noted.

I was no able to find specific operations/functions which scrutinized
incoming packets and/or guard for bad NBRs.  Could this be an issue
from the authors standpoint?  In more traditional networks, there are
methods operators use to ensure that illegitimate traffic is not
introduced into the system.  I wanted to make sure there was thoughts
on how to do this with BIER.

(2). SPF assumed.

I agree most places where the BIER architecture would likely live (say
in Enterprises and SP networks) the network would operate a standard
IGP.  However, in some use cases, like modern DCs, some are designing
fabrics which don’t use a traditional IGP.  These networks use all BGP
(eBGP) with full sets of neighbor relationships.  This helps reduce
the amount of running protocols within the underlay, but may (or may
not) cause issues with BIER in relation distribution of system
information.  Do the authors consider this use case one that can be
address with BIER as it’s currently outlined, or would additional
considerations be needed?

I reviewed the “draft-ietf-bier-use-cases” document and did not see
text that specifically help or hinder the operational mode I described
above.

(3) Broadcast Video Operation. (more of a question then a point of note)

I did noticed in the use case document (as noted above in point 2),
that considers more traditional broadcast video networks was
described.  So my question is, would an operational model which
required two simultaneous M/C flows from separate sources (normally
two packagers/encryptors etc) be supported by the BIER architecture as
described?  My best estimate would be that the operator would use two
sub-domains that would allow each BFER to potentially get two of each
packet (which are sourced by two different injection points / BIFRs).
This mode of operation is common in some places to allow the M/C
broadcast feed to be “pinned” to the egress router/device to allow for
fast switchover in case of network failure (where normal network level
detection and re-routing is not sufficient).



From nobody Thu Jul  6 11:43:50 2017
Return-Path: <gjshep@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C70451318EC; Thu,  6 Jul 2017 11:43:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DUw9XY7BjS6y; Thu,  6 Jul 2017 11:43:39 -0700 (PDT)
Received: from mail-qk0-x229.google.com (mail-qk0-x229.google.com [IPv6:2607:f8b0:400d:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E79713189B; Thu,  6 Jul 2017 11:43:39 -0700 (PDT)
Received: by mail-qk0-x229.google.com with SMTP id 16so9954100qkg.2; Thu, 06 Jul 2017 11:43:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:cc; bh=tTLG3YnmJkjuqEBsoUA4YMqUof4smqLhseJoFiBvTm4=; b=HZu6/7Mmb22NwvkiLhgE4rja59qNeBT1LEygIFZwcO6+7aOdL0Ru07xE4V5+X7hyNQ dIRJSHXWMrgzzBhXQsbAgHNGpLNaBEPx+2Z88RHMnQerr6egr1k5mu+XCtF119pOm7xZ 4edHrHZ3RebUJHHrD1uwuQT70R5qn9rmyVEHfuVcXjPR56YAbUxGpXt4p8vOinIoOGZ7 acMM/WyBwpUlwcRWyCpXeBIcqmwk0Is9R5Xv1JYSBNBQYPb9f/waJZLIFlIQiBAUSkQU utdnjWGnYMT6BdF9dMS094HqRB3sQartDQYAi0d4BBYTzFoKGV65EivrLJMbO+UFIZgy ZyuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:in-reply-to:references :from:date:message-id:subject:to:cc; bh=tTLG3YnmJkjuqEBsoUA4YMqUof4smqLhseJoFiBvTm4=; b=OLSj1X7AIGBju0DHsSw8r1yOBgqHfmLtYLERPfn0D2kznVrre0iCCQ6y61QU43Q+vz Upd9A7neZn41+bYzFFfdLIxHCcsUdXJjDmeRmRergU+Pyg+eUJZ67IvCn5PwVzoar36f ci025twmatFmunVMXcMmSdmzjwY5BqV4wG1LXkFlWd6CFwWVl46s783u9RpAYw8oQ3uH KWJbmOnunF2lz/vBc4KDeynT7yeNWTI6O76o/GgG/ft1h5I/At05p60hBhfFIdiio6QU /eVMLQg8BnHDadIq+GF8lUD+hQPcLPdclQEKfpEFxUBrJFsj0haIvXXe7997EG7dgHhu auwg==
X-Gm-Message-State: AIVw111D8M4DQvCByDh13p43ssPPG1Cg0zNRWcXGLyS6ybCZ9sIiTkGR SY9l2CFedX4zhvdJCfvDgo274K0FnA==
X-Received: by 10.55.221.76 with SMTP id n73mr14382475qki.186.1499366618240; Thu, 06 Jul 2017 11:43:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.54.101 with HTTP; Thu, 6 Jul 2017 11:43:37 -0700 (PDT)
Reply-To: gjshep@gmail.com
In-Reply-To: <a3b1141a-dce6-6cd0-215c-b7fd5074879a@juniper.net>
References: <149934683636.2270.10065032311656213669.idtracker@ietfa.amsl.com> <a3b1141a-dce6-6cd0-215c-b7fd5074879a@juniper.net>
From: Greg Shepherd <gjshep@gmail.com>
Date: Thu, 6 Jul 2017 11:43:37 -0700
Message-ID: <CABFReBqexpAuSUCC_AP2My3g2n4GAF62HRYB7M5Nzq8-Y8MeZw@mail.gmail.com>
To: Eric C Rosen <erosen@juniper.net>
Cc: Benoit Claise <bclaise@cisco.com>, The IESG <iesg@ietf.org>,  draft-ietf-bier-architecture@ietf.org, bier-chairs@ietf.org,  "bier@ietf.org" <bier@ietf.org>, victor@jvknet.com
Content-Type: multipart/alternative; boundary="001a11499fa8ab1e900553aa7ef2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/DgyCzPwLxSBdO0SFeAQ7GpPjupA>
Subject: Re: [Bier] Benoit Claise's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 18:43:44 -0000

--001a11499fa8ab1e900553aa7ef2
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Inline:

On Thu, Jul 6, 2017 at 7:45 AM, Eric C Rosen <erosen@juniper.net> wrote:

> On 7/6/2017 9:13 AM, Benoit Claise wrote:
>
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>>
>> 1. I want to come back to the experimental status.
>>
>
> The status of the document is a political issue that should not impact th=
e
> content of the document.


I would say process over political. But I agree it should have no bearing
on the content of the document.


>
>
>> I have seen Alia's reply:
>>
>>      In the BIER Charter, work item 9 describes a document based on
>> deployment
>>      experience that can justify moving the BIER work from Experimental =
to
>>      Standards Track.  When I chartered the WG, it wasn't clear whether
>> it was
>>      merely a good idea or a good idea with enough motivations towards
>>      deployment that it is worth complicating the architecture at the
>> narrow
>>      point of the IP hourglass.
>>
>> >From the writeup, it seems that the experiment is successful already:
>>
>>      The vendors are being quite tight lipped about current
>> implementations.
>>      Operator feedback indicates there are at least two implementations
>>      currently, with others in the works. There are currently five vendo=
rs
>>      collaborating on the work in the IETF.
>>
>> However, I've not been following the specifications development and
>> implementation to provide a definitive answer.
>>
>> At the minimum, the document needs to describe what the criteria are for=
 a
>> successful experiment.
>>      Implementations (RFC7942?)?
>>      two interop implementations?
>>      hardware implementation?
>>      "deployment experience" (to cite the charter text)?
>>      impact analysis?
>>      something else?
>>
>> The ideal BIER document for this explanation is this architecture doc.
>>
>
> The above is all entirely outside the scope of this document.


Agree. This is in the charter. If/when the the case is made to transition
all of the BIER work to the standards track the documents' contents should
not change.


>
> 2. operations and management section
>> I'm sure there are such considerations:
>>      - configuration
>>      - sub-domain management
>>      - BFR-id management
>>      - adding new BFIR/BFER device to the domain
>>      - logging
>>      - troubleshooting
>>      - OAM
>>      - etc.
>>
>
> I am unaware of any RFC that requires such a section to be included in a
> document like this.  These topics are outside the scope of this document.


 Agree. There are other documents in the WG to address some of the above
concerns. None of these seem appropriate for an architecture document.

There are also two other management documents that should be referenced:
>> chartered item 6 and 7.
>>
>
> These are outside the scope of the architecture document.


Agree. The mgmt docs must refer to the arch not, but I don't see why the
other way around is required.


>
> There are some management sentences, from time to time,
>> in the doc. Ex: avoiding a second copy is an important from an operation=
al
>> point of view
>>
>>     It is generally advantageous to assign the BFR-ids of a given sub-
>>     domain so that as many BFERs as possible can be represented in a
>>     single bit string.
>>
>>     ...
>>
>>     In order to minimize the number of copies that must be made of a
>>     given multicast packet, it is RECOMMENDED that the BFR-ids be
>>     assigned "densely" (see Section 2) from the numbering space...
>>
>>      Btw, I guess you meant: assigned densely per subdomain, right?
>>
>
> Correct, I'll add some clarifying text.
>
>
>> What this "operations and management section" should contain is the
>> points that
>> operators, who will deploy this technology, have to pay attention to. An
>> architecture document is typically the first document people will read.
>> RFC
>> 5706 appendix A provide typical questions from an OPS point of view. I
>> understand that this is an experiment and you might not have all the
>> answers at
>> this point in time.
>>
>
> This would be the topic for a different document.


Agree. There is other work in the WG to address this. It would seem out of
scope for an arch doc.

Greg


>
>
>>
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>> -   Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
>>     to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
>>     (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
>>     BFR-prefix be a loopback address of the BFR.
>>
>> Just one observation. Was thinking, so it's like an (OSPF) routerId,
>> except
>> that it's called a prefix. Then I understood, reading further. It's not
>> called
>> a routerId because this address/prefix must be routable
>>
>> - Was wondering. Is this mechanism only for multicast packets? What abou=
t
>> anycast/unicast?
>>
>
> You could use BIER to do a unicast, by setting only one bit in the
> BitString.  However, there are other more efficient encapsulations for
> unicast tunnels.
>
> End of section 4 you have an example about MVPN over
>> ingress/egress PEs. Some multicast packets would take BIER encap, while
>> others
>> packets would take a different encap
>>
>
> I'm not sure what you're referring to.
>
>  From a troubleshooting point of view, does
>> it make sense (is it even allowed) to send non multicast traffic over
>> BIER.
>>
>> Victor Kuarsing performed the OPS-DIR review, copied below. Discussion i=
s
>> ongoing.
>>
>
> Attached are my reply to Victor and his response.  I did make a few
> changes in response to his comments, but the latest revision has not been
> posted yet.
>
>
>
>> First, there were no textual changes recommended as part of this
>> review.  The document seems to be well written and had undergone
>> previous review/updates.  Given the nature of this document, there are
>> limited operational specific points made as part of this review
>> however three points are noted for follow-up with the actors.
>>
>> (1). Security Considerations
>>
>> It was not 100% clear to the reviewer (me) if the use case of how the
>> BIER architecture (or guidance for future implementation) may avoid
>> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
>> may have missed specific text which addresses the point made herein
>> (if so, please disregard my first point and please make reference
>> where it is addressed).  The concern is if a packet is introduced into
>> the system by a host (compromised perhaps) which fabricates packets
>> (may or may not have valid payload inside the BIER encapsulation) that
>> attempts to starve resources in the system.  One way of doing this
>> (which may require control plane access - maybe) would be to
>> set/create packets which forces additional replication at BFRs (i.e.
>> set a single  - or all bits -  for all SIs).  This would then create
>> the maximum amount of replication within the system.  Perhaps this use
>> case is addressed as noted.
>>
>> I was no able to find specific operations/functions which scrutinized
>> incoming packets and/or guard for bad NBRs.  Could this be an issue
>> from the authors standpoint?  In more traditional networks, there are
>> methods operators use to ensure that illegitimate traffic is not
>> introduced into the system.  I wanted to make sure there was thoughts
>> on how to do this with BIER.
>>
>> (2). SPF assumed.
>>
>> I agree most places where the BIER architecture would likely live (say
>> in Enterprises and SP networks) the network would operate a standard
>> IGP.  However, in some use cases, like modern DCs, some are designing
>> fabrics which don=E2=80=99t use a traditional IGP.  These networks use a=
ll BGP
>> (eBGP) with full sets of neighbor relationships.  This helps reduce
>> the amount of running protocols within the underlay, but may (or may
>> not) cause issues with BIER in relation distribution of system
>> information.  Do the authors consider this use case one that can be
>> address with BIER as it=E2=80=99s currently outlined, or would additiona=
l
>> considerations be needed?
>>
>> I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and =
did not see
>> text that specifically help or hinder the operational mode I described
>> above.
>>
>> (3) Broadcast Video Operation. (more of a question then a point of note)
>>
>> I did noticed in the use case document (as noted above in point 2),
>> that considers more traditional broadcast video networks was
>> described.  So my question is, would an operational model which
>> required two simultaneous M/C flows from separate sources (normally
>> two packagers/encryptors etc) be supported by the BIER architecture as
>> described?  My best estimate would be that the operator would use two
>> sub-domains that would allow each BFER to potentially get two of each
>> packet (which are sourced by two different injection points / BIFRs).
>> This mode of operation is common in some places to allow the M/C
>> broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/devic=
e to allow for
>> fast switchover in case of network failure (where normal network level
>> detection and re-routing is not sufficient).
>>
>>
>>
>
>
> ---------- Forwarded message ----------
> From: Eric C Rosen <erosen@juniper.net>
> To: Victor Kuarsingh <victor@jvknet.com>, Warren Kumari <warren@kumari.ne=
t>,
> Benoit Claise <bclaise@cisco.com>, ops-dir@ietf.org,
> draft-ietf-bier-architecture.all@ietf.org, gjshep@gmail.com,
> prz@juniper.net, Alia Atlas <akatlas@gmail.com>
> Cc:
> Bcc:
> Date: Fri, 30 Jun 2017 11:12:53 -0400
> Subject: Re: Ops-Dir Review of Draft-ietf-bier-architecture-07
> Victor, thanks for taking the time to do this review.
>
> (1). Security Considerations
>>
>>
>> It was not 100% clear to the reviewer (me) if the use case of how the
>> BIER architecture (or guidance for future implementation) may avoid
>> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
>> may have missed specific text which addresses the point made herein
>> (if so, please disregard my first point and please make reference
>> where it is addressed).  The concern is if a packet is introduced into
>> the system by a host (compromised perhaps) which fabricates packets
>> (may or may not have valid payload inside the BIER encapsulation) that
>> attempts to starve resources in the system.  One way of doing this
>> (which may require control plane access - maybe) would be to
>> set/create packets which forces additional replication at BFRs (i.e.
>> set a single  - or all bits -  for all SIs).  This would then create
>> the maximum amount of replication within the system.  Perhaps this use
>> case is addressed as noted.
>>
>
> The security considerations do say that every BFR must be provisioned ot
> know which of its interfaces lead to a BIER domain and which do not.   I
> can say a little more explicitly that one shouldn't accept
> BIER-encapsulated packets from outside the domain. That addresses one sor=
t
> of threat.
>
> The security consideratons do point out that modification of the BIER
> encapsulation through error or malfeasance cause misdelivery. I can add
> that certain sorts of modifications, such as setting all the bits in the
> BitString, are potential vectors for DoS attacks.
>
> It is probably worth pointing out as well that when the initial BIER
> encapsulation is imposed, certain errors, such as setting all the bits in
> the BitString, can result in DoS attacks (intended or unintended).
>
> I was not able to find specific operations/functions which scrutinized
>> incoming packets and/or guard for bad NBRs.  Could this be an issue
>> from the authors standpoint?  In more traditional networks, there are
>> methods operators use to ensure that illegitimate traffic is not
>> introduced into the system.  I wanted to make sure there was thoughts
>> on how to do this with BIER.
>>
>
> The only check like this is at the boundaries of a BIER domain, where
> BIER-encapsulated packets are not accepted from interfaces that lead
> outside the domain.  I'm not sure what else one would do.
>
>
>>
>> (2). SPF assumed.
>>
>>
>> I agree most places where the BIER architecture would likely live (say
>> in Enterprises and SP networks) the network would operate a standard
>> IGP.  However, in some use cases, like modern DCs, some are designing
>> fabrics which don=E2=80=99t use a traditional IGP.  These networks use a=
ll BGP
>> (eBGP) with full sets of neighbor relationships.  This helps reduce
>> the amount of running protocols within the underlay, but may (or may
>> not) cause issues with BIER in relation distribution of system
>> information.  Do the authors consider this use case one that can be
>> address with BIER as it=E2=80=99s currently outlined, or would additiona=
l
>> considerations be needed?
>>
>
> With regard to the control plane, there is a draft that explains how to
> use BGP to distribute the same information (labels, BFR-ids, BFR-prefixes=
)
> that is distributed via OSPF or ISIS extensions.  I don't think anything
> explicit needs to be said in the architecture; the architecture uses
> IGP-based distribution as an example, but I don't think there is any text
> there that requires the control plane to be IGP-based.
>
> In the data plane, the document does focus on the case where the "routing
> underlay" is IGP-based (link-state-based), but I think it is clear that a=
ll
> the routing underlay really needs to provide is the mapping from BFR-id t=
o
> BFR-prefix to set of next hops.  Some of the techniques discussed for
> tunneling around non-BFR neighbors or for routing around failed neighbors
> do assume link state routing, but these techniques are optional.
>
> So to answer your question, I don't think anything additional needs to be
> added to the architecture to accommodate non-traditional routing
> underlays.  I'll do another read-through to make sure it's clear that
> OSPF/IS-IS are not portrayed as strict requirements.
>
> I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and d=
id not see
>> text that specifically help or hinder the operational mode I described
>> above.
>>
>
> I won't comment on the "use cases" document.
>
>
>>
>> (3) Broadcast Video Operation. (more of a question then a point of note)
>>
>>
>> I did noticed in the use case document (as noted above in point 2),
>> that considers more traditional broadcast video networks was
>> described.  So my question is, would an operational model which
>> required two simultaneous M/C flows from separate sources (normally
>> two packagers/encryptors etc) be supported by the BIER architecture as
>> described?  My best estimate would be that the operator would use two
>> sub-domains that would allow each BFER to potentially get two of each
>> packet (which are sourced by two different injection points / BIFRs).
>> This mode of operation is common in some places to allow the M/C
>> broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/devic=
e to allow for
>> fast switchover in case of network failure (where normal network level
>> detection and re-routing is not sufficient).
>>
>
> If a flow enters the BIER domain at two different ingress points, and eac=
h
> ingress point knows the egress points for that flow, there is nothing to
> stop both ingress points from using BIER to multicast the flow to the sam=
e
> set of egress points.  The egress node would have to be able to tell when
> it was receiving two copies of the flow, so that it could choose one copy
> as the one to forward further.  The BIER encapsulations (not described in
> the architecture) do carry the BFIR-id in the BIER header, which makes th=
is
> possible.  If the flow from one ingress node fails, the egress node could
> switch to the other flow.  How it determines when to do this is outside t=
he
> scope of BIER, of course.
>
> If it is desired that the two copies of a given flow travel through the
> network along disjoint paths, one would have to set up two different
> "routing underlays", each disjoint from the other.  This would require tw=
o
> sub-domains.  This really becomes a network design issue, but could
> certainly be handled by BIER.
>
> So to answer your question, I believe the architecture handles these
> cases, but BIER is only a piece of the solution.
>
>
>
>
> ---------- Forwarded message ----------
> From: Victor Kuarsingh <victor@jvknet.com>
> To: Eric C Rosen <erosen@juniper.net>
> Cc: Warren Kumari <warren@kumari.net>, Benoit Claise <bclaise@cisco.com>,
> ops-dir@ietf.org, draft-ietf-bier-architecture.all@ietf.org,
> gjshep@gmail.com, prz@juniper.net, Alia Atlas <akatlas@gmail.com>
> Bcc:
> Date: Fri, 30 Jun 2017 11:22:16 -0400
> Subject: Re: Ops-Dir Review of Draft-ietf-bier-architecture-07
> On Fri, Jun 30, 2017 at 11:12 AM, Eric C Rosen <erosen@juniper.net> wrote=
:
> > Victor, thanks for taking the time to do this review.
> >
> >> (1). Security Considerations
> >>
> >>
> >> It was not 100% clear to the reviewer (me) if the use case of how the
> >> BIER architecture (or guidance for future implementation) may avoid
> >> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
> >> may have missed specific text which addresses the point made herein
> >> (if so, please disregard my first point and please make reference
> >> where it is addressed).  The concern is if a packet is introduced into
> >> the system by a host (compromised perhaps) which fabricates packets
> >> (may or may not have valid payload inside the BIER encapsulation) that
> >> attempts to starve resources in the system.  One way of doing this
> >> (which may require control plane access - maybe) would be to
> >> set/create packets which forces additional replication at BFRs (i.e.
> >> set a single  - or all bits -  for all SIs).  This would then create
> >> the maximum amount of replication within the system.  Perhaps this use
> >> case is addressed as noted.
> >
> >
> > The security considerations do say that every BFR must be provisioned o=
t
> > know which of its interfaces lead to a BIER domain and which do not.   =
I
> can
> > say a little more explicitly that one shouldn't accept BIER-encapsulate=
d
> > packets from outside the domain. That addresses one sort of threat.
> >
> > The security consideratons do point out that modification of the BIER
> > encapsulation through error or malfeasance cause misdelivery. I can add
> that
> > certain sorts of modifications, such as setting all the bits in the
> > BitString, are potential vectors for DoS attacks.
> >
> > It is probably worth pointing out as well that when the initial BIER
> > encapsulation is imposed, certain errors, such as setting all the bits =
in
> > the BitString, can result in DoS attacks (intended or unintended).
>
>
> Sure, I think that helps.
>
>
> >
> >> I was not able to find specific operations/functions which scrutinized
> >> incoming packets and/or guard for bad NBRs.  Could this be an issue
> >> from the authors standpoint?  In more traditional networks, there are
> >> methods operators use to ensure that illegitimate traffic is not
> >> introduced into the system.  I wanted to make sure there was thoughts
> >> on how to do this with BIER.
> >
> >
> > The only check like this is at the boundaries of a BIER domain, where
> > BIER-encapsulated packets are not accepted from interfaces that lead
> outside
> > the domain.  I'm not sure what else one would do.
> >
> >>
> >>
> >> (2). SPF assumed.
> >>
> >>
> >> I agree most places where the BIER architecture would likely live (say
> >> in Enterprises and SP networks) the network would operate a standard
> >> IGP.  However, in some use cases, like modern DCs, some are designing
> >> fabrics which don=E2=80=99t use a traditional IGP.  These networks use=
 all BGP
> >> (eBGP) with full sets of neighbor relationships.  This helps reduce
> >> the amount of running protocols within the underlay, but may (or may
> >> not) cause issues with BIER in relation distribution of system
> >> information.  Do the authors consider this use case one that can be
> >> address with BIER as it=E2=80=99s currently outlined, or would additio=
nal
> >> considerations be needed?
> >
> >
> > With regard to the control plane, there is a draft that explains how to
> use
> > BGP to distribute the same information (labels, BFR-ids, BFR-prefixes)
> that
> > is distributed via OSPF or ISIS extensions.  I don't think anything
> explicit
> > needs to be said in the architecture; the architecture uses IGP-based
> > distribution as an example, but I don't think there is any text there
> that
> > requires the control plane to be IGP-based.
> >
> > In the data plane, the document does focus on the case where the "routi=
ng
> > underlay" is IGP-based (link-state-based), but I think it is clear that
> all
> > the routing underlay really needs to provide is the mapping from BFR-id
> to
> > BFR-prefix to set of next hops.  Some of the techniques discussed for
> > tunneling around non-BFR neighbors or for routing around failed
> neighbors do
> > assume link state routing, but these techniques are optional.
> >
> > So to answer your question, I don't think anything additional needs to =
be
> > added to the architecture to accommodate non-traditional routing
> underlays.
> > I'll do another read-through to make sure it's clear that OSPF/IS-IS ar=
e
> not
> > portrayed as strict requirements.
>
> Sure, that makes sense.  I was just my read.  Again, not a big item.
> But thanks for double checking.
>
>
> >
> >> I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document an=
d did not see
> >> text that specifically help or hinder the operational mode I described
> >> above.
> >
> >
> > I won't comment on the "use cases" document.
> >
> >>
> >>
> >> (3) Broadcast Video Operation. (more of a question then a point of not=
e)
> >>
> >>
> >> I did noticed in the use case document (as noted above in point 2),
> >> that considers more traditional broadcast video networks was
> >> described.  So my question is, would an operational model which
> >> required two simultaneous M/C flows from separate sources (normally
> >> two packagers/encryptors etc) be supported by the BIER architecture as
> >> described?  My best estimate would be that the operator would use two
> >> sub-domains that would allow each BFER to potentially get two of each
> >> packet (which are sourced by two different injection points / BIFRs).
> >> This mode of operation is common in some places to allow the M/C
> >> broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/dev=
ice to allow for
> >> fast switchover in case of network failure (where normal network level
> >> detection and re-routing is not sufficient).
> >
> >
> > If a flow enters the BIER domain at two different ingress points, and
> each
> > ingress point knows the egress points for that flow, there is nothing t=
o
> > stop both ingress points from using BIER to multicast the flow to the
> same
> > set of egress points.  The egress node would have to be able to tell
> when it
> > was receiving two copies of the flow, so that it could choose one copy =
as
> > the one to forward further.  The BIER encapsulations (not described in
> the
> > architecture) do carry the BFIR-id in the BIER header, which makes this
> > possible.  If the flow from one ingress node fails, the egress node cou=
ld
> > switch to the other flow.  How it determines when to do this is outside
> the
> > scope of BIER, of course.
> >
> > If it is desired that the two copies of a given flow travel through the
> > network along disjoint paths, one would have to set up two different
> > "routing underlays", each disjoint from the other.  This would require
> two
> > sub-domains.  This really becomes a network design issue, but could
> > certainly be handled by BIER.
> >
> > So to answer your question, I believe the architecture handles these
> cases,
> > but BIER is only a piece of the solution.
>
> Fair.  Again, no action was necessarily required per say.  Just wanted
> to validate.
>
> >
> >
>
>
> regards,
>
> Victor K
>
>

--001a11499fa8ab1e900553aa7ef2
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Inline:<div class=3D"gmail_extra"><br><div class=3D"gmail_=
quote">On Thu, Jul 6, 2017 at 7:45 AM, Eric C Rosen <span dir=3D"ltr">&lt;<=
a href=3D"mailto:erosen@juniper.net" target=3D"_blank">erosen@juniper.net</=
a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class=3D"">On =
7/6/2017 9:13 AM, Benoit Claise wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
DISCUSS:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
1. I want to come back to the experimental status.<br>
</blockquote>
<br></span>
The status of the document is a political issue that should not impact the =
content of the document.</blockquote><div><br></div><div>I would say proces=
s over political. But I agree it should have no bearing on the content of t=
he document.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span cl=
ass=3D""><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
I have seen Alia&#39;s reply:<br>
<br>
=C2=A0 =C2=A0 =C2=A0In the BIER Charter, work item 9 describes a document b=
ased on deployment<br>
=C2=A0 =C2=A0 =C2=A0experience that can justify moving the BIER work from E=
xperimental to<br>
=C2=A0 =C2=A0 =C2=A0Standards Track.=C2=A0 When I chartered the WG, it wasn=
&#39;t clear whether it was<br>
=C2=A0 =C2=A0 =C2=A0merely a good idea or a good idea with enough motivatio=
ns towards<br>
=C2=A0 =C2=A0 =C2=A0deployment that it is worth complicating the architectu=
re at the narrow<br>
=C2=A0 =C2=A0 =C2=A0point of the IP hourglass.<br>
<br>
&gt;From the writeup, it seems that the experiment is successful already:<b=
r>
<br>
=C2=A0 =C2=A0 =C2=A0The vendors are being quite tight lipped about current =
implementations.<br>
=C2=A0 =C2=A0 =C2=A0Operator feedback indicates there are at least two impl=
ementations<br>
=C2=A0 =C2=A0 =C2=A0currently, with others in the works. There are currentl=
y five vendors<br>
=C2=A0 =C2=A0 =C2=A0collaborating on the work in the IETF.<br>
<br>
However, I&#39;ve not been following the specifications development and<br>
implementation to provide a definitive answer.<br>
<br>
At the minimum, the document needs to describe what the criteria are for a<=
br>
successful experiment.<br>
=C2=A0 =C2=A0 =C2=A0Implementations (RFC7942?)?<br>
=C2=A0 =C2=A0 =C2=A0two interop implementations?<br>
=C2=A0 =C2=A0 =C2=A0hardware implementation?<br>
=C2=A0 =C2=A0 =C2=A0&quot;deployment experience&quot; (to cite the charter =
text)?<br>
=C2=A0 =C2=A0 =C2=A0impact analysis?<br>
=C2=A0 =C2=A0 =C2=A0something else?<br>
<br>
The ideal BIER document for this explanation is this architecture doc.<br>
</blockquote>
<br></span>
The above is all entirely outside the scope of this document.</blockquote><=
div><br></div><div>Agree. This is in the charter. If/when the the case is m=
ade to transition all of the BIER work to the standards track the documents=
&#39; contents should not change.</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><span class=3D""><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
2. operations and management section<br>
I&#39;m sure there are such considerations:<br>
=C2=A0 =C2=A0 =C2=A0- configuration<br>
=C2=A0 =C2=A0 =C2=A0- sub-domain management<br>
=C2=A0 =C2=A0 =C2=A0- BFR-id management<br>
=C2=A0 =C2=A0 =C2=A0- adding new BFIR/BFER device to the domain<br>
=C2=A0 =C2=A0 =C2=A0- logging<br>
=C2=A0 =C2=A0 =C2=A0- troubleshooting<br>
=C2=A0 =C2=A0 =C2=A0- OAM<br>
=C2=A0 =C2=A0 =C2=A0- etc.<br>
</blockquote>
<br></span>
I am unaware of any RFC that requires such a section to be included in a do=
cument like this.=C2=A0 These topics are outside the scope of this document=
.</blockquote><div><br></div><div>=C2=A0Agree. There are other documents in=
 the WG to address some of the above concerns. None of these seem appropria=
te for an architecture document.</div><div><br></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex"><span class=3D"">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
There are also two other management documents that should be referenced:<br=
>
chartered item 6 and 7.<br>
</blockquote>
<br></span>
These are outside the scope of the architecture document.</blockquote><div>=
<br></div><div>Agree. The mgmt docs must refer to the arch not, but I don&#=
39;t see why the other way around is required.</div><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex"><span class=3D""><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
There are some management sentences, from time to time,<br>
in the doc. Ex: avoiding a second copy is an important from an operational<=
br>
point of view<br>
<br>
=C2=A0 =C2=A0 It is generally advantageous to assign the BFR-ids of a given=
 sub-<br>
=C2=A0 =C2=A0 domain so that as many BFERs as possible can be represented i=
n a<br>
=C2=A0 =C2=A0 single bit string.<br>
<br>
=C2=A0 =C2=A0 ...<br>
<br>
=C2=A0 =C2=A0 In order to minimize the number of copies that must be made o=
f a<br>
=C2=A0 =C2=A0 given multicast packet, it is RECOMMENDED that the BFR-ids be=
<br>
=C2=A0 =C2=A0 assigned &quot;densely&quot; (see Section 2) from the numberi=
ng space...<br>
<br>
=C2=A0 =C2=A0 =C2=A0Btw, I guess you meant: assigned densely per subdomain,=
 right?<br>
</blockquote>
<br></span>
Correct, I&#39;ll add some clarifying text.<span class=3D""><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
What this &quot;operations and management section&quot; should contain is t=
he points that<br>
operators, who will deploy this technology, have to pay attention to. An<br=
>
architecture document is typically the first document people will read. RFC=
<br>
5706 appendix A provide typical questions from an OPS point of view. I<br>
understand that this is an experiment and you might not have all the answer=
s at<br>
this point in time.<br>
</blockquote>
<br></span>
This would be the topic for a different document.</blockquote><div><br></di=
v><div>Agree. There is other work in the WG to address this. It would seem =
out of scope for an arch doc.</div><div><br></div><div>Greg</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><span class=3D""><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
COMMENT:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
-=C2=A0 =C2=A0Each BFR MUST be assigned a single &quot;BFR-Prefix&quot; for=
 each sub-domain<br>
=C2=A0 =C2=A0 to which it belongs.=C2=A0 A BFR&#39;s BFR-Prefix MUST be an =
IP address<br>
=C2=A0 =C2=A0 (either IPv4 or IPv6) of the BFR.=C2=A0 It is RECOMMENDED tha=
t the<br>
=C2=A0 =C2=A0 BFR-prefix be a loopback address of the BFR.<br>
<br>
Just one observation. Was thinking, so it&#39;s like an (OSPF) routerId, ex=
cept<br>
that it&#39;s called a prefix. Then I understood, reading further. It&#39;s=
 not called<br>
a routerId because this address/prefix must be routable<br>
<br>
- Was wondering. Is this mechanism only for multicast packets? What about<b=
r>
anycast/unicast?<br>
</blockquote>
<br></span>
You could use BIER to do a unicast, by setting only one bit in the BitStrin=
g.=C2=A0 However, there are other more efficient encapsulations for unicast=
 tunnels.<span class=3D""><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
End of section 4 you have an example about MVPN over<br>
ingress/egress PEs. Some multicast packets would take BIER encap, while oth=
ers<br>
packets would take a different encap<br>
</blockquote>
<br></span>
I&#39;m not sure what you&#39;re referring to.<span class=3D""><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
=C2=A0From a troubleshooting point of view, does<br>
it make sense (is it even allowed) to send non multicast traffic over BIER.=
<br>
<br>
Victor Kuarsing performed the OPS-DIR review, copied below. Discussion is<b=
r>
ongoing.<br>
</blockquote>
<br></span>
Attached are my reply to Victor and his response.=C2=A0 I did make a few ch=
anges in response to his comments, but the latest revision has not been pos=
ted yet.<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
First, there were no textual changes recommended as part of this<br>
review.=C2=A0 The document seems to be well written and had undergone<br>
previous review/updates.=C2=A0 Given the nature of this document, there are=
<br>
limited operational specific points made as part of this review<br>
however three points are noted for follow-up with the actors.<br>
<br>
(1). Security Considerations<br>
<br>
It was not 100% clear to the reviewer (me) if the use case of how the<br>
BIER architecture (or guidance for future implementation) may avoid<br>
certain DoS like activity from illegitimate neighbors (BFR-NBRs).=C2=A0 I<b=
r>
may have missed specific text which addresses the point made herein<br>
(if so, please disregard my first point and please make reference<br>
where it is addressed).=C2=A0 The concern is if a packet is introduced into=
<br>
the system by a host (compromised perhaps) which fabricates packets<br>
(may or may not have valid payload inside the BIER encapsulation) that<br>
attempts to starve resources in the system.=C2=A0 One way of doing this<br>
(which may require control plane access - maybe) would be to<br>
set/create packets which forces additional replication at BFRs (i.e.<br>
set a single=C2=A0 - or all bits -=C2=A0 for all SIs).=C2=A0 This would the=
n create<br>
the maximum amount of replication within the system.=C2=A0 Perhaps this use=
<br>
case is addressed as noted.<br>
<br>
I was no able to find specific operations/functions which scrutinized<br>
incoming packets and/or guard for bad NBRs.=C2=A0 Could this be an issue<br=
>
from the authors standpoint?=C2=A0 In more traditional networks, there are<=
br>
methods operators use to ensure that illegitimate traffic is not<br>
introduced into the system.=C2=A0 I wanted to make sure there was thoughts<=
br>
on how to do this with BIER.<br>
<br>
(2). SPF assumed.<br>
<br>
I agree most places where the BIER architecture would likely live (say<br>
in Enterprises and SP networks) the network would operate a standard<br>
IGP.=C2=A0 However, in some use cases, like modern DCs, some are designing<=
br>
fabrics which don=E2=80=99t use a traditional IGP.=C2=A0 These networks use=
 all BGP<br>
(eBGP) with full sets of neighbor relationships.=C2=A0 This helps reduce<br=
>
the amount of running protocols within the underlay, but may (or may<br>
not) cause issues with BIER in relation distribution of system<br>
information.=C2=A0 Do the authors consider this use case one that can be<br=
>
address with BIER as it=E2=80=99s currently outlined, or would additional<b=
r>
considerations be needed?<br>
<br>
I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and did=
 not see<br>
text that specifically help or hinder the operational mode I described<br>
above.<br>
<br>
(3) Broadcast Video Operation. (more of a question then a point of note)<br=
>
<br>
I did noticed in the use case document (as noted above in point 2),<br>
that considers more traditional broadcast video networks was<br>
described.=C2=A0 So my question is, would an operational model which<br>
required two simultaneous M/C flows from separate sources (normally<br>
two packagers/encryptors etc) be supported by the BIER architecture as<br>
described?=C2=A0 My best estimate would be that the operator would use two<=
br>
sub-domains that would allow each BFER to potentially get two of each<br>
packet (which are sourced by two different injection points / BIFRs).<br>
This mode of operation is common in some places to allow the M/C<br>
broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/device t=
o allow for<br>
fast switchover in case of network failure (where normal network level<br>
detection and re-routing is not sufficient).<br>
<br>
<br>
</blockquote>
<br>
</div></div><br><br>---------- Forwarded message ----------<br>From:=C2=A0E=
ric C Rosen &lt;<a href=3D"mailto:erosen@juniper.net">erosen@juniper.net</a=
>&gt;<br>To:=C2=A0Victor Kuarsingh &lt;<a href=3D"mailto:victor@jvknet.com"=
>victor@jvknet.com</a>&gt;, Warren Kumari &lt;<a href=3D"mailto:warren@kuma=
ri.net">warren@kumari.net</a>&gt;, Benoit Claise &lt;<a href=3D"mailto:bcla=
ise@cisco.com">bclaise@cisco.com</a>&gt;, <a href=3D"mailto:ops-dir@ietf.or=
g">ops-dir@ietf.org</a>, <a href=3D"mailto:draft-ietf-bier-architecture.all=
@ietf.org">draft-ietf-bier-architecture.all@ietf.org</a>, <a href=3D"mailto=
:gjshep@gmail.com">gjshep@gmail.com</a>, <a href=3D"mailto:prz@juniper.net"=
>prz@juniper.net</a>, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">a=
katlas@gmail.com</a>&gt;<br>Cc:=C2=A0<br>Bcc:=C2=A0<br>Date:=C2=A0Fri, 30 J=
un 2017 11:12:53 -0400<br>Subject:=C2=A0Re: Ops-Dir Review of Draft-ietf-bi=
er-architecture-07<br>Victor, thanks for taking the time to do this review.=
<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
(1). Security Considerations<br>
<br>
<br>
It was not 100% clear to the reviewer (me) if the use case of how the<br>
BIER architecture (or guidance for future implementation) may avoid<br>
certain DoS like activity from illegitimate neighbors (BFR-NBRs).=C2=A0 I<b=
r>
may have missed specific text which addresses the point made herein<br>
(if so, please disregard my first point and please make reference<br>
where it is addressed).=C2=A0 The concern is if a packet is introduced into=
<br>
the system by a host (compromised perhaps) which fabricates packets<br>
(may or may not have valid payload inside the BIER encapsulation) that<br>
attempts to starve resources in the system.=C2=A0 One way of doing this<br>
(which may require control plane access - maybe) would be to<br>
set/create packets which forces additional replication at BFRs (i.e.<br>
set a single=C2=A0 - or all bits -=C2=A0 for all SIs).=C2=A0 This would the=
n create<br>
the maximum amount of replication within the system.=C2=A0 Perhaps this use=
<br>
case is addressed as noted.<br>
</blockquote>
<br>
The security considerations do say that every BFR must be provisioned ot kn=
ow which of its interfaces lead to a BIER domain and which do not.=C2=A0 =
=C2=A0I can say a little more explicitly that one shouldn&#39;t accept BIER=
-encapsulated packets from outside the domain. That addresses one sort of t=
hreat.<br>
<br>
The security consideratons do point out that modification of the BIER encap=
sulation through error or malfeasance cause misdelivery. I can add that cer=
tain sorts of modifications, such as setting all the bits in the BitString,=
 are potential vectors for DoS attacks.<br>
<br>
It is probably worth pointing out as well that when the initial BIER encaps=
ulation is imposed, certain errors, such as setting all the bits in the Bit=
String, can result in DoS attacks (intended or unintended).<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I was not able to find specific operations/functions which scrutinized<br>
incoming packets and/or guard for bad NBRs.=C2=A0 Could this be an issue<br=
>
from the authors standpoint?=C2=A0 In more traditional networks, there are<=
br>
methods operators use to ensure that illegitimate traffic is not<br>
introduced into the system.=C2=A0 I wanted to make sure there was thoughts<=
br>
on how to do this with BIER.<br>
</blockquote>
<br>
The only check like this is at the boundaries of a BIER domain, where BIER-=
encapsulated packets are not accepted from interfaces that lead outside the=
 domain.=C2=A0 I&#39;m not sure what else one would do.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
<br>
(2). SPF assumed.<br>
<br>
<br>
I agree most places where the BIER architecture would likely live (say<br>
in Enterprises and SP networks) the network would operate a standard<br>
IGP.=C2=A0 However, in some use cases, like modern DCs, some are designing<=
br>
fabrics which don=E2=80=99t use a traditional IGP.=C2=A0 These networks use=
 all BGP<br>
(eBGP) with full sets of neighbor relationships.=C2=A0 This helps reduce<br=
>
the amount of running protocols within the underlay, but may (or may<br>
not) cause issues with BIER in relation distribution of system<br>
information.=C2=A0 Do the authors consider this use case one that can be<br=
>
address with BIER as it=E2=80=99s currently outlined, or would additional<b=
r>
considerations be needed?<br>
</blockquote>
<br>
With regard to the control plane, there is a draft that explains how to use=
 BGP to distribute the same information (labels, BFR-ids, BFR-prefixes) tha=
t is distributed via OSPF or ISIS extensions.=C2=A0 I don&#39;t think anyth=
ing explicit needs to be said in the architecture; the architecture uses IG=
P-based distribution as an example, but I don&#39;t think there is any text=
 there that requires the control plane to be IGP-based.<br>
<br>
In the data plane, the document does focus on the case where the &quot;rout=
ing underlay&quot; is IGP-based (link-state-based), but I think it is clear=
 that all the routing underlay really needs to provide is the mapping from =
BFR-id to BFR-prefix to set of next hops.=C2=A0 Some of the techniques disc=
ussed for tunneling around non-BFR neighbors or for routing around failed n=
eighbors do assume link state routing, but these techniques are optional.<b=
r>
<br>
So to answer your question, I don&#39;t think anything additional needs to =
be added to the architecture to accommodate non-traditional routing underla=
ys.=C2=A0 I&#39;ll do another read-through to make sure it&#39;s clear that=
 OSPF/IS-IS are not portrayed as strict requirements.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and did=
 not see<br>
text that specifically help or hinder the operational mode I described<br>
above.<br>
</blockquote>
<br>
I won&#39;t comment on the &quot;use cases&quot; document.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
<br>
(3) Broadcast Video Operation. (more of a question then a point of note)<br=
>
<br>
<br>
I did noticed in the use case document (as noted above in point 2),<br>
that considers more traditional broadcast video networks was<br>
described.=C2=A0 So my question is, would an operational model which<br>
required two simultaneous M/C flows from separate sources (normally<br>
two packagers/encryptors etc) be supported by the BIER architecture as<br>
described?=C2=A0 My best estimate would be that the operator would use two<=
br>
sub-domains that would allow each BFER to potentially get two of each<br>
packet (which are sourced by two different injection points / BIFRs).<br>
This mode of operation is common in some places to allow the M/C<br>
broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/device t=
o allow for<br>
fast switchover in case of network failure (where normal network level<br>
detection and re-routing is not sufficient).<br>
</blockquote>
<br>
If a flow enters the BIER domain at two different ingress points, and each =
ingress point knows the egress points for that flow, there is nothing to st=
op both ingress points from using BIER to multicast the flow to the same se=
t of egress points.=C2=A0 The egress node would have to be able to tell whe=
n it was receiving two copies of the flow, so that it could choose one copy=
 as the one to forward further.=C2=A0 The BIER encapsulations (not describe=
d in the architecture) do carry the BFIR-id in the BIER header, which makes=
 this possible.=C2=A0 If the flow from one ingress node fails, the egress n=
ode could switch to the other flow.=C2=A0 How it determines when to do this=
 is outside the scope of BIER, of course.<br>
<br>
If it is desired that the two copies of a given flow travel through the net=
work along disjoint paths, one would have to set up two different &quot;rou=
ting underlays&quot;, each disjoint from the other.=C2=A0 This would requir=
e two sub-domains.=C2=A0 This really becomes a network design issue, but co=
uld certainly be handled by BIER.<br>
<br>
So to answer your question, I believe the architecture handles these cases,=
 but BIER is only a piece of the solution.<br>
<br>
<br>
<br><br>---------- Forwarded message ----------<br>From:=C2=A0Victor Kuarsi=
ngh &lt;<a href=3D"mailto:victor@jvknet.com">victor@jvknet.com</a>&gt;<br>T=
o:=C2=A0Eric C Rosen &lt;<a href=3D"mailto:erosen@juniper.net">erosen@junip=
er.net</a>&gt;<br>Cc:=C2=A0Warren Kumari &lt;<a href=3D"mailto:warren@kumar=
i.net">warren@kumari.net</a>&gt;, Benoit Claise &lt;<a href=3D"mailto:bclai=
se@cisco.com">bclaise@cisco.com</a>&gt;, <a href=3D"mailto:ops-dir@ietf.org=
">ops-dir@ietf.org</a>, <a href=3D"mailto:draft-ietf-bier-architecture.all@=
ietf.org">draft-ietf-bier-architecture.all@ietf.org</a>, <a href=3D"mailto:=
gjshep@gmail.com">gjshep@gmail.com</a>, <a href=3D"mailto:prz@juniper.net">=
prz@juniper.net</a>, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">ak=
atlas@gmail.com</a>&gt;<br>Bcc:=C2=A0<br>Date:=C2=A0Fri, 30 Jun 2017 11:22:=
16 -0400<br>Subject:=C2=A0Re: Ops-Dir Review of Draft-ietf-bier-architectur=
e-07<br>On Fri, Jun 30, 2017 at 11:12 AM, Eric C Rosen &lt;<a href=3D"mailt=
o:erosen@juniper.net">erosen@juniper.net</a>&gt; wrote:<br>
&gt; Victor, thanks for taking the time to do this review.<br>
&gt;<br>
&gt;&gt; (1). Security Considerations<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; It was not 100% clear to the reviewer (me) if the use case of how =
the<br>
&gt;&gt; BIER architecture (or guidance for future implementation) may avoi=
d<br>
&gt;&gt; certain DoS like activity from illegitimate neighbors (BFR-NBRs).=
=C2=A0 I<br>
&gt;&gt; may have missed specific text which addresses the point made herei=
n<br>
&gt;&gt; (if so, please disregard my first point and please make reference<=
br>
&gt;&gt; where it is addressed).=C2=A0 The concern is if a packet is introd=
uced into<br>
&gt;&gt; the system by a host (compromised perhaps) which fabricates packet=
s<br>
&gt;&gt; (may or may not have valid payload inside the BIER encapsulation) =
that<br>
&gt;&gt; attempts to starve resources in the system.=C2=A0 One way of doing=
 this<br>
&gt;&gt; (which may require control plane access - maybe) would be to<br>
&gt;&gt; set/create packets which forces additional replication at BFRs (i.=
e.<br>
&gt;&gt; set a single=C2=A0 - or all bits -=C2=A0 for all SIs).=C2=A0 This =
would then create<br>
&gt;&gt; the maximum amount of replication within the system.=C2=A0 Perhaps=
 this use<br>
&gt;&gt; case is addressed as noted.<br>
&gt;<br>
&gt;<br>
&gt; The security considerations do say that every BFR must be provisioned =
ot<br>
&gt; know which of its interfaces lead to a BIER domain and which do not.=
=C2=A0 =C2=A0I can<br>
&gt; say a little more explicitly that one shouldn&#39;t accept BIER-encaps=
ulated<br>
&gt; packets from outside the domain. That addresses one sort of threat.<br=
>
&gt;<br>
&gt; The security consideratons do point out that modification of the BIER<=
br>
&gt; encapsulation through error or malfeasance cause misdelivery. I can ad=
d that<br>
&gt; certain sorts of modifications, such as setting all the bits in the<br=
>
&gt; BitString, are potential vectors for DoS attacks.<br>
&gt;<br>
&gt; It is probably worth pointing out as well that when the initial BIER<b=
r>
&gt; encapsulation is imposed, certain errors, such as setting all the bits=
 in<br>
&gt; the BitString, can result in DoS attacks (intended or unintended).<br>
<br>
<br>
Sure, I think that helps.<br>
<br>
<br>
&gt;<br>
&gt;&gt; I was not able to find specific operations/functions which scrutin=
ized<br>
&gt;&gt; incoming packets and/or guard for bad NBRs.=C2=A0 Could this be an=
 issue<br>
&gt;&gt; from the authors standpoint?=C2=A0 In more traditional networks, t=
here are<br>
&gt;&gt; methods operators use to ensure that illegitimate traffic is not<b=
r>
&gt;&gt; introduced into the system.=C2=A0 I wanted to make sure there was =
thoughts<br>
&gt;&gt; on how to do this with BIER.<br>
&gt;<br>
&gt;<br>
&gt; The only check like this is at the boundaries of a BIER domain, where<=
br>
&gt; BIER-encapsulated packets are not accepted from interfaces that lead o=
utside<br>
&gt; the domain.=C2=A0 I&#39;m not sure what else one would do.<br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; (2). SPF assumed.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I agree most places where the BIER architecture would likely live =
(say<br>
&gt;&gt; in Enterprises and SP networks) the network would operate a standa=
rd<br>
&gt;&gt; IGP.=C2=A0 However, in some use cases, like modern DCs, some are d=
esigning<br>
&gt;&gt; fabrics which don=E2=80=99t use a traditional IGP.=C2=A0 These net=
works use all BGP<br>
&gt;&gt; (eBGP) with full sets of neighbor relationships.=C2=A0 This helps =
reduce<br>
&gt;&gt; the amount of running protocols within the underlay, but may (or m=
ay<br>
&gt;&gt; not) cause issues with BIER in relation distribution of system<br>
&gt;&gt; information.=C2=A0 Do the authors consider this use case one that =
can be<br>
&gt;&gt; address with BIER as it=E2=80=99s currently outlined, or would add=
itional<br>
&gt;&gt; considerations be needed?<br>
&gt;<br>
&gt;<br>
&gt; With regard to the control plane, there is a draft that explains how t=
o use<br>
&gt; BGP to distribute the same information (labels, BFR-ids, BFR-prefixes)=
 that<br>
&gt; is distributed via OSPF or ISIS extensions.=C2=A0 I don&#39;t think an=
ything explicit<br>
&gt; needs to be said in the architecture; the architecture uses IGP-based<=
br>
&gt; distribution as an example, but I don&#39;t think there is any text th=
ere that<br>
&gt; requires the control plane to be IGP-based.<br>
&gt;<br>
&gt; In the data plane, the document does focus on the case where the &quot=
;routing<br>
&gt; underlay&quot; is IGP-based (link-state-based), but I think it is clea=
r that all<br>
&gt; the routing underlay really needs to provide is the mapping from BFR-i=
d to<br>
&gt; BFR-prefix to set of next hops.=C2=A0 Some of the techniques discussed=
 for<br>
&gt; tunneling around non-BFR neighbors or for routing around failed neighb=
ors do<br>
&gt; assume link state routing, but these techniques are optional.<br>
&gt;<br>
&gt; So to answer your question, I don&#39;t think anything additional need=
s to be<br>
&gt; added to the architecture to accommodate non-traditional routing under=
lays.<br>
&gt; I&#39;ll do another read-through to make sure it&#39;s clear that OSPF=
/IS-IS are not<br>
&gt; portrayed as strict requirements.<br>
<br>
Sure, that makes sense.=C2=A0 I was just my read.=C2=A0 Again, not a big it=
em.<br>
But thanks for double checking.<br>
<br>
<br>
&gt;<br>
&gt;&gt; I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D documen=
t and did not see<br>
&gt;&gt; text that specifically help or hinder the operational mode I descr=
ibed<br>
&gt;&gt; above.<br>
&gt;<br>
&gt;<br>
&gt; I won&#39;t comment on the &quot;use cases&quot; document.<br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; (3) Broadcast Video Operation. (more of a question then a point of=
 note)<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I did noticed in the use case document (as noted above in point 2)=
,<br>
&gt;&gt; that considers more traditional broadcast video networks was<br>
&gt;&gt; described.=C2=A0 So my question is, would an operational model whi=
ch<br>
&gt;&gt; required two simultaneous M/C flows from separate sources (normall=
y<br>
&gt;&gt; two packagers/encryptors etc) be supported by the BIER architectur=
e as<br>
&gt;&gt; described?=C2=A0 My best estimate would be that the operator would=
 use two<br>
&gt;&gt; sub-domains that would allow each BFER to potentially get two of e=
ach<br>
&gt;&gt; packet (which are sourced by two different injection points / BIFR=
s).<br>
&gt;&gt; This mode of operation is common in some places to allow the M/C<b=
r>
&gt;&gt; broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router=
/device to allow for<br>
&gt;&gt; fast switchover in case of network failure (where normal network l=
evel<br>
&gt;&gt; detection and re-routing is not sufficient).<br>
&gt;<br>
&gt;<br>
&gt; If a flow enters the BIER domain at two different ingress points, and =
each<br>
&gt; ingress point knows the egress points for that flow, there is nothing =
to<br>
&gt; stop both ingress points from using BIER to multicast the flow to the =
same<br>
&gt; set of egress points.=C2=A0 The egress node would have to be able to t=
ell when it<br>
&gt; was receiving two copies of the flow, so that it could choose one copy=
 as<br>
&gt; the one to forward further.=C2=A0 The BIER encapsulations (not describ=
ed in the<br>
&gt; architecture) do carry the BFIR-id in the BIER header, which makes thi=
s<br>
&gt; possible.=C2=A0 If the flow from one ingress node fails, the egress no=
de could<br>
&gt; switch to the other flow.=C2=A0 How it determines when to do this is o=
utside the<br>
&gt; scope of BIER, of course.<br>
&gt;<br>
&gt; If it is desired that the two copies of a given flow travel through th=
e<br>
&gt; network along disjoint paths, one would have to set up two different<b=
r>
&gt; &quot;routing underlays&quot;, each disjoint from the other.=C2=A0 Thi=
s would require two<br>
&gt; sub-domains.=C2=A0 This really becomes a network design issue, but cou=
ld<br>
&gt; certainly be handled by BIER.<br>
&gt;<br>
&gt; So to answer your question, I believe the architecture handles these c=
ases,<br>
&gt; but BIER is only a piece of the solution.<br>
<br>
Fair.=C2=A0 Again, no action was necessarily required per say.=C2=A0 Just w=
anted<br>
to validate.<br>
<br>
&gt;<br>
&gt;<br>
<br>
<br>
regards,<br>
<br>
Victor K<br>
<br></blockquote></div><br></div></div>

--001a11499fa8ab1e900553aa7ef2--


From nobody Thu Jul  6 14:08:11 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B58CB12EA58; Thu,  6 Jul 2017 14:08:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M0o23V-eLTgd; Thu,  6 Jul 2017 14:08:07 -0700 (PDT)
Received: from mail-wr0-x231.google.com (mail-wr0-x231.google.com [IPv6:2a00:1450:400c:c0c::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2534813180A; Thu,  6 Jul 2017 14:08:07 -0700 (PDT)
Received: by mail-wr0-x231.google.com with SMTP id c11so19741931wrc.3; Thu, 06 Jul 2017 14:08:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=9sDU/7y7t4IpAgGBOf/AUOZ+1/DsPzR1MJ8XgEzhOxs=; b=mtwRHovXRCkAz/4iuhLMLwHb19kBvd0grd9xX4k8wvbxKgxXKEEsI2czi5IcT8i2DM hV3So0JigGp3bhw+KQtdizW0yRFIPKoRX1AGBXEoyzRM6O9kjP5ZXQW39gw994UxcjBG hjOsg7YUx4bVnYiEmtBSruaGftcs+QZqao5GnImrHYilFBVb6mDJnszJI7AjBIGAboN4 I0o1xWgaHx27Ik854ZeGZSm3ZFqZBo36HuxVe0D2CZp7ZSLdOdW7w7lGaySF7nFvWvtR S1Yuk/QVOzccjHobd2ZFOJ+cvl/KKinrgKPKQsJLUjS/gBgeUy/qoBFFxUjo1o+mTEDE 24cg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=9sDU/7y7t4IpAgGBOf/AUOZ+1/DsPzR1MJ8XgEzhOxs=; b=ilkvsXt7hnBKFyjk4p2T6f5WXkuQ9HwcgOfsLmg3ZX/aIHW5jo7y9GtP7HRovQLT9i sCGKX78nOQmOPc2HPnhRJoJzuXoexQvcZDwara1dXdLlvfG4WSIJWp8MkBWUeQIN7fE+ 1V0+L1LhQh5x+vbRSeS2JkR2FN3nK8Ufc3e/WvTrEaQlEv/AxCLBtjVCnOX2bTp4W92v XIdw66nu9F/VqnyDsayKPbn3d3PGYC+yY6Qw2k/K2WfVAzSuYUidrm66zmgdEg6JdorT yJ8gvVyUvrHleXC71y468OUZ0sCk0Mj4p9IUewB6OWW087sdj/zgIHHUoMCSwB0WP07w hpDw==
X-Gm-Message-State: AIVw111uw/laA8XQ0ZbRIZjKzpWUtsD3hi4zfoUHmBzOSN2i6v52Zr4j QrTNcevVAbsfcnVN6SYRaBnJqt4JxN5H
X-Received: by 10.80.161.71 with SMTP id 65mr599739edj.183.1499375285747; Thu, 06 Jul 2017 14:08:05 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.183.131 with HTTP; Thu, 6 Jul 2017 14:07:25 -0700 (PDT)
In-Reply-To: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com>
References: <149928257588.22631.11073122843340523128.idtracker@ietfa.amsl.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Thu, 6 Jul 2017 14:07:25 -0700
Message-ID: <CA+wi2hOi3p2jaZo86f6wXs+8aA-gXppXb35EmaPgqHE9t0_=fg@mail.gmail.com>
To: Warren Kumari <warren@kumari.net>
Cc: The IESG <iesg@ietf.org>, draft-ietf-bier-architecture@ietf.org,  Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, bier-chairs@ietf.org
Content-Type: multipart/alternative; boundary="94eb2c0d9a5c4ac7260553ac83a1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/wYW9liEuSDIgFKrd-9SmxgBuSyI>
Subject: Re: [Bier] Warren Kumari's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 21:08:10 -0000

--94eb2c0d9a5c4ac7260553ac83a1
Content-Type: text/plain; charset="UTF-8"

>
> Nits and notes:
> 1: " A router that supports BIER is known as a "Bit-Forwarding Router"
> (BFR)."
> -- this makes me sad; the BFR acronym was already in use, and had
> interesting
> history behind it (Big er... Fast Router) -
> http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A


Some of the authors are known as mild punsters so for the old hands it may
look like some of the acronym choices have not been innocuous ;-)


>
>
> 2: "MVPN signaling also has several components that depend on the
>    type of "tunneling technology" used to carry multicast data though
>    the network." -- though the network what?! I suspect you meant
> "through" :-)
> 3: Section 6.1.  Overview
> "If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and
> BitString identify that BFR itself, ..." -- identifies.
>

ack


>
> O: "When BIER on a BFER is to pass a packet to the multicast flow overlay,
> it
> of course decapsulates..." P: "When BIER on a BFER is to pass a packet to
> the
> multicast flow overlay, it, of course decapsulates" C: Missing a comma. I
> suspect: "When BIER on a BFER is to pass a packet to the multicast flow
> overlay, it decapsulates..." would be even better.
>
> Section 6.9.  When Some Nodes do not Support BIER
> "In this section, we assume that the routing underlay is an SPF-based IGP
> that
> computes a shortest path tree from each node to all other nodes in the
> domain."
> C: I *think* that this should actually be "the shortest path", but I'm not
> sure; everything talks about e.g Dijkstra's algorithm finding the shortest
> path, but what if there are multiple equal cost paths? But, this is a
> singular
> tree, but may not be unique, so any SP tree will... erk... Good this this
> is a
> nit and I can move on :-)
>

in fact, it is a DAG with SPF properties and BIER is free to use the DAG to
ECMP. The ECMP section should make that pretty obvious.



