
From nobody Mon Jul  1 13:41:40 2019
Return-Path: <jhaas@pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50EDA120169; Mon,  1 Jul 2019 13:41:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id viS1oiB60-Pv; Mon,  1 Jul 2019 13:41:32 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id E01CB1200F7; Mon,  1 Jul 2019 13:41:31 -0700 (PDT)
Received: from dresden.attlocal.net (99-59-193-67.lightspeed.livnmi.sbcglobal.net [99.59.193.67]) by slice.pfrc.org (Postfix) with ESMTPSA id A9B481E2D8; Mon,  1 Jul 2019 16:42:54 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_96896C42-0EC6-42BA-9D1A-C28C79D05383"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Subject: Re: Tsvart last call review of draft-ietf-bfd-vxlan-07
From: Jeffrey Haas <jhaas@pfrc.org>
In-Reply-To: <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com>
Date: Mon, 1 Jul 2019 16:41:30 -0400
Cc: Greg Mirsky <gregimirsky@gmail.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>, "draft-ietf-bfd-vxlan.all@ietf.org" <draft-ietf-bfd-vxlan.all@ietf.org>, Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>, IETF list <ietf@ietf.org>
Message-Id: <6711F7AE-04CE-48C2-BA39-748936D9CB70@pfrc.org>
References: <155933149484.6565.7386019489022348116@ietfa.amsl.com> <CA+RyBmXu-F0cWDkBydE_aJaVpUv=k1otqUCc7NdRW4pnBK3tgA@mail.gmail.com> <14822B96-D3C6-495E-8661-198068F72ABA@cisco.com> <CA+RyBmUMbW=B3FNmqiQNmMLM27f9G+MeRL5MrAnCd04EP3vmrQ@mail.gmail.com> <8237FE8D-937E-4BCB-B1A3-89C2B3CDC51C@cisco.com> <CA+RyBmXAQ1esWKa8C6cgnn93YTyTh=JFUt187TS56bNND1OJOA@mail.gmail.com> <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/2MIAy6QJiBi-Ho1oLL2uqoZzHyg>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jul 2019 20:41:33 -0000

--Apple-Mail=_96896C42-0EC6-42BA-9D1A-C28C79D05383
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Carlos,


> On Jun 19, 2019, at 10:09 PM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com> wrote:
>=20
>>=20
>> This packet loop may not be practical for several encapsulations and =
thus is
>> out of scope for such encapsulations.  Whether this is practical for =
vxlan
>> today, or in the presence of future extensions to vxlan is left out =
of scope
>> for the core proposal. =20
>=20
> The question remains: for VXLAN encapsulation, this is like a single =
hop as far as BFD is concerned (single hop VXLAN tunnel).
>=20
> Since RFC 5881 defines Echo for single hop, can you please elaborate =
(in the document) why is out of scope or how it can work?


While my suspicion was that vxlan was quite happy to be able to do BFD =
Echo in the presence of appropriate forwarding machinery, it's still =
okay for this document to specify only async mode BFD in the vxlan =
environment.

If you think it's practical to describe such an environment in a =
reasonable amount of text in the base proposal, it could be incorporated =
in that document.

-- Jeff


--Apple-Mail=_96896C42-0EC6-42BA-9D1A-C28C79D05383
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Carlos,</div><div class=3D""><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Jun =
19, 2019, at 10:09 PM, Carlos Pignataro (cpignata) &lt;<a =
href=3D"mailto:cpignata@cisco.com" class=3D"">cpignata@cisco.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"" style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
line-break: after-white-space;"><div class=3D""><div =
class=3D""><blockquote type=3D"cite" class=3D"" style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
class=3D""><div dir=3D"ltr" class=3D""><blockquote class=3D"" =
style=3D"margin: 0px 0px 0px 40px; border: none; padding: 0px;"><div =
class=3D""><br class=3D"Apple-interchange-newline">This packet loop may =
not be practical for several encapsulations and thus is</div><div =
class=3D"">out of scope for such encapsulations.&nbsp; Whether this is =
practical for vxlan</div><div class=3D"">today, or in the presence of =
future extensions to vxlan is left out of scope</div><div class=3D"">for =
the core =
proposal.&nbsp;&nbsp;</div></blockquote></div></div></blockquote><div =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><br =
class=3D""></div><div style=3D"caret-color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;" class=3D"">The question remains: for VXLAN encapsulation, this is =
like a single hop as far as BFD is concerned (single hop VXLAN =
tunnel).</div><div style=3D"caret-color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;" class=3D""><br class=3D""></div><div style=3D"caret-color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;" class=3D"">Since RFC 5881 defines Echo for =
single hop, can you please elaborate (in the document) why is out of =
scope or how it can =
work?</div></div></div></div></div></blockquote></div><br class=3D""><div =
class=3D""><br class=3D""></div><div class=3D"">While my suspicion was =
that vxlan was quite happy to be able to do BFD Echo in the presence of =
appropriate forwarding machinery, it's still okay for this document to =
specify only async mode BFD in the vxlan environment.</div><div =
class=3D""><br class=3D""></div><div class=3D"">If you think it's =
practical to describe such an environment in a reasonable amount of text =
in the base proposal, it could be incorporated in that =
document.</div><div class=3D""><br class=3D""></div><div class=3D"">-- =
Jeff</div><div class=3D""><br class=3D""></div></body></html>=

--Apple-Mail=_96896C42-0EC6-42BA-9D1A-C28C79D05383--


From nobody Mon Jul  1 13:45:36 2019
Return-Path: <jhaas@pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1FC012017D; Mon,  1 Jul 2019 13:45:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id byrp68ZS3BtK; Mon,  1 Jul 2019 13:45:32 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id 3E0DB1200F7; Mon,  1 Jul 2019 13:45:32 -0700 (PDT)
Received: from dresden.attlocal.net (99-59-193-67.lightspeed.livnmi.sbcglobal.net [99.59.193.67]) by slice.pfrc.org (Postfix) with ESMTPSA id 5C71C1E2D8; Mon,  1 Jul 2019 16:46:55 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Subject: Re: Level of standardization of the Echo mode of BFD [Re: Tsvart last call review of draft-ietf-bfd-vxlan-07]
From: Jeffrey Haas <jhaas@pfrc.org>
In-Reply-To: <CA+RyBmVgQ8VXZ-A0-0jKqAmSRvJxg4DbZiRhW67jN224tsS3+Q@mail.gmail.com>
Date: Mon, 1 Jul 2019 16:45:30 -0400
Cc: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>, "draft-ietf-bfd-vxlan.all@ietf.org" <draft-ietf-bfd-vxlan.all@ietf.org>, Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>, IETF list <ietf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <CA4B300A-FA90-44FA-ADE6-F9F7048E6599@pfrc.org>
References: <155933149484.6565.7386019489022348116@ietfa.amsl.com> <CA+RyBmXu-F0cWDkBydE_aJaVpUv=k1otqUCc7NdRW4pnBK3tgA@mail.gmail.com> <14822B96-D3C6-495E-8661-198068F72ABA@cisco.com> <CA+RyBmUMbW=B3FNmqiQNmMLM27f9G+MeRL5MrAnCd04EP3vmrQ@mail.gmail.com> <8237FE8D-937E-4BCB-B1A3-89C2B3CDC51C@cisco.com> <CA+RyBmXAQ1esWKa8C6cgnn93YTyTh=JFUt187TS56bNND1OJOA@mail.gmail.com> <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com> <CA+RyBmVgQ8VXZ-A0-0jKqAmSRvJxg4DbZiRhW67jN224tsS3+Q@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/q9H5bq9YbPXjMP46Zf73a8cC4Wo>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jul 2019 20:45:34 -0000

Greg,


> On Jun 20, 2019, at 12:50 AM, Greg Mirsky <gregimirsky@gmail.com> =
wrote:
>=20
> Hello Carlos,
> could you please refer me to the specification of BFD that defines the =
message format that is used in the Echo mode of BFD. Is it the BFD =
control packet? Something else?

It is implementation specific.  Only the sender of BFD Echo packets =
cares about the contents.  The sender is thus free to use whatever =
pleases it for its implementation.

As Carlos mentions, worrying over this point is a distraction and not =
particularly relevant for the vxlan review.

-- Jeff


From nobody Tue Jul  2 11:35:54 2019
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB24E1206F2 for <rtg-bfd@ietfa.amsl.com>; Tue,  2 Jul 2019 11:35:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gVOTCUhht2tG for <rtg-bfd@ietfa.amsl.com>; Tue,  2 Jul 2019 11:35:51 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id E31BA12010F for <rtg-bfd@ietf.org>; Tue,  2 Jul 2019 11:35:50 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id 3F55F1E2F2; Tue,  2 Jul 2019 14:37:15 -0400 (EDT)
Date: Tue, 2 Jul 2019 14:37:15 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: rtg-bfd@ietf.org
Subject: Re: Progressing BFD authentication documents
Message-ID: <20190702183714.GB3974@pfrc.org>
References: <20190216170740.GA31558@pfrc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20190216170740.GA31558@pfrc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/fACiRf65FyLOZbJc1ySPqjhNkhs>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 18:35:53 -0000

Working Group,

A followup on this item.

Currently, the status is identical to that which was last posted.  Mahesh
did make contact with Ciena IPR holders regarding the state of the license.
It is their belief that their disclosure is consistent with similar IPR
filed against BFD.  Citing two similar ones:

https://datatracker.ietf.org/ipr/516/
https://datatracker.ietf.org/ipr/1419/

It also appears to be their belief that the current wording doesn't require
that a license fee is due.  However, this is private commentary.

At this point, my recommendation to the working group is we decide if we'll
proceed with the publication process.  Let's use this time prior to IETF 105
to discuss any pending issues on these documents.

-- Jeff

On Sat, Feb 16, 2019 at 12:07:40PM -0500, Jeffrey Haas wrote:
> Working Group,
> 
> On March 28, 2018, we started Working Group Last Call on the following document
> bundle:
> 
>   draft-ietf-bfd-secure-sequence-numbers
>   draft-ietf-bfd-optimizing-authentication
>   draft-ietf-bfd-stability
> 
> The same day, Mahesh Jethanandani acknowledged there was pending IPR
> declarations against these drafts.  An IPR declaration was finally posted on
> November 1, 2018.  In particular, it notes a patent.  The licenseing is
> RAND.  
> 
> https://datatracker.ietf.org/ipr/3328/
> 
> In the time since the WGLC was requested, there were a number of technical
> comments made on these drafts.  It's my belief that all substantial
> technical comments had been addressed in the last posted version of these
> documents.  Note that there was one lingering comment about Yang
> considerations for the BFD module with regard to enabling this optimized
> authentication mode which can be dealt with separably.
> 
> The chairs did not carry out a further consensus call to ensure that there
> are no further outstanding technical issues.
> 
> On November 21, Greg Mirsky indicated an objection to progressing the
> document due to late disclosure.
> 
> https://mailarchive.ietf.org/arch/msg/rtg-bfd/u8rvWwvDWRKI3jseGHecAB9WtDo
> 
> Since we are a little over a month prior to the upcoming IETF 104, this
> seems a good time to try to decide how the Working Group shall finish this
> work.  Since we are meeting in Prague, this may progress to microphone
> conversation.
> 
> For the moment, the chairs' perceived status of the documents are:
> - No pending technical issues with the documents with one known issue.
> - Concerns over late disclosure of IPR.
> - No solid consensus from the Working Group that we're ready to proceed.
>   This part may be covered by a future consensus call, but let's hear list
>   discussion first.
> 
> -- Jeff


From nobody Tue Jul  2 12:03:05 2019
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 916A312071B for <rtg-bfd@ietfa.amsl.com>; Tue,  2 Jul 2019 12:03:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PsjlxTmw0M7W for <rtg-bfd@ietfa.amsl.com>; Tue,  2 Jul 2019 12:03:01 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id D42691207AB for <rtg-bfd@ietf.org>; Tue,  2 Jul 2019 12:02:59 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id 4B18B1E2F2; Tue,  2 Jul 2019 15:04:23 -0400 (EDT)
Date: Tue, 2 Jul 2019 15:04:22 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: rtg-bfd@ietf.org
Subject: IETF 105
Message-ID: <20190702190422.GC3974@pfrc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/NxMWbGfdJCVObKh152PRffEpEaM>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 19:03:04 -0000

Working Group,

Reshad had put out a call for presentations for IETF 105 in mid-June.  As of
this time, we don't currently have any agenda requests.

A quick status of current work:
- BFD for vxlan is undergoing post WGLC expert review at the request of our
  Area Director.
- BFD Authentication drafts need discussion in the working group on how to
  progress or not.
- Unsolicited BFD is stable, and a trivial draft.  We've received a prod
  from the authors asking if the next step is WGLC.
- BFD for Large Packets is stable, and waiting on implementations.
- BFD in Demand Mode has discussion pending with author and Area Director.

Potential future work:
- RFC 5884 bis.  (RFC 5884 authors willing to contribute.)
- BFD v2 or not.  Greg seeded the discussion at IETF 104.

BFD as a working group needs to meet only if it advances discussion on our
work.  If we don't have anything requiring group discussion outside of
mailing list, we may consider canceling our timeslot.

-- Jeff


From nobody Tue Jul  2 13:20:43 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F0F2120172; Tue,  2 Jul 2019 13:20:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6Z6VhdKWlaJN; Tue,  2 Jul 2019 13:20:40 -0700 (PDT)
Received: from mail-lf1-x130.google.com (mail-lf1-x130.google.com [IPv6:2a00:1450:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16EA6120128; Tue,  2 Jul 2019 13:20:40 -0700 (PDT)
Received: by mail-lf1-x130.google.com with SMTP id q26so57169lfc.3; Tue, 02 Jul 2019 13:20:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=J45v8CjJdAP5BGvXM+/DWIz3SF9uSyCP+7pfOiiTook=; b=sW4eRovO3F+amS7t+8wLDN+5JktzWNTtZZPIRcQGVl/5vdcnczPro+TCMpPn10gJuL LEWpKf3MJzhdX8YBDa2wywdP09GRaya8CNusYwGN4JdmDrRHNhBiZpBh5MkF4qb6GyBA 7tKzlNKTcxKMYryWFH9Z4kSwyXOSOdm4ZjTTTwQyln3V8Tz5TTlbXBMMdFuPO1hG4nml k26E/ra3nrcoYRtXwvNTTYxTa0oiqsoHgY4jW2YGb7hjj1HFhBYfJB3fGjEpLym+PdUh XPq3T7yCbcmLTPOLY8XO2Q+cmJXS7ASobn5GcYVNIHaBtWK+TTP+aJFyhJBM3X9JHJyH X5TQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=J45v8CjJdAP5BGvXM+/DWIz3SF9uSyCP+7pfOiiTook=; b=sTzliTRehRyZ39vMbp5m41K/3eA8kZn5SNT8bDUGmTZGShJdiAOmMpCeQrDCG1EW/w MBAUvKfPuOotbRzK0sEt4lOGqqFb7BXHAm6QtD5ma1rE/P6auhEuzpL67yf/IDhRujwe W6mbuG8dvNNE1KJxuhxHxIleEF8BvdbZIsKYJdgiEmsWYbkW1E9rYuLpmp35vG3TbHrB Tv+ivu9QEIqCZDZR3wsmUn6hnWOZs7UVTIqwA90YVZKT4o44752UvU5qPjCWPtHgV29X 7ANZGNmlMZ7nG6Xo3mBKcy9cmC6X+JW0vIFV8FbhYCc1uy2iG6pFmQz9M5ub7gTMwRz5 CX0g==
X-Gm-Message-State: APjAAAUoK9cESJ/OeK2/m3txOL2xnoiVXJQB+I2SNL+utKiAsVdbWOUa SYMU2t4oqeBGXVmNVe3NLy7cHmQw0CR8Ku+UNOTBtw==
X-Google-Smtp-Source: APXvYqyasMQFcbLM0lFBKcf9+2LqnljUOuqBaht/xNo4lfknylYNrNxZCoqXe5PzIRlrfzpcVcDk+5+mRlCtLHrsAIs=
X-Received: by 2002:a05:6512:24a:: with SMTP id b10mr15917042lfo.37.1562098837626;  Tue, 02 Jul 2019 13:20:37 -0700 (PDT)
MIME-Version: 1.0
References: <156209858171.23916.4131277873518842579.idtracker@ietfa.amsl.com>
In-Reply-To: <156209858171.23916.4131277873518842579.idtracker@ietfa.amsl.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 2 Jul 2019 13:20:25 -0700
Message-ID: <CA+RyBmU7duEDVkkVqR2YkUSBk+_d7UHvqg=FE_Txewq4LbQO6g@mail.gmail.com>
Subject: Fwd: New Version Notification for draft-mirmin-bfd-extended-01.txt
To: rtg-bfd WG <rtg-bfd@ietf.org>, bfd-chairs@ietf.org
Content-Type: multipart/alternative; boundary="000000000000522292058cb87adb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/LdbvnZ9QNO4QWxt-eb5_C3Ufiac>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 20:20:42 -0000

--000000000000522292058cb87adb
Content-Type: text/plain; charset="UTF-8"

Dear All,
in the new version, we've added and described the use of the Lightweight
Authentication TLV. Also, clarified the use of the Capability TLV in the
course of the Poll sequence.
Much appreciate your reviews, comments, and questions. Looking forward to
discussing updates in Montreal.

Regards,
Greg

---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Tue, Jul 2, 2019 at 1:16 PM
Subject: New Version Notification for draft-mirmin-bfd-extended-01.txt
To: Xiao Min <xiao.min2@zte.com.cn>, Gregory Mirsky <gregimirsky@gmail.com>



A new version of I-D, draft-mirmin-bfd-extended-01.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-mirmin-bfd-extended
Revision:       01
Title:          Extended Bidirectional Forwarding Detection
Document date:  2019-07-02
Group:          Individual Submission
Pages:          14
URL:
https://www.ietf.org/internet-drafts/draft-mirmin-bfd-extended-01.txt
Status:         https://datatracker.ietf.org/doc/draft-mirmin-bfd-extended/
Htmlized:       https://tools.ietf.org/html/draft-mirmin-bfd-extended-01
Htmlized:
https://datatracker.ietf.org/doc/html/draft-mirmin-bfd-extended
Diff:
https://www.ietf.org/rfcdiff?url2=draft-mirmin-bfd-extended-01

Abstract:
   This document describes a mechanism to extend the capabilities of
   Bidirectional Forwarding Detection (BFD).  These extensions enable
   BFD to measure performance metrics like packet loss and packet delay.
   Also, a method to perform lightweight on-demand authentication is
   defined in this specification.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

--000000000000522292058cb87adb
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear All,<div>in the new version, we&#39;ve added and desc=
ribed the use of the Lightweight Authentication TLV. Also, clarified the us=
e of the Capability TLV in the course of the Poll sequence.</div><div>Much =
appreciate your reviews, comments, and questions. Looking forward to discus=
sing updates in Montreal.</div><div><br></div><div>Regards,</div><div>Greg<=
br><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">---=
------- Forwarded message ---------<br>From: <span dir=3D"auto">&lt;<a href=
=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;</span=
><br>Date: Tue, Jul 2, 2019 at 1:16 PM<br>Subject: New Version Notification=
 for draft-mirmin-bfd-extended-01.txt<br>To: Xiao Min &lt;<a href=3D"mailto=
:xiao.min2@zte.com.cn">xiao.min2@zte.com.cn</a>&gt;, Gregory Mirsky &lt;<a =
href=3D"mailto:gregimirsky@gmail.com">gregimirsky@gmail.com</a>&gt;<br></di=
v><br><br><br>
A new version of I-D, draft-mirmin-bfd-extended-01.txt<br>
has been successfully submitted by Greg Mirsky and posted to the<br>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-mirmin-bfd-extended<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A001<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Extended Bidirectional Forwarding =
Detection<br>
Document date:=C2=A0 2019-07-02<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Individual Submission<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 14<br>
URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.o=
rg/internet-drafts/draft-mirmin-bfd-extended-01.txt" rel=3D"noreferrer" tar=
get=3D"_blank">https://www.ietf.org/internet-drafts/draft-mirmin-bfd-extend=
ed-01.txt</a><br>
Status:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.iet=
f.org/doc/draft-mirmin-bfd-extended/" rel=3D"noreferrer" target=3D"_blank">=
https://datatracker.ietf.org/doc/draft-mirmin-bfd-extended/</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
draft-mirmin-bfd-extended-01" rel=3D"noreferrer" target=3D"_blank">https://=
tools.ietf.org/html/draft-mirmin-bfd-extended-01</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.ietf.org=
/doc/html/draft-mirmin-bfd-extended" rel=3D"noreferrer" target=3D"_blank">h=
ttps://datatracker.ietf.org/doc/html/draft-mirmin-bfd-extended</a><br>
Diff:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://www.ietf.o=
rg/rfcdiff?url2=3Ddraft-mirmin-bfd-extended-01" rel=3D"noreferrer" target=
=3D"_blank">https://www.ietf.org/rfcdiff?url2=3Ddraft-mirmin-bfd-extended-0=
1</a><br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document describes a mechanism to extend the capabilities=
 of<br>
=C2=A0 =C2=A0Bidirectional Forwarding Detection (BFD).=C2=A0 These extensio=
ns enable<br>
=C2=A0 =C2=A0BFD to measure performance metrics like packet loss and packet=
 delay.<br>
=C2=A0 =C2=A0Also, a method to perform lightweight on-demand authentication=
 is<br>
=C2=A0 =C2=A0defined in this specification.<br>
<br>
<br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
The IETF Secretariat<br>
<br>
</div></div></div>

--000000000000522292058cb87adb--


From nobody Tue Jul  2 13:30:38 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C489120128 for <rtg-bfd@ietfa.amsl.com>; Tue,  2 Jul 2019 13:30:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BNw90UGUrKrV for <rtg-bfd@ietfa.amsl.com>; Tue,  2 Jul 2019 13:30:35 -0700 (PDT)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E534120100 for <rtg-bfd@ietf.org>; Tue,  2 Jul 2019 13:30:35 -0700 (PDT)
Received: by mail-lj1-x231.google.com with SMTP id p17so18349976ljg.1 for <rtg-bfd@ietf.org>; Tue, 02 Jul 2019 13:30:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=eRXYZmmK/cFdmbmU2VufiioLYwznr4BHCulqm2geFsA=; b=suVWXDK8eY2Di1Bxj7mE7KdS6+Y43us1wWwOJHdhv9nNeSjVvd8/Ov6j6GzICcsmV1 EpC7dThRbz0GHVY4Cg5RiqJa0Oc4IX0yBpRMyqR9WS3iQ2UG2ukLjoLcgL/ckItgzE7m x1B0iLhdR0FRqtNbjb9hX9MQNlCEYezhDE33P0G3J9MlB5IQotkmpT0ET6AGaic23paZ 4k99kDAkFClquJCmbE4NLKC/I1hFVVHasSP376A6sW7x2uIZpQaj/+X35D0Z7FEh3BtD P66ZU8aKINzCvtThWErEN4DtUn9KmpwYssHg8e7TF7AFvZG+1val+M9gDQqbMfHu8jAt LKAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=eRXYZmmK/cFdmbmU2VufiioLYwznr4BHCulqm2geFsA=; b=MF1zscknqIE/RAHWat00TF0JlMO8L1fW2bAZtvBmy2ZhslW2AcbGKm/iZVSXgNxo+T /fyqYKTj4xkBTYrEaI4+H4Bnx5v6kUFL5lfxV3u84X2vnjJ6+SqMXkmY1cTUZs/BIZnV PN/aiiZDpjzDJuN1AGOlZCuK73+/UcAOcrGxlZUPpRoXFMZ+Le3HTWPX0NUJLmV59MUd 3z+xb4zi4+a9h4Ei8dDPnncFQaHFwYFCozeu2ZR7B3E0DN6gIuGW9atDbFDAofMYsEBc Et99Pzqv5DMEQ1v/B7ubnjufd8vUT3rUpKjfsftbjviXKwJVITH8pEN3GJ64+AXO7TAg hL4w==
X-Gm-Message-State: APjAAAUcc+l7iA2VGVM2Qva+dQUKVtKloyhknf09opx9K4VGNTpD07qZ xjoLq0DKkJz3sK3c3GoWfHg3Tz+RZ/izto1yz2Q=
X-Google-Smtp-Source: APXvYqwVLc7DX9j1bFiwTzHOhax8lTKXwkfAl/8vsyBGZMIuqulXZYGhGLUqc9FIWCOLazYQbbLWR+BJjNra6iFFIH4=
X-Received: by 2002:a2e:b047:: with SMTP id d7mr18714728ljl.8.1562099433336; Tue, 02 Jul 2019 13:30:33 -0700 (PDT)
MIME-Version: 1.0
References: <BEBE4676-EF3A-4A9A-8C38-95FD97092BE9@cisco.com>
In-Reply-To: <BEBE4676-EF3A-4A9A-8C38-95FD97092BE9@cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 2 Jul 2019 13:30:21 -0700
Message-ID: <CA+RyBmUeDg5NrPE++Bab8jN1wjtzd+1d08iPUnhWUsDb+wFGCQ@mail.gmail.com>
Subject: Re: BFD presentation requests @ IETF105 Montreal
To: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d3f691058cb89d86"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/SvMQowZHf09N-6Git-usRuSCPpw>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 20:30:37 -0000

--000000000000d3f691058cb89d86
Content-Type: text/plain; charset="UTF-8"

Dear Reshad,
we've updated the Extended BFD draft adding the Lightweight Authentication
TLV. Also, clarified the use of the Capabilities TLV in the Poll sequence
to address the comment What we want to do at 3.3 msec rate? Appreciate the
opportunity to present the updates and discuss with the group in Montreal:
draft-mirmin-bfd-extended     Presenter: Greg Mirsky   Time: 15 min

Regards,
Greg


On Mon, Jun 17, 2019 at 9:10 AM Reshad Rahman (rrahman) <rrahman@cisco.com>
wrote:

> BFD WG,
>
>
>
> We will be meeting at IETF 105 in Montreal. Please send presentation
> requests to the chairs.
>
>
>
> Regards,
>
> Reshad & Jeff.
>

--000000000000d3f691058cb89d86
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear Reshad,<div>we&#39;ve updated the Extended BFD draft =
adding the Lightweight Authentication TLV. Also, clarified the use of the C=
apabilities TLV in the Poll sequence to address the comment What we want to=
 do at 3.3 msec rate? Appreciate the opportunity to present the updates and=
 discuss with the group in Montreal:</div><div>draft-mirmin-bfd-extended=C2=
=A0 =C2=A0 =C2=A0Presenter: Greg Mirsky=C2=A0 =C2=A0Time: 15 min</div><div>=
<br></div><div>Regards,</div><div>Greg<br><div><br></div></div></div><br><d=
iv class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Jun =
17, 2019 at 9:10 AM Reshad Rahman (rrahman) &lt;<a href=3D"mailto:rrahman@c=
isco.com">rrahman@cisco.com</a>&gt; wrote:<br></div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex">





<div lang=3D"EN-CA">
<div class=3D"gmail-m_3687243619310529457WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11pt">BFD WG=
,<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11pt"><u></u=
>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11pt">We wil=
l be meeting at IETF 105 in Montreal. Please send presentation requests to =
the chairs.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11pt"><u></u=
>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11pt">Regard=
s,<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11pt">Reshad=
 &amp; Jeff.<u></u><u></u></span></p>
</div>
</div>

</blockquote></div>

--000000000000d3f691058cb89d86--


From nobody Wed Jul  3 09:21:04 2019
Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E301D120356; Wed,  3 Jul 2019 09:20:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=m/Ri5mOu; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=C+ULsi6Q
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FYCn5iCbNiYt; Wed,  3 Jul 2019 09:20:43 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EDD31203A9; Wed,  3 Jul 2019 09:20:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9907; q=dns/txt; s=iport; t=1562170842; x=1563380442; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=lIsv47RyHBFolDVavDjntG2WOVdDba2QbLLa+Kzeks0=; b=m/Ri5mOuapBVcwrBRNbvRj/szN4Lp20HFN9hcXJs9MVK/dZYfTCR0lsy 6yuMNmyPnJicg6R8dpRaZntzLZYoyCCbUaKdoUlOWG6CHDC7e5Md8Zt5f dci3S8vkkpPv9lnT8hGciQDbDtKDRtRRghftsWCZLoL/h/wBnGdzpikht I=;
IronPort-PHdr: =?us-ascii?q?9a23=3AWMLPpBHtBN+8iEjX8panKp1GYnJ96bzpIg4Y7I?= =?us-ascii?q?YmgLtSc6Oluo7vJ1Hb+e4z1Q3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNV?= =?us-ascii?q?cejNkO2QkpAcqLE0r+efXybiM8FdhLfFRk5Hq8d0NSHZW2ag=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AIAAC+1Bxd/4ENJK1lGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBUwUBAQEBCwGBFC9QA4E/IAQLKAqEEoNHA4RSiXOVTYRUgS6?= =?us-ascii?q?BJANUCQEBAQwBAS0CAQGEQAIXggsjNAkOAQMBAQQBAQIBBW2KNwyFSwIEEhE?= =?us-ascii?q?dAQE3AQ8CAQgOMQMCAgIwFBECBA4FIoMAgR5NAx0BApoiAoE4iGBxgTKCeQE?= =?us-ascii?q?BBYUQGIISCYE0AYteF4FAP4E4H4JMPoRDgwsygiaMRoFzL4R8iF2NfgkCgha?= =?us-ascii?q?TfxuCK4ccjiqhWoMJAgQCBAUCDgEBBYFQOIFYcBVlAYJBPoIDDBeDTopTcoE?= =?us-ascii?q?pi1QBgSABAQ?=
X-IronPort-AV: E=Sophos;i="5.63,446,1557187200";  d="scan'208,217";a="299807761"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 03 Jul 2019 16:20:40 +0000
Received: from XCH-ALN-019.cisco.com (xch-aln-019.cisco.com [173.36.7.29]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id x63GKeAk024821 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 3 Jul 2019 16:20:40 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-019.cisco.com (173.36.7.29) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 3 Jul 2019 11:20:40 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 3 Jul 2019 11:20:39 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 3 Jul 2019 12:20:38 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lIsv47RyHBFolDVavDjntG2WOVdDba2QbLLa+Kzeks0=; b=C+ULsi6Q3HT/QJgShEbOv4oKWwJMWelVEWY1i4EM4FONu5X6dtk9JwZMuFwTSfKTYRc1K9+NVfxvryN4gBZSQdM4wO4N81+dUdkYBnM4K1yOTnxL5BkBLHjgmEy41n+hN0dPVOtxXjwYy/zDo0kbo0RwEAmKEUaxKU1Kefs4umM=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB3252.namprd11.prod.outlook.com (10.167.234.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2052.15; Wed, 3 Jul 2019 16:20:37 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998%3]) with mapi id 15.20.2052.010; Wed, 3 Jul 2019 16:20:37 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Jeff Haas <jhaas@pfrc.org>
CC: Greg Mirsky <gregimirsky@gmail.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>, "draft-ietf-bfd-vxlan.all@ietf.org" <draft-ietf-bfd-vxlan.all@ietf.org>, Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>, IETF list <ietf@ietf.org>
Subject: Re: Tsvart last call review of draft-ietf-bfd-vxlan-07
Thread-Topic: Tsvart last call review of draft-ietf-bfd-vxlan-07
Thread-Index: AQHVJMqh+O1Bih53oEC7haZ3x5KaoKajsLYAgAAPSACAAAYzgIAAB4wAgAAC+oCAEoBsAIAC28aA
Date: Wed, 3 Jul 2019 16:20:37 +0000
Message-ID: <A715ED2F-842B-4E6E-9BDF-04740E0D1D86@cisco.com>
References: <155933149484.6565.7386019489022348116@ietfa.amsl.com> <CA+RyBmXu-F0cWDkBydE_aJaVpUv=k1otqUCc7NdRW4pnBK3tgA@mail.gmail.com> <14822B96-D3C6-495E-8661-198068F72ABA@cisco.com> <CA+RyBmUMbW=B3FNmqiQNmMLM27f9G+MeRL5MrAnCd04EP3vmrQ@mail.gmail.com> <8237FE8D-937E-4BCB-B1A3-89C2B3CDC51C@cisco.com> <CA+RyBmXAQ1esWKa8C6cgnn93YTyTh=JFUt187TS56bNND1OJOA@mail.gmail.com> <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com> <6711F7AE-04CE-48C2-BA39-748936D9CB70@pfrc.org>
In-Reply-To: <6711F7AE-04CE-48C2-BA39-748936D9CB70@pfrc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com; 
x-originating-ip: [173.38.117.84]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: de593a1d-3285-4625-fac1-08d6ffd2625a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB3252; 
x-ms-traffictypediagnostic: BL0PR11MB3252:
x-microsoft-antispam-prvs: <BL0PR11MB3252B2145F8AA7DEE36C2341C7FB0@BL0PR11MB3252.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00872B689F
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(366004)(376002)(39860400002)(346002)(396003)(189003)(199004)(478600001)(26005)(76176011)(68736007)(3846002)(6116002)(66946007)(6916009)(50226002)(186003)(76116006)(99286004)(73956011)(66476007)(66556008)(64756008)(66446008)(256004)(86362001)(8936002)(81156014)(81166006)(8676002)(102836004)(25786009)(6506007)(53546011)(5660300002)(14454004)(71190400001)(71200400001)(6246003)(66066001)(561944003)(2906002)(53936002)(316002)(6436002)(33656002)(54906003)(36756003)(11346002)(6512007)(486006)(2616005)(236005)(476003)(4326008)(6486002)(57306001)(7736002)(446003)(229853002)(54896002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3252; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 7ZexR2NYHP4VzxZZNJV9D2ezGyf5L/Yp5QNuLgtXt16WMWRJK7ySXaRMoLb4EZZPvV4nIuiMEvPncflYwxjt0is2rFdC3TKyytDrX94RgjgWdAtIMRHwLc9zEz/FC0vaI31E9YfAlAqu3tfhdvrVPRU4IgiE4uquh2H0OsX9FexCrrlryAb7gfWp3MYdFazVs6YjXrbiFyhSaHEudUWzRhbLIwwe+pMI4GRpIdjrppnAPhSe+UNxXgvQtNsr6l3B4wwzgWYFdovDOU3BCEEk6ITHnKOQkpd9qG+RZ8JstE4sFaMXmC7Ffr0F498vgObqKDp3gGc63KfMPsTDCTSiLP+YtDtEiLkqpw1jERqLbUDJXHKEfaG5zBwexwiGr13IoQl/xtZM/7zvy8eqkB3VucVHdyaeSqBWvast6WbBQ08=
Content-Type: multipart/alternative; boundary="_000_A715ED2F842B4E6E9BDF04740E0D1D86ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: de593a1d-3285-4625-fac1-08d6ffd2625a
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2019 16:20:37.6939 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3252
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.29, xch-aln-019.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/L_115h6Ck_MkUtlmXjv0yTrcaII>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2019 16:20:53 -0000

--_000_A715ED2F842B4E6E9BDF04740E0D1D86ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_A715ED2F842B4E6E9BDF04740E0D1D86ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <2AED59046D194E4C800114CEF9804EC8@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_A715ED2F842B4E6E9BDF04740E0D1D86ciscocom_--


From nobody Wed Jul  3 09:35:55 2019
Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D02981200E5; Wed,  3 Jul 2019 09:35:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=i30c2gux; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=wj+hU5DG
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UEDXvfuakjc7; Wed,  3 Jul 2019 09:35:42 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCD741200DF; Wed,  3 Jul 2019 09:35:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=38226; q=dns/txt; s=iport; t=1562171741; x=1563381341; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=n63HJQBEfpOGfuc+NlE8GhL0JCtD6iJZRd4o1UwHueA=; b=i30c2guxtahVprAy34a0ggLRegaRaNmFfIFfJJW0aj/ig3+EzdlHNcsX monk5IxiFXWImYGWoMWwccAJ8ny++lquI7YjOQTth8WbLOcQQzpO2Bb6M FlVzGONnGqQY5hwfRviWTw9yCb4TdvJng1HZctgj1MSCWfC8d5rjEnZZa U=;
IronPort-PHdr: =?us-ascii?q?9a23=3AH3AqahOpWCnkxr/YEYYl6mtXPHoupqn0MwgJ65?= =?us-ascii?q?Eul7NJdOG58o//OFDEu6w/l0fHCIPc7f8My/HbtaztQyQh2d6AqzhDFf4ETB?= =?us-ascii?q?oZkYMTlg0kDtSCDBjwNP/laSUmFexJVURu+DewNk0GUMs=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BFAACl2Bxd/5ldJa1lGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBVgIBAQEBCwGBQyQFJwNqVSAECygKhBJigmUDjkSCW4lNjXm?= =?us-ascii?q?BQoEQA1QJAQEBDAEBIwoCAQGEQAIXggsjNwYOAQMBAQQBAQIBBW2KNwyFSgE?= =?us-ascii?q?BAQMBEggJBA0MAQElBAkFAQQLAgEIGAICHwcCAgIfERUQAgQOBSKDAAGBagM?= =?us-ascii?q?ODwECDJoIAoE4iGBxfzOCeQEBBYUPDQuCEgMGgQwoAYRxhCSBHoErF4FAP4E?= =?us-ascii?q?QAScfgkw+ghpHAQECAYEqAQELBgIBCBUIEBUMAoJQMoImi3MkLQKBcy+NWY0?= =?us-ascii?q?SLEAJAoIWhlaEaoRMBINvG4IrhxyEDIV0glqBUJRtgXKKex03BoIvAgQCBAU?= =?us-ascii?q?CDgEBBYFmImdxcBU7KgGCQT6CAwsBFxRvAQiCQoUUhT4BcgGBKIojgTEBgSA?= =?us-ascii?q?BAQ?=
X-IronPort-AV: E=Sophos;i="5.63,446,1557187200"; d="scan'208";a="587241545"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 03 Jul 2019 16:35:39 +0000
Received: from XCH-RCD-017.cisco.com (xch-rcd-017.cisco.com [173.37.102.27]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id x63GZdUX018642 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 3 Jul 2019 16:35:39 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-017.cisco.com (173.37.102.27) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 3 Jul 2019 11:35:39 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 3 Jul 2019 11:20:36 -0500
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 3 Jul 2019 11:20:36 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=n63HJQBEfpOGfuc+NlE8GhL0JCtD6iJZRd4o1UwHueA=; b=wj+hU5DGW2Van8987cxxZE7UESBPL2k2Dwu4mpN8nKUcaAQ8idO4xMc2fBjoRVFEWPmXmHySx6CIbCrf7xi5WkngpiyUVKyoGkCXHr1A2b998dcD6N1e/234oxRV/u8NtqzZn1FgNRp1nl3e18ju5kbOjvqEPqEvTKBFFQt8NIY=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB2962.namprd11.prod.outlook.com (20.177.147.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2032.20; Wed, 3 Jul 2019 16:20:34 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998%3]) with mapi id 15.20.2052.010; Wed, 3 Jul 2019 16:20:34 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: "tsv-art@ietf.org" <tsv-art@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>, "draft-ietf-bfd-vxlan.all@ietf.org" <draft-ietf-bfd-vxlan.all@ietf.org>, Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>, IETF list <ietf@ietf.org>
Subject: Re: Level of standardization of the Echo mode of BFD [Re: Tsvart last call review of draft-ietf-bfd-vxlan-07]
Thread-Topic: Level of standardization of the Echo mode of BFD [Re: Tsvart last call review of draft-ietf-bfd-vxlan-07]
Thread-Index: AQHVJyO4ZUHeu4GAiUWD+HbCVzn3tKaj/jqAgAAF+ICAAs3NgIAH7VsAgApo2IA=
Date: Wed, 3 Jul 2019 16:20:34 +0000
Message-ID: <B976AA48-2C90-48CC-B087-B2528797AF35@cisco.com>
References: <155933149484.6565.7386019489022348116@ietfa.amsl.com> <CA+RyBmXu-F0cWDkBydE_aJaVpUv=k1otqUCc7NdRW4pnBK3tgA@mail.gmail.com> <14822B96-D3C6-495E-8661-198068F72ABA@cisco.com> <CA+RyBmUMbW=B3FNmqiQNmMLM27f9G+MeRL5MrAnCd04EP3vmrQ@mail.gmail.com> <8237FE8D-937E-4BCB-B1A3-89C2B3CDC51C@cisco.com> <CA+RyBmXAQ1esWKa8C6cgnn93YTyTh=JFUt187TS56bNND1OJOA@mail.gmail.com> <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com> <CA+RyBmVgQ8VXZ-A0-0jKqAmSRvJxg4DbZiRhW67jN224tsS3+Q@mail.gmail.com> <BADB8CA6-FCAC-47A3-8B06-F82E98A89549@cisco.com> <CA+RyBmVgV31+Zi+AkaOakm9FwbHUgr4OoYcUhfJtSVGPC-m5_A@mail.gmail.com> <BCEA05ED-5921-4E0D-B76E-2024F3B78ED7@cisco.com> <CA+RyBmWODaxGUYDEjAOaLzJCR6qx3w1yet1Y0BeP7RAqusExJQ@mail.gmail.com>
In-Reply-To: <CA+RyBmWODaxGUYDEjAOaLzJCR6qx3w1yet1Y0BeP7RAqusExJQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com; 
x-originating-ip: [173.38.117.84]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4f2646b2-bfa7-47f8-446a-08d6ffd26063
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB2962; 
x-ms-traffictypediagnostic: BL0PR11MB2962:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <BL0PR11MB2962E93557E9E8C363A42398C7FB0@BL0PR11MB2962.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 00872B689F
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(396003)(136003)(376002)(346002)(366004)(51444003)(199004)(189003)(7736002)(26005)(186003)(229853002)(305945005)(14454004)(486006)(6436002)(6486002)(71200400001)(71190400001)(256004)(86362001)(99286004)(5024004)(14444005)(6916009)(76176011)(8676002)(33656002)(81156014)(81166006)(8936002)(6116002)(2906002)(3846002)(53546011)(476003)(102836004)(11346002)(446003)(6506007)(2616005)(561944003)(73956011)(66946007)(68736007)(76116006)(66476007)(66556008)(64756008)(66446008)(25786009)(6246003)(5660300002)(50226002)(30864003)(966005)(4326008)(478600001)(316002)(6306002)(66066001)(57306001)(6512007)(1411001)(54906003)(53936002)(36756003)(53946003)(559001)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB2962; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: FOe/Dc/wOslFdtRz31ThcjSDksLEU/xd6ObgneoKoLnIPCtYP4eMCroip5RuSBNResKE5MniowCc1OXywtn5+ujGKb9lEDOm+ih3gk4j/Rsz3cxPY0a+x6pVHSEawjDmplu/LTnrbun9anuFhKXY4gpCsKNXE3h9ZMmlCdkVeJEPokVralNRgtUSIZ8NrF0aAGslKiRQly/lvekTACjKy3RkwFQiJLZmzY0QGCrRGeLG2tP8pFhhUxNcFKtiOYy9rME9Gg+fkJB/BFEQJBuWPd4AJSQmTY7Sc9+9g/DswK8XqWDHuiS9giBh59NHRgIUQNftB1CLS9Kqwpk+xp9V37ml1kZikXpdMtVQYiwX/vBw5UQmYGYrsMvhwhKQu63/NBFlaAhDSVrayizWY0p+kLrNVMYVbIQcrhQq1HHh8mg=
Content-Type: text/plain; charset="utf-8"
Content-ID: <293781CE8DEB4E4B90FD2799D872605D@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 4f2646b2-bfa7-47f8-446a-08d6ffd26063
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2019 16:20:34.2808 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB2962
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.27, xch-rcd-017.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/RI451tQlXd1cXtfuk28JgNN0pmQ>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2019 16:35:47 -0000

SGVsbG8sIEdyZWcsDQoNCkJlZm9yZSB5b3UgYXNrZWQgYWJvdXQgUkZDIDU4ODQsIG5vdyBSRkMg
NTg4NSwgbmVpdGhlciBvZiB3aGljaCBhcmUgcmVmZXJlbmNlcyBpbiBkcmFmdC1pZXRmLWJmZC12
eGxhbi0wNy4gWW91ciBuZXcgcmVxdWVzdCBpczoNCg0KPiBJIGhvcGUgdGhhdCB5b3UgY2FuIGhl
bHAgbWUgdG8gYW5zd2VyIGEgcXVlc3Rpb24gcmVsYXRlZCB0byB0aGUgc2NvcGUgb2YgUkZDIDU4
ODUuDQoNCkFza2luZyBhYm91dCBSRkMgNTg4NSwgcHVibGlzaGVkIDkgeWVhcnMgYWdvLCBpcyBh
bm90aGVyIGRpc3RyYWN0aW9uIGZyb20gdGhlIHF1ZXN0aW9uIGF0IGhhbmQuIEl0IHNlZW1zIGxp
a2UgYSB0aGlyZC1vcmRlciByZWQtaGVycmluZywgaGFzdHkgZ2VuZXJhbGl6YXRpb24sIG9yIGEg
4oCceW91IGFsc2/igJ0gaWYgeW91IGFyZSBjaXRpbmcgUkZDcyBJIGNvLWF1dGhvcmVkLg0KDQpP
bmNlIGFnYWluLCBpbiBteSBvcGluaW9uLCB0aGlzIGRvZXMgbm90IGdldCB5b3UgY2xvc2VyIHRv
IGltcHJvdmluZyBvciBmdXJ0aGVyaW5nIGRyYWZ0LWlldGYtYmZkLXZ4bGFuLTA3LCB3aGljaCBz
aG91bGQgYmUgdGhlIGNvbW1vbiBnb2FsIG9uIHRoaXMgdGhyZWFkLg0KDQpBcyBhIHJlZnJlc2hl
ciwgdGhpcyB3YXMgbXkgaW5pdGlhbCBxdWVzdGlvbjoNCg0KPiA+Pj4gPiA0LiBTZWN0aW9uIDcg
c2F5cyB0aGF0IOKAnCBTdXBwb3J0IGZvciBlY2hvIEJGRCBpcyBvdXRzaWRlIHRoZSBzY29wZSBv
ZiB0aGlzIGRvY3VtZW504oCdLiANCj4gPj4+ID4gDQo+ID4+PiA+IEFzc3VtaW5nIHRoaXMgbWVh
bnMg4oCcQkZEIEVjaG8gbW9kZeKAnSwgd2h5IGlzIHRoaXMgb3V0IG9mIHNjb3BlPw0KDQoNCkkg
YW0gcmVhbGx5IGludGVyZXN0ZWQgaW4gdW5kZXJzdGFuZGluZyB3aGF0IHRoZSByZWFzb24ocykg
aXMgKGFyZSkgZm9yIG91dC1zY29waW5nIEJGRCBFY2hvLiBJcyBpdCBiZWNhdXNlIG9mIHRlY2hu
aWNhbCBsaW1pdGF0aW9ucz8gTGFjayBvZiBtYXJrZXQgZGVtYW5kPyBMYWNrIG9mIHRpbWUgdG8g
a25vdyB0aGUgYW5zd2VyIHRvIHRoaXMgcXVlc3Rpb24/DQoNCkkgYW0gbm90IGFza2luZyBmb3Ig
YW55IGNoYW5nZSwganVzdCBhIHF1ZXN0aW9uIG9mIHdoZXRoZXIgdGhlIGF1dGhvcnMgYW5kIFdH
IGNvbnNpZGVyaW5nIHRoZSBST0kgb2YgYWRkaW5nIEJGRCBFY2hvLg0KDQpCZXN0LA0KDQpDYXJs
b3MuDQoNCg0KPiBPbiBKdW4gMjYsIDIwMTksIGF0IDk6MjIgUE0sIEdyZWcgTWlyc2t5IDxncmVn
aW1pcnNreUBnbWFpbC5jb20+IHdyb3RlOg0KPiANCj4gSGVsbG8gQ2FybG9zLA0KPiBJIGhvcGUg
dGhhdCB5b3UgY2FuIGhlbHAgbWUgdG8gYW5zd2VyIGEgcXVlc3Rpb24gcmVsYXRlZCB0byB0aGUg
c2NvcGUgb2YgUkZDIDU4ODUuIEluIFJGQyA1ODg1IGlzIHN0YXRlZDoNCj4gICAgVGhpcyBzcGVj
aWZpY2F0aW9uIGRlc2NyaWJlcyBwcm9jZWR1cmVzIG9ubHkgZm9yIEJGRCBhc3luY2hyb25vdXMg
bW9kZS4NCj4gTmVpdGhlciBkZW1hbmQgbW9kZSwgbm9yIEVjaG8gZnVuY3Rpb24gb2YgQkZEIGlz
IGV4cGxpY2l0bHkgbWVudGlvbmVkIGluIFJGQyA1ODg1LiBIZW5jZSBteSBxdWVzdGlvbiBJZiBC
RkQgb3ZlciBWWExBTiBjaGFuZ2VzIGZyb20gZXhwbGljaXRseSBleGNsdWRpbmcgdGhlIEVjaG8g
ZnVuY3Rpb24gZnJvbSB0aGUgc2NvcGUgb2YgdGhlIGRvY3VtZW50IHRvIHRoZSBkZWZpbml0aW9u
IG9mIHRoZSBzY29wZSBsaWtlIHVzZWQgaW4gUkZDIDU4ODUsIHdvdWxkIHRoYXQgYWRkcmVzcyB5
b3VyIGNvbmNlcm4/DQo+IA0KPiBSZWdhcmRzLA0KPiBHcmVnDQo+IA0KPiBPbiBGcmksIEp1biAy
MSwgMjAxOSBhdCA1OjE5IFBNIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSA8Y3BpZ25hdGFA
Y2lzY28uY29tPiB3cm90ZToNCj4gSGVsbG8sIEdyZWcsDQo+IA0KPiBUaGFuayB5b3UgZm9yIGhh
dmluZyBzcGxpdCB0aGlzIHRocmVhZC4gSeKAmWxsIG5vdGUgZm9yIGVhc2Ugb2YgdHJhY2tpbmcg
dGhhdCB0aGlzIHNwZWNpZmljIGlzc3VlIGlzIGlzc3VlICM0IG91ciBvZiB0aGUgc2l4IHF1aWNr
IGNvbW1lbnRzIEkgc2VudC4NCj4gDQo+IE5vdywgcXVlc3Rpb25zIHlvdSBhc2sgbGlrZSB0aGlz
IG9uZSBxdW90ZWQgZnJvbSBiZWxvdzoNCj4gPiBXb3VsZCB5b3Ugc3VnZ2VzdCB0aGF0IHRoZSBz
Y29wZSBvZiBSRkMgNTg4NCBtdXN0IGluY2x1ZGUgdGhlIEJGRCBFY2hvIGZ1bmN0aW9uPw0KPiAN
Cj4gDQo+IEFyZSBub3cgc2Vjb25kLW9yZGVyIHJlZCBoZXJyaW5ncyBhbmQsIG9uY2UgYWdhaW4s
IG5vdCByZWxldmFudCB0byB0aGUgaXNzdWUg4oCUIGluc3RlYWQgdGhleSBhdm9pZCByZXNwb25k
aW5nIGFuZCBwcmV2ZW50IGNvbnZlcmdlbmNlLiBJbiBteSBjb21tZW50LCBJ4oCZbSBqdXN0IGFz
a2luZyBmb3IgYSB0ZWNobmljYWwgZXhwbGFuYXRpb24gb2Ygd2h5IEJGRCBFY2hvIGlzIG91dCBv
ZiBzY29wZS4NCj4gDQo+IA0KPiBQbGVhc2Ugc2VlIGlubGluZSwgeW91ciByZXNwb25zZSBpcyBp
bmNvcnJlY3QgaW4gMyB0ZWNobmljYWwgYXJlYXMgdGhhdCBJIGVudW1lcmF0ZS4NCj4gDQo+IA0K
PiA+IE9uIEp1biAyMCwgMjAxOSwgYXQgMTozMCBBTSwgR3JlZyBNaXJza3kgPGdyZWdpbWlyc2t5
QGdtYWlsLmNvbT4gd3JvdGU6DQo+ID4gDQo+ID4gSGkgQ2FybG9zLA0KPiA+IHRoYW5rIHlvdSBm
b3IgY2xhcmlmeWluZyB5b3VyIG9waW5pb24gb24gdGhlIGFwcGxpY2FiaWxpdHkgb2YgdGhlIEJG
RCBFY2hvIG1vZGUuDQo+IA0KPiBGb3IgY29ycmVjdG5lc3MsIEkgaGF2ZSBub3QgaXNzdWVkIGFu
ICJvcGluaW9uIG9uIHRoZSBhcHBsaWNhYmlsaXR5IG9mIHRoZSBCRkQgRWNobyBtb2RlLuKAnSAo
QWdhaW4sIHBsZWFzZSBkbyBub3QgbWlzY2hhcmFjdGVyaXplISkgDQo+IA0KPiBNeSBpbml0aWFs
IHF1ZXN0aW9uIHdhcyDigJx3aHkgaXMgdGhpcyBvdXQgb2Ygc2NvcGU/4oCdIEkgYmVsaWV2ZSBz
Y29waW5nIHNob3VsZCBiZSBkZWxpYmVyYXRlIGFuZCBpbnRlbnRpb25hbCwgYW5kIGhlbmNlIHNl
ZWtpbmcgdG8gdW5kZXJzdGFuZC4NCj4gDQo+IA0KPiA+IEkndmUgc3BsaXQgdGhpcyB0aHJlYWQg
dG8gaGVscCB1cyBhbmQgb3RoZXJzIHRvIGZvbGxvdyB0aGUgZGlzY3Vzc2lvbiBvbiB0aGlzIHBh
cnRpY3VsYXIgaXNzdWUuIEknbGwgbm90ZSB0aGF0IFJGQyA1ODgwIGRvZXMgbm90IHByb2hpYml0
IHRoZSByZW1vdGUgc3lzdGVtIHRvIHBlcmZvcm0gYW55IGtpbmQgb2YgcHJvY2Vzc2luZyBvbiB0
aGUgcGFja2V0IHJlY2VpdmVkIGluIHRoZSBCRkQgRWNobyBtb2RlLg0KPiANCj4gVGhpcyBpcyB0
ZWNobmljYWwgbWlzdGFrZSAjMS4gDQo+IA0KPiBSRkMgNTg4MCBzYXlzOg0KPiANCj4gICAgVGhl
IEVjaG8gZnVuY3Rpb24gaGFzIHRoZSBhZHZhbnRhZ2Ugb2YgdHJ1bHkgdGVzdGluZyBvbmx5IHRo
ZQ0KPiAgICBmb3J3YXJkaW5nIHBhdGggb24gdGhlIHJlbW90ZSBzeXN0ZW0uIA0KPiANCj4gDQo+
IE5vIG90aGVyIHByb2Nlc3Npbmcgb24gdGhlIHJlbW90ZSBzeXN0ZW0g4oCUIHRoYXQgaXMgdGhl
IGJlbmVmaXQgb2YgRWNoby4NCj4gDQo+IA0KPiA+IEV2ZW4gbW9yZSwgU2VjdGlvbiA2LjguOCBl
eHBsaWNpdGx5IHBvaW50cyBvdXQgdGhhdCBhIHJlY2VpdmVkIEVjaG8gcGFja2V0IGlzIGxpa2Vs
eSB0byBiZSBwcm9jZXNzZWQ6DQo+ID4gICAgQSBtZWFucyBvZiBkZXRlY3RpbmcgbWlzc2luZyBF
Y2hvIHBhY2tldHMNCj4gPiAgICBNVVNUIGJlIGltcGxlbWVudGVkLCB3aGljaCBtb3N0IGxpa2Vs
eSBpbnZvbHZlcyBwcm9jZXNzaW5nIG9mIHRoZQ0KPiA+ICAgIEVjaG8gcGFja2V0cyB0aGF0IGFy
ZSByZWNlaXZlZC4gIFRoZSBwcm9jZXNzaW5nIG9mIHJlY2VpdmVkIEVjaG8NCj4gPiAgICBwYWNr
ZXRzIGlzIG90aGVyd2lzZSBvdXRzaWRlIHRoZSBzY29wZSBvZiB0aGlzIHNwZWNpZmljYXRpb24u
DQo+IA0KPiANCj4gVGhpcyBpcyB0ZWNobmljYWwgbWlzdGFrZSAjMi4NCj4gDQo+IFdoYXQgeW91
IGFyZSBxdW90aW5nIGlzIHJlZmVycmluZyB0byB0aGUgcmVjZXB0aW9uIG9mIEVjaG8gcGFja2V0
IGJ5IHRoZSBFY2hvIHBhY2tldCAqc2VuZGVyKi4gVGhhdCBpcywgdGhlIGxvY2FsIHN5c3RlbSwg
bm90IHRoZSByZW1vdGUgc3lzdGVtLiBUaGUgRWNobyBwYWNrZXQgaXMgcmVjZWl2ZWQgYnkgdGhl
IHNhbWUgc3lzdGVtIHRoYXQgc2VudCBpdCAoYnkgZGVmaW5pdGlvbiBvZiBFY2hvISksIGFuZCB0
aHVzIHRoZSBub2RlIGl0c2VsZiBuZWVkcyB0byBkZW11bHRpcGxleCBpdHMgb3duIGNvbnRleHQu
Li4NCj4gDQo+IA0KPiA+IFRodXMsIGludGVyb3BlcmFiaWxpdHkgaXMgb25lIG9mIHRoZSB1bmRl
cnNwZWNpZmllZCBpc3N1ZXMgZm9yIEJGRCBFY2hvLg0KPiANCj4gTm8uIFRoaXMgaXMgdGVjaG5p
Y2FsIG1pc3Rha2UgIzJiLg0KPiANCj4gVGhlcmUgaXMgbm8gaW50ZXJvcGVyYWJpbGl0eSBzcGVj
IGNvbnNpZGVyYXRpb25zIGJldHdlZW4gYSBzeXN0ZW0gYW5kIGl0c2VsZiAodW5sZXNzIHRoZSBz
ZW5kZXIgb2YgQkZEIEVjaG8gaGFzIHNwbGl0IHBlcnNvbmFsaXR5IDotKQ0KPiANCj4gDQo+IA0K
PiA+IFNlY29uZGx5LCB0aGUgRWNobyBCRkQgbW9kZSBoYXMgYmVlbiBleGNsdWRlZCBmcm9tIHRo
ZSBzY29wZSBvZiBSRkMgNTg4NDoNCj4gPiBGdXJ0aGVyLCB0aGUgdXNlIG9mIHRoZSBFY2hvIGZ1
bmN0aW9uIGlzIG91dHNpZGUgdGhlIHNjb3BlIG9mIHRoaXMgc3BlY2lmaWNhdGlvbi4NCj4gDQo+
IFRoaXMgaXMgdGVjaG5pY2FsIG1pc3Rha2UgIzMuDQo+IA0KPiBJdCBpcyByZWFsbHkgaXJyZWxl
dmFudCB0byB0aGUgcXVlc3Rpb24gd2hldGhlciBSRkMgNTg4NCwgd2hpY2ggdGFsa3MgYWJvdXQg
QkZEIGZvciB1bmlkaXJlY3Rpb25hbCBNUExTIExTUHMsIHNjb3BlcyBvdXQgQkZEIEVjaG8uDQo+
IA0KPiBBcyBJIG1lbnRpb25lZCBpbiBteSBpbml0aWFsIGVtYWlsLCAiSWYgdGhpcyBpcyBhIHNp
bmdsZSBsb2dpY2FsIGhvcCB1bmRlcm5lYXRoIFZYTEFOLCB3aGF04oCZcyBwcmV2ZW50aW5nIHRo
ZSB1c2Ugb2YgRWNobz/igJ0gUkZDIDU4ODQgaXMgZGlmZmVyZW50IHRoYW4gKGFuZCBub3QgdXNl
ZnVsIGZvciBvciByZWxldmFudCB0bykgdGhlIHNjZW5hcmlvIGluIGRyYWZ0LWlldGYtYmZkLXZ4
bGFuLg0KPiANCj4gDQo+IA0KPiA+IFdvdWxkIHlvdSBzdWdnZXN0IHRoYXQgdGhlIHNjb3BlIG9m
IFJGQyA1ODg0IG11c3QgaW5jbHVkZSB0aGUgQkZEIEVjaG8gZnVuY3Rpb24/DQo+IA0KPiANCj4g
SSBkbyBub3QgdW5kZXJzdGFuZCB0aGUgY29udGV4dCBvZiB0aGlzIHF1ZXN0aW9uLiBCdXQgYXMg
SSBtZW50aW9uZWQsIHRoZXNlIHF1ZXN0aW9ucyB0YWtlIHRoZSB0aHJlYWQgaW4gYSBkaXJlY3Rp
b24gdGhhdCBkaXZlcmdlcyBmcm9tIHJlc29sdXRpb24uDQo+IA0KPiBJIGhhdmUgbm90IHN1Z2dl
c3RlZCB0aGF0IGFueSBkb2N1bWVudCBpbmNsdWRlcyBhbnl0aGluZy4gTXkgY29tbWVudCBpczog
d2hhdCBpcyB0aGUgcmVhc29uIHdoeSBCRkQgRWNobyBpcyBvdXQgb2Ygc2NvcGU/IFRlY2huaWNh
bGx5LCB0aGlzIGlzIGEgc2luZ2xlIGhvcCBhdCB0aGUgVlhMQU4gbGV2ZWwgZm9yIEJGRC4NCj4g
DQo+IA0KPiBCZXN0LA0KPiANCj4gQ2FybG9zLg0KPiANCj4gPiANCj4gPiBSZWdhcmRzLA0KPiA+
IEdyZWcNCj4gPiANCj4gPiBPbiBUaHUsIEp1biAyMCwgMjAxOSBhdCAyOjA4IFBNIENhcmxvcyBQ
aWduYXRhcm8gKGNwaWduYXRhKSA8Y3BpZ25hdGFAY2lzY28uY29tPiB3cm90ZToNCj4gPiBIZWxs
bywgR3JlZywNCj4gPiANCj4gPiBZZXMsIGhhcHB5IHRvbyBhbnN3ZXIgeW91ciBxdWVzdGlvbi4N
Cj4gPiANCj4gPiBGaXJzdCwgaG93ZXZlciwgbGV0IG1lIG1ha2UgdHdvIHF1aWNrIG9ic2VydmF0
aW9ucyBvbiB0aGUgZXhjaGFuZ2U6DQo+ID4gICAgICAg4oCiIFlvdSBzZWVtIHRvIGJlIHBpY2tp
bmcgdmVyeSBzcGVjaWZpYyBmcmFnbWVudHMgb3Igc3ViLXRvcGljcyBmcm9tIG15IGNvbW1lbnRz
LCBhbmQgZm9sbG93aW5nIHVwIG9uIHRob3NlIG9ubHkuDQo+ID4gICAgICAg4oCiIEnigJltIGhh
cHB5IHRvIGNvbnRpbnVlIGFuc3dlcmluZyB0aGVzZSBxdWVzdGlvbnMsIGJ1dCB0aGV5IGFyZSBv
cnRob2dvbmFsIHRvIChhbmQgY29uc2VxdWVudGx5IGEgZGlzdHJhY3Rpb24gZnJvbSkgdGhlIGlu
aXRpYWwgY29tbWVudHMgSSByYWlzZWQuDQo+ID4gDQo+ID4gTm93LCB5b3VyIHF1ZXN0aW9uOiB0
aGUgQkZEIEVjaG8gcGFja2V0IGZvcm1hdCBpcyBnZW5lcmljYWxseSBzcGVj4oCZZWQgYW5kIGRl
ZmluZWQgaW4gU2VjdGlvbiA1IG9mIFJGQyA1ODgwOg0KPiA+IGh0dHBzOi8vdG9vbHMuaWV0Zi5v
cmcvaHRtbC9yZmM1ODgwI3NlY3Rpb24tNQ0KPiA+IA0KPiA+IFRoZSBtb3N0IHJlbGV2YW50IHBh
cnQgaXMgdGhpczoNCj4gPiANCj4gPiAgICBUaGUgcGF5bG9hZCBvZiBhIEJGRCBFY2hvIHBhY2tl
dCBpcyBhIGxvY2FsIG1hdHRlciwgc2luY2Ugb25seSB0aGUNCj4gPiAgICBzZW5kaW5nIHN5c3Rl
bSBldmVyIHByb2Nlc3NlcyB0aGUgY29udGVudC4gIFRoZSBvbmx5IHJlcXVpcmVtZW50IGlzDQo+
ID4gICAgdGhhdCBzdWZmaWNpZW50IGluZm9ybWF0aW9uIGlzIGluY2x1ZGVkIHRvIGRlbXVsdGlw
bGV4IHRoZSByZWNlaXZlZA0KPiA+ICAgIHBhY2tldCB0byB0aGUgY29ycmVjdCBCRkQgc2Vzc2lv
biBhZnRlciBpdCBpcyBsb29wZWQgYmFjayB0byB0aGUNCj4gPiAgICBzZW5kZXIuIA0KPiA+IA0K
PiA+IFNpbmNlIHRoZSByZW1vdGUgc3lzdGVtIGRvZXMgbm90IHByb2Nlc3MgdGhlIGVjaG8gcGFj
a2V0IGNvbnRlbnQsIGl0IGlzIGEgbG9jYWwgbWF0dGVyIG9ubHkuIEFuZCBnaXZlbiB0aGUgZmFj
dCB0aGF0LCBhcyBzdWNoLCB0aGVyZSBpcyBubyBpbnRlcm9wZXJhYmlsaXR5IGltcGxpY2F0aW9u
cywgdGhlcmUgaXMgbm8gbmVlZCB0byBvdmVyLXNwZWNpZnkgdGhlIHBhY2tldCBmb3JtYXQuIFRo
ZSBvbmx5IHJlcXVpcmVtZW50IGlzIHRoYXQgdGhlIHNlbmRpbmcgc3lzdGVtIG5lZWRzIHRvIGJl
IGFibGUgdG8gbWFwIGl0IHRvIGEgc2Vzc2lvbiB3aGVuIGl0IGJvb21lcmFuZ3MgYmFjay4NCj4g
PiANCj4gPiBObywgaXQgaXMgZ2VuZXJhbGx5IG5vdCAoaS5lLiwgZG9lcyBub3QgbmVlZCB0byBi
ZSwgYnV0IHRoZXJl4oCZcyBmcmVlZG9tIHRvIHBvdGVudGlhbGx5IGJlKSBhIEJGRCBjb250cm9s
IHBhY2tldC4gDQo+ID4gWWVzLCBpdCBjYW4gYmUgc29tZXRoaW5nIGVsc2UuDQo+ID4gDQo+ID4g
VGhhdCBzYWlkLCB0aGUgcGFja2V0IGZvcm1hdCBmb3IgQkZEIEVjaG8gaGFzLCB0byBteSBhbmFs
eXNpcyBhbmQgdW5kZXJzdGFuZGluZywgbm8gcmVsZXZhbmN5IG9uIHRoZSBxdWVzdGlvbnMgYmVs
b3cuDQo+ID4gDQo+ID4gQmVzdCwNCj4gPiANCj4gPiBDYXJsb3MuDQo+ID4gDQo+ID4+IE9uIEp1
biAyMCwgMjAxOSwgYXQgMTI6NTAgQU0sIEdyZWcgTWlyc2t5IDxncmVnaW1pcnNreUBnbWFpbC5j
b20+IHdyb3RlOg0KPiA+PiANCj4gPj4gSGVsbG8gQ2FybG9zLA0KPiA+PiBjb3VsZCB5b3UgcGxl
YXNlIHJlZmVyIG1lIHRvIHRoZSBzcGVjaWZpY2F0aW9uIG9mIEJGRCB0aGF0IGRlZmluZXMgdGhl
IG1lc3NhZ2UgZm9ybWF0IHRoYXQgaXMgdXNlZCBpbiB0aGUgRWNobyBtb2RlIG9mIEJGRC4gSXMg
aXQgdGhlIEJGRCBjb250cm9sIHBhY2tldD8gU29tZXRoaW5nIGVsc2U/DQo+ID4+IA0KPiA+PiBS
ZWdhcmRzLA0KPiA+PiBHcmVnDQo+ID4+IA0KPiA+PiANCj4gPj4gT24gVGh1LCBKdW4gMjAsIDIw
MTkgYXQgMTE6MDkgQU0gQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpIDxjcGlnbmF0YUBjaXNj
by5jb20+IHdyb3RlOg0KPiA+PiBIZWxsbywgR3JlZywNCj4gPj4gDQo+ID4+IFBsZWFzZSBzZWUg
aW5saW5lLg0KPiA+PiANCj4gPj4+IE9uIEp1biAxOSwgMjAxOSwgYXQgOTo1OCBQTSwgR3JlZyBN
aXJza3kgPGdyZWdpbWlyc2t5QGdtYWlsLmNvbT4gd3JvdGU6DQo+ID4+PiANCj4gPj4+IEhlbGxv
IENhcmxvcywNCj4gPj4+IHRoYW5rIHlvdSBmb3IgdGhlIGV4cGVkaWVudCBjbGFyaWZpY2F0aW9u
Lg0KPiA+Pj4gVG8geW91ciBxdWVzdGlvbnMgb24gZGVtdWx0aXBsZXhpbmcgQkZEIGNvbnRyb2wg
cGFja2V0cyB3aXRoIHRoZSB6ZXJvIHZhbHVlIG9mIHRoZSBZb3VyIERpc2NyaW1pbmF0b3IgZmll
bGQ6DQo+ID4+PiAgICAg4oCiIG9ubHkgQkZEIGNvbnRyb2wgcGFja2V0cyB3aXRoIHRoZSB6ZXJv
IHZhbHVlIG9mIHRoZSBZb3VyIERpc2NyaW1pbmF0b3IgZmllbGQgYXJlIGRlbXVsdGlwbGV4ZWQg
dXNpbmcgdGhlIGluZm9ybWF0aW9uIG9mIHRoZSBpbm5lciBJUCBoZWFkZXIuIEkgYmVsaWV2ZSB0
aGF0IHRoZSB0ZXh0IGlzIGNsZWFyIGFuZCByZXF1aXJlcyB0aGF0IGFsbCBmaWVsZHMgb2YgdGhl
IGlubmVyIElQIGhlYWRlciBtdXN0IGJlIHVzZWQgdG8gZGVtdWx0aXBsZXggYSByZWNlaXZlZCBC
RkQgY29udHJvbCBwYWNrZXQgd2l0aCB0aGUgemVybyB2YWx1ZSBpbiB0aGUgWW91ciBEaXNjcmlt
aW5hdG9yIGZpZWxkLiBXaGljaCBvZiB0aGUgZmllbGRzIGFuIGltcGxlbWVudGF0aW9uIHVzZXMg
dG8gY3JlYXRlIG11bHRpcGxlIEJGRCBzZXNzaW9ucyBiZXR3ZWVuIHRoZSBwYWlyIG9mIFZURVBz
IGlzIGltcGxlbWVudGF0aW9uIHNwZWNpZmljLg0KPiA+PiBUaGlzIHRleHQgaXMgcmVwZWF0aW5n
IHdhcyBpcyBpbiB0aGUgZHJhZnQsIGJ1dCBkb2VzIG5vdCBhbnN3ZXIgYW55IG9mIG15IHF1ZXN0
aW9ucy4NCj4gPj4gDQo+ID4+IEZvciBleGFtcGxlOg0KPiA+PiAxLiAidGhhdCBhbGwgZmllbGRz
IG9mIHRoZSBpbm5lciBJUCBoZWFkZXIgbXVzdCBiZSB1c2VkIHRvIGRlbXVsdGlwbGV4IGEgcmVj
ZWl2ZWQgQkZEIGNvbnRyb2wgcGFja2V04oCdDQo+ID4+ICAgICAtPiBUaGUgdGV4dCBkb2VzIG5v
dCBzYXkg4oCcYWxsIGZpZWxkc+KAnSwgYnV0IHJlZ2FyZGxlc3MsIGRvIHlvdSBtZWFuIHRoZSBE
U0NQIGFuZCB0aGUgRXZpbCBCaXQ/IElQdjYgRmxvdyBMYWJlbD8gSG93ICpleGFjdGx5Kj8NCj4g
Pj4gMi4gSG93IGlzIHRoZSBtYXBwaW5nIG9mIElQIChub3QgVURQPykgZmllbGRzIHRvIEJGRCBz
ZXNzaW9uIGRvbmU/DQo+ID4+IDMuIEhvdyBpcyB0aGlzIHN0YXRlIGNyZWF0ZWQgYW5kIG1haW50
YWluZWQ/IA0KPiA+PiA0LiBTaW5jZSB0aGlzIGlzIGEgc2V0IG9mIGZpZWxkcyBvbiB3aGljaCB0
d28gc3lzdGVtcyBuZWVkIHRvIGFncmVlICh3aGljaCBmaWVsZHMgZnJvbSB0aGUgaW5uZXIgSVAv
VURQIGFyZSBtYXBwZWQgbmVlZHMgdG8gYmUgdW5kZXJzdG9vZCBieSBib3RoIHN5c3RlbXMpLCBp
dCBjYW5ub3QgYmUg4oCcaW1wbGVtZW50YXRpb24gc3BlY2lmaWPigJ0uIEZ1cnRoZXIsIHRoZSB0
ZXh0IGRvZXMgbm90IHNheSBzby4NCj4gPj4gDQo+ID4+PiBUbyB5b3VyIHBvaW50IG9uIHRoZSBs
ZXZlbCBFY2hvIG1vZGUgb2YgQkZEIGlzIHNwZWNpZmllZCBpbiBSRkMgNTg4MCBJJ2xsIHF1b3Rl
IHRoZSBvcGluaW9uIG9mIEplZmZyZXkgSGFhcyBmcm9tIHRoZSBkaXNjdXNzaW9uIG9mIGNvbW1l
bnRzIGZyb20gU2hhd24gRW1lcnkgb24gYmVoYWxmIG9mIHRoZSBTZWNEaXIuIFNoYXduIGhhZCBj
b21tZW50ZWQ6DQo+ID4+PiBFY2hvIEJGRCBpcyBvdXQgb2Ygc2NvcGUgZm9yIHRoZSBkb2N1bWVu
dCwgYnV0IGRvZXMgbm90IGRlc2NyaWJlIHRoZSByZWFzb24gZm9yIHRoaXMgb3Igd2h5IHN0YXRl
DQo+ID4+PiB0aGlzIGF0IGFsbD8NCj4gPj4+IEkndmUgcmVzcG9uZGVkOg0KPiA+Pj4gR0lNPj4g
SSB0aGluayB0aGF0IHRoZSBtYWluIHJlYXNvbiBpcyB0aGF0IHRoZSBCRkQgRWNobyBtb2RlIGlz
IHVuZGVyc3BlY2lmaWVkLiBSRkMgNTg4MCBkZWZpbmVkIHNvbWUgb2YgdGhlIG1lY2hhbmlzbXMg
cmVsYXRlZCB0byB0aGUgRWNobyBtb2RlLCBidXQgbW9yZSBzdGFuZGFyZGl6YXRpb24gd29yayBt
YXkgYmUgcmVxdWlyZWQuICANCj4gPj4+IEFuZCBKZWZmcmV5IEhhYXMgaGFkIGFkZGVkOg0KPiA+
Pj4gU3BlYWtpbmcgYXMgYSBCRkQgY2hhaXIsIHRoaXMgaXMgdGhlIHJlbGV2YW50IG9ic2VydmF0
aW9uLiAgQkZEIEVjaG8gaXMNCj4gPj4+IHVuZGVyc3BlY2lmaWVkIHRvIHRoZSBwb2ludCB3aGVy
ZSBjbGFpbWluZyBjb21wbGlhbmNlIGlzIGRpZmZpY3VsdCBhdCBiZXN0Lg0KPiA+Pj4gSW4gZ2Vu
ZXJhbCwgaXQgcmVsaWVzIG9uIHNpbmdsZS1ob3AgYW5kIHRoZSBhYmlsaXR5IHRvIGhhdmUgdGhl
IHJlbW90ZSBFY2hvDQo+ID4+PiBjbGllbnQgbG9vcCB0aGUgcGFja2V0cy4gDQo+ID4+IA0KPiA+
PiBCRkQgRWNobyBjYW5ub3QgYmUgc3BlY2lmaWVkIGluIFJGQyA1ODgwIGJhc2Ugc3BlYyBiZWNh
dXNlIGl0IGlzIGFwcGxpY2F0aW9uIHNwZWNpZmljLg0KPiA+PiANCj4gPj4+IA0KPiA+Pj4gVGhp
cyBwYWNrZXQgbG9vcCBtYXkgbm90IGJlIHByYWN0aWNhbCBmb3Igc2V2ZXJhbCBlbmNhcHN1bGF0
aW9ucyBhbmQgdGh1cyBpcw0KPiA+Pj4gb3V0IG9mIHNjb3BlIGZvciBzdWNoIGVuY2Fwc3VsYXRp
b25zLiAgV2hldGhlciB0aGlzIGlzIHByYWN0aWNhbCBmb3IgdnhsYW4NCj4gPj4+IHRvZGF5LCBv
ciBpbiB0aGUgcHJlc2VuY2Ugb2YgZnV0dXJlIGV4dGVuc2lvbnMgdG8gdnhsYW4gaXMgbGVmdCBv
dXQgb2Ygc2NvcGUNCj4gPj4+IGZvciB0aGUgY29yZSBwcm9wb3NhbC4gIA0KPiA+PiANCj4gPj4g
VGhlIHF1ZXN0aW9uIHJlbWFpbnM6IGZvciBWWExBTiBlbmNhcHN1bGF0aW9uLCB0aGlzIGlzIGxp
a2UgYSBzaW5nbGUgaG9wIGFzIGZhciBhcyBCRkQgaXMgY29uY2VybmVkIChzaW5nbGUgaG9wIFZY
TEFOIHR1bm5lbCkuDQo+ID4+IA0KPiA+PiBTaW5jZSBSRkMgNTg4MSBkZWZpbmVzIEVjaG8gZm9y
IHNpbmdsZSBob3AsIGNhbiB5b3UgcGxlYXNlIGVsYWJvcmF0ZSAoaW4gdGhlIGRvY3VtZW50KSB3
aHkgaXMgb3V0IG9mIHNjb3BlIG9yIGhvdyBpdCBjYW4gd29yaz8NCj4gPj4gDQo+ID4+IEJlc3Qs
DQo+ID4+IA0KPiA+PiBDYXJsb3MuDQo+ID4+IA0KPiA+Pj4gDQo+ID4+PiBXaWxsIHJlc3BvbmQg
dG8gb3RoZXIgcXVlc3Rpb25zIGluIGEgc2VwYXJhdGUgbWFpbC4NCj4gPj4+IA0KPiA+Pj4gUmVn
YXJkcywNCj4gPj4+IEdyZWcNCj4gPj4+IA0KPiA+Pj4gDQo+ID4+PiBPbiBUaHUsIEp1biAyMCwg
MjAxOSBhdCAxMDozMSBBTSBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgPGNwaWduYXRhQGNp
c2NvLmNvbT4gd3JvdGU6DQo+ID4+PiBIZWxsbywgR3JlZywNCj4gPj4+IA0KPiA+Pj4gPiBPbiBK
dW4gMTksIDIwMTksIGF0IDk6MDkgUE0sIEdyZWcgTWlyc2t5IDxncmVnaW1pcnNreUBnbWFpbC5j
b20+IHdyb3RlOg0KPiA+Pj4gPiANCj4gPj4+ID4gSGkgQ2FybG9zLA0KPiA+Pj4gPiB0aGFuayB5
b3UgZm9yIHJlbWluZGluZyBvZiBvdXIgY29udGludWVkIGRpc2N1c3Npb24gd2l0aCBKb2VsLiBX
ZSBhcmUgc2Vla2luZyBjb21tZW50cyBmcm9tIFZYTEFOIGV4cGVydHMgYW5kIG11Y2ggYXBwcmVj
aWF0ZSBpZiB5b3UgaGF2ZSBpbnNpZ2h0cyBvbiBWWExBTiB0byBzaGFyZS4NCj4gPj4+ID4gSSd2
ZSBnb3Qgc29tZSBjbGFyaWZ5aW5nIHF1ZXN0aW9ucyBiZWZvcmUgSSBjYW4gcmVzcG9uZCB0byB5
b3UuDQo+ID4+PiANCj4gPj4+IFN1cmUuDQo+ID4+PiANCj4gPj4+ID4gVG8gd2hpY2ggc3RhZ2Ug
b2YgdGhlIHRocmVlLXdheSBoYW5kc2hha2UgeW91IHJlZmVyIGFzICJpbml0aWFsIGRlbXVsdGlw
bGV4aW5nIj8gSSBjb3VsZG4ndCBmaW5kIHRoaXMgdGVybSBpbiBSRkMgNTg4MC4NCj4gPj4+IA0K
PiA+Pj4g4oCcSW5pdGlhbCBkZW11bHRpcGxleGluZyIgaXMgYSB3ZWxsLWtub3duIHRlcm0gaW4g
QkZELCByZWZlcnJpbmcgdG8gdGhlICJkZW11bHRpcGxleGluZyBvZiB0aGUgaW5pdGlhbCBwYWNr
ZXRzIiwgQkZEIENvbnRyb2wgcGFja2V0IHdpdGggWW91ckRpc2MgYmVpbmcgemVyby4NCj4gPj4+
IA0KPiA+Pj4gSW4gUkZDIDU4ODAsIHNlZSBTZWN0aW9uIDYuMy4NCj4gPj4+IGh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9yZmM1ODgwI3NlY3Rpb24tNi4zDQo+ID4+PiANCj4gPj4+ICAgIFRo
ZSBtZXRob2Qgb2YgZGVtdWx0aXBsZXhpbmcgdGhlIGluaXRpYWwgcGFja2V0cyAoaW4gd2hpY2gg
WW91cg0KPiA+Pj4gICAgRGlzY3JpbWluYXRvciBpcyB6ZXJvKSBpcyBhcHBsaWNhdGlvbiBkZXBl
bmRlbnQsIGFuZCBpcyB0aHVzIG91dHNpZGUNCj4gPj4+ICAgIHRoZSBzY29wZSBvZiB0aGlzIHNw
ZWNpZmljYXRpb24uDQo+ID4+PiANCj4gPj4+IFNpbmNlIGluaXRpYWwgZGVtdWx0aXBsZXhpbmcg
aXMgaW5kZWVkIGFwcGxpY2F0aW9uIHNwZWNpZmljLCBkaWZmZXJlbnQgZm9yIG9uZS1ob3AgdmVy
c3VzIG11bHRpLWhvcCBhbmQgZGVwZW5kZW50IHVwb24gd2hldGhlciBhIHNpbmdsZSBvciBtdWx0
aXBsZSBzZXNzaW9ucyBhcmUgYWxsb3dlZCBiZXR3ZWVuIGEgcGFpciBvZiBlbmRwb2ludHMsIEkg
YWRkZWQgYmVsb3cgdHdvIG90aGVyIHJlbGV2YW50IGNpdGF0aW9ucywgZnJvbSBhcHBsaWNhdGlv
biBzcGVjaWZpYyBCRkQgc3BlY3M6DQo+ID4+PiAxLiBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0
bWwvcmZjNTg4MyNzZWN0aW9uLTQgDQo+ID4+PiAyLiBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0
bWwvcmZjNTg4MiNzZWN0aW9uLTYNCj4gPj4+IA0KPiA+Pj4gDQo+ID4+PiA+IFJlZ2FyZGluZyB0
aGUgYXBwbGljYWJpbGl0eSBvZiB0aGUgRWNobyBtb2RlLCB0aGFuayB5b3UgZm9yIHBvaW50aW5n
IHRvIHRoZSBuZWVkIGZvciBzdHJpY3RlciB0ZXJtaW5vbG9neSwgdGhlIEVjaG8gbW9kZSwgYXMg
ZGVmaW5lZCBpbiBSRkMgNTg4MCwgaXMgdW5kZXJzcGVjaWZpZWQgYW5kIGl0IHdpbGwgcmVxdWly
ZSBhZGRpdGlvbmFsIHN0YW5kYXJkaXphdGlvbi4NCj4gPj4+IA0KPiA+Pj4gTm8uIEJGRCBFY2hv
IGlzIG5vdCB1bmRlcnNwZWNpZmllZCBpbiBSRkMgNTg4MC4NCj4gPj4+IA0KPiA+Pj4gUGxlYXNl
IHJlYWQgUzU6IGh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM1ODgwI3NlY3Rpb24tNQ0K
PiA+Pj4gDQo+ID4+PiAgICBCRkQgRWNobyBwYWNrZXRzIGFyZSBzZW50IGluIGFuIGVuY2Fwc3Vs
YXRpb24gYXBwcm9wcmlhdGUgdG8gdGhlDQo+ID4+PiAgICBlbnZpcm9ubWVudC4gIFNlZSB0aGUg
YXBwcm9wcmlhdGUgYXBwbGljYXRpb24gZG9jdW1lbnRzIGZvciB0aGUNCj4gPj4+ICAgIHNwZWNp
ZmljcyBvZiBwYXJ0aWN1bGFyIGVudmlyb25tZW50cy4NCj4gPj4+IA0KPiA+Pj4gDQo+ID4+PiBC
RkQgRWNobyBpcyBhcHBsaWNhdGlvbiBkZXBlbmRlbnQuIA0KPiA+Pj4gDQo+ID4+PiBUaGVyZWZv
cmUsIGZvciBleGFtcGxlLCBzaW5nbGUtaG9wIEJGRCBpbiBSRkMgNTg4MSBzcGVjaWZpZXMgQkZE
IEVjaG8gZm9yIHRoYXQgYXBwbGljYXRpb24uDQo+ID4+PiANCj4gPj4+IEhlbmNlLCBteSBxdWVz
dGlvbiBzdGFuZHM6IHdoeSBpcyB0aGlzIGRyYWZ0IGNsYWltaW5nIEJGRCBFY2hvIGlzIG91dCBv
ZiBzY29wZSBmb3IgdGhpcyBCRkQgYXBwbGljYXRpb24gZG9jdW1lbnQ/DQo+ID4+PiANCj4gPj4+
IA0KPiA+Pj4gPiBGdXR1cmUgZHJhZnRzIG1heSBleHBsb3JlIGFuZCBkZWZpbmUgaG93IHRoZSBF
Y2hvIG1vZGUgb2YgQkZEIGlzIHVzZWQgb3ZlciBWWExBTiB0dW5uZWxzLg0KPiA+Pj4gPiANCj4g
Pj4+IA0KPiA+Pj4gU2VlIGFib3ZlLg0KPiA+Pj4gDQo+ID4+PiA+IFdpbGwgcmV2aWV3IGFuZCBy
ZXNwb25kIHRvIHRoZSByZW1haW5pbmcgcXVlc3Rpb25zIHNvb24uDQo+ID4+PiANCj4gPj4+IFRo
YW5rIHlvdS4gDQo+ID4+PiANCj4gPj4+IFRoZSAicmVtYWluaW5nIHF1ZXN0aW9ucyIgYXJlIHN0
aWxsIGFsbCB0aGUgcXVlc3Rpb25zIGJlbG93IDotKQ0KPiA+Pj4gDQo+ID4+PiBCZXN0LA0KPiA+
Pj4gDQo+ID4+PiBDYXJsb3MuDQo+ID4+PiANCj4gPj4+ID4gDQo+ID4+PiA+IFJlZ2FyZHMsDQo+
ID4+PiA+IEdyZWcNCj4gPj4+ID4gDQo+ID4+PiA+IA0KPiA+Pj4gPiBPbiBUaHUsIEp1biAyMCwg
MjAxOSBhdCA5OjE0IEFNIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSA8Y3BpZ25hdGFAY2lz
Y28uY29tPiB3cm90ZToNCj4gPj4+ID4gSGksDQo+ID4+PiA+IA0KPiA+Pj4gPiBJIGhhdmUgbm90
IHJldmlld2VkIHRoaXMgZHJhZnQgYmVmb3JlLCBidXQgdHJpZ2dlcmVkIGJ5IHRoaXMgZW1haWws
IGFuZCBicmllZmx5IHNjYW5uaW5nIHRocm91Z2ggYSBjb3VwbGUgb2Ygc2VjdGlvbnMsIGl0IGlz
IHVuY2xlYXIgdG8gbWUgaG93IHNvbWUgb2YgdGhlIG1lY2hhbmljcyB3b3JrLg0KPiA+Pj4gPiAN
Cj4gPj4+ID4gVGhlcmUgYXJlIHNvbWUgbWFqb3IgaXNzdWVzIHdpdGggdGhlIE1hYyB1c2FnZSBh
bmQgYXNzb2NpYXRpb24sIGFzIEpvZWwgSGFscGVybiBtZW50aW9uZWQgaW4gaGlzIFJ0ZyBEaXIg
cmV2aWV3Lg0KPiA+Pj4gPiANCj4gPj4+ID4gQW5kLCBhZGRpdGlvbmFsbHksIHBsZWFzZSBjb25z
aWRlciB0aGUgZm9sbG93aW5nIGNvbW1lbnRzIGFuZCBxdWVzdGlvbnM6DQo+ID4+PiA+IA0KPiA+
Pj4gPiANCj4gPj4+ID4gMS4gVW5kZXJzcGVjaWZpY2F0aW9uIGZvciBpbml0aWFsaXphdGlvbiBh
bmQgaW5pdGlhbCBkZW11bHRpcGxleGluZy4NCj4gPj4+ID4gDQo+ID4+PiA+IFRoaXMgZG9jdW1l
bnQgYWxsb3dzIG11bHRpcGxlIEJGRCBzZXNzaW9ucyBiZXR3ZWVuIGEgc2luZ2xlIHBhaXIgb2Yg
VlRFUHM6DQo+ID4+PiA+IA0KPiA+Pj4gPiAgICBBbg0KPiA+Pj4gPiAgICBpbXBsZW1lbnRhdGlv
biB0aGF0IHN1cHBvcnRzIHRoaXMgc3BlY2lmaWNhdGlvbiBNVVNUIGJlIGFibGUgdG8NCj4gPj4+
ID4gICAgY29udHJvbCB0aGUgbnVtYmVyIG9mIEJGRCBzZXNzaW9ucyB0aGF0IGNhbiBiZSBjcmVh
dGVkIGJldHdlZW4gdGhlDQo+ID4+PiA+ICAgIHNhbWUgcGFpciBvZiBWVEVQcy4NCj4gPj4+ID4g
DQo+ID4+PiA+IFRoZSBpbXBsaWNhdGlvbiBvZiB0aGlzIGlzIHRoYXQgQkZEIHNpbmdsZS1ob3Ag
aW5pdGlhbGl6YXRpb24gcHJvY2VkdXJlcyB3aWxsIG5vdCB3b3JrLiBJbnN0ZWFkLCB0aGVyZSBp
cyBhIG5lZWQgdG8gbWFwIHRoZSBpbml0aWFsIGRlbXVsdGlwbGV4aW5nLg0KPiA+Pj4gPiANCj4g
Pj4+ID4gVGhpcyBpc3N1ZSBpcyBleHBsYWluZWQgaW4gUkZDcyA1ODgyIGFuZCA1ODgzOiBodHRw
czovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNTg4MyNzZWN0aW9uLTQgYW5kIGh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9yZmM1ODgyI3NlY3Rpb24tNg0KPiA+Pj4gPiANCj4gPj4+ID4gU2Vj
dGlvbiA1LjEgc2F5czoNCj4gPj4+ID4gDQo+ID4+PiA+ICAgIEZvciBzdWNoIHBhY2tldHMsIHRo
ZSBCRkQgc2Vzc2lvbiBNVVNUIGJlIGlkZW50aWZpZWQNCj4gPj4+ID4gICAgdXNpbmcgdGhlIGlu
bmVyIGhlYWRlcnMsIGkuZS4sIHRoZSBzb3VyY2UgSVAsIHRoZSBkZXN0aW5hdGlvbiBJUCwgYW5k
DQo+ID4+PiA+ICAgIHRoZSBzb3VyY2UgVURQIHBvcnQgbnVtYmVyIHByZXNlbnQgaW4gdGhlIElQ
IGhlYWRlciBjYXJyaWVkIGJ5IHRoZQ0KPiA+Pj4gPiAgICBwYXlsb2FkIG9mIHRoZSBWWExBTiBl
bmNhcHN1bGF0ZWQgcGFja2V0LiAgVGhlIFZOSSBvZiB0aGUgcGFja2V0DQo+ID4+PiA+ICAgIFNI
T1VMRCBiZSB1c2VkIHRvIGRlcml2ZSBpbnRlcmZhY2UtcmVsYXRlZCBpbmZvcm1hdGlvbiBmb3IN
Cj4gPj4+ID4gICAgZGVtdWx0aXBsZXhpbmcgdGhlIHBhY2tldC4NCj4gPj4+ID4gDQo+ID4+PiA+
IEJ1dCB0aGlzIGRvZXMgbm90IHJlYWxseSBleHBsYWluIGhvdyB0byBkbyB0aGUgaW5pdGlhbCBk
ZW11bHRpcGxleGluZy4gRG9lcyBlYWNoIEJGRCBzZXNzaW9uIG5lZWQgdG8gaGF2ZSBhIHNlcGFy
YXRlIGlubmVyIHNvdXJjZSBJUCBhZGRyZXNzPyBPciBzb3VyY2UgVURQIHBvcnQ/IEFuZCBob3cg
b2Z0ZXIgYXJlIHRoZXkgcmVjeWNsZWQgb3Iga2VwdCBhcyBzdGF0ZT8gSG93IGFyZSB0aGVzZSBt
YXBwZWQ/DQo+ID4+PiA+IEVxdWFsbHkgaW1wb3J0YW50bHksIHdoaWNoIHNpZGUgaXMgQWN0aXZl
Pw0KPiA+Pj4gPiBBbmQgd2hhdCBpZiB0aGVyZeKAmXMgYSByYWNlIGNvbmRpdGlvbiB3aXRoIGJv
dGggc2lkZXMgYmVpbmcgQWN0aXZlIGFuZCBzZXR0aW5nIHVwIHJlZHVuZGFudCBzZXNzaW9ucz8N
Cj4gPj4+ID4gDQo+ID4+PiA+IDEuYi4gQnkgdGhlIHdheSwgYmFzZWQgb24gdGhpcywgdXNpbmcg
Uy1CRkQgW1JGQyA3ODgwXSBtaWdodCBiZSBlYXNpZXIgdG8gZGVtdXguDQo+ID4+PiA+IA0KPiA+
Pj4gPiANCj4gPj4+ID4gMi4gU2VjdXJpdHkNCj4gPj4+ID4gDQo+ID4+PiA+IFRoaXMgZG9jdW1l
bnQgc2F5cyB0aGF0IHRoZSBUVEwgaW4gdGhlIGlubmVyIHBhY2tldCBjYXJyeWluZyBCRkQgaXMg
c2V0IHRvIDEuIEhvd2V2ZXIsIFJGQyA1ODgwIHNheXMgdG8gdXNlIEdUU00gW1JGQyA1MDgyXSwg
aS5lLiwgYSB2YWx1ZSBvZiAyNTUuLg0KPiA+Pj4gPiANCj4gPj4+ID4gV2h5IGlzIEdUU00gbm90
IHVzZWQgaGVyZT8NCj4gPj4+ID4gDQo+ID4+PiA+IA0KPiA+Pj4gPiAzLiBFQ01QIGFuZCBmYXRl
LXNoYXJpbmcgdW5kZXItc3BlY2lmaWNhdGlvbjoNCj4gPj4+ID4gDQo+ID4+PiA+IFNlY3Rpb24g
NC4xLiBzYXlzOg0KPiA+Pj4gPiANCj4gPj4+ID4gICAgVGhlIE91dGVyIElQL1VEUA0KPiA+Pj4g
PiAgICBhbmQgVlhMQU4gaGVhZGVycyBNVVNUIGJlIGVuY29kZWQgYnkgdGhlIHNlbmRlciBhcyBk
ZWZpbmVkIGluDQo+ID4+PiA+ICAgIFtSRkM3MzQ4XS4NCj4gPj4+ID4gDQo+ID4+PiA+IA0KPiA+
Pj4gPiBBbmQgUkZDIDczNDggc2F5czoNCj4gPj4+ID4gDQo+ID4+PiA+ICAgICAgIC0gIFNvdXJj
ZSBQb3J0OiAgSXQgaXMgcmVjb21tZW5kZWQgdGhhdCB0aGUgVURQIHNvdXJjZSBwb3J0IG51bWJl
cg0KPiA+Pj4gPiAgICAgICAgICBiZSBjYWxjdWxhdGVkIHVzaW5nIGEgaGFzaCBvZiBmaWVsZHMg
ZnJvbSB0aGUgaW5uZXIgcGFja2V0IC0tDQo+ID4+PiA+ICAgICAgICAgIG9uZSBleGFtcGxlIGJl
aW5nIGEgaGFzaCBvZiB0aGUgaW5uZXIgRXRoZXJuZXQgZnJhbWUncyBoZWFkZXJzLg0KPiA+Pj4g
PiAgICAgICAgICBUaGlzIGlzIHRvIGVuYWJsZSBhIGxldmVsIG9mIGVudHJvcHkgZm9yIHRoZSBF
Q01QL2xvYWQtDQo+ID4+PiA+ICAgICAgICAgIGJhbGFuY2luZyBvZiB0aGUgVk0tdG8tVk0gdHJh
ZmZpYyBhY3Jvc3MgdGhlIFZYTEFOIG92ZXJsYXkuDQo+ID4+PiA+ICAgICAgICAgIFdoZW4gY2Fs
Y3VsYXRpbmcgdGhlIFVEUCBzb3VyY2UgcG9ydCBudW1iZXIgaW4gdGhpcyBtYW5uZXIsIGl0DQo+
ID4+PiA+ICAgICAgICAgIGlzIFJFQ09NTUVOREVEIHRoYXQgdGhlIHZhbHVlIGJlIGluIHRoZSBk
eW5hbWljL3ByaXZhdGUgcG9ydA0KPiA+Pj4gPiAgICAgICAgICByYW5nZSA0OTE1Mi02NTUzNSBb
UkZDNjMzNV0uDQo+ID4+PiA+IA0KPiA+Pj4gPiANCj4gPj4+ID4gQmFzZWQgb24gdGhpcywgZGVw
ZW5kaW5nIG9uIHRoZSBoYXNoaW5nIGNhbGN1bGF0aW9uLCB0aGUgb3V0ZXIgc291cmNlIFVEUCBw
b3J0IGNhbiBiZSBkaWZmZXJlbnQgbGVhZGluZyB0byBkaWZmZXJlbnQgRUNNUCB0cmVhdG1lbnQu
IERvZXMgc29tZXRoaW5nIGVsc2UgbmVlZCB0byBiZSBzcGVjaWZpZWQgaGVyZSBpbiByZWdhcmRz
IHRvIHRoZSBvdXRlciBVRFAgc291cmNlIHBvcnQ/DQo+ID4+PiA+IA0KPiA+Pj4gPiANCj4gPj4+
ID4gNC4gU2VjdGlvbiA3IHNheXMgdGhhdCDigJwgU3VwcG9ydCBmb3IgZWNobyBCRkQgaXMgb3V0
c2lkZSB0aGUgc2NvcGUgb2YgdGhpcyBkb2N1bWVudOKAnS4gDQo+ID4+PiA+IA0KPiA+Pj4gPiBB
c3N1bWluZyB0aGlzIG1lYW5zIOKAnEJGRCBFY2hvIG1vZGXigJ0sIHdoeSBpcyB0aGlzIG91dCBv
ZiBzY29wZT8gSWYgdGhpcyBpcyBhIHNpbmdsZSBsb2dpY2FsIGhvcCB1bmRlcm5lYXRoIFZYTEFO
LCB3aGF04oCZcyBwcmV2ZW50aW5nIHRoZSB1c2Ugb2YgRWNobz8gRWNob+KAmXMgYmVuZWZpdHMg
YXJlIGh1Z2UuDQo+ID4+PiA+IA0KPiA+Pj4gPiANCj4gPj4+ID4gNS4gVGVybWlub2xvZ3kNCj4g
Pj4+ID4gDQo+ID4+PiA+ICAgIEltcGxlbWVudGF0aW9ucyBTSE9VTEQgZW5zdXJlIHRoYXQgdGhl
IEJGRA0KPiA+Pj4gPiAgICBwYWNrZXRzIGZvbGxvdyB0aGUgc2FtZSBsb29rdXAgcGF0aCBhcyBW
WExBTiBkYXRhIHBhY2tldHMgd2l0aGluIHRoZQ0KPiA+Pj4gPiAgICBzZW5kZXIgc3lzdGVtLg0K
PiA+Pj4gPiANCj4gPj4+ID4gV2hhdCBpcyBhIOKAnGxvb2sgdXAgcGF0aCB3aXRoaW4gYSBzZW5k
ZXIgc3lzdGVt4oCdPw0KPiA+Pj4gPiANCj4gPj4+ID4gDQo+ID4+PiA+IDYuIERlcGxveW1lbnQg
c2NlbmFyaW9zDQo+ID4+PiA+IA0KPiA+Pj4gPiBTMyBzYXlzOg0KPiA+Pj4gPiAgICBGaWd1cmUg
MSBpbGx1c3RyYXRlcyB0aGUgc2NlbmFyaW8gd2l0aCB0d28gc2VydmVycywgZWFjaCBvZiB0aGVt
DQo+ID4+PiA+ICAgIGhvc3RpbmcgdHdvIFZNcy4gIFRoZSBzZXJ2ZXJzIGhvc3QgVlRFUHMgdGhh
dCB0ZXJtaW5hdGUgdHdvIFZYTEFODQo+ID4+PiA+IFvigKZdDQo+ID4+PiA+ICAgICAgICAgICAg
ICAgICAgICAgIEZpZ3VyZSAxOiBSZWZlcmVuY2UgVlhMQU4gRG9tYWluDQo+ID4+PiA+IA0KPiA+
Pj4gPiANCj4gPj4+ID4gSG93ZXZlciwgUkZDIDczNDggRmlndXJlIDMgbGlzdHMgdGhhdCBhcyBv
bmUgZGVwbG95bWVudCBzY2VuYXJpbywgbm90IGFzIOKAnHRoZSBzY2VuYXJpb+KAnSBhbmQg4oCc
VGhlIFJlZmVyZW5jZSBWWExBTiBEb21haW7igJ0uDQo+ID4+PiA+IA0KPiA+Pj4gPiBCZXN0LA0K
PiA+Pj4gPiANCj4gPj4+ID4gQ2FybG9zLg0KPiA+Pj4gPiANCj4gPj4+ID4+IE9uIEp1biAxNywg
MjAxOSwgYXQgMTI6NTggQU0sIEdyZWcgTWlyc2t5IDxncmVnaW1pcnNreUBnbWFpbC5jb20+IHdy
b3RlOg0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBIaSBPbGl2ZXIsDQo+ID4+PiA+PiB0aGFuayB5b3Ug
Zm9yIHlvdXIgdGhvcm91Z2ggcmV2aWV3LCBjbGVhciBhbmQgZGV0YWlsZWQgcXVlc3Rpb25zLiBN
eSBhcG9sb2dpZXMgZm9yIHRoZSBkZWxheSB0byByZXNwb25kLiBQbGVhc2UgZmluZCBteSBhbnN3
ZXJzIGJlbG93IGluLWxpbmUgdGFnZ2VkIEdJTT4+Lg0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBSZWdh
cmRzLA0KPiA+Pj4gPj4gR3JlZw0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBPbiBGcmksIE1heSAzMSwg
MjAxOSBhdCAxMjozOCBQTSBPbGl2aWVyIEJvbmF2ZW50dXJlIHZpYSBEYXRhdHJhY2tlciA8bm9y
ZXBseUBpZXRmLm9yZz4gd3JvdGU6DQo+ID4+PiA+PiBSZXZpZXdlcjogT2xpdmllciBCb25hdmVu
dHVyZQ0KPiA+Pj4gPj4gUmV2aWV3IHJlc3VsdDogUmVhZHkgd2l0aCBJc3N1ZXMNCj4gPj4+ID4+
IA0KPiA+Pj4gPj4gVGhpcyBkb2N1bWVudCBoYXMgYmVlbiByZXZpZXdlZCBhcyBwYXJ0IG9mIHRo
ZSB0cmFuc3BvcnQgYXJlYSByZXZpZXcgdGVhbSdzDQo+ID4+PiA+PiBvbmdvaW5nIGVmZm9ydCB0
byByZXZpZXcga2V5IElFVEYgZG9jdW1lbnRzLiBUaGVzZSBjb21tZW50cyB3ZXJlIHdyaXR0ZW4N
Cj4gPj4+ID4+IHByaW1hcmlseSBmb3IgdGhlIHRyYW5zcG9ydCBhcmVhIGRpcmVjdG9ycywgYnV0
IGFyZSBjb3BpZWQgdG8gdGhlIGRvY3VtZW50J3MNCj4gPj4+ID4+IGF1dGhvcnMgYW5kIFdHIHRv
IGFsbG93IHRoZW0gdG8gYWRkcmVzcyBhbnkgaXNzdWVzIHJhaXNlZCBhbmQgYWxzbyB0byB0aGUg
SUVURg0KPiA+Pj4gPj4gZGlzY3Vzc2lvbiBsaXN0IGZvciBpbmZvcm1hdGlvbi4NCj4gPj4+ID4+
IA0KPiA+Pj4gPj4gV2hlbiBkb25lIGF0IHRoZSB0aW1lIG9mIElFVEYgTGFzdCBDYWxsLCB0aGUg
YXV0aG9ycyBzaG91bGQgY29uc2lkZXIgdGhpcw0KPiA+Pj4gPj4gcmV2aWV3IGFzIHBhcnQgb2Yg
dGhlIGxhc3QtY2FsbCBjb21tZW50cyB0aGV5IHJlY2VpdmUuIFBsZWFzZSBhbHdheXMgQ0MNCj4g
Pj4+ID4+IHRzdi1hcnRAaWV0Zi5vcmcgaWYgeW91IHJlcGx5IHRvIG9yIGZvcndhcmQgdGhpcyBy
ZXZpZXcuDQo+ID4+PiA+PiANCj4gPj4+ID4+IEkgaGF2ZSBvbmx5IGxpbWl0ZWQga25vd2xlZGdl
IG9mIFZYTEFOIGFuZCBkbyBub3Qga25vdyBhbGwgc3VidGxldGllcyBvZiBCRkQuDQo+ID4+PiA+
PiBUaGlzIHJldmlldyBpcyB0aHVzIG1vcmUgZnJvbSBhIGdlbmVyYWxpc3QgdGhhbiBhIHNwZWNp
YWxpc3QgaW4gdGhpcyB0b3BpYy4NCj4gPj4+ID4+IA0KPiA+Pj4gPj4gTWFqb3IgaXNzdWVzDQo+
ID4+PiA+PiANCj4gPj4+ID4+IFNlY3Rpb24gNCByZXF1aXJlcyB0aGF0ICIgSW1wbGVtZW50YXRp
b25zIFNIT1VMRCBlbnN1cmUgdGhhdCB0aGUgQkZEDQo+ID4+PiA+PiAgICBwYWNrZXRzIGZvbGxv
dyB0aGUgc2FtZSBsb29rdXAgcGF0aCBhcyBWWExBTiBkYXRhIHBhY2tldHMgd2l0aGluIHRoZQ0K
PiA+Pj4gPj4gICAgc2VuZGVyIHN5c3RlbS4iDQo+ID4+PiA+PiANCj4gPj4+ID4+IFdoeSBpcyB0
aGlzIHJlcXVpcmVtZW50IG9ubHkgcmVsZXZhbnQgZm9yIHRoZSBsb29rdXAgcGF0aCBvbiB0aGUg
c2VuZGVyIHN5c3RlbQ0KPiA+Pj4gPj4gPyBXaGF0IGRvZXMgdGhpcyBzZW50ZW5jZSByZWFsbHkg
aW1wbGllcyA/DQo+ID4+PiA+PiBHSU0+PiBSRkMgNTg4MCBzZXQgdGhlIHNjb3BlIG9mIHRoZSBm
YXVsdCBkZXRlY3Rpb24gb2YgQkZEIHByb3RvY29sIGFzIA0KPiA+Pj4gPj4gICAgLi4uIHRoZSBi
aWRpcmVjdGlvbmFsIHBhdGggYmV0d2VlbiB0d28gZm9yd2FyZGluZyBlbmdpbmVzLCBpbmNsdWRp
bmcNCj4gPj4+ID4+ICAgIGludGVyZmFjZXMsIGRhdGEgbGluayhzKSwgYW5kIHRvIHRoZSBleHRl
bnQgcG9zc2libGUgdGhlIGZvcndhcmRpbmcNCj4gPj4+ID4+ICAgIGVuZ2luZXMgdGhlbXNlbHZl
cyAuLi4NCj4gPj4+ID4+IFRoZSByZXF1aXJlbWVudCBhaW1lZCB0byB0aGUgZm9yd2FyZGluZyBl
bmdpbmUgb2YgYSBCRkQgc3lzdGVtIHRoYXQgdHJhbnNtaXRzIEJGRCBjb250cm9sIHBhY2tldHMg
b3ZlciBWWExBTiB0dW5uZWwuDQo+ID4+PiA+PiANCj4gPj4+ID4+IElzIGl0IGEgcmVxdWlyZW1l
bnQgdGhhdCB0aGUgQkZEIHBhY2tldHMgZm9sbG93IHRoZSBzYW1lIHBhdGggYXMgdGhlIGRhdGEN
Cj4gPj4+ID4+IHBhY2tldCBmb3IgYSBnaXZlbiBWWExBTiA/IEkgZ3Vlc3Mgc28uIEluIHRoaXMg
Y2FzZSwgdGhlIGRvY3VtZW50IHNob3VsZA0KPiA+Pj4gPj4gZGlzY3VzcyBob3cgRXF1YWwgQ29z
dCBNdWx0aXBhdGggY291bGQgYWZmZWN0IHRoaXMuDQo+ID4+PiA+PiBHSU0+PiBJIHRoaW5rIHRo
YXQgRUNNUCBlbnZpcm9ubWVudCBpcyBtb3JlIGxpa2VseSB0byBiZSBleHBlcmllbmNlZCBieSBh
IHRyYW5zaXQgbm9kZSBpbiB0aGUgdW5kZXJsYXkuIElmIHRoZSBCRkQgc2Vzc2lvbiBpcyB1c2Vk
IHRvIG1vbml0b3IgdGhlIHNwZWNpZmljIHVuZGVybGF5IHBhdGgsIHRoZW4sIEkgYWdyZWUsIHdl
IHNob3VsZCBleHBsYWluIHRoYXQgdXNpbmcgdGhlIFZYTEFOIHBheWxvYWQgaW5mb3JtYXRpb24g
dG8gZHJhdyBwYXRoIGVudHJvcHkgbWF5IGNhdXNlIGRhdGEgYW5kIEJGRCBwYWNrZXRzIGZvbGxv
d2luZyBkaWZmZXJlbnQgdW5kZXJsYXkgcm91dGVzLiBCdXQsIG9uIHRoZSBvdGhlciBoYW5kLCB0
aGF0IGlzIHRoZSBjYXNlIGZvciBPQU0gYW5kIGZhdWx0IGRldGVjdGlvbiBpbiBhbGwgb3Zlcmxh
eSBuZXR3b3JrcyBpbiBnZW5lcmFsLg0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBNaW5vciBpc3N1ZXMN
Cj4gPj4+ID4+IA0KPiA+Pj4gPj4gU2VjdGlvbiAxDQo+ID4+PiA+PiANCj4gPj4+ID4+IFlvdSB3
cml0ZSAiVGhlIGFzeW5jaHJvbm91cyBtb2RlIG9mIEJGRCwgYXMgZGVmaW5lZCBpbiBbUkZDNTg4
MF0sDQo+ID4+PiA+PiAgY2FuIGJlIHVzZWQgdG8gbW9uaXRvciBhIHAycCBWWExBTiB0dW5uZWwu
Ig0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBXaHkgZG8geW91IHVzZSB0aGUgd29yZCBjYW4gPyBJdCBp
cyBhIHBvc3NpYmlsaXR5IG9yIGEgcmVxdWlyZW1lbnQgPw0KPiA+Pj4gPj4gR0lNPj4gSW4gcHJp
bmNpcGxlLCBCRkQgRGVtYW5kIG1vZGUgbWF5IGJlIHVzZWQgdG8gbW9uaXRvciBwMnAgcGF0aHMg
YXMgd2VsbCwgSSBhZ3JlZSwgd2lsbCByZS13b3JkIHRvIG1vcmUgYXNzZXJ0aXZlOg0KPiA+Pj4g
Pj4gIFRoZSBhc3luY2hyb25vdXMgbW9kZSBvZiBCRkQsIGFzIGRlZmluZWQgaW4gW1JGQzU4ODBd
LA0KPiA+Pj4gPj4gIGlzIHVzZWQgdG8gbW9uaXRvciBhIHAycCBWWExBTiB0dW5uZWwuDQo+ID4+
PiA+PiANCj4gPj4+ID4+IE5WRSBoYXMgbm90IGJlZW4gZGVmaW5lZCBiZWZvcmUgYW5kIGlzIG5v
dCBpbiB0aGUgdGVybWlub2xvZ3kuDQo+ID4+PiA+PiBHSU0+PiBXaWxsIGFkZCB0byB0aGUgVGVy
bWlub2xvZ3kgYW5kIGV4cGFuZCBhczoNCj4gPj4+ID4+IE5WRSAgICAgICAgTmV0d29yayBWaXJ0
dWFsaXphdGlvbiBFbmRwb2ludCANCj4gPj4+ID4+IA0KPiA+Pj4gPj4gVGhpcyBlbnRpcmUgc2Vj
dGlvbiBpcyBub3QgZWFzeSB0byByZWFkIGZvciBhbiBvdXRzaWRlci4NCj4gPj4+ID4+IA0KPiA+
Pj4gPj4gU2VjdGlvbiAzDQo+ID4+PiA+PiANCj4gPj4+ID4+IFZOSSBoYXMgbm90IGJlZW4gZGVm
aW5lZA0KPiA+Pj4gPj4gR0lNPj4gV2lsbCBhZGQgdG8gdGhlIFRlcm1pbm9sb2d5IHNlY3Rpb246
DQo+ID4+PiA+PiBWTkkgICAgVlhMQU4gTmV0d29yayBJZGVudGlmaWVyIChvciBWWExBTiBTZWdt
ZW50IElEKQ0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBGaWd1cmUgMSBjb3VsZCB0YWtlIGxlc3Mgc3Bh
Y2UNCj4gPj4+ID4+IEdJTT4+IFllcywgY2FuIG1ha2UgaXQgYml0IGRlbnNlci4gV291bGQgdGhl
IGZvbGxvd2luZyBiZSBhbiBpbXByb3ZlbWVudD8NCj4gPj4+ID4+ICANCj4gPj4+ID4+ICAgICAg
ICstLS0tLS0tLS0tLS0rLS0tLS0tLS0tLS0tLSsNCj4gPj4+ID4+ICAgICAgIHwgICAgICAgIFNl
cnZlciAxICAgICAgICAgIHwNCj4gPj4+ID4+ICAgICAgIHwgKy0tLS0rLS0tLSsgICstLS0tKy0t
LS0rIHwNCj4gPj4+ID4+ICAgICAgIHwgfFZNMS0xICAgIHwgIHxWTTEtMiAgICB8IHwNCj4gPj4+
ID4+ICAgICAgIHwgfFZOSSAxMDAgIHwgIHxWTkkgMjAwICB8IHwNCj4gPj4+ID4+ICAgICAgIHwg
fCAgICAgICAgIHwgIHwgICAgICAgICB8IHwNCj4gPj4+ID4+ICAgICAgIHwgKy0tLS0tLS0tLSsg
ICstLS0tLS0tLS0rIHwNCj4gPj4+ID4+ICAgICAgIHwgSHlwZXJ2aXNvciBWVEVQIChJUDEpICAg
IHwNCj4gPj4+ID4+ICAgICAgICstLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLSsNCj4gPj4+ID4+
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICB8DQo+ID4+PiA+PiAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgfCAgICstLS0tLS0tLS0tLS0tKw0KPiA+Pj4gPj4gICAgICAgICAgICAgICAg
ICAgICAgICAgICAgIHwgICB8ICAgTGF5ZXIgMyAgIHwNCj4gPj4+ID4+ICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICArLS0tfCAgIE5ldHdvcmsgICB8DQo+ID4+PiA+PiAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICstLS0tLS0tLS0tLS0tKw0KPiA+Pj4gPj4gICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgfA0KPiA+Pj4gPj4gICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgKy0tLS0tLS0tLS0tKw0KPiA+Pj4gPj4gICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgfA0KPiA+Pj4gPj4gICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICArLS0tLS0tLS0tLS0tKy0tLS0tLS0tLS0tLS0rDQo+
ID4+PiA+PiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHwgICAgSHlw
ZXJ2aXNvciBWVEVQIChJUDIpIHwNCj4gPj4+ID4+ICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgfCArLS0tLSstLS0tKyAgKy0tLS0rLS0tLSsgfA0KPiA+Pj4gPj4gICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB8IHxWTTItMSAgICB8ICB8Vk0y
LTIgICAgfCB8DQo+ID4+PiA+PiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgIHwgfFZOSSAxMDAgIHwgIHxWTkkgMjAwICB8IHwNCj4gPj4+ID4+ICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgfCB8ICAgICAgICAgfCAgfCAgICAgICAgIHwgfA0K
PiA+Pj4gPj4gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB8ICstLS0t
LS0tLS0rICArLS0tLS0tLS0tKyB8DQo+ID4+PiA+PiAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgIHwgICAgICBTZXJ2ZXIgMiAgICAgICAgICAgIHwNCj4gPj4+ID4+ICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgKy0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tKw0KPiA+Pj4gPj4gDQo+ID4+PiA+PiANCj4gPj4+ID4+IFNlY3Rpb24gNA0KPiA+
Pj4gPj4gDQo+ID4+PiA+PiBJIGRvIG5vdCBzZWUgdGhlIGJlbmVmaXRzIG9mIGhhdmluZyBvbmUg
cGFyYWdyYXBoIGluIFNlY3Rpb24gNCBmb2xsb3dlZCBieSBvbmx5DQo+ID4+PiA+PiBTZWN0aW9u
IDQuMQ0KPiA+Pj4gPj4gR0lNPj4gV2lsbCBtZXJnZSBTZWN0aW9uIDQuMSBpbnRvIDQgd2l0aCBt
aW5vciByZXF1aXJlZCByZS13b3JkaW5nOg0KPiA+Pj4gPj4gNC4gIEJGRCBQYWNrZXQgVHJhbnNt
aXNzaW9uIG92ZXIgVlhMQU4gVHVubmVsDQo+ID4+PiA+PiANCj4gPj4+ID4+ICAgIEJGRCBwYWNr
ZXQgTVVTVCBiZSBlbmNhcHN1bGF0ZWQgYW5kIHNlbnQgdG8gYSByZW1vdGUgVlRFUCBhcw0KPiA+
Pj4gPj4gICAgZXhwbGFpbmVkIGluIHRoaXMgc2VjdGlvbi4gIEltcGxlbWVudGF0aW9ucyBTSE9V
TEQgZW5zdXJlIHRoYXQgdGhlDQo+ID4+PiA+PiAgICBCRkQgcGFja2V0cyBmb2xsb3cgdGhlIHNh
bWUgbG9va3VwIHBhdGggYXMgVlhMQU4gZGF0YSBwYWNrZXRzIHdpdGhpbg0KPiA+Pj4gPj4gICAg
dGhlIHNlbmRlciBzeXN0ZW0uDQo+ID4+PiA+PiANCj4gPj4+ID4+ICAgIEJGRCBwYWNrZXRzIGFy
ZSBlbmNhcHN1bGF0ZWQgaW4gVlhMQU4gYXMgZGVzY3JpYmVkIGJlbG93LiAgVGhlIFZYTEFODQo+
ID4+PiA+PiAgICBwYWNrZXQgZm9ybWF0IGlzIGRlZmluZWQgaW4gU2VjdGlvbiA1IG9mIFtSRkM3
MzQ4XS4gIFRoZSBPdXRlciBJUC9VRFANCj4gPj4+ID4+ICAgIGFuZCBWWExBTiBoZWFkZXJzIE1V
U1QgYmUgZW5jb2RlZCBieSB0aGUgc2VuZGVyIGFzIGRlZmluZWQgaW4NCj4gPj4+ID4+ICAgIFtS
RkM3MzQ4XS4NCj4gPj4+ID4+IA0KPiA+Pj4gPj4gU2VjdGlvbiA0LjENCj4gPj4+ID4+IA0KPiA+
Pj4gPj4gVGhlIGRvY3VtZW50IGRvZXMgbm90IHNwZWNpZnkgd2hlbiBhIGRlZGljYXRlZCBNQUMg
YWRkcmVzcyBvciB0aGUgTUFDIGFkZHJlc3MNCj4gPj4+ID4+IG9mIHRoZSBkZXN0aW5hdGlvbiBW
VEVQIG11c3QgYmUgdXNlZC4gVGhpcyBjb3VsZCBhZmZlY3QgdGhlIGludGVyb3BlcmFiaWxpdHkg
b2YNCj4gPj4+ID4+IGltcGxlbWVudGF0aW9ucy4gU2hvdWxkIGFsbCBpbXBsZW1lbnRhdGlvbnMg
c3VwcG9ydCBib3RoIHRoZSBkZWRpY2F0ZWQgTUFDDQo+ID4+PiA+PiBhZGRyZXNzIGFuZCB0aGUg
ZGVzdGluYXRpb24gTUFDIGFkZHJlc3MgPw0KPiA+Pj4gPj4gR0lNPj4gQWZ0ZXIgZnVydGhlciBk
aXNjdXNzaW9uLCBhdXRob3JzIGRlY2lkZWQgdG8gcmVtb3ZlIHRoZSByZXF1ZXN0IGZvciB0aGUg
ZGVkaWNhdGVkIE1BQyBhZGRyZXNzIGFsbG9jYXRpb24uIE9ubHkgdGhlIE1BQyBhZGRyZXNzIG9m
IHRoZSByZW1vdGUgVlRFUCBtdXN0IGJlIHVzZWQgYXMgdGhlIGRlc3RpbmF0aW9uIE1BQyBhZGRy
ZXNzIGluIHRoZSBpbm5lciBFdGhlcm5ldCBmcmFtZS4gUGxlYXNlIGNoZWNrIHRoZSBhdHRhY2hl
ZCBkaWZmIGJldHdlZW4gdGhlIC0wNyBhbmQgdGhlIHdvcmtpbmcgdmVyc2lvbnMgb3IgdGhlIHdv
cmtpbmcgdmVyc2lvbiBvZiB0aGUgZHJhZnQuDQo+ID4+PiA+PiANCj4gPj4+ID4+IEl0IGlzIHVu
Y2xlYXIgZnJvbSB0aGlzIHNlY3Rpb24gd2hldGhlciBJUHY0IGluc2lkZSBJUHY2IGFuZCB0aGUg
b3Bwb3NpdGUNCj4gPj4+ID4+IHNob3VsZCBiZSBzdXBwb3J0ZWQgb3Igbm90Lg0KPiA+Pj4gPj4g
R0lNPj4gQW55IGNvbWJpbmF0aW9uIG9mIG91dGVyIElQdlggYW5kIGlubmVyIElQdlggaXMgcG9z
c2libGUuDQo+ID4+PiA+PiANCj4gPj4+ID4+IFNlY3Rpb24gNS4NCj4gPj4+ID4+IA0KPiA+Pj4g
Pj4gSWYgdGhlIHJlY2VpdmVkIHBhY2tldCBkb2VzIG5vdCBtYXRjaCB0aGUgZGVkaWNhdGVkIE1B
QyBhZGRyZXNzIG5vciB0aGUgTUFDDQo+ID4+PiA+PiBhZGRyZXNzIG9mIHRoZSBWVEVQLCBzaG91
bGQgdGhlIHBhY2tldCBiZSBzaWxlbnRseSBkaXNjYXJkZWQgb3IgdHJlYXRlZA0KPiA+Pj4gPj4g
ZGlmZmVyZW50bHkgPw0KPiA+Pj4gPj4gR0lNPj4gQXMgSSd2ZSBtZW50aW9uZWQgZWFybGllciwg
YXV0aG9ycyBoYXZlIGRlY2lkZWQgdG8gcmVtb3ZlIHRoZSB1c2Ugb2YgdGhlIGRlZGljYXRlZCBN
QUMgYWRkcmVzcyBmb3IgQkZEIG92ZXIgVlhMQU4uDQo+ID4+PiA+PiANCj4gPj4+ID4+IFNlY3Rp
b24gNS4xDQo+ID4+PiA+PiANCj4gPj4+ID4+IElzIHRoaXMgYSBtb2RpZmljYXRpb24gdG8gc2Vj
dGlvbiA2LjMgb2YgUkZDNTg4MCA/IFRoaXMgaXMgbm90IGNsZWFyDQo+ID4+PiA+PiBHSU0+PiBJ
IHRoaW5rIHRoYXQgdGhpcyBzZWN0aW9uIGlzIG5vdCBtb2RpZmljYXRpb24gYnV0IHRoZSBkZWZp
bml0aW9uIG9mIHRoZSBhcHBsaWNhdGlvbi1zcGVjaWZpYyBwcm9jZWR1cmUgdGhhdCBpcyBvdXRz
aWRlIHRoZSBzY29wZSBvZiBSRkMgNTg4MDoNCj4gPj4+ID4+ICAgIFRoZSBtZXRob2Qgb2YgZGVt
dWx0aXBsZXhpbmcgdGhlIGluaXRpYWwgcGFja2V0cyAoaW4gd2hpY2ggWW91cg0KPiA+Pj4gPj4g
ICAgRGlzY3JpbWluYXRvciBpcyB6ZXJvKSBpcyBhcHBsaWNhdGlvbiBkZXBlbmRlbnQsIGFuZCBp
cyB0aHVzIG91dHNpZGUNCj4gPj4+ID4+ICAgIHRoZSBzY29wZSBvZiB0aGlzIHNwZWNpZmljYXRp
b24uDQo+ID4+PiA+PiANCj4gPj4+ID4+IFNlY3Rpb24gOQ0KPiA+Pj4gPj4gDQo+ID4+PiA+PiBU
aGUgc2VudGVuY2UgIiBUaHJvdHRsaW5nIE1BWSBiZSByZWxheGVkIGZvciBCRkQgcGFja2V0cw0K
PiA+Pj4gPj4gICAgYmFzZWQgb24gcG9ydCBudW1iZXIuIiBpcyB1bmNsZWFyLg0KPiA+Pj4gPj4g
R0lNPj4gWWVzLCB0aGFuayB5b3UgZm9yIHBvaW50aW5nIHRvIHRoaXMuIFRoZSB1cGRhdGVkIHRl
eHQsIGluIHRoZSB3aG9sZSBwYXJhZ3JhcGgsIGlzIGFzIGZvbGxvd3M6DQo+ID4+PiA+PiBORVcg
VEVYVDoNCj4gPj4+ID4+ICAgIFRoZSBkb2N1bWVudCByZXF1aXJlcyBzZXR0aW5nIHRoZSBpbm5l
ciBJUCBUVEwgdG8gMSwgd2hpY2ggY291bGQgYmUNCj4gPj4+ID4+ICAgIHVzZWQgYXMgYSBERG9T
IGF0dGFjayB2ZWN0b3IuICBUaHVzIHRoZSBpbXBsZW1lbnRhdGlvbiBNVVNUIGhhdmUNCj4gPj4+
ID4+ICAgIHRocm90dGxpbmcgaW4gcGxhY2UgdG8gY29udHJvbCB0aGUgcmF0ZSBvZiBCRkQgY29u
dHJvbCBwYWNrZXRzIHNlbnQNCj4gPj4+ID4+ICAgIHRvIHRoZSBjb250cm9sIHBsYW5lLiAgT24g
dGhlIG90aGVyIGhhbmQsIG92ZXIgYWdncmVzc2l2ZSB0aHJvdHRsaW5nDQo+ID4+PiA+PiAgICBv
ZiBCRkQgY29udHJvbCBwYWNrZXRzIG1heSBiZWNvbWUgdGhlIGNhdXNlIG9mIHRoZSBpbmFiaWxp
dHkgdG8gZm9ybQ0KPiA+Pj4gPj4gICAgYW5kIG1haW50YWluIEJGRCBzZXNzaW9uIGF0IHNjYWxl
LiAgSGVuY2UsIHRocm90dGxpbmcgb2YgQkZEIGNvbnRyb2wNCj4gPj4+ID4+ICAgIHBhY2tldHMg
U0hPVUxEIGJlIGFkanVzdGVkIHRvIHBlcm1pdCBCRkQgdG8gd29yayBhY2NvcmRpbmcgdG8gaXRz
DQo+ID4+PiA+PiAgICBwcm9jZWR1cmVzLg0KPiA+Pj4gPj4gPGRyYWZ0LWlldGYtYmZkLXZ4bGFu
LTA4LnR4dD48RGlmZl8gZHJhZnQtaWV0Zi1iZmQtdnhsYW4tMDcudHh0IC0gZHJhZnQtaWV0Zi1i
ZmQtdnhsYW4tMDgudHh0Lmh0bWw+DQo+ID4+PiA+IA0KPiA+Pj4gDQo+ID4+IA0KPiA+IA0KPiAN
Cg0K