>
> Section 6.10.3.  Transitioning from One BitStringLength to Another
> Typo:  Dispostion ->  Disposition
>

ack

--94eb2c0d9a5c4ac7260553ac83a1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><div class=3D"gmail_quote">=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Nits and notes:<br>
1: &quot; A router that supports BIER is known as a &quot;Bit-Forwarding Ro=
uter&quot; (BFR).&quot;<br>
-- this makes me sad; the BFR acronym was already in use, and had interesti=
ng<br>
history behind it (Big er... Fast Router) -<br>
<a href=3D"http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A" rel=
=3D"noreferrer" target=3D"_blank">http://photos.kumari.net/<wbr>Technology/=
Networking/i-<wbr>k4vCdwv/A</a></blockquote><div><br></div><div>Some of the=
 authors are known as mild punsters so for the old hands it may look like s=
ome of the acronym choices have not been innocuous ;-)=C2=A0</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><br>
<br>
2: &quot;MVPN signaling also has several components that depend on the<br>
=C2=A0 =C2=A0type of &quot;tunneling technology&quot; used to carry multica=
st data though<br>
=C2=A0 =C2=A0the network.&quot; -- though the network what?! I suspect you =
meant &quot;through&quot; :-)<br>
3: Section 6.1.=C2=A0 Overview<br>
&quot;If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and=
<br>
BitString identify that BFR itself, ...&quot; -- identifies.<br></blockquot=
e><div><br></div><div>ack=C2=A0</div><div>=C2=A0</div><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">
<br>
O: &quot;When BIER on a BFER is to pass a packet to the multicast flow over=
lay, it<br>
of course decapsulates...&quot; P: &quot;When BIER on a BFER is to pass a p=
acket to the<br>
multicast flow overlay, it, of course decapsulates&quot; C: Missing a comma=
. I<br>
suspect: &quot;When BIER on a BFER is to pass a packet to the multicast flo=
w<br>
overlay, it decapsulates...&quot; would be even better.<br>
<br>
Section 6.9.=C2=A0 When Some Nodes do not Support BIER<br>
&quot;In this section, we assume that the routing underlay is an SPF-based =
IGP that<br>
computes a shortest path tree from each node to all other nodes in the doma=
in.&quot;<br>
C: I *think* that this should actually be &quot;the shortest path&quot;, bu=
t I&#39;m not<br>
sure; everything talks about e.g Dijkstra&#39;s algorithm finding the short=
est<br>
path, but what if there are multiple equal cost paths? But, this is a singu=
lar<br>
tree, but may not be unique, so any SP tree will... erk... Good this this i=
s a<br>
nit and I can move on :-)<br></blockquote><div><br></div><div>in fact, it i=
s a DAG with SPF properties and BIER is free to use the DAG to ECMP. The EC=
MP section should make that pretty obvious.=C2=A0</div><div><br></div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
<br>
Section 6.10.3.=C2=A0 Transitioning from One BitStringLength to Another<br>
Typo:=C2=A0 Dispostion -&gt;=C2=A0 Disposition<br></blockquote><div><br></d=
iv><div>ack=C2=A0</div><div><br></div></div>
</div></div>

--94eb2c0d9a5c4ac7260553ac83a1--


From nobody Thu Jul  6 15:30:56 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3ECC412ECAD; Thu,  6 Jul 2017 15:30:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UHRH76CyWJgy; Thu,  6 Jul 2017 15:30:52 -0700 (PDT)
Received: from mail-wr0-x22d.google.com (mail-wr0-x22d.google.com [IPv6:2a00:1450:400c:c0c::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE583126D46; Thu,  6 Jul 2017 15:30:51 -0700 (PDT)
Received: by mail-wr0-x22d.google.com with SMTP id c11so22111876wrc.3; Thu, 06 Jul 2017 15:30:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3yGu9LBN9yXsPZgm1rR1jFRUi6uKAgfC/PyyCLjwQ8U=; b=MhajFJP4C2qpV19jrJossg64xwqGinarDgeyTc4AWU1qLJN/nElrj1xS42E9SlSs17 Q/NhZHGQ1eJWzsQOYgaQE+w1s2JiiU7lmP0ZT4r/um8omJaNh7aQ7i+BXHpmXo4zpzA0 X7uf68gXtHsavbhKYlEXyBrqLF0fVW0lTPdts5edFD25/LivERmAF3/e9Q1z1dud6hZc +JSsjXYfykKv2FTkK1p398MKGM23t6Sxn8fjBY8H01l3oPY558oKMQkNSc/a76llvjW8 JSLQLzGRi2r/nbq/0nPfEsf/TW4rBHmtS0CfIDu1hbPS0NvPqoLVCeQfSqN/hLzvPZ8b xyvA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3yGu9LBN9yXsPZgm1rR1jFRUi6uKAgfC/PyyCLjwQ8U=; b=RyG8QKeMvBh7N68tB294UKWkZWGDoCuUG5Q5rRP0JYqW45n4VCdu+VXO9SSUinJfWd YMZl8/3YfIxG2D3UXRvGytLXrwsIb8GOU/zPPa3mV/8d0vytgE188gh1Zok0fdAQKYyI bLxPXK+J1Lf+qE7DNjkQ3E1VCFoCLrZNqYcDTlGjBk8La5jPNpCy4XwBZPF3Cp/jBpOJ Kq1+SgamLXrvoLLE8iu07CigwIAcCcWAnhI/QmA/EQcrMUVuIMy1XPj3krPKa6HFEJCF x8RLpaLvPAV0cAH9ZW7V0vtR+VGhc525NNtu6yz6HrgieSTJdjqxES5pyxo05iZmDapy qGqQ==
X-Gm-Message-State: AIVw111EMl4Vtk0u1Vu+5ZDqTLd7L0t/YQU5d0nu+1+o1wrxW0eCtDJa gIjTuYBe5es8TqNO3TYNYNrlQ1agw9qb
X-Received: by 10.80.220.138 with SMTP id r10mr123449edk.91.1499380250180; Thu, 06 Jul 2017 15:30:50 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.183.131 with HTTP; Thu, 6 Jul 2017 15:30:09 -0700 (PDT)
In-Reply-To: <CABFReBqexpAuSUCC_AP2My3g2n4GAF62HRYB7M5Nzq8-Y8MeZw@mail.gmail.com>
References: <149934683636.2270.10065032311656213669.idtracker@ietfa.amsl.com> <a3b1141a-dce6-6cd0-215c-b7fd5074879a@juniper.net> <CABFReBqexpAuSUCC_AP2My3g2n4GAF62HRYB7M5Nzq8-Y8MeZw@mail.gmail.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Thu, 6 Jul 2017 15:30:09 -0700
Message-ID: <CA+wi2hNg+Sh4nCO3U+f2iPpJD5AWy4QJ3H-dh9=kHCiZTd6YrQ@mail.gmail.com>
To: Greg Shepherd <gjshep@gmail.com>
Cc: Eric C Rosen <erosen@juniper.net>, "bier@ietf.org" <bier@ietf.org>,  draft-ietf-bier-architecture@ietf.org, victor@jvknet.com,  The IESG <iesg@ietf.org>, Benoit Claise <bclaise@cisco.com>, bier-chairs@ietf.org
Content-Type: multipart/alternative; boundary="f403043e51ec32024c0553adab27"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/ZCGFYGWJ-f40WsN6pNhxKoOC7FU>
Subject: Re: [Bier] Benoit Claise's Discuss on draft-ietf-bier-architecture-07: (with DISCUSS and COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 22:30:56 -0000

--f403043e51ec32024c0553adab27
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

inline comments as chair helping out the shepherd and editor ... Cut out
tons text to abbreviate this (by now) longish text ...

On Thu, Jul 6, 2017 at 11:43 AM, Greg Shepherd <gjshep@gmail.com> wrote:

> Inline:
>
> On Thu, Jul 6, 2017 at 7:45 AM, Eric C Rosen <erosen@juniper.net> wrote:
>
>> On 7/6/2017 9:13 AM, Benoit Claise wrote:
>>
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>>
>>> 1. I want to come back to the experimental status.
>>>
>>
>> The status of the document is a political issue that should not impact
>> the content of the document.
>
>
> I would say process over political. But I agree it should have no bearing
> on the content of the document.
>

Yes, this is a process/track issue and I would not consider an architecture
document well-crafted if its text had to argue the document itself onto a
track ;-) The work either stands in its quality/adoption to present a
standards track or doesn't and then such track is meaningless. The bar set
to adopt this work on IETF standard track by Alia has been arguably very
high but the current agreement has been struck with the chairs based on her
most excellent argument that we're touching the "hourglass" and with that
more rigorous standards apply ... IMO we are all better off for it longer
term.


>
>
>>
>>
>>> I have seen Alia's reply:
>>>
>>>      In the BIER Charter, work item 9 describes a document based on
>>> deployment
>>>      experience that can justify moving the BIER work from Experimental
>>> to
>>>      Standards Track.  When I chartered the WG, it wasn't clear whether
>>> it was
>>>      merely a good idea or a good idea with enough motivations towards
>>>      deployment that it is worth complicating the architecture at the
>>> narrow
>>>      point of the IP hourglass.
>>>
>>> >From the writeup, it seems that the experiment is successful already:
>>>
>>>      The vendors are being quite tight lipped about current
>>> implementations.
>>>      Operator feedback indicates there are at least two implementations
>>>      currently, with others in the works. There are currently five
>>> vendors
>>>      collaborating on the work in the IETF.
>>>
>>> However, I've not been following the specifications development and
>>> implementation to provide a definitive answer.
>>>
>>> At the minimum, the document needs to describe what the criteria are fo=
r
>>> a
>>> successful experiment.
>>>      Implementations (RFC7942?)?
>>>      two interop implementations?
>>>      hardware implementation?
>>>      "deployment experience" (to cite the charter text)?
>>>      impact analysis?
>>>      something else?
>>>
>>> The ideal BIER document for this explanation is this architecture doc.
>>>
>>
>> The above is all entirely outside the scope of this document.
>
>
> Agree. This is in the charter. If/when the the case is made to transition
> all of the BIER work to the standards track the documents' contents shoul=
d
> not change.
>

Yes, the standard of adoption into standards track is entirely a charter
issue IMO and this can be formulated along e.g. lines suggested by Benoit
within the charter.


>
>
>>
>> 2. operations and management section
>>> I'm sure there are such considerations:
>>>      - configuration
>>>      - sub-domain management
>>>      - BFR-id management
>>>      - adding new BFIR/BFER device to the domain
>>>      - logging
>>>      - troubleshooting
>>>      - OAM
>>>      - etc.
>>>
>>
>> I am unaware of any RFC that requires such a section to be included in a
>> document like this.  These topics are outside the scope of this document=
.
>
>
>  Agree. There are other documents in the WG to address some of the above
> concerns. None of these seem appropriate for an architecture document.
>

I am agnostic whether architecture document shall REFER to e.g. OAM
document. However, folding those documents/considerations into a detailed
architecture document  (like this one is) will make it unwieldy and loose
the forest for the trees. If anything, this architecture says too much
about things like operational details (since we want to leave the mechanism
applied @ the discretion of particular implementation, BIER can be IGP
signalled, statically configured, controller provisioned and so on without
breaking the architecture. Same applies for BFR-id). Unless specific
standards RFC dictates that those considerations must be included in a
detailed fashion in this architecture document I would also argue that they
do not belong here.


>
> There are also two other management documents that should be referenced:
>>> chartered item 6 and 7.
>>>
>>
>> These are outside the scope of the architecture document.
>
>
> Agree. The mgmt docs must refer to the arch not, but I don't see why the
> other way around is required.
>

Like I said, I'm agnostic.


>
>>
>>> What this "operations and management section" should contain is the
>>> points that
>>> operators, who will deploy this technology, have to pay attention to. A=
n
>>> architecture document is typically the first document people will read.
>>> RFC
>>> 5706 appendix A provide typical questions from an OPS point of view. I
>>> understand that this is an experiment and you might not have all the
>>> answers at
>>> this point in time.
>>>
>>
>> This would be the topic for a different document.
>
>
> Agree. There is other work in the WG to address this. It would seem out o=
f
> scope for an arch doc.
>
>
Agree, I see how an RFC5706 structured document for BIER could make sense
but it's outside the scope of the architecture doc. If anything, the
architecture document currently says TOO much about it in its scope.


>
>>> Just one observation. Was thinking, so it's like an (OSPF) routerId,
>>> except
>>> that it's called a prefix. Then I understood, reading further. It's not
>>> called
>>> a routerId because this address/prefix must be routable
>>>
>>> - Was wondering. Is this mechanism only for multicast packets? What abo=
ut
>>> anycast/unicast?
>>>
>>
>> You could use BIER to do a unicast, by setting only one bit in the
>> BitString.  However, there are other more efficient encapsulations for
>> unicast tunnels.
>>
>
In certain scenarios people will in fact use the one-bit-equal-unicast and
pay  the encapsulation price. In others, they will follow unicast
paths/tunnels. I was told, the problem exists today already with
traditional multicast for certain applications. The architecture does NOT
prohibit a one-bit-is-unicast (as traditional multicast doesn't preclude it
from being used between a single sender-receiver pair) use and that's all
is required from the architecture.


>>
>> ---------- Forwarded message ----------
>> From: Eric C Rosen <erosen@juniper.net>
>> To: Victor Kuarsingh <victor@jvknet.com>, Warren Kumari <
>> warren@kumari.net>, Benoit Claise <bclaise@cisco.com>, ops-dir@ietf.org,
>> draft-ietf-bier-architecture.all@ietf.org, gjshep@gmail.com,
>> prz@juniper.net, Alia Atlas <akatlas@gmail.com>
>> Cc:
>> Bcc:
>> Date: Fri, 30 Jun 2017 11:12:53 -0400
>> Subject: Re: Ops-Dir Review of Draft-ietf-bier-architecture-07
>> Victor, thanks for taking the time to do this review.
>>
>> (1). Security Considerations
>>>
>>>
>>> It was not 100% clear to the reviewer (me) if the use case of how the
>>> BIER architecture (or guidance for future implementation) may avoid
>>> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
>>> may have missed specific text which addresses the point made herein
>>> (if so, please disregard my first point and please make reference
>>> where it is addressed).  The concern is if a packet is introduced into
>>> the system by a host (compromised perhaps) which fabricates packets
>>> (may or may not have valid payload inside the BIER encapsulation) that
>>> attempts to starve resources in the system.  One way of doing this
>>> (which may require control plane access - maybe) would be to
>>> set/create packets which forces additional replication at BFRs (i.e.
>>> set a single  - or all bits -  for all SIs).  This would then create
>>> the maximum amount of replication within the system.  Perhaps this use
>>> case is addressed as noted.
>>>
>>
>> The security considerations do say that every BFR must be provisioned ot
>> know which of its interfaces lead to a BIER domain and which do not.   I
>> can say a little more explicitly that one shouldn't accept
>> BIER-encapsulated packets from outside the domain. That addresses one so=
rt
>> of threat.
>>
>> The security consideratons do point out that modification of the BIER
>> encapsulation through error or malfeasance cause misdelivery. I can add
>> that certain sorts of modifications, such as setting all the bits in the
>> BitString, are potential vectors for DoS attacks.
>>
>> It is probably worth pointing out as well that when the initial BIER
>> encapsulation is imposed, certain errors, such as setting all the bits i=
n
>> the BitString, can result in DoS attacks (intended or unintended).
>>
>> I was not able to find specific operations/functions which scrutinized
>>> incoming packets and/or guard for bad NBRs.  Could this be an issue
>>> from the authors standpoint?  In more traditional networks, there are
>>> methods operators use to ensure that illegitimate traffic is not
>>> introduced into the system.  I wanted to make sure there was thoughts
>>> on how to do this with BIER.
>>>
>>
>> The only check like this is at the boundaries of a BIER domain, where
>> BIER-encapsulated packets are not accepted from interfaces that lead
>> outside the domain.  I'm not sure what else one would do.
>>
>>
>>>
>>> (2). SPF assumed.
>>>
>>>
>>> I agree most places where the BIER architecture would likely live (say
>>> in Enterprises and SP networks) the network would operate a standard
>>> IGP.  However, in some use cases, like modern DCs, some are designing
>>> fabrics which don=E2=80=99t use a traditional IGP.  These networks use =
all BGP
>>> (eBGP) with full sets of neighbor relationships.  This helps reduce
>>> the amount of running protocols within the underlay, but may (or may
>>> not) cause issues with BIER in relation distribution of system
>>> information.  Do the authors consider this use case one that can be
>>> address with BIER as it=E2=80=99s currently outlined, or would addition=
al
>>> considerations be needed?
>>>
>>
>> With regard to the control plane, there is a draft that explains how to
>> use BGP to distribute the same information (labels, BFR-ids, BFR-prefixe=
s)
>> that is distributed via OSPF or ISIS extensions.  I don't think anything
>> explicit needs to be said in the architecture; the architecture uses
>> IGP-based distribution as an example, but I don't think there is any tex=
t
>> there that requires the control plane to be IGP-based.
>>
>> In the data plane, the document does focus on the case where the "routin=
g
>> underlay" is IGP-based (link-state-based), but I think it is clear that =
all
>> the routing underlay really needs to provide is the mapping from BFR-id =
to
>> BFR-prefix to set of next hops.  Some of the techniques discussed for
>> tunneling around non-BFR neighbors or for routing around failed neighbor=
s
>> do assume link state routing, but these techniques are optional.
>>
>> So to answer your question, I don't think anything additional needs to b=
e
>> added to the architecture to accommodate non-traditional routing
>> underlays.  I'll do another read-through to make sure it's clear that
>> OSPF/IS-IS are not portrayed as strict requirements.
>>
>> I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and =
did not see
>>> text that specifically help or hinder the operational mode I described
>>> above.
>>>
>>
>> ...
>>
>>
>> ---------- Forwarded message ----------
>> From: Victor Kuarsingh <victor@jvknet.com>
>> To: Eric C Rosen <erosen@juniper.net>
>> Cc: Warren Kumari <warren@kumari.net>, Benoit Claise <bclaise@cisco.com>=
,
>> ops-dir@ietf.org, draft-ietf-bier-architecture.all@ietf.org,
>> gjshep@gmail.com, prz@juniper.net, Alia Atlas <akatlas@gmail.com>
>> Bcc:
>> Date: Fri, 30 Jun 2017 11:22:16 -0400
>> Subject: Re: Ops-Dir Review of Draft-ietf-bier-architecture-07
>> On Fri, Jun 30, 2017 at 11:12 AM, Eric C Rosen <erosen@juniper.net>
>> wrote:
>> > Victor, thanks for taking the time to do this review.
>> >
>> >> (1). Security Considerations
>> >>
>> >>
>> >> It was not 100% clear to the reviewer (me) if the use case of how the
>> >> BIER architecture (or guidance for future implementation) may avoid
>> >> certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
>> >> may have missed specific text which addresses the point made herein
>> >> (if so, please disregard my first point and please make reference
>> >> where it is addressed).  The concern is if a packet is introduced int=
o
>> >> the system by a host (compromised perhaps) which fabricates packets
>> >> (may or may not have valid payload inside the BIER encapsulation) tha=
t
>> >> attempts to starve resources in the system.  One way of doing this
>> >> (which may require control plane access - maybe) would be to
>> >> set/create packets which forces additional replication at BFRs (i.e.
>> >> set a single  - or all bits -  for all SIs).  This would then create
>> >> the maximum amount of replication within the system.  Perhaps this us=
e
>> >> case is addressed as noted.
>> >
>> >
>> > The security considerations do say that every BFR must be provisioned =
ot
>> > know which of its interfaces lead to a BIER domain and which do not.
>>  I can
>> > say a little more explicitly that one shouldn't accept BIER-encapsulat=
ed
>> > packets from outside the domain. That addresses one sort of threat.
>> >
>> > The security consideratons do point out that modification of the BIER
>> > encapsulation through error or malfeasance cause misdelivery. I can ad=
d
>> that
>> > certain sorts of modifications, such as setting all the bits in the
>> > BitString, are potential vectors for DoS attacks.
>> >
>> > It is probably worth pointing out as well that when the initial BIER
>> > encapsulation is imposed, certain errors, such as setting all the bits
>> in
>> > the BitString, can result in DoS attacks (intended or unintended).
>>
>>
>> Sure, I think that helps.
>>
>
Actually, quite interesting observations. We could specify procedures to
deal e.g.
with packets sources from unknown BFR-ids and so on but IMO that would
quickly
overwhelm the security section in an architecture document and ultimately
may talk
about lots of things that will be never of interest. We should acknowledge
the attack
vectors and if necessary, those shall be adressed by a detailed security
draft for BIER
I think ...


>>  ...
>> >
>> >> I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document a=
nd did not see
>> >> text that specifically help or hinder the operational mode I describe=
d
>> >> above.
>> >
>> >
>> > I won't comment on the "use cases" document.
>> >
>> >>
>> >>
>> >> (3) Broadcast Video Operation. (more of a question then a point of
>> note)
>> >>
>> >>
>> >> I did noticed in the use case document (as noted above in point 2),
>> >> that considers more traditional broadcast video networks was
>> >> described.  So my question is, would an operational model which
>> >> required two simultaneous M/C flows from separate sources (normally
>> >> two packagers/encryptors etc) be supported by the BIER architecture a=
s
>> >> described?  My best estimate would be that the operator would use two
>> >> sub-domains that would allow each BFER to potentially get two of each
>> >> packet (which are sourced by two different injection points / BIFRs).
>> >> This mode of operation is common in some places to allow the M/C
>> >> broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router/de=
vice to allow for
>> >> fast switchover in case of network failure (where normal network leve=
l
>> >> detection and re-routing is not sufficient).
>> >
>> >
>> > If a flow enters the BIER domain at two different ingress points, and
>> each
>> > ingress point knows the egress points for that flow, there is nothing =
to
>> > stop both ingress points from using BIER to multicast the flow to the
>> same
>> > set of egress points.  The egress node would have to be able to tell
>> when it
>> > was receiving two copies of the flow, so that it could choose one copy
>> as
>> > the one to forward further.  The BIER encapsulations (not described in
>> the
>> > architecture) do carry the BFIR-id in the BIER header, which makes thi=
s
>> > possible.  If the flow from one ingress node fails, the egress node
>> could
>> > switch to the other flow.  How it determines when to do this is outsid=
e
>> the
>> > scope of BIER, of course.
>> >
>> > If it is desired that the two copies of a given flow travel through th=
e
>> > network along disjoint paths, one would have to set up two different
>> > "routing underlays", each disjoint from the other.  This would require
>> two
>> > sub-domains.  This really becomes a network design issue, but could
>> > certainly be handled by BIER.
>> >
>> > So to answer your question, I believe the architecture handles these
>> cases,
>> > but BIER is only a piece of the solution.
>>
>> Fair.  Again, no action was necessarily required per say.  Just wanted
>> to validate.
>>
>
BIER allows for many protection/replication schemes. We have IGP FRR built
in, we have subdomains
including IGP MT mapping and we have provisions for the future to allow
IGPs e.g. to
compute different trees (or those could be provisioned/signalled by other
mechanisms).
It is kind of implied in the architecture/current signalling and again,
detailed considerations,
if anyone so inclined, may merit a detailed separate document based on
experience in
the deployments

thanks

-- tony

--f403043e51ec32024c0553adab27
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">inline comments as chair helping out the shepherd and edit=
or ... Cut out tons text to abbreviate this (by now) longish text ...=C2=A0=
<br><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Thu, Jul 6=
, 2017 at 11:43 AM, Greg Shepherd <span dir=3D"ltr">&lt;<a href=3D"mailto:g=
jshep@gmail.com" target=3D"_blank">gjshep@gmail.com</a>&gt;</span> wrote:<b=
r><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:=
1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">Inline:<div class=3D"gmai=
l_extra"><br><div class=3D"gmail_quote"><span>On Thu, Jul 6, 2017 at 7:45 A=
M, Eric C Rosen <span dir=3D"ltr">&lt;<a href=3D"mailto:erosen@juniper.net"=
 target=3D"_blank">erosen@juniper.net</a>&gt;</span> wrote:<br><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid=
;padding-left:1ex"><span>On 7/6/2017 9:13 AM, Benoit Claise wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
DISCUSS:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
1. I want to come back to the experimental status.<br>
</blockquote>
<br></span>
The status of the document is a political issue that should not impact the =
content of the document.</blockquote><div><br></div></span><div>I would say=
 process over political. But I agree it should have no bearing on the conte=
nt of the document.</div></div></div></div></blockquote><div><br></div><div=
>Yes, this is a process/track issue and I would not consider an architectur=
e document well-crafted if its text had to argue the document itself onto a=
 track ;-) The work either stands in its quality/adoption to present a stan=
dards track or doesn&#39;t and then such track is meaningless. The bar set =
to adopt this work on IETF standard track by Alia has been arguably very hi=
gh but the current agreement has been struck with the chairs based on her m=
ost excellent argument that we&#39;re touching the &quot;hourglass&quot; an=
d with that more rigorous standards apply ... IMO we are all better off for=
 it longer term.=C2=A0</div><div>=C2=A0</div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><sp=
an><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
I have seen Alia&#39;s reply:<br>
<br>
=C2=A0 =C2=A0 =C2=A0In the BIER Charter, work item 9 describes a document b=
ased on deployment<br>
=C2=A0 =C2=A0 =C2=A0experience that can justify moving the BIER work from E=
xperimental to<br>
=C2=A0 =C2=A0 =C2=A0Standards Track.=C2=A0 When I chartered the WG, it wasn=
&#39;t clear whether it was<br>
=C2=A0 =C2=A0 =C2=A0merely a good idea or a good idea with enough motivatio=
ns towards<br>
=C2=A0 =C2=A0 =C2=A0deployment that it is worth complicating the architectu=
re at the narrow<br>
=C2=A0 =C2=A0 =C2=A0point of the IP hourglass.<br>
<br>
&gt;From the writeup, it seems that the experiment is successful already:<b=
r>
<br>
=C2=A0 =C2=A0 =C2=A0The vendors are being quite tight lipped about current =
implementations.<br>
=C2=A0 =C2=A0 =C2=A0Operator feedback indicates there are at least two impl=
ementations<br>
=C2=A0 =C2=A0 =C2=A0currently, with others in the works. There are currentl=
y five vendors<br>
=C2=A0 =C2=A0 =C2=A0collaborating on the work in the IETF.<br>
<br>
However, I&#39;ve not been following the specifications development and<br>
implementation to provide a definitive answer.<br>
<br>
At the minimum, the document needs to describe what the criteria are for a<=
br>
successful experiment.<br>
=C2=A0 =C2=A0 =C2=A0Implementations (RFC7942?)?<br>
=C2=A0 =C2=A0 =C2=A0two interop implementations?<br>
=C2=A0 =C2=A0 =C2=A0hardware implementation?<br>
=C2=A0 =C2=A0 =C2=A0&quot;deployment experience&quot; (to cite the charter =
text)?<br>
=C2=A0 =C2=A0 =C2=A0impact analysis?<br>
=C2=A0 =C2=A0 =C2=A0something else?<br>
<br>
The ideal BIER document for this explanation is this architecture doc.<br>
</blockquote>
<br></span>
The above is all entirely outside the scope of this document.</blockquote><=
div><br></div></span><div>Agree. This is in the charter. If/when the the ca=
se is made to transition all of the BIER work to the standards track the do=
cuments&#39; contents should not change.</div></div></div></div></blockquot=
e><div><br></div><div>Yes, the standard of adoption into standards track is=
 entirely a charter issue IMO and this can be formulated along e.g. lines s=
uggested by Benoit within the charter.=C2=A0</div><div>=C2=A0</div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_extra"><div cla=
ss=3D"gmail_quote"><span><div>=C2=A0</div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><s=
pan><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
2. operations and management section<br>
I&#39;m sure there are such considerations:<br>
=C2=A0 =C2=A0 =C2=A0- configuration<br>
=C2=A0 =C2=A0 =C2=A0- sub-domain management<br>
=C2=A0 =C2=A0 =C2=A0- BFR-id management<br>
=C2=A0 =C2=A0 =C2=A0- adding new BFIR/BFER device to the domain<br>
=C2=A0 =C2=A0 =C2=A0- logging<br>
=C2=A0 =C2=A0 =C2=A0- troubleshooting<br>
=C2=A0 =C2=A0 =C2=A0- OAM<br>
=C2=A0 =C2=A0 =C2=A0- etc.<br>
</blockquote>
<br></span>
I am unaware of any RFC that requires such a section to be included in a do=
cument like this.=C2=A0 These topics are outside the scope of this document=
.</blockquote><div><br></div></span><div>=C2=A0Agree. There are other docum=
ents in the WG to address some of the above concerns. None of these seem ap=
propriate for an architecture document.</div></div></div></div></blockquote=
><div><br></div><div>I am agnostic whether architecture document shall REFE=
R to e.g. OAM document. However, folding those documents/considerations int=
o a detailed architecture document =C2=A0(like this one is) will make it un=
wieldy and loose the forest for the trees. If anything, this architecture s=
ays too much about things like operational details (since we want to leave =
the mechanism applied @ the discretion of particular implementation, BIER c=
an be IGP signalled, statically configured, controller provisioned and so o=
n without breaking the architecture. Same applies for BFR-id). Unless speci=
fic standards RFC dictates that those considerations must be included in a =
detailed fashion in this architecture document I would also argue that they=
 do not belong here.=C2=A0</div><div>=C2=A0</div><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex"><div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"=
><span><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
There are also two other management documents that should be referenced:<br=
>
chartered item 6 and 7.<br>
</blockquote>
<br></span>
These are outside the scope of the architecture document.</blockquote><div>=
<br></div></span><div>Agree. The mgmt docs must refer to the arch not, but =
I don&#39;t see why the other way around is required.</div></div></div></di=
v></blockquote><div><br></div><div>Like I said, I&#39;m agnostic.=C2=A0</di=
v><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div cla=
ss=3D"gmail_extra"><div class=3D"gmail_quote"><span><blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex"><span>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
What this &quot;operations and management section&quot; should contain is t=
he points that<br>
operators, who will deploy this technology, have to pay attention to. An<br=
>
architecture document is typically the first document people will read. RFC=
<br>
5706 appendix A provide typical questions from an OPS point of view. I<br>
understand that this is an experiment and you might not have all the answer=
s at<br>
this point in time.<br>
</blockquote>
<br></span>
This would be the topic for a different document.</blockquote><div><br></di=
v></span><div>Agree. There is other work in the WG to address this. It woul=
d seem out of scope for an arch doc.</div><div><br></div></div></div></div>=
</blockquote><div><br></div><div>Agree, I see how an RFC5706 structured doc=
ument for BIER could make sense but it&#39;s outside the scope of the archi=
tecture doc. If anything, the architecture document currently says TOO much=
 about it in its scope.=C2=A0</div><div>=C2=A0</div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex"><div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quo=
te"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-lef=
t:1px #ccc solid;padding-left:1ex"><div><div class=3D"m_-817380496620973778=
6h5"><span><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">
<br>
Just one observation. Was thinking, so it&#39;s like an (OSPF) routerId, ex=
cept<br>
that it&#39;s called a prefix. Then I understood, reading further. It&#39;s=
 not called<br>
a routerId because this address/prefix must be routable<br>
<br>
- Was wondering. Is this mechanism only for multicast packets? What about<b=
r>
anycast/unicast?<br>
</blockquote>
<br></span>
You could use BIER to do a unicast, by setting only one bit in the BitStrin=
g.=C2=A0 However, there are other more efficient encapsulations for unicast=
 tunnels.</div></div></blockquote></div></div></div></blockquote><div><br><=
/div><div>In certain scenarios people will in fact use the one-bit-equal-un=
icast and pay =C2=A0the encapsulation price. In others, they will follow un=
icast paths/tunnels. I was told, the problem exists today already with trad=
itional multicast for certain applications. The architecture does NOT prohi=
bit a one-bit-is-unicast (as traditional multicast doesn&#39;t preclude it =
from being used between a single sender-receiver pair) use and that&#39;s a=
ll is required from the architecture.=C2=A0</div><div><br></div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_extra"><div class=
=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class=3D"m_-81738=
04966209737786h5"><div class=3D"m_-8173804966209737786m_-560586297201679967=
2HOEnZb"><div class=3D"m_-8173804966209737786m_-5605862972016799672h5"><br>=
</div></div><br></div></div><span>---------- Forwarded message ----------<b=
r>From:=C2=A0Eric C Rosen &lt;<a href=3D"mailto:erosen@juniper.net" target=
=3D"_blank">erosen@juniper.net</a>&gt;<br>To:=C2=A0Victor Kuarsingh &lt;<a =
href=3D"mailto:victor@jvknet.com" target=3D"_blank">victor@jvknet.com</a>&g=
t;, Warren Kumari &lt;<a href=3D"mailto:warren@kumari.net" target=3D"_blank=
">warren@kumari.net</a>&gt;, Benoit Claise &lt;<a href=3D"mailto:bclaise@ci=
sco.com" target=3D"_blank">bclaise@cisco.com</a>&gt;, <a href=3D"mailto:ops=
-dir@ietf.org" target=3D"_blank">ops-dir@ietf.org</a>, <a href=3D"mailto:dr=
aft-ietf-bier-architecture.all@ietf.org" target=3D"_blank">draft-ietf-bier-=
architecture.a<wbr>ll@ietf.org</a>, <a href=3D"mailto:gjshep@gmail.com" tar=
get=3D"_blank">gjshep@gmail.com</a>, <a href=3D"mailto:prz@juniper.net" tar=
get=3D"_blank">prz@juniper.net</a>, Alia Atlas &lt;<a href=3D"mailto:akatla=
s@gmail.com" target=3D"_blank">akatlas@gmail.com</a>&gt;<br>Cc:=C2=A0<br>Bc=
c:=C2=A0<br>Date:=C2=A0Fri, 30 Jun 2017 11:12:53 -0400<br>Subject:=C2=A0Re:=
 Ops-Dir Review of Draft-ietf-bier-architecture-0<wbr>7<br>Victor, thanks f=
or taking the time to do this review.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
(1). Security Considerations<br>
<br>
<br>
It was not 100% clear to the reviewer (me) if the use case of how the<br>
BIER architecture (or guidance for future implementation) may avoid<br>
certain DoS like activity from illegitimate neighbors (BFR-NBRs).=C2=A0 I<b=
r>
may have missed specific text which addresses the point made herein<br>
(if so, please disregard my first point and please make reference<br>
where it is addressed).=C2=A0 The concern is if a packet is introduced into=
<br>
the system by a host (compromised perhaps) which fabricates packets<br>
(may or may not have valid payload inside the BIER encapsulation) that<br>
attempts to starve resources in the system.=C2=A0 One way of doing this<br>
(which may require control plane access - maybe) would be to<br>
set/create packets which forces additional replication at BFRs (i.e.<br>
set a single=C2=A0 - or all bits -=C2=A0 for all SIs).=C2=A0 This would the=
n create<br>
the maximum amount of replication within the system.=C2=A0 Perhaps this use=
<br>
case is addressed as noted.<br>
</blockquote>
<br></span>
The security considerations do say that every BFR must be provisioned ot kn=
ow which of its interfaces lead to a BIER domain and which do not.=C2=A0 =
=C2=A0I can say a little more explicitly that one shouldn&#39;t accept BIER=
-encapsulated packets from outside the domain. That addresses one sort of t=
hreat.<br>
<br>
The security consideratons do point out that modification of the BIER encap=
sulation through error or malfeasance cause misdelivery. I can add that cer=
tain sorts of modifications, such as setting all the bits in the BitString,=
 are potential vectors for DoS attacks.<br>
<br>
It is probably worth pointing out as well that when the initial BIER encaps=
ulation is imposed, certain errors, such as setting all the bits in the Bit=
String, can result in DoS attacks (intended or unintended).<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I was not able to find specific operations/functions which scrutinized<span=
><br>
incoming packets and/or guard for bad NBRs.=C2=A0 Could this be an issue<br=
>
from the authors standpoint?=C2=A0 In more traditional networks, there are<=
br>
methods operators use to ensure that illegitimate traffic is not<br>
introduced into the system.=C2=A0 I wanted to make sure there was thoughts<=
br>
on how to do this with BIER.<br>
</span></blockquote>
<br>
The only check like this is at the boundaries of a BIER domain, where BIER-=
encapsulated packets are not accepted from interfaces that lead outside the=
 domain.=C2=A0 I&#39;m not sure what else one would do.<span><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
<br>
(2). SPF assumed.<br>
<br>
<br>
I agree most places where the BIER architecture would likely live (say<br>
in Enterprises and SP networks) the network would operate a standard<br>
IGP.=C2=A0 However, in some use cases, like modern DCs, some are designing<=
br>
fabrics which don=E2=80=99t use a traditional IGP.=C2=A0 These networks use=
 all BGP<br>
(eBGP) with full sets of neighbor relationships.=C2=A0 This helps reduce<br=
>
the amount of running protocols within the underlay, but may (or may<br>
not) cause issues with BIER in relation distribution of system<br>
information.=C2=A0 Do the authors consider this use case one that can be<br=
>
address with BIER as it=E2=80=99s currently outlined, or would additional<b=
r>
considerations be needed?<br>
</blockquote>
<br></span>
With regard to the control plane, there is a draft that explains how to use=
 BGP to distribute the same information (labels, BFR-ids, BFR-prefixes) tha=
t is distributed via OSPF or ISIS extensions.=C2=A0 I don&#39;t think anyth=
ing explicit needs to be said in the architecture; the architecture uses IG=
P-based distribution as an example, but I don&#39;t think there is any text=
 there that requires the control plane to be IGP-based.<br>
<br>
In the data plane, the document does focus on the case where the &quot;rout=
ing underlay&quot; is IGP-based (link-state-based), but I think it is clear=
 that all the routing underlay really needs to provide is the mapping from =
BFR-id to BFR-prefix to set of next hops.=C2=A0 Some of the techniques disc=
ussed for tunneling around non-BFR neighbors or for routing around failed n=
eighbors do assume link state routing, but these techniques are optional.<b=
r>
<br>
So to answer your question, I don&#39;t think anything additional needs to =
be added to the architecture to accommodate non-traditional routing underla=
ys.=C2=A0 I&#39;ll do another read-through to make sure it&#39;s clear that=
 OSPF/IS-IS are not portrayed as strict requirements.<span><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D document and did=
 not see<br>
text that specifically help or hinder the operational mode I described<br>
above.<br>
</blockquote>
<br></span><span>...=C2=A0<br>
<br><br>---------- Forwarded message ----------<br>From:=C2=A0Victor Kuarsi=
ngh &lt;<a href=3D"mailto:victor@jvknet.com" target=3D"_blank">victor@jvkne=
t.com</a>&gt;<br>To:=C2=A0Eric C Rosen &lt;<a href=3D"mailto:erosen@juniper=
.net" target=3D"_blank">erosen@juniper.net</a>&gt;<br>Cc:=C2=A0Warren Kumar=
i &lt;<a href=3D"mailto:warren@kumari.net" target=3D"_blank">warren@kumari.=
net</a>&gt;, Benoit Claise &lt;<a href=3D"mailto:bclaise@cisco.com" target=
=3D"_blank">bclaise@cisco.com</a>&gt;, <a href=3D"mailto:ops-dir@ietf.org" =
target=3D"_blank">ops-dir@ietf.org</a>, <a href=3D"mailto:draft-ietf-bier-a=
rchitecture.all@ietf.org" target=3D"_blank">draft-ietf-bier-architecture.a<=
wbr>ll@ietf.org</a>, <a href=3D"mailto:gjshep@gmail.com" target=3D"_blank">=
gjshep@gmail.com</a>, <a href=3D"mailto:prz@juniper.net" target=3D"_blank">=
prz@juniper.net</a>, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com" ta=
rget=3D"_blank">akatlas@gmail.com</a>&gt;<br>Bcc:=C2=A0<br>Date:=C2=A0Fri, =
30 Jun 2017 11:22:16 -0400<br>Subject:=C2=A0Re: Ops-Dir Review of Draft-iet=
f-bier-architecture-0<wbr>7<br>On Fri, Jun 30, 2017 at 11:12 AM, Eric C Ros=
en &lt;<a href=3D"mailto:erosen@juniper.net" target=3D"_blank">erosen@junip=
er.net</a>&gt; wrote:<br>
&gt; Victor, thanks for taking the time to do this review.<br>
&gt;<br>
&gt;&gt; (1). Security Considerations<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; It was not 100% clear to the reviewer (me) if the use case of how =
the<br>
&gt;&gt; BIER architecture (or guidance for future implementation) may avoi=
d<br>
&gt;&gt; certain DoS like activity from illegitimate neighbors (BFR-NBRs).=
=C2=A0 I<br>
&gt;&gt; may have missed specific text which addresses the point made herei=
n<br>
&gt;&gt; (if so, please disregard my first point and please make reference<=
br>
&gt;&gt; where it is addressed).=C2=A0 The concern is if a packet is introd=
uced into<br>
&gt;&gt; the system by a host (compromised perhaps) which fabricates packet=
s<br>
&gt;&gt; (may or may not have valid payload inside the BIER encapsulation) =
that<br>
&gt;&gt; attempts to starve resources in the system.=C2=A0 One way of doing=
 this<br>
&gt;&gt; (which may require control plane access - maybe) would be to<br>
&gt;&gt; set/create packets which forces additional replication at BFRs (i.=
e.<br>
&gt;&gt; set a single=C2=A0 - or all bits -=C2=A0 for all SIs).=C2=A0 This =
would then create<br>
&gt;&gt; the maximum amount of replication within the system.=C2=A0 Perhaps=
 this use<br>
&gt;&gt; case is addressed as noted.<br>
&gt;<br>
&gt;<br></span>
&gt; The security considerations do say that every BFR must be provisioned =
ot<br>
&gt; know which of its interfaces lead to a BIER domain and which do not.=
=C2=A0 =C2=A0I can<br>
&gt; say a little more explicitly that one shouldn&#39;t accept BIER-encaps=
ulated<br>
&gt; packets from outside the domain. That addresses one sort of threat.<br=
>
&gt;<br>
&gt; The security consideratons do point out that modification of the BIER<=
br>
&gt; encapsulation through error or malfeasance cause misdelivery. I can ad=
d that<br>
&gt; certain sorts of modifications, such as setting all the bits in the<br=
>
&gt; BitString, are potential vectors for DoS attacks.<br>
&gt;<br>
&gt; It is probably worth pointing out as well that when the initial BIER<b=
r>
&gt; encapsulation is imposed, certain errors, such as setting all the bits=
 in<br>
&gt; the BitString, can result in DoS attacks (intended or unintended).<br>
<br>
<br>
Sure, I think that helps.<br></blockquote></div></div></div></blockquote><d=
iv><br></div><div>Actually, quite interesting observations. We could specif=
y procedures to deal e.g.=C2=A0</div><div>with packets sources from unknown=
 BFR-ids and so on but IMO that would quickly=C2=A0</div><div>overwhelm the=
 security section in an architecture document and ultimately may talk</div>=
<div>about lots of things that will be never of interest. We should acknowl=
edge the attack</div><div>vectors and if necessary, those shall be adressed=
 by a detailed security draft for BIER=C2=A0</div><div>I think ...=C2=A0</d=
iv><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div clas=
s=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><span>=C2=A0<br>
=C2=A0...=C2=A0<br>
&gt;<br>
&gt;&gt; I reviewed the =E2=80=9Cdraft-ietf-bier-use-cases=E2=80=9D documen=
t and did not see<br>
&gt;&gt; text that specifically help or hinder the operational mode I descr=
ibed<br>
&gt;&gt; above.<br>
&gt;<br>
&gt;<br></span>
&gt; I won&#39;t comment on the &quot;use cases&quot; document.<span><br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; (3) Broadcast Video Operation. (more of a question then a point of=
 note)<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I did noticed in the use case document (as noted above in point 2)=
,<br>
&gt;&gt; that considers more traditional broadcast video networks was<br>
&gt;&gt; described.=C2=A0 So my question is, would an operational model whi=
ch<br>
&gt;&gt; required two simultaneous M/C flows from separate sources (normall=
y<br>
&gt;&gt; two packagers/encryptors etc) be supported by the BIER architectur=
e as<br>
&gt;&gt; described?=C2=A0 My best estimate would be that the operator would=
 use two<br>
&gt;&gt; sub-domains that would allow each BFER to potentially get two of e=
ach<br>
&gt;&gt; packet (which are sourced by two different injection points / BIFR=
s).<br>
&gt;&gt; This mode of operation is common in some places to allow the M/C<b=
r>
&gt;&gt; broadcast feed to be =E2=80=9Cpinned=E2=80=9D to the egress router=
/device to allow for<br>
&gt;&gt; fast switchover in case of network failure (where normal network l=
evel<br>
&gt;&gt; detection and re-routing is not sufficient).<br>
&gt;<br>
&gt;<br></span>
&gt; If a flow enters the BIER domain at two different ingress points, and =
each<br>
&gt; ingress point knows the egress points for that flow, there is nothing =
to<br>
&gt; stop both ingress points from using BIER to multicast the flow to the =
same<br>
&gt; set of egress points.=C2=A0 The egress node would have to be able to t=
ell when it<br>
&gt; was receiving two copies of the flow, so that it could choose one copy=
 as<br>
&gt; the one to forward further.=C2=A0 The BIER encapsulations (not describ=
ed in the<br>
&gt; architecture) do carry the BFIR-id in the BIER header, which makes thi=
s<br>
&gt; possible.=C2=A0 If the flow from one ingress node fails, the egress no=
de could<br>
&gt; switch to the other flow.=C2=A0 How it determines when to do this is o=
utside the<br>
&gt; scope of BIER, of course.<br>
&gt;<br>
&gt; If it is desired that the two copies of a given flow travel through th=
e<br>
&gt; network along disjoint paths, one would have to set up two different<b=
r>
&gt; &quot;routing underlays&quot;, each disjoint from the other.=C2=A0 Thi=
s would require two<br>
&gt; sub-domains.=C2=A0 This really becomes a network design issue, but cou=
ld<br>
&gt; certainly be handled by BIER.<br>
&gt;<br>
&gt; So to answer your question, I believe the architecture handles these c=
ases,<br>
&gt; but BIER is only a piece of the solution.<br>
<br>
Fair.=C2=A0 Again, no action was necessarily required per say.=C2=A0 Just w=
anted<br>
to validate.<br></blockquote></div></div></div></blockquote><div><br></div>=
<div>BIER allows for many protection/replication schemes. We have IGP FRR b=
uilt in, we have subdomains</div><div>including IGP MT mapping and we have =
provisions for the future to allow IGPs e.g. to=C2=A0</div><div>compute dif=
ferent trees (or those could be provisioned/signalled by other mechanisms).=
=C2=A0</div><div>It is kind of implied in the architecture/current signalli=
ng and again, detailed considerations,=C2=A0</div><div>if anyone so incline=
d, may merit a detailed separate document based on experience in</div><div>=
the deployments=C2=A0</div><div><br></div><div>thanks=C2=A0</div><div><br><=
/div><div>-- tony=C2=A0</div></div>
</div></div>

--f403043e51ec32024c0553adab27--


From nobody Sun Jul  9 20:37:21 2017
Return-Path: <andrew.dolganow@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99493131472; Sun,  9 Jul 2017 20:37:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.911
X-Spam-Level: 
X-Spam-Status: No, score=-2.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2LRQwXgSXdms; Sun,  9 Jul 2017 20:37:11 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0104.outbound.protection.outlook.com [104.47.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 951F6126CB6; Sun,  9 Jul 2017 20:37:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=2bhqPb/HoxTFoWqvWZ2/hBZTjwqPnPW/AH/cL0JnwRw=; b=GDB05qHoTQAb1VT2FZIvnkS/alxtQm/nub4b/BxAx/rwPS2bsPrMz3nYkssjIrxS2pQsigW/zH+tvNm65aYI/YIeasdGumj3+IuDK9+uy/JSTaCq3rkyI/VHv77OFroZRrGirW9zgPNDV+li3wUSP1Qf6Bx9caVIarJdjSIihpU=
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com (10.167.190.10) by HE1PR0701MB2938.eurprd07.prod.outlook.com (10.168.93.9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.4; Mon, 10 Jul 2017 03:37:07 +0000
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::b4a1:c260:ea57:1ce1]) by HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::b4a1:c260:ea57:1ce1%13]) with mapi id 15.01.1261.012; Mon, 10 Jul 2017 03:37:07 +0000
From: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>
To: Alia Atlas <akatlas@gmail.com>, Alissa Cooper <alissa@cooperw.in>
CC: The IESG <iesg@ietf.org>, "draft-ietf-bier-architecture@ietf.org" <draft-ietf-bier-architecture@ietf.org>, Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, "bier-chairs@ietf.org" <bier-chairs@ietf.org>
Thread-Topic: Alissa Cooper's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
Thread-Index: AQHS9bNhq7+pOQuuj0itRf6onX5h5KJFfh2AgAd4MwA=
Date: Mon, 10 Jul 2017 03:37:07 +0000
Message-ID: <C965C838-7A73-4FFC-949B-8C8C9127C2DA@nokia.com>
References: <149927538373.13537.9199064503158854739.idtracker@ietfa.amsl.com> <CAG4d1re4gRbJrLVZ_vP81pjWJa3MMkKtzymohzr-HG5BuQ7huQ@mail.gmail.com>
In-Reply-To: <CAG4d1re4gRbJrLVZ_vP81pjWJa3MMkKtzymohzr-HG5BuQ7huQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.21.0.170409
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [135.245.121.27]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0701MB2938; 7:SbkF9FXG/UE96nCTc+4EczgpCFaFla3kNANkJH/YFgr+Z3fAW8Nvn9jiI+nOo9AR8FRXXPF8BKkepPOH9dbAp2GiSTV3N9ZDEtUaqB+B925FLE5+PX6RnR/OKF+09QWYx+uduR/RGC+inx6y4oOujgzp/OTu8dcDs8RtfCDZcahvj0qMQOnpEMrmNCbcNDYqGUkLtFRw8vt0uZBrnzOn5xUzHXh/W5ScrwW92A0c5ZXPGjr5sIYiiEsFCrjDOFHSBh5KKQsuDWmdPsvfqRZi/uVd+cFlUl91bT4/qe1CIP+y9t+MuNvrQAEmMTvXJmIVzhAVGvjfYpc3VDYH8ghr+Oeg6n7aJ4Wb9lvf0KhMzeLkAeFaN0pBc1Ii00VTy3jjwqWOSpfpG+PwE3ZFbpCqeqJxf/MWaJwqFcWKta2V+xyaXtHZdz23ZxeB08gyKKETHwpe0OUIUVDoyi4CN42hwyuKk7MeqIwKeVuPTaFszygxEUBRPCxbIAi3NWH4cD/KERmILKXCICS86HPBxIVQ+7bfWO+ad3SRKp8PVyAGlKzXdIUcs8yVIsWVAgP2uFZatAse5PbTMjySoGLwE8VwM2uU1FcMwkjSrP76oGZYQjwkKbJgRjMqtZWLaBgNtm/vE9sLA2bAcOitbsNzdUBauntF7ZkX8HXuHYZYrup0cNxoOfVXYrfqOp7lmobQNBA5kwb6PcJDnmwOhzNqu0xcRPN9m67pw6whYj/F51uB83rf8a4zx9TeQwrgkH/Yf/opcObLizrOUTREuPQGedbGsZ0Pc45cgnDegQM9j0o1zhU=
x-ms-office365-filtering-correlation-id: dedbf7ec-b487-4e6c-5d85-08d4c744f0a8
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:HE1PR0701MB2938; 
x-ms-traffictypediagnostic: HE1PR0701MB2938:
x-microsoft-antispam-prvs: <HE1PR0701MB293829E08E31F284643C65C4E5A90@HE1PR0701MB2938.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(151999592597050)(278178393323532)(133145235818549)(120809045254105)(26388249023172)(236129657087228)(138986009662008)(82608151540597)(95692535739014)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(2017060910075)(8121501046)(100000703101)(100105400095)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123558100)(20161123564025)(20161123560025)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:HE1PR0701MB2938; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:HE1PR0701MB2938; 
x-forefront-prvs: 03648EFF89
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39840400002)(39860400002)(39850400002)(39400400002)(39450400003)(39410400002)(24454002)(377454003)(6506006)(36756003)(5660300001)(53546010)(230783001)(5250100002)(6486002)(2950100002)(14454004)(83716003)(82746002)(83506001)(33656002)(229853002)(86362001)(66066001)(2906002)(606006)(8936002)(38730400002)(39060400002)(3280700002)(25786009)(7736002)(3660700001)(4001350100001)(8676002)(966005)(81166006)(2900100001)(99286003)(54906002)(189998001)(236005)(54896002)(478600001)(6512007)(6306002)(6436002)(105586002)(102836003)(3846002)(76176999)(6116002)(54356999)(4326008)(53936002)(50986999)(6246003); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR0701MB2938; H:HE1PR0701MB2058.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_C965C8387A734FFC949B8C8C9127C2DAnokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jul 2017 03:37:07.3476 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2938
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/TgJ4ALOS_KfjkWqPbxvG-_jC7lY>
Subject: Re: [Bier] Alissa Cooper's No Objection on draft-ietf-bier-architecture-07: (with COMMENT)
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jul 2017 03:37:14 -0000

--_000_C965C8387A734FFC949B8C8C9127C2DAnokiacom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

V2UgaGF2ZSBkaXNjdXNzZWQgdGhpcyBhdCB0aGUgbGFzdCBXRyBtZWV0aW5nLiBJIHdhcyBvbmUg
d2hvIHJhaXNlZCBhIGNvbmNlcm4gYWJvdXQgRXhwZXJpbWVudGFsIHZzIFN0YW5kYXJkcyBtb3Zl
LiBNeSBjb25jZXJuIGlzIHN0aWxsIHZhbGlkIGJ1dCBpdCBkb2VzIG5vdCByZWFsbHkgYXBwbHkg
dG8gQklFUiBXRyAoYWx0aG91Z2ggSSBtYXkgYmUgYmlhc2Vk4pi6KS4NCg0KQXMgSUVURiwgd2Ug
bGFjayBhIGNsZWFyIGRlZmluaXRpb24gb2Ygd2hhdCDigJxzdGFuZGFyZOKAnSBtdXN0IGJlIG1l
dCB3aGVuIG1vdmluZyB0aGluZ3MgZnJvbSBvbmUgdHJhY2sgdG8gYW5vdGhlci4gQXMgcmVzdWx0
LCB3b3JraW5nIGdyb3VwcyBjYW4gb25lIGJ5IG9uZSBjaGlwIGF3YXkgZnJvbSB3aGF0IHRoZSBy
dWxlcyBzaG91bGQgYmUgbWV0IGFuZCBjcmVhdGUgbW9yZSBhbmQgbW9yZSByZWxheGVkIGNyaXRl
cmlhLiBXZSBuZWVkIHRvIHN0cmlrZSBhIHByb3BlciBiYWxhbmNlIGhlcmUgSSBiZWxpZXZlLiBU
aGUgdHdvIGNvbW1vbiDigJxjcml0ZXJpYeKAnSBkaXNjdXNzZWQgYXJlOg0KDQoNCi0gICAgICAg
ICAgV2Ugd2FudCBtdWx0aXBsZSBpbXBsZW1lbnRhdGlvbnMgdGhhdCBpbnRlcm9wIOKAkyBidXQg
aW1wbGVtZW50YXRpb25zIGFyZSBub3QgZXF1YWwsIEkgd291bGQgYXJndWUgd2Ugd2FudCBjb21t
ZXJjaWFsIGltcGxlbWVudGF0aW9ucy4gSSB3b3VsZCBhbHNvIHNheSB3ZSB3YW50IGEgY2xlYXIg
bnVtYmVyIG9mIGltcGxlbWVudGF0aW9ucyByZXF1aXJlZCAtIHRoYXQgYWxsb3dzIGVub3VnaCB0
byBkcml2ZSBpbnRlcm9wLCBhbGxvdyBzbWFsbCB2ZW5kb3IgaW5ub3ZhdGlvbi9kaXNydXB0aW9u
IG9yIGNyaXRpY2FsIG1hc3MgZnJvbSBsYXJnZSB2ZW5kb3JzDQoNCi0gICAgICAgICAgV2Ugd2Fu
dCBkZXBsb3ltZW50cyDigJMgYWdhaW4gdGhpcyBpcyB0cmlja3ksIEkgZG8gbm90IHRoaW5rIHdl
IG5lZWQgdG8gd2FpdCBmb3IgbWFzcyBkZXBsb3ltZW50cywgYnV0IHdlIGF0IGxlYXN0IG5lZWQg
ZmV3IGxhYiBldmFsdWF0aW9ucyB3aXRoIHNlcmlvdXMgaW50ZW5kIHRvIGRlcGxveSwgYWdhaW4g
d2UgbWF5IHB1dCBzb21lIG51bWJlciBob3cgbWFueSBhcmUgbmVlZGVkIGFuZCBhZ2FpbiBhbGxv
dyBib3RoIHNtYWxsIG9wZXJhdG9ycyBvciBsYXJnZSBvcGVyYXRvciB0byBjcmVhdGUgYSDigJxi
YXLigJ0gdGhhdCBpcyBmYWlyIGFuZCBiYWxhbmNlZA0KDQpJIHRoaW5rLCB0aGF0IEJJRVIgaXMg
YXQgYSBwb2ludCB3aGVuIGJvdGggaW5kdXN0cnkgKHZlbmRvcnMpIGFuZCBvcGVyYXRvcnMgd291
bGQgbWVldCBldmVuIHN0cmljdCBydWxlcyBvZiB0aGUgbW92ZSB0byBzdGFuZGFyZHMgYnV0IHdl
IChhIFdHKSBzaG91bGQgbm90IGJlIGd1ZXNzaW5nIHdoYXQgcnVsZXMgd2UgbmVlZCB0byBtZWV0
IGFuZCBpdCBzZWVtZWQgdG8gbWUgYXQgdGhlIGxhc3QgLCBtZWV0aW5nIHdlIHdlcmUuDQoNCkFu
ZHJldw0KDQoNCkZyb206IEFsaWEgQXRsYXMgPGFrYXRsYXNAZ21haWwuY29tPg0KRGF0ZTogVGh1
cnNkYXksIEp1bHkgNiwgMjAxNyBhdCAxOjMzIEFNDQpUbzogQWxpc3NhIENvb3BlciA8YWxpc3Nh
QGNvb3BlcncuaW4+DQpDYzogVGhlIElFU0cgPGllc2dAaWV0Zi5vcmc+LCAiZHJhZnQtaWV0Zi1i
aWVyLWFyY2hpdGVjdHVyZUBpZXRmLm9yZyIgPGRyYWZ0LWlldGYtYmllci1hcmNoaXRlY3R1cmVA
aWV0Zi5vcmc+LCBHcmVnIFNoZXBoZXJkIDxnanNoZXBAZ21haWwuY29tPiwgImJpZXJAaWV0Zi5v
cmciIDxiaWVyQGlldGYub3JnPiwgImJpZXItY2hhaXJzQGlldGYub3JnIiA8Ymllci1jaGFpcnNA
aWV0Zi5vcmc+DQpTdWJqZWN0OiBSZTogQWxpc3NhIENvb3BlcidzIE5vIE9iamVjdGlvbiBvbiBk
cmFmdC1pZXRmLWJpZXItYXJjaGl0ZWN0dXJlLTA3OiAod2l0aCBDT01NRU5UKQ0KUmVzZW50LUZy
b206IDxhbGlhcy1ib3VuY2VzQGlldGYub3JnPg0KUmVzZW50LVRvOiAiKEljZSkgSUpzYnJhbmQg
V2lqbmFuZHMiIDxpY2VAY2lzY28uY29tPiwgRXJpYyBSb3NlbiA8ZXJvc2VuQGp1bmlwZXIubmV0
PiwgQW5kcmV3IERvbGdhbm93IDxhbmRyZXcuZG9sZ2Fub3dAbm9raWEuY29tPiwgPHByekBqdW5p
cGVyLm5ldD4sIDxhbGRyaW4uaWV0ZkBnbWFpbC5jb20+DQpSZXNlbnQtRGF0ZTogVGh1cnNkYXks
IEp1bHkgNiwgMjAxNyBhdCAxOjMzIEFNDQoNClRoZSBlbnRpcmUgV0cgaXMgY2hhcnRlcmVkIGFz
IEV4cGVyaW1lbnRhbC4gIFRoZXJlIGlzIGEgZG9jdW1lbnQgaW4gdGhlIGNoYXJ0ZXIgKGl0ZW0g
OSkgdG8ganVzdGlmeSBwcm9ncmVzc2luZyB0aGlzIHdvcmsgb250byB0aGUgU3RhbmRhcmRzIFRy
YWNrLiAgVGhlIHByb3RvY29sIGV4dGVuc2lvbiBkcmFmdHMgYXJlIGdvaW5nIHRvIGJlIEV4cGVy
aW1lbnRhbCBmb3Igbm93IGFzIHdlbGwuIFRoaXMgaXMgcHJlY2lzZWx5IGF0IHRoZSBuYXJyb3cg
cG9pbnQgb2YgdGhlIGhvdXJnbGFzcyAtIGEgbXVsdGljYXN0IGVuY2Fwc3VsYXRpb24gdG8gZ28g
d2l0aCBJUC4NCg0KUmVnYXJkcywNCkFsaWENCg0KT24gV2VkLCBKdWwgNSwgMjAxNyBhdCAxOjIz
IFBNLCBBbGlzc2EgQ29vcGVyIDxhbGlzc2FAY29vcGVydy5pbjxtYWlsdG86YWxpc3NhQGNvb3Bl
cncuaW4+PiB3cm90ZToNCkFsaXNzYSBDb29wZXIgaGFzIGVudGVyZWQgdGhlIGZvbGxvd2luZyBi
YWxsb3QgcG9zaXRpb24gZm9yDQpkcmFmdC1pZXRmLWJpZXItYXJjaGl0ZWN0dXJlLTA3OiBObyBP
YmplY3Rpb24NCg0KV2hlbiByZXNwb25kaW5nLCBwbGVhc2Uga2VlcCB0aGUgc3ViamVjdCBsaW5l
IGludGFjdCBhbmQgcmVwbHkgdG8gYWxsDQplbWFpbCBhZGRyZXNzZXMgaW5jbHVkZWQgaW4gdGhl
IFRvIGFuZCBDQyBsaW5lcy4gKEZlZWwgZnJlZSB0byBjdXQgdGhpcw0KaW50cm9kdWN0b3J5IHBh
cmFncmFwaCwgaG93ZXZlci4pDQoNCg0KUGxlYXNlIHJlZmVyIHRvIGh0dHBzOi8vd3d3LmlldGYu
b3JnL2llc2cvc3RhdGVtZW50L2Rpc2N1c3MtY3JpdGVyaWEuaHRtbA0KZm9yIG1vcmUgaW5mb3Jt
YXRpb24gYWJvdXQgSUVTRyBESVNDVVNTIGFuZCBDT01NRU5UIHBvc2l0aW9ucy4NCg0KDQpUaGUg
ZG9jdW1lbnQsIGFsb25nIHdpdGggb3RoZXIgYmFsbG90IHBvc2l0aW9ucywgY2FuIGJlIGZvdW5k
IGhlcmU6DQpodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWJpZXIt
YXJjaGl0ZWN0dXJlLw0KDQoNCg0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KQ09NTUVOVDoNCi0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0NCg0KSSdtIGEgYml0IGNvbmZ1c2VkIGFib3V0IHRoZSBleHBlcmltZW50YWwgc3RhdHVzIG9m
IHRoaXMgZG9jdW1lbnQgYXMgd2VsbCwNCmdpdmVuIHRoYXQgdGhlIG90aGVyIFdHIGRyYWZ0cyB0
aGF0IGRlZmluZSBwcm90b2NvbCBleHRlbnNpb25zIHRvIHN1cHBvcnQgQklFUg0Kc2VlbSB0byBi
ZSBoZWFkZWQgZm9yIHRoZSBzdGFuZGFyZHMgdHJhY2suIElmIHdoYXQgaXMgZG9jdW1lbnRlZCBo
ZXJlIHJlYWxseSBpcw0KdGhlIG9ubHkgZXhwZXJpbWVudGFsIHBhcnQsIHRoaXMgc2VlbXMgbGlr
ZSB0aGUgcGxhY2UgdG8gZG9jdW1lbnQgdGhlDQpleHBlcmltZW50Lg0KDQoNCg==

--_000_C965C8387A734FFC949B8C8C9127C2DAnokiacom_
Content-Type: text/html; charset="utf-8"
Content-ID: <97D1E890D437374AA9A9930B7953FAB3@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_C965C8387A734FFC949B8C8C9127C2DAnokiacom_--


From nobody Wed Jul 12 07:59:17 2017
Return-Path: <gjshep@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 267E512F29A for <bier@ietfa.amsl.com>; Wed, 12 Jul 2017 07:59:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jp4X2EeIWtcj for <bier@ietfa.amsl.com>; Wed, 12 Jul 2017 07:59:14 -0700 (PDT)
Received: from mail-qt0-x229.google.com (mail-qt0-x229.google.com [IPv6:2607:f8b0:400d:c0d::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7F53129B2E for <bier@ietf.org>; Wed, 12 Jul 2017 07:59:13 -0700 (PDT)
Received: by mail-qt0-x229.google.com with SMTP id 32so14577737qtv.1 for <bier@ietf.org>; Wed, 12 Jul 2017 07:59:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:reply-to:from:date:message-id:subject:to; bh=XNL7JbYfxRVhCnfS7EcOw4P1ULlFGN+BJ3/vchOmR9w=; b=d/dnt1KFbWVfe3xFMEK+6u+yliHy+WWJJmQSaQe9awPq/nOCx3G0dyFrc9o91D0pYc nUT1niE1PQ5AeALJwMY+/MDz+YsxN2WRH0NsTKhtQ6w0hmbnZJK58ZOWBkpHp2WCcDXV jFZ+raFikRvUVvLd77VMN4PHjW2L70tPxhy9KGggrqtEPVgediyxNWfC9xUtegzZi5lQ qM0CqzwUsX3Irtr80X9MKfNxxCWGwjYMC/ypM5vGZM0eU1VyBBCHg5cMsQEej973BJQo O5lhcsylU4pRiKj1jMP951gOFqCmiodXF8w/W8SNpb2CY1s8wQ24utjNkGckwjS7BcLj lJtQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:from:date:message-id :subject:to; bh=XNL7JbYfxRVhCnfS7EcOw4P1ULlFGN+BJ3/vchOmR9w=; b=ecBk2JhtUz1I5yHmRg60Br1eOW0Em2a8INhtp7bozW6nsVdLYw22wkEuMCXt9Eiv4W Ig8aSollGKai+FEJScglNuzWtB7VDl0dO9WX7i0iLpQoJ9Gfn+gtHm5876CjR2OjilVD Gzm/OJXuYx6AqZwbyQeqkdmx2nisSqM6p4C/Vp0CDf/oD2EnP74Uq+9yB17pKbOvt/XS LAEnA/hNPe+/DpxS856cI96zdGLa7AvLp5yAVRFElHvM27DnSZupnUV7Fgo8DA8/37Je +JEoE/NbI2gmQK6e2OwZWPWGyUxMeEeJhkV+dul1anKtT+tl95G5theasiR9Sg8eeMCF U3eQ==
X-Gm-Message-State: AIVw111WJRPK1vpIohgFZLqFqszJJjuV1sc6OlRuh99ueerN4lPTmMzc OaGRfymW/FvNLsXELUCFgx3xMlVxrSFW
X-Received: by 10.237.50.103 with SMTP id y94mr6594087qtd.116.1499871552809; Wed, 12 Jul 2017 07:59:12 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.54.101 with HTTP; Wed, 12 Jul 2017 07:59:12 -0700 (PDT)
Reply-To: gjshep@gmail.com
From: Greg Shepherd <gjshep@gmail.com>
Date: Wed, 12 Jul 2017 07:59:12 -0700
Message-ID: <CABFReBodnOwC=qK5wm7+jU6-6i1vKECh_Agkez_kfpo2W1OwjQ@mail.gmail.com>
To: "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c08e87c1d31620554200f0a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/6MGd935P-nZndG5H5wqAbcMoTvw>
Subject: [Bier] Prague Agenda
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jul 2017 14:59:15 -0000

--94eb2c08e87c1d31620554200f0a
Content-Type: text/plain; charset="UTF-8"

This is the current list of presentation request received so far. I'm
missing a presenter name for PIMoBIER. Please send any additional request
soon so I can publish the complete agenda.

draft-hfa-bier-pim-tunneling                      10 min      Hooman Bidgoli

draft-zhang-bier-babel-extensions-01      15 min      Sandy Zhang

draft-zhangwu-bier-nvo3-analysis-00

BIER-TE/BIER-TE-FRR                            10 min     Toerless Eckert

PIMoBIER                                                  10 min

draft-zzhang-bier-evpn-00                          15 min    Jeffrey Zhang


Thanks,

Greg (Chairs)

--94eb2c08e87c1d31620554200f0a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">This is the current list of presentation request received =
so far. I&#39;m missing a presenter name for PIMoBIER. Please send any addi=
tional request soon so I can publish the complete agenda.<div><br></div><di=
v><p style=3D"margin:0px;font-size:12px;line-height:normal;font-family:Helv=
etica">draft-hfa-bier-pim-tunneling=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 10 min=C2=A0 =C2=A0 =C2=A0 Hooman Bi=
dgoli</p>
<p style=3D"margin:0px;font-size:12px;line-height:normal;font-family:Helvet=
ica">draft-zhang-bier-babel-extensions-01=C2=A0 =C2=A0 =C2=A0 15 min=C2=A0 =
=C2=A0 =C2=A0 Sandy Zhang</p>
<p style=3D"margin:0px;font-size:12px;line-height:normal;font-family:Helvet=
ica">draft-zhangwu-bier-nvo3-analysis-00</p>
<p style=3D"margin:0px;font-size:12px;line-height:normal;font-family:Helvet=
ica;min-height:14px">BIER-TE/BIER-TE-FRR=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 10 min =C2=
=A0 =C2=A0 Toerless Eckert<br></p>
<p style=3D"margin:0px;font-size:12px;line-height:normal;font-family:Helvet=
ica">PIMoBIER=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 10 min</p>
<p style=3D"margin:0px;font-size:12px;line-height:normal;font-family:Helvet=
ica">draft-zzhang-bier-evpn-00=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 15 min=C2=A0 =C2=A0 Jeffrey Z=
hang</p><p style=3D"margin:0px;font-size:12px;line-height:normal;font-famil=
y:Helvetica"><br></p><p style=3D"margin:0px;font-size:12px;line-height:norm=
al;font-family:Helvetica">Thanks,</p><p style=3D"margin:0px;font-size:12px;=
line-height:normal;font-family:Helvetica">Greg (Chairs)</p></div></div>

--94eb2c08e87c1d31620554200f0a--


From nobody Sat Jul 15 18:01:02 2017
Return-Path: <gjshep@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9F4D12F092 for <bier@ietfa.amsl.com>; Sat, 15 Jul 2017 18:01:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B2hguiiiu9mz for <bier@ietfa.amsl.com>; Sat, 15 Jul 2017 18:00:59 -0700 (PDT)
Received: from mail-qk0-x229.google.com (mail-qk0-x229.google.com [IPv6:2607:f8b0:400d:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F94A12EAF9 for <bier@ietf.org>; Sat, 15 Jul 2017 18:00:59 -0700 (PDT)
Received: by mail-qk0-x229.google.com with SMTP id v17so93664753qka.3 for <bier@ietf.org>; Sat, 15 Jul 2017 18:00:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:reply-to:from:date:message-id:subject:to; bh=LmWN+8DYFu2IzedG8UtzhQwr1seYrN8xzMaxe83QJxo=; b=lTrtyfma2XVN2JgpNfjsGrLh3GdN+wSR0Tg1glK4+T9BsoHZ/B1EiAd5Xs06iJSUA7 l4/eZeZneiTQrcPo13W+mahH2+9cbZ79BmSQ3q8aKgxbLtuBy5RaV0BcS7EXmF0N/nHP P3mXUiDt/pV2VGJ/iCo6XTYuN4sbnIDrJApegsewgmNZi+q5Z34hnf5a60woFoBLyyUG YhOBq+WXabvHk8f/TLFQ7JEdK/abLSNV6KshGmO7uDgrjbJ4raM8IEEvk5g0woS0j6yZ 6GrPdrJCFkwYJZi9VOQDpt5Z0labp9RLz8G/H6tHle0LHgUz2oh3je3ROHssBbMkh3u1 youw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:from:date:message-id :subject:to; bh=LmWN+8DYFu2IzedG8UtzhQwr1seYrN8xzMaxe83QJxo=; b=R4V/UDEanpmStdAYPtOjY8kP6RUDtjDOdVstMP2oxEY5BoJvwVMltMxS2IpL8KMx2J QoNIBqXMieHDgP4EosGC8ZUUViZ3oB/w5jVz7VXTehheUT8o13LCyA5aLv1z6Qn9RSCj 7lhxSgOVxCIgC0QYLkOYG22YuEPlhRYFNs1dRuDVYLaC3EnpDcVmOJpzP6hDlTdM929x RLUU0ERAFvwU+Q42Bi3CIxAyMzO632Jgzj+GZqwW30ic1pK31nMAejhQYKXyi4vd0IR1 CuFnLzBe+qVpklx8yCOaBfq/oQZSSClQkjlKvIoIwlui5UT3O0ZG7OeAjg3CgCWCtqLG BhAw==
X-Gm-Message-State: AIVw110EuVY0qE6K+MU1w+5apWjAzqWizsw1BuOyavMZUBCtWV5HHlE8 bTqJqICLcTBxZT8ZKR7e0VdR6O4J7oES
X-Received: by 10.233.237.211 with SMTP id c202mr18112820qkg.1.1500166858646;  Sat, 15 Jul 2017 18:00:58 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.54.101 with HTTP; Sat, 15 Jul 2017 18:00:58 -0700 (PDT)
Reply-To: gjshep@gmail.com
From: Greg Shepherd <gjshep@gmail.com>
Date: Sat, 15 Jul 2017 18:00:58 -0700
Message-ID: <CABFReBq6kmJDQyrQdW1+9=g_HbCLrh85m+uPf5RhdLe=ZMGFag@mail.gmail.com>
To: "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="001a1148ad7cb6baca055464d0b8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/kqvRAxvpCmEbgWSCPJ7a_wkm7vw>
Subject: [Bier] Prague Agenda
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jul 2017 01:01:01 -0000

--001a1148ad7cb6baca055464d0b8
Content-Type: text/plain; charset="UTF-8"

The agenda is published. Please take a look and let me know if anything is
missing. We only got an hour slot this time, so I had to cut times down to
get it all in, sorry.

https://datatracker.ietf.org/meeting/99/agenda/bier

Please send slides ASAP. I will not take slides on a memstick at the
meeting. Some have already sent them, thanks! The rest of you, you know who
you are.. ;-)

See you all in Prague.

Cheers,
Greg
(Chairs)

--001a1148ad7cb6baca055464d0b8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">The agenda is published. Please take a look and let me kno=
w if anything is missing. We only got an hour slot this time, so I had to c=
ut times down to get it all in, sorry.<div><br></div><div><a href=3D"https:=
//datatracker.ietf.org/meeting/99/agenda/bier">https://datatracker.ietf.org=
/meeting/99/agenda/bier</a><br></div><div><br></div><div>Please send slides=
 ASAP. I will not take slides on a memstick at the meeting. Some have alrea=
dy sent them, thanks! The rest of you, you know who you are.. ;-)<div><br><=
/div><div>See you all in Prague.</div><div><br></div><div>Cheers,</div><div=
>Greg</div><div>(Chairs)=C2=A0</div></div></div>

--001a1148ad7cb6baca055464d0b8--


From nobody Mon Jul 17 00:41:36 2017
Return-Path: <gregimirsky@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61BE8131A6E for <bier@ietfa.amsl.com>; Mon, 17 Jul 2017 00:41:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LjZQKZowiWOq for <bier@ietfa.amsl.com>; Mon, 17 Jul 2017 00:41:32 -0700 (PDT)
Received: from mail-qt0-x229.google.com (mail-qt0-x229.google.com [IPv6:2607:f8b0:400d:c0d::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9B03131945 for <bier@ietf.org>; Mon, 17 Jul 2017 00:41:32 -0700 (PDT)
Received: by mail-qt0-x229.google.com with SMTP id n42so2888282qtn.0 for <bier@ietf.org>; Mon, 17 Jul 2017 00:41:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ad32no3lLLeSKBXEQO+3LE4DYf4GYtpRw+WESJQbX7g=; b=IGUn7HIb/Udz7J2P5IDt+2AzIDZsOvmU4POOaHuyGXvOtRZGS9Nvt/MzBxAS5YdsGl IYlCe6+miDucIkaeX4loTzhPVXjNB/jH9T0830PFeLLRNdNNccAb0o9PbfLl8vUi1h6M 1TvDq2/ARgiPcrdjMx2rQx3+66Ia2Fa0lVkcSfoOe/Wglvdxz+LGH5iVN4OjYMmk5hoW EwvbkZJHB2ruQDmjINb/lJFs+AfJ4O7/a21qLNTcqoIMI9S08JOvNrNCuugZ0PLHaVFO LXWLCSvLUFncYPrs1O9s1+rUXZNgYsfpyzEUU7R3cU3yQ1SchF3jWrlzOxNw3s9tOAaw IcUw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ad32no3lLLeSKBXEQO+3LE4DYf4GYtpRw+WESJQbX7g=; b=REM4vuXmdEmWxMGbG9ND+IcAYTeK29rftVEXfBovt8SO201tJTyI+ah/yiLFfVU+87 GG6qdTNQFE2uMDNEBQe2SLl3eh2PZRRR30eug0WT8jF/dnetiVd/0UkWNcOgdWCFkcIh wtM9tYIYOoL6vBg7tZnXNusRWtcDr6xPlyycjBr2bN+1b7jBhXROxZ65F45PafBLeFyD Qai1oyIYqhe9evawbEhjchodKRF+CFfGZP53EmP2Hb/zulviwsf7I6e5gYhe8d7mVE3g i96iJLsgKqveAq6dWEml+vcawlCpbjgNFbEFXHCYpCR6inW6JL2xlNUX9sh6sqDBJ1x8 ckAQ==
X-Gm-Message-State: AIVw111A3a6ALs/NXyD9Rjm5pwW0tR8JDRieEqIunq9FlTQNZbUQgU5y KjzGU5yex5hP3rXv5DCqioCkhtGBHg==
X-Received: by 10.237.45.67 with SMTP id h61mr24983045qtd.246.1500277291620; Mon, 17 Jul 2017 00:41:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.140.22.227 with HTTP; Mon, 17 Jul 2017 00:41:31 -0700 (PDT)
In-Reply-To: <CABFReBq6kmJDQyrQdW1+9=g_HbCLrh85m+uPf5RhdLe=ZMGFag@mail.gmail.com>
References: <CABFReBq6kmJDQyrQdW1+9=g_HbCLrh85m+uPf5RhdLe=ZMGFag@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Mon, 17 Jul 2017 00:41:31 -0700
Message-ID: <CA+RyBmW_kCccDcrquFS7OkCw885T6qYsmYQRzVsn4FAeLDPJRA@mail.gmail.com>
To: Greg Shepherd <gjshep@gmail.com>, Antoni Przygienda <prz@juniper.net>
Cc: "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c124a88081dd905547e87ee"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/ohx2alR_EQTa_xAGzXc__dcEYVE>
Subject: Re: [Bier] Prague Agenda
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 07:41:34 -0000

--94eb2c124a88081dd905547e87ee
Content-Type: text/plain; charset="UTF-8"

Hi Greg and Tony,
two WG drafts are stable, mature and authors would ask the WG to consider
WG LCing:

   - PMTUD for BIER draft-ietf-bier-path-mtu-discovery;
   - Performance Measurement with Marking Method in BIER
   draft-ietf-bier-pmmm-oam

Kind regards,
Greg

On Sat, Jul 15, 2017 at 6:00 PM, Greg Shepherd <gjshep@gmail.com> wrote:

> The agenda is published. Please take a look and let me know if anything is
> missing. We only got an hour slot this time, so I had to cut times down to
> get it all in, sorry.
>
> https://datatracker.ietf.org/meeting/99/agenda/bier
>
> Please send slides ASAP. I will not take slides on a memstick at the
> meeting. Some have already sent them, thanks! The rest of you, you know who
> you are.. ;-)
>
> See you all in Prague.
>
> Cheers,
> Greg
> (Chairs)
>
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier
>
>

--94eb2c124a88081dd905547e87ee
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Greg and Tony,<div>two WG drafts are stable, mature and=
 authors would ask the WG to consider WG LCing:</div><div><ul><li>PMTUD for=
 BIER=C2=A0draft-ietf-bier-path-mtu-discovery;</li><li>Performance Measurem=
ent with Marking Method in BIER draft-ietf-bier-pmmm-oam</li></ul><div>Kind=
 regards,</div></div><div>Greg</div></div><div class=3D"gmail_extra"><br><d=
iv class=3D"gmail_quote">On Sat, Jul 15, 2017 at 6:00 PM, Greg Shepherd <sp=
an dir=3D"ltr">&lt;<a href=3D"mailto:gjshep@gmail.com" target=3D"_blank">gj=
shep@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div=
 dir=3D"ltr">The agenda is published. Please take a look and let me know if=
 anything is missing. We only got an hour slot this time, so I had to cut t=
imes down to get it all in, sorry.<div><br></div><div><a href=3D"https://da=
tatracker.ietf.org/meeting/99/agenda/bier" target=3D"_blank">https://datatr=
acker.ietf.org/<wbr>meeting/99/agenda/bier</a><br></div><div><br></div><div=
>Please send slides ASAP. I will not take slides on a memstick at the meeti=
ng. Some have already sent them, thanks! The rest of you, you know who you =
are.. ;-)<div><br></div><div>See you all in Prague.</div><div><br></div><di=
v>Cheers,</div><div>Greg</div><div>(Chairs)=C2=A0</div></div></div>
<br>______________________________<wbr>_________________<br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/bier</a><br>
<br></blockquote></div><br></div>

--94eb2c124a88081dd905547e87ee--


From nobody Mon Jul 17 01:03:31 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BEED4131798; Mon, 17 Jul 2017 01:03:29 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.56.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150027860973.32725.6910726206518800078@ietfa.amsl.com>
Date: Mon, 17 Jul 2017 01:03:29 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/0wYTIPfGcvM5tc99K0339Gev_OI>
Subject: [Bier] I-D Action: draft-ietf-bier-path-mtu-discovery-02.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 08:03:30 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication of the IETF.

        Title           : Path Maximum Transmission Unit Discovery (PMTUD) for Bit Index Explicit Replication (BIER) Layer
        Authors         : Greg Mirsky
                          Tony Przygienda
                          Andrew Dolganow
	Filename        : draft-ietf-bier-path-mtu-discovery-02.txt
	Pages           : 8
	Date            : 2017-07-17

Abstract:
   This document describes Path Maximum Transmission Unit Discovery
   (PMTUD) in Bit Indexed Explicit Replication (BIER) layer.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-path-mtu-discovery/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-path-mtu-discovery-02
https://datatracker.ietf.org/doc/html/draft-ietf-bier-path-mtu-discovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-path-mtu-discovery-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Jul 17 07:35:13 2017
Return-Path: <gjshep@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F4D2131C21 for <bier@ietfa.amsl.com>; Mon, 17 Jul 2017 07:35:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n7RuxOmnndEi for <bier@ietfa.amsl.com>; Mon, 17 Jul 2017 07:35:10 -0700 (PDT)
Received: from mail-qk0-x234.google.com (mail-qk0-x234.google.com [IPv6:2607:f8b0:400d:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E5E1131C1D for <bier@ietf.org>; Mon, 17 Jul 2017 07:35:10 -0700 (PDT)
Received: by mail-qk0-x234.google.com with SMTP id p73so58500052qka.2 for <bier@ietf.org>; Mon, 17 Jul 2017 07:35:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:cc; bh=rVG/2f3Thy+zt6AYcuLL7qlngp8KoPwphTNiTeecjq0=; b=DQujL+qeFvUv2p2hPUyafYiX/VtBwaXfMoy78OrXUZiL5HbcuFbYLumq+q0PMEgOJ8 cNLhNPtz2OuzNWDLnFnovxqzoFK14Md5VFm4QP8frMixjAKMF1kXvRSY9Q1QKRwUl96V zjqKrdkAxQrVzz2H2WUxzPd5ztzer1qkvrIEbqPsIi/gaRmmIsEOEoKMkAE8k0WUP/bm g7m06iAyPqpUscIP9Pblr9rpAG43E3lIZfaHtlFE+3FsoUz6X24dOTlYGOxqf9EmDT/6 +/tfd7xuEcvZASuVxO/dEG45wfwvjdLQFyY0tOc0LepG3zLOVVW1A6lCB63+bW2Sqhri Ra0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:in-reply-to:references :from:date:message-id:subject:to:cc; bh=rVG/2f3Thy+zt6AYcuLL7qlngp8KoPwphTNiTeecjq0=; b=fhm1kf300p80SQ3xiObuiCKuGI+8PXY3bsFFBiO9WMawuIGcKe78b6wb91CYOMzt75 vyC2f84T6eyHNd9Jv93v8Z0Z/9S48MEXM+Npb06IsP82sAdJqcSqYOD4hqXN4GQJbdBC aF7d/ceJQ+pTTlbXHFzkhQfj2/1gjF3FbxMqQw1W9fRnBlV/MwhIrV3zge57UPvpltQc 84g9P6+arUD4VrxpSk6B/XoLqDPEvBFxXwDCDdvPOBtLJmSXnhrcvO3+xkPnsb8ttrJJ 0wq9nv39cQlcTRXsR8SKPA16wX0NgBuQj6LhtHBYFO0XdpwjsJ/QFf9srlkvYY9qVFjH CvDA==
X-Gm-Message-State: AIVw111cGI8mXTIVkD04RFWeOI2+V+S43byMTe6c4EzRrBPQpbYJYZ6l +0pbgshCVAoNsKN1nuTB5nS2ZvyJXg==
X-Received: by 10.55.59.66 with SMTP id i63mr26245655qka.15.1500302109296; Mon, 17 Jul 2017 07:35:09 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.47.186 with HTTP; Mon, 17 Jul 2017 07:35:08 -0700 (PDT)
Reply-To: gjshep@gmail.com
In-Reply-To: <CA+RyBmW_kCccDcrquFS7OkCw885T6qYsmYQRzVsn4FAeLDPJRA@mail.gmail.com>
References: <CABFReBq6kmJDQyrQdW1+9=g_HbCLrh85m+uPf5RhdLe=ZMGFag@mail.gmail.com> <CA+RyBmW_kCccDcrquFS7OkCw885T6qYsmYQRzVsn4FAeLDPJRA@mail.gmail.com>
From: Greg Shepherd <gjshep@gmail.com>
Date: Mon, 17 Jul 2017 07:35:08 -0700
Message-ID: <CABFReBrczh=PC0rrZND2r8kpavH98WoVnKidoVqCB04ZzK+xvA@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: Antoni Przygienda <prz@juniper.net>, "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="001a1148bc7447cd0b0554844e28"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/jkhx8A6gvIC0VIhM0FjyMKTgDUw>
Subject: Re: [Bier] Prague Agenda
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 14:35:12 -0000

--001a1148bc7447cd0b0554844e28
Content-Type: text/plain; charset="UTF-8"

Let's take this to the room on Thurs, then follow-up on the list, following
the room response.

Thanks,
Greg

On Mon, Jul 17, 2017 at 12:41 AM, Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Greg and Tony,
> two WG drafts are stable, mature and authors would ask the WG to consider
> WG LCing:
>
>    - PMTUD for BIER draft-ietf-bier-path-mtu-discovery;
>    - Performance Measurement with Marking Method in BIER
>    draft-ietf-bier-pmmm-oam
>
> Kind regards,
> Greg
>
> On Sat, Jul 15, 2017 at 6:00 PM, Greg Shepherd <gjshep@gmail.com> wrote:
>
>> The agenda is published. Please take a look and let me know if anything
>> is missing. We only got an hour slot this time, so I had to cut times down
>> to get it all in, sorry.
>>
>> https://datatracker.ietf.org/meeting/99/agenda/bier
>>
>> Please send slides ASAP. I will not take slides on a memstick at the
>> meeting. Some have already sent them, thanks! The rest of you, you know who
>> you are.. ;-)
>>
>> See you all in Prague.
>>
>> Cheers,
>> Greg
>> (Chairs)
>>
>> _______________________________________________
>> BIER mailing list
>> BIER@ietf.org
>> https://www.ietf.org/mailman/listinfo/bier
>>
>>
>

--001a1148bc7447cd0b0554844e28
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Let&#39;s take this to the room on Thurs, then follow-up o=
n the list, following the room response.<div><br></div><div>Thanks,</div><d=
iv>Greg</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote=
">On Mon, Jul 17, 2017 at 12:41 AM, Greg Mirsky <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com=
</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">H=
i Greg and Tony,<div>two WG drafts are stable, mature and authors would ask=
 the WG to consider WG LCing:</div><div><ul><li>PMTUD for BIER=C2=A0draft-i=
etf-bier-path-mtu-<wbr>discovery;</li><li>Performance Measurement with Mark=
ing Method in BIER draft-ietf-bier-pmmm-oam</li></ul><div>Kind regards,</di=
v></div><div>Greg</div></div><div class=3D"gmail_extra"><br><div class=3D"g=
mail_quote"><div><div class=3D"h5">On Sat, Jul 15, 2017 at 6:00 PM, Greg Sh=
epherd <span dir=3D"ltr">&lt;<a href=3D"mailto:gjshep@gmail.com" target=3D"=
_blank">gjshep@gmail.com</a>&gt;</span> wrote:<br></div></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><div><div class=3D"h5"><div dir=3D"ltr">The agenda is pub=
lished. Please take a look and let me know if anything is missing. We only =
got an hour slot this time, so I had to cut times down to get it all in, so=
rry.<div><br></div><div><a href=3D"https://datatracker.ietf.org/meeting/99/=
agenda/bier" target=3D"_blank">https://datatracker.ietf.org/m<wbr>eeting/99=
/agenda/bier</a><br></div><div><br></div><div>Please send slides ASAP. I wi=
ll not take slides on a memstick at the meeting. Some have already sent the=
m, thanks! The rest of you, you know who you are.. ;-)<div><br></div><div>S=
ee you all in Prague.</div><div><br></div><div>Cheers,</div><div>Greg</div>=
<div>(Chairs)=C2=A0</div></div></div>
<br></div></div><span class=3D"">______________________________<wbr>_______=
__________<br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org" target=3D"_blank">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/bier</a><br>
<br></span></blockquote></div><br></div>
</blockquote></div><br></div>

--001a1148bc7447cd0b0554844e28--


From nobody Mon Jul 17 07:35:28 2017
Return-Path: <gjshep@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E919131C18 for <bier@ietfa.amsl.com>; Mon, 17 Jul 2017 07:35:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MZNjQ_LGON2H for <bier@ietfa.amsl.com>; Mon, 17 Jul 2017 07:35:18 -0700 (PDT)
Received: from mail-qt0-x22f.google.com (mail-qt0-x22f.google.com [IPv6:2607:f8b0:400d:c0d::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BEED131C22 for <bier@ietf.org>; Mon, 17 Jul 2017 07:35:18 -0700 (PDT)
Received: by mail-qt0-x22f.google.com with SMTP id 21so32279837qtx.3 for <bier@ietf.org>; Mon, 17 Jul 2017 07:35:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:cc; bh=N7x/WGc8tlUrUcc6B8skBQmV6rAmOn3FEJEJmTovdAo=; b=MOFfI3jF3KtScnq9vRU4yf3B/iJhSo/K5q95pT7Abdo2vXWZPMmLZh1jtJwAdiU/Up siCQwvHwkMjzO5aw14XmSFSgoJvhZvOHPUTsPnybMUDOWxrlWqhK8WVqrNNN7/Rvv5xL e/FFqNf6Cv544IHVSUPwK9e8M5dGTB7KEPIVWM1RUfsYoagNf/I0ru0A08zG7mrQ1rQ6 1bB3XLRFYN5621BRBMYYuLA0o0mxdcP+luzmnVh0de58IP94XFhLC9vQArUu0h+iODgY rid59gytIuIWYn53+6oDEKU0j7qhMBr2Iq7EmEoHa27mF7xo0B3Ne5y7yfHW9Z2K95Hv N9mw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:in-reply-to:references :from:date:message-id:subject:to:cc; bh=N7x/WGc8tlUrUcc6B8skBQmV6rAmOn3FEJEJmTovdAo=; b=ZsUz5ax815pCV0zd7ntW3mI7Wfu/2/rDAXVBX0TA2x4nwVFXhlUEJF5bw1n+9m/Xa3 RU1D5wMveR8yL0qRORMyHWso/TC2hgaNlZPgMTCx9GtWN6POQFm/VFC/VxNQLw+JUNv6 WqaWhH2NIz09aN9R5Cdy75uxtaOwCP2rPkfy7Dzf6isufZVBlMUqXlV4caN2wJ16M792 t7rlJt+Us+Y3NDlX88mLs1mPzafGif7oFZodfHpMPVge5FT15xaesoMeA2x4afBI0dLA i0CjonKUue1v9TISrqG4D6mFHSi7EzfE45A/AfJWWaYetBdiG2YLOsSaew3LyJkhVpn4 mWGg==
X-Gm-Message-State: AIVw110+UURSvaC201GMtSHlvSc78UO3t7DQSTYs1A65w1/oSO9pJSFw iupQlqrSSRHIzYg5F347ErenOmj/vQ==
X-Received: by 10.237.42.125 with SMTP id k58mr10074966qtf.58.1500302117424; Mon, 17 Jul 2017 07:35:17 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.47.186 with HTTP; Mon, 17 Jul 2017 07:35:17 -0700 (PDT)
Reply-To: gjshep@gmail.com
In-Reply-To: <CABFReBrczh=PC0rrZND2r8kpavH98WoVnKidoVqCB04ZzK+xvA@mail.gmail.com>
References: <CABFReBq6kmJDQyrQdW1+9=g_HbCLrh85m+uPf5RhdLe=ZMGFag@mail.gmail.com> <CA+RyBmW_kCccDcrquFS7OkCw885T6qYsmYQRzVsn4FAeLDPJRA@mail.gmail.com> <CABFReBrczh=PC0rrZND2r8kpavH98WoVnKidoVqCB04ZzK+xvA@mail.gmail.com>
From: Greg Shepherd <gjshep@gmail.com>
Date: Mon, 17 Jul 2017 07:35:17 -0700
Message-ID: <CABFReBoyrA8PConba+5=qjZ-8v-FToeswDW3G3sdtVOjh7TRUg@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: Antoni Przygienda <prz@juniper.net>, "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="001a1140e620c3d52b0554844ed9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/sxEErwNI_8kEbsng6UoNgf0UjlU>
Subject: Re: [Bier] Prague Agenda
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 14:35:27 -0000

--001a1140e620c3d52b0554844ed9
Content-Type: text/plain; charset="UTF-8"

Thanks,
Greg

On Mon, Jul 17, 2017 at 7:35 AM, Greg Shepherd <gjshep@gmail.com> wrote:

> Let's take this to the room on Thurs, then follow-up on the list,
> following the room response.
>
> Thanks,
> Greg
>
> On Mon, Jul 17, 2017 at 12:41 AM, Greg Mirsky <gregimirsky@gmail.com>
> wrote:
>
>> Hi Greg and Tony,
>> two WG drafts are stable, mature and authors would ask the WG to consider
>> WG LCing:
>>
>>    - PMTUD for BIER draft-ietf-bier-path-mtu-discovery;
>>    - Performance Measurement with Marking Method in BIER
>>    draft-ietf-bier-pmmm-oam
>>
>> Kind regards,
>> Greg
>>
>> On Sat, Jul 15, 2017 at 6:00 PM, Greg Shepherd <gjshep@gmail.com> wrote:
>>
>>> The agenda is published. Please take a look and let me know if anything
>>> is missing. We only got an hour slot this time, so I had to cut times down
>>> to get it all in, sorry.
>>>
>>> https://datatracker.ietf.org/meeting/99/agenda/bier
>>>
>>> Please send slides ASAP. I will not take slides on a memstick at the
>>> meeting. Some have already sent them, thanks! The rest of you, you know who
>>> you are.. ;-)
>>>
>>> See you all in Prague.
>>>
>>> Cheers,
>>> Greg
>>> (Chairs)
>>>
>>> _______________________________________________
>>> BIER mailing list
>>> BIER@ietf.org
>>> https://www.ietf.org/mailman/listinfo/bier
>>>
>>>
>>
>

--001a1140e620c3d52b0554844ed9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks,<div>Greg</div></div><div class=3D"gmail_extra"><br=
><div class=3D"gmail_quote">On Mon, Jul 17, 2017 at 7:35 AM, Greg Shepherd =
<span dir=3D"ltr">&lt;<a href=3D"mailto:gjshep@gmail.com" target=3D"_blank"=
>gjshep@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><=
div dir=3D"ltr">Let&#39;s take this to the room on Thurs, then follow-up on=
 the list, following the room response.<div><br></div><div>Thanks,</div><di=
v>Greg</div></div><div class=3D"HOEnZb"><div class=3D"h5"><div class=3D"gma=
il_extra"><br><div class=3D"gmail_quote">On Mon, Jul 17, 2017 at 12:41 AM, =
Greg Mirsky <span dir=3D"ltr">&lt;<a href=3D"mailto:gregimirsky@gmail.com" =
target=3D"_blank">gregimirsky@gmail.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex"><div dir=3D"ltr">Hi Greg and Tony,<div>two WG drafts a=
re stable, mature and authors would ask the WG to consider WG LCing:</div><=
div><ul><li>PMTUD for BIER=C2=A0draft-ietf-bier-path-mtu-<wbr>discovery;</l=
i><li>Performance Measurement with Marking Method in BIER draft-ietf-bier-p=
mmm-oam</li></ul><div>Kind regards,</div></div><div>Greg</div></div><div cl=
ass=3D"gmail_extra"><br><div class=3D"gmail_quote"><div><div class=3D"m_-50=
84110159960357688h5">On Sat, Jul 15, 2017 at 6:00 PM, Greg Shepherd <span d=
ir=3D"ltr">&lt;<a href=3D"mailto:gjshep@gmail.com" target=3D"_blank">gjshep=
@gmail.com</a>&gt;</span> wrote:<br></div></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex"><div><div class=3D"m_-5084110159960357688h5"><div dir=3D"ltr">The agend=
a is published. Please take a look and let me know if anything is missing. =
We only got an hour slot this time, so I had to cut times down to get it al=
l in, sorry.<div><br></div><div><a href=3D"https://datatracker.ietf.org/mee=
ting/99/agenda/bier" target=3D"_blank">https://datatracker.ietf.org/m<wbr>e=
eting/99/agenda/bier</a><br></div><div><br></div><div>Please send slides AS=
AP. I will not take slides on a memstick at the meeting. Some have already =
sent them, thanks! The rest of you, you know who you are.. ;-)<div><br></di=
v><div>See you all in Prague.</div><div><br></div><div>Cheers,</div><div>Gr=
eg</div><div>(Chairs)=C2=A0</div></div></div>
<br></div></div><span>______________________________<wbr>_________________<=
br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org" target=3D"_blank">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/bier</a><br>
<br></span></blockquote></div><br></div>
</blockquote></div><br></div>
</div></div></blockquote></div><br></div>

--001a1140e620c3d52b0554844ed9--


From nobody Mon Jul 17 10:26:21 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A2D34124E15; Mon, 17 Jul 2017 10:26:13 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.56.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150031237362.24466.12324373615753372473@ietfa.amsl.com>
Date: Mon, 17 Jul 2017 10:26:13 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/_1tyBiU7XfJtU94RRTNIyC7bEa8>
Subject: [Bier] I-D Action: draft-ietf-bier-use-cases-05.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 17:26:14 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication of the IETF.

        Title           : BIER Use Cases
        Authors         : Nagendra Kumar
                          Rajiv Asati
                          Mach(Guoyi) Chen
                          Xiaohu Xu
                          Andrew Dolganow
                          Tony Przygienda
                          Arkadiy Gulko
                          Dom Robinson
                          Vishal Arya
                          Caitlin Bestler
	Filename        : draft-ietf-bier-use-cases-05.txt
	Pages           : 17
	Date            : 2017-07-17

Abstract:
   Bit Index Explicit Replication (BIER) is an architecture that
   provides optimal multicast forwarding through a "BIER domain" without
   requiring intermediate routers to maintain any multicast related per-
   flow state.  BIER also does not require any explicit tree-building
   protocol for its operation.  A multicast data packet enters a BIER
   domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
   BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
   The BFIR router adds a BIER header to the packet.  The BIER header
   contains a bit-string in which each bit represents exactly one BFER
   to forward the packet to.  The set of BFERs to which the multicast
   packet needs to be forwarded is expressed by setting the bits that
   correspond to those routers in the BIER header.

   This document describes some of the use-cases for BIER.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-use-cases/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-use-cases-05
https://datatracker.ietf.org/doc/html/draft-ietf-bier-use-cases-05

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-use-cases-05


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul 18 01:21:03 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D8819120227; Tue, 18 Jul 2017 01:20:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.56.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150036605587.11429.2820396234987752375@ietfa.amsl.com>
Date: Tue, 18 Jul 2017 01:20:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/SKXf0UNZAQnJ0vtKH5DHxk5zcOE>
Subject: [Bier] I-D Action: draft-ietf-bier-oam-requirements-04.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 08:20:56 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication of the IETF.