From nobody Thu Jul  4 02:44:59 2019
Return-Path: <mjethanandani@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F0811201D4 for <rtg-bfd@ietfa.amsl.com>; Thu,  4 Jul 2019 02:44:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gvmgia92Qf_2 for <rtg-bfd@ietfa.amsl.com>; Thu,  4 Jul 2019 02:44:55 -0700 (PDT)
Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95A671201D3 for <rtg-bfd@ietf.org>; Thu,  4 Jul 2019 02:44:55 -0700 (PDT)
Received: by mail-wm1-x32a.google.com with SMTP id n9so5085891wmi.0 for <rtg-bfd@ietf.org>; Thu, 04 Jul 2019 02:44:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ROeobth5yGXC/IN9Hkm2kM/pOjxH+KFme67PvEivkY0=; b=XwAMFQ0c5VH3RbW2WnNprKMo0CRTKAoOMXrAramXGyiDy67eRhANS0zz9NZfjzo2yU fnt4B0AkFpDUMp9Y9jF4kOKWQwq5tWJlmslOJh0xiuEfd1E3/yfw6cIfbv2dYgM8WgK9 TZkVxQkCVk2nUlsXmdEgxdFhPNom3H8wQ4kV1L0jMgxGiVAFYvRm8ltUCbOZsSh1SMsZ 7KzBdjaFfs0kMNrucuOGQ3aJcz8tUMSnO4SWXRmKItbW9RYod7/jCD4gkk/QmYqlveRX 2vF5r+jWhSgfIWM1ek9UxKAtN2n8pttSaBNhlMYe36Q3SK1L3EfQ10lHx1VTIaDZ/2dE okIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ROeobth5yGXC/IN9Hkm2kM/pOjxH+KFme67PvEivkY0=; b=ch0iB+jsQMwk5nrDc8akyIUvxjaPBxODIGznau9XZvwaViGalwT7jisQ2ESbcXR11j KUMGVpLp1HyAUcukQ07V20a9WBBfJbAl42sV0+UrcoYb17C4xIzQDQh057j8EsTLOnjZ OAtfUiTe50vZqbxpHfUmVGmBHyui9pl+h40NwsLQR8kSqs79KNEiLJYjgH3ejoNIXaEW PJXH9chnx0T3AmJTa3If1Zmle1F6rcDEHEtL7KZjeiAeeqwEDHuiMZgomGmNMSSFvcjJ ghIuZTIkTxH1qHMj1FeyGyhP4gZpIepmJHwfxwqs/QtQFJTKBDZ/j9EsseERMnYCtGQ1 NafA==
X-Gm-Message-State: APjAAAXpQch5YS723MTiSnkknczfGqF8EWMQTYcGGYDnBi98qc9m/732 rj3uf6MimboAakw9Bxpmgi2CVGH1zXE=
X-Google-Smtp-Source: APXvYqwl8KVz5g5gkI9nYwrL3Pp/Ny6ftHANZslcynZIfYlcXo5ScIydXpJLRmIQ7iZ31rbJyHQSzQ==
X-Received: by 2002:a1c:6a17:: with SMTP id f23mr11591518wmc.91.1562233493769;  Thu, 04 Jul 2019 02:44:53 -0700 (PDT)
Received: from [192.168.1.5] (79-75-43-71.dynamic.dsl.as9105.com. [79.75.43.71]) by smtp.gmail.com with ESMTPSA id 5sm4744494wmi.22.2019.07.04.02.44.52 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 04 Jul 2019 02:44:52 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Subject: Re: IETF 105
From: Mahesh Jethanandani <mjethanandani@gmail.com>
In-Reply-To: <20190702190422.GC3974@pfrc.org>
Date: Thu, 4 Jul 2019 10:44:51 +0100
Cc: "rtg-bfd@ietf. org" <rtg-bfd@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <0C53B492-FA2A-477A-860A-C784DFD40BF6@gmail.com>
References: <20190702190422.GC3974@pfrc.org>
To: Jeffrey Haas <jhaas@pfrc.org>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/zccM0ujUMr-IyXNLSyizcdcQmuQ>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jul 2019 09:44:58 -0000

Hi Jeff,

> On Jul 2, 2019, at 8:04 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:
>=20
> Working Group,
>=20
> Reshad had put out a call for presentations for IETF 105 in mid-June.  =
As of
> this time, we don't currently have any agenda requests.
>=20
> A quick status of current work:
> - BFD for vxlan is undergoing post WGLC expert review at the request =
of our
>  Area Director.
> - BFD Authentication drafts need discussion in the working group on =
how to
>  progress or not.
> - Unsolicited BFD is stable, and a trivial draft.  We've received a =
prod
>  from the authors asking if the next step is WGLC.
> - BFD for Large Packets is stable, and waiting on implementations.
> - BFD in Demand Mode has discussion pending with author and Area =
Director.
>=20
> Potential future work:
> - RFC 5884 bis.  (RFC 5884 authors willing to contribute.)
> - BFD v2 or not.  Greg seeded the discussion at IETF 104.
>=20
> BFD as a working group needs to meet only if it advances discussion on =
our
> work.  If we don't have anything requiring group discussion outside of
> mailing list, we may consider canceling our timeslot.

I do see that we need discussion around the authentication draft =E2=80=A6=


>=20
> -- Jeff
>=20

Mahesh Jethanandani
mjethanandani@gmail.com




From nobody Thu Jul 11 06:25:34 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B046B12009E; Wed, 10 Jul 2019 16:42:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.702
X-Spam-Level: 
X-Spam-Status: No, score=-0.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, PDS_NO_HELO_DNS=1.295, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u7bUPHw9aoCg; Wed, 10 Jul 2019 16:42:41 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24829120073; Wed, 10 Jul 2019 16:42:41 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id v18so3822598ljh.6; Wed, 10 Jul 2019 16:42:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Z0GAKc8ckYJuN1cJiimhiTzce0ZmlFUQ9E1hoMXdul4=; b=SZSMNDuJXwRMgo3CIvYNC+8RkPrtrRwuhI1JNdr2oyFSKBigxrcr392fdUV7VAmgrc 7Yt07L2o/VqRtyfSCVvt4t9QOOMKmFO6sfqKl3HYUZvBDLbEcPKEU4wFZ11KWFc9Xn4v iPsJtnki8zBSKn9YGopAEPYQ9HbjjuvX0C8ecErvcf9YHIYGZiPxz9dZ/AjUNSB5Hkfn AL5JlV8ijOx6R0yEwJWz/CprwOunktxKzJjLRhVTnU2MeBEJbNSL9koEjLVlOUjTt9aF /RbGG4vggR3n76Z9+V/heZKRFtwXsxlQQV8ncG6GciOEjfPf3hfkGFvJC2wrm4tNHP5R vRUw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Z0GAKc8ckYJuN1cJiimhiTzce0ZmlFUQ9E1hoMXdul4=; b=dqyX0E2wp95otGmOhLgFDTF6iKx6+i4RFOsTdMhjg1sC0zCzrSyKLOFxPxr9lvR9Gs vVX334DWFzN2I3xyDW/HWzlk8e4uTCIpFqIt3gvwr9hb0Wultpq8Tq99CT8RHsWS+t5A ++qJTKjeGc3fbAFXHPusD7p8Ut9yprmVrrHtQz7yVAp7jUN9pmaZ8dSoSrV8yaUqvSM5 hxVte+oZJvVBXv277nHJxyrktKyWOGmv5n3ffGCvEhGm2H0q3VNes6JwANZchcjV8YEq xttvsuxOl7z2JtFaqcRgy5N7ClIG+nsVm6p+ZqbuLmCK50erdtiaQ6pIBd7BkdKFJ4Z9 DR6Q==
X-Gm-Message-State: APjAAAVarY9Pr2x5S6n21+RbPNgQGBBojPoupOvxrNzKMQoljfKrj7kq F7Xkj7v0ivilitBTzCMVZ0MUa0bIUGHMZqQuJeM=
X-Google-Smtp-Source: APXvYqxY4KUjrQjIRIFswq+0F0Qah+LrVckYVG0j4iEj7/GlYs3F3/Rg+qkSn2EQVG6e5LolJ8JN+JC8kEdWEhaAThM=
X-Received: by 2002:a2e:7614:: with SMTP id r20mr506727ljc.42.1562802158978; Wed, 10 Jul 2019 16:42:38 -0700 (PDT)
MIME-Version: 1.0
References: <155933149484.6565.7386019489022348116@ietfa.amsl.com> <CA+RyBmXu-F0cWDkBydE_aJaVpUv=k1otqUCc7NdRW4pnBK3tgA@mail.gmail.com> <14822B96-D3C6-495E-8661-198068F72ABA@cisco.com> <CA+RyBmUMbW=B3FNmqiQNmMLM27f9G+MeRL5MrAnCd04EP3vmrQ@mail.gmail.com> <8237FE8D-937E-4BCB-B1A3-89C2B3CDC51C@cisco.com> <CA+RyBmXAQ1esWKa8C6cgnn93YTyTh=JFUt187TS56bNND1OJOA@mail.gmail.com> <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com> <CA+RyBmVgQ8VXZ-A0-0jKqAmSRvJxg4DbZiRhW67jN224tsS3+Q@mail.gmail.com> <BADB8CA6-FCAC-47A3-8B06-F82E98A89549@cisco.com> <CA+RyBmVgV31+Zi+AkaOakm9FwbHUgr4OoYcUhfJtSVGPC-m5_A@mail.gmail.com> <BCEA05ED-5921-4E0D-B76E-2024F3B78ED7@cisco.com> <CA+RyBmWODaxGUYDEjAOaLzJCR6qx3w1yet1Y0BeP7RAqusExJQ@mail.gmail.com> <B976AA48-2C90-48CC-B087-B2528797AF35@cisco.com>
In-Reply-To: <B976AA48-2C90-48CC-B087-B2528797AF35@cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 10 Jul 2019 16:42:27 -0700
Message-ID: <CA+RyBmWHr1yYjGZC5QTWViuuc=-tnL1yUn6tbcVJnyDryReXSQ@mail.gmail.com>
Subject: Re: Level of standardization of the Echo mode of BFD [Re: Tsvart last call review of draft-ietf-bfd-vxlan-07]
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: "tsv-art@ietf.org" <tsv-art@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>,  "draft-ietf-bfd-vxlan.all@ietf.org" <draft-ietf-bfd-vxlan.all@ietf.org>,  Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>, IETF list <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008a4a2a058d5c3b7f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/Gqs67dmjMeATKj6v96X8EbRIAqQ>
X-Mailman-Approved-At: Thu, 11 Jul 2019 06:25:32 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jul 2019 23:42:47 -0000

--0000000000008a4a2a058d5c3b7f
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Carlos,
apologies for the delayed response. Please find my answers in-line tagged
GIM>>.

Regards,
Greg

On Wed, Jul 3, 2019 at 9:35 AM Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Hello, Greg,
>
> Before you asked about RFC 5884, now RFC 5885, neither of which are
> references in draft-ietf-bfd-vxlan-07. Your new request is:
>
> > I hope that you can help me to answer a question related to the scope o=
f
> RFC 5885.
>
> Asking about RFC 5885, published 9 years ago, is another distraction from
> the question at hand. It seems like a third-order red-herring, hasty
> generalization, or a =E2=80=9Cyou also=E2=80=9D if you are citing RFCs I =
co-authored.
>
> Once again, in my opinion, this does not get you closer to improving or
> furthering draft-ietf-bfd-vxlan-07, which should be the common goal on th=
is
> thread.
>
> As a refresher, this was my initial question:
>
> > >>> > 4. Section 7 says that =E2=80=9C Support for echo BFD is outside =
the scope
> of this document=E2=80=9D.
> > >>> >
> > >>> > Assuming this means =E2=80=9CBFD Echo mode=E2=80=9D, why is this =
out of scope?
>
>
> I am really interested in understanding what the reason(s) is (are) for
> out-scoping BFD Echo. Is it because of technical limitations? Lack of
> market demand? Lack of time to know the answer to this question?
>
> I am not asking for any change, just a question of whether the authors an=
d
> WG considering the ROI of adding BFD Echo.
>
GIM>> The question of BFD Echo support over VXLAN, to the best of my
recollection, never came up. That sentence was added very early before WG
adopted the work. And, as I can recall, there were no questions, nor
suggestions to revisit the statement. Said that I propose the following
update to the document:

   - remove section Echo BFD
   - append Introduction section with

"This specification describes procedures only for BFD asynchronous mode."

Would these changes be acceptable and sufficient to address your concern
with the scope of the document?

>
> Best,
>
> Carlos.
>
>
> > On Jun 26, 2019, at 9:22 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> >
> > Hello Carlos,
> > I hope that you can help me to answer a question related to the scope o=
f
> RFC 5885. In RFC 5885 is stated:
> >    This specification describes procedures only for BFD asynchronous
> mode.
> > Neither demand mode, nor Echo function of BFD is explicitly mentioned i=
n
> RFC 5885. Hence my question If BFD over VXLAN changes from explicitly
> excluding the Echo function from the scope of the document to the
> definition of the scope like used in RFC 5885, would that address your
> concern?
> >
> > Regards,
> > Greg
> >
> > On Fri, Jun 21, 2019 at 5:19 PM Carlos Pignataro (cpignata) <
> cpignata@cisco.com> wrote:
> > Hello, Greg,
> >
> > Thank you for having split this thread. I=E2=80=99ll note for ease of t=
racking
> that this specific issue is issue #4 our of the six quick comments I sent=
.
> >
> > Now, questions you ask like this one quoted from below:
> > > Would you suggest that the scope of RFC 5884 must include the BFD Ech=
o
> function?
> >
> >
> > Are now second-order red herrings and, once again, not relevant to the
> issue =E2=80=94 instead they avoid responding and prevent convergence. In=
 my
> comment, I=E2=80=99m just asking for a technical explanation of why BFD E=
cho is out
> of scope.
> >
> >
> > Please see inline, your response is incorrect in 3 technical areas that
> I enumerate.
> >
> >
> > > On Jun 20, 2019, at 1:30 AM, Greg Mirsky <gregimirsky@gmail.com>
> wrote:
> > >
> > > Hi Carlos,
> > > thank you for clarifying your opinion on the applicability of the BFD
> Echo mode.
> >
> > For correctness, I have not issued an "opinion on the applicability of
> the BFD Echo mode.=E2=80=9D (Again, please do not mischaracterize!)
> >
> > My initial question was =E2=80=9Cwhy is this out of scope?=E2=80=9D I b=
elieve scoping
> should be deliberate and intentional, and hence seeking to understand.
> >
> >
> > > I've split this thread to help us and others to follow the discussion
> on this particular issue. I'll note that RFC 5880 does not prohibit the
> remote system to perform any kind of processing on the packet received in
> the BFD Echo mode.
> >
> > This is technical mistake #1.
> >
> > RFC 5880 says:
> >
> >    The Echo function has the advantage of truly testing only the
> >    forwarding path on the remote system.
> >
> >
> > No other processing on the remote system =E2=80=94 that is the benefit =
of Echo.
> >
> >
> > > Even more, Section 6.8.8 explicitly points out that a received Echo
> packet is likely to be processed:
> > >    A means of detecting missing Echo packets
> > >    MUST be implemented, which most likely involves processing of the
> > >    Echo packets that are received.  The processing of received Echo
> > >    packets is otherwise outside the scope of this specification.
> >
> >
> > This is technical mistake #2.
> >
> > What you are quoting is referring to the reception of Echo packet by th=
e
> Echo packet *sender*. That is, the local system, not the remote system. T=
he
> Echo packet is received by the same system that sent it (by definition of
> Echo!), and thus the node itself needs to demultiplex its own context...
> >
> >
> > > Thus, interoperability is one of the underspecified issues for BFD
> Echo.
> >
> > No. This is technical mistake #2b.
> >
> > There is no interoperability spec considerations between a system and
> itself (unless the sender of BFD Echo has split personality :-)
> >
> >
> >
> > > Secondly, the Echo BFD mode has been excluded from the scope of RFC
> 5884:
> > > Further, the use of the Echo function is outside the scope of this
> specification.
> >
> > This is technical mistake #3.
> >
> > It is really irrelevant to the question whether RFC 5884, which talks
> about BFD for unidirectional MPLS LSPs, scopes out BFD Echo.
> >
> > As I mentioned in my initial email, "If this is a single logical hop
> underneath VXLAN, what=E2=80=99s preventing the use of Echo?=E2=80=9D RFC=
 5884 is different
> than (and not useful for or relevant to) the scenario in
> draft-ietf-bfd-vxlan.
> >
> >
> >
> > > Would you suggest that the scope of RFC 5884 must include the BFD Ech=
o
> function?
> >
> >
> > I do not understand the context of this question. But as I mentioned,
> these questions take the thread in a direction that diverges from
> resolution.
> >
> > I have not suggested that any document includes anything. My comment is=
:
> what is the reason why BFD Echo is out of scope? Technically, this is a
> single hop at the VXLAN level for BFD.
> >
> >
> > Best,
> >
> > Carlos.
> >
> > >
> > > Regards,
> > > Greg
> > >
> > > On Thu, Jun 20, 2019 at 2:08 PM Carlos Pignataro (cpignata) <
> cpignata@cisco.com> wrote:
> > > Hello, Greg,
> > >
> > > Yes, happy too answer your question.
> > >
> > > First, however, let me make two quick observations on the exchange:
> > >       =E2=80=A2 You seem to be picking very specific fragments or sub=
-topics
> from my comments, and following up on those only.
> > >       =E2=80=A2 I=E2=80=99m happy to continue answering these questio=
ns, but they are
> orthogonal to (and consequently a distraction from) the initial comments =
I
> raised.
> > >
> > > Now, your question: the BFD Echo packet format is generically spec=E2=
=80=99ed
> and defined in Section 5 of RFC 5880:
> > > https://tools.ietf.org/html/rfc5880#section-5
> > >
> > > The most relevant part is this:
> > >
> > >    The payload of a BFD Echo packet is a local matter, since only the
> > >    sending system ever processes the content.  The only requirement i=
s
> > >    that sufficient information is included to demultiplex the receive=
d
> > >    packet to the correct BFD session after it is looped back to the
> > >    sender.
> > >
> > > Since the remote system does not process the echo packet content, it
> is a local matter only. And given the fact that, as such, there is no
> interoperability implications, there is no need to over-specify the packe=
t
> format. The only requirement is that the sending system needs to be able =
to
> map it to a session when it boomerangs back.
> > >
> > > No, it is generally not (i.e., does not need to be, but there=E2=80=
=99s
> freedom to potentially be) a BFD control packet.
> > > Yes, it can be something else.
> > >
> > > That said, the packet format for BFD Echo has, to my analysis and
> understanding, no relevancy on the questions below.
> > >
> > > Best,
> > >
> > > Carlos.
> > >
> > >> On Jun 20, 2019, at 12:50 AM, Greg Mirsky <gregimirsky@gmail.com>
> wrote:
> > >>
> > >> Hello Carlos,
> > >> could you please refer me to the specification of BFD that defines
> the message format that is used in the Echo mode of BFD. Is it the BFD
> control packet? Something else?
> > >>
> > >> Regards,
> > >> Greg
> > >>
> > >>
> > >> On Thu, Jun 20, 2019 at 11:09 AM Carlos Pignataro (cpignata) <
> cpignata@cisco.com> wrote:
> > >> Hello, Greg,
> > >>
> > >> Please see inline.
> > >>
> > >>> On Jun 19, 2019, at 9:58 PM, Greg Mirsky <gregimirsky@gmail.com>
> wrote:
> > >>>
> > >>> Hello Carlos,
> > >>> thank you for the expedient clarification.
> > >>> To your questions on demultiplexing BFD control packets with the
> zero value of the Your Discriminator field:
> > >>>     =E2=80=A2 only BFD control packets with the zero value of the Y=
our
> Discriminator field are demultiplexed using the information of the inner =
IP
> header. I believe that the text is clear and requires that all fields of
> the inner IP header must be used to demultiplex a received BFD control
> packet with the zero value in the Your Discriminator field. Which of the
> fields an implementation uses to create multiple BFD sessions between the
> pair of VTEPs is implementation specific.
> > >> This text is repeating was is in the draft, but does not answer any
> of my questions.
> > >>
> > >> For example:
> > >> 1. "that all fields of the inner IP header must be used to
> demultiplex a received BFD control packet=E2=80=9D
> > >>     -> The text does not say =E2=80=9Call fields=E2=80=9D, but regar=
dless, do you
> mean the DSCP and the Evil Bit? IPv6 Flow Label? How *exactly*?
> > >> 2. How is the mapping of IP (not UDP?) fields to BFD session done?
> > >> 3. How is this state created and maintained?
> > >> 4. Since this is a set of fields on which two systems need to agree
> (which fields from the inner IP/UDP are mapped needs to be understood by
> both systems), it cannot be =E2=80=9Cimplementation specific=E2=80=9D. Fu=
rther, the text
> does not say so.
> > >>
> > >>> To your point on the level Echo mode of BFD is specified in RFC 588=
0
> I'll quote the opinion of Jeffrey Haas from the discussion of comments fr=
om
> Shawn Emery on behalf of the SecDir. Shawn had commented:
> > >>> Echo BFD is out of scope for the document, but does not describe th=
e
> reason for this or why state
> > >>> this at all?
> > >>> I've responded:
> > >>> GIM>> I think that the main reason is that the BFD Echo mode is
> underspecified. RFC 5880 defined some of the mechanisms related to the Ec=
ho
> mode, but more standardization work may be required.
> > >>> And Jeffrey Haas had added:
> > >>> Speaking as a BFD chair, this is the relevant observation.  BFD Ech=
o
> is
> > >>> underspecified to the point where claiming compliance is difficult
> at best.
> > >>> In general, it relies on single-hop and the ability to have the
> remote Echo
> > >>> client loop the packets.
> > >>
> > >> BFD Echo cannot be specified in RFC 5880 base spec because it is
> application specific.
> > >>
> > >>>
> > >>> This packet loop may not be practical for several encapsulations an=
d
> thus is
> > >>> out of scope for such encapsulations.  Whether this is practical fo=
r
> vxlan
> > >>> today, or in the presence of future extensions to vxlan is left out
> of scope
> > >>> for the core proposal.
> > >>
> > >> The question remains: for VXLAN encapsulation, this is like a single
> hop as far as BFD is concerned (single hop VXLAN tunnel).
> > >>
> > >> Since RFC 5881 defines Echo for single hop, can you please elaborate
> (in the document) why is out of scope or how it can work?
> > >>
> > >> Best,
> > >>
> > >> Carlos.
> > >>
> > >>>
> > >>> Will respond to other questions in a separate mail.
> > >>>
> > >>> Regards,
> > >>> Greg
> > >>>
> > >>>
> > >>> On Thu, Jun 20, 2019 at 10:31 AM Carlos Pignataro (cpignata) <
> cpignata@cisco.com> wrote:
> > >>> Hello, Greg,
> > >>>
> > >>> > On Jun 19, 2019, at 9:09 PM, Greg Mirsky <gregimirsky@gmail.com>
> wrote:
> > >>> >
> > >>> > Hi Carlos,
> > >>> > thank you for reminding of our continued discussion with Joel. We
> are seeking comments from VXLAN experts and much appreciate if you have
> insights on VXLAN to share.
> > >>> > I've got some clarifying questions before I can respond to you.
> > >>>
> > >>> Sure.
> > >>>
> > >>> > To which stage of the three-way handshake you refer as "initial
> demultiplexing"? I couldn't find this term in RFC 5880.
> > >>>
> > >>> =E2=80=9CInitial demultiplexing" is a well-known term in BFD, refer=
ring to
> the "demultiplexing of the initial packets", BFD Control packet with
> YourDisc being zero.
> > >>>
> > >>> In RFC 5880, see Section 6.3.
> > >>> https://tools.ietf.org/html/rfc5880#section-6.3
> > >>>
> > >>>    The method of demultiplexing the initial packets (in which Your
> > >>>    Discriminator is zero) is application dependent, and is thus
> outside
> > >>>    the scope of this specification.
> > >>>
> > >>> Since initial demultiplexing is indeed application specific,
> different for one-hop versus multi-hop and dependent upon whether a singl=
e
> or multiple sessions are allowed between a pair of endpoints, I added bel=
ow
> two other relevant citations, from application specific BFD specs:
> > >>> 1. https://tools.ietf.org/html/rfc5883#section-4
> > >>> 2. https://tools.ietf.org/html/rfc5882#section-6
> > >>>
> > >>>
> > >>> > Regarding the applicability of the Echo mode, thank you for
> pointing to the need for stricter terminology, the Echo mode, as defined =
in
> RFC 5880, is underspecified and it will require additional standardizatio=
n.
> > >>>
> > >>> No. BFD Echo is not underspecified in RFC 5880.
> > >>>
> > >>> Please read S5: https://tools.ietf.org/html/rfc5880#section-5
> > >>>
> > >>>    BFD Echo packets are sent in an encapsulation appropriate to the
> > >>>    environment.  See the appropriate application documents for the
> > >>>    specifics of particular environments.
> > >>>
> > >>>
> > >>> BFD Echo is application dependent.
> > >>>
> > >>> Therefore, for example, single-hop BFD in RFC 5881 specifies BFD
> Echo for that application.
> > >>>
> > >>> Hence, my question stands: why is this draft claiming BFD Echo is
> out of scope for this BFD application document?
> > >>>
> > >>>
> > >>> > Future drafts may explore and define how the Echo mode of BFD is
> used over VXLAN tunnels.
> > >>> >
> > >>>
> > >>> See above.
> > >>>
> > >>> > Will review and respond to the remaining questions soon.
> > >>>
> > >>> Thank you.
> > >>>
> > >>> The "remaining questions" are still all the questions below :-)
> > >>>
> > >>> Best,
> > >>>
> > >>> Carlos.
> > >>>
> > >>> >
> > >>> > Regards,
> > >>> > Greg
> > >>> >
> > >>> >
> > >>> > On Thu, Jun 20, 2019 at 9:14 AM Carlos Pignataro (cpignata) <
> cpignata@cisco.com> wrote:
> > >>> > Hi,
> > >>> >
> > >>> > I have not reviewed this draft before, but triggered by this
> email, and briefly scanning through a couple of sections, it is unclear t=
o
> me how some of the mechanics work.
> > >>> >
> > >>> > There are some major issues with the Mac usage and association, a=
s
> Joel Halpern mentioned in his Rtg Dir review.
> > >>> >
> > >>> > And, additionally, please consider the following comments and
> questions:
> > >>> >
> > >>> >
> > >>> > 1. Underspecification for initialization and initial
> demultiplexing.
> > >>> >
> > >>> > This document allows multiple BFD sessions between a single pair
> of VTEPs:
> > >>> >
> > >>> >    An
> > >>> >    implementation that supports this specification MUST be able t=
o
> > >>> >    control the number of BFD sessions that can be created between
> the
> > >>> >    same pair of VTEPs.
> > >>> >
> > >>> > The implication of this is that BFD single-hop initialization
> procedures will not work. Instead, there is a need to map the initial
> demultiplexing.
> > >>> >
> > >>> > This issue is explained in RFCs 5882 and 5883:
> https://tools.ietf.org/html/rfc5883#section-4 and
> https://tools.ietf.org/html/rfc5882#section-6
> > >>> >
> > >>> > Section 5.1 says:
> > >>> >
> > >>> >    For such packets, the BFD session MUST be identified
> > >>> >    using the inner headers, i.e., the source IP, the destination
> IP, and
> > >>> >    the source UDP port number present in the IP header carried by
> the
> > >>> >    payload of the VXLAN encapsulated packet.  The VNI of the pack=
et
> > >>> >    SHOULD be used to derive interface-related information for
> > >>> >    demultiplexing the packet.
> > >>> >
> > >>> > But this does not really explain how to do the initial
> demultiplexing. Does each BFD session need to have a separate inner sourc=
e
> IP address? Or source UDP port? And how ofter are they recycled or kept a=
s
> state? How are these mapped?
> > >>> > Equally importantly, which side is Active?
> > >>> > And what if there=E2=80=99s a race condition with both sides bein=
g Active
> and setting up redundant sessions?
> > >>> >
> > >>> > 1.b. By the way, based on this, using S-BFD [RFC 7880] might be
> easier to demux.
> > >>> >
> > >>> >
> > >>> > 2. Security
> > >>> >
> > >>> > This document says that the TTL in the inner packet carrying BFD
> is set to 1. However, RFC 5880 says to use GTSM [RFC 5082], i.e., a value
> of 255..
> > >>> >
> > >>> > Why is GTSM not used here?
> > >>> >
> > >>> >
> > >>> > 3. ECMP and fate-sharing under-specification:
> > >>> >
> > >>> > Section 4.1. says:
> > >>> >
> > >>> >    The Outer IP/UDP
> > >>> >    and VXLAN headers MUST be encoded by the sender as defined in
> > >>> >    [RFC7348].
> > >>> >
> > >>> >
> > >>> > And RFC 7348 says:
> > >>> >
> > >>> >       -  Source Port:  It is recommended that the UDP source port
> number
> > >>> >          be calculated using a hash of fields from the inner
> packet --
> > >>> >          one example being a hash of the inner Ethernet frame's
> headers.
> > >>> >          This is to enable a level of entropy for the ECMP/load-
> > >>> >          balancing of the VM-to-VM traffic across the VXLAN
> overlay.
> > >>> >          When calculating the UDP source port number in this
> manner, it
> > >>> >          is RECOMMENDED that the value be in the dynamic/private
> port
> > >>> >          range 49152-65535 [RFC6335].
> > >>> >
> > >>> >
> > >>> > Based on this, depending on the hashing calculation, the outer
> source UDP port can be different leading to different ECMP treatment. Doe=
s
> something else need to be specified here in regards to the outer UDP sour=
ce
> port?
> > >>> >
> > >>> >
> > >>> > 4. Section 7 says that =E2=80=9C Support for echo BFD is outside =
the scope
> of this document=E2=80=9D.
> > >>> >
> > >>> > Assuming this means =E2=80=9CBFD Echo mode=E2=80=9D, why is this =
out of scope? If
> this is a single logical hop underneath VXLAN, what=E2=80=99s preventing =
the use of
> Echo? Echo=E2=80=99s benefits are huge.
> > >>> >
> > >>> >
> > >>> > 5. Terminology
> > >>> >
> > >>> >    Implementations SHOULD ensure that the BFD
> > >>> >    packets follow the same lookup path as VXLAN data packets
> within the
> > >>> >    sender system.
> > >>> >
> > >>> > What is a =E2=80=9Clook up path within a sender system=E2=80=9D?
> > >>> >
> > >>> >
> > >>> > 6. Deployment scenarios
> > >>> >
> > >>> > S3 says:
> > >>> >    Figure 1 illustrates the scenario with two servers, each of th=
em
> > >>> >    hosting two VMs.  The servers host VTEPs that terminate two
> VXLAN
> > >>> > [=E2=80=A6]
> > >>> >                      Figure 1: Reference VXLAN Domain
> > >>> >
> > >>> >
> > >>> > However, RFC 7348 Figure 3 lists that as one deployment scenario,
> not as =E2=80=9Cthe scenario=E2=80=9D and =E2=80=9CThe Reference VXLAN Do=
main=E2=80=9D.
> > >>> >
> > >>> > Best,
> > >>> >
> > >>> > Carlos.
> > >>> >
> > >>> >> On Jun 17, 2019, at 12:58 AM, Greg Mirsky <gregimirsky@gmail.com=
>
> wrote:
> > >>> >>
> > >>> >> Hi Oliver,
> > >>> >> thank you for your thorough review, clear and detailed questions=
.
> My apologies for the delay to respond. Please find my answers below in-li=
ne
> tagged GIM>>.
> > >>> >>
> > >>> >> Regards,
> > >>> >> Greg
> > >>> >>
> > >>> >> On Fri, May 31, 2019 at 12:38 PM Olivier Bonaventure via
> Datatracker <noreply@ietf.org> wrote:
> > >>> >> Reviewer: Olivier Bonaventure
> > >>> >> Review result: Ready with Issues
> > >>> >>
> > >>> >> This document has been reviewed as part of the transport area
> review team's
> > >>> >> ongoing effort to review key IETF documents. These comments were
> written
> > >>> >> primarily for the transport area directors, but are copied to th=
e
> document's
> > >>> >> authors and WG to allow them to address any issues raised and
> also to the IETF
> > >>> >> discussion list for information.
> > >>> >>
> > >>> >> When done at the time of IETF Last Call, the authors should
> consider this
> > >>> >> review as part of the last-call comments they receive. Please
> always CC
> > >>> >> tsv-art@ietf.org if you reply to or forward this review.
> > >>> >>
> > >>> >> I have only limited knowledge of VXLAN and do not know all
> subtleties of BFD.
> > >>> >> This review is thus more from a generalist than a specialist in
> this topic.
> > >>> >>
> > >>> >> Major issues
> > >>> >>
> > >>> >> Section 4 requires that " Implementations SHOULD ensure that the
> BFD
> > >>> >>    packets follow the same lookup path as VXLAN data packets
> within the
> > >>> >>    sender system."
> > >>> >>
> > >>> >> Why is this requirement only relevant for the lookup path on the
> sender system
> > >>> >> ? What does this sentence really implies ?
> > >>> >> GIM>> RFC 5880 set the scope of the fault detection of BFD
> protocol as
> > >>> >>    ... the bidirectional path between two forwarding engines,
> including
> > >>> >>    interfaces, data link(s), and to the extent possible the
> forwarding
> > >>> >>    engines themselves ...
> > >>> >> The requirement aimed to the forwarding engine of a BFD system
> that transmits BFD control packets over VXLAN tunnel.
> > >>> >>
> > >>> >> Is it a requirement that the BFD packets follow the same path as
> the data
> > >>> >> packet for a given VXLAN ? I guess so. In this case, the documen=
t
> should
> > >>> >> discuss how Equal Cost Multipath could affect this.
> > >>> >> GIM>> I think that ECMP environment is more likely to be
> experienced by a transit node in the underlay. If the BFD session is used
> to monitor the specific underlay path, then, I agree, we should explain
> that using the VXLAN payload information to draw path entropy may cause
> data and BFD packets following different underlay routes. But, on the oth=
er
> hand, that is the case for OAM and fault detection in all overlay network=
s
> in general.
> > >>> >>
> > >>> >> Minor issues
> > >>> >>
> > >>> >> Section 1
> > >>> >>
> > >>> >> You write "The asynchronous mode of BFD, as defined in [RFC5880]=
,
> > >>> >>  can be used to monitor a p2p VXLAN tunnel."
> > >>> >>
> > >>> >> Why do you use the word can ? It is a possibility or a
> requirement ?
> > >>> >> GIM>> In principle, BFD Demand mode may be used to monitor p2p
> paths as well, I agree, will re-word to more assertive:
> > >>> >>  The asynchronous mode of BFD, as defined in [RFC5880],
> > >>> >>  is used to monitor a p2p VXLAN tunnel.
> > >>> >>
> > >>> >> NVE has not been defined before and is not in the terminology.
> > >>> >> GIM>> Will add to the Terminology and expand as:
> > >>> >> NVE        Network Virtualization Endpoint
> > >>> >>
> > >>> >> This entire section is not easy to read for an outsider.
> > >>> >>
> > >>> >> Section 3
> > >>> >>
> > >>> >> VNI has not been defined
> > >>> >> GIM>> Will add to the Terminology section:
> > >>> >> VNI    VXLAN Network Identifier (or VXLAN Segment ID)
> > >>> >>
> > >>> >> Figure 1 could take less space
> > >>> >> GIM>> Yes, can make it bit denser. Would the following be an
> improvement?
> > >>> >>
> > >>> >>       +------------+-------------+
> > >>> >>       |        Server 1          |
> > >>> >>       | +----+----+  +----+----+ |
> > >>> >>       | |VM1-1    |  |VM1-2    | |
> > >>> >>       | |VNI 100  |  |VNI 200  | |
> > >>> >>       | |         |  |         | |
> > >>> >>       | +---------+  +---------+ |
> > >>> >>       | Hypervisor VTEP (IP1)    |
> > >>> >>       +--------------------------+
> > >>> >>                             |
> > >>> >>                             |   +-------------+
> > >>> >>                             |   |   Layer 3   |
> > >>> >>                             +---|   Network   |
> > >>> >>                                 +-------------+
> > >>> >>                                     |
> > >>> >>                                     +-----------+
> > >>> >>                                                 |
> > >>> >>
> +------------+-------------+
> > >>> >>                                          |    Hypervisor VTEP
> (IP2) |
> > >>> >>                                          | +----+----+
> +----+----+ |
> > >>> >>                                          | |VM2-1    |  |VM2-2
> | |
> > >>> >>                                          | |VNI 100  |  |VNI 200
> | |
> > >>> >>                                          | |         |  |
>  | |
> > >>> >>                                          | +---------+
> +---------+ |
> > >>> >>                                          |      Server 2
>   |
> > >>> >>
> +--------------------------+
> > >>> >>
> > >>> >>
> > >>> >> Section 4
> > >>> >>
> > >>> >> I do not see the benefits of having one paragraph in Section 4
> followed by only
> > >>> >> Section 4.1
> > >>> >> GIM>> Will merge Section 4.1 into 4 with minor required
> re-wording:
> > >>> >> 4.  BFD Packet Transmission over VXLAN Tunnel
> > >>> >>
> > >>> >>    BFD packet MUST be encapsulated and sent to a remote VTEP as
> > >>> >>    explained in this section.  Implementations SHOULD ensure tha=
t
> the
> > >>> >>    BFD packets follow the same lookup path as VXLAN data packets
> within
> > >>> >>    the sender system.
> > >>> >>
> > >>> >>    BFD packets are encapsulated in VXLAN as described below.  Th=
e
> VXLAN
> > >>> >>    packet format is defined in Section 5 of [RFC7348].  The Oute=
r
> IP/UDP
> > >>> >>    and VXLAN headers MUST be encoded by the sender as defined in
> > >>> >>    [RFC7348].
> > >>> >>
> > >>> >> Section 4.1
> > >>> >>
> > >>> >> The document does not specify when a dedicated MAC address or th=
e
> MAC address
> > >>> >> of the destination VTEP must be used. This could affect the
> interoperability of
> > >>> >> implementations. Should all implementations support both the
> dedicated MAC
> > >>> >> address and the destination MAC address ?
> > >>> >> GIM>> After further discussion, authors decided to remove the
> request for the dedicated MAC address allocation. Only the MAC address of
> the remote VTEP must be used as the destination MAC address in the inner
> Ethernet frame. Please check the attached diff between the -07 and the
> working versions or the working version of the draft.
> > >>> >>
> > >>> >> It is unclear from this section whether IPv4 inside IPv6 and the
> opposite
> > >>> >> should be supported or not.
> > >>> >> GIM>> Any combination of outer IPvX and inner IPvX is possible.
> > >>> >>
> > >>> >> Section 5.
> > >>> >>
> > >>> >> If the received packet does not match the dedicated MAC address
> nor the MAC
> > >>> >> address of the VTEP, should the packet be silently discarded or
> treated
> > >>> >> differently ?
> > >>> >> GIM>> As I've mentioned earlier, authors have decided to remove
> the use of the dedicated MAC address for BFD over VXLAN.
> > >>> >>
> > >>> >> Section 5.1
> > >>> >>
> > >>> >> Is this a modification to section 6.3 of RFC5880 ? This is not
> clear
> > >>> >> GIM>> I think that this section is not modification but the
> definition of the application-specific procedure that is outside the scop=
e
> of RFC 5880:
> > >>> >>    The method of demultiplexing the initial packets (in which Yo=
ur
> > >>> >>    Discriminator is zero) is application dependent, and is thus
> outside
> > >>> >>    the scope of this specification.
> > >>> >>
> > >>> >> Section 9
> > >>> >>
> > >>> >> The sentence " Throttling MAY be relaxed for BFD packets
> > >>> >>    based on port number." is unclear.
> > >>> >> GIM>> Yes, thank you for pointing to this. The updated text, in
> the whole paragraph, is as follows:
> > >>> >> NEW TEXT:
> > >>> >>    The document requires setting the inner IP TTL to 1, which
> could be
> > >>> >>    used as a DDoS attack vector.  Thus the implementation MUST
> have
> > >>> >>    throttling in place to control the rate of BFD control packet=
s
> sent
> > >>> >>    to the control plane.  On the other hand, over aggressive
> throttling
> > >>> >>    of BFD control packets may become the cause of the inability
> to form
> > >>> >>    and maintain BFD session at scale.  Hence, throttling of BFD
> control
> > >>> >>    packets SHOULD be adjusted to permit BFD to work according to
> its
> > >>> >>    procedures.
> > >>> >> <draft-ietf-bfd-vxlan-08.txt><Diff_ draft-ietf-bfd-vxlan-07.txt =
-
> draft-ietf-bfd-vxlan-08.txt.html>
> > >>> >
> > >>>
> > >>
> > >
> >
>
>