        Title           : Operations, Administration and Maintenance (OAM) Requirements for Bit Index Explicit Replication (BIER) Layer
        Authors         : Greg Mirsky
                          Erik Nordmark
                          Carlos Pignataro
                          Nagendra Kumar
                          Sam Aldrin
                          Lianshu Zheng
                          Mach Chen
                          Nobo Akiya
                          Santosh Pallagatti
	Filename        : draft-ietf-bier-oam-requirements-04.txt
	Pages           : 6
	Date            : 2017-07-18

Abstract:
   This document describes a list of functional requirement toward
   Operations, Administration and Maintenance (OAM) toolset in Bit Index
   Explicit Replication (BIER) layer of a network.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-oam-requirements/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-oam-requirements-04
https://datatracker.ietf.org/doc/html/draft-ietf-bier-oam-requirements-04

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-oam-requirements-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul 18 01:23:50 2017
Return-Path: <gregimirsky@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66EB4131A5F for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:23:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id voAYzhzyKWzA for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:23:47 -0700 (PDT)
Received: from mail-qk0-x229.google.com (mail-qk0-x229.google.com [IPv6:2607:f8b0:400d:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 325E7120227 for <bier@ietf.org>; Tue, 18 Jul 2017 01:23:47 -0700 (PDT)
Received: by mail-qk0-x229.google.com with SMTP id t2so7566978qkc.1 for <bier@ietf.org>; Tue, 18 Jul 2017 01:23:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to;  bh=BJjVm3idDIJwR2MKJA1Hex3WiwUyqyNfjd7n8A6todI=; b=a0VOeP1Jg6fAW1uQ7geBP2J4veSot11scfLOLEWVAYNspCnOC00LcIWUeUaKw5AxlE hQ7OfNemjWeSRdzWh5nVPRHK90YLb2fUMEwTtqAN9iK/RFgp3tSgPhRBul7s3Wwutblb 6KRylJLiJJOQB/BRZIjjCjZmt4+nZ+aZvbqMQEkSpsBceSxjcr4CBBY1+3t9ssR7G1gB 60JGFXQjueZbk3vsqdRIRhsK4ALaQDHpm6ylbZX+EsVQT2bYu3C3ThmGuN2Lb/uC1Zfj AuTg9pdENczbN8pk0fkeXzkQHwrUmJn0X17GADsDgrHFZCVmOVVTFBx5GF9056sz3KUX p+Gw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=BJjVm3idDIJwR2MKJA1Hex3WiwUyqyNfjd7n8A6todI=; b=TKRTu6WQXhN6XXQ0/QCz3bkR27J5zeehQZ6+53RxjWBA9pA960uwlaMIBVjnrbwx56 4ZsR1Bfj94ioW1554x5jaKY40PKwsJOkmo8742C35AzFFaZElv4FwlbWe9uEwpyu/d9m PUp07DuUnSaomgSJl/PgyeRkHflIEYEcOuxjdgLNP+HWFMPt4hpCL+r3TXxBdh0Iw2Hf 6TT52pppXc5W4Gtf7kjakf6Es6Yq3r6IDX60bnFXzLSP8G7qIO5FeM7feePt7aHxooEh RMG2WAGerUZiB2DwhOQJMVIE9BP42b7XXAt/4pFuXraD0fklGX/u1wmmms0UH+5cGCIi xUAg==
X-Gm-Message-State: AIVw1115bW3N+SVbIG+6Y6Dui30ndRgRrkqDam6mv3XBxX/wP29LN0SF cvvpW8xGFtmRTAlrwwdsROJfS239uck2
X-Received: by 10.55.72.1 with SMTP id v1mr532745qka.0.1500366225957; Tue, 18 Jul 2017 01:23:45 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.140.22.227 with HTTP; Tue, 18 Jul 2017 01:23:45 -0700 (PDT)
In-Reply-To: <150036605597.11429.626541738141748569.idtracker@ietfa.amsl.com>
References: <150036605597.11429.626541738141748569.idtracker@ietfa.amsl.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 18 Jul 2017 10:23:45 +0200
Message-ID: <CA+RyBmUnpHpVY6HHNusbu25J9xEEE6h_87sYCx3Vc05bGKqXZg@mail.gmail.com>
To: bier@ietf.org
Content-Type: multipart/alternative; boundary="001a114a82b6ee6c010554933b50"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/xVcOi3RHgUdAbtkaOGscbv7CEiA>
Subject: [Bier] Fwd: New Version Notification for draft-ietf-bier-oam-requirements-04.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 08:23:49 -0000

--001a114a82b6ee6c010554933b50
Content-Type: text/plain; charset="UTF-8"

Dear All,
this is referesh of the BIER OAM Requirements draft. The document is stable
and is ready for WG LC. Greatly appreciate your consideration.

Regards,
Greg

---------- Forwarded message ----------
From: <internet-drafts@ietf.org>
Date: Tue, Jul 18, 2017 at 10:20 AM
Subject: New Version Notification for
draft-ietf-bier-oam-requirements-04.txt
To: Nagendra Kumar <naikumar@cisco.com>, Sam Aldrin <aldrin.ietf@gmail.com>,
Gregory Mirsky <gregimirsky@gmail.com>, Carlos Pignataro <cpignata@cisco.com>,
Erik Nordmark <nordmark@acm.org>, Nobo Akiya <nobo.akiya.dev@gmail.com>,
Mach Chen <mach.chen@huawei.com>, Lianshu Zheng <vero.zheng@huawei.com>,
Santosh Pallagatti <santosh.palagatti@gmail.com>



A new version of I-D, draft-ietf-bier-oam-requirements-04.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-ietf-bier-oam-requirements
Revision:       04
Title:          Operations, Administration and Maintenance (OAM)
Requirements for Bit Index Explicit Replication (BIER) Layer
Document date:  2017-07-18
Group:          bier
Pages:          6
URL:            https://www.ietf.org/internet-drafts/draft-ietf-bier-oam-
requirements-04.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-bier-oam-
requirements/
Htmlized:       https://tools.ietf.org/html/draft-ietf-bier-oam-
requirements-04
Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-bier-oam-
requirements-04
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-oam-
requirements-04

Abstract:
   This document describes a list of functional requirement toward
   Operations, Administration and Maintenance (OAM) toolset in Bit Index
   Explicit Replication (BIER) layer of a network.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

--001a114a82b6ee6c010554933b50
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear All,<div>this is referesh of the BIER OAM Requirement=
s draft. The document is stable and is ready for WG LC. Greatly appreciate =
your consideration.</div><div><br></div><div>Regards,</div><div>Greg</div><=
div><br><div class=3D"gmail_quote">---------- Forwarded message ----------<=
br>From: <b class=3D"gmail_sendername"></b> <span dir=3D"ltr">&lt;<a href=
=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;</span=
><br>Date: Tue, Jul 18, 2017 at 10:20 AM<br>Subject: New Version Notificati=
on for draft-ietf-bier-oam-requirements-04.txt<br>To: Nagendra Kumar &lt;<a=
 href=3D"mailto:naikumar@cisco.com">naikumar@cisco.com</a>&gt;, Sam Aldrin =
&lt;<a href=3D"mailto:aldrin.ietf@gmail.com">aldrin.ietf@gmail.com</a>&gt;,=
 Gregory Mirsky &lt;<a href=3D"mailto:gregimirsky@gmail.com">gregimirsky@gm=
ail.com</a>&gt;, Carlos Pignataro &lt;<a href=3D"mailto:cpignata@cisco.com"=
>cpignata@cisco.com</a>&gt;, Erik Nordmark &lt;<a href=3D"mailto:nordmark@a=
cm.org">nordmark@acm.org</a>&gt;, Nobo Akiya &lt;<a href=3D"mailto:nobo.aki=
ya.dev@gmail.com">nobo.akiya.dev@gmail.com</a>&gt;, Mach Chen &lt;<a href=
=3D"mailto:mach.chen@huawei.com">mach.chen@huawei.com</a>&gt;, Lianshu Zhen=
g &lt;<a href=3D"mailto:vero.zheng@huawei.com">vero.zheng@huawei.com</a>&gt=
;, Santosh Pallagatti &lt;<a href=3D"mailto:santosh.palagatti@gmail.com">sa=
ntosh.palagatti@gmail.com</a>&gt;<br><br><br><br>
A new version of I-D, draft-ietf-bier-oam-<wbr>requirements-04.txt<br>
has been successfully submitted by Greg Mirsky and posted to the<br>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-ietf-bier-oam-<wbr>requ=
irements<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A004<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Operations, Administration and Mai=
ntenance (OAM) Requirements for Bit Index Explicit Replication (BIER) Layer=
<br>
Document date:=C2=A0 2017-07-18<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bier<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 6<br>
URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.o=
rg/internet-drafts/draft-ietf-bier-oam-requirements-04.txt" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/internet-<wbr>drafts/draft-ietf-=
bier-oam-<wbr>requirements-04.txt</a><br>
Status:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.iet=
f.org/doc/draft-ietf-bier-oam-requirements/" rel=3D"noreferrer" target=3D"_=
blank">https://datatracker.ietf.org/<wbr>doc/draft-ietf-bier-oam-<wbr>requi=
rements/</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
draft-ietf-bier-oam-requirements-04" rel=3D"noreferrer" target=3D"_blank">h=
ttps://tools.ietf.org/html/<wbr>draft-ietf-bier-oam-<wbr>requirements-04</a=
><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.ietf.org=
/doc/html/draft-ietf-bier-oam-requirements-04" rel=3D"noreferrer" target=3D=
"_blank">https://datatracker.ietf.org/<wbr>doc/html/draft-ietf-bier-oam-<wb=
r>requirements-04</a><br>
Diff:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://www.ietf.o=
rg/rfcdiff?url2=3Ddraft-ietf-bier-oam-requirements-04" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/rfcdiff?<wbr>url2=3Ddraft-ietf-bier-o=
am-<wbr>requirements-04</a><br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document describes a list of functional requirement towar=
d<br>
=C2=A0 =C2=A0Operations, Administration and Maintenance (OAM) toolset in Bi=
t Index<br>
=C2=A0 =C2=A0Explicit Replication (BIER) layer of a network.<br>
<br>
<br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
The IETF Secretariat<br>
<br>
</div><br></div></div>

--001a114a82b6ee6c010554933b50--


From nobody Tue Jul 18 01:49:11 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A4F2131DBD for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:49:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zopduiDZBskw for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:49:02 -0700 (PDT)
Received: from mail-lf0-x22b.google.com (mail-lf0-x22b.google.com [IPv6:2a00:1450:4010:c07::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42A4A131D0E for <bier@ietf.org>; Tue, 18 Jul 2017 01:49:02 -0700 (PDT)
Received: by mail-lf0-x22b.google.com with SMTP id w198so7995250lff.2 for <bier@ietf.org>; Tue, 18 Jul 2017 01:49:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=RjuTXZaEvuC7WF3B87edbj+SA3dVhb6FWhl5vI80L54=; b=g3SG1Y46CXBpaRYxZJP4FWDXm4iAki3Wcm/AAzKV1kXG3K/qUZEe5/KXaz7IAAgnzR YOLGvXvX5arbVSRa6Ry+faShVRJd4P2RzIXR2RchCx4xJ1X8sW+Ux2W+W6gEuHqI4FKv /mJTiy5ejZxBUF1FgHfIAWVnYZw145vRBsl+ZQt5ZilZpx9GgHwdpzWQbZ68qBwy22l9 o+SWLyZdB6LqjIh/xcog8q62qAsR5t3FozYmUQpuY/s4kYy7eODFUJAKPZUSWmZBpu4w 2Jb21bI2uYEUYitQ3hBk7Hzlp+JiK5xPhDw1sIbi7qf4lzriM+D+xN5/mX8ElCit819T Q3lA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=RjuTXZaEvuC7WF3B87edbj+SA3dVhb6FWhl5vI80L54=; b=niKQp102zy5/oE5P8Yn92KyoJkxB+jXOGb6AGfyL87Ez/ulpyV8Bb1urpO6YjmtEpD k3BmzVP8nl1h3Yg+cfV4SYouvxKue/wiJS5no1n8VYNjIC65zdONmytuxG//Nik4vmHu f93SJoEcHYBluBZYSHOJJxG+aJpC3t5bdzNl063Jzqx/ETjdefYmG0yhcP747S1x1AFW ftfaYagtInhNopvmVJVRQz+V+I/xz6v7j8FWN0OCYkS/96kd5AJIRUuHkrSFfs1FH+5t n4zEkMkbHJG0+D+X9UcG2A7wD5VnMrqTlzY/IOjDwizIQ5IrP8/jnljnEpV4Mo+RLLAL 1j8g==
X-Gm-Message-State: AIVw112voLFxWZez9ZKa18fAitr+MX7hg5K9qhv1t5n7HY3a6YAkEjLr ayGIV9yezKiPHLRdEA/vsFEc1f0CIQ==
X-Received: by 10.80.134.217 with SMTP id 25mr994436edu.73.1500367740622; Tue, 18 Jul 2017 01:49:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.138.99 with HTTP; Tue, 18 Jul 2017 01:48:20 -0700 (PDT)
In-Reply-To: <CABFReBoyrA8PConba+5=qjZ-8v-FToeswDW3G3sdtVOjh7TRUg@mail.gmail.com>
References: <CABFReBq6kmJDQyrQdW1+9=g_HbCLrh85m+uPf5RhdLe=ZMGFag@mail.gmail.com> <CA+RyBmW_kCccDcrquFS7OkCw885T6qYsmYQRzVsn4FAeLDPJRA@mail.gmail.com> <CABFReBrczh=PC0rrZND2r8kpavH98WoVnKidoVqCB04ZzK+xvA@mail.gmail.com> <CABFReBoyrA8PConba+5=qjZ-8v-FToeswDW3G3sdtVOjh7TRUg@mail.gmail.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Tue, 18 Jul 2017 10:48:20 +0200
Message-ID: <CA+wi2hMfaTMPzb2zUEuAezF3JbK3OHmqWusjDZm3mcHUmeKhZA@mail.gmail.com>
To: Greg Shepherd <gjshep@gmail.com>
Cc: Greg Mirsky <gregimirsky@gmail.com>, "bier@ietf.org" <bier@ietf.org>,  Antoni Przygienda <prz@juniper.net>
Content-Type: multipart/alternative; boundary="f403045c28fa365a1f05549396f3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/4NuSs7e0PG0GE_EJ0QyjvJcF9wE>
Subject: Re: [Bier] Prague Agenda
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 08:49:04 -0000

--f403045c28fa365a1f05549396f3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

+1 Greg

On Mon, Jul 17, 2017 at 4:35 PM, Greg Shepherd <gjshep@gmail.com> wrote:

> Thanks,
> Greg
>
> On Mon, Jul 17, 2017 at 7:35 AM, Greg Shepherd <gjshep@gmail.com> wrote:
>
>> Let's take this to the room on Thurs, then follow-up on the list,
>> following the room response.
>>
>> Thanks,
>> Greg
>>
>> On Mon, Jul 17, 2017 at 12:41 AM, Greg Mirsky <gregimirsky@gmail.com>
>> wrote:
>>
>>> Hi Greg and Tony,
>>> two WG drafts are stable, mature and authors would ask the WG to
>>> consider WG LCing:
>>>
>>>    - PMTUD for BIER draft-ietf-bier-path-mtu-discovery;
>>>    - Performance Measurement with Marking Method in BIER
>>>    draft-ietf-bier-pmmm-oam
>>>
>>> Kind regards,
>>> Greg
>>>
>>> On Sat, Jul 15, 2017 at 6:00 PM, Greg Shepherd <gjshep@gmail.com> wrote=
:
>>>
>>>> The agenda is published. Please take a look and let me know if anythin=
g
>>>> is missing. We only got an hour slot this time, so I had to cut times =
down
>>>> to get it all in, sorry.
>>>>
>>>> https://datatracker.ietf.org/meeting/99/agenda/bier
>>>>
>>>> Please send slides ASAP. I will not take slides on a memstick at the
>>>> meeting. Some have already sent them, thanks! The rest of you, you kno=
w who
>>>> you are.. ;-)
>>>>
>>>> See you all in Prague.
>>>>
>>>> Cheers,
>>>> Greg
>>>> (Chairs)
>>>>
>>>> _______________________________________________
>>>> BIER mailing list
>>>> BIER@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/bier
>>>>
>>>>
>>>
>>
>
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier
>
>


--=20
*We=E2=80=99ve heard that a million monkeys at a million keyboards could pr=
oduce
the complete works of Shakespeare; now, thanks to the Internet, we know
that is not true.*
=E2=80=94Robert Wilensky

--f403045c28fa365a1f05549396f3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">+1 Greg</div><div class=3D"gmail_extra"><br><div class=3D"=
gmail_quote">On Mon, Jul 17, 2017 at 4:35 PM, Greg Shepherd <span dir=3D"lt=
r">&lt;<a href=3D"mailto:gjshep@gmail.com" target=3D"_blank">gjshep@gmail.c=
om</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"marg=
in:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"=
>Thanks,<div>Greg</div></div><div class=3D"HOEnZb"><div class=3D"h5"><div c=
lass=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Jul 17, 2017 at=
 7:35 AM, Greg Shepherd <span dir=3D"ltr">&lt;<a href=3D"mailto:gjshep@gmai=
l.com" target=3D"_blank">gjshep@gmail.com</a>&gt;</span> wrote:<br><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex"><div dir=3D"ltr">Let&#39;s take this to the room on =
Thurs, then follow-up on the list, following the room response.<div><br></d=
iv><div>Thanks,</div><div>Greg</div></div><div class=3D"m_91238231945623463=
36HOEnZb"><div class=3D"m_9123823194562346336h5"><div class=3D"gmail_extra"=
><br><div class=3D"gmail_quote">On Mon, Jul 17, 2017 at 12:41 AM, Greg Mirs=
ky <span dir=3D"ltr">&lt;<a href=3D"mailto:gregimirsky@gmail.com" target=3D=
"_blank">gregimirsky@gmail.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div dir=3D"ltr">Hi Greg and Tony,<div>two WG drafts are stab=
le, mature and authors would ask the WG to consider WG LCing:</div><div><ul=
><li>PMTUD for BIER=C2=A0draft-ietf-bier-path-mtu-<wbr>discovery;</li><li>P=
erformance Measurement with Marking Method in BIER draft-ietf-bier-pmmm-oam=
</li></ul><div>Kind regards,</div></div><div>Greg</div></div><div class=3D"=
gmail_extra"><br><div class=3D"gmail_quote"><div><div class=3D"m_9123823194=
562346336m_-5084110159960357688h5">On Sat, Jul 15, 2017 at 6:00 PM, Greg Sh=
epherd <span dir=3D"ltr">&lt;<a href=3D"mailto:gjshep@gmail.com" target=3D"=
_blank">gjshep@gmail.com</a>&gt;</span> wrote:<br></div></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><div><div class=3D"m_9123823194562346336m_-50841101599603=
57688h5"><div dir=3D"ltr">The agenda is published. Please take a look and l=
et me know if anything is missing. We only got an hour slot this time, so I=
 had to cut times down to get it all in, sorry.<div><br></div><div><a href=
=3D"https://datatracker.ietf.org/meeting/99/agenda/bier" target=3D"_blank">=
https://datatracker.ietf.org/m<wbr>eeting/99/agenda/bier</a><br></div><div>=
<br></div><div>Please send slides ASAP. I will not take slides on a memstic=
k at the meeting. Some have already sent them, thanks! The rest of you, you=
 know who you are.. ;-)<div><br></div><div>See you all in Prague.</div><div=
><br></div><div>Cheers,</div><div>Greg</div><div>(Chairs)=C2=A0</div></div>=
</div>
<br></div></div><span>______________________________<wbr>_________________<=
br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org" target=3D"_blank">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/bier</a><br>
<br></span></blockquote></div><br></div>
</blockquote></div><br></div>
</div></div></blockquote></div><br></div>
</div></div><br>______________________________<wbr>_________________<br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/bier</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div cla=
ss=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr">=
<div><span style=3D"font-size:12.8000001907349px"><font face=3D"georgia, se=
rif"><i>We=E2=80=99ve heard that a million monkeys at a million keyboards c=
ould produce the complete works of Shakespeare; now, thanks to the Internet=
, we know that is not true.</i></font></span><i><font face=3D"garamond, ser=
if"><br></font></i></div><div><span style=3D"font-size:12.8000001907349px">=
<font face=3D"times new roman, serif">=E2=80=94Robert Wilensky</font></span=
><br></div></div></div>
</div>

--f403045c28fa365a1f05549396f3--


From nobody Tue Jul 18 01:56:55 2017
Return-Path: <prz@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E69A6131A78 for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:56:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.801
X-Spam-Level: 
X-Spam-Status: No, score=-4.801 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wEjAREhMVTwT for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:56:51 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0106.outbound.protection.outlook.com [104.47.38.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA61A131DC5 for <bier@ietf.org>; Tue, 18 Jul 2017 01:56:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WFNFTqKfeR7NIseGUYzqwdT+K/N/KQ/RcxKqoR2oO34=; b=dzQ4oPoMydh4Vd7N3puCa0WfT4uNStbxd6rZ1iWegsyycHpBKGZ4n7qctIvOfbOFNDJHI1WuIxn9lZ0k7GPPnYGBYotZSTxZn4QcbymEZsomzzezpwcbWeMLGSiHxbjZJDSmff0E0ib+lTAzapwdrkftgZrVsQYbniyIg3/iIrc=
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com (10.161.224.148) by DM2PR0501MB1472.namprd05.prod.outlook.com (10.161.224.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Tue, 18 Jul 2017 08:56:49 +0000
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444]) by DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444%14]) with mapi id 15.01.1282.008; Tue, 18 Jul 2017 08:56:49 +0000
From: Antoni Przygienda <prz@juniper.net>
To: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZA==
Date: Tue, 18 Jul 2017 08:56:49 +0000
Message-ID: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.20.0.170309
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [193.110.55.12]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM2PR0501MB1472; 7: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
x-ms-office365-filtering-correlation-id: 27f08ca0-16da-4f3f-41c7-08d4cdbaed17
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM2PR0501MB1472; 
x-ms-traffictypediagnostic: DM2PR0501MB1472:
x-exchange-antispam-report-test: UriScan:(151999592597050)(190756311086443)(26388249023172)(236129657087228)(148574349560750)(21748063052155)(247924648384137);
x-microsoft-antispam-prvs: <DM2PR0501MB1472F69460E077ED69B03A30ACA10@DM2PR0501MB1472.namprd05.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(2017060910075)(5005006)(10201501046)(100000703101)(100105400095)(3002001)(93006095)(93001095)(6055026)(6041248)(20161123562025)(20161123564025)(20161123560025)(20161123555025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM2PR0501MB1472; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM2PR0501MB1472; 
x-forefront-prvs: 037291602B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39840400002)(39400400002)(39860400002)(39450400003)(39410400002)(39850400002)(5660300001)(2351001)(2906002)(36756003)(2900100001)(4001350100001)(3660700001)(6916009)(83506001)(3280700002)(3846002)(7736002)(478600001)(6116002)(102836003)(53936002)(5250100002)(6306002)(2501003)(189998001)(5640700003)(83716003)(6512007)(99286003)(86362001)(6436002)(54896002)(230783001)(25786009)(14454004)(82746002)(110136004)(38730400002)(66066001)(8936002)(33656002)(6506006)(6486002)(54356999)(50986999)(81166006)(1730700003)(8676002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB1472; H:DM2PR0501MB1438.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_2F5AA4ABE5E7453E963CDF9679DDE2D8junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 08:56:49.0480 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB1472
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/unFeHxYj6-HySByb-eHezgKa4o8>
Subject: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 08:56:54 -0000

--_000_2F5AA4ABE5E7453E963CDF9679DDE2D8junipernet_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_2F5AA4ABE5E7453E963CDF9679DDE2D8junipernet_
Content-Type: text/html; charset="utf-8"
Content-ID: <7F244CE2AED0634194A0EEF13D4AFC87@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
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==

--_000_2F5AA4ABE5E7453E963CDF9679DDE2D8junipernet_--


From nobody Tue Jul 18 02:18:11 2017
Return-Path: <andrew.dolganow@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31120131A93 for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 02:18:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w59rZOZv6pLG for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 02:18:07 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10112.outbound.protection.outlook.com [40.107.1.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29E11131945 for <bier@ietf.org>; Tue, 18 Jul 2017 02:18:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=wnHoI5wFhb1RmAPdajSaGRCBzhxYPj2CWj3ze2zeY04=; b=aWkpPGy1OhDeOMkXcVEDvALGyIn3ymcbnu+FBulVQNaALr7I6GsR2ctBnUQesuVoTXmrHFSVs23eExY+f/d9BH3E6wcnVgt+sDmIEYQLxxZ/ztyE7+Egw6GpRvQAC6EiiEStDKdxKnfUEEzdIUfrr6aaS00ekS0TRYK7yTIabdk=
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com (10.167.190.10) by HE1PR0701MB2426.eurprd07.prod.outlook.com (10.168.128.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Tue, 18 Jul 2017 09:18:04 +0000
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::bd82:d804:3db6:62a3]) by HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::bd82:d804:3db6:62a3%13]) with mapi id 15.01.1282.008; Tue, 18 Jul 2017 09:18:04 +0000
From: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>
To: Antoni Przygienda <prz@juniper.net>
CC: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZKJZUqQ7
Date: Tue, 18 Jul 2017 09:18:04 +0000
Message-ID: <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net>
In-Reply-To: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net>
Accept-Language: en-US
Content-Language: en-CA
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [2001:67c:370:128:bd0d:2c88:4818:f3a7]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0701MB2426; 7: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
x-ms-office365-filtering-correlation-id: 7d4af38e-2410-4b40-aef7-08d4cdbde535
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:HE1PR0701MB2426; 
x-ms-traffictypediagnostic: HE1PR0701MB2426:
x-exchange-antispam-report-test: UriScan:(190756311086443)(26388249023172)(236129657087228)(138986009662008)(148574349560750)(50300203121483)(247924648384137);
x-microsoft-antispam-prvs: <HE1PR0701MB2426942AFCE50B3EC3752DD3E5A10@HE1PR0701MB2426.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(10201501046)(93006095)(93001095)(3002001)(100000703101)(100105400095)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123562025)(20161123564025)(20161123558100)(20161123560025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:HE1PR0701MB2426; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:HE1PR0701MB2426; 
x-forefront-prvs: 037291602B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(39450400003)(39840400002)(39850400002)(39400400002)(39410400002)(24454002)(377454003)(6506006)(229853002)(81166006)(8936002)(2950100002)(6916009)(102836003)(6486002)(606006)(6116002)(82746002)(478600001)(36756003)(54356999)(76176999)(50986999)(7736002)(83716003)(5250100002)(14454004)(8676002)(5003630100001)(3660700001)(3280700002)(966005)(6436002)(2900100001)(53936002)(230783001)(8666007)(99286003)(86362001)(38730400002)(110136004)(189998001)(6246003)(2906002)(4326008)(53546010)(25786009)(6306002)(33656002)(236005)(54896002)(6512007)(5660300001)(9886003); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR0701MB2426; H:HE1PR0701MB2058.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_B681B2B435184F8AA83A7AEBED2F7CE7nokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 09:18:04.2689 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2426
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/IPnLcDcYht6UbuZlHrLoUYnp9oE>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 09:18:10 -0000

--_000_B681B2B435184F8AA83A7AEBED2F7CE7nokiacom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B681B2B435184F8AA83A7AEBED2F7CE7nokiacom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B681B2B435184F8AA83A7AEBED2F7CE7nokiacom_--


From nobody Tue Jul 18 02:24:47 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62E7F131DDC for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 02:24:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jsNbvf2YAXDE for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 02:24:31 -0700 (PDT)
Received: from mail-lf0-x236.google.com (mail-lf0-x236.google.com [IPv6:2a00:1450:4010:c07::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC454131DD6 for <bier@ietf.org>; Tue, 18 Jul 2017 02:24:21 -0700 (PDT)
Received: by mail-lf0-x236.google.com with SMTP id t72so8864092lff.1 for <bier@ietf.org>; Tue, 18 Jul 2017 02:24:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=lwIYl1Fu8zvX/Ol9sjWMpRRG0vq19vGAWarGDPBlwj4=; b=SlaNPgMgoW3k8uApDlJZLCcG5Mrew3MIn+t2JpiMEyHS9BaPL0K8WTj5bquO+ay8U5 jSk5MH2qyiiI9CL5REKGIne1oRExBx7XmZvE50Mx0JHKOhUNke6KsEqF+462BCVu8MjP uApiZmdPTRZnGHRyKbeKmFYEu3CU/PWVEnpY05srCiyvuGtxGC+Zfyh4w4P68wojFzUA O6oOudEPC13TCV8yXK7j9oi/Pg3ty2jnebp4jJhQXma98rDTb/QHHzw1foYnA+NrSwzy xwtSkARZu71A7hpVM8cUPM2DaylVgDg6dee0S3H4awea/reprQZ3j8zuQ7fJi6pGPBCW FB/A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=lwIYl1Fu8zvX/Ol9sjWMpRRG0vq19vGAWarGDPBlwj4=; b=UERzEqMOAVXEAi9QmEvXXovrB5+9fgVe/GEj+svmxmvlZm0zGzGSHA/oZEaQ1Ah2Pe RfToxt3T2K08tFVzZCYehP10UR479UcatKGPPuHxyxvBDA/kkhk7fpNilohwllWHA2Qz vLBMG3gbKBduN7C8lA9lI/F6tEjrs3SEUskmab8TEWHLaBb0vSV26b7f7Gl4F5nMTLQN jinfDI41rRak4BZk7EY0Nh2IQa0wPxb/waHsjrJGblXlS7hFeSomWkQv7koLVl8ocZAa qLoJPZv5Wedm+TcyaIyy+FiHGqEp8fkt2Ep4A9afKW9Ok3dS2s/rpjSZ8RIgfayQUao8 lsvQ==
X-Gm-Message-State: AIVw110xnuayjPy5IpPj57Q1PL+75O9BSutIHLSMpAxgsvJEtERdKy6o UR5HQHKzqkMUKI41hi1DWNwZBz3h+Q==
X-Received: by 10.80.134.217 with SMTP id 25mr1108264edu.73.1500369860041; Tue, 18 Jul 2017 02:24:20 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.138.99 with HTTP; Tue, 18 Jul 2017 02:23:39 -0700 (PDT)
In-Reply-To: <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Tue, 18 Jul 2017 11:23:39 +0200
Message-ID: <CA+wi2hMueBfh3GAug8d6a2+bN_r8nOMj9cMLFhuzPRpg9-TDgQ@mail.gmail.com>
To: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>
Cc: Antoni Przygienda <prz@juniper.net>, "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="f403045c28fa8a219905549414de"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/eVeo3KCXLNQ3UE0EPKUeQBvKN78>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 09:24:34 -0000

--f403045c28fa8a219905549414de
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

ok, starts to make more sense if you spell all those assumptions very
explicitly in the boilerplate. And give more examples ideally ...

I'm on the floor the whole week, ping me 1:1 and we'll talk ...

--- tony

On Tue, Jul 18, 2017 at 11:18 AM, Dolganow, Andrew (Nokia - SG/Singapore) <
andrew.dolganow@nokia.com> wrote:

> Inline
>
> Andrew
>
> Sent from my iPhone
>
> On Jul 18, 2017, at 10:56 AM, Antoni Przygienda <prz@juniper.net> wrote:
>
> Read the draft on the plane trying to figure out what=E2=80=99s that abou=
t.
> Observations
>
>
>
> a)       First, the draft seems to indicate that it=E2=80=99s draft-rosen=
 (6037)
> and I assume it=E2=80=99s talking about the P-G PIM which is generated by=
 the PE
> and then first P is acting as BER. And it seems to concern mostly SSM. Ju=
st
> verifying =E2=80=A6
>
>
> The solution we are targeting runs Rosen MVPN in the core. And yes SSM is
> our main target.
>
> b)       I=E2=80=99m suspicious of the 256bits argument somehow. Is the i=
dea that
> running a single-SI BIER is somehow massively simpler than multiple-SI-s?
> The packet WILL split @ replication points & replication is necessary in
> any case (unless we have ingress rep for which BIER is not needed) so I
> don=E2=80=99t see how single-SI makes much of a difference.
>
>
> There are two goals:
> - Stay with a single SI to avoid packet duplication in a core due to a
> scale.
> - Intro BIER in the core without a need to touch access domains -
> evolutionary intro of BIER.
>
> c)       We do not need to burn a protocol bit for PIM albeit yes, it
> would be tad more efficient. PIM must be carried in either v4 or v6 frame
> which is its normal encoding and already fully supported by BIER encaps.
> Additionally, if PIM is stripped of v4/v6 encaps considerations would hav=
e
> to be made to all the PIM RPF & correct source/destination addresses chec=
ks
> in the spec AFAIR. Yes, the BER needs to look into v4/v6 packets to  see
> PIM being tunneled but if we try to accommodate every IP protocol with a
> bit, we=E2=80=99ll run out fast. Accomodating a protocol makes most sense=
 when we
> talk heavy-volume dataplane such as maybe VxLAN if we can save headers fo=
r
> processing speed but PIM is a low volume control protocol and the check i=
s
> trivial since it=E2=80=99s a well known next-protocol offset position.
>
>
> Let's discuss in Prague.
>
> d)       I think the moniker BRT is ill chosen. BIER does not do RPF and
> using =E2=80=9CRPF=E2=80=9D here to describe tracking of G-membership of =
P-BFRs is
> overloading the term in a confusing way IMO. Basically in overlay we shou=
ld
> have a G to BFM mapping (and if necessary S to BFR-id derived from BIER
> packets) and nothing else. There is no =E2=80=9CRPF=E2=80=9D lookup per p=
acket or anything
> like this which the moniker suggests (yes, one would say we do a =E2=80=
=9CRPF=E2=80=9D per
> =E2=80=9CPIM join=E2=80=9D but that somehow implies that such =E2=80=9CRP=
F=E2=80=9D can =E2=80=9Cfail and drop=E2=80=9D
> which it cannot).
>
> e)       The whole =E2=80=9CRPF SPF lookup=E2=80=9D in 3.1 for (S,G) join=
s will not work
> in general case AFAIS. Observe that BIER may NOT be IGP signaled (but e.g=
.
> controller based) or run subdomain over a MT sub-setting links or constru=
ct
> a different tree than SPF so this =E2=80=9CPIM tunneled (S,G) overlay=E2=
=80=9D seems to
> violate the separation of layers completely as proposed assuming that it
> can draw conclusions from IGP state (i.e. it considers the tunnel path
> somehow =E2=80=9Cbackwards-computable=E2=80=9D by the overlay making it n=
ot a tunnel but an
> encapsulation only).
>
> This is bot trying to be a general solution that will work with every BIE=
R
> deployment. It intends to solve brown-deployment use caee in some pretty
> typical architecture deployed today.
>
> If the whole (S,G) join architecture hinges on assumption that a =E2=80=
=9Cfuture=E2=80=9D
> BIER packet=E2=80=99s source can be =E2=80=9Cfigured out by computing SPF=
=E2=80=9D then it is very
> restricted and those assumptions have to be spelled out very clearly. In
> general case an (S,G) join would have to be sent to all BERs that
> participate in the P-G IMO make is de-facto ASM is my impression.
>
>
>
> Maybe I somehow miss the whole point completely given that the text is
> jumping between tons of technologies and seems to not state assumptions
> taken every time clearly =E2=80=A6
>
>
>
>
> Let's go over confusing parts tony so we can clarify and avoid those in
> the text.
>
> Andrew
>
> --- tony
>
>
>
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier
>
>
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier
>
>


--=20
*We=E2=80=99ve heard that a million monkeys at a million keyboards could pr=
oduce
the complete works of Shakespeare; now, thanks to the Internet, we know
that is not true.*
=E2=80=94Robert Wilensky

--f403045c28fa8a219905549414de
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">ok, starts to make more sense if you spell all those assum=
ptions very explicitly in the boilerplate. And give more examples ideally .=
..=C2=A0<div><br></div><div>I&#39;m on the floor the whole week, ping me 1:=
1 and we&#39;ll talk ...</div><div><br></div><div>--- tony=C2=A0</div></div=
><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Jul 18, =
2017 at 11:18 AM, Dolganow, Andrew (Nokia - SG/Singapore) <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:andrew.dolganow@nokia.com" target=3D"_blank">andrew.=
dolganow@nokia.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">



<div dir=3D"auto">
<div>Inline<br>
<br>
Andrew
<div><br>
</div>
<div>Sent from my iPhone</div>
</div><span class=3D"">
<div><br>
On Jul 18, 2017, at 10:56 AM, Antoni Przygienda &lt;<a href=3D"mailto:prz@j=
uniper.net" target=3D"_blank">prz@juniper.net</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div>




<div class=3D"m_-1367271727511106927WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Read the draft on t=
he plane trying to figure out what=E2=80=99s that about. Observations
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><u></u>=C2=A0<u></u=
></span></p>
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><span>a)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><span style=3D"font-size:11.0pt">First, the draft seem=
s to indicate that it=E2=80=99s draft-rosen (6037) and I assume it=E2=80=99=
s talking about the P-G PIM which is generated by the PE and then first P i=
s acting as BER. And it seems to concern
 mostly SSM. Just verifying =E2=80=A6 </span></p>
</div>
</div>
</blockquote>
<div><br>
</div></span>
The solution we are targeting runs Rosen MVPN in the core. And yes SSM is o=
ur main target.=C2=A0<span class=3D""><br>
<blockquote type=3D"cite">
<div>
<div class=3D"m_-1367271727511106927WordSection1">
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><u></u><u></u></span></p>
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><span>b)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><span style=3D"font-size:11.0pt">I=E2=80=99m suspiciou=
s of the 256bits argument somehow. Is the idea that running a single-SI BIE=
R is somehow massively simpler than multiple-SI-s? The packet WILL split @ =
replication points &amp; replication
 is necessary in any case (unless we have ingress rep for which BIER is not=
 needed) so I don=E2=80=99t see how single-SI makes much of a difference.
</span></p>
</div>
</div>
</blockquote>
<div><br>
</div></span>
There are two goals:
<div>- Stay with a single SI to avoid packet duplication in a core due to a=
 scale.=C2=A0</div>
<div>- Intro BIER in the core without a need to touch access domains - evol=
utionary intro of BIER.=C2=A0</div>
<div><span class=3D""><br>
<blockquote type=3D"cite">
<div>
<div class=3D"m_-1367271727511106927WordSection1">
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><u></u><u></u></span></p>
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><span>c)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><span style=3D"font-size:11.0pt">We do not need to bur=
n a protocol bit for PIM albeit yes, it would be tad more efficient. PIM mu=
st be carried in either v4 or v6 frame which is its normal encoding and alr=
eady fully supported
 by BIER encaps. Additionally, if PIM is stripped of v4/v6 encaps considera=
tions would have to be made to all the PIM RPF &amp; correct source/destina=
tion addresses checks in the spec AFAIR. Yes, the BER needs to look into v4=
/v6 packets to=C2=A0 see PIM being tunneled
 but if we try to accommodate every IP protocol with a bit, we=E2=80=99ll r=
un out fast. Accomodating a protocol makes most sense when we talk heavy-vo=
lume dataplane such as maybe VxLAN if we can save headers for processing sp=
eed but PIM is a low volume control protocol
 and the check is trivial since it=E2=80=99s a well known next-protocol off=
set position. <u></u>
<u></u></span></p>
</div>
</div>
</blockquote>
<div><br>
</div></span>
Let&#39;s discuss in Prague.=C2=A0<span class=3D""><br>
<blockquote type=3D"cite">
<div>
<div class=3D"m_-1367271727511106927WordSection1">
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><span>d)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><span style=3D"font-size:11.0pt">I think the moniker B=
RT is ill chosen. BIER does not do RPF and using =E2=80=9CRPF=E2=80=9D here=
 to describe tracking of G-membership of P-BFRs is overloading the term in =
a confusing way IMO. Basically in overlay
 we should have a G to BFM mapping (and if necessary S to BFR-id derived fr=
om BIER packets) and nothing else. There is no =E2=80=9CRPF=E2=80=9D lookup=
 per packet or anything like this which the moniker suggests (yes, one woul=
d say we do a =E2=80=9CRPF=E2=80=9D per =E2=80=9CPIM join=E2=80=9D but that=
 somehow
 implies that such =E2=80=9CRPF=E2=80=9D can =E2=80=9Cfail and drop=E2=80=
=9D which it cannot). <u></u><u></u></span></p>
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><span>e)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><span style=3D"font-size:11.0pt">The whole =E2=80=9CRP=
F SPF lookup=E2=80=9D in 3.1 for (S,G) joins will not work in general case =
AFAIS. Observe that BIER may NOT be IGP signaled (but e.g. controller based=
) or run subdomain over a MT sub-setting
 links or construct a different tree than SPF so this =E2=80=9CPIM tunneled=
 (S,G) overlay=E2=80=9D seems to violate the separation of layers completel=
y as proposed assuming that it can draw conclusions from IGP state (i.e. it=
 considers the tunnel path somehow =E2=80=9Cbackwards-computable=E2=80=9D
 by the overlay making it not a tunnel but an encapsulation only). </span><=
/p>
</div>
</div>
</blockquote>
</span><div>This is bot trying to be a general solution that will work with=
 every BIER deployment. It intends to solve brown-deployment use caee in so=
me pretty typical architecture deployed today.=C2=A0</div><span class=3D"">
<blockquote type=3D"cite">
<div>
<div class=3D"m_-1367271727511106927WordSection1">
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><u></u><u></u></span></p>
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt">If the whole (S,G) join architecture hinges on assumption that a =
=E2=80=9Cfuture=E2=80=9D BIER packet=E2=80=99s source can be =E2=80=9Cfigur=
ed out by computing SPF=E2=80=9D then it is very restricted and those assum=
ptions have to be spelled
 out very clearly. In general case an (S,G) join would have to be sent to a=
ll BERs that participate in the P-G IMO make is de-facto ASM is my impressi=
on.
<u></u><u></u></span></p>
<p class=3D"m_-1367271727511106927MsoListParagraph"><span style=3D"font-siz=
e:11.0pt"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Maybe I somehow mis=
s the whole point completely given that the text is jumping between tons of=
 technologies and seems to not state assumptions taken every time clearly =
=E2=80=A6
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><u></u>=C2=A0<u></u=
></span></p>
</div>
</div>
</blockquote>
<div><br>
</div></span>
Let&#39;s go over confusing parts tony so we can clarify and avoid those in=
 the text.=C2=A0</div>
<div><br>
</div>
<div>Andrew<br>
<blockquote type=3D"cite">
<div>
<div class=3D"m_-1367271727511106927WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">--- ton=
y<u></u><u></u></span></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</blockquote>
<blockquote type=3D"cite">
<div><span>______________________________<wbr>_________________</span><br>
<span>BIER mailing list</span><br>
<span><a href=3D"mailto:BIER@ietf.org" target=3D"_blank">BIER@ietf.org</a><=
/span><br>
<span><a href=3D"https://www.ietf.org/mailman/listinfo/bier" target=3D"_bla=
nk">https://www.ietf.org/mailman/<wbr>listinfo/bier</a></span><br>
</div>
</blockquote>
</div>
</div>

<br>______________________________<wbr>_________________<br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/bier</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div cla=
ss=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr">=
<div><span style=3D"font-size:12.8000001907349px"><font face=3D"georgia, se=
rif"><i>We=E2=80=99ve heard that a million monkeys at a million keyboards c=
ould produce the complete works of Shakespeare; now, thanks to the Internet=
, we know that is not true.</i></font></span><i><font face=3D"garamond, ser=
if"><br></font></i></div><div><span style=3D"font-size:12.8000001907349px">=
<font face=3D"times new roman, serif">=E2=80=94Robert Wilensky</font></span=
><br></div></div></div>
</div>

--f403045c28fa8a219905549414de--


From nobody Tue Jul 18 04:42:12 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id F350E131E05; Tue, 18 Jul 2017 04:41:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.56.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150037811595.11312.14458027006019154400@ietfa.amsl.com>
Date: Tue, 18 Jul 2017 04:41:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/DZE0IVVl_rdItKbKeKw86aHnt9A>
Subject: [Bier] I-D Action: draft-ietf-bier-pmmm-oam-02.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 11:41:56 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication of the IETF.

        Title           : Performance Measurement (PM) with Marking Method in Bit Index Explicit Replication (BIER) Layer
        Authors         : Greg Mirsky
                          Lianshu Zheng
                          Mach Chen
                          Giuseppe Fioccola
	Filename        : draft-ietf-bier-pmmm-oam-02.txt
	Pages           : 7
	Date            : 2017-07-18

Abstract:
   This document describes a hybrid performance measurement method for
   multicast service over Bit Index Explicit Replication (BIER) domain.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-pmmm-oam/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-pmmm-oam-02
https://datatracker.ietf.org/doc/html/draft-ietf-bier-pmmm-oam-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-pmmm-oam-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul 18 04:45:37 2017
Return-Path: <gregimirsky@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C54A1317BE for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 04:45:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cRQNFLfC4U6c for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 04:45:33 -0700 (PDT)
Received: from mail-qk0-x22e.google.com (mail-qk0-x22e.google.com [IPv6:2607:f8b0:400d:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2975513178E for <bier@ietf.org>; Tue, 18 Jul 2017 04:45:33 -0700 (PDT)
Received: by mail-qk0-x22e.google.com with SMTP id d136so13763635qkg.3 for <bier@ietf.org>; Tue, 18 Jul 2017 04:45:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=jl8eqifDyfnnaoJVl3qxPkh8Ef6p/aWEv/ced686gZ0=; b=qOo7UD3m7dyqyV8RN1IVV4IiPdEjplCZa/BZsyuApcgwkrKdIQ6+SiFsmBmi24LvTY Nv4+9Bor0OOdCHUGEZMW83dpxSz0wghBEwLC4HufZycTFu6E7TDHg4sLRHojAb7Mhfx6 oWpV+uQroogHJqr+2QSGfu9JER2K1enFOZ30uPLi/doRyyNH/dMdBNMTA25djwWVkUV4 +J7j/gsFJXoLw9lrEVt1Jo3UkgCGvOKE2cMz2l/RUQ+EsfSdnEVo0r0Xfhk/h0zaAai+ PgYJLQXQMDewfu2W0WbzpGbJxh//5FPF7woHZ3feS/jyoRHvAhz2IvY5LNzszzu0lLyZ owcg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=jl8eqifDyfnnaoJVl3qxPkh8Ef6p/aWEv/ced686gZ0=; b=LBzivqZOgimVv1OoNhd7ggeTl08JzFDyL1+AI5ya+vbjx2Cb/x4vI2trUpUz1PUogm 8vlPiqIypPl6E60yHmJURdJHJqX789ePt3fOYhKMpmqDB92O1TdXcHZCbi9DRX2lXGKe ZUKmCjg9iScK6QDVg6FFVJLsvLFw+v6LvcYJFPAGuHkPeipYwa8yfGk6vMS3hfYrqYH7 romM1jU6qvkiNlxVSYRE44yW0wGtcWpOI33fNkpnYyh7Ccz9yvOO4LtYftaFMSNW1qHf dt7+r8gJjyQkpF73MAssf7ialG5F11yjms7qUVD95+znzzDCsgdEPjrlSBds5xevvRTP l9TQ==
X-Gm-Message-State: AIVw112qZ+quEJq4TEqshq6YnFEYCcLIn0un8ZbQzemIjG3uz6aQxMQl Th6LoLG3VEqDZXamtEIyzZKS9VpRuA==
X-Received: by 10.55.82.139 with SMTP id g133mr1487514qkb.2.1500378331993; Tue, 18 Jul 2017 04:45:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.140.22.227 with HTTP; Tue, 18 Jul 2017 04:45:31 -0700 (PDT)
In-Reply-To: <150037811615.11312.15266738739684440220.idtracker@ietfa.amsl.com>
References: <150037811615.11312.15266738739684440220.idtracker@ietfa.amsl.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 18 Jul 2017 13:45:31 +0200
Message-ID: <CA+RyBmW=ZN-5AZzzLczY6c0OkkE7rLmpsymnQ4O0z5qBme1fXA@mail.gmail.com>
To: bier@ietf.org
Cc: Mach Chen <mach.chen@huawei.com>,  "Fioccola Giuseppe (giuseppe.fioccola@telecomitalia.it)" <giuseppe.fioccola@telecomitalia.it>, Vero Zheng <vero.zheng@huawei.com>
Content-Type: multipart/alternative; boundary="001a114a8daa81dc400554960d1e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/NWlMlEbL4Ta0cuvR7FY_fsGR1Sk>
Subject: [Bier] Fwd: New Version Notification for draft-ietf-bier-pmmm-oam-02.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 11:45:35 -0000

--001a114a8daa81dc400554960d1e
Content-Type: text/plain; charset="UTF-8"

Dear All,
updated characterization of the Alternate Marking Method to Hybrid,
resulting from our discussions at IPPM WG and with reference to RFC 7799.
The document is stable and we would ask WG for consideration of LCing.

Regards,
Greg

---------- Forwarded message ----------
From: <internet-drafts@ietf.org>
Date: Tue, Jul 18, 2017 at 1:41 PM
Subject: New Version Notification for draft-ietf-bier-pmmm-oam-02.txt
To: Mach Chen <mach.chen@huawei.com>, Gregory Mirsky <gregimirsky@gmail.com>,
Lianshu Zheng <vero.zheng@huawei.com>, Giuseppe Fioccola <
giuseppe.fioccola@telecomitalia.it>



A new version of I-D, draft-ietf-bier-pmmm-oam-02.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-ietf-bier-pmmm-oam
Revision:       02
Title:          Performance Measurement (PM) with Marking Method in Bit
Index Explicit Replication (BIER) Layer
Document date:  2017-07-18
Group:          bier
Pages:          7
URL:            https://www.ietf.org/internet-drafts/draft-ietf-bier-pmmm-
oam-02.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-bier-pmmm-oam/
Htmlized:       https://tools.ietf.org/html/draft-ietf-bier-pmmm-oam-02
Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-bier-pmmm-
oam-02
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-pmmm-oam-
02

Abstract:
   This document describes a hybrid performance measurement method for
   multicast service over Bit Index Explicit Replication (BIER) domain.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

--001a114a8daa81dc400554960d1e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear All,<div>updated characterization of the Alternate Ma=
rking Method to Hybrid, resulting from our discussions at IPPM WG and with =
reference to RFC 7799.</div><div>The document is stable and we would ask WG=
 for consideration of LCing.</div><div><br></div><div>Regards,</div><div>Gr=
eg</div><div><br><div class=3D"gmail_quote">---------- Forwarded message --=
--------<br>From: <b class=3D"gmail_sendername"></b> <span dir=3D"ltr">&lt;=
<a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt=
;</span><br>Date: Tue, Jul 18, 2017 at 1:41 PM<br>Subject: New Version Noti=
fication for draft-ietf-bier-pmmm-oam-02.txt<br>To: Mach Chen &lt;<a href=
=3D"mailto:mach.chen@huawei.com">mach.chen@huawei.com</a>&gt;, Gregory Mirs=
ky &lt;<a href=3D"mailto:gregimirsky@gmail.com">gregimirsky@gmail.com</a>&g=
t;, Lianshu Zheng &lt;<a href=3D"mailto:vero.zheng@huawei.com">vero.zheng@h=
uawei.com</a>&gt;, Giuseppe Fioccola &lt;<a href=3D"mailto:giuseppe.fioccol=
a@telecomitalia.it">giuseppe.fioccola@telecomitalia.it</a>&gt;<br><br><br><=
br>
A new version of I-D, draft-ietf-bier-pmmm-oam-02.<wbr>txt<br>
has been successfully submitted by Greg Mirsky and posted to the<br>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-ietf-bier-pmmm-oam<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A002<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Performance Measurement (PM) with =
Marking Method in Bit Index Explicit Replication (BIER) Layer<br>
Document date:=C2=A0 2017-07-18<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bier<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 7<br>
URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.o=
rg/internet-drafts/draft-ietf-bier-pmmm-oam-02.txt" rel=3D"noreferrer" targ=
et=3D"_blank">https://www.ietf.org/internet-<wbr>drafts/draft-ietf-bier-pmm=
m-<wbr>oam-02.txt</a><br>
Status:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.iet=
f.org/doc/draft-ietf-bier-pmmm-oam/" rel=3D"noreferrer" target=3D"_blank">h=
ttps://datatracker.ietf.org/<wbr>doc/draft-ietf-bier-pmmm-oam/</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
draft-ietf-bier-pmmm-oam-02" rel=3D"noreferrer" target=3D"_blank">https://t=
ools.ietf.org/html/<wbr>draft-ietf-bier-pmmm-oam-02</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.ietf.org=
/doc/html/draft-ietf-bier-pmmm-oam-02" rel=3D"noreferrer" target=3D"_blank"=
>https://datatracker.ietf.org/<wbr>doc/html/draft-ietf-bier-pmmm-<wbr>oam-0=
2</a><br>
Diff:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://www.ietf.o=
rg/rfcdiff?url2=3Ddraft-ietf-bier-pmmm-oam-02" rel=3D"noreferrer" target=3D=
"_blank">https://www.ietf.org/rfcdiff?<wbr>url2=3Ddraft-ietf-bier-pmmm-oam-=
<wbr>02</a><br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document describes a hybrid performance measurement metho=
d for<br>
=C2=A0 =C2=A0multicast service over Bit Index Explicit Replication (BIER) d=
omain.<br>
<br>
<br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
The IETF Secretariat<br>
<br>
</div><br></div></div>

--001a114a8daa81dc400554960d1e--


From nobody Tue Jul 18 13:20:20 2017
Return-Path: <erosen@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D06812EC23 for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 13:20:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.801
X-Spam-Level: 
X-Spam-Status: No, score=-4.801 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L3wkugBmIP0z for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 13:20:18 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0137.outbound.protection.outlook.com [104.47.36.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82768120721 for <bier@ietf.org>; Tue, 18 Jul 2017 13:20:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Qbb6yy4izJkpgxFrjlYT29eraykoo1BBcAB9PcamtL8=; b=jN0pBsQa3i5d9/dflUIRNxyA3LwCmOwnTuXricGaYDoo2Y45s5ruMviYsinObZZNkTESZAOtt/RARcJLHhhWKKAmAgU3dBo7q6XF+nXTo3SBDHSLVMkBnItVrCNEOU8Pm7WK67XL8LRkjirLHYBra2ynARorIA1xWQd0hitnPv8=
Authentication-Results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.32.91] (66.129.241.14) by BY2PR05MB2182.namprd05.prod.outlook.com (10.166.112.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Tue, 18 Jul 2017 20:20:15 +0000
To: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>, Antoni Przygienda <prz@juniper.net>
Cc: "bier@ietf.org" <bier@ietf.org>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
Date: Tue, 18 Jul 2017 16:20:12 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
Content-Type: multipart/alternative; boundary="------------686300F01902D80A02B67B63"
Content-Language: en-US
X-Originating-IP: [66.129.241.14]
X-ClientProxiedBy: DM5PR21CA0005.namprd21.prod.outlook.com (10.173.176.143) To BY2PR05MB2182.namprd05.prod.outlook.com (10.166.112.10)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3924538a-20db-4f3d-ce60-08d4ce1a67a6
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(48565401081)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BY2PR05MB2182; 
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2182; 3: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
X-MS-TrafficTypeDiagnostic: BY2PR05MB2182:
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2182; 25: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
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2182; 31:Hy2Z67sFeXS0Go+TbScICzsHAAH6yiZrnyop+Y8WkfHGAw20MtVefAqdGhvtA4hvucECnNK+1s/n1xN3gzofwONxxpn01Uoc10FURfJK/O4HgZFuGdpMQrKMyfDD5ibzWgCoSK9E/rd8s/3y1eRrq0U/J/Pqn96abrikQSdj+LNbWDeB5n90gIky8XNZbvouRiBrUz4zM0sXU7nqxecKYt1YBKe/MlOnpkgMLDJ6a6pSql+PTG4GZXSh8TG6qpCLKABXyBFZH6IO5wHzn85TMqWVhZd7qg9EMktjYSVye2yKUlxdFRmrjSgRea0KXj4Lmy+9QU/jgCzy1cpc4Q76E0vWZnWxEVBX4ibm0CLsafdrT0iAdzRKP1t94Jc0xkUabqQXyzhiRYFqxzhu3CBC2K0sw5mR8XAbcbM+9pq9JtWyC/FARA3Zu3eTKsjcLbv+5iNwkozaPmZz9+sxH6P+IYYBRXbMt9PO5c86PC/+lLcegwJTOBMqtAkyHJd9Yf+zkakaIyzy5UmCjLXsrzd5vdBKXAJ+u4mudInQuokfwFFrT+Czw2QiN7XiptOSUfqTCOptNnagCP2cmfMnf4938l9VG0nbEd5zQuXoDwMiMHpkEB+cWnn5nCMqszPR9YVrJpWgbJWeZbWTvBjwrm7lz/sd46oLrt0OvqQuGbVf+Ho=
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2182; 20: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
X-Exchange-Antispam-Report-Test: UriScan:(236129657087228)(48057245064654)(21532816269658); 
X-Microsoft-Antispam-PRVS: <BY2PR05MB21820CA23AC792F20C179A69D4A10@BY2PR05MB2182.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910075)(5005006)(8121501046)(3002001)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(6055026)(6041248)(20161123560025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123564025)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BY2PR05MB2182; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BY2PR05MB2182; 
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2PR05MB2182; 4:lhFXUfbiRfCFs0LoBkFDKlY92AgyiCdmUGXqdYBwSX?= =?us-ascii?Q?W6FjvWYsRxsFyF4B0Coam6aabDIB9jhUm6MuANDbkQSNwYUvX3VYkH/XVaGv?= =?us-ascii?Q?ijWwJ21AFY8rw4Lh7eHcc7D+5Gic+lofVK/Jd+hA2l1N3ubarud/ab4KBYi8?= =?us-ascii?Q?VBrH2rUEDzT3ekCRiEvkzGErSgBsytgtybLy+Nmt+ygnwoi6rSormIgbwU8w?= =?us-ascii?Q?D+9CLKDgFQvmnTV3U0an/1sCxwbdxu3gWmCiCnsga2SVrYRz0R5sqjzkNvAy?= =?us-ascii?Q?vXmn2hELqwmpkS5s8A/AXOcTCkPkCt2zWH6iNm3oUTjPYGLPqiS+p2O/Mf0g?= =?us-ascii?Q?TjLdloUtQhfbvOywhwdQ7lPer8EH2975/Sd04ZjRVFqRi5wsKQizd5oYR9cR?= =?us-ascii?Q?Sd5kmgKB2MOGXg+8pPeAPnlBI1vFgPOPK1ucU9pGhxOSIwjmZ3MyNFWKQUEN?= =?us-ascii?Q?vaZn1rf+1i8+mLGQS0Waily+EQ/j6dq3+pfuvw+iZiqlKj2EIe1Yv1fveH2q?= =?us-ascii?Q?cAPZRr4IzgFFUI7bMkj/wQumf4OsO/VDPpuhmntn7gNf3hnm0/mWErjersKz?= =?us-ascii?Q?ayR8eXHPvq4AUcCNit7AokkXE20xnpX9LMB0LtFuw1wf7sbiRpZWXPpsu3Z+?= =?us-ascii?Q?y5N4z7GBjZxvhZG9FYLceSU5Ojwr8XghvDXa4Tfei6xSYAT3jlhlKN8aSZvG?= =?us-ascii?Q?unt1y0kvXujsmfH3zMVNHGfyFPaP/e+MooEHh0tbHhj0Otk1E94zBpAU9OHI?= =?us-ascii?Q?VVAStp6YDs6+SasACsLJTQ620QbjqEX4zu5I0Ux7j0l5XzJ1f1dv+qYoEFf1?= =?us-ascii?Q?WDV9TSm1zHpBmqG6MtoO42Ktvuipdm3iD35pke+pkkQnFIghiSOz3Clw23ZI?= =?us-ascii?Q?v1PsTCwNIljz15GtXSF8GrFcKtruyM5Qc30moL3ZWVub5gDqLn/KCdZxxxKq?= =?us-ascii?Q?ZB+l/UbffcGr3uedHvUWstyGXJWJslrCJ1wcyLr1XKzJgAsRiGXyjaL+z5/o?= =?us-ascii?Q?77+aKtgLjZbSMyUL3sTxWtuibHuHgtTqXUGzEYCYDwkUnNOoohiU8rgcEwgW?= =?us-ascii?Q?8+c7QARELxTD14nVe+EJzlPDuz5qWUx0WV2AxbGUmhIBGJ5d7GE6Lvxg0QMQ?= =?us-ascii?Q?dR4Gzuw3hG6DNxRYaQOK6ISl3MBFLkJpYX4+wvQ/awAT0vy4QSgES3GZfL3v?= =?us-ascii?Q?xuSvVUfFKlGsbg3bOgo8lJuWpNpy19PVgqgnsj118+AXMlORf3Bol3JWSXkI?= =?us-ascii?Q?+q7MmohNUiNC6d8dvJh1F6Mzr702hdJO4mKB6Wuv0vMPde6RPK/IMUforZrJ?= =?us-ascii?Q?/EhIe6MR4Uj8k1bDY5SAA=3D?=
X-Forefront-PRVS: 037291602B
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(7370300001)(4630300001)(6009001)(6049001)(39850400002)(39410400002)(39400400002)(39450400003)(39840400002)(33646002)(65826007)(5660300001)(50986999)(478600001)(76176999)(54356999)(6246003)(77096006)(6486002)(65806001)(230783001)(66066001)(38730400002)(54896002)(53936002)(36756003)(7350300001)(7736002)(6116002)(84326002)(83506001)(5890100001)(2906002)(3846002)(561944003)(3260700006)(25786009)(31696002)(8676002)(86362001)(81166006)(4001350100001)(4326008)(189998001)(2950100002)(42186005)(64126003)(229853002)(31686004)(6666003)(6636002)(90366009); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR05MB2182; H:[172.29.32.91]; FPR:; SPF:None; MLV:sfv; LANG:en; 
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2PR05MB2182; 23:duNJM+4K8B4T2pt5NXxmx+wK5MCKOk9q/eH5uXyts?= =?us-ascii?Q?4vFf0S+oWtPFGsdJYYNstFNUOQvxAOBmp0dWnY37S+D2KPERFHOJ4DfC7OXG?= =?us-ascii?Q?907dHS1vRNvkKOHgJAV2xeSQ3Lbmp5DwpAqflpgPiVSY99pRsqUp/GHtw3Vw?= =?us-ascii?Q?Rrs5EHxnDfXYP9PUe6wz5ppJ79dQQT2oxpruSKw97bmsMsQZVzTZ0g2HUxVC?= =?us-ascii?Q?knJHZvACNye5JwSqOgVWx9v46W20x+KprwxI/LPIMBpxQMSe4avrivWH+Dfs?= =?us-ascii?Q?s9aT5AVA4r9WCHLcwy11oCzzZZ1BqhWss6kQq/Ols9cjG6NIurGVrxv2BWnk?= =?us-ascii?Q?lvNdN0LLBhow0K5DaQHPaRIXV4h9Nq/Rd08u9XJi8C8/GaagwrSyR+jrZnQd?= =?us-ascii?Q?swQGKKmyGxyMR+XITXFV0p+m324/tJhYTqzuvQCPQLkawAL4OL34SI+yZ4s7?= =?us-ascii?Q?LkScCvAuczaw8DYV1a1NuNqF1ZyHwrIz7FudE3iAr8UJJ5Q/L6isZFUhsj/5?= =?us-ascii?Q?nrQ3XHYDqXAvNHFI+1MeyUpEaFMQexTSL6j2GUorEMBcV6RyLNWcg426qNBQ?= =?us-ascii?Q?6VC3e0afI8yAq15k9rHEg3apa8bruKdpiOQSP7CfLhyXhEwQdpKfcWqy8C/Z?= =?us-ascii?Q?KrhBM2JfHN0LuE/fumrsKdjKXqeiF/iNIB/YXKjkRlQGyo9AHzKZy58Turxb?= =?us-ascii?Q?0OF6T/TN5+TiSHSVIb2sZ88igCPhRLOT9/eB2h35Akjc4G8xY+MYtWLCXH/O?= =?us-ascii?Q?Y3DY9cyisul9GHa4MCjlPC53yE4TgFm+SGJzgE5/01m51PUXv0dEvtqJsjR0?= =?us-ascii?Q?RM70ObexItbuWDyrhS1Ket0PZu43BFct/YPYNpLGgeubXHlnFwjr5OYHremb?= =?us-ascii?Q?V9v8S8sDL6gbZ9WGUDesSJvo5iSpS9hqQnEHa7lqXRUM4HbKiFhn/XQM+2Tf?= =?us-ascii?Q?wrHtClVtx4xqDdbndzrqHybk6uqervQGcQe8HzXKqwid12M/s4qY1r3uswoM?= =?us-ascii?Q?FdOdWGi9Zwem4ZAxL6W9z7CUMGz2ywLCNzAjhYwczWN++Dtao1kQ/YHljn+k?= =?us-ascii?Q?r0ZmPWgzXJDQEkayyScRCH9QCDlWjb53Ehw89hOGLRmljoxst1p2ZHYMKitA?= =?us-ascii?Q?DOekOfKJLRv6jDnY1wDfF3NvfpX2CYznxQ1d03L5aPxUBmGh2STSqOX5zYeN?= =?us-ascii?Q?UFjV6vQtPQwsJ5QBh+KNnpIWmQlwNqKL7YpgDxnfdJlyE/JJ5E8PIQh7czx9?= =?us-ascii?Q?Iw7siAGlGi1ILHC/BSEYFg2rS8yEj1FXNwcA5MfH4oPs1Da18ERymrTFEW8J?= =?us-ascii?Q?y0oAd8zwvKlx9HlWXM0UdI=3D?=
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2PR05MB2182; 6:6G7q3ydnB2yLguYBhm2a9H/MDE253uASaEhQE5UPAK?= =?us-ascii?Q?niMAkzr8enA69wP7pB6tzTyJ3Z3sC8pC/3zAlq3hiBlBFG+wgIkzu3drCpQj?= =?us-ascii?Q?fSrhlonwCJFTJAKYsitH3p8gQoGxGrIaPwnuPKD9Rj51EIt1ATfIPd5H8GVN?= =?us-ascii?Q?YXXWkVKkSFtjths5cBcyMcH7CrAAy6PGLFjAWhpj8RVVlovwGicC2Mva+0zM?= =?us-ascii?Q?geE4vvQqDMsWo0mClWotFQnDmydAypmsG61XOXLpsUIB+NQvcSdEG4RvMvbj?= =?us-ascii?Q?H1sl5BpHZZUe1WZ4QpNE72ClR9vT9vBRzwPDR8WljYOj2ZH2bwCihr3BWKdZ?= =?us-ascii?Q?fiOAt4o7Nwi3VJZWPxMzIUWGHbbx4HfvAkMC6vvN200vvGGOt0T0HL+/Bi8H?= =?us-ascii?Q?1/Mv+byy4mZLMj+WYAtpWthDHQ44vSXaUunT8AYiyFDwO5zZflH02P9nFi1K?= =?us-ascii?Q?+uCteI0EnDQSsu4U7etX1a4RW1mnp3Z13ShN+VQNUUIQXI7K3WPz7oRGdIyZ?= =?us-ascii?Q?0Dhn7VVvGbLtYjqhw1v2eXhgYn6ia5sUWqQL7DBfznA14tokZm36bb/GQOc3?= =?us-ascii?Q?kFcMLLHNIDWCM05dBnLHHcX6faDh/3E6Nf+jz9tVl4kMjBYyQ+89pLriEjjd?= =?us-ascii?Q?QnrV1br1Wlgo6hhR3b4DPJUmkHehUox2wen3YZcpx2YH0gW7SbSwMRQ7a45+?= =?us-ascii?Q?cQNJSaxjfGHf5UjsDDeV6lxiMULp+f0QXVB0olznYm6FWiYeumke7hLfEkou?= =?us-ascii?Q?iCD7mTtCiaGqwHPTsJ+3DEVNcqcRVlVOgkenDMmJYljVcBELg1KVdV9G3gkk?= =?us-ascii?Q?nb8+zFVnEPgmtia9vzuY86jXWSF7fSUVwX8qwL1WoPxr/rWycl2uCGiQp1g8?= =?us-ascii?Q?iV20fSFwbiYc88BvKV8wvz3r6J7EJttXLrdCgLGqpi/TnWVxYTn/VumsRQ7T?= =?us-ascii?Q?pZS2490l9PsHT36HR+uh02r4rRnSloiyAWspj4Jbt2vvX8qm/ai7OSUgk2XM?= =?us-ascii?Q?3s0z0CQS24S1mdz1rfsEqb?=
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2182; 5: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; 24:0yJ6GtyWeA2UZSuvpIt3HNUeCzrovydgAI1yx617pdgXrrL6S8k3MD9DAGiGcPDTwALh5UAGjrbGf/Kn50yE/3VApRUprpT+TEzxshWA/go=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2182; 7: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
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Jul 2017 20:20:15.9851 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR05MB2182
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/rUWk8kOTLUD3SQTEA_vmq2ReBDc>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 20:20:20 -0000

This is a multi-part message in MIME format.
--------------686300F01902D80A02B67B63
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Andrew>  The solution we are targeting runs Rosen MVPN in the core. And 
yes SSM is our main target.

As I said in my message of July 3, it seems to me that what you are 
trying to do is to use BIER to create an NBMA network attaching a set of 
PIM routers.  Unless i'm missing the point, the makes your proposal 
independent of the application.  What you need to do is make sure all 
the PIM link procedures will run correctly on the NBMA network.  I don't 
see why ASM is a particular problem.

Andrew> There are two goals:
Andrew> - Stay with a single SI to avoid packet duplication in a core 
due to a scale.

The BIER domain would certainly be easier to bound in size if it only 
includes the set of PIM neighbors on the NBMA "link".  But I don't think 
anything in your proposal is incompatible with the use of multiple Sets.

Andrew> - Intro BIER in the core without a need to touch access domains 
- evolutionary intro of BIER.

There are other possible approaches as well.

If an application supports "segmented tunnels" (such as NG-MVPN does), 
it's not too hard to have a "BIER segment" across the core while using 
other multicast protocols (or ingress replication) in the access areas.

Another approach is to use NG-MVPN Global Table Multicast (RFC 7716) 
across the core (instead of PIM), in which case you can use BIER as the 
"tunnel type' across the core, without requiring core nodes to send PIM 
messages to each other.  Note that the default MDTs and data MDTs of 
"rosen mvpn" are global table multicasts, and GTM is easily used to 
connect multiple PIM areas together.  So this would be a feasible 
technique for doing "rosen mvpn" at the edges with BIER in the core.  
Which technique is better under which circumstances could be explored.

Tony> We do not need to burn a protocol bit for PIM

I agree with Tony that there doesn't seem to be any need for the Proto 
field to be "PIM" rather than "IPv4" or "IPv6".   (At least, no 
architectural reason.  In the implementation, perhaps this would be the 
trigger that caused the hardware to associate the packet with an 
"incoming interface" of "BIER" ;-)  If so, we'd have to explore that a 
bit deeper.)

Tony> The whole “RPF SPF lookup” in 3.1 for (S,G) joins will not work in 
general

Well, this is the usual problem of how do you find the "upstream 
multicast hop" when the multicast routing neighbors are not also unicast 
routing neighbors.  Generally the solution to this problem will depend 
upon the unicast routing environment.



--------------686300F01902D80A02B67B63
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p><font color="#3366ff">Andrew&gt;  The solution we are targeting
        runs Rosen MVPN in the core. And yes SSM is our main target. </font><br>
    </p>
    <p>As I said in my message of July 3, it seems to me that what you
      are trying to do is to use BIER to create an NBMA network
      attaching a set of PIM routers.  Unless i'm missing the point, the
      makes your proposal independent of the application.  What you need
      to do is make sure all the PIM link procedures will run correctly
      on the NBMA network.  I don't see why ASM is a particular problem.<br>
    </p>
    <p><font color="#3366ff">Andrew&gt; There are two goals:<br>
        Andrew&gt; - Stay with a single SI to avoid packet duplication
        in a core due to a scale. </font><br>
    </p>
    <p>The BIER domain would certainly be easier to bound in size if it
      only includes the set of PIM neighbors on the NBMA "link".  But I
      don't think anything in your proposal is incompatible with the use
      of multiple Sets.<br>
    </p>
    <p><font color="#3366ff">Andrew&gt; - Intro BIER in the core without
        a need to touch access domains - evolutionary intro of BIER.</font></p>
    <p>There are other possible approaches as well.<br>
    </p>
    If an application supports "segmented tunnels" (such as NG-MVPN
    does), it's not too hard to have a "BIER segment" across the core
    while using other multicast protocols (or ingress replication) in
    the access areas.<br>
    <br>
    Another approach is to use NG-MVPN Global Table Multicast (RFC 7716)
    across the core (instead of PIM), in which case you can use BIER as
    the "tunnel type' across the core, without requiring core nodes to
    send PIM messages to each other.  Note that the default MDTs and
    data MDTs of "rosen mvpn" are global table multicasts, and GTM is
    easily used to connect multiple PIM areas together.  So this would
    be a feasible technique for doing "rosen mvpn" at the edges with
    BIER in the core.  Which technique is better under which
    circumstances could be explored.<br>
    <br>
    <font color="#990000">Tony&gt; We do not need to burn a protocol bit
      for PIM</font><br>
    <br>
    I agree with Tony that there doesn't seem to be any need for the
    Proto field to be "PIM" rather than "IPv4" or "IPv6".   (At least,
    no architectural reason.  In the implementation, perhaps this would
    be the trigger that caused the hardware to associate the packet with
    an "incoming interface" of "BIER" ;-)  If so, we'd have to explore
    that a bit deeper.)<br>
    <br>
    <font color="#990000">Tony&gt; The whole “RPF SPF lookup” in 3.1 for
      (S,G) joins will not work in general<br>
    </font><br>
    Well, this is the usual problem of how do you find the "upstream
    multicast hop" when the multicast routing neighbors are not also
    unicast routing neighbors.  Generally the solution to this problem
    will depend upon the unicast routing environment.<br>
    <br>
    <br>
  </body>
</html>

--------------686300F01902D80A02B67B63--


From nobody Tue Jul 18 13:35:07 2017
Return-Path: <hooman.bidgoli@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EF38131899 for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 13:35:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B6z2uuybu43D for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 13:35:02 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0095.outbound.protection.outlook.com [104.47.1.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B46D13170E for <bier@ietf.org>; Tue, 18 Jul 2017 13:35:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/gqsYDmn+0vMGdqbEhHBr8eMyxLGgklh3QYqUBVp5T0=; b=SC2XuEI1I/vcdZ+INHdmx9dGcva2ykR5nQaDZ3Wh0AmUVVzHYLkv2NGGixyWddco75+Xs0b4fAC2RgQoQ5v9SevIJzJ/lpIPzcS/UuZbD16I1MB5yWjxgefwr7qONuFNfw6PmSP+BmYDv6iGoTfruE31HWE9v+IkiFAXa8in7pI=
Received: from VI1PR0701MB2351.eurprd07.prod.outlook.com (10.168.137.146) by VI1PR0701MB2461.eurprd07.prod.outlook.com (10.168.139.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Tue, 18 Jul 2017 20:34:59 +0000
Received: from VI1PR0701MB2351.eurprd07.prod.outlook.com ([fe80::8cae:e518:86d0:2d60]) by VI1PR0701MB2351.eurprd07.prod.outlook.com ([fe80::8cae:e518:86d0:2d60%14]) with mapi id 15.01.1282.011; Tue, 18 Jul 2017 20:34:58 +0000
From: "Bidgoli, Hooman (Nokia - CA/Ottawa)" <hooman.bidgoli@nokia.com>
To: Eric C Rosen <erosen@juniper.net>, "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>, Antoni Przygienda <prz@juniper.net>
CC: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZKJZUqQ7gAC5AACAAAJ6kA==
Date: Tue, 18 Jul 2017 20:34:58 +0000
Message-ID: <VI1PR0701MB23519C31545ED037E241C44C91A10@VI1PR0701MB2351.eurprd07.prod.outlook.com>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com> <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
In-Reply-To: <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [135.245.20.3]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0701MB2461; 7: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
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(6009001)(39840400002)(39410400002)(39450400003)(39860400002)(39400400002)(39850400002)(377454003)(9686003)(6246003)(54896002)(5890100001)(6306002)(2906002)(55016002)(3660700001)(25786009)(99286003)(4326008)(478600001)(5660300001)(50986999)(8936002)(229853002)(8666007)(2950100002)(3280700002)(38730400002)(7736002)(5250100002)(2900100001)(230783001)(6506006)(53936002)(6436002)(102836003)(7696004)(790700001)(6116002)(74316002)(86362001)(8676002)(3846002)(14454004)(53546010)(33656002)(189998001)(81166006)(54356999)(76176999)(66066001)(561944003); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR0701MB2461; H:VI1PR0701MB2351.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
x-ms-office365-filtering-correlation-id: 538c501e-60b6-4077-615f-08d4ce1c755b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:VI1PR0701MB2461; 
x-ms-traffictypediagnostic: VI1PR0701MB2461:
x-exchange-antispam-report-test: UriScan:(151999592597050)(26388249023172)(236129657087228)(138986009662008)(82608151540597)(48057245064654)(148574349560750)(21748063052155)(21532816269658);
x-microsoft-antispam-prvs: <VI1PR0701MB24612BCEE9C6A56F5441F1E891A10@VI1PR0701MB2461.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(2017060910075)(8121501046)(3002001)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(6055026)(6041248)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123555025)(20161123562025)(20161123564025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:VI1PR0701MB2461; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:VI1PR0701MB2461; 
x-forefront-prvs: 037291602B
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0701MB23519C31545ED037E241C44C91A10VI1PR0701MB2351_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 20:34:58.7349 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2461
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/KXrmoQZL_8xB7tDsr-aD_XzBgTU>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 20:35:05 -0000

--_000_VI1PR0701MB23519C31545ED037E241C44C91A10VI1PR0701MB2351_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0701MB23519C31545ED037E241C44C91A10VI1PR0701MB2351_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0701MB23519C31545ED037E241C44C91A10VI1PR0701MB2351_--


From nobody Tue Jul 18 14:21:35 2017
Return-Path: <erosen@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAE8B131A6E for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 14:21:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.001
X-Spam-Level: 
X-Spam-Status: No, score=-3.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8QP1tHroUUe8 for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 14:21:31 -0700 (PDT)
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0129.outbound.protection.outlook.com [104.47.41.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D79212F29A for <bier@ietf.org>; Tue, 18 Jul 2017 14:21:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=4WVdljEMb3TQ8/edqJc6P9LwnMScJo+4u/H71R8nR5Y=; b=bQuMyYyOMnQSfsidoiuhAwPXw2IBhMhDbdf8D9CtJPYggLeXuhenUAL8gLRsLi4SGsSX3i8HHJUI8hdM9vHfOeHFOn052dsSLURFLJm+xKjIQ5HmkqoydexkWsrRo9Kp2h576qnPMTP58u3UZGPlSdKDdGTzj3fFjtj/Hhzn70Q=
Authentication-Results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.32.91] (66.129.241.14) by SN1PR05MB2191.namprd05.prod.outlook.com (10.169.124.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Tue, 18 Jul 2017 21:21:29 +0000
To: "Bidgoli, Hooman (Nokia - CA/Ottawa)" <hooman.bidgoli@nokia.com>, "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>, Antoni Przygienda <prz@juniper.net>
Cc: "bier@ietf.org" <bier@ietf.org>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com> <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net> <VI1PR0701MB23519C31545ED037E241C44C91A10@VI1PR0701MB2351.eurprd07.prod.outlook.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <d1b2d87a-a2f7-5506-cfc5-2a06dffbd291@juniper.net>
Date: Tue, 18 Jul 2017 17:21:25 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <VI1PR0701MB23519C31545ED037E241C44C91A10@VI1PR0701MB2351.eurprd07.prod.outlook.com>
Content-Type: multipart/alternative; boundary="------------2ECF5B6F2549ADF75B74175B"
Content-Language: en-US
X-Originating-IP: [66.129.241.14]
X-ClientProxiedBy: BN6PR1301CA0008.namprd13.prod.outlook.com (10.174.84.149) To SN1PR05MB2191.namprd05.prod.outlook.com (10.169.124.139)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0e4195e8-8fb2-48db-ea4a-08d4ce22f4dc
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(48565401081)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:SN1PR05MB2191; 
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2191; 3: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
X-MS-TrafficTypeDiagnostic: SN1PR05MB2191:
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2191; 25: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
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2191; 31: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
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2191; 20: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
X-Exchange-Antispam-Report-Test: UriScan:(236129657087228)(189930954265078)(48057245064654)(49204369933175)(247924648384137)(164587983369549);
X-Microsoft-Antispam-PRVS: <SN1PR05MB2191BB3F47B68C50DBD36C9DD4A10@SN1PR05MB2191.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(10201501046)(93006095)(93001095)(3002001)(100000703101)(100105400095)(6055026)(6041248)(20161123560025)(20161123555025)(20161123562025)(20161123564025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:SN1PR05MB2191; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:SN1PR05MB2191; 
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR05MB2191; 4:vRqYRB7jq0TanZe/HZcyL+eW3c0yZ2pdI4RQh3IQwZ?= =?us-ascii?Q?Hm8FGzuYR9TEMsVsH9gEYPh3NQuJOQU216+mYBymHZXBvMpHasIkyv6/t6QO?= =?us-ascii?Q?s9bRAyMF/07zRNothiaPJMNk4XV3OxUHFPQUaY9wCjqPipnlJnDSU11CWVIf?= =?us-ascii?Q?pf7kaLszI5XhFOKFVVP9SNBKHOrA4TE5NfQe+o69YQvtfZNSz0GJQ4DOKV8y?= =?us-ascii?Q?q690k2TySoDjQrYGdaIGSwHQCk5WsT5qOejlJolDge6VVOeIis4Y88tklh+6?= =?us-ascii?Q?9c86QZlJC6wLjdnflA4RnGDkmzfJXCugnueuJpIx4y9eWr8j/hfIgo3PV5lX?= =?us-ascii?Q?ab00Z/wQJ7uy01GfJ8NPEVNUTSCqPeK7y8sjPMFbJhhHWPOHVeHEvrOqvpVG?= =?us-ascii?Q?q3cVRhCQgrVMc3GBOCvLVEhv0/bDasBRSKxy0KfrGQQzFBO/mjh1jQjIueMJ?= =?us-ascii?Q?iUJNewDMgtlO/VGYtnRdKzpJO3jGVfDnFkRFhKVgrQbNzHuseyvh2gtvXE/d?= =?us-ascii?Q?AlLAHv8uPpfa7M57riJsvJGBGFoafYmdMoB8b+dd1G8JedrSM47G08C7O5pw?= =?us-ascii?Q?RyEHnAItWF5mqAbloN50jdSfqUFEYEla8pEz3pZc7CNxFbT2GYcyCPfp9RpQ?= =?us-ascii?Q?U/0U10Xo1hh2meGrp8aTDF7ZOB8yLE0uoF5IOhO22cl5O6qnUEnlZmkX/ERF?= =?us-ascii?Q?2wB0tW7zi9tUgwSircSxvScCnXDlTapIrW3K5Fi2tN42kKfnIM6LuERhpypL?= =?us-ascii?Q?4BC+C0f36KLmsmTBL44n2pXQBNgd+n2aFaqC0vARdw2q75P3Zd1018e8i9iC?= =?us-ascii?Q?4yfL0wFslqkRCD6fEDXuAk9QfN7soo7iYiyZQAnF5Kew3awlZWx/O5UkEDn9?= =?us-ascii?Q?yxh4oc/KNwlrOmurT3f7xJ5uMDfGaBZ2Ypm0vQk0yhWrKyTpARQNC6ARAEFO?= =?us-ascii?Q?pmf3VW1/Ml1tCcao82kKAYXWPxmNK9l//lsnRRWYALz1wxdqphh/4sGvBdSm?= =?us-ascii?Q?npHVd3Gs5ehE1wbWsSQ5wxvekBSLFBDrbewk4LmRJfrScz0BeM3pBWr3HK6J?= =?us-ascii?Q?i482dsHlhRTJz59VUcaE+fGlBkrc2KygLs4glbA5kcMUc2OlaRw7/bCf2OY9?= =?us-ascii?Q?+VViCiZBK505lT+pz32YRKAn+98Pd7rJJqoPeHIvd2cnYvD6lw19dSGwFaXw?= =?us-ascii?Q?xpogcg4r+NCLGXaTdEbHAfK1czhsa1NHA+Dj+q6WSsL6BIP1ajzPoilrptbu?= =?us-ascii?Q?5bXgogd55TsDcySUIWiHgrNsk+cG/yRduUggE+USy0dkTJvPUTc/vxOePMBG?= =?us-ascii?Q?NkAA4X5pcowqX384DiQFFBPk1R1iwPi/vCmP591LVkuOfKrFUJdggjHxLey/?= =?us-ascii?Q?TCqUbyxZfwlXgcbzl9EZ+skVLgWAr5CMmzoPasHTh2Gxl/W91yNHOlTuscxa?= =?us-ascii?Q?S+4Wv7jQ=3D=3D?=
X-Forefront-PRVS: 037291602B
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(7370300001)(4630300001)(6009001)(6049001)(39410400002)(39850400002)(39400400002)(39840400002)(39860400002)(39450400003)(377454003)(24454002)(6486002)(90366009)(31686004)(53546010)(7350300001)(77096006)(54356999)(189998001)(31696002)(4326008)(229853002)(76176999)(50986999)(2906002)(33646002)(64126003)(36756003)(93886004)(81166006)(86362001)(478600001)(6116002)(8676002)(54896002)(3846002)(7736002)(270700001)(53936002)(83506001)(230783001)(84326002)(42186005)(5660300001)(6636002)(6246003)(65826007)(2950100002)(65806001)(66066001)(6666003)(38730400002)(25786009)(3260700006)(4001350100001); DIR:OUT; SFP:1102; SCL:1; SRVR:SN1PR05MB2191; H:[172.29.32.91]; FPR:; SPF:None; MLV:sfv; LANG:en; 
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR05MB2191; 23:D5zoXdcuong+BtNFjZnDzS9keMbrRC5ibqUgkko1M?= =?us-ascii?Q?1uBJyx5P4EWcB82o0Bn+g8PPx608EXjmLyqNY3Z//i+25Fr1UtYyrv7p7+nx?= =?us-ascii?Q?ginTIsQ+9ccivgGQbCsCoVLVcHUttBBstrWrj3wkVH5ISe63FMZBGxEibfwA?= =?us-ascii?Q?+ACTC4ojIo5YOrRVX7FSm+y5Fw4r7HOufJWhC4BEWF5RTbHlCPTeUy9WXvL6?= =?us-ascii?Q?re9PMO5xGtcZCE2rJ+z68C8uxnq7/cFs4FT0hfGz1LWqBXzJRK0NS6DofUBw?= =?us-ascii?Q?AOFNHnLoZK/pY0xcXkOxLoEZRu7XDC3CECAwdhMFh3JGMeTUsTyZZ8iktlQE?= =?us-ascii?Q?CcHD1WX63Lap5tcuc+tWfbFbekamc7gw13cp+vEQGJ31P12RhDjN9b4JUE1T?= =?us-ascii?Q?b5H5/YqrtLKKZ7MYsqQOFHL1yelLJHBy2IM5YZ0zaEKP+qw7mjPKzYyWiI0T?= =?us-ascii?Q?62PMXuYc2Po0FZYRFGjzWQeT9JfARc3KPcq301cfBzdFBSF0T/Co3QiWDZ7J?= =?us-ascii?Q?qKPG8nXoaqsIwqGIvgTJTei201XQBHIplWHWqQPkmj/9mAuX1Uqp3nd0XZUb?= =?us-ascii?Q?ZEAUUs84RLEmnUJPGNRle9W60hQp/SyEECNcYIUtO3OJonKpLjcuDP2AP/m2?= =?us-ascii?Q?WS07t0CIiOf9Yik8QP5FWGrkSfBnm0Tpca/T7yUTWUMuEYmFcVQdMCgmV1r3?= =?us-ascii?Q?RyhIjh85XeJtpupDfhUp8eKLHwCVTbt59T10wC14DXJ2A3O56YhRI0ivMn/F?= =?us-ascii?Q?6HBj+T0CLwP7kmeG3IvHfDzv3TeFZUfdM6EjAuFswlZpZEhu/EF8nX4F7CVs?= =?us-ascii?Q?GvnIZ3vmKj69BdBhKfcY4MX1D2eUermaBxpzlMWBUFVk8s4PmJqseX0X1ZA1?= =?us-ascii?Q?XZbEbsAM91EcMvdb447t2mg5tyU0UMgi852NcngM9zkOdlPmQsrAlTUQItK7?= =?us-ascii?Q?4K+YK28O5br/sH1dtfdRhyixLA9SX6/BpZ/+e1DfzM/fstCeAoNcMcBbWdyg?= =?us-ascii?Q?1FBQUu/lZP0GjHl4/gQnxzATDfTjrllWEI2P5IIK1lSSDdRk98xcyu9N+6GC?= =?us-ascii?Q?nZIv7niq/JyhQSuow4E9WAmumJuehZbzmAFpShp3KSIEKYI3Etj7bjL7ydz2?= =?us-ascii?Q?JU3sVJCn2GJXDBPJM7qVfXKpYStHSQDNSKmq+bQMT16NgOjaAyJITJ6iViWX?= =?us-ascii?Q?gnRei1mTl/tBMKC19VSMgs4OTmJ0JBwXpOn7NwNbrLyy+tp+sVvwHtySinC8?= =?us-ascii?Q?PY4TW7TPCeSlmIGFeOcQbh/uj6eavoD/LP68i4qWN/aak5IFsAurEGQxZjGZ?= =?us-ascii?Q?AvziMJngCNnkwBsuAW36AGoK6LOosdZroFI5Fxi66fgpn0mlmaW4fvhUDK4d?= =?us-ascii?Q?TVduTtV6Hx2jgkxyyvkd2tCsmakDmIXfpeF3s8weZygtUd/?=
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR05MB2191; 6:SJoV0BIxjjecAOuenP4sOGYB7SvOHZ5XVu9hIa73XB?= =?us-ascii?Q?SmSKjlGUcxPa8+/DptKQUySKfq3t3szdEvvssmkVHUkCFW2KUvpgEEn3kcjc?= =?us-ascii?Q?1baCdCss9/JQDNNMNNnPGoUqxVRbz1jgpWbPXiwZjrEiNgVqDqASihGfvCnx?= =?us-ascii?Q?lc5pj+iV3vtyB8OM0smelu3fpC4TAky4EjK6lhrfhS8Me92Zt04XoDbdLvQx?= =?us-ascii?Q?zAC6CEz10JeprUL3tAHkdeScJ2jtL+icwaDGFP89QCZvSI2hzpVNKaKsiQLb?= =?us-ascii?Q?71ZgvCzCEM1vcSqz4an6hignD3dUPa/ZSlDNbFMfWIRLnmkQiytlqrYSQUAE?= =?us-ascii?Q?9fkrvsZroOre53sAaFTa6Th2Bc/eAH9cvQrNuR45/WF7OKq9zFUtVFBuIISw?= =?us-ascii?Q?KI11OSHA7Ec91ojXst0P9IjpBfDGZmftJu3RhVW+PycloXzKz9S3sMyURS7h?= =?us-ascii?Q?fmuzNR6esJ9JMiDJWXIvjCgIb8Ve/hzyBGaI1c25VrLW+krW5y7hh9ZDSrLt?= =?us-ascii?Q?P5RhM4bUZgk+vZ73q0xf7/UIfX6wgI9OPuCguZiUgiIRnHQOonJoLjwnOjjL?= =?us-ascii?Q?gxs1FSA/oP/2tXW7OSimmkqN156P3smfMuYTSRxDJyxT0kcNy5LQDC2clK/d?= =?us-ascii?Q?XP9UGZRkyMqXXzwNbnnyJ6ngmEAZdZSTVP6HD61/XX+d4lNba50L9iRxDLmm?= =?us-ascii?Q?jJKLSzb+FU9weJqd9n2TyCSu7pgGlnxacdV5/MXbcqXnBdMgvTrGY20fBVXG?= =?us-ascii?Q?WtLBLzY9H0QE3V2ddFQy5Piz9qHBXhCzSzPxKU2WPk7bsInZ97QjNstMlLVT?= =?us-ascii?Q?r6A2u3J6SE1SK3gftHp7oh/9zHj4CATZmcOsbKgFDdvMWsBhT9VfhnkVcSeT?= =?us-ascii?Q?Nf71Gkolxsa5S4wodwgxgpFdJT36WvOodiH3TiUbLwNQqyoJ4rkZujLqaK5f?= =?us-ascii?Q?fp2OOkXu2mCYPTkfvvgGY2dAySUHmQEzPM3hOACk/1v+jYGMZzuczXAx7dbz?= =?us-ascii?Q?zp/Xq2lmvc0+0RG2+TOqne?=
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2191; 5: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; 24:fuK4IHo7tjzb1hpHpCV9U8Csr8XOy2oTabBXkqfu/xE0Mx7C0Fc16Mw4n291ccAN40iZIKwFp0JIUFRPgAIFIJW5Wf+yzaSID7C9GizkzlY=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2191; 7:txsDN8nGfHULem3fo7kr3cNqJNNhfPeTOp/dzy2iaSyLxLNA0a7oVgQIncklvD0n6rR1Rf5gaYYCuuvkxf+4HmQYIsCBCBoT7H3g2poAxO+vM4PI6k8ovxjwKYAM69HA161hw3M1BOXiRrr3KHApVT/shn9+kGaHXCmybIeKqA2+stgJOIF0J2dhUhJv3DFtfXvVoqL5kLP1cNnutILpw8llEKEmsOzmwlxLv+YhCn574Y3Mnb3cPF+EoQGUgmzOLVw6301VyJCEnsjzOaHHfLUs6El2pGlY3QEJWU7Q8NBn/jxWGWHct3PQpAjX1RfQbXXEJ+osCqhG65FbFuSv2T65rGNWkTLFiw9/ZMNmC7/pzgAHrMrI6i5pcDcL4wVXGen68tg4hCAVNiqltG7uVclu4y54vP3jJWdlKJs4mxmOP1oHSERP+iSuI47mLdcAza9XwaaJuKpmC/0DV4tvfEnNupv5/bOmPfqoO9wmu/W/MHPwzF2y2tNYhZxCicCthio4+s/qgQZ1s9zYGm0O6W8bAPY7DnUQhRTu//v6igkionMaxfO87jbGfRIWp7Mk4tRtbbA1A9SvnZ82IjEPix6fnV1gr8JUrf4/flKxA8qHorxBYerg791186triwb81hULkI65O96IIMSlBerC21l+gtaMon45hZisWsh8dHKwNWTdhTr/sGoz6vJQ48kSivx/guM/pe9VOWA8NqMa0xzacWFRJz02x6vplawGKaOP1aKPdPjt+hpRFgELuE0hCPG+otM45bZcGQ0e1jXZN8GZCEzpvOCgc/vW9NMJKGU=
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Jul 2017 21:21:29.1535 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR05MB2191
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/2RAeezxsk_JsxWhS0bAkT4yJ_XM>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 21:21:34 -0000

This is a multi-part message in MIME format.
--------------2ECF5B6F2549ADF75B74175B
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

On 7/18/2017 4:34 PM, Bidgoli, Hooman (Nokia - CA/Ottawa) wrote:
> We are not trying to create a PIM adjacency via BIER. It is more like 
> mLDP tunneling concept.

By "mLDP tunneling concept" are you referring to mLDP "in-band 
signaling" (RFC6826)?

If you are sending PIM Join/Prune messages from one router to another, 
then the routers are PIM adjacencies, and I don't see how you can avoid 
treating them as such.
This does raise a lot of issues -- what if the Join has Join attributes 
in it, how can you tell what Join attributes are supported unless you 
have Hellos, etc.  Also, by carrying PIM Join/Prune messages, you retain 
the issues that come from periodic retransmission of the Join/Prune 
messages.

mLDP in-band signaling doesn't carry PIM Join/Prune messages, it just 
carries the (S,G) information.  It does have some ASM issues because 
there is no "prune this source off the shared tree" operation.  Or to 
put it another way: mLDP in-band signaling does not tunnel PIM over 
mLDP, it splices several PIM trees together with a P2MP LSP.   If you 
want your scheme to function like mLDP in-band signaling, you need to 
say a lot more about how the BIER-PIM Join/Prune messages are 
constructed and how they are processed.

That would be a less general solution than using BIER  to emulate a 
link.  It would also need to be compared to other forms of overlay 
signaling such as MVPN-based GTM.

> love to have a face to face chat before the session. 

Unfortunately I am not in Prague.

--------------2ECF5B6F2549ADF75B74175B
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    On 7/18/2017 4:34 PM, Bidgoli, Hooman (Nokia - CA/Ottawa) wrote:<br>
    <blockquote type="cite"
cite="mid:VI1PR0701MB23519C31545ED037E241C44C91A10@VI1PR0701MB2351.eurprd07.prod.outlook.com"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:windowtext">We
        are not trying to create a PIM adjacency via BIER. It is more
        like mLDP tunneling concept.</span></blockquote>
    <br>
    By "mLDP tunneling concept" are you referring to mLDP "in-band
    signaling" (RFC6826)?<br>
    <br>
    If you are sending PIM Join/Prune messages from one router to
    another, then the routers are PIM adjacencies, and I don't see how
    you can avoid treating them as such.<br>
    This does raise a lot of issues -- what if the Join has Join
    attributes in it, how can you tell what Join attributes are
    supported unless you have Hellos, etc.  Also, by carrying PIM
    Join/Prune messages, you retain the issues that come from periodic
    retransmission of the Join/Prune messages.<br>
    <br>
    mLDP in-band signaling doesn't carry PIM Join/Prune messages, it
    just carries the (S,G) information.  It does have some ASM issues
    because there is no "prune this source off the shared tree"
    operation.  Or to put it another way: mLDP in-band signaling does
    not tunnel PIM over mLDP, it splices several PIM trees together with
    a P2MP LSP.   If you want your scheme to function like mLDP in-band
    signaling, you need to say a lot more about how the BIER-PIM
    Join/Prune messages are constructed and how they are processed. <br>
    <br>
    That would be a less general solution than using BIER  to emulate a
    link.  It would also need to be compared to other forms of overlay
    signaling such as MVPN-based GTM. <br>
    <br>
    <blockquote type="cite"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:windowtext">love
        to have a face to face chat before the session.</span>
    </blockquote>
    <br>
    Unfortunately I am not in Prague.<br>
  </body>
</html>

--------------2ECF5B6F2549ADF75B74175B--


From nobody Wed Jul 19 00:29:34 2017
Return-Path: <andrew.dolganow@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25877131532 for <bier@ietfa.amsl.com>; Wed, 19 Jul 2017 00:29:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.7
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GgdjhnpWS5ub for <bier@ietfa.amsl.com>; Wed, 19 Jul 2017 00:29:31 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0133.outbound.protection.outlook.com [104.47.0.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAB2212EE45 for <bier@ietf.org>; Wed, 19 Jul 2017 00:29:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=yxWgjG/6tB98HZ8meNEMcUliDBAoiub0a12dQj4oXKg=; b=SPCgxylEeh4Q24T4ugWiN7TWyE1UCw/P5se61lSA36UVkKPPqDwH5/+6AsuT5ZE46nI6nO/pMF5Oa2gYmjgEv3NY4yXaHboeADH3ZJhKYZAvrX6RtgUjcnkgnlgjrcbbRNeEipsRRzU53ypDw10nS8OitmPIHdd8sy/wWRAKImA=
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com (10.167.190.10) by HE1PR0701MB2937.eurprd07.prod.outlook.com (10.168.93.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Wed, 19 Jul 2017 07:29:27 +0000
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::bd82:d804:3db6:62a3]) by HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::bd82:d804:3db6:62a3%13]) with mapi id 15.01.1282.011; Wed, 19 Jul 2017 07:29:27 +0000
From: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>
To: Eric C Rosen <erosen@juniper.net>
CC: Antoni Przygienda <prz@juniper.net>, "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZKJZUqQ7gAC5AACAALr99w==
Date: Wed, 19 Jul 2017 07:29:27 +0000
Message-ID: <9E4694F1-476F-4295-9C2B-139680CF426E@nokia.com>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>, <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
In-Reply-To: <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
Accept-Language: en-US
Content-Language: en-CA
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [14.100.136.12]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0701MB2937; 7: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
x-ms-office365-filtering-correlation-id: ed00485f-b6af-40f4-c388-08d4ce77e386
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:HE1PR0701MB2937; 
x-ms-traffictypediagnostic: HE1PR0701MB2937:
x-exchange-antispam-report-test: UriScan:(236129657087228)(138986009662008)(48057245064654)(21532816269658)(50300203121483);
x-microsoft-antispam-prvs: <HE1PR0701MB2937EE4D6ADDC60588ACE736E5A60@HE1PR0701MB2937.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(2017060910075)(8121501046)(93006095)(93001095)(3002001)(10201501046)(100000703101)(100105400095)(6055026)(6041248)(20161123564025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123558100)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:HE1PR0701MB2937; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:HE1PR0701MB2937; 
x-forefront-prvs: 0373D94D15
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39450400003)(39840400002)(39410400002)(39400400002)(39850400002)(39860400002)(24454002)(377454003)(9886003)(6116002)(3846002)(5003630100001)(3660700001)(5660300001)(36756003)(82746002)(478600001)(53546010)(230783001)(102836003)(86362001)(83716003)(2900100001)(14454004)(3280700002)(2906002)(6246003)(66066001)(6512007)(38730400002)(7736002)(81166006)(110136004)(189998001)(8676002)(54906002)(229853002)(54896002)(5250100002)(8666007)(6436002)(5890100001)(33656002)(99286003)(8936002)(6486002)(6506006)(25786009)(236005)(54356999)(6916009)(53936002)(2950100002)(76176999)(561944003)(4326008)(50986999); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR0701MB2937; H:HE1PR0701MB2058.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_9E4694F1476F42959C2B139680CF426Enokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2017 07:29:27.6579 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2937
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/kbpmnlSUWyeSkx84XUqNwk9JzZ4>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 07:29:33 -0000

--_000_9E4694F1476F42959C2B139680CF426Enokiacom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_9E4694F1476F42959C2B139680CF426Enokiacom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IGRpcj0iYXV0byI+DQo8
ZGl2PklubGluZTxicj4NCjxicj4NCkFuZHJldw0KPGRpdj48YnI+DQo8L2Rpdj4NCjxkaXY+U2Vu
dCBmcm9tIG15IGlQaG9uZTwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pjxicj4NCk9uIEp1bCAxOCwgMjAx
NywgYXQgMTA6MjAgUE0sIEVyaWMgQyBSb3NlbiAmbHQ7PGEgaHJlZj0ibWFpbHRvOmVyb3NlbkBq
dW5pcGVyLm5ldCI+ZXJvc2VuQGp1bmlwZXIubmV0PC9hPiZndDsgd3JvdGU6PGJyPg0KPGJyPg0K
PC9kaXY+DQo8YmxvY2txdW90ZSB0eXBlPSJjaXRlIj4NCjxkaXY+DQo8cD48Zm9udCBjb2xvcj0i
IzMzNjZmZiI+QW5kcmV3Jmd0OyZuYnNwOyBUaGUgc29sdXRpb24gd2UgYXJlIHRhcmdldGluZyBy
dW5zIFJvc2VuIE1WUE4gaW4gdGhlIGNvcmUuIEFuZCB5ZXMgU1NNIGlzIG91ciBtYWluIHRhcmdl
dC4NCjwvZm9udD48YnI+DQo8L3A+DQo8cD5BcyBJIHNhaWQgaW4gbXkgbWVzc2FnZSBvZiBKdWx5
IDMsIGl0IHNlZW1zIHRvIG1lIHRoYXQgd2hhdCB5b3UgYXJlIHRyeWluZyB0byBkbyBpcyB0byB1
c2UgQklFUiB0byBjcmVhdGUgYW4gTkJNQSBuZXR3b3JrIGF0dGFjaGluZyBhIHNldCBvZiBQSU0g
cm91dGVycy4mbmJzcDsgVW5sZXNzIGknbSBtaXNzaW5nIHRoZSBwb2ludCwgdGhlIG1ha2VzIHlv
dXIgcHJvcG9zYWwgaW5kZXBlbmRlbnQgb2YgdGhlIGFwcGxpY2F0aW9uLiZuYnNwOyBXaGF0IHlv
dSBuZWVkDQogdG8gZG8gaXMgbWFrZSBzdXJlIGFsbCB0aGUgUElNIGxpbmsgcHJvY2VkdXJlcyB3
aWxsIHJ1biBjb3JyZWN0bHkgb24gdGhlIE5CTUEgbmV0d29yay4mbmJzcDsgSSBkb24ndCBzZWUg
d2h5IEFTTSBpcyBhIHBhcnRpY3VsYXIgcHJvYmxlbS48YnI+DQo8L3A+DQo8L2Rpdj4NCjwvYmxv
Y2txdW90ZT4NCjxkaXY+PGJyPg0KPC9kaXY+DQpDb3JyZWN0LiBXZSB3aWxsIGxvb2sgYXQgQVNN
IGFzIHdlbGwgZm9yIGNvbXBsZXRlbmVzcy4mbmJzcDs8YnI+DQo8YmxvY2txdW90ZSB0eXBlPSJj
aXRlIj4NCjxkaXY+DQo8cD48L3A+DQo8cD48Zm9udCBjb2xvcj0iIzMzNjZmZiI+QW5kcmV3Jmd0
OyBUaGVyZSBhcmUgdHdvIGdvYWxzOjxicj4NCkFuZHJldyZndDsgLSBTdGF5IHdpdGggYSBzaW5n
bGUgU0kgdG8gYXZvaWQgcGFja2V0IGR1cGxpY2F0aW9uIGluIGEgY29yZSBkdWUgdG8gYSBzY2Fs
ZS4NCjwvZm9udD48YnI+DQo8L3A+DQo8cD5UaGUgQklFUiBkb21haW4gd291bGQgY2VydGFpbmx5
IGJlIGVhc2llciB0byBib3VuZCBpbiBzaXplIGlmIGl0IG9ubHkgaW5jbHVkZXMgdGhlIHNldCBv
ZiBQSU0gbmVpZ2hib3JzIG9uIHRoZSBOQk1BICZxdW90O2xpbmsmcXVvdDsuJm5ic3A7IEJ1dCBJ
IGRvbid0IHRoaW5rIGFueXRoaW5nIGluIHlvdXIgcHJvcG9zYWwgaXMgaW5jb21wYXRpYmxlIHdp
dGggdGhlIHVzZSBvZiBtdWx0aXBsZSBTZXRzLjxicj4NCjwvcD4NCjwvZGl2Pg0KPC9ibG9ja3F1
b3RlPg0KPGRpdj48YnI+DQo8L2Rpdj4NCkNvcnJlY3QuJm5ic3A7PGJyPg0KPGJsb2NrcXVvdGUg
dHlwZT0iY2l0ZSI+DQo8ZGl2Pg0KPHA+PC9wPg0KPHA+PGZvbnQgY29sb3I9IiMzMzY2ZmYiPkFu
ZHJldyZndDsgLSBJbnRybyBCSUVSIGluIHRoZSBjb3JlIHdpdGhvdXQgYSBuZWVkIHRvIHRvdWNo
IGFjY2VzcyBkb21haW5zIC0gZXZvbHV0aW9uYXJ5IGludHJvIG9mIEJJRVIuPC9mb250PjwvcD4N
CjxwPlRoZXJlIGFyZSBvdGhlciBwb3NzaWJsZSBhcHByb2FjaGVzIGFzIHdlbGwuPGJyPg0KPC9w
Pg0KSWYgYW4gYXBwbGljYXRpb24gc3VwcG9ydHMgJnF1b3Q7c2VnbWVudGVkIHR1bm5lbHMmcXVv
dDsgKHN1Y2ggYXMgTkctTVZQTiBkb2VzKSwgaXQncyBub3QgdG9vIGhhcmQgdG8gaGF2ZSBhICZx
dW90O0JJRVIgc2VnbWVudCZxdW90OyBhY3Jvc3MgdGhlIGNvcmUgd2hpbGUgdXNpbmcgb3RoZXIg
bXVsdGljYXN0IHByb3RvY29scyAob3IgaW5ncmVzcyByZXBsaWNhdGlvbikgaW4gdGhlIGFjY2Vz
cyBhcmVhcy48YnI+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjxicj4NCjxibG9ja3F1b3RlIHR5
cGU9ImNpdGUiPg0KPGRpdj5Bbm90aGVyIGFwcHJvYWNoIGlzIHRvIHVzZSBORy1NVlBOIEdsb2Jh
bCBUYWJsZSBNdWx0aWNhc3QgKFJGQyA3NzE2KSBhY3Jvc3MgdGhlIGNvcmUgKGluc3RlYWQgb2Yg
UElNKSwgaW4gd2hpY2ggY2FzZSB5b3UgY2FuIHVzZSBCSUVSIGFzIHRoZSAmcXVvdDt0dW5uZWwg
dHlwZScgYWNyb3NzIHRoZSBjb3JlLCB3aXRob3V0IHJlcXVpcmluZyBjb3JlIG5vZGVzIHRvIHNl
bmQgUElNIG1lc3NhZ2VzIHRvIGVhY2ggb3RoZXIuJm5ic3A7IE5vdGUgdGhhdCB0aGUNCiBkZWZh
dWx0IE1EVHMgYW5kIGRhdGEgTURUcyBvZiAmcXVvdDtyb3NlbiBtdnBuJnF1b3Q7IGFyZSBnbG9i
YWwgdGFibGUgbXVsdGljYXN0cywgYW5kIEdUTSBpcyBlYXNpbHkgdXNlZCB0byBjb25uZWN0IG11
bHRpcGxlIFBJTSBhcmVhcyB0b2dldGhlci4mbmJzcDsgU28gdGhpcyB3b3VsZCBiZSBhIGZlYXNp
YmxlIHRlY2huaXF1ZSBmb3IgZG9pbmcgJnF1b3Q7cm9zZW4gbXZwbiZxdW90OyBhdCB0aGUgZWRn
ZXMgd2l0aCBCSUVSIGluIHRoZSBjb3JlLiZuYnNwOyBXaGljaCB0ZWNobmlxdWUgaXMgYmV0dGVy
DQogdW5kZXIgd2hpY2ggY2lyY3Vtc3RhbmNlcyBjb3VsZCBiZSBleHBsb3JlZC48YnI+DQo8YnI+
DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjxkaXY+PGJyPg0KPC9kaXY+DQpUaGUgc2xpZGVzIEhv
b21hbiB3aWxsIHByZXNlbnQgd2lsbCBleHBsYWluIGhvdyBhbmQgd2h5IHdlIGdyYXZpdGF0ZSB0
b3dhcmRzIHRoaXMgc29sdXRpb24uJm5ic3A7DQo8ZGl2Pjxicj4NCjwvZGl2Pg0KPGRpdj48YnI+
DQo8YmxvY2txdW90ZSB0eXBlPSJjaXRlIj4NCjxkaXY+PGZvbnQgY29sb3I9IiM5OTAwMDAiPlRv
bnkmZ3Q7IFdlIGRvIG5vdCBuZWVkIHRvIGJ1cm4gYSBwcm90b2NvbCBiaXQgZm9yIFBJTTwvZm9u
dD48YnI+DQo8YnI+DQpJIGFncmVlIHdpdGggVG9ueSB0aGF0IHRoZXJlIGRvZXNuJ3Qgc2VlbSB0
byBiZSBhbnkgbmVlZCBmb3IgdGhlIFByb3RvIGZpZWxkIHRvIGJlICZxdW90O1BJTSZxdW90OyBy
YXRoZXIgdGhhbiAmcXVvdDtJUHY0JnF1b3Q7IG9yICZxdW90O0lQdjYmcXVvdDsuJm5ic3A7Jm5i
c3A7IChBdCBsZWFzdCwgbm8gYXJjaGl0ZWN0dXJhbCByZWFzb24uJm5ic3A7IEluIHRoZSBpbXBs
ZW1lbnRhdGlvbiwgcGVyaGFwcyB0aGlzIHdvdWxkIGJlIHRoZSB0cmlnZ2VyIHRoYXQgY2F1c2Vk
IHRoZSBoYXJkd2FyZSB0byBhc3NvY2lhdGUgdGhlDQogcGFja2V0IHdpdGggYW4gJnF1b3Q7aW5j
b21pbmcgaW50ZXJmYWNlJnF1b3Q7IG9mICZxdW90O0JJRVImcXVvdDsgOy0pJm5ic3A7IElmIHNv
LCB3ZSdkIGhhdmUgdG8gZXhwbG9yZSB0aGF0IGEgYml0IGRlZXBlci4pPGJyPg0KPGJyPg0KPGZv
bnQgY29sb3I9IiM5OTAwMDAiPlRvbnkmZ3Q7IFRoZSB3aG9sZSDigJxSUEYgU1BGIGxvb2t1cOKA
nSBpbiAzLjEgZm9yIChTLEcpIGpvaW5zIHdpbGwgbm90IHdvcmsgaW4gZ2VuZXJhbDxicj4NCjwv
Zm9udD48YnI+DQpXZWxsLCB0aGlzIGlzIHRoZSB1c3VhbCBwcm9ibGVtIG9mIGhvdyBkbyB5b3Ug
ZmluZCB0aGUgJnF1b3Q7dXBzdHJlYW0gbXVsdGljYXN0IGhvcCZxdW90OyB3aGVuIHRoZSBtdWx0
aWNhc3Qgcm91dGluZyBuZWlnaGJvcnMgYXJlIG5vdCBhbHNvIHVuaWNhc3Qgcm91dGluZyBuZWln
aGJvcnMuJm5ic3A7IEdlbmVyYWxseSB0aGUgc29sdXRpb24gdG8gdGhpcyBwcm9ibGVtIHdpbGwg
ZGVwZW5kIHVwb24gdGhlIHVuaWNhc3Qgcm91dGluZyBlbnZpcm9ubWVudC48YnI+DQo8YnI+DQo8
YnI+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_9E4694F1476F42959C2B139680CF426Enokiacom_--