--0000000000008a4a2a058d5c3b7f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hi Carlos,<div>apologies for the delayed =
response. Please find my answers in-line tagged GIM&gt;&gt;.</div><div><br>=
</div><div>Regards,</div><div>Greg</div></div><br><div class=3D"gmail_quote=
"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jul 3, 2019 at 9:35 AM Carl=
os Pignataro (cpignata) &lt;<a href=3D"mailto:cpignata@cisco.com">cpignata@=
cisco.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">Hello, Greg,<br>
<br>
Before you asked about RFC 5884, now RFC 5885, neither of which are referen=
ces in draft-ietf-bfd-vxlan-07. Your new request is:<br>
<br>
&gt; I hope that you can help me to answer a question related to the scope =
of RFC 5885.<br>
<br>
Asking about RFC 5885, published 9 years ago, is another distraction from t=
he question at hand. It seems like a third-order red-herring, hasty general=
ization, or a =E2=80=9Cyou also=E2=80=9D if you are citing RFCs I co-author=
ed.<br>
<br>
Once again, in my opinion, this does not get you closer to improving or fur=
thering draft-ietf-bfd-vxlan-07, which should be the common goal on this th=
read.<br>
<br>
As a refresher, this was my initial question:<br>
<br>
&gt; &gt;&gt;&gt; &gt; 4. Section 7 says that =E2=80=9C Support for echo BF=
D is outside the scope of this document=E2=80=9D. <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Assuming this means =E2=80=9CBFD Echo mode=E2=80=9D,=
 why is this out of scope?<br>
<br>
<br>
I am really interested in understanding what the reason(s) is (are) for out=
-scoping BFD Echo. Is it because of technical limitations? Lack of market d=
emand? Lack of time to know the answer to this question?<br>
<br>
I am not asking for any change, just a question of whether the authors and =
WG considering the ROI of adding BFD Echo.<br></blockquote><div>GIM&gt;&gt;=
 The question of BFD Echo support over VXLAN, to the best of my recollectio=
n, never came up. That sentence was added very early before WG adopted the =
work. And, as I can recall, there were no questions, nor suggestions to rev=
isit the statement. Said that I propose the following update to the documen=
t:</div><div><ul><li>remove section Echo BFD</li><li>append Introduction se=
ction with</li></ul></div></div><blockquote style=3D"margin:0 0 0 40px;bord=
er:none;padding:0px"><div class=3D"gmail_quote"><div>&quot;This specificati=
on describes procedures only for BFD asynchronous mode.&quot;=C2=A0</div></=
div></blockquote>Would these changes be acceptable and sufficient to addres=
s your concern with the scope of the document?<br><div class=3D"gmail_quote=
"><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Best,<br>
<br>
Carlos.<br>
<br>
<br>
&gt; On Jun 26, 2019, at 9:22 PM, Greg Mirsky &lt;<a href=3D"mailto:gregimi=
rsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt; wrote:<br>
&gt; <br>
&gt; Hello Carlos,<br>
&gt; I hope that you can help me to answer a question related to the scope =
of RFC 5885. In RFC 5885 is stated:<br>
&gt;=C2=A0 =C2=A0 This specification describes procedures only for BFD asyn=
chronous mode.<br>
&gt; Neither demand mode, nor Echo function of BFD is explicitly mentioned =
in RFC 5885. Hence my question If BFD over VXLAN changes from explicitly ex=
cluding the Echo function from the scope of the document to the definition =
of the scope like used in RFC 5885, would that address your concern?<br>
&gt; <br>
&gt; Regards,<br>
&gt; Greg<br>
&gt; <br>
&gt; On Fri, Jun 21, 2019 at 5:19 PM Carlos Pignataro (cpignata) &lt;<a hre=
f=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco.com</a>&gt=
; wrote:<br>
&gt; Hello, Greg,<br>
&gt; <br>
&gt; Thank you for having split this thread. I=E2=80=99ll note for ease of =
tracking that this specific issue is issue #4 our of the six quick comments=
 I sent.<br>
&gt; <br>
&gt; Now, questions you ask like this one quoted from below:<br>
&gt; &gt; Would you suggest that the scope of RFC 5884 must include the BFD=
 Echo function?<br>
&gt; <br>
&gt; <br>
&gt; Are now second-order red herrings and, once again, not relevant to the=
 issue =E2=80=94 instead they avoid responding and prevent convergence. In =
my comment, I=E2=80=99m just asking for a technical explanation of why BFD =
Echo is out of scope.<br>
&gt; <br>
&gt; <br>
&gt; Please see inline, your response is incorrect in 3 technical areas tha=
t I enumerate.<br>
&gt; <br>
&gt; <br>
&gt; &gt; On Jun 20, 2019, at 1:30 AM, Greg Mirsky &lt;<a href=3D"mailto:gr=
egimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt; wrote:=
<br>
&gt; &gt; <br>
&gt; &gt; Hi Carlos,<br>
&gt; &gt; thank you for clarifying your opinion on the applicability of the=
 BFD Echo mode.<br>
&gt; <br>
&gt; For correctness, I have not issued an &quot;opinion on the applicabili=
ty of the BFD Echo mode.=E2=80=9D (Again, please do not mischaracterize!) <=
br>
&gt; <br>
&gt; My initial question was =E2=80=9Cwhy is this out of scope?=E2=80=9D I =
believe scoping should be deliberate and intentional, and hence seeking to =
understand.<br>
&gt; <br>
&gt; <br>
&gt; &gt; I&#39;ve split this thread to help us and others to follow the di=
scussion on this particular issue. I&#39;ll note that RFC 5880 does not pro=
hibit the remote system to perform any kind of processing on the packet rec=
eived in the BFD Echo mode.<br>
&gt; <br>
&gt; This is technical mistake #1. <br>
&gt; <br>
&gt; RFC 5880 says:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 The Echo function has the advantage of truly testing only=
 the<br>
&gt;=C2=A0 =C2=A0 forwarding path on the remote system. <br>
&gt; <br>
&gt; <br>
&gt; No other processing on the remote system =E2=80=94 that is the benefit=
 of Echo.<br>
&gt; <br>
&gt; <br>
&gt; &gt; Even more, Section 6.8.8 explicitly points out that a received Ec=
ho packet is likely to be processed:<br>
&gt; &gt;=C2=A0 =C2=A0 A means of detecting missing Echo packets<br>
&gt; &gt;=C2=A0 =C2=A0 MUST be implemented, which most likely involves proc=
essing of the<br>
&gt; &gt;=C2=A0 =C2=A0 Echo packets that are received.=C2=A0 The processing=
 of received Echo<br>
&gt; &gt;=C2=A0 =C2=A0 packets is otherwise outside the scope of this speci=
fication.<br>
&gt; <br>
&gt; <br>
&gt; This is technical mistake #2.<br>
&gt; <br>
&gt; What you are quoting is referring to the reception of Echo packet by t=
he Echo packet *sender*. That is, the local system, not the remote system. =
The Echo packet is received by the same system that sent it (by definition =
of Echo!), and thus the node itself needs to demultiplex its own context...=
<br>
&gt; <br>
&gt; <br>
&gt; &gt; Thus, interoperability is one of the underspecified issues for BF=
D Echo.<br>
&gt; <br>
&gt; No. This is technical mistake #2b.<br>
&gt; <br>
&gt; There is no interoperability spec considerations between a system and =
itself (unless the sender of BFD Echo has split personality :-)<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; &gt; Secondly, the Echo BFD mode has been excluded from the scope of R=
FC 5884:<br>
&gt; &gt; Further, the use of the Echo function is outside the scope of thi=
s specification.<br>
&gt; <br>
&gt; This is technical mistake #3.<br>
&gt; <br>
&gt; It is really irrelevant to the question whether RFC 5884, which talks =
about BFD for unidirectional MPLS LSPs, scopes out BFD Echo.<br>
&gt; <br>
&gt; As I mentioned in my initial email, &quot;If this is a single logical =
hop underneath VXLAN, what=E2=80=99s preventing the use of Echo?=E2=80=9D R=
FC 5884 is different than (and not useful for or relevant to) the scenario =
in draft-ietf-bfd-vxlan.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; &gt; Would you suggest that the scope of RFC 5884 must include the BFD=
 Echo function?<br>
&gt; <br>
&gt; <br>
&gt; I do not understand the context of this question. But as I mentioned, =
these questions take the thread in a direction that diverges from resolutio=
n.<br>
&gt; <br>
&gt; I have not suggested that any document includes anything. My comment i=
s: what is the reason why BFD Echo is out of scope? Technically, this is a =
single hop at the VXLAN level for BFD.<br>
&gt; <br>
&gt; <br>
&gt; Best,<br>
&gt; <br>
&gt; Carlos.<br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; Regards,<br>
&gt; &gt; Greg<br>
&gt; &gt; <br>
&gt; &gt; On Thu, Jun 20, 2019 at 2:08 PM Carlos Pignataro (cpignata) &lt;<=
a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco.com</=
a>&gt; wrote:<br>
&gt; &gt; Hello, Greg,<br>
&gt; &gt; <br>
&gt; &gt; Yes, happy too answer your question.<br>
&gt; &gt; <br>
&gt; &gt; First, however, let me make two quick observations on the exchang=
e:<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0=E2=80=A2 You seem to be picking very s=
pecific fragments or sub-topics from my comments, and following up on those=
 only.<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0=E2=80=A2 I=E2=80=99m happy to continue=
 answering these questions, but they are orthogonal to (and consequently a =
distraction from) the initial comments I raised.<br>
&gt; &gt; <br>
&gt; &gt; Now, your question: the BFD Echo packet format is generically spe=
c=E2=80=99ed and defined in Section 5 of RFC 5880:<br>
&gt; &gt; <a href=3D"https://tools.ietf.org/html/rfc5880#section-5" rel=3D"=
noreferrer" target=3D"_blank">https://tools.ietf.org/html/rfc5880#section-5=
</a><br>
&gt; &gt; <br>
&gt; &gt; The most relevant part is this:<br>
&gt; &gt; <br>
&gt; &gt;=C2=A0 =C2=A0 The payload of a BFD Echo packet is a local matter, =
since only the<br>
&gt; &gt;=C2=A0 =C2=A0 sending system ever processes the content.=C2=A0 The=
 only requirement is<br>
&gt; &gt;=C2=A0 =C2=A0 that sufficient information is included to demultipl=
ex the received<br>
&gt; &gt;=C2=A0 =C2=A0 packet to the correct BFD session after it is looped=
 back to the<br>
&gt; &gt;=C2=A0 =C2=A0 sender. <br>
&gt; &gt; <br>
&gt; &gt; Since the remote system does not process the echo packet content,=
 it is a local matter only. And given the fact that, as such, there is no i=
nteroperability implications, there is no need to over-specify the packet f=
ormat. The only requirement is that the sending system needs to be able to =
map it to a session when it boomerangs back.<br>
&gt; &gt; <br>
&gt; &gt; No, it is generally not (i.e., does not need to be, but there=E2=
=80=99s freedom to potentially be) a BFD control packet. <br>
&gt; &gt; Yes, it can be something else.<br>
&gt; &gt; <br>
&gt; &gt; That said, the packet format for BFD Echo has, to my analysis and=
 understanding, no relevancy on the questions below.<br>
&gt; &gt; <br>
&gt; &gt; Best,<br>
&gt; &gt; <br>
&gt; &gt; Carlos.<br>
&gt; &gt; <br>
&gt; &gt;&gt; On Jun 20, 2019, at 12:50 AM, Greg Mirsky &lt;<a href=3D"mail=
to:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt; w=
rote:<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; Hello Carlos,<br>
&gt; &gt;&gt; could you please refer me to the specification of BFD that de=
fines the message format that is used in the Echo mode of BFD. Is it the BF=
D control packet? Something else?<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; Regards,<br>
&gt; &gt;&gt; Greg<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; On Thu, Jun 20, 2019 at 11:09 AM Carlos Pignataro (cpignata) =
&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco.=
com</a>&gt; wrote:<br>
&gt; &gt;&gt; Hello, Greg,<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; Please see inline.<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; On Jun 19, 2019, at 9:58 PM, Greg Mirsky &lt;<a href=3D"m=
ailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt=
; wrote:<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Hello Carlos,<br>
&gt; &gt;&gt;&gt; thank you for the expedient clarification.<br>
&gt; &gt;&gt;&gt; To your questions on demultiplexing BFD control packets w=
ith the zero value of the Your Discriminator field:<br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0=E2=80=A2 only BFD control packets wit=
h the zero value of the Your Discriminator field are demultiplexed using th=
e information of the inner IP header. I believe that the text is clear and =
requires that all fields of the inner IP header must be used to demultiplex=
 a received BFD control packet with the zero value in the Your Discriminato=
r field. Which of the fields an implementation uses to create multiple BFD =
sessions between the pair of VTEPs is implementation specific.<br>
&gt; &gt;&gt; This text is repeating was is in the draft, but does not answ=
er any of my questions.<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; For example:<br>
&gt; &gt;&gt; 1. &quot;that all fields of the inner IP header must be used =
to demultiplex a received BFD control packet=E2=80=9D<br>
&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0-&gt; The text does not say =E2=80=9Call f=
ields=E2=80=9D, but regardless, do you mean the DSCP and the Evil Bit? IPv6=
 Flow Label? How *exactly*?<br>
&gt; &gt;&gt; 2. How is the mapping of IP (not UDP?) fields to BFD session =
done?<br>
&gt; &gt;&gt; 3. How is this state created and maintained? <br>
&gt; &gt;&gt; 4. Since this is a set of fields on which two systems need to=
 agree (which fields from the inner IP/UDP are mapped needs to be understoo=
d by both systems), it cannot be =E2=80=9Cimplementation specific=E2=80=9D.=
 Further, the text does not say so.<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; To your point on the level Echo mode of BFD is specified =
in RFC 5880 I&#39;ll quote the opinion of Jeffrey Haas from the discussion =
of comments from Shawn Emery on behalf of the SecDir. Shawn had commented:<=
br>
&gt; &gt;&gt;&gt; Echo BFD is out of scope for the document, but does not d=
escribe the reason for this or why state<br>
&gt; &gt;&gt;&gt; this at all?<br>
&gt; &gt;&gt;&gt; I&#39;ve responded:<br>
&gt; &gt;&gt;&gt; GIM&gt;&gt; I think that the main reason is that the BFD =
Echo mode is underspecified. RFC 5880 defined some of the mechanisms relate=
d to the Echo mode, but more standardization work may be required.=C2=A0 <b=
r>
&gt; &gt;&gt;&gt; And Jeffrey Haas had added:<br>
&gt; &gt;&gt;&gt; Speaking as a BFD chair, this is the relevant observation=
.=C2=A0 BFD Echo is<br>
&gt; &gt;&gt;&gt; underspecified to the point where claiming compliance is =
difficult at best.<br>
&gt; &gt;&gt;&gt; In general, it relies on single-hop and the ability to ha=
ve the remote Echo<br>
&gt; &gt;&gt;&gt; client loop the packets. <br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; BFD Echo cannot be specified in RFC 5880 base spec because it=
 is application specific.<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; This packet loop may not be practical for several encapsu=
lations and thus is<br>
&gt; &gt;&gt;&gt; out of scope for such encapsulations.=C2=A0 Whether this =
is practical for vxlan<br>
&gt; &gt;&gt;&gt; today, or in the presence of future extensions to vxlan i=
s left out of scope<br>
&gt; &gt;&gt;&gt; for the core proposal.=C2=A0 <br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; The question remains: for VXLAN encapsulation, this is like a=
 single hop as far as BFD is concerned (single hop VXLAN tunnel).<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; Since RFC 5881 defines Echo for single hop, can you please el=
aborate (in the document) why is out of scope or how it can work?<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; Best,<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt; Carlos.<br>
&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Will respond to other questions in a separate mail.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Regards,<br>
&gt; &gt;&gt;&gt; Greg<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; On Thu, Jun 20, 2019 at 10:31 AM Carlos Pignataro (cpigna=
ta) &lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@ci=
sco.com</a>&gt; wrote:<br>
&gt; &gt;&gt;&gt; Hello, Greg,<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt; On Jun 19, 2019, at 9:09 PM, Greg Mirsky &lt;<a href=
=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</=
a>&gt; wrote:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Hi Carlos,<br>
&gt; &gt;&gt;&gt; &gt; thank you for reminding of our continued discussion =
with Joel. We are seeking comments from VXLAN experts and much appreciate i=
f you have insights on VXLAN to share.<br>
&gt; &gt;&gt;&gt; &gt; I&#39;ve got some clarifying questions before I can =
respond to you.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Sure.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt; To which stage of the three-way handshake you refer =
as &quot;initial demultiplexing&quot;? I couldn&#39;t find this term in RFC=
 5880.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; =E2=80=9CInitial demultiplexing&quot; is a well-known ter=
m in BFD, referring to the &quot;demultiplexing of the initial packets&quot=
;, BFD Control packet with YourDisc being zero.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; In RFC 5880, see Section 6.3.<br>
&gt; &gt;&gt;&gt; <a href=3D"https://tools.ietf.org/html/rfc5880#section-6.=
3" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/rfc5880=
#section-6.3</a><br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 The method of demultiplexing the initial pac=
kets (in which Your<br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 Discriminator is zero) is application depend=
ent, and is thus outside<br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 the scope of this specification.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Since initial demultiplexing is indeed application specif=
ic, different for one-hop versus multi-hop and dependent upon whether a sin=
gle or multiple sessions are allowed between a pair of endpoints, I added b=
elow two other relevant citations, from application specific BFD specs:<br>
&gt; &gt;&gt;&gt; 1. <a href=3D"https://tools.ietf.org/html/rfc5883#section=
-4" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/rfc588=
3#section-4</a> <br>
&gt; &gt;&gt;&gt; 2. <a href=3D"https://tools.ietf.org/html/rfc5882#section=
-6" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/rfc588=
2#section-6</a><br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt; Regarding the applicability of the Echo mode, thank =
you for pointing to the need for stricter terminology, the Echo mode, as de=
fined in RFC 5880, is underspecified and it will require additional standar=
dization.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; No. BFD Echo is not underspecified in RFC 5880.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Please read S5: <a href=3D"https://tools.ietf.org/html/rf=
c5880#section-5" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.or=
g/html/rfc5880#section-5</a><br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 BFD Echo packets are sent in an encapsulatio=
n appropriate to the<br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 environment.=C2=A0 See the appropriate appli=
cation documents for the<br>
&gt; &gt;&gt;&gt;=C2=A0 =C2=A0 specifics of particular environments.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; BFD Echo is application dependent. <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Therefore, for example, single-hop BFD in RFC 5881 specif=
ies BFD Echo for that application.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Hence, my question stands: why is this draft claiming BFD=
 Echo is out of scope for this BFD application document?<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt; Future drafts may explore and define how the Echo mo=
de of BFD is used over VXLAN tunnels.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; See above.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt; Will review and respond to the remaining questions s=
oon.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Thank you. <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; The &quot;remaining questions&quot; are still all the que=
stions below :-)<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Best,<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; Carlos.<br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Regards,<br>
&gt; &gt;&gt;&gt; &gt; Greg<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; On Thu, Jun 20, 2019 at 9:14 AM Carlos Pignataro (cp=
ignata) &lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignat=
a@cisco.com</a>&gt; wrote:<br>
&gt; &gt;&gt;&gt; &gt; Hi,<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; I have not reviewed this draft before, but triggered=
 by this email, and briefly scanning through a couple of sections, it is un=
clear to me how some of the mechanics work.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; There are some major issues with the Mac usage and a=
ssociation, as Joel Halpern mentioned in his Rtg Dir review.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; And, additionally, please consider the following com=
ments and questions:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 1. Underspecification for initialization and initial=
 demultiplexing.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; This document allows multiple BFD sessions between a=
 single pair of VTEPs:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 An<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 implementation that supports this speci=
fication MUST be able to<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 control the number of BFD sessions that=
 can be created between the<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 same pair of VTEPs.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; The implication of this is that BFD single-hop initi=
alization procedures will not work. Instead, there is a need to map the ini=
tial demultiplexing.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; This issue is explained in RFCs 5882 and 5883: <a hr=
ef=3D"https://tools.ietf.org/html/rfc5883#section-4" rel=3D"noreferrer" tar=
get=3D"_blank">https://tools.ietf.org/html/rfc5883#section-4</a> and <a hre=
f=3D"https://tools.ietf.org/html/rfc5882#section-6" rel=3D"noreferrer" targ=
et=3D"_blank">https://tools.ietf.org/html/rfc5882#section-6</a><br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Section 5.1 says:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 For such packets, the BFD session MUST =
be identified<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 using the inner headers, i.e., the sour=
ce IP, the destination IP, and<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 the source UDP port number present in t=
he IP header carried by the<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 payload of the VXLAN encapsulated packe=
t.=C2=A0 The VNI of the packet<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 SHOULD be used to derive interface-rela=
ted information for<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 demultiplexing the packet.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; But this does not really explain how to do the initi=
al demultiplexing. Does each BFD session need to have a separate inner sour=
ce IP address? Or source UDP port? And how ofter are they recycled or kept =
as state? How are these mapped?<br>
&gt; &gt;&gt;&gt; &gt; Equally importantly, which side is Active?<br>
&gt; &gt;&gt;&gt; &gt; And what if there=E2=80=99s a race condition with bo=
th sides being Active and setting up redundant sessions?<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 1.b. By the way, based on this, using S-BFD [RFC 788=
0] might be easier to demux.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 2. Security<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; This document says that the TTL in the inner packet =
carrying BFD is set to 1. However, RFC 5880 says to use GTSM [RFC 5082], i.=
e., a value of 255..<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Why is GTSM not used here?<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 3. ECMP and fate-sharing under-specification:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Section 4.1. says:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 The Outer IP/UDP<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 and VXLAN headers MUST be encoded by th=
e sender as defined in<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 [RFC7348].<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; And RFC 7348 says:<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0-=C2=A0 Source Port:=C2=A0=
 It is recommended that the UDP source port number<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 be calculated usin=
g a hash of fields from the inner packet --<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 one example being =
a hash of the inner Ethernet frame&#39;s headers.<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 This is to enable =
a level of entropy for the ECMP/load-<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 balancing of the V=
M-to-VM traffic across the VXLAN overlay.<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 When calculating t=
he UDP source port number in this manner, it<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 is RECOMMENDED tha=
t the value be in the dynamic/private port<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 range 49152-65535 =
[RFC6335].<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Based on this, depending on the hashing calculation,=
 the outer source UDP port can be different leading to different ECMP treat=
ment. Does something else need to be specified here in regards to the outer=
 UDP source port?<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 4. Section 7 says that =E2=80=9C Support for echo BF=
D is outside the scope of this document=E2=80=9D. <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Assuming this means =E2=80=9CBFD Echo mode=E2=80=9D,=
 why is this out of scope? If this is a single logical hop underneath VXLAN=
, what=E2=80=99s preventing the use of Echo? Echo=E2=80=99s benefits are hu=
ge.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 5. Terminology<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 Implementations SHOULD ensure that the =
BFD<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 packets follow the same lookup path as =
VXLAN data packets within the<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 sender system.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; What is a =E2=80=9Clook up path within a sender syst=
em=E2=80=9D?<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; 6. Deployment scenarios<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; S3 says:<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 Figure 1 illustrates the scenario with =
two servers, each of them<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 hosting two VMs.=C2=A0 The servers host=
 VTEPs that terminate two VXLAN<br>
&gt; &gt;&gt;&gt; &gt; [=E2=80=A6]<br>
&gt; &gt;&gt;&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 Figure 1: Reference VXLAN Domain<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; However, RFC 7348 Figure 3 lists that as one deploym=
ent scenario, not as =E2=80=9Cthe scenario=E2=80=9D and =E2=80=9CThe Refere=
nce VXLAN Domain=E2=80=9D.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Best,<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt; Carlos.<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; On Jun 17, 2019, at 12:58 AM, Greg Mirsky &lt;<a=
 href=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.=
com</a>&gt; wrote:<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Hi Oliver,<br>
&gt; &gt;&gt;&gt; &gt;&gt; thank you for your thorough review, clear and de=
tailed questions. My apologies for the delay to respond. Please find my ans=
wers below in-line tagged GIM&gt;&gt;.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Regards,<br>
&gt; &gt;&gt;&gt; &gt;&gt; Greg<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; On Fri, May 31, 2019 at 12:38 PM Olivier Bonaven=
ture via Datatracker &lt;<a href=3D"mailto:noreply@ietf.org" target=3D"_bla=
nk">noreply@ietf.org</a>&gt; wrote:<br>
&gt; &gt;&gt;&gt; &gt;&gt; Reviewer: Olivier Bonaventure<br>
&gt; &gt;&gt;&gt; &gt;&gt; Review result: Ready with Issues<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; This document has been reviewed as part of the t=
ransport area review team&#39;s<br>
&gt; &gt;&gt;&gt; &gt;&gt; ongoing effort to review key IETF documents. The=
se comments were written<br>
&gt; &gt;&gt;&gt; &gt;&gt; primarily for the transport area directors, but =
are copied to the document&#39;s<br>
&gt; &gt;&gt;&gt; &gt;&gt; authors and WG to allow them to address any issu=
es raised and also to the IETF<br>
&gt; &gt;&gt;&gt; &gt;&gt; discussion list for information.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; When done at the time of IETF Last Call, the aut=
hors should consider this<br>
&gt; &gt;&gt;&gt; &gt;&gt; review as part of the last-call comments they re=
ceive. Please always CC<br>
&gt; &gt;&gt;&gt; &gt;&gt; <a href=3D"mailto:tsv-art@ietf.org" target=3D"_b=
lank">tsv-art@ietf.org</a> if you reply to or forward this review.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; I have only limited knowledge of VXLAN and do no=
t know all subtleties of BFD.<br>
&gt; &gt;&gt;&gt; &gt;&gt; This review is thus more from a generalist than =
a specialist in this topic.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Major issues<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 4 requires that &quot; Implementations S=
HOULD ensure that the BFD<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 packets follow the same lookup path=
 as VXLAN data packets within the<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 sender system.&quot;<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Why is this requirement only relevant for the lo=
okup path on the sender system<br>
&gt; &gt;&gt;&gt; &gt;&gt; ? What does this sentence really implies ?<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; RFC 5880 set the scope of the fault =
detection of BFD protocol as <br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 ... the bidirectional path between =
two forwarding engines, including<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 interfaces, data link(s), and to th=
e extent possible the forwarding<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 engines themselves ...<br>
&gt; &gt;&gt;&gt; &gt;&gt; The requirement aimed to the forwarding engine o=
f a BFD system that transmits BFD control packets over VXLAN tunnel.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Is it a requirement that the BFD packets follow =
the same path as the data<br>
&gt; &gt;&gt;&gt; &gt;&gt; packet for a given VXLAN ? I guess so. In this c=
ase, the document should<br>
&gt; &gt;&gt;&gt; &gt;&gt; discuss how Equal Cost Multipath could affect th=
is.<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; I think that ECMP environment is mor=
e likely to be experienced by a transit node in the underlay. If the BFD se=
ssion is used to monitor the specific underlay path, then, I agree, we shou=
ld explain that using the VXLAN payload information to draw path entropy ma=
y cause data and BFD packets following different underlay routes. But, on t=
he other hand, that is the case for OAM and fault detection in all overlay =
networks in general.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Minor issues<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 1<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; You write &quot;The asynchronous mode of BFD, as=
 defined in [RFC5880],<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 can be used to monitor a p2p VXLAN tunnel.=
&quot;<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Why do you use the word can ? It is a possibilit=
y or a requirement ?<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; In principle, BFD Demand mode may be=
 used to monitor p2p paths as well, I agree, will re-word to more assertive=
:<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 The asynchronous mode of BFD, as defined i=
n [RFC5880],<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 is used to monitor a p2p VXLAN tunnel.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; NVE has not been defined before and is not in th=
e terminology.<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; Will add to the Terminology and expa=
nd as:<br>
&gt; &gt;&gt;&gt; &gt;&gt; NVE=C2=A0 =C2=A0 =C2=A0 =C2=A0 Network Virtualiz=
ation Endpoint <br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; This entire section is not easy to read for an o=
utsider.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 3<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; VNI has not been defined<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; Will add to the Terminology section:=
<br>
&gt; &gt;&gt;&gt; &gt;&gt; VNI=C2=A0 =C2=A0 VXLAN Network Identifier (or VX=
LAN Segment ID)<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Figure 1 could take less space<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; Yes, can make it bit denser. Would t=
he following be an improvement?<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 <br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0+------------+--------=
-----+<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 =C2=A0 =C2=A0 =
=C2=A0 Server 1=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0| +----+----+=C2=A0 +-=
---+----+ |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0| |VM1-1=C2=A0 =C2=A0 =
|=C2=A0 |VM1-2=C2=A0 =C2=A0 | |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0| |VNI 100=C2=A0 |=C2=
=A0 |VNI 200=C2=A0 | |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0| |=C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0|=C2=A0 |=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0| +---------+=C2=A0 +-=
--------+ |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0| Hypervisor VTEP (IP1=
)=C2=A0 =C2=A0 |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0+---------------------=
-----+<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 =C2=A0+-----=
--------+<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 =C2=A0|=C2=
=A0 =C2=A0Layer 3=C2=A0 =C2=A0|<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0+---|=C2=A0 =C2=A0Ne=
twork=C2=A0 =C2=A0|<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0+-----=
--------+<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0|<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0+-----------+<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 +------------+-------------+<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 |=C2=A0 =C2=A0 Hypervisor VTEP (IP2) |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 | +----+----+=C2=A0 +----+----+ |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 | |VM2-1=C2=A0 =C2=A0 |=C2=A0 |VM2-2=C2=A0 =C2=A0 =
| |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 | |VNI 100=C2=A0 |=C2=A0 |VNI 200=C2=A0 | |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 | |=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 |=C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 | +---------+=C2=A0 +---------+ |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 |=C2=A0 =C2=A0 =C2=A0 Server 2=C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 |<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 +--------------------------+<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 4<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; I do not see the benefits of having one paragrap=
h in Section 4 followed by only<br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 4.1<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; Will merge Section 4.1 into 4 with m=
inor required re-wording:<br>
&gt; &gt;&gt;&gt; &gt;&gt; 4.=C2=A0 BFD Packet Transmission over VXLAN Tunn=
el<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 BFD packet MUST be encapsulated and=
 sent to a remote VTEP as<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 explained in this section.=C2=A0 Im=
plementations SHOULD ensure that the<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 BFD packets follow the same lookup =
path as VXLAN data packets within<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 the sender system.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 BFD packets are encapsulated in VXL=
AN as described below.=C2=A0 The VXLAN<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 packet format is defined in Section=
 5 of [RFC7348].=C2=A0 The Outer IP/UDP<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 and VXLAN headers MUST be encoded b=
y the sender as defined in<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 [RFC7348].<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 4.1<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; The document does not specify when a dedicated M=
AC address or the MAC address<br>
&gt; &gt;&gt;&gt; &gt;&gt; of the destination VTEP must be used. This could=
 affect the interoperability of<br>
&gt; &gt;&gt;&gt; &gt;&gt; implementations. Should all implementations supp=
ort both the dedicated MAC<br>
&gt; &gt;&gt;&gt; &gt;&gt; address and the destination MAC address ?<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; After further discussion, authors de=
cided to remove the request for the dedicated MAC address allocation. Only =
the MAC address of the remote VTEP must be used as the destination MAC addr=
ess in the inner Ethernet frame. Please check the attached diff between the=
 -07 and the working versions or the working version of the draft.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; It is unclear from this section whether IPv4 ins=
ide IPv6 and the opposite<br>
&gt; &gt;&gt;&gt; &gt;&gt; should be supported or not.<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; Any combination of outer IPvX and in=
ner IPvX is possible.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 5.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; If the received packet does not match the dedica=
ted MAC address nor the MAC<br>
&gt; &gt;&gt;&gt; &gt;&gt; address of the VTEP, should the packet be silent=
ly discarded or treated<br>
&gt; &gt;&gt;&gt; &gt;&gt; differently ?<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; As I&#39;ve mentioned earlier, autho=
rs have decided to remove the use of the dedicated MAC address for BFD over=
 VXLAN.<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 5.1<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Is this a modification to section 6.3 of RFC5880=
 ? This is not clear<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; I think that this section is not mod=
ification but the definition of the application-specific procedure that is =
outside the scope of RFC 5880:<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 The method of demultiplexing the in=
itial packets (in which Your<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 Discriminator is zero) is applicati=
on dependent, and is thus outside<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 the scope of this specification.<br=
>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; Section 9<br>
&gt; &gt;&gt;&gt; &gt;&gt; <br>
&gt; &gt;&gt;&gt; &gt;&gt; The sentence &quot; Throttling MAY be relaxed fo=
r BFD packets<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 based on port number.&quot; is uncl=
ear.<br>
&gt; &gt;&gt;&gt; &gt;&gt; GIM&gt;&gt; Yes, thank you for pointing to this.=
 The updated text, in the whole paragraph, is as follows:<br>
&gt; &gt;&gt;&gt; &gt;&gt; NEW TEXT:<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 The document requires setting the i=
nner IP TTL to 1, which could be<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 used as a DDoS attack vector.=C2=A0=
 Thus the implementation MUST have<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 throttling in place to control the =
rate of BFD control packets sent<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 to the control plane.=C2=A0 On the =
other hand, over aggressive throttling<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 of BFD control packets may become t=
he cause of the inability to form<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 and maintain BFD session at scale.=
=C2=A0 Hence, throttling of BFD control<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 packets SHOULD be adjusted to permi=
t BFD to work according to its<br>
&gt; &gt;&gt;&gt; &gt;&gt;=C2=A0 =C2=A0 procedures.<br>
&gt; &gt;&gt;&gt; &gt;&gt; &lt;draft-ietf-bfd-vxlan-08.txt&gt;&lt;Diff_ dra=
ft-ietf-bfd-vxlan-07.txt - draft-ietf-bfd-vxlan-08.txt.html&gt;<br>
&gt; &gt;&gt;&gt; &gt; <br>
&gt; &gt;&gt;&gt; <br>
&gt; &gt;&gt; <br>
&gt; &gt; <br>
&gt; <br>
<br>
</blockquote></div></div>