From nobody Wed Jul 19 07:08:13 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A0BF131473 for <bier@ietfa.amsl.com>; Wed, 19 Jul 2017 07:08:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ax3gt7dfcpbn for <bier@ietfa.amsl.com>; Wed, 19 Jul 2017 07:08:10 -0700 (PDT)
Received: from mail-wm0-x234.google.com (mail-wm0-x234.google.com [IPv6:2a00:1450:400c:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E4F613181F for <bier@ietf.org>; Wed, 19 Jul 2017 07:08:09 -0700 (PDT)
Received: by mail-wm0-x234.google.com with SMTP id w191so155492wmw.1 for <bier@ietf.org>; Wed, 19 Jul 2017 07:08:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=2DI8BVOAGy0ON1lTZCK1Rp7A9ah65Ucn3L0xUfSNaYc=; b=QE91kZlJsvjxUrD65S88+U6Yh2njdak/IkLC3ucduEs8xTPQXyB79JpfuVat4vZ2G/ 4ucvoISzWXgAxLtjYdbS2uoa1AW22z28VFiNAx4dIXfnNSyVQzGEad/I3DjJUmmAd/Tg c6bdkjp29sIKJ2tu5gU4UczAJPQJH4xUdHPr3AkOqiKjw9GQKykXkXLvyQ34FHQoq/IX eku/uHaRuVAeMG3ZbAhDkCwT8EV9g9NDMOb4W5Uq+69KrcOH0b8jgCFF3XJa7QaS7n76 CNlrB1UwFA26zJAFonlhLUiVp25MCGu63sCW8C1+IHbziRxzODofthQPZta1AIqgWubD fzqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=2DI8BVOAGy0ON1lTZCK1Rp7A9ah65Ucn3L0xUfSNaYc=; b=DFZdOneBABfuxzoVqf/XMiJi5DGAdOlSz1aEyrN3wIeDn8EFMlOhyfOSGk3qXmeGQt 50UYyZqBr6zuxtYZVvCRXhaqtoUh+Vf76bOJfKaVYkBXgGqWb6AdLOdNEUA8EArgpKzo xr2rLHrROKekqD+trQzaUe6UQ7DANOQcKQ/kcl/liuHw7X4LCxIGlQDAyQ+WmrnGYQM5 +6kcUjxKmdQ0F4CVvYkA6nwYQ1f1YYkSED5BbLUA1QWGgOwR5j20EfkS9/Ap/Ze/fIcg UcjW4d+r4ZkhNsyhciLqmFAKmpmdKEm//8O9ICOdB4PyDY0TZE+4HzU6A37iPsXcjp/z wnGQ==
X-Gm-Message-State: AIVw110xadr/yrlLsyqIEQHztaiPu7ySDeU4JDXxGPKPTkme9+tH6Jfl a960C9mgBEwZ93wmRwDwsg9gQLPLIw==
X-Received: by 10.80.213.72 with SMTP id f8mr145441edj.69.1500473288165; Wed, 19 Jul 2017 07:08:08 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.138.99 with HTTP; Wed, 19 Jul 2017 07:07:27 -0700 (PDT)
In-Reply-To: <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com> <74699a15-6c07-fea1-9a0f-dd1b069f9d9e@juniper.net>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Wed, 19 Jul 2017 16:07:27 +0200
Message-ID: <CA+wi2hPVkVmguAE7afMBKsLDj=jnkF41huoT8O=_5j_pV-Z2qw@mail.gmail.com>
To: Eric C Rosen <erosen@juniper.net>
Cc: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>, Antoni Przygienda <prz@juniper.net>, "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="f403045dbcec560d190554ac2941"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/L-8VAiBfRKgBidKrzfENqfwMtnc>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 14:08:12 -0000

--f403045dbcec560d190554ac2941
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Tue, Jul 18, 2017 at 10:20 PM, Eric C Rosen <erosen@juniper.net> wrote:

> Andrew>  The solution we are targeting runs Rosen MVPN in the core. And
> yes SSM is our main target.
>
> As I said in my message of July 3, it seems to me that what you are tryin=
g
> to do is to use BIER to create an NBMA network attaching a set of PIM
> routers.  Unless i'm missing the point, the makes your proposal independe=
nt
> of the application.  What you need to do is make sure all the PIM link
> procedures will run correctly on the NBMA network.  I don't see why ASM i=
s
> a particular problem.
>
yes, that's why the heavy focus on the SSM in the document threw me a bit
as well.


> Andrew> There are two goals:
> Andrew> - Stay with a single SI to avoid packet duplication in a core due
> to a scale.
>
> The BIER domain would certainly be easier to bound in size if it only
> includes the set of PIM neighbors on the NBMA "link".  But I don't think
> anything in your proposal is incompatible with the use of multiple Sets.
>
neither do I and it still eludes me why just having 256 bits simplifies
things much or should be enshrined in this document. We may have a small
section saying "things are _even_ easier if you do 256 bits and don't have
to replicate" but now it sounds like the solution limits itself to 256
bits.


> Andrew> - Intro BIER in the core without a need to touch access domains -
> evolutionary intro of BIER.
>
> There are other possible approaches as well.
> If an application supports "segmented tunnels" (such as NG-MVPN does),
> it's not too hard to have a "BIER segment" across the core while using
> other multicast protocols (or ingress replication) in the access areas.
>
> Another approach is to use NG-MVPN Global Table Multicast (RFC 7716)
> across the core (instead of PIM), in which case you can use BIER as the
> "tunnel type' across the core, without requiring core nodes to send PIM
> messages to each other.  Note that the default MDTs and data MDTs of "ros=
en
> mvpn" are global table multicasts, and GTM is easily used to connect
> multiple PIM areas together.  So this would be a feasible technique for
> doing "rosen mvpn" at the edges with BIER in the core.  Which technique i=
s
> better under which circumstances could be explored.
>

7716 is a very clean solution here to delineate the boundaries without
necessity of PIM signalling as first impression. Is the idea though to run
on PE both sides of BGP signalling or on the first P-router (which would
necessitate BGP on the P router if I'm not mistaken) ? I think it's P
routers since otherwise we need BFR-id per PE which defeats purpose of this
draft. Then how do we stitch the two BGP's together? core gets another AS
and we run EBGP PE-P and we stitch via inter-AS I-PMSI or something like
this?


> Tony> We do not need to burn a protocol bit for PIM
>
> I agree with Tony that there doesn't seem to be any need for the Proto
> field to be "PIM" rather than "IPv4" or "IPv6".   (At least, no
> architectural reason.  In the implementation, perhaps this would be the
> trigger that caused the hardware to associate the packet with an "incomin=
g
> interface" of "BIER" ;-)  If so, we'd have to explore that a bit deeper.)
>

I didn't think it through fully but there are so many PIM procedures that
having a JOIN without the IP encaps is likely to cause problems anyway (by
gut feeling).


>
> Tony> The whole =E2=80=9CRPF SPF lookup=E2=80=9D in 3.1 for (S,G) joins w=
ill not work in
> general
>
> Well, this is the usual problem of how do you find the "upstream multicas=
t
> hop" when the multicast routing neighbors are not also unicast routing
> neighbors.  Generally the solution to this problem will depend upon the
> unicast routing environment.
>

yes, got it. Thinking through 7716 it looks tempting to me given it thought
through all the SFS/UMH scenarios.

--f403045dbcec560d190554ac2941
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Tue, Jul 18, 2017 at 10:20 PM, Eric C Rosen <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:erosen@juniper.net" target=3D"_blank">erosen@juniper.net</a=
>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div text=3D"#000000" bgcolor=3D"#FFFFFF">
    <p><font color=3D"#3366ff">Andrew&gt;=C2=A0 The solution we are targeti=
ng
        runs Rosen MVPN in the core. And yes SSM is our main target. </font=
><br>
    </p>
    <p>As I said in my message of July 3, it seems to me that what you
      are trying to do is to use BIER to create an NBMA network
      attaching a set of PIM routers.=C2=A0 Unless i&#39;m missing the poin=
t, the
      makes your proposal independent of the application.=C2=A0 What you ne=
ed
      to do is make sure all the PIM link procedures will run correctly
      on the NBMA network.=C2=A0 I don&#39;t see why ASM is a particular pr=
oblem.<br></p></div></blockquote><div>yes, that&#39;s why the heavy focus o=
n the SSM in the document threw me a bit as well.=C2=A0</div><div>=C2=A0</d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex"><div text=3D"#000000" bgcolor=3D"#FFFFFF"=
><p>
    </p>
    <p><font color=3D"#3366ff">Andrew&gt; There are two goals:<br>
        Andrew&gt; - Stay with a single SI to avoid packet duplication
        in a core due to a scale. </font><br>
    </p>
    <p>The BIER domain would certainly be easier to bound in size if it
      only includes the set of PIM neighbors on the NBMA &quot;link&quot;.=
=C2=A0 But I
      don&#39;t think anything in your proposal is incompatible with the us=
e
      of multiple Sets.<br></p></div></blockquote><div>neither do I and it =
still eludes me why just having 256 bits simplifies things much or should b=
e enshrined in this document. We may have a small section saying &quot;thin=
gs are _even_ easier if you do 256 bits and don&#39;t have to replicate&quo=
t; but now it sounds like the solution limits itself to 256 bits.=C2=A0</di=
v><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div text=3D"#000000" bgc=
olor=3D"#FFFFFF"><p>
    </p>
    <p><font color=3D"#3366ff">Andrew&gt; - Intro BIER in the core without
        a need to touch access domains - evolutionary intro of BIER.</font>=
</p>
    <p>There are other possible approaches as well.<br>
    </p>
    If an application supports &quot;segmented tunnels&quot; (such as NG-MV=
PN
    does), it&#39;s not too hard to have a &quot;BIER segment&quot; across =
the core
    while using other multicast protocols (or ingress replication) in
    the access areas.<br>
    <br>
    Another approach is to use NG-MVPN Global Table Multicast (RFC 7716)
    across the core (instead of PIM), in which case you can use BIER as
    the &quot;tunnel type&#39; across the core, without requiring core node=
s to
    send PIM messages to each other.=C2=A0 Note that the default MDTs and
    data MDTs of &quot;rosen mvpn&quot; are global table multicasts, and GT=
M is
    easily used to connect multiple PIM areas together.=C2=A0 So this would
    be a feasible technique for doing &quot;rosen mvpn&quot; at the edges w=
ith
    BIER in the core.=C2=A0 Which technique is better under which
    circumstances could be explored.<br></div></blockquote><div><br></div><=
div>7716 is a very clean solution here to delineate the boundaries without =
necessity of PIM signalling as first impression. Is the idea though to run =
on PE both sides of BGP signalling or on the first P-router (which would ne=
cessitate BGP on the P router if I&#39;m not mistaken) ? I think it&#39;s P=
 routers since otherwise we need BFR-id per PE which defeats purpose of thi=
s draft. Then how do we stitch the two BGP&#39;s together? core gets anothe=
r AS and we run EBGP PE-P and we stitch via inter-AS I-PMSI or something li=
ke this?=C2=A0</div><div><br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div tex=
t=3D"#000000" bgcolor=3D"#FFFFFF">
    <br>
    <font color=3D"#990000">Tony&gt; We do not need to burn a protocol bit
      for PIM</font><br>
    <br>
    I agree with Tony that there doesn&#39;t seem to be any need for the
    Proto field to be &quot;PIM&quot; rather than &quot;IPv4&quot; or &quot=
;IPv6&quot;.=C2=A0=C2=A0 (At least,
    no architectural reason.=C2=A0 In the implementation, perhaps this woul=
d
    be the trigger that caused the hardware to associate the packet with
    an &quot;incoming interface&quot; of &quot;BIER&quot; ;-)=C2=A0 If so, =
we&#39;d have to explore
    that a bit deeper.)<br></div></blockquote><div><br></div><div>I didn&#3=
9;t think it through fully but there are so many PIM procedures that having=
 a JOIN without the IP encaps is likely to cause problems anyway (by gut fe=
eling).=C2=A0</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div tex=
t=3D"#000000" bgcolor=3D"#FFFFFF">
    <br>
    <font color=3D"#990000">Tony&gt; The whole =E2=80=9CRPF SPF lookup=E2=
=80=9D in 3.1 for
      (S,G) joins will not work in general<br>
    </font><br>
    Well, this is the usual problem of how do you find the &quot;upstream
    multicast hop&quot; when the multicast routing neighbors are not also
    unicast routing neighbors.=C2=A0 Generally the solution to this problem
    will depend upon the unicast routing environment.<br></div></blockquote=
><div><br></div><div>yes, got it. Thinking through 7716 it looks tempting t=
o me given it thought through all the SFS/UMH scenarios. =C2=A0</div></div>
</div></div>

--f403045dbcec560d190554ac2941--


From nobody Thu Jul 20 03:41:47 2017
Return-Path: <zzhang@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0C35131A92 for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 03:41:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.022
X-Spam-Level: 
X-Spam-Status: No, score=-2.022 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K2DAo4txBd6v for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 03:41:44 -0700 (PDT)
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0137.outbound.protection.outlook.com [104.47.33.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7768F12EAF7 for <bier@ietf.org>; Thu, 20 Jul 2017 03:41:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=N3+408q276eaD3HVTRH8lzP46ahF65Tmxe6//bTNLU4=; b=N5cuFBfsOckKLk7jjr7rO9TLaqRESB3iTdSjGQeYmVYRiwPrCjKPPA/Ybd7nbD/uCukCrBKbM4xs++ZiDlHh83Z80D9amT9mkLKaS0VWWHK5I//mindcPIAr1mygSS/Kk6JXQMpDcUw4ISA7MPq1WNiE5ZZ8PF673keDBPZtWKc=
Received: from DM5PR05MB3145.namprd05.prod.outlook.com (10.173.219.15) by DM5PR05MB3548.namprd05.prod.outlook.com (10.174.242.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Thu, 20 Jul 2017 10:41:42 +0000
Received: from DM5PR05MB3145.namprd05.prod.outlook.com ([10.173.219.15]) by DM5PR05MB3145.namprd05.prod.outlook.com ([10.173.219.15]) with mapi id 15.01.1282.011; Thu, 20 Jul 2017 10:41:42 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: Eric Rosen <erosen@juniper.net>, BIER WG <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS9EJ63ZkZAny6J0yRF/xMca/lkKJcmf2Q
Date: Thu, 20 Jul 2017 10:41:42 +0000
Message-ID: <DM5PR05MB3145AE469F900F3696568CD8D4A70@DM5PR05MB3145.namprd05.prod.outlook.com>
References: <5ae27a8b-2ce7-ccf5-5a93-40030e30b9c1@juniper.net>
In-Reply-To: <5ae27a8b-2ce7-ccf5-5a93-40030e30b9c1@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [66.129.241.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR05MB3548; 7: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
x-ms-office365-filtering-correlation-id: 50032873-f287-4920-e0e6-08d4cf5be951
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM5PR05MB3548; 
x-ms-traffictypediagnostic: DM5PR05MB3548:
x-exchange-antispam-report-test: UriScan:(236129657087228)(148574349560750)(247924648384137); 
x-microsoft-antispam-prvs: <DM5PR05MB35487282995FB888C99BE0BDD4A70@DM5PR05MB3548.namprd05.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910075)(8121501046)(5005006)(3002001)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123564025)(20161123560025)(20161123555025)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM5PR05MB3548; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM5PR05MB3548; 
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39860400002)(39840400002)(39450400003)(39410400002)(39400400002)(39850400002)(51444003)(54094003)(377454003)(13464003)(6306002)(2950100002)(561944003)(229853002)(230783001)(76176999)(478600001)(86362001)(50986999)(6116002)(54356999)(8676002)(2900100001)(53546010)(14454004)(3846002)(305945005)(102836003)(3660700001)(81166006)(8936002)(7736002)(966005)(25786009)(189998001)(33656002)(53936002)(74316002)(38730400002)(5660300001)(55016002)(66066001)(3280700002)(99286003)(9686003)(6506006)(77096006)(6246003)(2906002)(7696004)(6436002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR05MB3548; H:DM5PR05MB3145.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 10:41:42.8652 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR05MB3548
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/6TK2eEWkOD9uWp3QIgzeb2BRdOY>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 10:41:47 -0000

Some follow up comments below.

> -----Original Message-----
> From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Eric C Rosen
> Sent: Monday, July 3, 2017 11:22 PM
> To: BIER WG <bier@ietf.org>
> Subject: [Bier] Comments on draft-hfa-bier-pim-tunneling
>=20
> It seems to me that what this draft really proposes is a way to use BIER
> to create an NBMA (Non-Broadcast Multiple Access) data link on which PIM
> can be run.
>=20
> If one looks at it that way, there is no interaction with the MVPN layer
> at all.  To MVPN, it looks like the P-tunnels or default-MDTs/data-MDTs
> are created by PIM.  The fact that the network core is acting like an
> NBMA data link is invisible to the application layer.  Thus I don't
> really understand why sections 5 ("ASM") and 6 ("MVPN") are needed.

Completely agree. It should be completely orthogonal to MVPN.

MVPN was initially mentioned with the context that a Rosen MVPN network cou=
ld have many PEs (more than the BitStringLength). To avoid sending multiple=
 copies via BIER, the MVPN PEs would not BFIR/BFERs; rather, only a smaller=
 core would be running BIER, and when the PIM signaling for the provider tu=
nnel reaches that core, the procedures in this draft kicks in. As far as BI=
ER is concerned, this is for pure PIM. No MVPN involvement.

Of course similar procedures could be used for Rosem-MVPN where the MVPN pr=
ovider network and BIER domain are the same. I think that's what section 6 =
is trying to say, but in that case, there is no PIM provider tunnel at all.=
 The signaling is for C-multicast (so there is a need for something similar=
 to Route Distinguisher), not for provider tunnel.

>=20
> There are a few questions that might deserve some more attention:
>=20
> - Part of the proposal is that the Join/Prune messages are unicast,
> using a BIER  header with a single bit set in the BitString.  That will
> certainly work, but it's an unusual way to create a unicast tunnel.  I
> realize it does have the advantage of already including the BFIR-id in
> the encapsulation header.
>=20
> - Since the BIER edge routers are PIM neighbors of each other, it seems
> like they should be multicasting PIM Hellos to each other. (The draft
> doesn't really say how the BIER edge routers running PIM are expected to
> identify each other; once they do identify each other, multicasting
> Hellos using BIER should be simple.)

I wonder if PIM hellos are needed among BFIRs/BFERs. I remember one flavor =
of Rosem-MVPN (in the MS-PMSI version?) proposed to remove the need for Hel=
lo.

>=20
> - The lack of Join Suppression is worth at least mentioning.

Right, it should mention that Join Suppression is naturally turned off beca=
use of the unicast, and it's necessary for leaf tracking.

>=20
> - There are various PIM procedures that may or may not need to be
> modified to deal with an NBMA data link: DR election, Assert, etc.  If
> the usual PIM procedures need to be modified, that has to be discussed.
> (Even if they don't need to be modified, this should be discussed.)
>=20
> - When a data packet is received, is it necessary to do an RPF check
> against the BFIR-id?  If so, then there is an issue of just what happens
> when a BFER (for a given data flow) changes from one tree to another
> (e.g., changes from the shared tree to the source tree); is the RPF
> check altered when a new Join is sent, or when the first data packet of
> the flow is received from the newly chosen tree, or somewhere in between?

For SSM it may be needed to prevent transient loss/duplicate when topology =
changes (e.g. switching from one BFIR to another).

For ASM the draft says it also works but that may need further discussion (=
besides RPF check).

Jeffrey

>=20
> - Will this work with BIDIR-PIM, or is that out of scope?
>=20
>=20
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier


From nobody Thu Jul 20 04:20:54 2017
Return-Path: <zzhang@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 815C0131C04 for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 04:20:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.801
X-Spam-Level: 
X-Spam-Status: No, score=-4.801 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E8Af5lSIzrzP for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 04:20:49 -0700 (PDT)
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0098.outbound.protection.outlook.com [104.47.42.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CFCE131C03 for <bier@ietf.org>; Thu, 20 Jul 2017 04:20:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=NWFbP3ZTBoj36nsAIjMwCDmWz5q7FLq+D+36LUVArh0=; b=iwykfSLPsU1GfYUX4Ml3TDu9LyYH1JoXnYEci04ftKZk7Kq41m+Iy+adxDIIcQ/yMoB15Cd4vQtXYfBto3wo5VQ+0K3aUdGvOYTJGq88fhwINtcU2p32U7j1erQh4NL9H9EmunLkMH7UeUuXGkRrl5w1zLvKvd5g298kAWY0HFU=
Received: from DM5PR05MB3145.namprd05.prod.outlook.com (10.173.219.15) by DM5PR05MB3180.namprd05.prod.outlook.com (10.173.219.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Thu, 20 Jul 2017 11:20:47 +0000
Received: from DM5PR05MB3145.namprd05.prod.outlook.com ([10.173.219.15]) by DM5PR05MB3145.namprd05.prod.outlook.com ([10.173.219.15]) with mapi id 15.01.1282.011; Thu, 20 Jul 2017 11:20:47 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>, Antoni Przygienda <prz@juniper.net>
CC: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZKJZUqQ7gAM+OpA=
Date: Thu, 20 Jul 2017 11:20:47 +0000
Message-ID: <DM5PR05MB3145A4AFB275EF7DAE114E20D4A70@DM5PR05MB3145.namprd05.prod.outlook.com>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
In-Reply-To: <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [66.129.241.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR05MB3180; 7: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
x-ms-office365-filtering-correlation-id: 8f8e962e-7a0a-4c90-1258-08d4cf615ea7
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM5PR05MB3180; 
x-ms-traffictypediagnostic: DM5PR05MB3180:
x-exchange-antispam-report-test: UriScan:(151999592597050)(278178393323532)(190756311086443)(26388249023172)(236129657087228)(138986009662008)(148574349560750)(21748063052155)(247924648384137);
x-microsoft-antispam-prvs: <DM5PR05MB3180697B1B4BC95E8D2159C3D4A70@DM5PR05MB3180.namprd05.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(3002001)(6055026)(6041248)(20161123558100)(20161123555025)(20161123562025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM5PR05MB3180; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM5PR05MB3180; 
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39400400002)(39850400002)(39860400002)(39410400002)(39450400003)(39840400002)(24454002)(377454003)(7696004)(6636002)(77096006)(3660700001)(3280700002)(2900100001)(53546010)(2950100002)(74316002)(66066001)(5003630100001)(478600001)(2906002)(81166006)(8936002)(76176999)(50986999)(54356999)(8676002)(5660300001)(14454004)(606006)(230783001)(4326008)(38730400002)(53946003)(3846002)(6116002)(236005)(102836003)(6246003)(790700001)(6506006)(33656002)(9686003)(229853002)(99286003)(55016002)(189998001)(86362001)(53936002)(7736002)(6306002)(6436002)(54896002)(25786009)(966005)(579004)(559001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR05MB3180; H:DM5PR05MB3145.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM5PR05MB3145A4AFB275EF7DAE114E20D4A70DM5PR05MB3145namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 11:20:47.2116 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR05MB3180
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/wWKRX4mmlwLwSeLFhRUs40_b_HA>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 11:20:53 -0000

--_000_DM5PR05MB3145A4AFB275EF7DAE114E20D4A70DM5PR05MB3145namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR05MB3145A4AFB275EF7DAE114E20D4A70DM5PR05MB3145namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR05MB3145A4AFB275EF7DAE114E20D4A70DM5PR05MB3145namp_--


From nobody Thu Jul 20 07:04:29 2017
Return-Path: <hooman.bidgoli@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 988711288B8 for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 07:04:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.922
X-Spam-Level: 
X-Spam-Status: No, score=-1.922 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PN2Nb-zK1Ibj for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 07:04:24 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0101.outbound.protection.outlook.com [104.47.1.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2ABDC12704A for <bier@ietf.org>; Thu, 20 Jul 2017 07:04:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=OJpbHhPUX9wh+2GQqC3cgd894buyixTFTAyVl3SZwjk=; b=BFa510viOz5GsWimd8VPb0OxgzwJNX1hnbu5g4Aa8UBnnV0IV4FY1Nmw8i0I9zNpllFNt1+Zyw+6cI/W1t1uZS+7jIgqlAj4Q9QMTvDi98DxBcm6V9b/ENtsLkcPTJwIdmapWY7i+5+tTiTXGmD643ccoxPSMQWDoo41or9KWyA=
Received: from VI1PR0701MB2351.eurprd07.prod.outlook.com (10.168.137.146) by VI1PR0701MB2717.eurprd07.prod.outlook.com (10.173.80.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Thu, 20 Jul 2017 14:04:21 +0000
Received: from VI1PR0701MB2351.eurprd07.prod.outlook.com ([fe80::8cae:e518:86d0:2d60]) by VI1PR0701MB2351.eurprd07.prod.outlook.com ([fe80::8cae:e518:86d0:2d60%14]) with mapi id 15.01.1282.011; Thu, 20 Jul 2017 14:04:21 +0000
From: "Bidgoli, Hooman (Nokia - CA/Ottawa)" <hooman.bidgoli@nokia.com>
To: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>, Eric Rosen <erosen@juniper.net>, BIER WG <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS9EJ7joqfmmzmA0OmNY1dLdsWXaJcoQcAgAAs5yA=
Date: Thu, 20 Jul 2017 14:04:21 +0000
Message-ID: <VI1PR0701MB2351485B0BA3E31C0096099491A70@VI1PR0701MB2351.eurprd07.prod.outlook.com>
References: <5ae27a8b-2ce7-ccf5-5a93-40030e30b9c1@juniper.net> <DM5PR05MB3145AE469F900F3696568CD8D4A70@DM5PR05MB3145.namprd05.prod.outlook.com>
In-Reply-To: <DM5PR05MB3145AE469F900F3696568CD8D4A70@DM5PR05MB3145.namprd05.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [135.245.20.3]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0701MB2717; 7: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
x-ms-office365-filtering-correlation-id: 8ba89121-9b86-4d27-8f1d-08d4cf78387d
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:VI1PR0701MB2717; 
x-ms-traffictypediagnostic: VI1PR0701MB2717:
x-exchange-antispam-report-test: UriScan:(236129657087228)(138986009662008)(148574349560750)(247924648384137); 
x-microsoft-antispam-prvs: <VI1PR0701MB2717BDF9FC0F2916FF4BF2BE91A70@VI1PR0701MB2717.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910075)(5005006)(8121501046)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6041248)(20161123564025)(20161123558100)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:VI1PR0701MB2717; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:VI1PR0701MB2717; 
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39840400002)(39860400002)(39850400002)(39400400002)(39450400003)(39410400002)(377454003)(54094003)(51444003)(13464003)(8676002)(33656002)(81166006)(76176999)(54356999)(50986999)(561944003)(9686003)(99286003)(55016002)(6306002)(8666007)(53546010)(5250100002)(25786009)(6436002)(14454004)(2906002)(2900100001)(74316002)(3846002)(102836003)(6116002)(230783001)(7696004)(6246003)(53936002)(3280700002)(5660300001)(86362001)(3660700001)(38730400002)(966005)(66066001)(229853002)(8936002)(6506006)(189998001)(2950100002)(7736002)(478600001)(305945005); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR0701MB2717; H:VI1PR0701MB2351.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 14:04:21.5766 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2717
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Qvq7mXPgMhdY5M9dWsr-Bfzvhq8>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 14:04:28 -0000

Inline (HB>)

-----Original Message-----
From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Jeffrey (Zhaohui) Zh=
ang
Sent: Thursday, July 20, 2017 6:42 AM
To: Eric Rosen <erosen@juniper.net>; BIER WG <bier@ietf.org>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling

Some follow up comments below.

> -----Original Message-----
> From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Eric C Rosen
> Sent: Monday, July 3, 2017 11:22 PM
> To: BIER WG <bier@ietf.org>
> Subject: [Bier] Comments on draft-hfa-bier-pim-tunneling
>=20
> It seems to me that what this draft really proposes is a way to use=20
> BIER to create an NBMA (Non-Broadcast Multiple Access) data link on=20
> which PIM can be run.
>=20
> If one looks at it that way, there is no interaction with the MVPN=20
> layer at all.  To MVPN, it looks like the P-tunnels or=20
> default-MDTs/data-MDTs are created by PIM.  The fact that the network=20
> core is acting like an NBMA data link is invisible to the application=20
> layer.  Thus I don't really understand why sections 5 ("ASM") and 6 ("MVP=
N") are needed.

Completely agree. It should be completely orthogonal to MVPN.

HB> Yes

MVPN was initially mentioned with the context that a Rosen MVPN network cou=
ld have many PEs (more than the BitStringLength). To avoid sending multiple=
 copies via BIER, the MVPN PEs would not BFIR/BFERs; rather, only a smaller=
 core would be running BIER, and when the PIM signaling for the provider tu=
nnel reaches that core, the procedures in this draft kicks in. As far as BI=
ER is concerned, this is for pure PIM. No MVPN involvement.

HB> Yes

Of course similar procedures could be used for Rosem-MVPN where the MVPN pr=
ovider network and BIER domain are the same. I think that's what section 6 =
is trying to say, but in that case, there is no PIM provider tunnel at all.=
 The signaling is for C-multicast (so there is a need for something similar=
 to Route Distinguisher), not for provider tunnel.

>=20
> There are a few questions that might deserve some more attention:
>=20
> - Part of the proposal is that the Join/Prune messages are unicast,=20
> using a BIER  header with a single bit set in the BitString.  That=20
> will certainly work, but it's an unusual way to create a unicast=20
> tunnel.  I realize it does have the advantage of already including the=20
> BFIR-id in the encapsulation header.
>=20
> - Since the BIER edge routers are PIM neighbors of each other, it=20
> seems like they should be multicasting PIM Hellos to each other. (The=20
> draft doesn't really say how the BIER edge routers running PIM are=20
> expected to identify each other; once they do identify each other,=20
> multicasting Hellos using BIER should be simple.)

I wonder if PIM hellos are needed among BFIRs/BFERs. I remember one flavor =
of Rosem-MVPN (in the MS-PMSI version?) proposed to remove the need for Hel=
lo.

HB> The ideal here a simple mech to signal S,G through a BIER core, as ment=
ioned before . We could of introduce a TLV in BIER header but we did not wa=
nt to muck around with BIER header. So we decided to go with tunneling PIM =
joins/prunes through BIER. I will talk more about this face to face.

>=20
> - The lack of Join Suppression is worth at least mentioning.

Right, it should mention that Join Suppression is naturally turned off beca=
use of the unicast, and it's necessary for leaf tracking.

HB> Yes

>=20
> - There are various PIM procedures that may or may not need to be=20
> modified to deal with an NBMA data link: DR election, Assert, etc.  If=20
> the usual PIM procedures need to be modified, that has to be discussed.
> (Even if they don't need to be modified, this should be discussed.)
>=20
> - When a data packet is received, is it necessary to do an RPF check=20
> against the BFIR-id?  If so, then there is an issue of just what=20
> happens when a BFER (for a given data flow) changes from one tree to=20
> another (e.g., changes from the shared tree to the source tree); is=20
> the RPF check altered when a new Join is sent, or when the first data=20
> packet of the flow is received from the newly chosen tree, or somewhere i=
n between?

For SSM it may be needed to prevent transient loss/duplicate when topology =
changes (e.g. switching from one BFIR to another).

For ASM the draft says it also works but that may need further discussion (=
besides RPF check).

Jeffrey

>=20
> - Will this work with BIDIR-PIM, or is that out of scope?
>=20
>=20
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier

_______________________________________________
BIER mailing list
BIER@ietf.org
https://www.ietf.org/mailman/listinfo/bier


From nobody Thu Jul 20 09:49:27 2017
Return-Path: <tim.chown@jisc.ac.uk>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46832131A76 for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 09:49:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.321
X-Spam-Level: 
X-Spam-Status: No, score=-4.321 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jisc.ac.uk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IrWoCxy3u_Rc for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 09:49:25 -0700 (PDT)
Received: from eu-smtp-delivery-189.mimecast.com (eu-smtp-delivery-189.mimecast.com [146.101.78.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F258131714 for <bier@ietf.org>; Thu, 20 Jul 2017 09:49:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jisc.ac.uk; s=mimecast20170213; t=1500569363; h=from:subject:date:message-id:to:mime-version:content-type:content-transfer-encoding; bh=6YDKURETfbjV9Q/gbsVQbKFGlMhEyVz6TR6p4/4aDpA=; b=BfQn9S8PTZ/Jej7ZVtngVE4qYwlVqcnaov1E6pUVVccRL5p6B5v/Z4owGfLgwIl9ne2oDysENL+BnU7l6rEE3o7VoXjh0vDvtQctDOtQSYNwrFVBaf2ju8PPAkSO3fpyELNjcmWBEkkar03y9EUWXyDTMBc+RgwY9eYxm5rxCuI=
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01lp0184.outbound.protection.outlook.com [213.199.154.184]) (Using TLS) by eu-smtp-1.mimecast.com with ESMTP id uk-mta-105-9_RYvVc2M6iEjEJlTQhQ3g-1; Thu, 20 Jul 2017 17:49:20 +0100
Received: from AM3PR07MB1140.eurprd07.prod.outlook.com (10.163.188.14) by AM3PR07MB418.eurprd07.prod.outlook.com (10.242.112.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Thu, 20 Jul 2017 16:49:19 +0000
Received: from AM3PR07MB1140.eurprd07.prod.outlook.com ([fe80::b8a2:fb24:484f:ba3]) by AM3PR07MB1140.eurprd07.prod.outlook.com ([fe80::b8a2:fb24:484f:ba3%13]) with mapi id 15.01.1282.011; Thu, 20 Jul 2017 16:49:19 +0000
From: Tim Chown <Tim.Chown@jisc.ac.uk>
To: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: Homenet, and multicast
Thread-Index: AQHTAXgh77qlsMN9iEq+ctrrI8Ug1g==
Date: Thu, 20 Jul 2017 16:49:19 +0000
Message-ID: <4F42D86C-E53F-4F9A-A290-29D46296EA51@jisc.ac.uk>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3273)
x-originating-ip: [2001:67c:370:128:7164:5a94:6ee1:4c3b]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM3PR07MB418; 20:oiqsHX2M7Gvo8hwxWZLWXdUEjxgK+cds16AD0JzPuZpUrCO/eJPpGxBVNuNtsPXfvGASKXBqLjPFHIEMWibR2I+OorHOPCqVGUxBuQtPJDp7rQWtvnJqQtA46F52gaIlnK+ck4Z5gyfWIf3TR6Ev/IuvKN3RiW95YS3Af7QwVYk=
x-ms-office365-filtering-correlation-id: 2068aaa0-bc50-4944-6294-08d4cf8f43e3
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:AM3PR07MB418; 
x-ms-traffictypediagnostic: AM3PR07MB418:
x-exchange-antispam-report-test: UriScan:(133145235818549)(278428928389397)(236129657087228)(192374486261705)(148574349560750)(247924648384137);
x-microsoft-antispam-prvs: <AM3PR07MB4188D6880F7E4E3846DAE22D6A70@AM3PR07MB418.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910075)(5005006)(8121501046)(100000703101)(100105400095)(3002001)(10201501046)(93006095)(93001095)(6041248)(20161123558100)(20161123555025)(20161123560025)(20161123564025)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM3PR07MB418; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM3PR07MB418; 
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39400400002)(39410400002)(39450400003)(39840400002)(99286003)(2351001)(50986999)(5640700003)(38730400002)(33656002)(6512007)(2501003)(189998001)(42882006)(6916009)(6436002)(72206003)(2900100001)(478600001)(14454004)(25786009)(305945005)(1730700003)(7736002)(8936002)(8676002)(50226002)(81166006)(82746002)(6506006)(74482002)(3660700001)(2906002)(53936002)(86362001)(110136004)(3280700002)(102836003)(36756003)(6486002)(5250100002)(6116002)(5660300001)(83716003)(57306001); DIR:OUT; SFP:1101; SCL:1; SRVR:AM3PR07MB418; H:AM3PR07MB1140.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-ID: <345E4FE2D22D484F9C0A71FF0BF7B880@eurprd07.prod.outlook.com>
MIME-Version: 1.0
X-OriginatorOrg: jisc.ac.uk
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 16:49:19.1549 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 48f9394d-8a14-4d27-82a6-f35f12361205
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM3PR07MB418
X-MC-Unique: 9_RYvVc2M6iEjEJlTQhQ3g-1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/xlMo8_pI_gyOfOnsrW_VKNYIvEE>
Subject: [Bier] Homenet, and multicast
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 16:49:27 -0000
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From nobody Thu Jul 20 09:53:10 2017
Return-Path: <akatlas@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F09CD131461 for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 09:53:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u7N8taq5tQ1h for <bier@ietfa.amsl.com>; Thu, 20 Jul 2017 09:52:58 -0700 (PDT)
Received: from mail-wm0-x22a.google.com (mail-wm0-x22a.google.com [IPv6:2a00:1450:400c:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B926F129B15 for <bier@ietf.org>; Thu, 20 Jul 2017 09:52:57 -0700 (PDT)
Received: by mail-wm0-x22a.google.com with SMTP id w126so29540892wme.0 for <bier@ietf.org>; Thu, 20 Jul 2017 09:52:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=DNuqWTZGDqwptH//j7Lu6hTa0jx2b+AmHAX1ajT0BDA=; b=sU2QRkDuTLN1p9+3M7Jw8+tD+TpCufZMlo4U2vU08LUgI1Rnxy7rdK0qwfdSTAojoj HsqgmIvs++klYIeiLJAK6QTtP6eSJaQB/9RkGEq0ZruMGM0y1q7B1tliGvuyYjT98Bgl 0dgDsqh4PIT1xLvY2KeAu3kZSeOzp3MX6ve4hTO9cpkjQU/fhfYT8FxQ1NqD9Y4bT2yY 4qDRWz1WM5wFD64xFoySBeH6DV4JgzqKZqvnUeXdMN1J9hh1wcJj7A3etZVzEX9J/JDY TxeuiIsFfdjbWjFwZsh5el6s9+QkBQh0WHVK4pbTiTZLCIFjiUIFRy5ampyXmGhq8nrp 95Sg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=DNuqWTZGDqwptH//j7Lu6hTa0jx2b+AmHAX1ajT0BDA=; b=QGbYykNihfDpCJTpLNZHac95WfgHxUbzS0sHO8qZGPu4N5fsDM74UKsj1pZvCPOAD0 CFnJrL80P6AeGDJsYUpW41mDJ+IJELIk+oynQ1o5m6O82N2X6DuhBBMTqhFi8T2b7Szj B4WfCM+vEWTk7ZVrqeseQwVyFaOMqVeaTvilUzLjumwcKJcuS7ugqn898ka8qYhvtB1r +L1nDNGAcds5KH4kDk3FzPIi1GyonY6FHtJ+dluMWwiJ2/hteWO1xMj6EvTOXal1ILzo QiV+VukqTvSeG9+vKWRnG2UKgmZFtcrH0PeDdniqK1wxy5vwehPQK1Be8VGfgsR91ffR xLzg==
X-Gm-Message-State: AIVw111j+B7GabzYEZRAsUJsLnGx4+ext/XQ3gHk6Z3o4jsrtWNeTt0x QRwEl3L8E4U3t2tXdS6Q+JiMwEjlPtfciko=
X-Received: by 10.28.70.68 with SMTP id t65mr2905549wma.163.1500569576067; Thu, 20 Jul 2017 09:52:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.183.1 with HTTP; Thu, 20 Jul 2017 09:52:55 -0700 (PDT)
From: Alia Atlas <akatlas@gmail.com>
Date: Thu, 20 Jul 2017 12:52:55 -0400
Message-ID: <CAG4d1rd4HmtoWGE+8JR1qhD0_h99E8WwQq+YC_bfcmsGo6dipw@mail.gmail.com>
To: "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c0d45fc8adc020554c29441"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/4ouod9hYLTqndsfNzbDntYt7jwc>
Subject: [Bier] NVO3 multicast draft
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 16:53:08 -0000

--94eb2c0d45fc8adc020554c29441
Content-Type: text/plain; charset="UTF-8"

https://datatracker.ietf.org/doc/draft-ietf-nvo3-mcast-framework/

<https://datatracker.ietf.org/doc/draft-ietf-nvo3-mcast-framework/>
This is the draft that is past WGLC.  There will, of course, be an IETF
Last Call once I finish reviewing it.

You may find it interesting and I would certainly value your reviews.

Regards,
Alia

--94eb2c0d45fc8adc020554c29441
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo=
3-mcast-framework/">https://datatracker.ietf.org/doc/draft-ietf-nvo3-mcast-=
framework/<br></a><div><a href=3D"https://datatracker.ietf.org/doc/draft-ie=
tf-nvo3-mcast-framework/"><br></a></div><div>This is the draft that is past=
 WGLC.=C2=A0 There will, of course, be an IETF Last Call once I finish revi=
ewing it.</div><div><br></div><div>You may find it interesting and I would =
certainly value your reviews.</div><div><br></div><div>Regards,</div><div>A=
lia</div></div>

--94eb2c0d45fc8adc020554c29441--


From nobody Thu Jul 20 23:27:51 2017
Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41724126DFF; Thu, 20 Jul 2017 23:27:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.714
X-Spam-Level: 
X-Spam-Status: No, score=-2.714 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FAKE_REPLY_C=1.486, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4MxJShdAT6dR; Thu, 20 Jul 2017 23:27:46 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00358126C3D; Thu, 20 Jul 2017 23:27:45 -0700 (PDT)
Received: from faui40p.informatik.uni-erlangen.de (faui40p.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:77]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id C22D958C4B7; Fri, 21 Jul 2017 08:27:41 +0200 (CEST)
Received: by faui40p.informatik.uni-erlangen.de (Postfix, from userid 10463) id A8486B0C64C; Fri, 21 Jul 2017 08:27:41 +0200 (CEST)
Date: Fri, 21 Jul 2017 08:27:41 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: Greg Shepherd <gjshep@gmail.com>
Cc: "bier@ietf.org" <bier@ietf.org>, isis-wg@ietf.org, hannes@gredler.at, chopps@chopps.org
Message-ID: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Q2BCJH7UPq5IYbMVgosXyF_kl9U>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 06:27:49 -0000

Sorry, past the two weeks, but hopefully  benign textual comments:

We tried to find an explicit statement about the scope of BIER TLVs - eg:
are they meant to stay within an area, have some redistribution across
areas/levels or not.

Tony said WG agreement was to have these TLV be flooded across the whole
ISIS domain for now (this draft). So an explicit statement to that effect would
be great (All BIER sub-domains TLVs are flooded across all ISIS areas/levels,                     so they span the whole ISIS domain).

Also, if future work may/should could improve on that maybe some sentence
about that (i guess one could just have ISIS intra-area BIER sub-domains ?).

Also: Do a check about possible ambiguity of any generic terms like                               sub-domain, level, area, topology so that reader that don't know the terminology ofall protocols (ISIS, BIER) by heart can easily know which protocol is referred to.

I guess there are no BIER level, area or topologies, but still makes reading easier if the
doc would say "ISIS level", "ISIS area", or at least have them in the
Terminology section. And probably in terminology say "domain -> in the context
of this document the BIER domain which is also the same as the ISIS domain"
(which i hope is the correct statement, see above).

Cheers
    Toerless


From nobody Fri Jul 21 02:46:35 2017
Return-Path: <hooman.bidgoli@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD528127869 for <bier@ietfa.amsl.com>; Fri, 21 Jul 2017 02:46:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.91
X-Spam-Level: 
X-Spam-Status: No, score=-2.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piM6Pay6hmP1 for <bier@ietfa.amsl.com>; Fri, 21 Jul 2017 02:46:31 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0114.outbound.protection.outlook.com [104.47.0.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A12D127868 for <bier@ietf.org>; Fri, 21 Jul 2017 02:46:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=ZYDd8Mi6y4PGlwEWIX+/QLO4R0QkgQfAaJvGfcltQ0k=; b=OtUiU9v4PAM3FJ5nTlG+g7RIetIwBhffKnGbU3dJitJta3aPD58SvyqNBww3CKksqkvye02YiyEKZaDZjkKkr+Ev2bxQy/cPrkJpED9arRbhsdnNies+Pjy1Rh07C24DFcWApa+eX+8ErbR874+L0Bt+oU7PTggYIWjepUO6sV8=
Received: from VI1PR0701MB2351.eurprd07.prod.outlook.com (10.168.137.146) by VI1PR0701MB2846.eurprd07.prod.outlook.com (10.173.71.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Fri, 21 Jul 2017 09:46:27 +0000
Received: from VI1PR0701MB2351.eurprd07.prod.outlook.com ([fe80::8cae:e518:86d0:2d60]) by VI1PR0701MB2351.eurprd07.prod.outlook.com ([fe80::8cae:e518:86d0:2d60%14]) with mapi id 15.01.1282.011; Fri, 21 Jul 2017 09:46:27 +0000
From: "Bidgoli, Hooman (Nokia - CA/Ottawa)" <hooman.bidgoli@nokia.com>
To: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>, "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>, Antoni Przygienda <prz@juniper.net>
CC: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZKJZUqQ7gAM+OpCAAW7LoA==
Date: Fri, 21 Jul 2017 09:46:26 +0000
Message-ID: <VI1PR0701MB2351A72DAED29AE406BC38C491A40@VI1PR0701MB2351.eurprd07.prod.outlook.com>
References: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net> <B681B2B4-3518-4F8A-A83A-7AEBED2F7CE7@nokia.com> <DM5PR05MB3145A4AFB275EF7DAE114E20D4A70@DM5PR05MB3145.namprd05.prod.outlook.com>
In-Reply-To: <DM5PR05MB3145A4AFB275EF7DAE114E20D4A70@DM5PR05MB3145.namprd05.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=hooman.bidgoli@nokia.com; 
x-originating-ip: [135.245.20.22]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0701MB2846; 7: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
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(39860400002)(39400400002)(39410400002)(39850400002)(39450400003)(39840400002)(377454003)(189002)(199003)(24454002)(6306002)(54896002)(606006)(229853002)(101416001)(2950100002)(4326008)(189998001)(7736002)(3660700001)(33656002)(5250100002)(25786009)(6506006)(5003630100001)(1941001)(97736004)(14454004)(478600001)(106356001)(105586002)(38730400002)(2906002)(81156014)(8936002)(66066001)(53546010)(50986999)(966005)(81166006)(76176999)(54356999)(230783001)(6116002)(55016002)(74316002)(9686003)(3846002)(102836003)(8666007)(790700001)(86362001)(6436002)(6246003)(5660300001)(7696004)(3280700002)(53936002)(236005)(99286003)(2900100001)(68736007)(8676002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR0701MB2846; H:VI1PR0701MB2351.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
x-ms-office365-filtering-correlation-id: e32425ea-9523-43df-eed3-08d4d01d5b59
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:VI1PR0701MB2846; 
x-ms-traffictypediagnostic: VI1PR0701MB2846:
x-exchange-antispam-report-test: UriScan:(151999592597050)(190756311086443)(26388249023172)(138986009662008)(82608151540597)(21748063052155);
x-microsoft-antispam-prvs: <VI1PR0701MB2846A429D51A7CC18C70BB2791A40@VI1PR0701MB2846.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6041248)(20161123562025)(20161123560025)(20161123555025)(20161123564025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:VI1PR0701MB2846; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:VI1PR0701MB2846; 
x-forefront-prvs: 0375972289
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0701MB2351A72DAED29AE406BC38C491A40VI1PR0701MB2351_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jul 2017 09:46:26.9613 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2846
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/us73yPvwExftGptyx65i2u_5rjE>
Subject: Re: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 09:46:34 -0000

--_000_VI1PR0701MB2351A72DAED29AE406BC38C491A40VI1PR0701MB2351_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_VI1PR0701MB2351A72DAED29AE406BC38C491A40VI1PR0701MB2351_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0701MB2351A72DAED29AE406BC38C491A40VI1PR0701MB2351_--


From nobody Fri Jul 21 05:18:09 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CDA2131BFC; Fri, 21 Jul 2017 05:18:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0H9H7ZJgTSGG; Fri, 21 Jul 2017 05:18:05 -0700 (PDT)
Received: from mail-wm0-x22c.google.com (mail-wm0-x22c.google.com [IPv6:2a00:1450:400c:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C77E0131B69; Fri, 21 Jul 2017 05:18:04 -0700 (PDT)
Received: by mail-wm0-x22c.google.com with SMTP id w191so7027865wmw.1; Fri, 21 Jul 2017 05:18:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=MocJks5CHN/PHhTN1BBkAcDu+uIsSLz3C4mLl0hin4I=; b=TYya9th0pOCxKuuRNwJ6fK+Nbh/Lx2g8qVxNhWtTz0mIZjcsbBVafbLuzjrywHYmQD 1HJaNVaqBXw85LIVUlqhPI2sx3o9ZuUCgfU9DRYv3Jhiuj+dWNLGt60SGzJnkZkYRSmD ebLIGoeSQRtiSqsPIQagSaS50fl5o14dMMPPGBIShB1usaX5kz8u/eyfD8ifAn/97601 oRS8D6EBqhUfs/p1hztGyHMTL2T2dbmD+XEjoR0Od9YznC/Cxq0wXaALqbT17C/cKYER /ua+uXuT7ta5A73tb02JqVljsnG89RIa7oBNBJ0E3zv4CrJ+ljyn0JHBaSnhpSiIDyyk lFRA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=MocJks5CHN/PHhTN1BBkAcDu+uIsSLz3C4mLl0hin4I=; b=eJUgQIQA09d4x388sq0jl6riDWnpYaPlEGvUW+kVKEMacdGH/36ZUTZJWEu2cge5Nq 1pqqDhVHTDGl7UzbHJxmYzBJ1wiIT5dE9kXtY4+pxwRSJDH7NNWDKmIIsPVNp7l/bhQ3 fOAHtQ4meZ0KIQsf7iDoskl5EkUH/4HwOzKbHi1RcWOf+aky/CqurH5Ybbg/QYtzLIdj d8mLvcs2Tmlq2lXPhhO6YrY4b6liOgJHnnQraRrK3+FML3oYJ7RYDgihXWyiC5vhD1Bc XFoeByABN5h2kW+2Ir90pH45EBLL5AdegGVZa99xzcdpnzr9l6HVedv0S9QiSmsEQ/M+ fDoA==
X-Gm-Message-State: AIVw113MpTgzvoc79mOZVAhGFb1sbmSNGrvrMJ/pfFSkt14ACG363DVk dvFTzivkRzMKcn+vOCPvrSGNgx6DKg==
X-Received: by 10.80.143.101 with SMTP id 92mr5742363edy.68.1500639483360; Fri, 21 Jul 2017 05:18:03 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.138.99 with HTTP; Fri, 21 Jul 2017 05:17:23 -0700 (PDT)
In-Reply-To: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de>
References: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Fri, 21 Jul 2017 14:17:23 +0200
Message-ID: <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com>
To: Toerless Eckert <tte@cs.fau.de>
Cc: Greg Shepherd <gjshep@gmail.com>,  "Hannes Gredler (hannes@gredler.at)" <hannes@gredler.at>, "bier@ietf.org" <bier@ietf.org>,  "isis-wg@ietf.org list" <isis-wg@ietf.org>, Christian Hopps <chopps@chopps.org>
Content-Type: multipart/alternative; boundary="94eb2c1959fc577d6c0554d2db8e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/jTO5aQdKvNMKWEE_OBn8x26N6Nk>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 12:18:07 -0000

--94eb2c1959fc577d6c0554d2db8e
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Terminology is a bit nits  IMO since the doc is reading clear enough for
someone who read BIER & ISIS. I can reread it or Les can comment whether we
should tighten glossary ...

With the scope I agree, that got lost and the doc should be possibly rev'ed
before closing LC. Yes, we flood AD wide was the agreement but something
mentioning that this could change in the future is good so we are forced to
give it some thought how that would transition ...

Thinking further though, in ISIS we have a clean document really. The  BIER
sub-TLVs go into well defined TLVs in terms of flooding scope. Normal L1-L2
redistribution can be used to get the info to all needed places AFAIS. So
maybe nothing needs to be written. I wait for Les to chime in.

OSPF I would have to look @ scopes again & think whether we need to write
something or maybe Peter can comment ...

--- tony



On Fri, Jul 21, 2017 at 8:27 AM, Toerless Eckert <tte@cs.fau.de> wrote:

> Sorry, past the two weeks, but hopefully  benign textual comments:
>
> We tried to find an explicit statement about the scope of BIER TLVs - eg:
> are they meant to stay within an area, have some redistribution across
> areas/levels or not.
>
> Tony said WG agreement was to have these TLV be flooded across the whole
> ISIS domain for now (this draft). So an explicit statement to that effect
> would
> be great (All BIER sub-domains TLVs are flooded across all ISIS
> areas/levels,                     so they span the whole ISIS domain).
>
> Also, if future work may/should could improve on that maybe some sentence
> about that (i guess one could just have ISIS intra-area BIER sub-domains
> ?).
>
> Also: Do a check about possible ambiguity of any generic terms like
>                        sub-domain, level, area, topology so that reader
> that don't know the terminology ofall protocols (ISIS, BIER) by heart can
> easily know which protocol is referred to.
>
> I guess there are no BIER level, area or topologies, but still makes
> reading easier if the
> doc would say "ISIS level", "ISIS area", or at least have them in the
> Terminology section. And probably in terminology say "domain -> in the
> context
> of this document the BIER domain which is also the same as the ISIS domai=
n"
> (which i hope is the correct statement, see above).
>
> Cheers
>     Toerless
>
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier
>



--=20
*We=E2=80=99ve heard that a million monkeys at a million keyboards could pr=
oduce
the complete works of Shakespeare; now, thanks to the Internet, we know
that is not true.*
=E2=80=94Robert Wilensky

--94eb2c1959fc577d6c0554d2db8e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Terminology is a bit nits =C2=A0IMO since the doc is readi=
ng clear enough for someone who read BIER &amp; ISIS. I can reread it or Le=
s can comment whether we should tighten glossary ...=C2=A0<div><br></div><d=
iv>With the scope I agree, that got lost and the doc should be possibly rev=
&#39;ed before closing LC. Yes, we flood AD wide was the agreement but some=
thing mentioning that this could change in the future is good so we are for=
ced to give it some thought how that would transition ...=C2=A0</div><div><=
br></div><div>Thinking further though, in ISIS we have a clean document rea=
lly. The =C2=A0BIER sub-TLVs go into well defined TLVs in terms of flooding=
 scope. Normal L1-L2 redistribution can be used to get the info to all need=
ed places AFAIS. So maybe nothing needs to be written. I wait for Les to ch=
ime in.=C2=A0</div><div><br></div><div>OSPF I would have to look @ scopes a=
gain &amp; think whether we need to write something or maybe Peter can comm=
ent ...=C2=A0</div><div><br></div><div>--- tony=C2=A0</div><div><br></div><=
div><br></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quot=
e">On Fri, Jul 21, 2017 at 8:27 AM, Toerless Eckert <span dir=3D"ltr">&lt;<=
a href=3D"mailto:tte@cs.fau.de" target=3D"_blank">tte@cs.fau.de</a>&gt;</sp=
an> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">Sorry, past the two weeks, but=
 hopefully=C2=A0 benign textual comments:<br>
<br>
We tried to find an explicit statement about the scope of BIER TLVs - eg:<b=
r>
are they meant to stay within an area, have some redistribution across<br>
areas/levels or not.<br>
<br>
Tony said WG agreement was to have these TLV be flooded across the whole<br=
>
ISIS domain for now (this draft). So an explicit statement to that effect w=
ould<br>
be great (All BIER sub-domains TLVs are flooded across all ISIS areas/level=
s,=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0so they span the whole ISIS domain).<br>
<br>
Also, if future work may/should could improve on that maybe some sentence<b=
r>
about that (i guess one could just have ISIS intra-area BIER sub-domains ?)=
.<br>
<br>
Also: Do a check about possible ambiguity of any generic terms like=C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sub-domain, level, area, topology so that re=
ader that don&#39;t know the terminology ofall protocols (ISIS, BIER) by he=
art can easily know which protocol is referred to.<br>
<br>
I guess there are no BIER level, area or topologies, but still makes readin=
g easier if the<br>
doc would say &quot;ISIS level&quot;, &quot;ISIS area&quot;, or at least ha=
ve them in the<br>
Terminology section. And probably in terminology say &quot;domain -&gt; in =
the context<br>
of this document the BIER domain which is also the same as the ISIS domain&=
quot;<br>
(which i hope is the correct statement, see above).<br>
<br>
Cheers<br>
=C2=A0 =C2=A0 Toerless<br>
<br>
______________________________<wbr>_________________<br>
BIER mailing list<br>
<a href=3D"mailto:BIER@ietf.org">BIER@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/bier" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/bier</a><br>
</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div class=
=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr"><d=
iv><span style=3D"font-size:12.8000001907349px"><font face=3D"georgia, seri=
f"><i>We=E2=80=99ve heard that a million monkeys at a million keyboards cou=
ld produce the complete works of Shakespeare; now, thanks to the Internet, =
we know that is not true.</i></font></span><i><font face=3D"garamond, serif=
"><br></font></i></div><div><span style=3D"font-size:12.8000001907349px"><f=
ont face=3D"times new roman, serif">=E2=80=94Robert Wilensky</font></span><=
br></div></div></div>
</div>

--94eb2c1959fc577d6c0554d2db8e--


From nobody Fri Jul 21 05:22:51 2017
Return-Path: <prz@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C6D813157A for <bier@ietfa.amsl.com>; Fri, 21 Jul 2017 05:22:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.021
X-Spam-Level: 
X-Spam-Status: No, score=-2.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yu8wzWCM0SZA for <bier@ietfa.amsl.com>; Fri, 21 Jul 2017 05:22:47 -0700 (PDT)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0116.outbound.protection.outlook.com [104.47.40.116]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1D8012EAF0 for <bier@ietf.org>; Fri, 21 Jul 2017 05:22:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=1svStCfq8zcJ82oozdtKLIzmlg77Iqus86FMOJd9iZA=; b=V/xTAT7KcZg4o1MDJlRbP9qjBetzcXeVo+yxnDaXQaDWB3hQLU3lUvTG+PK47JlAmYFdtkKkHit8dFggyK/UKCsxc2F81eOOdpfBj+F7HnXu3lhbdOlvfj3aNYrvdNOgL7ud75g0/rXFHIklOTnu2ylrnjJry5hV5BHoPLA5Sus=
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com (10.161.224.148) by DM2PR0501MB827.namprd05.prod.outlook.com (10.242.115.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Fri, 21 Jul 2017 12:22:46 +0000
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444]) by DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444%14]) with mapi id 15.01.1282.011; Fri, 21 Jul 2017 12:22:46 +0000
From: Antoni Przygienda <prz@juniper.net>
To: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: I-D was expired <draft-ietf-bier-ping-01.txt>
Thread-Index: AQHTAfDiU+Wr85CWi02W//S2N34Hr6JeVcEA
Date: Fri, 21 Jul 2017 12:22:45 +0000
Message-ID: <BEB0A78D-0245-42E8-A4F8-520B4B31637E@juniper.net>
References: <150062121935.23918.799681947042505068.idtracker@ietfa.amsl.com>
In-Reply-To: <150062121935.23918.799681947042505068.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.20.0.170309
authentication-results: spf=none (sender IP is ) smtp.mailfrom=prz@juniper.net; 
x-originating-ip: [193.110.55.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM2PR0501MB827; 7:YK6RmxEgygVVAr7o8WLRdk42ei7Nn+JrOA4DBSnTBLZMNyzCgCczJGZw0MtwztK7YOgL/iIbRSJuoIXF749+whJIikIhniAr5UybYMrmjJdJQqYC59uPox4z6bsjx7z+UzECnDpegKSWHvvrWekenslHJQMLXpVQPK/I3Im49TFNnnJ0H5L31BMGWYBiZrmZV/k1b1GNBq1z8r1PqYAYmbtrDsi90M4HvW0N10e2aTlIFV20fhW263ouKNqUVBhXKvOnJMzz/lLLJBU6zRKzOW48iZBwGwZ4KZdrjyDIsgiWlTeCuHso4zPNBmAyXoP3jB7nHUiId7NUQ6iNqGMKe1ZXBxaWpS1RE5jhWTxaChGiW3k2nndSt3YSwwLz7g2z0tOMFZWqRiHkX0bgN61ujZDnzCBlHAz8ta7L7+BJNvbO2wH4+oPunqmlJqHtSOv6iNqcLGpdtSYisCX/z2GAeodfFZqB/6OejgdUlF8lvrzkbVT1CCX7FapPSaSfIn8I6DWz55Q4jKZcXlXZWsidjbWuKk/llmPKezeBouoyT2JeK4RFw85cVkoUucu3qjAwxaoNRYPFscgcWMYSsdOeTw7k6suZcafMHlczMnLGQZMECtN6+Bgcr0Pg75GVUThmISDjSLbpGIaFLD7VZvOEgTPDWSDP9lE45rrs6IqWNtetu94nKFFHD38zvF5EGDFDwUJw9sShGl+E+OIeknyz+e5gY6aYqMbx0Ka2WWY1JpyC7Fo2Dy057CjdMfZ2gHAVe+XPJxlOVeHx9sLKEEDxCAqW1cKZSGjki0+AuGeI5EA=
x-ms-office365-filtering-correlation-id: 2b4eeb07-41ff-4723-fb76-08d4d033319a
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM2PR0501MB827; 
x-ms-traffictypediagnostic: DM2PR0501MB827:
x-exchange-antispam-report-test: UriScan:;
x-microsoft-antispam-prvs: <DM2PR0501MB82729D9871AE432610E26B6ACA40@DM2PR0501MB827.namprd05.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(100000703101)(100105400095)(10201501046)(3002001)(93006095)(93001095)(6055026)(6041248)(20161123555025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123562025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM2PR0501MB827; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM2PR0501MB827; 
x-forefront-prvs: 0375972289
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39410400002)(39860400002)(39850400002)(39400400002)(39450400003)(39840400002)(199003)(189002)(6916009)(2501003)(2351001)(36756003)(7736002)(105586002)(106356001)(6506006)(33656002)(102836003)(86362001)(101416001)(230783001)(3846002)(3280700002)(110136004)(305945005)(2900100001)(76176999)(25786009)(558084003)(54356999)(3660700001)(38730400002)(5660300001)(2950100002)(5250100002)(8676002)(6512007)(81156014)(97736004)(2473003)(14454004)(83506001)(82746002)(6436002)(66066001)(99286003)(6116002)(2906002)(81166006)(50986999)(8936002)(53936002)(5640700003)(189998001)(68736007)(1730700003)(83716003)(478600001)(6486002)(4001350100001)(229853002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB827; H:DM2PR0501MB1438.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <D5EFC772D0209E44BA3A216F33303820@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jul 2017 12:22:45.8371 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB827
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/kHduEhgllZu5srvONPovlyNhlKw>
Subject: [Bier] FW: I-D was expired <draft-ietf-bier-ping-01.txt>
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 12:22:49 -0000

Q2FuIHRoZSBhdXRob3JzIHJlc3VibWl0IHBscywgd2UgbmVlZCB0aGF0IHN0dWZmLiBJIGhhZCBh
dCBsZWFzdCAyIGRpc2N1c3Npb25zIHRoaXMgSUVURiBhYm91dCBCSUVSIG9wZXJhdGlvbmFsIGFu
ZCBPQU0gYW5kIHNvIG9uIOKApiANCg0KLS0tIHRvbnkNCiANCg0KPGlldGYtc2VjcmV0YXJpYXQt
cmVwbHlAaWV0Zi5vcmc+IHNwYWtlOg0KDQogICAgPGRyYWZ0LWlldGYtYmllci1waW5nLTAxLnR4
dD4gd2FzIGp1c3QgZXhwaXJlZC4NCiAgICBUaGlzIGRyYWZ0IGlzIGluIHRoZSBzdGF0ZSAiSS1E
IEV4aXN0cyIgaW4gdGhlIERhdGF0cmFja2VyLg0KICAgIA0KICAgIA0KICAgIFRoYW5rcywNCiAg
ICBJRVRGIFNlY3JldGFyaWF0Lg0KICAgIA0KICAgIA0KDQo=


From nobody Fri Jul 21 05:54:26 2017
Return-Path: <naikumar@cisco.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8851131C13 for <bier@ietfa.amsl.com>; Fri, 21 Jul 2017 05:54:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level: 
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6LIfDHz4RVh5 for <bier@ietfa.amsl.com>; Fri, 21 Jul 2017 05:54:23 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C642131794 for <bier@ietf.org>; Fri, 21 Jul 2017 05:54:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1072; q=dns/txt; s=iport; t=1500641663; x=1501851263; h=from:to:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=NEde1Q2KwUVZ0HRnGpPzQOl3Q9Aj0pz48LeHTa1eylM=; b=P6JWVpRZSJVKSKv6PyO1t3pJ3fjumMehKV/IDAMdd7Gx3aKELVyEME64 cGJmdiPS+UWuq6fIXcZEimRD1dp1JdOxD3mo/PrZSTkyhGF+EcE5NNwMI fBUJUqnjX8WQ8C88EZ9rLIandMsjsEChhx69EAuqptE0FcxvCSUkG/EsP g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AMAQBH+HFZ/5NdJa1cGwEBAQMBAQEJA?= =?us-ascii?q?QEBg1pkgRQHjgWna4IRIQuFN4NkPxgBAgEBAQEBAQFrKIUZBgEBIRE6HQEIDgw?= =?us-ascii?q?CJgIEJQsVEgQBEoovEK5DgiaLIwEBAQEBAQEBAQEBAQEBAQEBAQEBARgFgQuCH?= =?us-ascii?q?YUuK4J5h30wgjEFiVaIaI0OApQZgXSQQpViAR84gQp1FUkSAYcDdoh5gQ4BAQE?=
X-IronPort-AV: E=Sophos;i="5.40,390,1496102400"; d="scan'208";a="270678932"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Jul 2017 12:54:22 +0000
Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id v6LCsM21016043 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 21 Jul 2017 12:54:22 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Fri, 21 Jul 2017 07:54:21 -0500
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1210.000; Fri, 21 Jul 2017 07:54:21 -0500
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: Antoni Przygienda <prz@juniper.net>, "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] FW: I-D was expired <draft-ietf-bier-ping-01.txt>
Thread-Index: AQHTAiB4JL9f9nkCxkmkbEkMZYy7qA==
Date: Fri, 21 Jul 2017 12:54:21 +0000
Message-ID: <F86F3386-87CE-42CD-A399-D4D78CE74F48@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.22.0.170515
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.238.82]
Content-Type: text/plain; charset="utf-8"
Content-ID: <36EEB9197D59364AB2B9DCE5FE5812D1@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/pXUEd1xZMd0lUl6Sk5O_JBMIZTw>
Subject: Re: [Bier] FW: I-D was expired <draft-ietf-bier-ping-01.txt>
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 12:54:25 -0000
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From nobody Fri Jul 21 06:01:22 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id ECE3D131BFA; Fri, 21 Jul 2017 06:01:12 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.57.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150064207293.11161.12108295312919392576@ietfa.amsl.com>
Date: Fri, 21 Jul 2017 06:01:12 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/xRD4GNFKdPAOlbLvi_o2KO4s5Bc>
Subject: [Bier] I-D Action: draft-ietf-bier-ping-02.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 13:01:13 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication WG of the IETF.

        Title           : BIER Ping and Trace
        Authors         : Nagendra Kumar
                          Carlos Pignataro
                          Nobo Akiya
                          Lianshu Zheng
                          Mach Chen
                          Greg Mirsky
	Filename        : draft-ietf-bier-ping-02.txt
	Pages           : 26
	Date            : 2017-07-21

Abstract:
   Bit Index Explicit Replication (BIER) is an architecture that
   provides optimal multicast forwarding through a "BIER domain" without
   requiring intermediate routers to maintain any multicast related per-
   flow state.  BIER also does not require any explicit tree-building
   protocol for its operation.  A multicast data packet enters a BIER
   domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
   BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
   The BFIR router adds a BIER header to the packet.  The BIER header
   contains a bit-string in which each bit represents exactly one BFER
   to forward the packet to.  The set of BFERs to which the multicast
   packet needs to be forwarded is expressed by setting the bits that
   correspond to those routers in the BIER header.

   This document describes the mechanism and basic BIER OAM packet
   format that can be used to perform failure detection and isolation on
   BIER data plane.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-ping/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-ping-02
https://datatracker.ietf.org/doc/html/draft-ietf-bier-ping-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-ping-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri Jul 21 23:04:24 2017
Return-Path: <ginsberg@cisco.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 093801274D2; Fri, 21 Jul 2017 23:04:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level: 
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0S_uHIuXESLB; Fri, 21 Jul 2017 23:04:20 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A3FC126D85; Fri, 21 Jul 2017 23:04:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25004; q=dns/txt; s=iport; t=1500703460; x=1501913060; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Z4yMb8dr3E7004E71WaWa8Z8sS1zVpdZVQVWYVbuhbU=; b=H3r6H7lvRq8E/8id50IylH+0ZJS0L4fUfQ4X012nZziRdmwkiWVLmRtU s0H3se6nQ86O0ImCYupXcgmOrnGSILpwpvnj2Z3JkBY8XC/7rsEC3A8Ow XXTNllaWeIJwT76++3taZ52o2t0nTtyqpw6EkraN6v9D7IXtifTIgN5fR g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CaAAB+6nJZ/4gNJK1dGQEBAQEBAQEBA?= =?us-ascii?q?QEBBwEBAQEBgm8+LWSBFAeOBZFmlgWCESEBDIUZAhqDZD8YAQIBAQEBAQEBayi?= =?us-ascii?q?FGAEBAQEDAQEhBAZBCxACAQgRBAEBKAMCAgIlCxQJCAIEAQ0FCIlDZBCuO4FsO?= =?us-ascii?q?oszAQEBAQEBAQEBAQEBAQEBAQEBAQEBGAWDKINNgWABghiBDIUQEIJdgmEFlxs?= =?us-ascii?q?xiAAClBCCFYlIhmKVYgEfOIEKdRVJhRMcgWd2AQGHICuBBYEOAQEB?=
X-IronPort-AV: E=Sophos;i="5.40,394,1496102400";  d="scan'208,217";a="271262933"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Jul 2017 06:03:54 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id v6M63sOd031431 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 22 Jul 2017 06:03:54 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Sat, 22 Jul 2017 01:03:53 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1210.000; Sat, 22 Jul 2017 01:03:53 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Tony Przygienda <tonysietf@gmail.com>, Toerless Eckert <tte@cs.fau.de>
CC: "Hannes Gredler (hannes@gredler.at)" <hannes@gredler.at>, Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>, Christian Hopps <chopps@chopps.org>
Thread-Topic: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
Thread-Index: AQHTAep+OLJgflK73kG/QMbI+G29DqJehpmAgADQ+xA=
Date: Sat, 22 Jul 2017 06:03:53 +0000
Message-ID: <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com>
References: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de> <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com>
In-Reply-To: <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.42.237]
Content-Type: multipart/alternative; boundary="_000_567fdbe4992c4207b54c77b1ec8cd0cdXCHALN001ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/0b61fivVjLh01vSSvW0q7VCPezk>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jul 2017 06:04:23 -0000

--_000_567fdbe4992c4207b54c77b1ec8cd0cdXCHALN001ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_567fdbe4992c4207b54c77b1ec8cd0cdXCHALN001ciscocom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_567fdbe4992c4207b54c77b1ec8cd0cdXCHALN001ciscocom_--


From nobody Sat Jul 22 06:34:36 2017
Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81536129AD1; Sat, 22 Jul 2017 06:34:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uRJRE9Mq0B_G; Sat, 22 Jul 2017 06:34:24 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC445131A78; Sat, 22 Jul 2017 06:34:23 -0700 (PDT)
Received: from faui40p.informatik.uni-erlangen.de (faui40p.informatik.uni-erlangen.de [131.188.34.77]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 6A25758C4B0; Sat, 22 Jul 2017 15:34:19 +0200 (CEST)
Received: by faui40p.informatik.uni-erlangen.de (Postfix, from userid 10463) id 53108B0C66E; Sat, 22 Jul 2017 15:34:19 +0200 (CEST)
Date: Sat, 22 Jul 2017 15:34:19 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
Cc: Tony Przygienda <tonysietf@gmail.com>, "Hannes Gredler (hannes@gredler.at)" <hannes@gredler.at>, Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>, Christian Hopps <chopps@chopps.org>
Message-ID: <20170722133419.GA18218@faui40p.informatik.uni-erlangen.de>
References: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de> <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com> <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/478j93XF_wwCAidrvToGVDscrAk>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jul 2017 13:34:27 -0000

Thanks Les

When searching various terms in the doc to figure out what happens
i am not sure why i missed this one.

But: IMHO, RFCs can not only be the minimum number of words to get a
running implementation. It also needs to specify what this implementation
intends to achieve. Otherwise its not possible to do a useful review:
The reviewer can to verify whether the spec will achieve what it claims
to achieve is there no definitionn of what it claims to achieve.

If i understand ISIS correctly, my reverse engineering of the intent is:

- BIER TLVs stay within single ISIS areas. BFIR and BFER must therefore be
  in the same ISIS area: There is no inter-area BIER traffic possible
  with this specification. This is also true for ISIS area 0.

- The same BIER sub-domain identifiers can be re-used
  across different ISIS areas without any current impact. If these BFR-IDs
  are non-overlapping, then this would allow in the future to create a single
  cross ISIS area BIER sub-domain by leaking TLVs for such a BIER sub-domain
  across ISIS levels. Leakage is outside the scope of this specificication.

I actually even would like to do the following:

- If BIER sub-domains are made to span multiple ISIS areas and BFR-ids assignemtns
  are made such that all BFR-ids with the same SI are in the same ISIS ara,
  then it should be in the future reasonably easy to create inter-area BIER
  not by leaking of the BIER TLV but by having BFIR MPLS unicastBIER packets
  for different SIs to an appropriate L2L1 BFIR that is part of the destination area/SI.
  (if you would use SI number that are the same as ISIS area numbers then
   you could probably do this without any new signaling. Not quite sure if
   you can today easily find L1L2 border router for another area via existing
   TLVs).

  Alas, this idea will probably be killed because of the BIER architecture
  intent not to engineer SI assignments in geographical fashions to
  minimize traffic duplication in the presence of multiple SIs.
  
Cheers
    Toerless

On Sat, Jul 22, 2017 at 06:03:53AM +0000, Les Ginsberg (ginsberg) wrote:
> Tony/Toerless ???
> 
> There is an explicit statement as to scope:
> 
> <snip>
> Section 4.2
> ???
>    o  BIER sub-TLVs MUST NOT be included when a prefix reachability
>       advertisement is leaked between levels.
> <end snip>
> 
> Tony seems to have forgotten that we had a discussion about how BIER might be supported across areas and the conclusion was we did not know how to do that yet.
> (Sorry Tony)
> 
> Note this is ???consistent??? with https://www.ietf.org/id/draft-ietf-bier-ospf-bier-extensions-07.txt Section 2.5<https://www.ietf.org/id/draft-ietf-bier-ospf-bier-extensions-07.txt%20Section%202.5> - which limits the flooding scope of BIER information to a single area unless it can be validated that the best path to the prefix with BIER info can be validated to be to a router which itself advertised the BIER info. This is not something IS-IS can do since a single IS-IS instance only supports one area and therefore does not have the Level-1 advertisements of the originating router when that router is in another area.
> 
> A few more responses inline.
> 
> From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Tony Przygienda
> Sent: Friday, July 21, 2017 5:17 AM
> To: Toerless Eckert
> Cc: Hannes Gredler (hannes@gredler.at); Greg Shepherd; bier@ietf.org; isis-wg@ietf.org list; Christian Hopps
> Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
> 
> Terminology is a bit nits  IMO since the doc is reading clear enough for someone who read BIER & ISIS. I can reread it or Les can comment whether we should tighten glossary ...
> 
> With the scope I agree, that got lost and the doc should be possibly rev'ed before closing LC. Yes, we flood AD wide was the agreement but something mentioning that this could change in the future is good so we are forced to give it some thought how that would transition ...
> 
> Thinking further though, in ISIS we have a clean document really. The  BIER sub-TLVs go into well defined TLVs in terms of flooding scope. Normal L1-L2 redistribution can be used to get the info to all needed places AFAIS. So maybe nothing needs to be written. I wait for Les to chime in.
> 
> OSPF I would have to look @ scopes again & think whether we need to write something or maybe Peter can comment ...
> 
> --- tony
> 
> 
> 
> On Fri, Jul 21, 2017 at 8:27 AM, Toerless Eckert <tte@cs.fau.de<mailto:tte@cs.fau.de>> wrote:
> Sorry, past the two weeks, but hopefully  benign textual comments:
> 
> We tried to find an explicit statement about the scope of BIER TLVs - eg:
> are they meant to stay within an area, have some redistribution across
> areas/levels or not.
> 
> Tony said WG agreement was to have these TLV be flooded across the whole
> ISIS domain for now (this draft). So an explicit statement to that effect would
> be great (All BIER sub-domains TLVs are flooded across all ISIS areas/levels,                     so they span the whole ISIS domain).
> 
> Also, if future work may/should could improve on that maybe some sentence
> about that (i guess one could just have ISIS intra-area BIER sub-domains ?).
> 
> Also: Do a check about possible ambiguity of any generic terms like                               sub-domain, level, area, topology so that reader that don't know the terminology ofall protocols (ISIS, BIER) by heart can easily know which protocol is referred to.
> 
> [Les:] There is no mention of ???level??? in the document.
> The use of ???sub-domain??? is clearly always associated with ???BIER???.
> ???topology??? is always used as an RFC 5120 topology ??? therefore clearly an IS-IS topology.
> There is only one use of the term ???area??? (in Section 5.1). That text might deserve a bit of clarification given this might be either a Level 1 area or the Level2 sub-domain. I???ll take a pass at it.
> (BTW ??? I am talking about IS-IS area/L2sub-domain Toerless. ???)
> 
> I don???t see that any other clarification is needed ??? but Toerless ??? if you can point to any specific sentences/paragraphs which you find confusing - I???ll take a second look.
> 
>    Les
> 
> 
> I guess there are no BIER level, area or topologies, but still makes reading easier if the
> doc would say "ISIS level", "ISIS area", or at least have them in the
> Terminology section. And probably in terminology say "domain -> in the context
> of this document the BIER domain which is also the same as the ISIS domain"
> (which i hope is the correct statement, see above).
> 
> Cheers
>     Toerless
> 
> _______________________________________________
> BIER mailing list
> BIER@ietf.org<mailto:BIER@ietf.org>
> https://www.ietf.org/mailman/listinfo/bier
> 
> 
> 
> --
> We???ve heard that a million monkeys at a million keyboards could produce the complete works of Shakespeare; now, thanks to the Internet, we know that is not true.
> ???Robert Wilensky

-- 
---
tte@cs.fau.de


From nobody Sun Jul 23 02:03:12 2017
Return-Path: <tonysietf@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 947D0120721; Sun, 23 Jul 2017 02:03:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yNzGZegHGQiU; Sun, 23 Jul 2017 02:03:09 -0700 (PDT)
Received: from mail-wm0-x22d.google.com (mail-wm0-x22d.google.com [IPv6:2a00:1450:400c:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 472E4124217; Sun, 23 Jul 2017 02:03:09 -0700 (PDT)
Received: by mail-wm0-x22d.google.com with SMTP id w191so36224974wmw.1; Sun, 23 Jul 2017 02:03:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=0UPPoa0zOh/j+P6mPLaG55jJL3PI7f2i05QKSQrw/z4=; b=W0+S6qvqTPBJ5AsjWtqeH+G5+R3KwV2wXYNp3pLDIzSnBPXrXq3PzZTV6+oG8A12+U tQl7hFy6I1YEZCDjwpfJVooEuSz44L2/m/B/x6z7Q8kxwztDNJq9c13JcZIrneBBmEAY 5v7V/utSGAqx0RHdLwqG63wpFn2vyFQRpJrQ9u1S7phG34CmmF54wCt/YMuYtmMUEOZj Bl5YRwkmMxlaq8mELBUYou5RvEG4QR/8BMPRDxRgrpyOyEI01sPyY8istTEl1qosARq7 fT2FLt5EKVwGpc/vLw7NCG/teevZz2gOBDmVNKRZ8ne0J1BgVpFS/HHmC97VYuGYiPci fF5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=0UPPoa0zOh/j+P6mPLaG55jJL3PI7f2i05QKSQrw/z4=; b=cM/UIl/1+cKkLTfGO9lPGzqZpOvejKknx4DNEOZJfVDKcTGEmA7IT0LrfsIa/pLKvp MnS1arM0ifg4XYHea0gmvCS5MPuCVFiWQ4Vy6Pa7j0MeUkqwPgDZG1YILLtcgJ2qeu62 hXI1fL6IG4/wvMwF+DtCAFK4L7SV8O3Ig+tvOqpGlkIcjnnsaArjJGJ/2wQbe6Vl/yA+ BSFVHxuvM3th+jzMpH7D91V6K+IqLGrX1Q34eIWVCJHVFBpO60d7zt4X//DEm2rFUlsi hs3Qp1mcb9usZA+5uTOZPd/ZAHwSSjxD5eJsu3B87hBA4yzgASmxuiaJIilGdbmW5jze 8FhA==
X-Gm-Message-State: AIVw11035KgWKnJBzqyfDgfGyS5pgKDonzVtXRIdMeTUE/eTIWwcHWdB +DXQj0M//5Pi0Twj7QMk53mmvKnKgg==
X-Received: by 10.80.222.13 with SMTP id z13mr10448971edk.212.1500800587834; Sun, 23 Jul 2017 02:03:07 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.138.99 with HTTP; Sun, 23 Jul 2017 02:02:27 -0700 (PDT)
In-Reply-To: <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com>
References: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de> <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com> <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Sun, 23 Jul 2017 11:02:27 +0200
Message-ID: <CA+wi2hMVoDCRbumUA1WuWtwAxeCW=6xPFJByuMZEtwqxXDLtOg@mail.gmail.com>
To: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
Cc: Toerless Eckert <tte@cs.fau.de>, "Hannes Gredler (hannes@gredler.at)" <hannes@gredler.at>, Greg Shepherd <gjshep@gmail.com>,  "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>, Christian Hopps <chopps@chopps.org>
Content-Type: multipart/alternative; boundary="f403043e44f0eaa9000554f85d6e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/_C1CHZlSOvO7X26R2EJRoWIZk-g>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Jul 2017 09:03:11 -0000

--f403043e44f0eaa9000554f85d6e
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sat, Jul 22, 2017 at 8:03 AM, Les Ginsberg (ginsberg) <ginsberg@cisco.co=
m
> wrote:

> Tony/Toerless =E2=80=93
>
>
>
> There is an explicit statement as to scope:
>
>
>
> <snip>
>
> Section 4.2
>
> =E2=80=A6
>
>    o  BIER sub-TLVs MUST NOT be included when a prefix reachability
>
>       advertisement is leaked between levels.
>
> <end snip>
>

sigh, missed that on fly-over.


>
>
> Tony seems to have forgotten that we had a discussion about how BIER migh=
t
> be supported across areas and the conclusion was we did not know how to d=
o
> that yet.
>
> (Sorry Tony)
>

I forgot about that specifically since we had multiple discussions, you,
Peter, others and different conclusions have been reached in time per
protocol. You're here to keep my distracted self honest ...

OK< with that I think ISIS is a no-action-necessary.



>
>
> Note this is =E2=80=9Cconsistent=E2=80=9D with https://www.ietf.org/id/dr=
aft-
> ietf-bier-ospf-bier-extensions-07.txt Section 2.5 - which limits the
> flooding scope of BIER information to a single area unless it can be
> validated that the best path to the prefix with BIER info can be validate=
d
> to be to a router which itself advertised the BIER info.
>

ah, ok, I see that that we're area-scope now as well. I know we had an
agreement before that it would be AS scope or something so that changed and
is consistent ...

IMO no action on OSPF necessary either, Toerless ... Sorry for my imperfect
memories when we talked ....


> This is not something IS-IS can do since a single IS-IS instance only
> supports one area and therefore does not have the Level-1 advertisements =
of
> the originating router when that router is in another area.
>
>
>

Well, we could say "loopbacks must be leaked ..." and so on but this is
cleaner. We limit ourselves and solve the problem in the general ISIS
framework if it comes up ...

thanks Les

--- tony

--f403043e44f0eaa9000554f85d6e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Sat, Jul 22, 2017 at 8:03 AM, Les Ginsberg (ginsberg) <span dir=3D"l=
tr">&lt;<a href=3D"mailto:ginsberg@cisco.com" target=3D"_blank">ginsberg@ci=
sco.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_-5014234472235477045WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Tony/Toerless =E2=80=93<u=
></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">There is an explicit stat=
ement as to scope:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">&lt;snip&gt;<u></u><u></u=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Section 4.2<u></u><u></u>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=E2=80=A6<u></u><u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0=C2=A0 o=C2=A0 BIER=
 sub-TLVs MUST NOT be included when a prefix reachability<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 advertisement is leaked between levels.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">&lt;end snip&gt;</span></=
p></div></div></blockquote><div><br></div><div>sigh, missed that on fly-ove=
r.=C2=A0</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang=3D"=
EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"m_-5014234472235477045W=
ordSection1"><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u><u></=
u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Tony seems to have forgot=
ten that we had a discussion about how BIER might be supported across areas=
 and the conclusion was we did not know how to do that yet.<u></u><u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">(Sorry Tony)</span></p></=
div></div></blockquote><div><br></div><div>I forgot about that specifically=
 since we had multiple discussions, you, Peter, others and different conclu=
sions have been reached in time per protocol. You&#39;re here to keep my di=
stracted self honest ... =C2=A0</div><div><br></div><div>OK&lt; with that I=
 think ISIS is a no-action-necessary.=C2=A0</div><div><br></div><div>=C2=A0=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlin=
k=3D"purple"><div class=3D"m_-5014234472235477045WordSection1"><p class=3D"=
MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,=
&quot;sans-serif&quot;;color:#1f497d"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Note this is =E2=80=9Ccon=
sistent=E2=80=9D with
<a href=3D"https://www.ietf.org/id/draft-ietf-bier-ospf-bier-extensions-07.=
txt%20Section%202.5" target=3D"_blank">
https://www.ietf.org/id/draft-<wbr>ietf-bier-ospf-bier-<wbr>extensions-07.t=
xt Section 2.5</a> - which limits the flooding scope of BIER information to=
 a single area unless it can be validated that the best path to the prefix =
with BIER info can be validated to be to a
 router which itself advertised the BIER info. </span></p></div></div></blo=
ckquote><div><br></div><div>ah, ok, I see that that we&#39;re area-scope no=
w as well. I know we had an agreement before that it would be AS scope or s=
omething so that changed and is consistent ...=C2=A0</div><div><br></div><d=
iv>IMO no action on OSPF necessary either, Toerless ... Sorry for my imperf=
ect memories when we talked ....=C2=A0</div><div>=C2=A0</div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div cl=
ass=3D"m_-5014234472235477045WordSection1"><p class=3D"MsoNormal"><span sty=
le=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quo=
t;;color:#1f497d">This is not something IS-IS can do since a single IS-IS i=
nstance only supports one area and therefore does not have the Level-1 adve=
rtisements of the originating router when that router is in another area.<u=
></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0</span></p><=
/div></div></blockquote><div><br></div><div>Well, we could say &quot;loopba=
cks must be leaked ...&quot; and so on but this is cleaner. We limit oursel=
ves and solve the problem in the general ISIS framework if it comes up ...=
=C2=A0</div><div><br></div><div>thanks Les=C2=A0</div><div><br></div><div>-=
-- tony=C2=A0</div></div>
</div></div>

--f403043e44f0eaa9000554f85d6e--


From nobody Sun Jul 23 16:28:14 2017
Return-Path: <ginsberg@cisco.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC514124BE8; Sun, 23 Jul 2017 16:28:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level: 
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gd6jnfMIMjvK; Sun, 23 Jul 2017 16:28:10 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F80A1288B8; Sun, 23 Jul 2017 16:28:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8201; q=dns/txt; s=iport; t=1500852490; x=1502062090; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=j14s3c/LqBYbnGxdbKlBwMoIUL+C94TwvU3vCU8RtXk=; b=m+kidVcbaeN/KjGuLzV9iHXZz133nqswjDM/hA3xu5VHSdbi+Ds76MHK 8pfQ8+ANVW5tPTW+Ne5RHugVC1Ydf+ErM/yze2Ice164dcG1fGXnFwFyW 85bDYSVi20dDXgTKD8pXWO62udp9jXq7qdM7j1GEVCMsGCaeo6DDmve9o I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CQAQCFMHVZ/4gNJK1cGQEBAQEBAQEBA?= =?us-ascii?q?QEBBwEBAQEBg1pkgRQHn2uWBYISIQuFGwKDfkEWAQIBAQEBAQEBayiFGAEBAQE?= =?us-ascii?q?DAQElEzQLDAQCAQgOAwEDAQEBHgkHJwsUAwYIAgQOBQiKJxCwTjqLMQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBARgFgyiDTYFgAYIYgQyER0qFTgWXHIgyApQTghWJSIZ?= =?us-ascii?q?jlWMBJgYrgQp1FUmFExyBZ3aHdgIkB4EFgQ4BAQE?=
X-IronPort-AV: E=Sophos;i="5.40,403,1496102400"; d="scan'208";a="277200686"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 23 Jul 2017 23:28:08 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id v6NNS9Je005508 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 23 Jul 2017 23:28:09 GMT
Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Sun, 23 Jul 2017 18:28:08 -0500
Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1210.000; Sun, 23 Jul 2017 18:28:08 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Toerless Eckert <tte@cs.fau.de>
CC: Tony Przygienda <tonysietf@gmail.com>, "Hannes Gredler (hannes@gredler.at)" <hannes@gredler.at>, Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>, Christian Hopps <chopps@chopps.org>
Thread-Topic: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
Thread-Index: AQHTAep+OLJgflK73kG/QMbI+G29DqJehpmAgADQ+xCAANbZgIAB4x3A
Date: Sun, 23 Jul 2017 23:28:08 +0000
Message-ID: <37e324dc58454778b70c72255066536f@XCH-RCD-001.cisco.com>
References: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de> <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com> <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com> <20170722133419.GA18218@faui40p.informatik.uni-erlangen.de>
In-Reply-To: <20170722133419.GA18218@faui40p.informatik.uni-erlangen.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.118.86]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/94KqbjIswveghmdp5u415ytIGZw>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Jul 2017 23:28:13 -0000

Toerless -

I am thinking to add a statement in Section 4.1 - something like:

"At present, IS-IS support for a given BIER domain/sub-domain is limited to=
 a single area - or to the IS-IS L2 sub-domain."

If you believe this would be helpful I will spin a new version (subject to =
review/agreement from my co-authors).

   Les


> -----Original Message-----
> From: Toerless Eckert [mailto:tte@cs.fau.de]
> Sent: Saturday, July 22, 2017 6:34 AM
> To: Les Ginsberg (ginsberg)
> Cc: Tony Przygienda; Hannes Gredler (hannes@gredler.at); Greg Shepherd;
> bier@ietf.org; isis-wg@ietf.org list; Christian Hopps
> Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
>=20
> Thanks Les
>=20
> When searching various terms in the doc to figure out what happens i am n=
ot
> sure why i missed this one.
>=20
> But: IMHO, RFCs can not only be the minimum number of words to get a
> running implementation. It also needs to specify what this implementation
> intends to achieve. Otherwise its not possible to do a useful review:
> The reviewer can to verify whether the spec will achieve what it claims t=
o
> achieve is there no definitionn of what it claims to achieve.
>=20
> If i understand ISIS correctly, my reverse engineering of the intent is:
>=20
> - BIER TLVs stay within single ISIS areas. BFIR and BFER must therefore b=
e
>   in the same ISIS area: There is no inter-area BIER traffic possible
>   with this specification. This is also true for ISIS area 0.
>=20
> - The same BIER sub-domain identifiers can be re-used
>   across different ISIS areas without any current impact. If these BFR-ID=
s
>   are non-overlapping, then this would allow in the future to create a si=
ngle
>   cross ISIS area BIER sub-domain by leaking TLVs for such a BIER sub-dom=
ain
>   across ISIS levels. Leakage is outside the scope of this specificicatio=
n.
>=20
> I actually even would like to do the following:
>=20
> - If BIER sub-domains are made to span multiple ISIS areas and BFR-ids
> assignemtns
>   are made such that all BFR-ids with the same SI are in the same ISIS ar=
a,
>   then it should be in the future reasonably easy to create inter-area BI=
ER
>   not by leaking of the BIER TLV but by having BFIR MPLS unicastBIER pack=
ets
>   for different SIs to an appropriate L2L1 BFIR that is part of the desti=
nation
> area/SI.
>   (if you would use SI number that are the same as ISIS area numbers then
>    you could probably do this without any new signaling. Not quite sure i=
f
>    you can today easily find L1L2 border router for another area via exis=
ting
>    TLVs).
>=20
>   Alas, this idea will probably be killed because of the BIER architectur=
e
>   intent not to engineer SI assignments in geographical fashions to
>   minimize traffic duplication in the presence of multiple SIs.
>=20
> Cheers
>     Toerless
>=20
> On Sat, Jul 22, 2017 at 06:03:53AM +0000, Les Ginsberg (ginsberg) wrote:
> > Tony/Toerless ???
> >
> > There is an explicit statement as to scope:
> >
> > <snip>
> > Section 4.2
> > ???
> >    o  BIER sub-TLVs MUST NOT be included when a prefix reachability
> >       advertisement is leaked between levels.
> > <end snip>
> >
> > Tony seems to have forgotten that we had a discussion about how BIER
> might be supported across areas and the conclusion was we did not know
> how to do that yet.
> > (Sorry Tony)
> >
> > Note this is ???consistent??? with https://www.ietf.org/id/draft-ietf-b=
ier-
> ospf-bier-extensions-07.txt Section 2.5<https://www.ietf.org/id/draft-iet=
f-
> bier-ospf-bier-extensions-07.txt%20Section%202.5> - which limits the
> flooding scope of BIER information to a single area unless it can be vali=
dated
> that the best path to the prefix with BIER info can be validated to be to=
 a
> router which itself advertised the BIER info. This is not something IS-IS=
 can do
> since a single IS-IS instance only supports one area and therefore does n=
ot
> have the Level-1 advertisements of the originating router when that route=
r is
> in another area.
> >
> > A few more responses inline.
> >
> > From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Tony Przygienda
> > Sent: Friday, July 21, 2017 5:17 AM
> > To: Toerless Eckert
> > Cc: Hannes Gredler (hannes@gredler.at); Greg Shepherd; bier@ietf.org;
> > isis-wg@ietf.org list; Christian Hopps
> > Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
> >
> > Terminology is a bit nits  IMO since the doc is reading clear enough fo=
r
> someone who read BIER & ISIS. I can reread it or Les can comment whether
> we should tighten glossary ...
> >
> > With the scope I agree, that got lost and the doc should be possibly re=
v'ed
> before closing LC. Yes, we flood AD wide was the agreement but something
> mentioning that this could change in the future is good so we are forced =
to
> give it some thought how that would transition ...
> >
> > Thinking further though, in ISIS we have a clean document really. The  =
BIER
> sub-TLVs go into well defined TLVs in terms of flooding scope. Normal L1-=
L2
> redistribution can be used to get the info to all needed places AFAIS. So
> maybe nothing needs to be written. I wait for Les to chime in.
> >
> > OSPF I would have to look @ scopes again & think whether we need to
> write something or maybe Peter can comment ...
> >
> > --- tony
> >
> >
> >
> > On Fri, Jul 21, 2017 at 8:27 AM, Toerless Eckert
> <tte@cs.fau.de<mailto:tte@cs.fau.de>> wrote:
> > Sorry, past the two weeks, but hopefully  benign textual comments:
> >
> > We tried to find an explicit statement about the scope of BIER TLVs - e=
g:
> > are they meant to stay within an area, have some redistribution across
> > areas/levels or not.
> >
> > Tony said WG agreement was to have these TLV be flooded across the
> > whole ISIS domain for now (this draft). So an explicit statement to tha=
t
> effect would
> > be great (All BIER sub-domains TLVs are flooded across all ISIS areas/l=
evels,
> so they span the whole ISIS domain).
> >
> > Also, if future work may/should could improve on that maybe some
> > sentence about that (i guess one could just have ISIS intra-area BIER s=
ub-
> domains ?).
> >
> > Also: Do a check about possible ambiguity of any generic terms like
> sub-domain, level, area, topology so that reader that don't know the
> terminology ofall protocols (ISIS, BIER) by heart can easily know which
> protocol is referred to.
> >
> > [Les:] There is no mention of ???level??? in the document.
> > The use of ???sub-domain??? is clearly always associated with ???BIER??=
?.
> > ???topology??? is always used as an RFC 5120 topology ??? therefore
> clearly an IS-IS topology.
> > There is only one use of the term ???area??? (in Section 5.1). That tex=
t
> might deserve a bit of clarification given this might be either a Level 1=
 area or
> the Level2 sub-domain. I???ll take a pass at it.
> > (BTW ??? I am talking about IS-IS area/L2sub-domain Toerless. ???)
> >
> > I don???t see that any other clarification is needed ??? but Toerless ?=
?? if
> you can point to any specific sentences/paragraphs which you find confusi=
ng
> - I???ll take a second look.
> >
> >    Les
> >
> >
> > I guess there are no BIER level, area or topologies, but still makes
> > reading easier if the doc would say "ISIS level", "ISIS area", or at
> > least have them in the Terminology section. And probably in
> > terminology say "domain -> in the context of this document the BIER
> domain which is also the same as the ISIS domain"
> > (which i hope is the correct statement, see above).
> >
> > Cheers
> >     Toerless
> >
> > _______________________________________________
> > BIER mailing list
> > BIER@ietf.org<mailto:BIER@ietf.org>
> > https://www.ietf.org/mailman/listinfo/bier
> >
> >
> >
> > --
> > We???ve heard that a million monkeys at a million keyboards could
> produce the complete works of Shakespeare; now, thanks to the Internet,
> we know that is not true.
> > ???Robert Wilensky
>=20
> --
> ---
> tte@cs.fau.de


From nobody Mon Jul 24 11:21:27 2017
Return-Path: <gjshep@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80D1A12ECCB for <bier@ietfa.amsl.com>; Mon, 24 Jul 2017 11:21:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qv1af4VArYjJ for <bier@ietfa.amsl.com>; Mon, 24 Jul 2017 11:21:23 -0700 (PDT)
Received: from mail-qt0-x235.google.com (mail-qt0-x235.google.com [IPv6:2607:f8b0:400d:c0d::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E995312EB8C for <bier@ietf.org>; Mon, 24 Jul 2017 11:21:22 -0700 (PDT)
Received: by mail-qt0-x235.google.com with SMTP id s6so25844026qtc.1 for <bier@ietf.org>; Mon, 24 Jul 2017 11:21:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:reply-to:from:date:message-id:subject:to; bh=yi55u28dx9tCzja27R4Ma7/r0p6/NE6fwoka2cMUNGw=; b=CMecQXWOM/k/pBP+uZYDYjYq4et7qSlb080jXnLWlTvoV9eFqimKAxwMm2aDO+kp3h aZqDWExGs55z8MKJc5v5k+54TTI8UkS7oOZDt1n3TY2DQeqLFxotfzFeLa+Q1YWXe2s+ bALGWZF1JHv9Z6VdJu8qfBbha/OUQsaiytUmk0ctVX1pnf5vtb42MiBmAJbGK29DDKEc mk4ZS5NG4Uwn+t12C/l74jr3ba4Fxm+5YO4VhX+quqqQZOgal7lHJ5l4kCLpVGqccpHJ EE1rkOqNP+2VxuVIgOdIMbE78hXWyi4gXziVKne6xi0nEeTBA3C4/AFy5/elQbPVxu2x 0SRQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:from:date:message-id :subject:to; bh=yi55u28dx9tCzja27R4Ma7/r0p6/NE6fwoka2cMUNGw=; b=MNcFsI7n9V1Vu9MbbhEdC7I4A+6MVOHvi8furhgMPudVAGiTgAN4l6k5Eva+MDMpqO FY+65Ut8PE21kSqgHgevZpCZz25YCuyT5OkEul3RLJIB0hIdigHGnq3zIT4KHCHc9qw3 SEyvPlzsis34N/MQF70nDxr9o8G1k2Nvrf5TyXPhLJRD3tSvguCDs0sECfZghgEjvTiq +RfNfx7Z6+NXJklKMV7bG6Bm3dLY1NB/MZIJmq8LayYJaAzfXXn5m9laNyU0oWFV5zgw 5k4OFixHACabxT4DhnJVn0z8K9CfQY6M6G/gIUE9oN13LrsrAXunlBYuwqn9cPSkfbur gwkg==
X-Gm-Message-State: AIVw111yqgxoQrmaIMIBKppZNXWPTYQmL/3qzdz3BcsIxZYgDGoHw65x OCiIym0B2RigyRg0jPe9fxUEWjsRzByZ
X-Received: by 10.200.36.145 with SMTP id s17mr20751190qts.224.1500920481884;  Mon, 24 Jul 2017 11:21:21 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.12.152.217 with HTTP; Mon, 24 Jul 2017 11:21:21 -0700 (PDT)
Reply-To: gjshep@gmail.com
From: Greg Shepherd <gjshep@gmail.com>
Date: Mon, 24 Jul 2017 11:21:21 -0700
Message-ID: <CABFReBogwMN0g7i7VoWszq19KTxsQ0ZuwRa2_PVpL-u4sxsWqg@mail.gmail.com>
To: "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="001a1141042c28ae7a0555144800"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/ewOhucdVP-cSKcFobzMs5zLmJMY>
Subject: [Bier] BIER WG IETF 99 Minutes
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jul 2017 18:21:25 -0000

--001a1141042c28ae7a0555144800
Content-Type: text/plain; charset="UTF-8"

Please read and review the minutes below, and provide feedback soon so I
can post them this week. Thanks

------------
BIER Meeting IETF 99
Minute taker: Pierre Pfister

Note Well:

Agenda:

BIER PIM Stitching (draft-hfa-bier-pim-tunneling by Hooman Bidgoli):
<Slide: Multicast state example>

Greg Shepherd - Where is the edge of the BIER domain?
Bigdoli Hooman / Andrew Dolganov - P routers only.

<End of presentation>

draft-zhang-bier-babel-extensions-01 by Sandy Zhang:

Greg Shepherd (to Sandy Zhang): Can you tell us what was the babel WG
feedback was ?


Greg Shepherd (to Juliusz Chroboczek): Did you read the draft ?

Juliusz Chroboczek: I have read the draft.

Greg Shepherd: How does it work in networks with non BIER babel routers ?

Sandy Zhang: It is working, there is implementation.

Juliusz Chroboczek: babel WG is looking at this draft with interest. But
for now the babel WG is focusing on the core elements of babel. This
 document will therefore not be adopted by the babel WG before the babel
core specifications are published.


Greg Shepherd: BIER is pretty well cooked in this doc. But we would like
babel to have a better look. This document could live in the babel WG.


Toerless Eckert: Did homenet went to mbone to ask for input ?

Pierre Pfister: I went to mbone and pim WGs to present homenet and
multicast. They did not care.

Alia Atlas: Babel is the place for this document to be done. Because BIER
depends on advertising things. Babel experts will have to look at it.
 The homenet architecture document only talks about PIM, but BIER
applicability could be evaluated.

Tim Chown: Babel is the homenet routing protocol. There was some discussion
about homenet in the BIER WG at some point.

Alia: Please have inter-WG discussions on mailing lists. IETF process also
involves other WGs when documents are reviewed.


draft-zhangwu-bier-nvo3-analysis-00 by Sandy Zhang:

Tony Przygienda: Does multi-homing work ? If there are multiple join ? How
to not get replicates ?

Sandy Zhang: BMLD does that. Leaf knows about group membership.

Tony Przygienda: We are short in time. Continue the dicussion on the
mailing list.