--0000000000008a4a2a058d5c3b7f--


From nobody Thu Jul 11 06:25:40 2019
Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CE2B120052; Wed, 10 Jul 2019 18:14:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Tcw4F7Kw; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=VPTBVvxO
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A-66p6YjYhtA; Wed, 10 Jul 2019 18:14:51 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 477D7120019; Wed, 10 Jul 2019 18:14:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=125203; q=dns/txt; s=iport; t=1562807690; x=1564017290; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=29MdkarXt/zWUHD6jUhlvxRISEbUWC6ul23aT7P4sI8=; b=Tcw4F7Kwg/LcwuJwz6G+0U1swmaXymTn7osUep0BCoxF0O9UbMI+MVtD VD3sSZ/5e9OkHgSxj9slO21PYnLC9OF2H7PG4cIrGXwSI1bx/D+doc486 dan2h+wiBWwKu6rc2N4zqajn4up08jQuFbQOIej3iczXAVq7hENgwRfad w=;
IronPort-PHdr: =?us-ascii?q?9a23=3A5vpYMhLRXoSjk4sm19mcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvKd2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXEbjLfHsZjAzNM9DT1RiuXq8NBsdFQ=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ATAABBjCZd/5JdJa1lGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBVQMBAQEBCwGBFC8kBScDalUgBAsoCoQSg0cDjkaCNiWJT41?= =?us-ascii?q?5gS4UgRADVAkBAQEMAQEjCgIBAYRAAheCNyM2Bw4BAwEBBAEBAgEFbYU8DIV?= =?us-ascii?q?KAQEBAwESCAEIBBkBASUECQUBBAsCAQgYIAECBAMCAgIfERQRAgQOBSKDAAG?= =?us-ascii?q?BHU0DDg8BAgyhfwKBOIhgcX8zgnkBAQWFAg0LghIDBoE0AYRxhCSBHoErF4F?= =?us-ascii?q?AP4EQAScME4JMPoIaRwEBAgGBKgEBCwYCAQgVCBAVAQuCUjKCJot8JC0CgXQ?= =?us-ascii?q?vhH2IaY0VLUAJAoIZhleEbYRPBINwG4IshyKEDIV8gluBUY5ghhKBdIsBHjc?= =?us-ascii?q?GgjACBAIEBQIOAQEFgVcBMGdxcBU7KgGCQT6CAwsBFxRvAQiCQoUUhT4BcgG?= =?us-ascii?q?BKIwmgTEBgSABAQ?=
X-IronPort-AV: E=Sophos;i="5.63,476,1557187200";  d="scan'208,217";a="591694388"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Jul 2019 01:14:46 +0000
Received: from XCH-RCD-015.cisco.com (xch-rcd-015.cisco.com [173.37.102.25]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id x6B1Ejjf007134 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 11 Jul 2019 01:14:46 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-RCD-015.cisco.com (173.37.102.25) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 10 Jul 2019 20:14:45 -0500
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 10 Jul 2019 20:14:44 -0500
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 10 Jul 2019 20:14:43 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Wi7ZqP76f9zLcp7T37w+HZ7KFuh0UZ0VaG61EsfkkshobHLSc3TPYEXMSsVndUSSeOP/dP7D9jgdYvopG3CQiR8n9YUMokoFrWlxgXViylzuRlzKG33iVG7adD6iGvZW60B3gbbhLLjUarhNmVjyg+F21Zm+XubpLQ+FSC8dQtjZE48grZ1g/xZeG9Owh8+d+NhrrxlbSdVKZ68TBomyskcHuijOyGUAF2JGnaRzyirC+Q6uJo7y9U6tKm1yeY8d9VAbHGxum+/psK6yDa0uAZgnyzxN7wDt877BcMyrpFZMsRtxvxXSsLGlZY/ib8k/f2iET+clc99qEgBvqfn7UA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=29MdkarXt/zWUHD6jUhlvxRISEbUWC6ul23aT7P4sI8=; b=IQuUtShD4XJzpx6+tegLZNwzKk6ziJYLdiTALWGvxvow6V4i7mZ1BsTyPnQK9ef/DkAH50Zyp1tiCub0+OLarI0SFgnySbs9/hPtsDKgykmaLGpAZ3DfOSWpECt00SbElu/6xKwDVtI8Vd8P/wND0VQKQrhM5bMeySEN+hlvHP2PDIf+Us9mC1ve3fgWaxQ4n6h1VRlKwwFsNPusqRxomeQt+LNe/iZoz5ReN4/gPTc+a713NvfVEvZCQ7cLRn7d+p8XjbKnvtb2YevW9gDwHYLmTiCYTL8oNo4WQ0ATLspXj9DLXI+NcG9ROPrNqyd/F26ctslgq0LQ8luKip3gwQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=29MdkarXt/zWUHD6jUhlvxRISEbUWC6ul23aT7P4sI8=; b=VPTBVvxOZeq0jZ7vTK1txU9BjpnNOsEcuyxAlxk8Mr9jZS/GgFzqY8XepsT8BUHJGfEb4sPF90ZT9OcIFDjYXbZQ727H98Yf34snWAcWnaVsMNkpiRwOsvq0zTO4uvNfhZHYnXtLu2+bh9p2SahGLJHeIPKW630MuzOtuDzk/po=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB3490.namprd11.prod.outlook.com (20.177.206.221) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2073.10; Thu, 11 Jul 2019 01:14:42 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998%3]) with mapi id 15.20.2073.008; Thu, 11 Jul 2019 01:14:41 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: "tsv-art@ietf.org" <tsv-art@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>, "draft-ietf-bfd-vxlan.all@ietf.org" <draft-ietf-bfd-vxlan.all@ietf.org>, Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>, IETF list <ietf@ietf.org>
Subject: Re: Level of standardization of the Echo mode of BFD [Re: Tsvart last call review of draft-ietf-bfd-vxlan-07]
Thread-Topic: Level of standardization of the Echo mode of BFD [Re: Tsvart last call review of draft-ietf-bfd-vxlan-07]
Thread-Index: AQHVJyO4ZUHeu4GAiUWD+HbCVzn3tKaj/jqAgAAF+ICAAs3NgIAH7VsAgApo2ICAC3vJgIAAGcWA
Date: Thu, 11 Jul 2019 01:14:41 +0000
Message-ID: <19BA9CC8-7603-41D0-82FC-4E4564D3DF28@cisco.com>
References: <155933149484.6565.7386019489022348116@ietfa.amsl.com> <CA+RyBmXu-F0cWDkBydE_aJaVpUv=k1otqUCc7NdRW4pnBK3tgA@mail.gmail.com> <14822B96-D3C6-495E-8661-198068F72ABA@cisco.com> <CA+RyBmUMbW=B3FNmqiQNmMLM27f9G+MeRL5MrAnCd04EP3vmrQ@mail.gmail.com> <8237FE8D-937E-4BCB-B1A3-89C2B3CDC51C@cisco.com> <CA+RyBmXAQ1esWKa8C6cgnn93YTyTh=JFUt187TS56bNND1OJOA@mail.gmail.com> <0B9FDA17-7F13-4FEC-AE97-40BC9D72C87B@cisco.com> <CA+RyBmVgQ8VXZ-A0-0jKqAmSRvJxg4DbZiRhW67jN224tsS3+Q@mail.gmail.com> <BADB8CA6-FCAC-47A3-8B06-F82E98A89549@cisco.com> <CA+RyBmVgV31+Zi+AkaOakm9FwbHUgr4OoYcUhfJtSVGPC-m5_A@mail.gmail.com> <BCEA05ED-5921-4E0D-B76E-2024F3B78ED7@cisco.com> <CA+RyBmWODaxGUYDEjAOaLzJCR6qx3w1yet1Y0BeP7RAqusExJQ@mail.gmail.com> <B976AA48-2C90-48CC-B087-B2528797AF35@cisco.com> <CA+RyBmWHr1yYjGZC5QTWViuuc=-tnL1yUn6tbcVJnyDryReXSQ@mail.gmail.com>
In-Reply-To: <CA+RyBmWHr1yYjGZC5QTWViuuc=-tnL1yUn6tbcVJnyDryReXSQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com; 
x-originating-ip: [173.38.117.92]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 191942c6-23eb-4158-1a18-08d7059d2715
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB3490; 
x-ms-traffictypediagnostic: BL0PR11MB3490:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <BL0PR11MB3490245D36017E5D542975D6C7F30@BL0PR11MB3490.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 0095BCF226
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(346002)(136003)(366004)(396003)(376002)(51444003)(199004)(189003)(236005)(76176011)(53936002)(53946003)(66946007)(6246003)(6916009)(6306002)(54896002)(11346002)(6512007)(76116006)(3846002)(446003)(71200400001)(71190400001)(229853002)(30864003)(186003)(26005)(316002)(66556008)(53546011)(6506007)(66476007)(64756008)(86362001)(102836004)(6436002)(66446008)(54906003)(966005)(7736002)(36756003)(14454004)(66066001)(8936002)(81166006)(33656002)(561944003)(25786009)(50226002)(1411001)(6486002)(4326008)(57306001)(99286004)(81156014)(6116002)(68736007)(2616005)(8676002)(2906002)(478600001)(476003)(606006)(14444005)(486006)(5024004)(256004)(5660300002)(579004)(559001)(569006); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3490; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: DD3ySbSiP/xTrfuKOPhBdKAMYblfShdYE8Zro1Bzeos9hShiM6BnDbYXRpl9VM0dVo9UVli0FUehvloJiMSOjyYrhGq2yjCICEvaJgrlkZVbs/YRCPjba6Y2L66csUWYRNvK2VHSoPts+cZfjHvQn5tOJULN6N0tTUnjmX8vTTOZf1lmKANOLpG7nOectw0qR0tNb07CKIrA7nr8tpfN50GRPahO0f0+mncbUSS8L0DhnG4pcw31QYR5+mX2w2zIhbbwPbS/p6+TIVXNukchSwdhLGYGsEFWuYjljHVhOFzrr50oIpjsK/2HE2pH0QFRQ4pugGpk2wW3rylAqx/my15xqi74v/XpnXlA5NMH2W8Soyw1k3pzcppUSoZAb9t80IguN9N28m00ZpVRym/XKzvz9Ry9byWy3Ryx12dLHBg=
Content-Type: multipart/alternative; boundary="_000_19BA9CC8760341D082FC4E4564D3DF28ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 191942c6-23eb-4158-1a18-08d7059d2715
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jul 2019 01:14:41.7974 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3490
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.25, xch-rcd-015.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/vYMgVh6U8-GQKmqdojnEfUCyMWg>
X-Mailman-Approved-At: Thu, 11 Jul 2019 06:25:32 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jul 2019 01:14:57 -0000

--_000_19BA9CC8760341D082FC4E4564D3DF28ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_19BA9CC8760341D082FC4E4564D3DF28ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <B71A39276E0DDD49800F2F1A5CF8B18F@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy
YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgbGluZS1icmVhazogYWZ0
ZXItd2hpdGUtc3BhY2U7IiBjbGFzcz0iIj4NClRoYW5rIHlvdSBHcmVnIGZvciBmb2xsb3dpbmcg
dXAgb24gdGhpcyBzcGVjaWZpYyBwb2ludCBmcm9tIG15IGNvbW1lbnRzLiBQbGVhc2Ugc2VlIGlu
bGluZS48YnIgY2xhc3M9IiI+DQo8ZGl2PjxiciBjbGFzcz0iIj4NCjxibG9ja3F1b3RlIHR5cGU9
ImNpdGUiIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iIj5PbiBKdWwgMTAsIDIwMTksIGF0IDc6NDIg
UE0sIEdyZWcgTWlyc2t5ICZsdDs8YSBocmVmPSJtYWlsdG86Z3JlZ2ltaXJza3lAZ21haWwuY29t
IiBjbGFzcz0iIj5ncmVnaW1pcnNreUBnbWFpbC5jb208L2E+Jmd0OyB3cm90ZTo8L2Rpdj4NCjxi
ciBjbGFzcz0iQXBwbGUtaW50ZXJjaGFuZ2UtbmV3bGluZSI+DQo8ZGl2IGNsYXNzPSIiPg0KPGRp
diBkaXI9Imx0ciIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5
OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZh
cmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzog
bm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zv
cm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0
LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIi
Pg0KPGRpdiBkaXI9Imx0ciIgY2xhc3M9IiI+SGkgQ2FybG9zLA0KPGRpdiBjbGFzcz0iIj5hcG9s
b2dpZXMgZm9yIHRoZSBkZWxheWVkIHJlc3BvbnNlLiBQbGVhc2UgZmluZCBteSBhbnN3ZXJzIGlu
LWxpbmUgdGFnZ2VkIEdJTSZndDsmZ3Q7LjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9
IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+UmVnYXJkcyw8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+
R3JlZzwvZGl2Pg0KPC9kaXY+DQo8YnIgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSJnbWFpbF9xdW90
ZSI+DQo8ZGl2IGRpcj0ibHRyIiBjbGFzcz0iZ21haWxfYXR0ciI+T24gV2VkLCBKdWwgMywgMjAx
OSBhdCA5OjM1IEFNIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSAmbHQ7PGEgaHJlZj0ibWFp
bHRvOmNwaWduYXRhQGNpc2NvLmNvbSIgY2xhc3M9IiI+Y3BpZ25hdGFAY2lzY28uY29tPC9hPiZn
dDsgd3JvdGU6PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8YmxvY2txdW90ZSBjbGFzcz0iZ21haWxf
cXVvdGUiIHN0eWxlPSJtYXJnaW46IDBweCAwcHggMHB4IDAuOGV4OyBib3JkZXItbGVmdC13aWR0
aDogMXB4OyBib3JkZXItbGVmdC1zdHlsZTogc29saWQ7IGJvcmRlci1sZWZ0LWNvbG9yOiByZ2Io
MjA0LCAyMDQsIDIwNCk7IHBhZGRpbmctbGVmdDogMWV4OyI+DQpIZWxsbywgR3JlZyw8YnIgY2xh
c3M9IiI+DQo8YnIgY2xhc3M9IiI+DQpCZWZvcmUgeW91IGFza2VkIGFib3V0IFJGQyA1ODg0LCBu
b3cgUkZDIDU4ODUsIG5laXRoZXIgb2Ygd2hpY2ggYXJlIHJlZmVyZW5jZXMgaW4gZHJhZnQtaWV0
Zi1iZmQtdnhsYW4tMDcuIFlvdXIgbmV3IHJlcXVlc3QgaXM6PGJyIGNsYXNzPSIiPg0KPGJyIGNs
YXNzPSIiPg0KJmd0OyBJIGhvcGUgdGhhdCB5b3UgY2FuIGhlbHAgbWUgdG8gYW5zd2VyIGEgcXVl
c3Rpb24gcmVsYXRlZCB0byB0aGUgc2NvcGUgb2YgUkZDIDU4ODUuPGJyIGNsYXNzPSIiPg0KPGJy
IGNsYXNzPSIiPg0KQXNraW5nIGFib3V0IFJGQyA1ODg1LCBwdWJsaXNoZWQgOSB5ZWFycyBhZ28s
IGlzIGFub3RoZXIgZGlzdHJhY3Rpb24gZnJvbSB0aGUgcXVlc3Rpb24gYXQgaGFuZC4gSXQgc2Vl
bXMgbGlrZSBhIHRoaXJkLW9yZGVyIHJlZC1oZXJyaW5nLCBoYXN0eSBnZW5lcmFsaXphdGlvbiwg
b3IgYSDigJx5b3UgYWxzb+KAnSBpZiB5b3UgYXJlIGNpdGluZyBSRkNzIEkgY28tYXV0aG9yZWQu
PGJyIGNsYXNzPSIiPg0KPGJyIGNsYXNzPSIiPg0KT25jZSBhZ2FpbiwgaW4gbXkgb3Bpbmlvbiwg
dGhpcyBkb2VzIG5vdCBnZXQgeW91IGNsb3NlciB0byBpbXByb3Zpbmcgb3IgZnVydGhlcmluZyBk
cmFmdC1pZXRmLWJmZC12eGxhbi0wNywgd2hpY2ggc2hvdWxkIGJlIHRoZSBjb21tb24gZ29hbCBv
biB0aGlzIHRocmVhZC48YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQpBcyBhIHJlZnJlc2hl
ciwgdGhpcyB3YXMgbXkgaW5pdGlhbCBxdWVzdGlvbjo8YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IDQuIFNlY3Rpb24gNyBzYXlzIHRoYXQg4oCcIFN1
cHBvcnQgZm9yIGVjaG8gQkZEIGlzIG91dHNpZGUgdGhlIHNjb3BlIG9mIHRoaXMgZG9jdW1lbnTi
gJ0uPHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVy
dGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
Jmd0OyBBc3N1bWluZyB0aGlzIG1lYW5zIOKAnEJGRCBFY2hvIG1vZGXigJ0sIHdoeSBpcyB0aGlz
IG91dCBvZiBzY29wZT88YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+
DQpJIGFtIHJlYWxseSBpbnRlcmVzdGVkIGluIHVuZGVyc3RhbmRpbmcgd2hhdCB0aGUgcmVhc29u
KHMpIGlzIChhcmUpIGZvciBvdXQtc2NvcGluZyBCRkQgRWNoby4gSXMgaXQgYmVjYXVzZSBvZiB0
ZWNobmljYWwgbGltaXRhdGlvbnM/IExhY2sgb2YgbWFya2V0IGRlbWFuZD8gTGFjayBvZiB0aW1l
IHRvIGtub3cgdGhlIGFuc3dlciB0byB0aGlzIHF1ZXN0aW9uPzxiciBjbGFzcz0iIj4NCjxiciBj
bGFzcz0iIj4NCkkgYW0gbm90IGFza2luZyBmb3IgYW55IGNoYW5nZSwganVzdCBhIHF1ZXN0aW9u
IG9mIHdoZXRoZXIgdGhlIGF1dGhvcnMgYW5kIFdHIGNvbnNpZGVyaW5nIHRoZSBST0kgb2YgYWRk
aW5nIEJGRCBFY2hvLjxiciBjbGFzcz0iIj4NCjwvYmxvY2txdW90ZT4NCjxkaXYgY2xhc3M9IiI+
R0lNJmd0OyZndDsgVGhlIHF1ZXN0aW9uIG9mIEJGRCBFY2hvIHN1cHBvcnQgb3ZlciBWWExBTiwg
dG8gdGhlIGJlc3Qgb2YgbXkgcmVjb2xsZWN0aW9uLCBuZXZlciBjYW1lIHVwLiBUaGF0IHNlbnRl
bmNlIHdhcyBhZGRlZCB2ZXJ5IGVhcmx5IGJlZm9yZSBXRyBhZG9wdGVkIHRoZSB3b3JrLg0KPC9k
aXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8ZGl2PjxiciBjbGFz
cz0iIj4NCjwvZGl2Pg0KPGRpdj5Zb3UgYXJlIHJpZ2h0IOKAlCB0aGF0IHRleHQgcmVtYWluZWQg
dW5jaGFpbmVkIHNpbmNlJm5ic3A7ZHJhZnQtc3BhbGxhZ2F0dGktYmZkLXZ4bGFuLTAwLjwvZGl2
Pg0KPGJyIGNsYXNzPSIiPg0KPGJsb2NrcXVvdGUgdHlwZT0iY2l0ZSIgY2xhc3M9IiI+DQo8ZGl2
IGNsYXNzPSIiPg0KPGRpdiBkaXI9Imx0ciIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwg
MCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTog
bm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBs
ZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBw
eDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2lu
ZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjog
bm9uZTsiIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iZ21haWxfcXVvdGUiPg0KPGRpdiBjbGFzcz0i
Ij5BbmQsIGFzIEkgY2FuIHJlY2FsbCwgdGhlcmUgd2VyZSBubyBxdWVzdGlvbnMsIG5vciBzdWdn
ZXN0aW9ucyB0byByZXZpc2l0IHRoZSBzdGF0ZW1lbnQuIFNhaWQgdGhhdCBJIHByb3Bvc2UgdGhl
IGZvbGxvd2luZyB1cGRhdGUgdG8gdGhlIGRvY3VtZW50OjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj4N
Cjx1bCBjbGFzcz0iIj4NCjxsaSBjbGFzcz0iIj5yZW1vdmUgc2VjdGlvbiBFY2hvIEJGRDwvbGk+
PGxpIGNsYXNzPSIiPmFwcGVuZCBJbnRyb2R1Y3Rpb24gc2VjdGlvbiB3aXRoPC9saT48L3VsPg0K
PC9kaXY+DQo8L2Rpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW46IDBweCAwcHggMHB4IDQw
cHg7IGJvcmRlcjogbm9uZTsgcGFkZGluZzogMHB4OyIgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSJn
bWFpbF9xdW90ZSI+DQo8ZGl2IGNsYXNzPSIiPiZxdW90O1RoaXMgc3BlY2lmaWNhdGlvbiBkZXNj
cmliZXMgcHJvY2VkdXJlcyBvbmx5IGZvciBCRkQgYXN5bmNocm9ub3VzIG1vZGUuJnF1b3Q7Jm5i
c3A7PC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCldvdWxkIHRoZXNlIGNoYW5nZXMgYmUg
YWNjZXB0YWJsZSBhbmQgc3VmZmljaWVudCB0byBhZGRyZXNzIHlvdXIgY29uY2VybiB3aXRoIHRo
ZSBzY29wZSBvZiB0aGUgZG9jdW1lbnQ/PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8L2Rpdj4NCjwv
YmxvY2txdW90ZT4NCjxkaXY+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2PknigJlsbCBsZXQg
dGhhdCBkZXRlcm1pbmF0aW9uIGFuZCBjYWxsIHRvIGNoYWlycywgc2hlcGhlcmRzLCBhbmQgQURz
LiBNeSBxdWVzdGlvbiB3YXMgdG8gdW5kZXJzdGFuZCB0aGUgcmF0aW9uYWwgKG9yIGxhY2sgb2Yp
IGZvciBleGNsdWRpbmcgQkZEIEVjaG8uPC9kaXY+DQo8ZGl2PjxiciBjbGFzcz0iIj4NCjwvZGl2
Pg0KPGRpdj5CdXQgaW4gbXkgaHVtYmxlIG9waW5pb24sIHRoZSBjaGFuZ2UgeW91IGFyZSBwcm9w
b3Npbmcgd291bGQgbWFrZSBpdCB3b3JzdDogaXQgd291bGQgY2hhbmdlIHRoZSBsYWNrIG9mIHN1
cHBvcnQgZnJvbSBleHBsaWNpdCB0byBpbXBsaWNpdCAoaS5lLiwgaGFyZGVyIGZvciBhbiBpbXBs
ZW1lbnRvciB0byBmaW5kKS4gSW5zdGVhZCwgSSB3b3VsZCBhY3R1YWxseSBhZGQgc3VwcG9ydCBm
b3IgQkZEIEVjaG8uIEFuZCBpZiB0aGUgV0cgaW50ZW50aW9uYWxseQ0KIGRlY2lkZXMgdG8gbm90
IGFkZCBpdCwgSSB3b3VsZCBsZWF2ZSB0aGUgZG9jdW1lbnQgYXMtaXMuPC9kaXY+DQo8ZGl2Pjxi
ciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdj5CZXN0LDwvZGl2Pg0KPGRpdj48YnIgY2xhc3M9IiI+
DQo8L2Rpdj4NCjxkaXY+4oCUIENhcmxvcyBQLjwvZGl2Pg0KPGJyIGNsYXNzPSIiPg0KPGJsb2Nr
cXVvdGUgdHlwZT0iY2l0ZSIgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSIiPg0KPGRpdiBkaXI9Imx0
ciIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRp
Y2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fw
czogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0
ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7
IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ry
b2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPGRpdiBj
bGFzcz0iZ21haWxfcXVvdGUiPg0KPGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBzdHls
ZT0ibWFyZ2luOiAwcHggMHB4IDBweCAwLjhleDsgYm9yZGVyLWxlZnQtd2lkdGg6IDFweDsgYm9y
ZGVyLWxlZnQtc3R5bGU6IHNvbGlkOyBib3JkZXItbGVmdC1jb2xvcjogcmdiKDIwNCwgMjA0LCAy
MDQpOyBwYWRkaW5nLWxlZnQ6IDFleDsiPg0KPGJyIGNsYXNzPSIiPg0KQmVzdCw8YnIgY2xhc3M9
IiI+DQo8YnIgY2xhc3M9IiI+DQpDYXJsb3MuPGJyIGNsYXNzPSIiPg0KPGJyIGNsYXNzPSIiPg0K
PGJyIGNsYXNzPSIiPg0KJmd0OyBPbiBKdW4gMjYsIDIwMTksIGF0IDk6MjIgUE0sIEdyZWcgTWly
c2t5ICZsdDs8YSBocmVmPSJtYWlsdG86Z3JlZ2ltaXJza3lAZ21haWwuY29tIiB0YXJnZXQ9Il9i
bGFuayIgY2xhc3M9IiI+Z3JlZ2ltaXJza3lAZ21haWwuY29tPC9hPiZndDsgd3JvdGU6PGJyIGNs
YXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7IEhlbGxvIENhcmxvcyw8YnIgY2xhc3M9IiI+DQomZ3Q7
IEkgaG9wZSB0aGF0IHlvdSBjYW4gaGVscCBtZSB0byBhbnN3ZXIgYSBxdWVzdGlvbiByZWxhdGVk
IHRvIHRoZSBzY29wZSBvZiBSRkMgNTg4NS4gSW4gUkZDIDU4ODUgaXMgc3RhdGVkOjxiciBjbGFz
cz0iIj4NCiZndDsmbmJzcDsgJm5ic3A7IFRoaXMgc3BlY2lmaWNhdGlvbiBkZXNjcmliZXMgcHJv
Y2VkdXJlcyBvbmx5IGZvciBCRkQgYXN5bmNocm9ub3VzIG1vZGUuPGJyIGNsYXNzPSIiPg0KJmd0
OyBOZWl0aGVyIGRlbWFuZCBtb2RlLCBub3IgRWNobyBmdW5jdGlvbiBvZiBCRkQgaXMgZXhwbGlj
aXRseSBtZW50aW9uZWQgaW4gUkZDIDU4ODUuIEhlbmNlIG15IHF1ZXN0aW9uIElmIEJGRCBvdmVy
IFZYTEFOIGNoYW5nZXMgZnJvbSBleHBsaWNpdGx5IGV4Y2x1ZGluZyB0aGUgRWNobyBmdW5jdGlv
biBmcm9tIHRoZSBzY29wZSBvZiB0aGUgZG9jdW1lbnQgdG8gdGhlIGRlZmluaXRpb24gb2YgdGhl
IHNjb3BlIGxpa2UgdXNlZCBpbiBSRkMgNTg4NSwNCiB3b3VsZCB0aGF0IGFkZHJlc3MgeW91ciBj
b25jZXJuPzxiciBjbGFzcz0iIj4NCiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNw
YWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyBSZWdhcmRzLDxiciBjbGFzcz0i
Ij4NCiZndDsgR3JlZzxiciBjbGFzcz0iIj4NCiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVy
dGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyBPbiBGcmksIEp1biAy
MSwgMjAxOSBhdCA1OjE5IFBNIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSAmbHQ7PGEgaHJl
Zj0ibWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbSIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNzPSIiPmNw
aWduYXRhQGNpc2NvLmNvbTwvYT4mZ3Q7IHdyb3RlOjxiciBjbGFzcz0iIj4NCiZndDsgSGVsbG8s
IEdyZWcsPGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3Bh
Y2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7IFRoYW5rIHlvdSBmb3IgaGF2aW5n
IHNwbGl0IHRoaXMgdGhyZWFkLiBJ4oCZbGwgbm90ZSBmb3IgZWFzZSBvZiB0cmFja2luZyB0aGF0
IHRoaXMgc3BlY2lmaWMgaXNzdWUgaXMgaXNzdWUgIzQgb3VyIG9mIHRoZSBzaXggcXVpY2sgY29t
bWVudHMgSSBzZW50LjxiciBjbGFzcz0iIj4NCiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVy
dGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyBOb3csIHF1ZXN0aW9u
cyB5b3UgYXNrIGxpa2UgdGhpcyBvbmUgcXVvdGVkIGZyb20gYmVsb3c6PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7IFdvdWxkIHlvdSBzdWdnZXN0IHRoYXQgdGhlIHNjb3BlIG9mIFJGQyA1ODg0IG11
c3QgaW5jbHVkZSB0aGUgQkZEIEVjaG8gZnVuY3Rpb24/PGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFu
IGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+
DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxi
ciBjbGFzcz0iIj4NCiZndDsgQXJlIG5vdyBzZWNvbmQtb3JkZXIgcmVkIGhlcnJpbmdzIGFuZCwg
b25jZSBhZ2Fpbiwgbm90IHJlbGV2YW50IHRvIHRoZSBpc3N1ZSDigJQgaW5zdGVhZCB0aGV5IGF2
b2lkIHJlc3BvbmRpbmcgYW5kIHByZXZlbnQgY29udmVyZ2VuY2UuIEluIG15IGNvbW1lbnQsIEni
gJltIGp1c3QgYXNraW5nIGZvciBhIHRlY2huaWNhbCBleHBsYW5hdGlvbiBvZiB3aHkgQkZEIEVj
aG8gaXMgb3V0IG9mIHNjb3BlLjxiciBjbGFzcz0iIj4NCiZndDs8c3BhbiBjbGFzcz0iQXBwbGUt
Y29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNs
YXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQom
Z3Q7IFBsZWFzZSBzZWUgaW5saW5lLCB5b3VyIHJlc3BvbnNlIGlzIGluY29ycmVjdCBpbiAzIHRl
Y2huaWNhbCBhcmVhcyB0aGF0IEkgZW51bWVyYXRlLjxiciBjbGFzcz0iIj4NCiZndDs8c3BhbiBj
bGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0K
Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsgT24gSnVuIDIwLCAyMDE5LCBhdCAxOjMwIEFNLCBHcmVnIE1p
cnNreSAmbHQ7PGEgaHJlZj0ibWFpbHRvOmdyZWdpbWlyc2t5QGdtYWlsLmNvbSIgdGFyZ2V0PSJf
YmxhbmsiIGNsYXNzPSIiPmdyZWdpbWlyc2t5QGdtYWlsLmNvbTwvYT4mZ3Q7IHdyb3RlOjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZu
YnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsgSGkgQ2FybG9zLDxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OyB0aGFuayB5b3UgZm9yIGNsYXJpZnlpbmcgeW91ciBvcGluaW9uIG9uIHRo
ZSBhcHBsaWNhYmlsaXR5IG9mIHRoZSBCRkQgRWNobyBtb2RlLjxiciBjbGFzcz0iIj4NCiZndDs8
c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNz
PSIiPg0KJmd0OyBGb3IgY29ycmVjdG5lc3MsIEkgaGF2ZSBub3QgaXNzdWVkIGFuICZxdW90O29w
aW5pb24gb24gdGhlIGFwcGxpY2FiaWxpdHkgb2YgdGhlIEJGRCBFY2hvIG1vZGUu4oCdIChBZ2Fp
biwgcGxlYXNlIGRvIG5vdCBtaXNjaGFyYWN0ZXJpemUhKTxzcGFuIGNsYXNzPSJBcHBsZS1jb252
ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
TXkgaW5pdGlhbCBxdWVzdGlvbiB3YXMg4oCcd2h5IGlzIHRoaXMgb3V0IG9mIHNjb3BlP+KAnSBJ
IGJlbGlldmUgc2NvcGluZyBzaG91bGQgYmUgZGVsaWJlcmF0ZSBhbmQgaW50ZW50aW9uYWwsIGFu
ZCBoZW5jZSBzZWVraW5nIHRvIHVuZGVyc3RhbmQuPGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNs
YXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQom
Z3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OyBJJ3ZlIHNwbGl0IHRoaXMgdGhyZWFkIHRvIGhlbHAgdXMgYW5k
IG90aGVycyB0byBmb2xsb3cgdGhlIGRpc2N1c3Npb24gb24gdGhpcyBwYXJ0aWN1bGFyIGlzc3Vl
LiBJJ2xsIG5vdGUgdGhhdCBSRkMgNTg4MCBkb2VzIG5vdCBwcm9oaWJpdCB0aGUgcmVtb3RlIHN5
c3RlbSB0byBwZXJmb3JtIGFueSBraW5kIG9mIHByb2Nlc3Npbmcgb24gdGhlIHBhY2tldCByZWNl
aXZlZCBpbiB0aGUgQkZEIEVjaG8gbW9kZS48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
VGhpcyBpcyB0ZWNobmljYWwgbWlzdGFrZSAjMS48c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBs
ZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7IFJGQyA1
ODgwIHNheXM6PGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQt
c3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7Jm5ic3A7ICZuYnNwOyBUaGUg
RWNobyBmdW5jdGlvbiBoYXMgdGhlIGFkdmFudGFnZSBvZiB0cnVseSB0ZXN0aW5nIG9ubHkgdGhl
PGJyIGNsYXNzPSIiPg0KJmd0OyZuYnNwOyAmbmJzcDsgZm9yd2FyZGluZyBwYXRoIG9uIHRoZSBy
ZW1vdGUgc3lzdGVtLjxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFj
ZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29u
dmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyBObyBvdGhlciBw
cm9jZXNzaW5nIG9uIHRoZSByZW1vdGUgc3lzdGVtIOKAlCB0aGF0IGlzIHRoZSBiZW5lZml0IG9m
IEVjaG8uPGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3Bh
Y2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNv
bnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyBFdmVu
IG1vcmUsIFNlY3Rpb24gNi44LjggZXhwbGljaXRseSBwb2ludHMgb3V0IHRoYXQgYSByZWNlaXZl
ZCBFY2hvIHBhY2tldCBpcyBsaWtlbHkgdG8gYmUgcHJvY2Vzc2VkOjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZuYnNwOyAmbmJzcDsgQSBtZWFucyBvZiBkZXRlY3RpbmcgbWlzc2luZyBFY2hvIHBh
Y2tldHM8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IE1VU1QgYmUgaW1wbGVt
ZW50ZWQsIHdoaWNoIG1vc3QgbGlrZWx5IGludm9sdmVzIHByb2Nlc3Npbmcgb2YgdGhlPGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBFY2hvIHBhY2tldHMgdGhhdCBhcmUgcmVj
ZWl2ZWQuJm5ic3A7IFRoZSBwcm9jZXNzaW5nIG9mIHJlY2VpdmVkIEVjaG88YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IHBhY2tldHMgaXMgb3RoZXJ3aXNlIG91dHNpZGUgdGhl
IHNjb3BlIG9mIHRoaXMgc3BlY2lmaWNhdGlvbi48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs
YXNzPSIiPg0KJmd0OyBUaGlzIGlzIHRlY2huaWNhbCBtaXN0YWtlICMyLjxiciBjbGFzcz0iIj4N
CiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJy
IGNsYXNzPSIiPg0KJmd0OyBXaGF0IHlvdSBhcmUgcXVvdGluZyBpcyByZWZlcnJpbmcgdG8gdGhl
IHJlY2VwdGlvbiBvZiBFY2hvIHBhY2tldCBieSB0aGUgRWNobyBwYWNrZXQgKnNlbmRlciouIFRo
YXQgaXMsIHRoZSBsb2NhbCBzeXN0ZW0sIG5vdCB0aGUgcmVtb3RlIHN5c3RlbS4gVGhlIEVjaG8g
cGFja2V0IGlzIHJlY2VpdmVkIGJ5IHRoZSBzYW1lIHN5c3RlbSB0aGF0IHNlbnQgaXQgKGJ5IGRl
ZmluaXRpb24gb2YgRWNobyEpLCBhbmQgdGh1cyB0aGUgbm9kZSBpdHNlbGYNCiBuZWVkcyB0byBk
ZW11bHRpcGxleCBpdHMgb3duIGNvbnRleHQuLi48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7IFRodXMsIGludGVyb3BlcmFiaWxpdHkgaXMgb25lIG9mIHRoZSB1
bmRlcnNwZWNpZmllZCBpc3N1ZXMgZm9yIEJGRCBFY2hvLjxiciBjbGFzcz0iIj4NCiZndDs8c3Bh
biBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIi
Pg0KJmd0OyBOby4gVGhpcyBpcyB0ZWNobmljYWwgbWlzdGFrZSAjMmIuPGJyIGNsYXNzPSIiPg0K
Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIg
Y2xhc3M9IiI+DQomZ3Q7IFRoZXJlIGlzIG5vIGludGVyb3BlcmFiaWxpdHkgc3BlYyBjb25zaWRl
cmF0aW9ucyBiZXR3ZWVuIGEgc3lzdGVtIGFuZCBpdHNlbGYgKHVubGVzcyB0aGUgc2VuZGVyIG9m
IEJGRCBFY2hvIGhhcyBzcGxpdCBwZXJzb25hbGl0eSA6LSk8YnIgY2xhc3M9IiI+DQomZ3Q7PHNw
YW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0i
Ij4NCiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+
PGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZu
YnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsgU2Vjb25kbHksIHRoZSBFY2hvIEJG
RCBtb2RlIGhhcyBiZWVuIGV4Y2x1ZGVkIGZyb20gdGhlIHNjb3BlIG9mIFJGQyA1ODg0OjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OyBGdXJ0aGVyLCB0aGUgdXNlIG9mIHRoZSBFY2hvIGZ1bmN0aW9u
IGlzIG91dHNpZGUgdGhlIHNjb3BlIG9mIHRoaXMgc3BlY2lmaWNhdGlvbi48YnIgY2xhc3M9IiI+
DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxi
ciBjbGFzcz0iIj4NCiZndDsgVGhpcyBpcyB0ZWNobmljYWwgbWlzdGFrZSAjMy48YnIgY2xhc3M9
IiI+DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFu
PjxiciBjbGFzcz0iIj4NCiZndDsgSXQgaXMgcmVhbGx5IGlycmVsZXZhbnQgdG8gdGhlIHF1ZXN0
aW9uIHdoZXRoZXIgUkZDIDU4ODQsIHdoaWNoIHRhbGtzIGFib3V0IEJGRCBmb3IgdW5pZGlyZWN0
aW9uYWwgTVBMUyBMU1BzLCBzY29wZXMgb3V0IEJGRCBFY2hvLjxiciBjbGFzcz0iIj4NCiZndDs8
c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNz
PSIiPg0KJmd0OyBBcyBJIG1lbnRpb25lZCBpbiBteSBpbml0aWFsIGVtYWlsLCAmcXVvdDtJZiB0
aGlzIGlzIGEgc2luZ2xlIGxvZ2ljYWwgaG9wIHVuZGVybmVhdGggVlhMQU4sIHdoYXTigJlzIHBy
ZXZlbnRpbmcgdGhlIHVzZSBvZiBFY2hvP+KAnSBSRkMgNTg4NCBpcyBkaWZmZXJlbnQgdGhhbiAo
YW5kIG5vdCB1c2VmdWwgZm9yIG9yIHJlbGV2YW50IHRvKSB0aGUgc2NlbmFyaW8gaW4gZHJhZnQt
aWV0Zi1iZmQtdnhsYW4uPGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252
ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDs8
c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNz
PSIiPg0KJmd0OyAmZ3Q7IFdvdWxkIHlvdSBzdWdnZXN0IHRoYXQgdGhlIHNjb3BlIG9mIFJGQyA1
ODg0IG11c3QgaW5jbHVkZSB0aGUgQkZEIEVjaG8gZnVuY3Rpb24/PGJyIGNsYXNzPSIiPg0KJmd0
OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xh
c3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9z
cGFuPjxiciBjbGFzcz0iIj4NCiZndDsgSSBkbyBub3QgdW5kZXJzdGFuZCB0aGUgY29udGV4dCBv
ZiB0aGlzIHF1ZXN0aW9uLiBCdXQgYXMgSSBtZW50aW9uZWQsIHRoZXNlIHF1ZXN0aW9ucyB0YWtl
IHRoZSB0aHJlYWQgaW4gYSBkaXJlY3Rpb24gdGhhdCBkaXZlcmdlcyBmcm9tIHJlc29sdXRpb24u
PGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZu
YnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7IEkgaGF2ZSBub3Qgc3VnZ2VzdGVkIHRoYXQg
YW55IGRvY3VtZW50IGluY2x1ZGVzIGFueXRoaW5nLiBNeSBjb21tZW50IGlzOiB3aGF0IGlzIHRo
ZSByZWFzb24gd2h5IEJGRCBFY2hvIGlzIG91dCBvZiBzY29wZT8gVGVjaG5pY2FsbHksIHRoaXMg
aXMgYSBzaW5nbGUgaG9wIGF0IHRoZSBWWExBTiBsZXZlbCBmb3IgQkZELjxiciBjbGFzcz0iIj4N
CiZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJy
IGNsYXNzPSIiPg0KJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7IEJlc3QsPGJyIGNsYXNzPSIiPg0KJmd0OzxzcGFu
IGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+
DQomZ3Q7IENhcmxvcy48YnIgY2xhc3M9IiI+DQomZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OzxzcGFuIGNs
YXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsgUmVnYXJkcyw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsgR3JlZzxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsgT24gVGh1LCBKdW4gMjAsIDIwMTkgYXQgMjow
OCBQTSBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgJmx0OzxhIGhyZWY9Im1haWx0bzpjcGln
bmF0YUBjaXNjby5jb20iIHRhcmdldD0iX2JsYW5rIiBjbGFzcz0iIj5jcGlnbmF0YUBjaXNjby5j
b208L2E+Jmd0OyB3cm90ZTo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsgSGVsbG8sIEdyZWcsPGJy
IGNsYXNzPSIiPg0KJmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+
Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyBZZXMsIGhhcHB5IHRvbyBhbnN3
ZXIgeW91ciBxdWVzdGlvbi48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBw
bGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
IEZpcnN0LCBob3dldmVyLCBsZXQgbWUgbWFrZSB0d28gcXVpY2sgb2JzZXJ2YXRpb25zIG9uIHRo
ZSBleGNoYW5nZTo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDvigKIgWW91IHNlZW0gdG8gYmUgcGlja2luZyB2ZXJ5IHNwZWNpZmljIGZyYWdtZW50cyBv
ciBzdWItdG9waWNzIGZyb20gbXkgY29tbWVudHMsIGFuZCBmb2xsb3dpbmcgdXAgb24gdGhvc2Ug
b25seS48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDvi
gKIgSeKAmW0gaGFwcHkgdG8gY29udGludWUgYW5zd2VyaW5nIHRoZXNlIHF1ZXN0aW9ucywgYnV0
IHRoZXkgYXJlIG9ydGhvZ29uYWwgdG8gKGFuZCBjb25zZXF1ZW50bHkgYSBkaXN0cmFjdGlvbiBm
cm9tKSB0aGUgaW5pdGlhbCBjb21tZW50cyBJIHJhaXNlZC48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7IE5vdywgeW91ciBxdWVzdGlvbjogdGhlIEJGRCBFY2hvIHBhY2tl
dCBmb3JtYXQgaXMgZ2VuZXJpY2FsbHkgc3BlY+KAmWVkIGFuZCBkZWZpbmVkIGluIFNlY3Rpb24g
NSBvZiBSRkMgNTg4MDo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUt
Y29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGEgaHJlZj0iaHR0cHM6Ly90b29scy5pZXRm
Lm9yZy9odG1sL3JmYzU4ODAjc2VjdGlvbi01IiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2Js
YW5rIiBjbGFzcz0iIj5odHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNTg4MCNzZWN0aW9u
LTU8L2E+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRl
ZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyBUaGUgbW9zdCBy
ZWxldmFudCBwYXJ0IGlzIHRoaXM6PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZuYnNwOyAmbmJzcDsgVGhlIHBheWxvYWQgb2YgYSBCRkQgRWNobyBwYWNrZXQgaXMgYSBs
b2NhbCBtYXR0ZXIsIHNpbmNlIG9ubHkgdGhlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jm5ic3A7
ICZuYnNwOyBzZW5kaW5nIHN5c3RlbSBldmVyIHByb2Nlc3NlcyB0aGUgY29udGVudC4mbmJzcDsg
VGhlIG9ubHkgcmVxdWlyZW1lbnQgaXM8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmbmJzcDsgJm5i
c3A7IHRoYXQgc3VmZmljaWVudCBpbmZvcm1hdGlvbiBpcyBpbmNsdWRlZCB0byBkZW11bHRpcGxl
eCB0aGUgcmVjZWl2ZWQ8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IHBhY2tl
dCB0byB0aGUgY29ycmVjdCBCRkQgc2Vzc2lvbiBhZnRlciBpdCBpcyBsb29wZWQgYmFjayB0byB0
aGU8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IHNlbmRlci48c3BhbiBjbGFz
cz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0
OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyBTaW5jZSB0aGUgcmVtb3RlIHN5c3RlbSBkb2VzIG5vdCBw
cm9jZXNzIHRoZSBlY2hvIHBhY2tldCBjb250ZW50LCBpdCBpcyBhIGxvY2FsIG1hdHRlciBvbmx5
LiBBbmQgZ2l2ZW4gdGhlIGZhY3QgdGhhdCwgYXMgc3VjaCwgdGhlcmUgaXMgbm8gaW50ZXJvcGVy
YWJpbGl0eSBpbXBsaWNhdGlvbnMsIHRoZXJlIGlzIG5vIG5lZWQgdG8gb3Zlci1zcGVjaWZ5IHRo
ZSBwYWNrZXQgZm9ybWF0LiBUaGUgb25seSByZXF1aXJlbWVudCBpcyB0aGF0IHRoZQ0KIHNlbmRp
bmcgc3lzdGVtIG5lZWRzIHRvIGJlIGFibGUgdG8gbWFwIGl0IHRvIGEgc2Vzc2lvbiB3aGVuIGl0
IGJvb21lcmFuZ3MgYmFjay48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBw
bGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
IE5vLCBpdCBpcyBnZW5lcmFsbHkgbm90IChpLmUuLCBkb2VzIG5vdCBuZWVkIHRvIGJlLCBidXQg
dGhlcmXigJlzIGZyZWVkb20gdG8gcG90ZW50aWFsbHkgYmUpIGEgQkZEIGNvbnRyb2wgcGFja2V0
LjxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsgWWVzLCBpdCBjYW4gYmUgc29tZXRoaW5nIGVsc2UuPGJyIGNsYXNz
PSIiPg0KJmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyBUaGF0IHNhaWQsIHRoZSBwYWNrZXQgZm9y
bWF0IGZvciBCRkQgRWNobyBoYXMsIHRvIG15IGFuYWx5c2lzIGFuZCB1bmRlcnN0YW5kaW5nLCBu
byByZWxldmFuY3kgb24gdGhlIHF1ZXN0aW9ucyBiZWxvdy48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7IEJlc3QsPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyBDYXJsb3MuPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxl
LWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsgT24gSnVuIDIwLCAyMDE5LCBhdCAxMjo1MCBBTSwgR3JlZyBNaXJza3kgJmx0OzxhIGhyZWY9
Im1haWx0bzpncmVnaW1pcnNreUBnbWFpbC5jb20iIHRhcmdldD0iX2JsYW5rIiBjbGFzcz0iIj5n
cmVnaW1pcnNreUBnbWFpbC5jb208L2E+Jmd0OyB3cm90ZTo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsgSGVsbG8gQ2FybG9zLDxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsgY291bGQgeW91IHBsZWFzZSByZWZlciBtZSB0byB0aGUgc3BlY2lmaWNhdGlv
biBvZiBCRkQgdGhhdCBkZWZpbmVzIHRoZSBtZXNzYWdlIGZvcm1hdCB0aGF0IGlzIHVzZWQgaW4g
dGhlIEVjaG8gbW9kZSBvZiBCRkQuIElzIGl0IHRoZSBCRkQgY29udHJvbCBwYWNrZXQ/IFNvbWV0
aGluZyBlbHNlPzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUt
Y29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0
OyBSZWdhcmRzLDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsgR3JlZzxiciBjbGFzcz0iIj4N
CiZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8
L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252
ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7IE9u
IFRodSwgSnVuIDIwLCAyMDE5IGF0IDExOjA5IEFNIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRh
KSAmbHQ7PGEgaHJlZj0ibWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbSIgdGFyZ2V0PSJfYmxhbmsi
IGNsYXNzPSIiPmNwaWduYXRhQGNpc2NvLmNvbTwvYT4mZ3Q7IHdyb3RlOjxiciBjbGFzcz0iIj4N
CiZndDsgJmd0OyZndDsgSGVsbG8sIEdyZWcsPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0Ozxz
cGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7IFBsZWFzZSBzZWUgaW5saW5lLjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+
PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgT24gSnVuIDE5LCAyMDE5LCBhdCA5OjU4
IFBNLCBHcmVnIE1pcnNreSAmbHQ7PGEgaHJlZj0ibWFpbHRvOmdyZWdpbWlyc2t5QGdtYWlsLmNv
bSIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNzPSIiPmdyZWdpbWlyc2t5QGdtYWlsLmNvbTwvYT4mZ3Q7
IHdyb3RlOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxl
LWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7IEhlbGxvIENhcmxvcyw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyB0aGFu
ayB5b3UgZm9yIHRoZSBleHBlZGllbnQgY2xhcmlmaWNhdGlvbi48YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7Jmd0OyBUbyB5b3VyIHF1ZXN0aW9ucyBvbiBkZW11bHRpcGxleGluZyBCRkQgY29u
dHJvbCBwYWNrZXRzIHdpdGggdGhlIHplcm8gdmFsdWUgb2YgdGhlIFlvdXIgRGlzY3JpbWluYXRv
ciBmaWVsZDo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgJm5i
c3A74oCiIG9ubHkgQkZEIGNvbnRyb2wgcGFja2V0cyB3aXRoIHRoZSB6ZXJvIHZhbHVlIG9mIHRo
ZSBZb3VyIERpc2NyaW1pbmF0b3IgZmllbGQgYXJlIGRlbXVsdGlwbGV4ZWQgdXNpbmcgdGhlIGlu
Zm9ybWF0aW9uIG9mIHRoZSBpbm5lciBJUCBoZWFkZXIuIEkgYmVsaWV2ZSB0aGF0IHRoZSB0ZXh0
IGlzIGNsZWFyIGFuZCByZXF1aXJlcyB0aGF0IGFsbCBmaWVsZHMgb2YgdGhlIGlubmVyIElQIGhl
YWRlciBtdXN0IGJlIHVzZWQgdG8gZGVtdWx0aXBsZXgNCiBhIHJlY2VpdmVkIEJGRCBjb250cm9s
IHBhY2tldCB3aXRoIHRoZSB6ZXJvIHZhbHVlIGluIHRoZSBZb3VyIERpc2NyaW1pbmF0b3IgZmll
bGQuIFdoaWNoIG9mIHRoZSBmaWVsZHMgYW4gaW1wbGVtZW50YXRpb24gdXNlcyB0byBjcmVhdGUg
bXVsdGlwbGUgQkZEIHNlc3Npb25zIGJldHdlZW4gdGhlIHBhaXIgb2YgVlRFUHMgaXMgaW1wbGVt
ZW50YXRpb24gc3BlY2lmaWMuPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyBUaGlzIHRleHQg
aXMgcmVwZWF0aW5nIHdhcyBpcyBpbiB0aGUgZHJhZnQsIGJ1dCBkb2VzIG5vdCBhbnN3ZXIgYW55
IG9mIG15IHF1ZXN0aW9ucy48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsgRm9yIGV4YW1wbGU6PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyAxLiAmcXVv
dDt0aGF0IGFsbCBmaWVsZHMgb2YgdGhlIGlubmVyIElQIGhlYWRlciBtdXN0IGJlIHVzZWQgdG8g
ZGVtdWx0aXBsZXggYSByZWNlaXZlZCBCRkQgY29udHJvbCBwYWNrZXTigJ08YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDstJmd0OyBUaGUgdGV4dCBkb2VzIG5v
dCBzYXkg4oCcYWxsIGZpZWxkc+KAnSwgYnV0IHJlZ2FyZGxlc3MsIGRvIHlvdSBtZWFuIHRoZSBE
U0NQIGFuZCB0aGUgRXZpbCBCaXQ/IElQdjYgRmxvdyBMYWJlbD8gSG93ICpleGFjdGx5Kj88YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7IDIuIEhvdyBpcyB0aGUgbWFwcGluZyBvZiBJUCAobm90
IFVEUD8pIGZpZWxkcyB0byBCRkQgc2Vzc2lvbiBkb25lPzxiciBjbGFzcz0iIj4NCiZndDsgJmd0
OyZndDsgMy4gSG93IGlzIHRoaXMgc3RhdGUgY3JlYXRlZCBhbmQgbWFpbnRhaW5lZD88c3BhbiBj
bGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyA0LiBTaW5jZSB0aGlzIGlzIGEgc2V0IG9mIGZpZWxkcyBvbiB3aGljaCB0
d28gc3lzdGVtcyBuZWVkIHRvIGFncmVlICh3aGljaCBmaWVsZHMgZnJvbSB0aGUgaW5uZXIgSVAv
VURQIGFyZSBtYXBwZWQgbmVlZHMgdG8gYmUgdW5kZXJzdG9vZCBieSBib3RoIHN5c3RlbXMpLCBp
dCBjYW5ub3QgYmUg4oCcaW1wbGVtZW50YXRpb24gc3BlY2lmaWPigJ0uIEZ1cnRoZXIsIHRoZSB0
ZXh0IGRvZXMgbm90IHNheSBzby48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsmZ3Q7IFRvIHlvdXIgcG9pbnQgb24gdGhlIGxldmVsIEVjaG8gbW9kZSBvZiBC
RkQgaXMgc3BlY2lmaWVkIGluIFJGQyA1ODgwIEknbGwgcXVvdGUgdGhlIG9waW5pb24gb2YgSmVm
ZnJleSBIYWFzIGZyb20gdGhlIGRpc2N1c3Npb24gb2YgY29tbWVudHMgZnJvbSBTaGF3biBFbWVy
eSBvbiBiZWhhbGYgb2YgdGhlIFNlY0Rpci4gU2hhd24gaGFkIGNvbW1lbnRlZDo8YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyBFY2hvIEJGRCBpcyBvdXQgb2Ygc2NvcGUgZm9yIHRoZSBk
b2N1bWVudCwgYnV0IGRvZXMgbm90IGRlc2NyaWJlIHRoZSByZWFzb24gZm9yIHRoaXMgb3Igd2h5
IHN0YXRlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgdGhpcyBhdCBhbGw/PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgSSd2ZSByZXNwb25kZWQ6PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgR0lNJmd0OyZndDsgSSB0aGluayB0aGF0IHRoZSBtYWluIHJlYXNv
biBpcyB0aGF0IHRoZSBCRkQgRWNobyBtb2RlIGlzIHVuZGVyc3BlY2lmaWVkLiBSRkMgNTg4MCBk
ZWZpbmVkIHNvbWUgb2YgdGhlIG1lY2hhbmlzbXMgcmVsYXRlZCB0byB0aGUgRWNobyBtb2RlLCBi
dXQgbW9yZSBzdGFuZGFyZGl6YXRpb24gd29yayBtYXkgYmUgcmVxdWlyZWQuJm5ic3A7PHNwYW4g
Y2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4N
CiZndDsgJmd0OyZndDsmZ3Q7IEFuZCBKZWZmcmV5IEhhYXMgaGFkIGFkZGVkOjxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OyZndDsmZ3Q7IFNwZWFraW5nIGFzIGEgQkZEIGNoYWlyLCB0aGlzIGlzIHRo
ZSByZWxldmFudCBvYnNlcnZhdGlvbi4mbmJzcDsgQkZEIEVjaG8gaXM8YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsmZ3Q7Jmd0OyB1bmRlcnNwZWNpZmllZCB0byB0aGUgcG9pbnQgd2hlcmUgY2xhaW1p
bmcgY29tcGxpYW5jZSBpcyBkaWZmaWN1bHQgYXQgYmVzdC48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDsmZ3Q7Jmd0OyBJbiBnZW5lcmFsLCBpdCByZWxpZXMgb24gc2luZ2xlLWhvcCBhbmQgdGhlIGFi
aWxpdHkgdG8gaGF2ZSB0aGUgcmVtb3RlIEVjaG88YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyBjbGllbnQgbG9vcCB0aGUgcGFja2V0cy48c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OzxzcGFuIGNs
YXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsmZ3Q7IEJGRCBFY2hvIGNhbm5vdCBiZSBzcGVjaWZpZWQgaW4gUkZDIDU4ODAgYmFz
ZSBzcGVjIGJlY2F1c2UgaXQgaXMgYXBwbGljYXRpb24gc3BlY2lmaWMuPGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1j
b252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyBUaGlzIHBhY2tldCBsb29wIG1heSBub3QgYmUgcHJhY3RpY2FsIGZvciBzZXZlcmFsIGVu
Y2Fwc3VsYXRpb25zIGFuZCB0aHVzIGlzPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
b3V0IG9mIHNjb3BlIGZvciBzdWNoIGVuY2Fwc3VsYXRpb25zLiZuYnNwOyBXaGV0aGVyIHRoaXMg
aXMgcHJhY3RpY2FsIGZvciB2eGxhbjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IHRv
ZGF5LCBvciBpbiB0aGUgcHJlc2VuY2Ugb2YgZnV0dXJlIGV4dGVuc2lvbnMgdG8gdnhsYW4gaXMg
bGVmdCBvdXQgb2Ygc2NvcGU8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyBmb3IgdGhl
IGNvcmUgcHJvcG9zYWwuJm5ic3A7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+
Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBw
bGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyBUaGUgcXVlc3Rpb24gcmVtYWluczogZm9yIFZYTEFOIGVuY2Fwc3VsYXRpb24sIHRoaXMg
aXMgbGlrZSBhIHNpbmdsZSBob3AgYXMgZmFyIGFzIEJGRCBpcyBjb25jZXJuZWQgKHNpbmdsZSBo
b3AgVlhMQU4gdHVubmVsKS48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsgU2luY2UgUkZDIDU4ODEgZGVmaW5lcyBFY2hvIGZvciBzaW5nbGUgaG9wLCBjYW4g
eW91IHBsZWFzZSBlbGFib3JhdGUgKGluIHRoZSBkb2N1bWVudCkgd2h5IGlzIG91dCBvZiBzY29w
ZSBvciBob3cgaXQgY2FuIHdvcms/PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OzxzcGFuIGNs
YXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsmZ3Q7IEJlc3QsPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNz
PSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7IENhcmxvcy48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9z
cGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IFdpbGwgcmVzcG9uZCB0byBvdGhl
ciBxdWVzdGlvbnMgaW4gYSBzZXBhcmF0ZSBtYWlsLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IFJlZ2FyZHMsPGJyIGNsYXNzPSIiPg0KJmd0
OyAmZ3Q7Jmd0OyZndDsgR3JlZzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4g
Y2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4N
CiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5i
c3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IE9uIFRodSwgSnVuIDIw
LCAyMDE5IGF0IDEwOjMxIEFNIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSAmbHQ7PGEgaHJl
Zj0ibWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbSIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNzPSIiPmNw
aWduYXRhQGNpc2NvLmNvbTwvYT4mZ3Q7IHdyb3RlOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7IEhlbGxvLCBHcmVnLDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4g
Y2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4N
CiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgT24gSnVuIDE5LCAyMDE5LCBhdCA5OjA5IFBNLCBHcmVn
IE1pcnNreSAmbHQ7PGEgaHJlZj0ibWFpbHRvOmdyZWdpbWlyc2t5QGdtYWlsLmNvbSIgdGFyZ2V0
PSJfYmxhbmsiIGNsYXNzPSIiPmdyZWdpbWlyc2t5QGdtYWlsLmNvbTwvYT4mZ3Q7IHdyb3RlOjxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29u
dmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OyBIaSBDYXJsb3MsPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyB0
aGFuayB5b3UgZm9yIHJlbWluZGluZyBvZiBvdXIgY29udGludWVkIGRpc2N1c3Npb24gd2l0aCBK
b2VsLiBXZSBhcmUgc2Vla2luZyBjb21tZW50cyBmcm9tIFZYTEFOIGV4cGVydHMgYW5kIG11Y2gg
YXBwcmVjaWF0ZSBpZiB5b3UgaGF2ZSBpbnNpZ2h0cyBvbiBWWExBTiB0byBzaGFyZS48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IEkndmUgZ290IHNvbWUgY2xhcmlmeWluZyBx
dWVzdGlvbnMgYmVmb3JlIEkgY2FuIHJlc3BvbmQgdG8geW91LjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9z
cGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IFN1cmUuPGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJz
cDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyBUbyB3aGljaCBz
dGFnZSBvZiB0aGUgdGhyZWUtd2F5IGhhbmRzaGFrZSB5b3UgcmVmZXIgYXMgJnF1b3Q7aW5pdGlh
bCBkZW11bHRpcGxleGluZyZxdW90Oz8gSSBjb3VsZG4ndCBmaW5kIHRoaXMgdGVybSBpbiBSRkMg
NTg4MC48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1j
b252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyDigJxJbml0aWFsIGRlbXVsdGlwbGV4aW5nJnF1b3Q7IGlzIGEgd2VsbC1rbm93biB0ZXJt
IGluIEJGRCwgcmVmZXJyaW5nIHRvIHRoZSAmcXVvdDtkZW11bHRpcGxleGluZyBvZiB0aGUgaW5p
dGlhbCBwYWNrZXRzJnF1b3Q7LCBCRkQgQ29udHJvbCBwYWNrZXQgd2l0aCBZb3VyRGlzYyBiZWlu
ZyB6ZXJvLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxl
LWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7IEluIFJGQyA1ODgwLCBzZWUgU2VjdGlvbiA2LjMuPGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3Nw
YW4+PGEgaHJlZj0iaHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzU4ODAjc2VjdGlvbi02
LjMiIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNzPSIiPmh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9yZmM1ODgwI3NlY3Rpb24tNi4zPC9hPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyBUaGUg
bWV0aG9kIG9mIGRlbXVsdGlwbGV4aW5nIHRoZSBpbml0aWFsIHBhY2tldHMgKGluIHdoaWNoIFlv
dXI8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgRGlzY3JpbWlu
YXRvciBpcyB6ZXJvKSBpcyBhcHBsaWNhdGlvbiBkZXBlbmRlbnQsIGFuZCBpcyB0aHVzIG91dHNp
ZGU8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgdGhlIHNjb3Bl
IG9mIHRoaXMgc3BlY2lmaWNhdGlvbi48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0Ozxz
cGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyBTaW5jZSBpbml0aWFsIGRlbXVsdGlwbGV4aW5nIGlzIGlu
ZGVlZCBhcHBsaWNhdGlvbiBzcGVjaWZpYywgZGlmZmVyZW50IGZvciBvbmUtaG9wIHZlcnN1cyBt
dWx0aS1ob3AgYW5kIGRlcGVuZGVudCB1cG9uIHdoZXRoZXIgYSBzaW5nbGUgb3IgbXVsdGlwbGUg
c2Vzc2lvbnMgYXJlIGFsbG93ZWQgYmV0d2VlbiBhIHBhaXIgb2YgZW5kcG9pbnRzLCBJIGFkZGVk
IGJlbG93IHR3byBvdGhlciByZWxldmFudCBjaXRhdGlvbnMsIGZyb20gYXBwbGljYXRpb24NCiBz
cGVjaWZpYyBCRkQgc3BlY3M6PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgMS48c3Bh
biBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGEgaHJlZj0iaHR0
cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzU4ODMjc2VjdGlvbi00IiByZWw9Im5vcmVmZXJy
ZXIiIHRhcmdldD0iX2JsYW5rIiBjbGFzcz0iIj5odHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwv
cmZjNTg4MyNzZWN0aW9uLTQ8L2E+PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+
Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IDIuPHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxhIGhyZWY9Imh0dHBzOi8v
dG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM1ODgyI3NlY3Rpb24tNiIgcmVsPSJub3JlZmVycmVyIiB0
YXJnZXQ9Il9ibGFuayIgY2xhc3M9IiI+aHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzU4
ODIjc2VjdGlvbi02PC9hPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgUmVnYXJkaW5nIHRo
ZSBhcHBsaWNhYmlsaXR5IG9mIHRoZSBFY2hvIG1vZGUsIHRoYW5rIHlvdSBmb3IgcG9pbnRpbmcg
dG8gdGhlIG5lZWQgZm9yIHN0cmljdGVyIHRlcm1pbm9sb2d5LCB0aGUgRWNobyBtb2RlLCBhcyBk
ZWZpbmVkIGluIFJGQyA1ODgwLCBpcyB1bmRlcnNwZWNpZmllZCBhbmQgaXQgd2lsbCByZXF1aXJl
IGFkZGl0aW9uYWwgc3RhbmRhcmRpemF0aW9uLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsm
Z3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IE5vLiBCRkQgRWNobyBpcyBub3QgdW5kZXJzcGVj
aWZpZWQgaW4gUkZDIDU4ODAuPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDs8c3BhbiBj
bGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgUGxlYXNlIHJlYWQgUzU6PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxhIGhyZWY9Imh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcv
aHRtbC9yZmM1ODgwI3NlY3Rpb24tNSIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayIg
Y2xhc3M9IiI+aHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzU4ODAjc2VjdGlvbi01PC9h
PjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
Jm5ic3A7ICZuYnNwOyBCRkQgRWNobyBwYWNrZXRzIGFyZSBzZW50IGluIGFuIGVuY2Fwc3VsYXRp
b24gYXBwcm9wcmlhdGUgdG8gdGhlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsmbmJz
cDsgJm5ic3A7IGVudmlyb25tZW50LiZuYnNwOyBTZWUgdGhlIGFwcHJvcHJpYXRlIGFwcGxpY2F0
aW9uIGRvY3VtZW50cyBmb3IgdGhlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsmbmJz
cDsgJm5ic3A7IHNwZWNpZmljcyBvZiBwYXJ0aWN1bGFyIGVudmlyb25tZW50cy48YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2Ui
PiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNsYXNz
PSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7Jmd0OyBCRkQgRWNobyBpcyBhcHBsaWNhdGlvbiBkZXBlbmRlbnQuPHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IFRoZXJlZm9yZSwgZm9yIGV4
YW1wbGUsIHNpbmdsZS1ob3AgQkZEIGluIFJGQyA1ODgxIHNwZWNpZmllcyBCRkQgRWNobyBmb3Ig
dGhhdCBhcHBsaWNhdGlvbi48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNs
YXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsmZ3Q7Jmd0OyBIZW5jZSwgbXkgcXVlc3Rpb24gc3RhbmRzOiB3aHkgaXMgdGhpcyBk
cmFmdCBjbGFpbWluZyBCRkQgRWNobyBpcyBvdXQgb2Ygc2NvcGUgZm9yIHRoaXMgQkZEIGFwcGxp
Y2F0aW9uIGRvY3VtZW50PzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgRnV0dXJlIGRyYWZ0
cyBtYXkgZXhwbG9yZSBhbmQgZGVmaW5lIGhvdyB0aGUgRWNobyBtb2RlIG9mIEJGRCBpcyB1c2Vk
IG92ZXIgVlhMQU4gdHVubmVscy48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7
PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFj
ZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7IFNlZSBhYm92
ZS48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252
ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0
OyAmZ3Q7IFdpbGwgcmV2aWV3IGFuZCByZXNwb25kIHRvIHRoZSByZW1haW5pbmcgcXVlc3Rpb25z
IHNvb24uPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUt
Y29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0
OyZndDsgVGhhbmsgeW91LjxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBs
ZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyBUaGUgJnF1b3Q7cmVtYWluaW5nIHF1ZXN0aW9ucyZxdW90OyBhcmUgc3RpbGwgYWxs
IHRoZSBxdWVzdGlvbnMgYmVsb3cgOi0pPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDs8
c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNz
PSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgQmVzdCw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyBDYXJsb3MuPGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3Nw
YW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBs
ZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7IFJlZ2FyZHMsPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyBHcmVnPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJB
cHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgT24gVGh1LCBKdW4g
MjAsIDIwMTkgYXQgOToxNCBBTSBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgJmx0OzxhIGhy
ZWY9Im1haWx0bzpjcGlnbmF0YUBjaXNjby5jb20iIHRhcmdldD0iX2JsYW5rIiBjbGFzcz0iIj5j
cGlnbmF0YUBjaXNjby5jb208L2E+Jmd0OyB3cm90ZTo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7IEhpLDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3Bh
biBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyBJIGhhdmUgbm90IHJldmlld2VkIHRoaXMgZHJhZnQg
YmVmb3JlLCBidXQgdHJpZ2dlcmVkIGJ5IHRoaXMgZW1haWwsIGFuZCBicmllZmx5IHNjYW5uaW5n
IHRocm91Z2ggYSBjb3VwbGUgb2Ygc2VjdGlvbnMsIGl0IGlzIHVuY2xlYXIgdG8gbWUgaG93IHNv
bWUgb2YgdGhlIG1lY2hhbmljcyB3b3JrLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJy
IGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyBUaGVyZSBhcmUgc29tZSBtYWpvciBp
c3N1ZXMgd2l0aCB0aGUgTWFjIHVzYWdlIGFuZCBhc3NvY2lhdGlvbiwgYXMgSm9lbCBIYWxwZXJu
IG1lbnRpb25lZCBpbiBoaXMgUnRnIERpciByZXZpZXcuPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IEFuZCwgYWRkaXRpb25h
bGx5LCBwbGVhc2UgY29uc2lkZXIgdGhlIGZvbGxvd2luZyBjb21tZW50cyBhbmQgcXVlc3Rpb25z
OjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUt
Y29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0
OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bh
bj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IDEuIFVuZGVyc3BlY2lmaWNh
dGlvbiBmb3IgaW5pdGlhbGl6YXRpb24gYW5kIGluaXRpYWwgZGVtdWx0aXBsZXhpbmcuPGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0
ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAm
Z3Q7IFRoaXMgZG9jdW1lbnQgYWxsb3dzIG11bHRpcGxlIEJGRCBzZXNzaW9ucyBiZXR3ZWVuIGEg
c2luZ2xlIHBhaXIgb2YgVlRFUHM6PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBBbjxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IGltcGxlbWVudGF0aW9uIHRo
YXQgc3VwcG9ydHMgdGhpcyBzcGVjaWZpY2F0aW9uIE1VU1QgYmUgYWJsZSB0bzxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IGNvbnRyb2wgdGhlIG51bWJl
ciBvZiBCRkQgc2Vzc2lvbnMgdGhhdCBjYW4gYmUgY3JlYXRlZCBiZXR3ZWVuIHRoZTxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IHNhbWUgcGFpciBvZiBW
VEVQcy48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFw
cGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0
OyZndDsmZ3Q7ICZndDsgVGhlIGltcGxpY2F0aW9uIG9mIHRoaXMgaXMgdGhhdCBCRkQgc2luZ2xl
LWhvcCBpbml0aWFsaXphdGlvbiBwcm9jZWR1cmVzIHdpbGwgbm90IHdvcmsuIEluc3RlYWQsIHRo
ZXJlIGlzIGEgbmVlZCB0byBtYXAgdGhlIGluaXRpYWwgZGVtdWx0aXBsZXhpbmcuPGJyIGNsYXNz
PSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQt
c3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7
IFRoaXMgaXNzdWUgaXMgZXhwbGFpbmVkIGluIFJGQ3MgNTg4MiBhbmQgNTg4Mzo8c3BhbiBjbGFz
cz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGEgaHJlZj0iaHR0cHM6Ly90
b29scy5pZXRmLm9yZy9odG1sL3JmYzU4ODMjc2VjdGlvbi00IiByZWw9Im5vcmVmZXJyZXIiIHRh
cmdldD0iX2JsYW5rIiBjbGFzcz0iIj5odHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNTg4
MyNzZWN0aW9uLTQ8L2E+PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPmFuZDxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bh
bj48YSBocmVmPSJodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNTg4MiNzZWN0aW9uLTYi
IHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNzPSIiPmh0dHBzOi8vdG9vbHMu
aWV0Zi5vcmcvaHRtbC9yZmM1ODgyI3NlY3Rpb24tNjwvYT48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7
PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgU2VjdGlvbiA1LjEg
c2F5czo8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFw
cGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0
OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IEZvciBzdWNoIHBhY2tldHMsIHRoZSBCRkQgc2Vz
c2lvbiBNVVNUIGJlIGlkZW50aWZpZWQ8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAm
Z3Q7Jm5ic3A7ICZuYnNwOyB1c2luZyB0aGUgaW5uZXIgaGVhZGVycywgaS5lLiwgdGhlIHNvdXJj
ZSBJUCwgdGhlIGRlc3RpbmF0aW9uIElQLCBhbmQ8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyB0aGUgc291cmNlIFVEUCBwb3J0IG51bWJlciBwcmVzZW50
IGluIHRoZSBJUCBoZWFkZXIgY2FycmllZCBieSB0aGU8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBwYXlsb2FkIG9mIHRoZSBWWExBTiBlbmNhcHN1bGF0
ZWQgcGFja2V0LiZuYnNwOyBUaGUgVk5JIG9mIHRoZSBwYWNrZXQ8YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBTSE9VTEQgYmUgdXNlZCB0byBkZXJpdmUg
aW50ZXJmYWNlLXJlbGF0ZWQgaW5mb3JtYXRpb24gZm9yPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OyZuYnNwOyAmbmJzcDsgZGVtdWx0aXBsZXhpbmcgdGhlIHBhY2tldC48YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsgQnV0IHRoaXMgZG9lcyBub3QgcmVhbGx5IGV4cGxhaW4gaG93IHRvIGRvIHRoZSBpbml0
aWFsIGRlbXVsdGlwbGV4aW5nLiBEb2VzIGVhY2ggQkZEIHNlc3Npb24gbmVlZCB0byBoYXZlIGEg
c2VwYXJhdGUgaW5uZXIgc291cmNlIElQIGFkZHJlc3M/IE9yIHNvdXJjZSBVRFAgcG9ydD8gQW5k
IGhvdyBvZnRlciBhcmUgdGhleSByZWN5Y2xlZCBvciBrZXB0IGFzIHN0YXRlPyBIb3cgYXJlIHRo
ZXNlIG1hcHBlZD88YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IEVxdWFsbHkg
aW1wb3J0YW50bHksIHdoaWNoIHNpZGUgaXMgQWN0aXZlPzxiciBjbGFzcz0iIj4NCiZndDsgJmd0
OyZndDsmZ3Q7ICZndDsgQW5kIHdoYXQgaWYgdGhlcmXigJlzIGEgcmFjZSBjb25kaXRpb24gd2l0
aCBib3RoIHNpZGVzIGJlaW5nIEFjdGl2ZSBhbmQgc2V0dGluZyB1cCByZWR1bmRhbnQgc2Vzc2lv
bnM/PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBs
ZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7IDEuYi4gQnkgdGhlIHdheSwgYmFzZWQgb24gdGhpcywgdXNpbmcgUy1CRkQg
W1JGQyA3ODgwXSBtaWdodCBiZSBlYXNpZXIgdG8gZGVtdXguPGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7ICZndDsgMi4gU2VjdXJpdHk8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFu
PjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgVGhpcyBkb2N1bWVudCBzYXlz
IHRoYXQgdGhlIFRUTCBpbiB0aGUgaW5uZXIgcGFja2V0IGNhcnJ5aW5nIEJGRCBpcyBzZXQgdG8g
MS4gSG93ZXZlciwgUkZDIDU4ODAgc2F5cyB0byB1c2UgR1RTTSBbUkZDIDUwODJdLCBpLmUuLCBh
IHZhbHVlIG9mIDI1NS4uPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFu
IGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IFdoeSBpcyBHVFNNIG5vdCB1c2VkIGhlcmU/PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0
ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAm
Z3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsgMy4gRUNNUCBhbmQgZmF0ZS1zaGFyaW5n
IHVuZGVyLXNwZWNpZmljYXRpb246PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IFNlY3Rpb24gNC4xLiBzYXlzOjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZuYnNwOyAmbmJzcDsgVGhlIE91dGVyIElQL1VEUDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IGFuZCBWWExBTiBoZWFkZXJzIE1VU1QgYmUgZW5jb2Rl
ZCBieSB0aGUgc2VuZGVyIGFzIGRlZmluZWQgaW48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBbUkZDNzM0OF0uPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFw
cGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0
OyZndDsmZ3Q7ICZndDsgQW5kIFJGQyA3MzQ4IHNheXM6PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7LSZuYnNwOyBTb3VyY2UgUG9ydDombmJzcDsgSXQgaXMgcmVjb21tZW5kZWQg
dGhhdCB0aGUgVURQIHNvdXJjZSBwb3J0IG51bWJlcjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IGJlIGNhbGN1bGF0
ZWQgdXNpbmcgYSBoYXNoIG9mIGZpZWxkcyBmcm9tIHRoZSBpbm5lciBwYWNrZXQgLS08YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyBvbmUgZXhhbXBsZSBiZWluZyBhIGhhc2ggb2YgdGhlIGlubmVyIEV0aGVybmV0IGZy
YW1lJ3MgaGVhZGVycy48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyBUaGlzIGlzIHRvIGVuYWJsZSBhIGxldmVsIG9m
IGVudHJvcHkgZm9yIHRoZSBFQ01QL2xvYWQtPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgYmFsYW5jaW5nIG9mIHRo
ZSBWTS10by1WTSB0cmFmZmljIGFjcm9zcyB0aGUgVlhMQU4gb3ZlcmxheS48YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
OyBXaGVuIGNhbGN1bGF0aW5nIHRoZSBVRFAgc291cmNlIHBvcnQgbnVtYmVyIGluIHRoaXMgbWFu
bmVyLCBpdDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7IGlzIFJFQ09NTUVOREVEIHRoYXQgdGhlIHZhbHVlIGJlIGlu
IHRoZSBkeW5hbWljL3ByaXZhdGUgcG9ydDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IHJhbmdlIDQ5MTUyLTY1NTM1
IFtSRkM2MzM1XS48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xh
c3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZn
dDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4m
bmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyBCYXNlZCBv
biB0aGlzLCBkZXBlbmRpbmcgb24gdGhlIGhhc2hpbmcgY2FsY3VsYXRpb24sIHRoZSBvdXRlciBz
b3VyY2UgVURQIHBvcnQgY2FuIGJlIGRpZmZlcmVudCBsZWFkaW5nIHRvIGRpZmZlcmVudCBFQ01Q
IHRyZWF0bWVudC4gRG9lcyBzb21ldGhpbmcgZWxzZSBuZWVkIHRvIGJlIHNwZWNpZmllZCBoZXJl
IGluIHJlZ2FyZHMgdG8gdGhlIG91dGVyIFVEUCBzb3VyY2UgcG9ydD88YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+
Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBj
bGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyA0LiBTZWN0aW9uIDcgc2F5cyB0aGF0IOKAnCBTdXBwb3J0
IGZvciBlY2hvIEJGRCBpcyBvdXRzaWRlIHRoZSBzY29wZSBvZiB0aGlzIGRvY3VtZW504oCdLjxz
cGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1z
cGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsg
QXNzdW1pbmcgdGhpcyBtZWFucyDigJxCRkQgRWNobyBtb2Rl4oCdLCB3aHkgaXMgdGhpcyBvdXQg
b2Ygc2NvcGU/IElmIHRoaXMgaXMgYSBzaW5nbGUgbG9naWNhbCBob3AgdW5kZXJuZWF0aCBWWExB
Tiwgd2hhdOKAmXMgcHJldmVudGluZyB0aGUgdXNlIG9mIEVjaG8/IEVjaG/igJlzIGJlbmVmaXRz
IGFyZSBodWdlLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFz
cz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0
OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZu
YnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IDUuIFRlcm1p
bm9sb2d5PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJB
cHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBJbXBsZW1lbnRhdGlvbnMgU0hPVUxEIGVuc3Vy
ZSB0aGF0IHRoZSBCRkQ8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7
ICZuYnNwOyBwYWNrZXRzIGZvbGxvdyB0aGUgc2FtZSBsb29rdXAgcGF0aCBhcyBWWExBTiBkYXRh
IHBhY2tldHMgd2l0aGluIHRoZTxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsm
bmJzcDsgJm5ic3A7IHNlbmRlciBzeXN0ZW0uPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48
YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IFdoYXQgaXMgYSDigJxsb29rIHVw
IHBhdGggd2l0aGluIGEgc2VuZGVyIHN5c3RlbeKAnT88YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9z
cGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBw
bGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OyA2LiBEZXBsb3ltZW50IHNjZW5hcmlvczxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJz
cDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyBTMyBzYXlzOjxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7IEZpZ3VyZSAx
IGlsbHVzdHJhdGVzIHRoZSBzY2VuYXJpbyB3aXRoIHR3byBzZXJ2ZXJzLCBlYWNoIG9mIHRoZW08
YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jm5ic3A7ICZuYnNwOyBob3N0aW5n
IHR3byBWTXMuJm5ic3A7IFRoZSBzZXJ2ZXJzIGhvc3QgVlRFUHMgdGhhdCB0ZXJtaW5hdGUgdHdv
IFZYTEFOPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyBb4oCmXTxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IEZpZ3VyZSAx
OiBSZWZlcmVuY2UgVlhMQU4gRG9tYWluPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsgSG93ZXZlciwgUkZDIDczNDggRmlndXJlIDMgbGlzdHMgdGhhdCBhcyBvbmUgZGVwbG95
bWVudCBzY2VuYXJpbywgbm90IGFzIOKAnHRoZSBzY2VuYXJpb+KAnSBhbmQg4oCcVGhlIFJlZmVy
ZW5jZSBWWExBTiBEb21haW7igJ0uPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IEJlc3QsPGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7IENhcmxvcy48YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsmZ3Q7IE9uIEp1biAxNywgMjAxOSwgYXQgMTI6NTggQU0sIEdyZWcgTWlyc2t5ICZsdDs8
YSBocmVmPSJtYWlsdG86Z3JlZ2ltaXJza3lAZ21haWwuY29tIiB0YXJnZXQ9Il9ibGFuayIgY2xh
c3M9IiI+Z3JlZ2ltaXJza3lAZ21haWwuY29tPC9hPiZndDsgd3JvdGU6PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNw
YWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZn
dDsgSGkgT2xpdmVyLDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IHRo
YW5rIHlvdSBmb3IgeW91ciB0aG9yb3VnaCByZXZpZXcsIGNsZWFyIGFuZCBkZXRhaWxlZCBxdWVz
dGlvbnMuIE15IGFwb2xvZ2llcyBmb3IgdGhlIGRlbGF5IHRvIHJlc3BvbmQuIFBsZWFzZSBmaW5k
IG15IGFuc3dlcnMgYmVsb3cgaW4tbGluZSB0YWdnZWQgR0lNJmd0OyZndDsuPGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZndDsgUmVnYXJkcyw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBH
cmVnPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0i
QXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OyZndDsgT24gRnJpLCBNYXkgMzEsIDIwMTkgYXQgMTI6MzggUE0gT2xp
dmllciBCb25hdmVudHVyZSB2aWEgRGF0YXRyYWNrZXIgJmx0OzxhIGhyZWY9Im1haWx0bzpub3Jl
cGx5QGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayIgY2xhc3M9IiI+bm9yZXBseUBpZXRmLm9yZzwv
YT4mZ3Q7IHdyb3RlOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IFJl
dmlld2VyOiBPbGl2aWVyIEJvbmF2ZW50dXJlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OyZndDsgUmV2aWV3IHJlc3VsdDogUmVhZHkgd2l0aCBJc3N1ZXM8YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQt
c3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7
Jmd0OyBUaGlzIGRvY3VtZW50IGhhcyBiZWVuIHJldmlld2VkIGFzIHBhcnQgb2YgdGhlIHRyYW5z
cG9ydCBhcmVhIHJldmlldyB0ZWFtJ3M8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAm
Z3Q7Jmd0OyBvbmdvaW5nIGVmZm9ydCB0byByZXZpZXcga2V5IElFVEYgZG9jdW1lbnRzLiBUaGVz
ZSBjb21tZW50cyB3ZXJlIHdyaXR0ZW48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAm
Z3Q7Jmd0OyBwcmltYXJpbHkgZm9yIHRoZSB0cmFuc3BvcnQgYXJlYSBkaXJlY3RvcnMsIGJ1dCBh
cmUgY29waWVkIHRvIHRoZSBkb2N1bWVudCdzPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OyZndDsgYXV0aG9ycyBhbmQgV0cgdG8gYWxsb3cgdGhlbSB0byBhZGRyZXNzIGFueSBp
c3N1ZXMgcmFpc2VkIGFuZCBhbHNvIHRvIHRoZSBJRVRGPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OyZndDsgZGlzY3Vzc2lvbiBsaXN0IGZvciBpbmZvcm1hdGlvbi48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252
ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0
OyAmZ3Q7Jmd0OyBXaGVuIGRvbmUgYXQgdGhlIHRpbWUgb2YgSUVURiBMYXN0IENhbGwsIHRoZSBh
dXRob3JzIHNob3VsZCBjb25zaWRlciB0aGlzPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OyZndDsgcmV2aWV3IGFzIHBhcnQgb2YgdGhlIGxhc3QtY2FsbCBjb21tZW50cyB0aGV5
IHJlY2VpdmUuIFBsZWFzZSBhbHdheXMgQ0M8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0
OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bh
bj48YSBocmVmPSJtYWlsdG86dHN2LWFydEBpZXRmLm9yZyIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNz
PSIiPnRzdi1hcnRAaWV0Zi5vcmc8L2E+PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFj
ZSI+Jm5ic3A7PC9zcGFuPmlmIHlvdSByZXBseSB0byBvciBmb3J3YXJkIHRoaXMgcmV2aWV3Ljxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xhc3M9IkFwcGxl
LWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7ICZndDsmZ3Q7IEkgaGF2ZSBvbmx5IGxpbWl0ZWQga25vd2xlZGdlIG9mIFZYTEFOIGFu
ZCBkbyBub3Qga25vdyBhbGwgc3VidGxldGllcyBvZiBCRkQuPGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OyZndDsgVGhpcyByZXZpZXcgaXMgdGh1cyBtb3JlIGZyb20gYSBnZW5l
cmFsaXN0IHRoYW4gYSBzcGVjaWFsaXN0IGluIHRoaXMgdG9waWMuPGJyIGNsYXNzPSIiPg0KJmd0
OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNl
Ij4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsg
TWFqb3IgaXNzdWVzPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3Bh
biBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgU2VjdGlvbiA0IHJlcXVpcmVzIHRoYXQgJnF1
b3Q7IEltcGxlbWVudGF0aW9ucyBTSE9VTEQgZW5zdXJlIHRoYXQgdGhlIEJGRDxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyBwYWNrZXRzIGZvbGxv
dyB0aGUgc2FtZSBsb29rdXAgcGF0aCBhcyBWWExBTiBkYXRhIHBhY2tldHMgd2l0aGluIHRoZTxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyBzZW5k
ZXIgc3lzdGVtLiZxdW90OzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7
PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IFdoeSBpcyB0aGlzIHJlcXVpcmVtZW50
IG9ubHkgcmVsZXZhbnQgZm9yIHRoZSBsb29rdXAgcGF0aCBvbiB0aGUgc2VuZGVyIHN5c3RlbTxi
ciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7ID8gV2hhdCBkb2VzIHRoaXMg
c2VudGVuY2UgcmVhbGx5IGltcGxpZXMgPzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsmZ3Q7IEdJTSZndDsmZ3Q7IFJGQyA1ODgwIHNldCB0aGUgc2NvcGUgb2YgdGhlIGZhdWx0
IGRldGVjdGlvbiBvZiBCRkQgcHJvdG9jb2wgYXM8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZndDsmbmJzcDsgJm5ic3A7IC4uLiB0aGUgYmlkaXJlY3Rpb25hbCBwYXRoIGJldHdlZW4gdHdv
IGZvcndhcmRpbmcgZW5naW5lcywgaW5jbHVkaW5nPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0
OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7IGludGVyZmFjZXMsIGRhdGEgbGluayhzKSwgYW5k
IHRvIHRoZSBleHRlbnQgcG9zc2libGUgdGhlIGZvcndhcmRpbmc8YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgZW5naW5lcyB0aGVtc2VsdmVzIC4u
LjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IFRoZSByZXF1aXJlbWVu
dCBhaW1lZCB0byB0aGUgZm9yd2FyZGluZyBlbmdpbmUgb2YgYSBCRkQgc3lzdGVtIHRoYXQgdHJh
bnNtaXRzIEJGRCBjb250cm9sIHBhY2tldHMgb3ZlciBWWExBTiB0dW5uZWwuPGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZndDsgSXMgaXQgYSByZXF1aXJlbWVudCB0aGF0IHRoZSBCRkQgcGFja2V0cyBmb2xsb3cgdGhl
IHNhbWUgcGF0aCBhcyB0aGUgZGF0YTxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZn
dDsmZ3Q7IHBhY2tldCBmb3IgYSBnaXZlbiBWWExBTiA/IEkgZ3Vlc3Mgc28uIEluIHRoaXMgY2Fz
ZSwgdGhlIGRvY3VtZW50IHNob3VsZDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZn
dDsmZ3Q7IGRpc2N1c3MgaG93IEVxdWFsIENvc3QgTXVsdGlwYXRoIGNvdWxkIGFmZmVjdCB0aGlz
LjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IEdJTSZndDsmZ3Q7IEkg
dGhpbmsgdGhhdCBFQ01QIGVudmlyb25tZW50IGlzIG1vcmUgbGlrZWx5IHRvIGJlIGV4cGVyaWVu
Y2VkIGJ5IGEgdHJhbnNpdCBub2RlIGluIHRoZSB1bmRlcmxheS4gSWYgdGhlIEJGRCBzZXNzaW9u
IGlzIHVzZWQgdG8gbW9uaXRvciB0aGUgc3BlY2lmaWMgdW5kZXJsYXkgcGF0aCwgdGhlbiwgSSBh
Z3JlZSwgd2Ugc2hvdWxkIGV4cGxhaW4gdGhhdCB1c2luZyB0aGUgVlhMQU4gcGF5bG9hZCBpbmZv
cm1hdGlvbiB0byBkcmF3DQogcGF0aCBlbnRyb3B5IG1heSBjYXVzZSBkYXRhIGFuZCBCRkQgcGFj
a2V0cyBmb2xsb3dpbmcgZGlmZmVyZW50IHVuZGVybGF5IHJvdXRlcy4gQnV0LCBvbiB0aGUgb3Ro
ZXIgaGFuZCwgdGhhdCBpcyB0aGUgY2FzZSBmb3IgT0FNIGFuZCBmYXVsdCBkZXRlY3Rpb24gaW4g
YWxsIG92ZXJsYXkgbmV0d29ya3MgaW4gZ2VuZXJhbC48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBNaW5vciBp
c3N1ZXM8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNz
PSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBTZWN0aW9uIDE8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBZb3Ugd3Jp
dGUgJnF1b3Q7VGhlIGFzeW5jaHJvbm91cyBtb2RlIG9mIEJGRCwgYXMgZGVmaW5lZCBpbiBbUkZD
NTg4MF0sPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgY2Fu
IGJlIHVzZWQgdG8gbW9uaXRvciBhIHAycCBWWExBTiB0dW5uZWwuJnF1b3Q7PGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZndDsgV2h5IGRvIHlvdSB1c2UgdGhlIHdvcmQgY2FuID8gSXQgaXMgYSBwb3NzaWJpbGl0eSBv
ciBhIHJlcXVpcmVtZW50ID88YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0
OyBHSU0mZ3Q7Jmd0OyBJbiBwcmluY2lwbGUsIEJGRCBEZW1hbmQgbW9kZSBtYXkgYmUgdXNlZCB0
byBtb25pdG9yIHAycCBwYXRocyBhcyB3ZWxsLCBJIGFncmVlLCB3aWxsIHJlLXdvcmQgdG8gbW9y
ZSBhc3NlcnRpdmU6PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJz
cDsgVGhlIGFzeW5jaHJvbm91cyBtb2RlIG9mIEJGRCwgYXMgZGVmaW5lZCBpbiBbUkZDNTg4MF0s
PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgaXMgdXNlZCB0
byBtb25pdG9yIGEgcDJwIFZYTEFOIHR1bm5lbC48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBOVkUgaGFzIG5v
dCBiZWVuIGRlZmluZWQgYmVmb3JlIGFuZCBpcyBub3QgaW4gdGhlIHRlcm1pbm9sb2d5LjxiciBj
bGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IEdJTSZndDsmZ3Q7IFdpbGwgYWRk
IHRvIHRoZSBUZXJtaW5vbG9neSBhbmQgZXhwYW5kIGFzOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0
OyZndDsmZ3Q7ICZndDsmZ3Q7IE5WRSZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyBOZXR3b3Jr
IFZpcnR1YWxpemF0aW9uIEVuZHBvaW50PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFj
ZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7
PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IFRoaXMgZW50aXJlIHNlY3Rpb24gaXMg
bm90IGVhc3kgdG8gcmVhZCBmb3IgYW4gb3V0c2lkZXIuPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJz
cDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgU2VjdGlv
biAzPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0i
QXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OyZndDsgVk5JIGhhcyBub3QgYmVlbiBkZWZpbmVkPGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgR0lNJmd0OyZndDsgV2lsbCBhZGQgdG8gdGhl
IFRlcm1pbm9sb2d5IHNlY3Rpb246PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZndDsgVk5JJm5ic3A7ICZuYnNwOyBWWExBTiBOZXR3b3JrIElkZW50aWZpZXIgKG9yIFZYTEFO
IFNlZ21lbnQgSUQpPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3Bh
biBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgRmlndXJlIDEgY291bGQgdGFrZSBsZXNzIHNw
YWNlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgR0lNJmd0OyZndDsg
WWVzLCBjYW4gbWFrZSBpdCBiaXQgZGVuc2VyLiBXb3VsZCB0aGUgZm9sbG93aW5nIGJlIGFuIGlt
cHJvdmVtZW50PzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7
PHNwYW4gY2xhc3M9IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7JiM0MzstLS0tLS0tLS0tLS0mIzQzOy0tLS0tLS0tLS0tLS0mIzQzOzxiciBjbGFzcz0iIj4N
CiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7fCZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyBTZXJ2ZXIgMSZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgfDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7fCAmIzQzOy0tLS0mIzQzOy0tLS0mIzQzOyZuYnNwOyAm
IzQzOy0tLS0mIzQzOy0tLS0mIzQzOyB8PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
Jmd0OyZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDt8IHxWTTEtMSZuYnNwOyAmbmJzcDsg
fCZuYnNwOyB8Vk0xLTImbmJzcDsgJm5ic3A7IHwgfDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7fCB8Vk5JIDEwMCZuYnNw
OyB8Jm5ic3A7IHxWTkkgMjAwJm5ic3A7IHwgfDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsm
Z3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7fCB8Jm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwO3wmbmJzcDsgfCZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDt8IHw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwO3wgJiM0MzstLS0tLS0tLS0mIzQzOyZuYnNwOyAmIzQzOy0tLS0t
LS0tLSYjNDM7IHw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwO3wgSHlwZXJ2aXNvciBWVEVQIChJUDEpJm5ic3A7ICZuYnNw
OyB8PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsmIzQzOy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tJiM0Mzs8YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7fDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDt8
Jm5ic3A7ICZuYnNwOyYjNDM7LS0tLS0tLS0tLS0tLSYjNDM7PGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZuYnNwO3wmbmJzcDsgJm5ic3A7fCZuYnNwOyAmbmJzcDtMYXllciAzJm5ic3A7ICZuYnNw
O3w8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7JiM0MzstLS18Jm5ic3A7ICZuYnNwO05l
dHdvcmsmbmJzcDsgJm5ic3A7fDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsm
Z3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyYjNDM7LS0tLS0tLS0tLS0tLSYjNDM7PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0
OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDt8PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsmIzQzOy0tLS0tLS0tLS0tJiM0Mzs8
YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwO3w8YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICYjNDM7LS0tLS0tLS0tLS0tJiM0MzstLS0tLS0tLS0tLS0tJiM0Mzs8YnIgY2xhc3M9IiI+
DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7IHwmbmJzcDsgJm5ic3A7IEh5cGVydmlzb3IgVlRFUCAoSVAyKSB8PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
OyB8ICYjNDM7LS0tLSYjNDM7LS0tLSYjNDM7Jm5ic3A7ICYjNDM7LS0tLSYjNDM7LS0tLSYjNDM7
IHw8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7IHwgfFZNMi0xJm5ic3A7ICZuYnNwOyB8Jm5ic3A7IHxWTTItMiZu
YnNwOyAmbmJzcDsgfCB8PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyB8IHxWTkkgMTAwJm5ic3A7IHwmbmJzcDsg
fFZOSSAyMDAmbmJzcDsgfCB8PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZn
dDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyB8IHwmbmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7fCZuYnNwOyB8Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
O3wgfDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgfCAmIzQzOy0tLS0tLS0tLSYjNDM7Jm5ic3A7ICYjNDM7LS0t
LS0tLS0tJiM0MzsgfDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgfCZuYnNwOyAmbmJzcDsgJm5ic3A7IFNlcnZl
ciAyJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgfDxiciBjbGFzcz0i
Ij4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJiM0MzstLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLSYjNDM7PGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNw
YWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZn
dDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgU2VjdGlvbiA0PGJyIGNsYXNzPSIi
Pg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVk
LXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0
OyZndDsgSSBkbyBub3Qgc2VlIHRoZSBiZW5lZml0cyBvZiBoYXZpbmcgb25lIHBhcmFncmFwaCBp
biBTZWN0aW9uIDQgZm9sbG93ZWQgYnkgb25seTxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsm
Z3Q7ICZndDsmZ3Q7IFNlY3Rpb24gNC4xPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
Jmd0OyZndDsgR0lNJmd0OyZndDsgV2lsbCBtZXJnZSBTZWN0aW9uIDQuMSBpbnRvIDQgd2l0aCBt
aW5vciByZXF1aXJlZCByZS13b3JkaW5nOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7
ICZndDsmZ3Q7IDQuJm5ic3A7IEJGRCBQYWNrZXQgVHJhbnNtaXNzaW9uIG92ZXIgVlhMQU4gVHVu
bmVsPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0i
QXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAm
Z3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7IEJGRCBwYWNrZXQgTVVTVCBiZSBlbmNh
cHN1bGF0ZWQgYW5kIHNlbnQgdG8gYSByZW1vdGUgVlRFUCBhczxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyBleHBsYWluZWQgaW4gdGhpcyBzZWN0
aW9uLiZuYnNwOyBJbXBsZW1lbnRhdGlvbnMgU0hPVUxEIGVuc3VyZSB0aGF0IHRoZTxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyBCRkQgcGFja2V0
cyBmb2xsb3cgdGhlIHNhbWUgbG9va3VwIHBhdGggYXMgVlhMQU4gZGF0YSBwYWNrZXRzIHdpdGhp
bjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyB0
aGUgc2VuZGVyIHN5c3RlbS48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0
OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgQkZEIHBhY2tl
dHMgYXJlIGVuY2Fwc3VsYXRlZCBpbiBWWExBTiBhcyBkZXNjcmliZWQgYmVsb3cuJm5ic3A7IFRo
ZSBWWExBTjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZu
YnNwOyBwYWNrZXQgZm9ybWF0IGlzIGRlZmluZWQgaW4gU2VjdGlvbiA1IG9mIFtSRkM3MzQ4XS4m
bmJzcDsgVGhlIE91dGVyIElQL1VEUDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZn
dDsmZ3Q7Jm5ic3A7ICZuYnNwOyBhbmQgVlhMQU4gaGVhZGVycyBNVVNUIGJlIGVuY29kZWQgYnkg
dGhlIHNlbmRlciBhcyBkZWZpbmVkIGluPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
Jmd0OyZndDsmbmJzcDsgJm5ic3A7IFtSRkM3MzQ4XS48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsm
Z3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNw
Ozwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBTZWN0aW9u
IDQuMTxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IFRoZSBkb2N1bWVudCBkb2VzIG5vdCBzcGVjaWZ5IHdoZW4g
YSBkZWRpY2F0ZWQgTUFDIGFkZHJlc3Mgb3IgdGhlIE1BQyBhZGRyZXNzPGJyIGNsYXNzPSIiPg0K
Jmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgb2YgdGhlIGRlc3RpbmF0aW9uIFZURVAgbXVzdCBi
ZSB1c2VkLiBUaGlzIGNvdWxkIGFmZmVjdCB0aGUgaW50ZXJvcGVyYWJpbGl0eSBvZjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IGltcGxlbWVudGF0aW9ucy4gU2hvdWxk
IGFsbCBpbXBsZW1lbnRhdGlvbnMgc3VwcG9ydCBib3RoIHRoZSBkZWRpY2F0ZWQgTUFDPGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgYWRkcmVzcyBhbmQgdGhlIGRlc3Rp
bmF0aW9uIE1BQyBhZGRyZXNzID88YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7
Jmd0OyBHSU0mZ3Q7Jmd0OyBBZnRlciBmdXJ0aGVyIGRpc2N1c3Npb24sIGF1dGhvcnMgZGVjaWRl
ZCB0byByZW1vdmUgdGhlIHJlcXVlc3QgZm9yIHRoZSBkZWRpY2F0ZWQgTUFDIGFkZHJlc3MgYWxs
b2NhdGlvbi4gT25seSB0aGUgTUFDIGFkZHJlc3Mgb2YgdGhlIHJlbW90ZSBWVEVQIG11c3QgYmUg
dXNlZCBhcyB0aGUgZGVzdGluYXRpb24gTUFDIGFkZHJlc3MgaW4gdGhlIGlubmVyIEV0aGVybmV0
IGZyYW1lLiBQbGVhc2UgY2hlY2sgdGhlIGF0dGFjaGVkDQogZGlmZiBiZXR3ZWVuIHRoZSAtMDcg
YW5kIHRoZSB3b3JraW5nIHZlcnNpb25zIG9yIHRoZSB3b3JraW5nIHZlcnNpb24gb2YgdGhlIGRy
YWZ0LjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7PHNwYW4gY2xhc3M9
IkFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiciBjbGFzcz0iIj4NCiZndDsg
Jmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IEl0IGlzIHVuY2xlYXIgZnJvbSB0aGlzIHNlY3Rpb24gd2hl
dGhlciBJUHY0IGluc2lkZSBJUHY2IGFuZCB0aGUgb3Bwb3NpdGU8YnIgY2xhc3M9IiI+DQomZ3Q7
ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBzaG91bGQgYmUgc3VwcG9ydGVkIG9yIG5vdC48YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBHSU0mZ3Q7Jmd0OyBBbnkgY29tYmlu
YXRpb24gb2Ygb3V0ZXIgSVB2WCBhbmQgaW5uZXIgSVB2WCBpcyBwb3NzaWJsZS48YnIgY2xhc3M9
IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0
ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAm
Z3Q7Jmd0OyBTZWN0aW9uIDUuPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZn
dDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgSWYgdGhlIHJlY2VpdmVkIHBhY2tl
dCBkb2VzIG5vdCBtYXRjaCB0aGUgZGVkaWNhdGVkIE1BQyBhZGRyZXNzIG5vciB0aGUgTUFDPGJy
IGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgYWRkcmVzcyBvZiB0aGUgVlRF
UCwgc2hvdWxkIHRoZSBwYWNrZXQgYmUgc2lsZW50bHkgZGlzY2FyZGVkIG9yIHRyZWF0ZWQ8YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBkaWZmZXJlbnRseSA/PGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsgR0lNJmd0OyZndDsgQXMgSSd2ZSBt
ZW50aW9uZWQgZWFybGllciwgYXV0aG9ycyBoYXZlIGRlY2lkZWQgdG8gcmVtb3ZlIHRoZSB1c2Ug
b2YgdGhlIGRlZGljYXRlZCBNQUMgYWRkcmVzcyBmb3IgQkZEIG92ZXIgVlhMQU4uPGJyIGNsYXNz
PSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVy
dGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsg
Jmd0OyZndDsgU2VjdGlvbiA1LjE8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7
Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIg
Y2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBJcyB0aGlzIGEgbW9kaWZpY2F0
aW9uIHRvIHNlY3Rpb24gNi4zIG9mIFJGQzU4ODAgPyBUaGlzIGlzIG5vdCBjbGVhcjxiciBjbGFz
cz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IEdJTSZndDsmZ3Q7IEkgdGhpbmsgdGhh
dCB0aGlzIHNlY3Rpb24gaXMgbm90IG1vZGlmaWNhdGlvbiBidXQgdGhlIGRlZmluaXRpb24gb2Yg
dGhlIGFwcGxpY2F0aW9uLXNwZWNpZmljIHByb2NlZHVyZSB0aGF0IGlzIG91dHNpZGUgdGhlIHNj
b3BlIG9mIFJGQyA1ODgwOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7
Jm5ic3A7ICZuYnNwOyBUaGUgbWV0aG9kIG9mIGRlbXVsdGlwbGV4aW5nIHRoZSBpbml0aWFsIHBh
Y2tldHMgKGluIHdoaWNoIFlvdXI8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7
Jmd0OyZuYnNwOyAmbmJzcDsgRGlzY3JpbWluYXRvciBpcyB6ZXJvKSBpcyBhcHBsaWNhdGlvbiBk
ZXBlbmRlbnQsIGFuZCBpcyB0aHVzIG91dHNpZGU8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgdGhlIHNjb3BlIG9mIHRoaXMgc3BlY2lmaWNhdGlv
bi48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJB
cHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZn
dDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBTZWN0aW9uIDk8YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7
Jmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyBUaGUgc2VudGVu
Y2UgJnF1b3Q7IFRocm90dGxpbmcgTUFZIGJlIHJlbGF4ZWQgZm9yIEJGRCBwYWNrZXRzPGJyIGNs
YXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7IGJhc2VkIG9u
IHBvcnQgbnVtYmVyLiZxdW90OyBpcyB1bmNsZWFyLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZn
dDsmZ3Q7ICZndDsmZ3Q7IEdJTSZndDsmZ3Q7IFllcywgdGhhbmsgeW91IGZvciBwb2ludGluZyB0
byB0aGlzLiBUaGUgdXBkYXRlZCB0ZXh0LCBpbiB0aGUgd2hvbGUgcGFyYWdyYXBoLCBpcyBhcyBm
b2xsb3dzOjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7IE5FVyBURVhU
OjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZuYnNwOyBU
aGUgZG9jdW1lbnQgcmVxdWlyZXMgc2V0dGluZyB0aGUgaW5uZXIgSVAgVFRMIHRvIDEsIHdoaWNo
IGNvdWxkIGJlPGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZndDsgJmd0OyZndDsmbmJzcDsg
Jm5ic3A7IHVzZWQgYXMgYSBERG9TIGF0dGFjayB2ZWN0b3IuJm5ic3A7IFRodXMgdGhlIGltcGxl
bWVudGF0aW9uIE1VU1QgaGF2ZTxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsm
Z3Q7Jm5ic3A7ICZuYnNwOyB0aHJvdHRsaW5nIGluIHBsYWNlIHRvIGNvbnRyb2wgdGhlIHJhdGUg
b2YgQkZEIGNvbnRyb2wgcGFja2V0cyBzZW50PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OyZn
dDsgJmd0OyZndDsmbmJzcDsgJm5ic3A7IHRvIHRoZSBjb250cm9sIHBsYW5lLiZuYnNwOyBPbiB0
aGUgb3RoZXIgaGFuZCwgb3ZlciBhZ2dyZXNzaXZlIHRocm90dGxpbmc8YnIgY2xhc3M9IiI+DQom
Z3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgb2YgQkZEIGNvbnRyb2wgcGFj
a2V0cyBtYXkgYmVjb21lIHRoZSBjYXVzZSBvZiB0aGUgaW5hYmlsaXR5IHRvIGZvcm08YnIgY2xh
c3M9IiI+DQomZ3Q7ICZndDsmZ3Q7Jmd0OyAmZ3Q7Jmd0OyZuYnNwOyAmbmJzcDsgYW5kIG1haW50
YWluIEJGRCBzZXNzaW9uIGF0IHNjYWxlLiZuYnNwOyBIZW5jZSwgdGhyb3R0bGluZyBvZiBCRkQg
Y29udHJvbDxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5ic3A7ICZu
YnNwOyBwYWNrZXRzIFNIT1VMRCBiZSBhZGp1c3RlZCB0byBwZXJtaXQgQkZEIHRvIHdvcmsgYWNj
b3JkaW5nIHRvIGl0czxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDsmZ3Q7Jm5i
c3A7ICZuYnNwOyBwcm9jZWR1cmVzLjxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZn
dDsmZ3Q7ICZsdDtkcmFmdC1pZXRmLWJmZC12eGxhbi0wOC50eHQmZ3Q7Jmx0O0RpZmZfIGRyYWZ0
LWlldGYtYmZkLXZ4bGFuLTA3LnR4dCAtIGRyYWZ0LWlldGYtYmZkLXZ4bGFuLTA4LnR4dC5odG1s
Jmd0OzxiciBjbGFzcz0iIj4NCiZndDsgJmd0OyZndDsmZ3Q7ICZndDs8c3BhbiBjbGFzcz0iQXBw
bGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7
Jmd0OyZndDs8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+
PGJyIGNsYXNzPSIiPg0KJmd0OyAmZ3Q7Jmd0OzxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQt
c3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQomZ3Q7ICZndDs8c3BhbiBjbGFzcz0i
QXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNsYXNzPSIiPg0KJmd0Ozxz
cGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48L2Jsb2NrcXVv
dGU+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8L2Rpdj4NCjxiciBj
bGFzcz0iIj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_19BA9CC8760341D082FC4E4564D3DF28ciscocom_--