Toerless Eckert: We should present to NVO3. They don't need to understand
BIER, but they would know the service that they would get using BIER.

Sandy Zhang: Want to clarify that the draft is under discussion with people
I know which are working on data-centers.

Alia Atlas: There is an NVO3mcast in the publication queue. It went to PIM
and mbone for review. Please review that document in BIER as well.



BIER-TE/BIER-TE-FRR by Toerless Eckert:

Greg Shepherd (chair-hat-on): When this first came out. There were concerns.

Toerless Eckert: They are addressed. But we didn't renew the call for
adoption.

Greg Shepherd: Is this work that we should do ?

Yes: Many hands up
No: No hands up

Alia Atlas: If this has hardware impact, do we need to hold off the
architecture document ? Should we delay the implementation finalization ?

Greg Shepherd: I think the BIER FIB doesn't change.

Toerless Eckert: It is up to the vendors to decide whether they want to do
it or not.

Greg Shepherd: If this changes the architecture, it should be added to the
architecture document.

Alia Atlas: It is concerning though.

Andrew Dolganow: Do not delay.

Greg Shepherd: I agree

Toerless Eckert: I don't want to hold either. Implementers should check
this !


draft-zzhang-bier-evpn-00 by Jeffrey Zhang:

Greg Shepherd: Who read the draft ? --> 6 to 8 hands up

Status Update from Chair:

Greg Shepherd: Operation considerations. There will be an operational doc
out of the group.

Greg Shepherd: Call for document shepherds for WGLC docs.

Alia Atlas: Sheparding doc requires reading the document. It is cool to
discover IETF process. It is helpful to show interest.

Ethertype for BIER:

Alia Atlas: We need encap draft. Tony said there is a draft about encap and
header format. Since MPLS is going to be deployed soon, and there
 is no strong request for Ethernet, we can wait for IEEE and MPLS code to
happen first.

Justification Draft: Greg and Andrew will begin the work.

Adjourn.

--001a1141042c28ae7a0555144800
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Please read and review the minutes below, and provide=
 feedback soon so I can post them this week. Thanks</div><div><br></div><di=
v>------------</div><div>BIER Meeting IETF 99</div><div>Minute taker: Pierr=
e Pfister<br></div><div><br></div><div>Note Well:<br></div><div><br></div><=
div>Agenda:<br></div><div><br></div><div>BIER PIM Stitching (draft-hfa-bier=
-pim-tunneling by Hooman Bidgoli):<br></div><div>&lt;Slide: Multicast state=
 example&gt;<br></div><div><br></div><div>Greg Shepherd - Where is the edge=
 of the BIER domain?</div><div>Bigdoli Hooman / Andrew Dolganov - P routers=
 only.<br></div><div><br></div><div>&lt;End of presentation&gt;<br></div><d=
iv><br></div><div>draft-zhang-bier-babel-extensions-01 by Sandy Zhang:<br><=
/div><div><br></div><div>Greg Shepherd (to Sandy Zhang): Can you tell us wh=
at was the babel WG feedback was ?<br></div><div><br></div><div><br></div><=
div>Greg Shepherd (to Juliusz Chroboczek): Did you read the draft ?<br></di=
v><div><br></div><div>Juliusz Chroboczek: I have read the draft.<br></div><=
div><br></div><div>Greg Shepherd: How does it work in networks with non BIE=
R babel routers ?<br></div><div><br></div><div>Sandy Zhang: It is working, =
there is implementation.<br></div><div><br></div><div>Juliusz Chroboczek: b=
abel WG is looking at this draft with interest. But for now the babel WG is=
 focusing on the core elements of babel. This<br></div><div>=C2=A0document =
will therefore not be adopted by the babel WG before the babel core specifi=
cations are published.</div><div><br></div><div><br></div><div>Greg Shepher=
d: BIER is pretty well cooked in this doc. But we would like babel to have =
a better look. This document could live in the babel WG.<br></div><div><br>=
</div><div><br></div><div>Toerless Eckert: Did homenet went to mbone to ask=
 for input ?<br></div><div><br></div><div>Pierre Pfister: I went to mbone a=
nd pim WGs to present homenet and multicast. They did not care.<br></div><d=
iv><br></div><div>Alia Atlas: Babel is the place for this document to be do=
ne. Because BIER depends on advertising things. Babel experts will have to =
look at it.<br></div><div>=C2=A0The homenet architecture document only talk=
s about PIM, but BIER applicability could be evaluated.</div><div><br></div=
><div>Tim Chown: Babel is the homenet routing protocol. There was some disc=
ussion about homenet in the BIER WG at some point.<br></div><div><br></div>=
<div>Alia: Please have inter-WG discussions on mailing lists. IETF process =
also involves other WGs when documents are reviewed.<br></div><div><br></di=
v><div><br></div><div>draft-zhangwu-bier-nvo3-analysis-00 by Sandy Zhang:<b=
r></div><div><br></div><div>Tony Przygienda: Does multi-homing work ? If th=
ere are multiple join ? How to not get replicates ?<br></div><div><br></div=
><div>Sandy Zhang: BMLD does that. Leaf knows about group membership.<br></=
div><div><br></div><div>Tony Przygienda: We are short in time. Continue the=
 dicussion on the mailing list.<br></div><div><br></div><div>Toerless Ecker=
t: We should present to NVO3. They don&#39;t need to understand BIER, but t=
hey would know the service that they would get using BIER.<br></div><div><b=
r></div><div>Sandy Zhang: Want to clarify that the draft is under discussio=
n with people I know which are working on data-centers.<br></div><div><br><=
/div><div>Alia Atlas: There is an NVO3mcast in the publication queue. It we=
nt to PIM and mbone for review. Please review that document in BIER as well=
.<br></div><div><br></div><div><br></div><div><br></div><div>BIER-TE/BIER-T=
E-FRR by Toerless Eckert: =C2=A0=C2=A0<br></div><div><br></div><div>Greg Sh=
epherd (chair-hat-on): When this first came out. There were concerns.<br></=
div><div><br></div><div>Toerless Eckert: They are addressed. But we didn&#3=
9;t renew the call for adoption.<br></div><div><br></div><div>Greg Shepherd=
: Is this work that we should do ?<br></div><div><br></div><div>Yes: Many h=
ands up<br></div><div>No: No hands up<br></div><div><br></div><div>Alia Atl=
as: If this has hardware impact, do we need to hold off the architecture do=
cument ? Should we delay the implementation finalization ?<br></div><div><b=
r></div><div>Greg Shepherd: I think the BIER FIB doesn&#39;t change.<br></d=
iv><div><br></div><div>Toerless Eckert: It is up to the vendors to decide w=
hether they want to do it or not.<br></div><div><br></div><div>Greg Shepher=
d: If this changes the architecture, it should be added to the architecture=
 document.<br></div><div><br></div><div>Alia Atlas: It is concerning though=
.<br></div><div><br></div><div>Andrew Dolganow: Do not delay.<br></div><div=
><br></div><div>Greg Shepherd: I agree<br></div><div><br></div><div>Toerles=
s Eckert: I don&#39;t want to hold either. Implementers should check this !=
<br></div><div><br></div><div><br></div><div>draft-zzhang-bier-evpn-00 by J=
effrey Zhang:<br></div><div><br></div><div>Greg Shepherd: Who read the draf=
t ? --&gt; 6 to 8 hands up<br></div><div><br></div><div>Status Update from =
Chair:<br></div><div><br></div><div>Greg Shepherd: Operation considerations=
. There will be an operational doc out of the group.<br></div><div><br></di=
v><div>Greg Shepherd: Call for document shepherds for WGLC docs.<br></div><=
div><br></div><div>Alia Atlas: Sheparding doc requires reading the document=
. It is cool to discover IETF process. It is helpful to show interest.<br><=
/div><div><br></div><div>Ethertype for BIER:<br></div><div><br></div><div>A=
lia Atlas: We need encap draft. Tony said there is a draft about encap and =
header format. Since MPLS is going to be deployed soon, and there</div><div=
>=C2=A0is no strong request for Ethernet, we can wait for IEEE and MPLS cod=
e to happen first.</div><div><br></div><div>Justification Draft: Greg and A=
ndrew will begin the work.<br></div><div><br></div><div>Adjourn.</div></div=
>

--001a1141042c28ae7a0555144800--


From nobody Mon Jul 24 20:18:05 2017
Return-Path: <andrew.dolganow@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6A18127735 for <bier@ietfa.amsl.com>; Mon, 24 Jul 2017 20:18:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.7
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CBBgrYtaq98h for <bier@ietfa.amsl.com>; Mon, 24 Jul 2017 20:17:58 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0097.outbound.protection.outlook.com [104.47.1.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F6D2124D68 for <bier@ietf.org>; Mon, 24 Jul 2017 20:17:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=qPi+0XRu/54w59IZBVoZhKRMetCZjDRxnZGFPe8EGu0=; b=pgKilLd358q1oJbJ/0eGfuuYHD6zDHumPY2kXlWKPU1w9IiUxw3fluBcq8/OYTcjlwkp42W7E0sshLDi1Xzr7orgRylCpA5wCBNzoBXYsP1XHr021oekotcQV/YXFhLNw/rIoftiJB3nvj4yX9kPVTcms1HPoiCLZyIfZc05N9E=
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com (10.167.190.10) by HE1PR0701MB2345.eurprd07.prod.outlook.com (10.168.127.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.10; Tue, 25 Jul 2017 03:17:55 +0000
Received: from HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::bd82:d804:3db6:62a3]) by HE1PR0701MB2058.eurprd07.prod.outlook.com ([fe80::bd82:d804:3db6:62a3%13]) with mapi id 15.01.1304.011; Tue, 25 Jul 2017 03:17:54 +0000
From: "Dolganow, Andrew (Nokia - SG/Singapore)" <andrew.dolganow@nokia.com>
To: "gjshep@gmail.com" <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>
Thread-Topic: [Bier] BIER WG IETF 99 Minutes
Thread-Index: AQHTBKmtUBrdNCs5vUmXejEJdde4W6JkAWWA
Date: Tue, 25 Jul 2017 03:17:54 +0000
Message-ID: <B9F0B08B-FBCA-4536-946A-1F0CC9CFD053@nokia.com>
References: <CABFReBogwMN0g7i7VoWszq19KTxsQ0ZuwRa2_PVpL-u4sxsWqg@mail.gmail.com>
In-Reply-To: <CABFReBogwMN0g7i7VoWszq19KTxsQ0ZuwRa2_PVpL-u4sxsWqg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.21.0.170409
authentication-results: spf=none (sender IP is ) smtp.mailfrom=andrew.dolganow@nokia.com; 
x-originating-ip: [135.245.121.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0701MB2345; 7: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
x-ms-office365-filtering-correlation-id: 4ecbc458-c62c-480a-9d36-08d4d30bbdda
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:HE1PR0701MB2345; 
x-ms-traffictypediagnostic: HE1PR0701MB2345:
x-exchange-antispam-report-test: UriScan:(131327999870524)(21748063052155);
x-microsoft-antispam-prvs: <HE1PR0701MB2345F8101098109A7B68156DE5B80@HE1PR0701MB2345.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(6055026)(6041248)(20161123564025)(20161123558100)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:HE1PR0701MB2345; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:HE1PR0701MB2345; 
x-forefront-prvs: 03793408BA
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39850400002)(39400400002)(39410400002)(39860400002)(39450400003)(39840400002)(199003)(377454003)(57704003)(497574002)(189002)(189998001)(101416001)(106356001)(6436002)(105586002)(86362001)(478600001)(2501003)(82746002)(7736002)(2906002)(3660700001)(8676002)(68736007)(81156014)(3280700002)(8936002)(81166006)(2950100002)(5660300001)(54356999)(50986999)(76176999)(6486002)(83716003)(5250100002)(2900100001)(83506001)(97736004)(36756003)(229853002)(6512007)(4001350100001)(54896002)(6306002)(39060400002)(6506006)(99286003)(6246003)(53936002)(6116002)(102836003)(33656002)(3846002)(38730400002)(14454004)(66066001)(25786009)(332134003)(24704002); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR0701MB2345; H:HE1PR0701MB2058.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_B9F0B08BFBCA4536946A1F0CC9CFD053nokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Jul 2017 03:17:54.7373 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2345
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/SdpvE_ObScH_B0W31NR7l7S6ZTU>
Subject: Re: [Bier] BIER WG IETF 99 Minutes
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jul 2017 03:18:02 -0000

--_000_B9F0B08BFBCA4536946A1F0CC9CFD053nokiacom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B9F0B08BFBCA4536946A1F0CC9CFD053nokiacom_
Content-Type: text/html; charset="utf-8"
Content-ID: <874CEB80FF374F499A9ECBF7E13A9DE4@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4
bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo
dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo
dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp
dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l
dGEgbmFtZT0iVGl0bGUiIGNvbnRlbnQ9IiI+DQo8bWV0YSBuYW1lPSJLZXl3b3JkcyIgY29udGVu
dD0iIj4NCjxtZXRhIG5hbWU9IkdlbmVyYXRvciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUg
KGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxlPjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8N
CkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0
IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJ
cGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAyIDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8N
CnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWwsIGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBjbTsN
CgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWls
eToiVGltZXMgTmV3IFJvbWFuIjt9DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1z
dHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjojMDU2M0MxOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRl
cmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHls
ZS1wcmlvcml0eTo5OTsNCgljb2xvcjojOTU0RjcyOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxp
bmU7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTcNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7
DQoJZm9udC1mYW1pbHk6Q2FsaWJyaTsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCnNwYW4ubXNvSW5z
DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCW1zby1zdHlsZS1uYW1lOiIiOw0KCXRl
eHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7DQoJY29sb3I6dGVhbDt9DQouTXNvQ2hwRGVmYXVsdA0K
CXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30NCkBwYWdl
IFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsNCgltYXJnaW46NzIuMHB0IDcy
LjBwdCA3Mi4wcHQgNzIuMHB0O30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3JkU2VjdGlv
bjE7fQ0KLS0+PC9zdHlsZT4NCjwvaGVhZD4NCjxib2R5IGJnY29sb3I9IndoaXRlIiBsYW5nPSJF
Ti1VUyIgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRGNzIiPg0KPGRpdiBjbGFzcz0iV29yZFNl
Y3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OkNhbGlicmkiPkFuIGV4dHJhIGNvbW1lbnQgb24gdGhlIGZpcnN0IGRy
YWZ0IGRpc2N1c3Npb24gaW5saW5lIChpbiBibHVlKTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OkNhbGlicmkiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxkaXYgc3R5bGU9ImJv
cmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0IDBj
bSAwY20gMGNtIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4w
cHQiPjxiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTpDYWxpYnJpO2NvbG9yOmJsYWNrIj5Gcm9t
Og0KPC9zcGFuPjwvYj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6Q2FsaWJyaTtjb2xvcjpibGFj
ayI+QklFUiAmbHQ7Ymllci1ib3VuY2VzQGlldGYub3JnJmd0OyBvbiBiZWhhbGYgb2YgR3JlZyBT
aGVwaGVyZCAmbHQ7Z2pzaGVwQGdtYWlsLmNvbSZndDs8YnI+DQo8Yj5SZXBseS1UbzogPC9iPkdy
ZWcgU2hlcGhlcmQgJmx0O2dqc2hlcEBnbWFpbC5jb20mZ3Q7PGJyPg0KPGI+RGF0ZTogPC9iPlR1
ZXNkYXksIEp1bHkgMjUsIDIwMTcgYXQgMjoyMSBBTTxicj4NCjxiPlRvOiA8L2I+JnF1b3Q7Ymll
ckBpZXRmLm9yZyZxdW90OyAmbHQ7YmllckBpZXRmLm9yZyZndDs8YnI+DQo8Yj5TdWJqZWN0OiA8
L2I+W0JpZXJdIEJJRVIgV0cgSUVURiA5OSBNaW51dGVzPG86cD48L286cD48L3NwYW4+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2
LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+UGxlYXNlIHJlYWQgYW5k
IHJldmlldyB0aGUgbWludXRlcyBiZWxvdywgYW5kIHByb3ZpZGUgZmVlZGJhY2sgc29vbiBzbyBJ
IGNhbiBwb3N0IHRoZW0gdGhpcyB3ZWVrLiBUaGFua3M8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxv
OnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+LS0tLS0tLS0tLS0tPG86cD48L286cD48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij5CSUVSIE1lZXRpbmcgSUVURiA5OTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+TWludXRlIHRh
a2VyOiBQaWVycmUgUGZpc3RlcjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2lu
LWxlZnQ6MzYuMHB0Ij5Ob3RlIFdlbGw6PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNw
OzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
YXJnaW4tbGVmdDozNi4wcHQiPkFnZW5kYTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5i
c3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9
Im1hcmdpbi1sZWZ0OjM2LjBwdCI+QklFUiBQSU0gU3RpdGNoaW5nIChkcmFmdC1oZmEtYmllci1w
aW0tdHVubmVsaW5nIGJ5IEhvb21hbiBCaWRnb2xpKTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZs
dDtTbGlkZTogTXVsdGljYXN0IHN0YXRlIGV4YW1wbGUmZ3Q7PG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0
Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkdyZWcgU2hlcGhlcmQgLSBXaGVyZSBpcyB0
aGUgZWRnZSBvZiB0aGUgQklFUiBkb21haW4/PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5CaWdkb2xp
IEhvb21hbiAvIEFuZHJldyBEb2xnYW5vPHNwYW4gc3R5bGU9ImNvbG9yOiM0NDcyQzQiPnc8L3Nw
YW4+IC0gUCByb3V0ZXJzIG9ubHkuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48c3BhbiBzdHlsZT0i
Y29sb3I6IzQ0NzJDNCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PHNwYW4gc3R5bGU9ImNvbG9yOiM0
NDcyQzQiPlRvbnk6IEV4cGVjdCBuZXcgZHJhZnQgdmVyc2lvbiBmcm9tIHRoZSBhdXRob3JzIHRv
IGNsZWFuLXVwL2NsYXJpZnkgaXNzdWVzIGRpc2N1c3NlZCBsaWtlIG5vbi1kZXBlbmRlbmN5IG9u
IE1WUE4sIEJpU3RydGluZyBsZW5ndGgsIFNTTS1vbmx5LCBtYWtpbmcgY2xlYXIgd2hhdOKAmXMg
aW5mb3JtYXRpb25hbCB2cyBub3JtYXRpdmUsDQogdGVybWlub2xvZ3ksIGV0Yy48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij48c3BhbiBzdHlsZT0iY29sb3I6IzQ0NzJDNCI+SG9vbWFuL0FuZHJldyDigJMgeWVzIG5l
dyB2ZXJzaW9uIGFjY291bnRpbmcgZm9yIFdHIG1lbWJlcnMgZmVlZGJhY2sgb24gdGhlIGxpc3Qg
YW5kIGR1cmluZyB0aGUgbWVldGluZyB3aWxsIGJlIHB1Ymxpc2hlZC48bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZsdDtFbmQgb2YgcHJlc2VudGF0aW9uJmd0Ozxv
OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9
Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5kcmFmdC16
aGFuZy1iaWVyLWJhYmVsLWV4dGVuc2lvbnMtMDEgYnkgU2FuZHkgWmhhbmc6PG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkdyZWcgU2hlcGhlcmQgKHRv
IFNhbmR5IFpoYW5nKTogQ2FuIHlvdSB0ZWxsIHVzIHdoYXQgd2FzIHRoZSBiYWJlbCBXRyBmZWVk
YmFjayB3YXMgPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkdyZWcgU2hlcGhlcmQgKHRvIEp1bGl1
c3ogQ2hyb2JvY3playk6IERpZCB5b3UgcmVhZCB0aGUgZHJhZnQgPzxvOnA+PC9vOnA+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2
LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5KdWxpdXN6IENocm9ib2N6ZWs6IEkg
aGF2ZSByZWFkIHRoZSBkcmFmdC48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp
bi1sZWZ0OjM2LjBwdCI+R3JlZyBTaGVwaGVyZDogSG93IGRvZXMgaXQgd29yayBpbiBuZXR3b3Jr
cyB3aXRoIG5vbiBCSUVSIGJhYmVsIHJvdXRlcnMgPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5TYW5keSBaaGFuZzogSXQgaXMgd29ya2luZywgdGhl
cmUgaXMgaW1wbGVtZW50YXRpb24uPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn
aW4tbGVmdDozNi4wcHQiPkp1bGl1c3ogQ2hyb2JvY3plazogYmFiZWwgV0cgaXMgbG9va2luZyBh
dCB0aGlzIGRyYWZ0IHdpdGggaW50ZXJlc3QuIEJ1dCBmb3Igbm93IHRoZSBiYWJlbCBXRyBpcyBm
b2N1c2luZyBvbiB0aGUgY29yZSBlbGVtZW50cyBvZiBiYWJlbC4gVGhpczxvOnA+PC9vOnA+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0
OjM2LjBwdCI+Jm5ic3A7ZG9jdW1lbnQgd2lsbCB0aGVyZWZvcmUgbm90IGJlIGFkb3B0ZWQgYnkg
dGhlIGJhYmVsIFdHIGJlZm9yZSB0aGUgYmFiZWwgY29yZSBzcGVjaWZpY2F0aW9ucyBhcmUgcHVi
bGlzaGVkLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0
Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkdyZWcgU2hlcGhlcmQ6IEJJRVIgaXMgcHJl
dHR5IHdlbGwgY29va2VkIGluIHRoaXMgZG9jLiBCdXQgd2Ugd291bGQgbGlrZSBiYWJlbCB0byBo
YXZlIGEgYmV0dGVyIGxvb2suIFRoaXMgZG9jdW1lbnQgY291bGQgbGl2ZSBpbiB0aGUgYmFiZWwg
V0cuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxv
OnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+VG9lcmxlc3MgRWNrZXJ0OiBEaWQgaG9tZW5ldCB3
ZW50IHRvIG1ib25lIHRvIGFzayBmb3IgaW5wdXQgPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5QaWVycmUgUGZpc3RlcjogSSB3ZW50IHRvIG1ib25l
IGFuZCBwaW0gV0dzIHRvIHByZXNlbnQgaG9tZW5ldCBhbmQgbXVsdGljYXN0LiBUaGV5IGRpZCBu
b3QgY2FyZS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBw
dCI+QWxpYSBBdGxhczogQmFiZWwgaXMgdGhlIHBsYWNlIGZvciB0aGlzIGRvY3VtZW50IHRvIGJl
IGRvbmUuIEJlY2F1c2UgQklFUiBkZXBlbmRzIG9uIGFkdmVydGlzaW5nIHRoaW5ncy4gQmFiZWwg
ZXhwZXJ0cyB3aWxsIGhhdmUgdG8gbG9vayBhdCBpdC48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZu
YnNwO1RoZSBob21lbmV0IGFyY2hpdGVjdHVyZSBkb2N1bWVudCBvbmx5IHRhbGtzIGFib3V0IFBJ
TSwgYnV0IEJJRVIgYXBwbGljYWJpbGl0eSBjb3VsZCBiZSBldmFsdWF0ZWQuPG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPlRpbSBDaG93bjogQmFiZWwg
aXMgdGhlIGhvbWVuZXQgcm91dGluZyBwcm90b2NvbC4gVGhlcmUgd2FzIHNvbWUgZGlzY3Vzc2lv
biBhYm91dCBob21lbmV0IGluIHRoZSBCSUVSIFdHIGF0IHNvbWUgcG9pbnQuPG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkFsaWE6IFBsZWFzZSBoYXZl
IGludGVyLVdHIGRpc2N1c3Npb25zIG9uIG1haWxpbmcgbGlzdHMuIElFVEYgcHJvY2VzcyBhbHNv
IGludm9sdmVzIG90aGVyIFdHcyB3aGVuIGRvY3VtZW50cyBhcmUgcmV2aWV3ZWQuPG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2lu
LWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp
bi1sZWZ0OjM2LjBwdCI+ZHJhZnQtemhhbmd3dS1iaWVyLW52bzMtYW5hbHlzaXMtMDAgYnkgU2Fu
ZHkgWmhhbmc6PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4w
cHQiPlRvbnkgUHJ6eWdpZW5kYTogRG9lcyBtdWx0aS1ob21pbmcgd29yayA/IElmIHRoZXJlIGFy
ZSBtdWx0aXBsZSBqb2luID8gSG93IHRvIG5vdCBnZXQgcmVwbGljYXRlcyA/PG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPlNhbmR5IFpoYW5nOiBCTUxE
IGRvZXMgdGhhdC4gTGVhZiBrbm93cyBhYm91dCBncm91cCBtZW1iZXJzaGlwLjxvOnA+PC9vOnA+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1s
ZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5Ub255IFByenlnaWVuZGE6
IFdlIGFyZSBzaG9ydCBpbiB0aW1lLiBDb250aW51ZSB0aGUgZGljdXNzaW9uIG9uIHRoZSBtYWls
aW5nIGxpc3QuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4w
cHQiPlRvZXJsZXNzIEVja2VydDogV2Ugc2hvdWxkIHByZXNlbnQgdG8gTlZPMy4gVGhleSBkb24n
dCBuZWVkIHRvIHVuZGVyc3RhbmQgQklFUiwgYnV0IHRoZXkgd291bGQga25vdyB0aGUgc2Vydmlj
ZSB0aGF0IHRoZXkgd291bGQgZ2V0IHVzaW5nIEJJRVIuPG86cD48L286cD48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPlNhbmR5IFpoYW5nOiBXYW50IHRvIGNsYXJpZnkg
dGhhdCB0aGUgZHJhZnQgaXMgdW5kZXIgZGlzY3Vzc2lvbiB3aXRoIHBlb3BsZSBJIGtub3cgd2hp
Y2ggYXJlIHdvcmtpbmcgb24gZGF0YS1jZW50ZXJzLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5BbGlhIEF0bGFzOiBUaGVyZSBpcyBhbiBOVk8zbWNh
c3QgaW4gdGhlIHB1YmxpY2F0aW9uIHF1ZXVlLiBJdCB3ZW50IHRvIFBJTSBhbmQgbWJvbmUgZm9y
IHJldmlldy4gUGxlYXNlIHJldmlldyB0aGF0IGRvY3VtZW50IGluIEJJRVIgYXMgd2VsbC48bzpw
PjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
YXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJz
cDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkJJRVItVEUv
QklFUi1URS1GUlIgYnkgVG9lcmxlc3MgRWNrZXJ0OiAmbmJzcDsmbmJzcDs8bzpwPjwvbzpwPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVm
dDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+R3JlZyBTaGVwaGVyZCAoY2hh
aXItaGF0LW9uKTogV2hlbiB0aGlzIGZpcnN0IGNhbWUgb3V0LiBUaGVyZSB3ZXJlIGNvbmNlcm5z
LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5
bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5Ub2Vy
bGVzcyBFY2tlcnQ6IFRoZXkgYXJlIGFkZHJlc3NlZC4gQnV0IHdlIGRpZG4ndCByZW5ldyB0aGUg
Y2FsbCBmb3IgYWRvcHRpb24uPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpw
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4t
bGVmdDozNi4wcHQiPkdyZWcgU2hlcGhlcmQ6IElzIHRoaXMgd29yayB0aGF0IHdlIHNob3VsZCBk
byA/PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPlll
czogTWFueSBoYW5kcyB1cDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+Tm86IE5vIGhhbmRzIHVwPG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkFsaWEgQXRs
YXM6IElmIHRoaXMgaGFzIGhhcmR3YXJlIGltcGFjdCwgZG8gd2UgbmVlZCB0byBob2xkIG9mZiB0
aGUgYXJjaGl0ZWN0dXJlIGRvY3VtZW50ID8gU2hvdWxkIHdlIGRlbGF5IHRoZSBpbXBsZW1lbnRh
dGlvbiBmaW5hbGl6YXRpb24gPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2lu
LWxlZnQ6MzYuMHB0Ij5HcmVnIFNoZXBoZXJkOiBJIHRoaW5rIHRoZSBCSUVSIEZJQiBkb2Vzbid0
IGNoYW5nZS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBw
dCI+VG9lcmxlc3MgRWNrZXJ0OiBJdCBpcyB1cCB0byB0aGUgdmVuZG9ycyB0byBkZWNpZGUgd2hl
dGhlciB0aGV5IHdhbnQgdG8gZG8gaXQgb3Igbm90LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5HcmVnIFNoZXBoZXJkOiBJZiB0aGlzIGNoYW5nZXMg
dGhlIGFyY2hpdGVjdHVyZSwgaXQgc2hvdWxkIGJlIGFkZGVkIHRvIHRoZSBhcmNoaXRlY3R1cmUg
ZG9jdW1lbnQuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4w
cHQiPkFsaWEgQXRsYXM6IEl0IGlzIGNvbmNlcm5pbmcgdGhvdWdoLjxvOnA+PC9vOnA+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2
LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5BbmRyZXcgRG9sZ2Fub3c6IERvIG5v
dCBkZWxheS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBw
dCI+R3JlZyBTaGVwaGVyZDogSSBhZ3JlZTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJz
cDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bWFyZ2luLWxlZnQ6MzYuMHB0Ij5Ub2VybGVzcyBFY2tlcnQ6IEkgZG9uJ3Qgd2FudCB0byBob2xk
IGVpdGhlci4gSW1wbGVtZW50ZXJzIHNob3VsZCBjaGVjayB0aGlzICE8bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDoz
Ni4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+
DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6
MzYuMHB0Ij5kcmFmdC16emhhbmctYmllci1ldnBuLTAwIGJ5IEplZmZyZXkgWmhhbmc6PG86cD48
L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFy
Z2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkdyZWcgU2hlcGhl
cmQ6IFdobyByZWFkIHRoZSBkcmFmdCA/IC0tJmd0OyA2IHRvIDggaGFuZHMgdXA8bzpwPjwvbzpw
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4t
bGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+U3RhdHVzIFVwZGF0ZSBm
cm9tIENoYWlyOjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij5HcmVnIFNoZXBoZXJkOiBPcGVyYXRpb24gY29uc2lkZXJhdGlvbnMuIFRoZXJlIHdpbGwg
YmUgYW4gb3BlcmF0aW9uYWwgZG9jIG91dCBvZiB0aGUgZ3JvdXAuPG86cD48L286cD48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkdyZWcgU2hlcGhlcmQ6IENhbGwgZm9y
IGRvY3VtZW50IHNoZXBoZXJkcyBmb3IgV0dMQyBkb2NzLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+
PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5BbGlhIEF0bGFzOiBTaGVwYXJkaW5nIGRvYyBy
ZXF1aXJlcyByZWFkaW5nIHRoZSBkb2N1bWVudC4gSXQgaXMgY29vbCB0byBkaXNjb3ZlciBJRVRG
IHByb2Nlc3MuIEl0IGlzIGhlbHBmdWwgdG8gc2hvdyBpbnRlcmVzdC48bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDoz
Ni4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+RXRoZXJ0eXBlIGZvciBCSUVSOjxv
OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9
Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5BbGlhIEF0
bGFzOiBXZSBuZWVkIGVuY2FwIGRyYWZ0LiBUb255IHNhaWQgdGhlcmUgaXMgYSBkcmFmdCBhYm91
dCBlbmNhcCBhbmQgaGVhZGVyIGZvcm1hdC4gU2luY2UgTVBMUyBpcyBnb2luZyB0byBiZSBkZXBs
b3llZCBzb29uLCBhbmQgdGhlcmU8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwO2lzIG5vIHN0
cm9uZyByZXF1ZXN0IGZvciBFdGhlcm5ldCwgd2UgY2FuIHdhaXQgZm9yIElFRUUgYW5kIE1QTFMg
Y29kZSB0byBoYXBwZW4gZmlyc3QuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn
aW4tbGVmdDozNi4wcHQiPkp1c3RpZmljYXRpb24gRHJhZnQ6IEdyZWcgYW5kIEFuZHJldyB3aWxs
IGJlZ2luIHRoZSB3b3JrLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij5BZGpvdXJuLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2
Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_B9F0B08BFBCA4536946A1F0CC9CFD053nokiacom_--


From nobody Tue Jul 25 12:52:28 2017
Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7D8812FEE2; Tue, 25 Jul 2017 12:52:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JPJfWDhwNQnB; Tue, 25 Jul 2017 12:52:17 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DCF8126D46; Tue, 25 Jul 2017 12:52:16 -0700 (PDT)
Received: from faui40p.informatik.uni-erlangen.de (faui40p.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:77]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 9DB8158C4D6; Tue, 25 Jul 2017 21:52:11 +0200 (CEST)
Received: by faui40p.informatik.uni-erlangen.de (Postfix, from userid 10463) id 7907CB0C6BC; Tue, 25 Jul 2017 21:52:11 +0200 (CEST)
Date: Tue, 25 Jul 2017 21:52:11 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
Cc: Tony Przygienda <tonysietf@gmail.com>, "Hannes Gredler (hannes@gredler.at)" <hannes@gredler.at>, Greg Shepherd <gjshep@gmail.com>, "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>, Christian Hopps <chopps@chopps.org>
Message-ID: <20170725195211.GA7411@faui40p.informatik.uni-erlangen.de>
References: <20170721062741.GA3215@faui40p.informatik.uni-erlangen.de> <CA+wi2hOCZkLeuqnqr-waNMtaex+Pjq3rXzH-HVqJhLkWQUgj_Q@mail.gmail.com> <567fdbe4992c4207b54c77b1ec8cd0cd@XCH-ALN-001.cisco.com> <20170722133419.GA18218@faui40p.informatik.uni-erlangen.de> <37e324dc58454778b70c72255066536f@XCH-RCD-001.cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <37e324dc58454778b70c72255066536f@XCH-RCD-001.cisco.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/i41K9B13FZVRsyUnNQ9pfR8gukw>
Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jul 2017 19:52:21 -0000

Thanks, Less, that would be lovely!

I didn't check the OSPF draft, if its similar state, explanatory text wold equally be appreciated.

On Sun, Jul 23, 2017 at 11:28:08PM +0000, Les Ginsberg (ginsberg) wrote:
> Toerless -
> 
> I am thinking to add a statement in Section 4.1 - something like:
> 
> "At present, IS-IS support for a given BIER domain/sub-domain is limited to a single area - or to the IS-IS L2 sub-domain."
> 
> If you believe this would be helpful I will spin a new version (subject to review/agreement from my co-authors).
> 
>    Les
> 
> 
> > -----Original Message-----
> > From: Toerless Eckert [mailto:tte@cs.fau.de]
> > Sent: Saturday, July 22, 2017 6:34 AM
> > To: Les Ginsberg (ginsberg)
> > Cc: Tony Przygienda; Hannes Gredler (hannes@gredler.at); Greg Shepherd;
> > bier@ietf.org; isis-wg@ietf.org list; Christian Hopps
> > Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
> > 
> > Thanks Les
> > 
> > When searching various terms in the doc to figure out what happens i am not
> > sure why i missed this one.
> > 
> > But: IMHO, RFCs can not only be the minimum number of words to get a
> > running implementation. It also needs to specify what this implementation
> > intends to achieve. Otherwise its not possible to do a useful review:
> > The reviewer can to verify whether the spec will achieve what it claims to
> > achieve is there no definitionn of what it claims to achieve.
> > 
> > If i understand ISIS correctly, my reverse engineering of the intent is:
> > 
> > - BIER TLVs stay within single ISIS areas. BFIR and BFER must therefore be
> >   in the same ISIS area: There is no inter-area BIER traffic possible
> >   with this specification. This is also true for ISIS area 0.
> > 
> > - The same BIER sub-domain identifiers can be re-used
> >   across different ISIS areas without any current impact. If these BFR-IDs
> >   are non-overlapping, then this would allow in the future to create a single
> >   cross ISIS area BIER sub-domain by leaking TLVs for such a BIER sub-domain
> >   across ISIS levels. Leakage is outside the scope of this specificication.
> > 
> > I actually even would like to do the following:
> > 
> > - If BIER sub-domains are made to span multiple ISIS areas and BFR-ids
> > assignemtns
> >   are made such that all BFR-ids with the same SI are in the same ISIS ara,
> >   then it should be in the future reasonably easy to create inter-area BIER
> >   not by leaking of the BIER TLV but by having BFIR MPLS unicastBIER packets
> >   for different SIs to an appropriate L2L1 BFIR that is part of the destination
> > area/SI.
> >   (if you would use SI number that are the same as ISIS area numbers then
> >    you could probably do this without any new signaling. Not quite sure if
> >    you can today easily find L1L2 border router for another area via existing
> >    TLVs).
> > 
> >   Alas, this idea will probably be killed because of the BIER architecture
> >   intent not to engineer SI assignments in geographical fashions to
> >   minimize traffic duplication in the presence of multiple SIs.
> > 
> > Cheers
> >     Toerless
> > 
> > On Sat, Jul 22, 2017 at 06:03:53AM +0000, Les Ginsberg (ginsberg) wrote:
> > > Tony/Toerless ???
> > >
> > > There is an explicit statement as to scope:
> > >
> > > <snip>
> > > Section 4.2
> > > ???
> > >    o  BIER sub-TLVs MUST NOT be included when a prefix reachability
> > >       advertisement is leaked between levels.
> > > <end snip>
> > >
> > > Tony seems to have forgotten that we had a discussion about how BIER
> > might be supported across areas and the conclusion was we did not know
> > how to do that yet.
> > > (Sorry Tony)
> > >
> > > Note this is ???consistent??? with https://www.ietf.org/id/draft-ietf-bier-
> > ospf-bier-extensions-07.txt Section 2.5<https://www.ietf.org/id/draft-ietf-
> > bier-ospf-bier-extensions-07.txt%20Section%202.5> - which limits the
> > flooding scope of BIER information to a single area unless it can be validated
> > that the best path to the prefix with BIER info can be validated to be to a
> > router which itself advertised the BIER info. This is not something IS-IS can do
> > since a single IS-IS instance only supports one area and therefore does not
> > have the Level-1 advertisements of the originating router when that router is
> > in another area.
> > >
> > > A few more responses inline.
> > >
> > > From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Tony Przygienda
> > > Sent: Friday, July 21, 2017 5:17 AM
> > > To: Toerless Eckert
> > > Cc: Hannes Gredler (hannes@gredler.at); Greg Shepherd; bier@ietf.org;
> > > isis-wg@ietf.org list; Christian Hopps
> > > Subject: Re: [Bier] WGLC: draft-ietf-bier-isis-extensions-04
> > >
> > > Terminology is a bit nits  IMO since the doc is reading clear enough for
> > someone who read BIER & ISIS. I can reread it or Les can comment whether
> > we should tighten glossary ...
> > >
> > > With the scope I agree, that got lost and the doc should be possibly rev'ed
> > before closing LC. Yes, we flood AD wide was the agreement but something
> > mentioning that this could change in the future is good so we are forced to
> > give it some thought how that would transition ...
> > >
> > > Thinking further though, in ISIS we have a clean document really. The  BIER
> > sub-TLVs go into well defined TLVs in terms of flooding scope. Normal L1-L2
> > redistribution can be used to get the info to all needed places AFAIS. So
> > maybe nothing needs to be written. I wait for Les to chime in.
> > >
> > > OSPF I would have to look @ scopes again & think whether we need to
> > write something or maybe Peter can comment ...
> > >
> > > --- tony
> > >
> > >
> > >
> > > On Fri, Jul 21, 2017 at 8:27 AM, Toerless Eckert
> > <tte@cs.fau.de<mailto:tte@cs.fau.de>> wrote:
> > > Sorry, past the two weeks, but hopefully  benign textual comments:
> > >
> > > We tried to find an explicit statement about the scope of BIER TLVs - eg:
> > > are they meant to stay within an area, have some redistribution across
> > > areas/levels or not.
> > >
> > > Tony said WG agreement was to have these TLV be flooded across the
> > > whole ISIS domain for now (this draft). So an explicit statement to that
> > effect would
> > > be great (All BIER sub-domains TLVs are flooded across all ISIS areas/levels,
> > so they span the whole ISIS domain).
> > >
> > > Also, if future work may/should could improve on that maybe some
> > > sentence about that (i guess one could just have ISIS intra-area BIER sub-
> > domains ?).
> > >
> > > Also: Do a check about possible ambiguity of any generic terms like
> > sub-domain, level, area, topology so that reader that don't know the
> > terminology ofall protocols (ISIS, BIER) by heart can easily know which
> > protocol is referred to.
> > >
> > > [Les:] There is no mention of ???level??? in the document.
> > > The use of ???sub-domain??? is clearly always associated with ???BIER???.
> > > ???topology??? is always used as an RFC 5120 topology ??? therefore
> > clearly an IS-IS topology.
> > > There is only one use of the term ???area??? (in Section 5.1). That text
> > might deserve a bit of clarification given this might be either a Level 1 area or
> > the Level2 sub-domain. I???ll take a pass at it.
> > > (BTW ??? I am talking about IS-IS area/L2sub-domain Toerless. ???)
> > >
> > > I don???t see that any other clarification is needed ??? but Toerless ??? if
> > you can point to any specific sentences/paragraphs which you find confusing
> > - I???ll take a second look.
> > >
> > >    Les
> > >
> > >
> > > I guess there are no BIER level, area or topologies, but still makes
> > > reading easier if the doc would say "ISIS level", "ISIS area", or at
> > > least have them in the Terminology section. And probably in
> > > terminology say "domain -> in the context of this document the BIER
> > domain which is also the same as the ISIS domain"
> > > (which i hope is the correct statement, see above).
> > >
> > > Cheers
> > >     Toerless
> > >
> > > _______________________________________________
> > > BIER mailing list
> > > BIER@ietf.org<mailto:BIER@ietf.org>
> > > https://www.ietf.org/mailman/listinfo/bier
> > >
> > >
> > >
> > > --
> > > We???ve heard that a million monkeys at a million keyboards could
> > produce the complete works of Shakespeare; now, thanks to the Internet,
> > we know that is not true.
> > > ???Robert Wilensky
> > 
> > --
> > ---
> > tte@cs.fau.de


From nobody Wed Jul 26 08:08:21 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C42D132059; Wed, 26 Jul 2017 08:08:17 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.57.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150108169737.23202.17196890243469859413@ietfa.amsl.com>
Date: Wed, 26 Jul 2017 08:08:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/g8lES84_JxD2KJDhhSGNU0MCqGg>
Subject: [Bier] I-D Action: draft-ietf-bier-mvpn-07.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jul 2017 15:08:20 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication WG of the IETF.

        Title           : Multicast VPN Using BIER
        Authors         : Eric C. Rosen
                          Mahesh Sivakumar
                          Sam K Aldrin
                          Andrew Dolganow
                          Tony Przygienda
	Filename        : draft-ietf-bier-mvpn-07.txt
	Pages           : 16
	Date            : 2017-07-26

Abstract:
   The Multicast Virtual Private Network (MVPN) specifications require
   the use of multicast tunnels ("P-tunnels") that traverse a Service
   Provider's backbone network.  The P-tunnels are used for carrying
   multicast traffic across the backbone.  A variety of P-tunnel types
   are supported.  Bit Index Explicit Replication (BIER) is a new
   architecture that provides optimal multicast forwarding through a
   "multicast domain", without requiring intermediate routers to
   maintain any per-flow state or to engage in an explicit tree-building
   protocol.  This document specifies the protocol and procedures that
   allow MVPN to use BIER as the method of carrying multicast traffic
   over an SP backbone network.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-mvpn/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-mvpn-07
https://datatracker.ietf.org/doc/html/draft-ietf-bier-mvpn-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-mvpn-07


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Jul 26 12:12:02 2017
Return-Path: <akatlas@gmail.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7984D131D1E for <bier@ietfa.amsl.com>; Wed, 26 Jul 2017 12:12:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJ8bxu0UXk_L for <bier@ietfa.amsl.com>; Wed, 26 Jul 2017 12:11:58 -0700 (PDT)
Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com [IPv6:2a00:1450:400c:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93DAC12EC13 for <bier@ietf.org>; Wed, 26 Jul 2017 12:11:58 -0700 (PDT)
Received: by mail-wm0-x236.google.com with SMTP id m85so75653585wma.1 for <bier@ietf.org>; Wed, 26 Jul 2017 12:11:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=nGBX+gkFIQuxdYyu61CCVQPVraFFnVJ61i4aWTKCPHY=; b=tMHJSDBS6HGpISzsmnbmJJgLAoAhvFL5ef2OVvyZeFINYFIKCEvzNZy/aqan4xAzWy wXLyfi912CtFRNGzltuPOj9poIf8mspKSHZ4PHnVonYBPSB973BPv2X4tSdTGYlM5Vqm NOiApo/dFPZSnCVTKj5w2Nb5lp26ZyIERP3TTimouDvrX8ZzHXRVcLNxF60ILDly3bLQ 8DsTfBQx3No9w2idIHfahIt1dtSrD3xVa00suNpTH0DloYOFSC6K1Wvjs8P8qEjYOIFG vaj2V8T52bgBmDNkrGu0HAeB+Fj/lTll4nb7A3JjbDiV7GzJ9f7DPN+leoPqlg2rwRv0 blmw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=nGBX+gkFIQuxdYyu61CCVQPVraFFnVJ61i4aWTKCPHY=; b=gysOUatDFFPX5tn2UoTte6hM4SO8XmYn1pTu7mesV/KuStlPYbImpFFrjJBxkl4Ar3 M/GH+r6g379zvDrX2jMTWdCeFdspHWo9kxz5Syem0lAf0r8uHYSkK6xWI2xicb7eDW6l njhSzXZutOu16C5Ps/nJM8gpPeqE7xMqi8k66BBxJzP8+hr6HBmC6QDKhB3OelfttNGE c+KlVtUPB+whiY3UDx3dOyfOgp7rLAOfm86opL4QuOsZmQR7R5IteJvX99lUyEeYwQhq Sv5WAM60bSoptl/WM3UzbQNtINqtV8+CEHZF61KD+kNfj3B1DleWO4rsehnzLQ2QqPAo vRyw==
X-Gm-Message-State: AIVw113nmQVI4L1hx83sKl2fNIsoStb8GkpdjtwfHy1HYF/+iuxtxwmd CUfFPg2xkHABBmW1I3xB5tufC6pXULL2
X-Received: by 10.28.70.68 with SMTP id t65mr1463995wma.163.1501096316859; Wed, 26 Jul 2017 12:11:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.183.1 with HTTP; Wed, 26 Jul 2017 12:11:56 -0700 (PDT)
From: Alia Atlas <akatlas@gmail.com>
Date: Wed, 26 Jul 2017 15:11:56 -0400
Message-ID: <CAG4d1rc024Gnn_p-MybSZc2YBU-RJ6=EG2c5QM3A4jWwE_n5Wg@mail.gmail.com>
To: "bier@ietf.org" <bier@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c0d45fcbd7ae005553d385b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/MIvXXVZVCMXuXv54kwrmN4Q8Rio>
Subject: [Bier] forwarding plane changes for BIER-TE
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jul 2017 19:12:00 -0000

--94eb2c0d45fcbd7ae005553d385b
Content-Type: text/plain; charset="UTF-8"

Hi Toerless,

As I mentioned in the BIER WG meeting, it would be very helpful to have a
clear and up-front section for the BIER-TE draft that clearly explains the
needed impact and changes for BIER-TE.

As we are working on finishing up the encapsulation draft, this would be
useful for those looking at hardware implementations and what changes might
be interesting in the future.

Thanks,
Alia

--94eb2c0d45fcbd7ae005553d385b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Toerless,<div><br></div><div>As I mentioned in the BIER=
 WG meeting, it would be very helpful to have a clear and up-front section =
for the BIER-TE draft that clearly explains the needed impact and changes f=
or BIER-TE.</div><div><br></div><div>As we are working on finishing up the =
encapsulation draft, this would be useful for those looking at hardware imp=
lementations and what changes might be interesting in the future.</div><div=
><br></div><div>Thanks,</div><div>Alia</div></div>

--94eb2c0d45fcbd7ae005553d385b--


From nobody Thu Jul 27 15:46:25 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 16414131CF7; Thu, 27 Jul 2017 15:46:16 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.57.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150119557605.25329.17065227637710076451@ietfa.amsl.com>
Date: Thu, 27 Jul 2017 15:46:16 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/vmvvcPQHp_amr2SRHhycTpTYXl4>
Subject: [Bier] I-D Action: draft-ietf-bier-isis-extensions-05.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jul 2017 22:46:16 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication WG of the IETF.

        Title           : BIER support via ISIS
        Authors         : Les Ginsberg
                          Tony Przygienda
                          Sam Aldrin
                          Jeffrey (Zhaohui) Zhang
	Filename        : draft-ietf-bier-isis-extensions-05.txt
	Pages           : 12
	Date            : 2017-07-27

Abstract:
   Specification of an ISIS extension to support BIER domains and sub-
   domains.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-isis-extensions/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-isis-extensions-05
https://datatracker.ietf.org/doc/html/draft-ietf-bier-isis-extensions-05

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-isis-extensions-05


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Jul 27 15:49:10 2017
Return-Path: <ginsberg@cisco.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFBA5131E6A; Thu, 27 Jul 2017 15:49:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level: 
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uCSbZ4-i0OZd; Thu, 27 Jul 2017 15:49:07 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 318E2131600; Thu, 27 Jul 2017 15:49:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1886; q=dns/txt; s=iport; t=1501195747; x=1502405347; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=UIQPD0lnu9mLEz4bTrD1cOXekVoLA8tC3VdIPjjSrsc=; b=bZ3k1MFmUXby9qIu6uYi2QsBXRhAeq71xsx7rRiJj09FslShrBWlst33 5ZNUBm4F8agMZoNM5wXv+tZ4L72PzPUK7zic0MpZy/KiKJ2QieixvcJ7B 6NM3+1ErCJ0Ffde7YXFPmd9Nr4noU4eGGeGv8Re6XyaXHAmK/zJObqy0A A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D+AABgbXpZ/40NJK1dGgEBAQECAQEBA?= =?us-ascii?q?QgBAQEBg1pkbScHjgaRYpYKghIhDYUZAoNlPxgBAgEBAQEBAQFrKIUYAQEBAQM?= =?us-ascii?q?BATg0FwQCAQgRBAEBHwkHJwsUCQgCBAESCIonELFli0ABAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEdgyiDTYFhgySDJodBBZ9mAodNjE2CFVeEe4pelXEBHziBCncVHyq?= =?us-ascii?q?HGXaIcoEOAQEB?=
X-IronPort-AV: E=Sophos;i="5.40,422,1496102400"; d="scan'208";a="273658541"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 27 Jul 2017 22:49:06 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id v6RMn6if017674 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 27 Jul 2017 22:49:06 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Thu, 27 Jul 2017 17:49:05 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1210.000; Thu, 27 Jul 2017 17:49:05 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "bier@ietf.org" <bier@ietf.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>
Thread-Topic: [Bier] I-D Action: draft-ietf-bier-isis-extensions-05.txt
Thread-Index: AQHTByo0Egc2bHOu6EGRg4rDZDKj56JoRnnQ
Date: Thu, 27 Jul 2017 22:49:05 +0000
Message-ID: <ecb9132ebec14e619481bd5ad6a247b9@XCH-ALN-001.cisco.com>
References: <150119557605.25329.17065227637710076451@ietfa.amsl.com>
In-Reply-To: <150119557605.25329.17065227637710076451@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.32.199.20]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/ukA8RgW2tWkvGXMqyhOipwhdItQ>
Subject: Re: [Bier] I-D Action: draft-ietf-bier-isis-extensions-05.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jul 2017 22:49:09 -0000

This new version addresses comments from Toerless Eckert.

   Les


> -----Original Message-----
> From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of internet-
> drafts@ietf.org
> Sent: Thursday, July 27, 2017 3:46 PM
> To: i-d-announce@ietf.org
> Cc: bier@ietf.org
> Subject: [Bier] I-D Action: draft-ietf-bier-isis-extensions-05.txt
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Bit Indexed Explicit Replication WG of t=
he IETF.
>=20
>         Title           : BIER support via ISIS
>         Authors         : Les Ginsberg
>                           Tony Przygienda
>                           Sam Aldrin
>                           Jeffrey (Zhaohui) Zhang
> 	Filename        : draft-ietf-bier-isis-extensions-05.txt
> 	Pages           : 12
> 	Date            : 2017-07-27
>=20
> Abstract:
>    Specification of an ISIS extension to support BIER domains and sub-
>    domains.
>=20
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-bier-isis-extensions/
>=20
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-bier-isis-extensions-05
> https://datatracker.ietf.org/doc/html/draft-ietf-bier-isis-extensions-05
>=20
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bier-isis-extensions-05
>=20
>=20
> Please note that it may take a couple of minutes from the time of submiss=
ion
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> BIER mailing list
> BIER@ietf.org
> https://www.ietf.org/mailman/listinfo/bier


From nobody Mon Jul 31 19:25:04 2017
Return-Path: <internet-drafts@ietf.org>
X-Original-To: bier@ietf.org
Delivered-To: bier@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id AD3F012420B; Mon, 31 Jul 2017 19:24:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: bier@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.58.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150155429566.30767.11149854220394501441@ietfa.amsl.com>
Date: Mon, 31 Jul 2017 19:24:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/xtAvXgMOQN3H_68AA5gJlt2znd8>
Subject: [Bier] I-D Action: draft-ietf-bier-bgp-ls-bier-ext-01.txt
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Aug 2017 02:24:56 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Bit Indexed Explicit Replication WG of the IETF.

        Title           : BGP Link-State extensions for BIER
        Authors         : Ran Chen
                          Zheng Zhang
                          Vengada Prasad Govindan
                          IJsbrand Wijnands
	Filename        : draft-ietf-bier-bgp-ls-bier-ext-01.txt
	Pages           : 8
	Date            : 2017-07-31

Abstract:
   Bit Index Explicit Replication (BIER) is an architecture that
   provides optimal multicast forwarding through a "BIER domain" without
   requiring intermediate routers to maintain any multicast related per-
   flow state.  BIER also does not require any explicit tree-building
   protocol for its operation.  A multicast data packet enters a BIER
   domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
   BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
   The BFIR router adds a BIER header to the packet.  The BIER header
   contains a bitstring in which each bit represents exactly one BFER to
   forward the packet to.  The set of BFERs to which the multicast
   packet needs to be forwarded is expressed by setting the bits that
   correspond to those routers in the BIER header.

   This document specifies extensions to the BGP Link-state address-
   family in order to advertising BIER information.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bier-bgp-ls-bier-ext/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-bier-bgp-ls-bier-ext-01
https://datatracker.ietf.org/doc/html/draft-ietf-bier-bgp-ls-bier-ext-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bier-bgp-ls-bier-ext-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