From nobody Thu Jul 18 09:11:03 2019
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A23041207FC for <rtg-bfd@ietfa.amsl.com>; Thu, 18 Jul 2019 09:11:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f5REDSsRB1oO for <rtg-bfd@ietfa.amsl.com>; Thu, 18 Jul 2019 09:11:00 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id F36771207BD for <rtg-bfd@ietf.org>; Thu, 18 Jul 2019 09:10:59 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id B8BCE1E2F2; Thu, 18 Jul 2019 12:12:41 -0400 (EDT)
Date: Thu, 18 Jul 2019 12:12:41 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: rtg-bfd@ietf.org
Subject: Draft agenda posted for IETF 105
Message-ID: <20190718161241.GE21401@pfrc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/JQ7Yzx3msuZpUhS3lFybS0j8h0s>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 16:11:02 -0000

Working Group,

Here's the draft agenda for IETF 105.

https://datatracker.ietf.org/meeting/105/materials/agenda-105-bfd

Please note we are reserving the end of the session for discussion about BFD
v2.  We are using Greg's presentation as a seed item for that discussion.

Our request is if you are aware of individuals interested in general OAM
techologies in other IETF contexts that you please invite them to this BFD
session.

-- Jeff & Reshad


From nobody Mon Jul 22 06:44:53 2019
Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F00D120192 for <rtg-bfd@ietfa.amsl.com>; Mon, 22 Jul 2019 06:44:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Dj/PMAxP; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=JKtfJiv0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZeQEjWmd_d0J for <rtg-bfd@ietfa.amsl.com>; Mon, 22 Jul 2019 06:44:50 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82CFB120121 for <rtg-bfd@ietf.org>; Mon, 22 Jul 2019 06:44:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3174; q=dns/txt; s=iport; t=1563803090; x=1565012690; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=VMA4zBvqG19ti47nWlCzMrPDg0Rf+cSkBfRHu6IRzsI=; b=Dj/PMAxPsgNzENwI7GeW+OL8IiPAD+bg1isQO5iz1JXesDGQTDYUQy2D E56rXiz9FoWQOVJxq3pJJuH+ly36Km9cfv8vpn1zhDxuJgDLyavrgIvdz ggLtvJcLOgapaNiPJLH1kabnhWEZlIE1P8k+dWohTIqP5Yznhx4JCQcSm A=;
IronPort-PHdr: =?us-ascii?q?9a23=3A4cWxKxVSu2YvH39xH1TNpXJSrh7V8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSA9yJ8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dE7KdehAk8GIiAAEz/IuTtankxBMVNUlZ59lmwMFNeH4D1YFiB6nA=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AXAAArvTVd/51dJa1lGwEBAQEDAQE?= =?us-ascii?q?BBwMBAQGBUwYBAQELAYFDUANtVSAECyoKhBODRwOEUokrgluXUIEugSQDVAk?= =?us-ascii?q?BAQEMAQEjCgIBAYRAAheCTCM0CQ4BAwEBBAEBAgEGbYUeDIVKAQEBAQIBEhE?= =?us-ascii?q?RDAEBNwEECwIBCA4KAgImAgICMBUQAgQOBRsHgwABgWoDDg8BAgyfZQKBOIh?= =?us-ascii?q?gcYEygnkBAQWBMgEDBAxBQII/GIITAwaBDCgBi14XgUA/gRABJx+CHi4+gQS?= =?us-ascii?q?BXQEBAwGBXIMMMoImjniNaY0ZbQkCghmGWI00G4IthyUFjjOUfYx9gwsCBAI?= =?us-ascii?q?EBQIOAQEFgVA4gVhwFWUBgg0BMz6CBBiDWYUUhT9ygSmNUAGBIAEB?=
X-IronPort-AV: E=Sophos;i="5.64,295,1559520000"; d="scan'208";a="514873429"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 22 Jul 2019 13:44:49 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x6MDinUM003011 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 22 Jul 2019 13:44:49 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 22 Jul 2019 08:44:49 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 22 Jul 2019 09:44:48 -0400
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 22 Jul 2019 08:44:48 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Vbcofk2yDw5WB4KN/DPOPvk/65JuRJ1bdM/DboHr1Ym+FhUW5F6pXtTLkKUwnIHDpjJZdxfbPOXBgX89max6lgXVOg1ZDMpuWWe5yL5BmtpICIQPOC0gQiJSZY5fOw9FUX63OctwEGcGXregXnelfEbCu01XGAWbUbIXAW9QjTW8qnyoDsnQ3jY2YX6+1NguPyKX6wcsylt3JtxEKXBYG6YkuLXVY+SI0Y3n3jtaVSBJn/bTI2AO4X+AZoZQoct6cq48qkiq3Fi77+GAs11lFDzsa4hdswb0btTpKfojHC6VratQn7TRbiikCjZz4Y9Tp6VTFmNAtgZ565Yv67/VGA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VMA4zBvqG19ti47nWlCzMrPDg0Rf+cSkBfRHu6IRzsI=; b=Uk6DiHB/MWB+dntpCu6hoXY0fXFSNZ3dPQrkeLm/xPfIkQ8fWyr9XkbI+AnpZKHyU0VBwSYlhhVDdaxRw+sBTLHmiliYa4bCgBJquB81TUnTVTdpU1m4CAyuZa1/iuHV7sm8Ha/HsFNuifCeOk6monl3HfqXpVJJR9KAB9AdYnDq/tJwxyT84SKy74u0/RnWHJcpdiiLbverURFgwc1U2ufmbO3eVH0i6hUU4pCaaorxxPtimuBl8Tfcd45sVowv9kJuf21WyS0Y5sqP2VawLMLEve+XKKbEkqxhvlkZuOs5GZnfGgZx+Ir6Ge+HvFe0gbrz/FFF5voQ6NqyoJegQw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VMA4zBvqG19ti47nWlCzMrPDg0Rf+cSkBfRHu6IRzsI=; b=JKtfJiv0NnBOlGN66zw9OdD36IN6x4A5tQudi/wuKKVnusinYZiO9PdnyO1zmbffr1yXoK4pCjmJdOqeIcsQnaP7voKanu6Sq/IVnHSgn7EY7NCmpsB23eu7T1OPgyIFuGb/NKgsgs8Om+OxKRn5sAQi05O+boSZypYDIAzM5Yg=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB2916.namprd11.prod.outlook.com (20.177.147.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.16; Mon, 22 Jul 2019 13:44:47 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998%3]) with mapi id 15.20.2094.011; Mon, 22 Jul 2019 13:44:47 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Jeff Haas <jhaas@pfrc.org>
CC: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: Re: Draft agenda posted for IETF 105
Thread-Topic: Draft agenda posted for IETF 105
Thread-Index: AQHVPYN26wwRhvG50UKWzUp1yAFk/abWrDgA
Date: Mon, 22 Jul 2019 13:44:46 +0000
Message-ID: <2BCA3525-0E7B-419A-A2A8-985F545F6EA8@cisco.com>
References: <20190718161241.GE21401@pfrc.org>
In-Reply-To: <20190718161241.GE21401@pfrc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com; 
x-originating-ip: [173.38.117.77]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 309adfae-37dd-4ee0-0c54-08d70eaac2b5
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB2916; 
x-ms-traffictypediagnostic: BL0PR11MB2916:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <BL0PR11MB2916B4324F9C5C57E3239D92C7C40@BL0PR11MB2916.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 01068D0A20
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(346002)(396003)(366004)(376002)(136003)(189003)(199004)(36756003)(2616005)(11346002)(57306001)(446003)(6306002)(53936002)(6116002)(3846002)(6512007)(50226002)(478600001)(6436002)(6486002)(71190400001)(71200400001)(8936002)(7736002)(305945005)(33656002)(486006)(81156014)(8676002)(2906002)(25786009)(6916009)(476003)(26005)(186003)(81166006)(102836004)(6506007)(53546011)(966005)(4326008)(66066001)(256004)(14444005)(14454004)(316002)(99286004)(6246003)(229853002)(68736007)(86362001)(66476007)(66556008)(64756008)(66446008)(76176011)(66946007)(76116006)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB2916; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: kyRMgAVMwrkYhJZOb9yBZSQF0lkW9YSgaN5UKozAg4dmul7gLmeE0+ZVgC6XTcRv5XQKVlu9vH4rQBDeHXk7I1qOroKVdtW91LNetIRYgCkpx75JTktokiRvtfe/5TO0Bt2jiSHkbL1tqw1XE1iByYiwTSibYhN7KRD4aY5PDe6VCzjEOvX8sLtKrmTwjYbK21XOCL9lF6vU/H0K8XOYI62yi4bRiKlKknaS1rS6SwO2zKIxTcissHUGkvsQ2wkngb9UP0H8k+urjIXwvpAu3FD4NVzP5XRNR3MhKahqdhhtltzT9CVqrOzXFBB4dYnSfV+4mwY3QBABliXjUyVEwVS4KGB31gZjPqUq06HhUZt1ojwBs7te2OyDF3dVbvldwPzEIIooLOVGeVt996rrUT9vlGIoSjg0uSrJFLA335A=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4923BB953E8D644BBA02277832E42844@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 309adfae-37dd-4ee0-0c54-08d70eaac2b5
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2019 13:44:46.8049 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB2916
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/vypj7-zrfn6z3fSTsEBRflCve1I>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 13:44:52 -0000
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From nobody Mon Jul 22 07:26:31 2019
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D0F41201F2 for <rtg-bfd@ietfa.amsl.com>; Mon, 22 Jul 2019 07:26:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tjl5HBytXz7H for <rtg-bfd@ietfa.amsl.com>; Mon, 22 Jul 2019 07:26:28 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id 18922120059 for <rtg-bfd@ietf.org>; Mon, 22 Jul 2019 07:26:27 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id 01AE81E2F2; Mon, 22 Jul 2019 10:28:13 -0400 (EDT)
Date: Mon, 22 Jul 2019 10:28:13 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: Re: Draft agenda posted for IETF 105
Message-ID: <20190722142813.GB28302@pfrc.org>
References: <20190718161241.GE21401@pfrc.org> <2BCA3525-0E7B-419A-A2A8-985F545F6EA8@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <2BCA3525-0E7B-419A-A2A8-985F545F6EA8@cisco.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/dja8fLLvM8DuoKAt5QuafayKeAg>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 14:26:30 -0000

[largely speaking as an individual contributor]

Carlos,

On Mon, Jul 22, 2019 at 01:44:46PM +0000, Carlos Pignataro (cpignata) wrote:
> > On Jul 18, 2019, at 12:12 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:
> > Please note we are reserving the end of the session for discussion about BFD
> > v2.  We are using Greg's presentation as a seed item for that discussion.
> 
> To further seed and guide this discussion, it would be useful and productive to start with the problems intended to be solved with BFD v2.

To offer an observation I'll be using during the BFD session:
BFD is a "popular" protocol.  Much like BGP or DNS, it has certain
properties that make it attractive to have other things added to it.

In BFD's case, it's the fact that we have a continuous stream of
communication between two systems.

At some point, if this is the primary useful property, one might envision
that the BFD protocol and general machinery are forked to provide such a
channel for other mechanisms.  Especially for things that don't need to be
in constant contact every 3.3ms. :-)

> Is performance metrics like packet loss and packet delay the main goal? Or a new on-demand auth?

I'll note that IPPM already has solution space stuff here.  This is much why
we're inviting them specifically.

The auth space is also covered to a large extent in open drafts that we'll
hopefully decide how to conclude this upcoming session.

> If the former, why not shim IOAM to BFD (and to actual data packets as well) instead of refactoring the protocol?

I look forward to hearing from those who are working on such things in IPPM.

> Further, even better, S-BFD seems much (much!) more friendly to this set of uses than BFD. Why not start with S-BFD which has implementation?

I'm sympathetic with this view, but will note that s-bfd is using the same
packet format.  So, we're still having a discussion about bfd PDUs.

> Maybe this starts the discussion early, but starting with this proposed solution confused me.

To a large extent, this presentation order is being done not because the
chairs believe this is the way to go, but mostly because we're being
pressurd into even having this discussion because we keep getting proposals
to put more stuff into BFD.

> We could add TLVs. But starting with the problem statement will enable us to think holistically on universe of potential solutions.
> 
> 
> A second topic after the Intention and Goals, would be Charter. How does design Perf Mgmt intersect with other WGs?

As I noted in the invite mail for this topic, such things are currently out
of charter.  


-- Jeff


From nobody Mon Jul 22 07:41:55 2019
Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8BDA1202B9 for <rtg-bfd@ietfa.amsl.com>; Mon, 22 Jul 2019 07:41:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Bydp4n/O; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=fdlxHBRI
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B3VjuSCFvdfc for <rtg-bfd@ietfa.amsl.com>; Mon, 22 Jul 2019 07:41:44 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A46D120289 for <rtg-bfd@ietf.org>; Mon, 22 Jul 2019 07:41:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3787; q=dns/txt; s=iport; t=1563806504; x=1565016104; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=/ftSu9vjYTmKO4Eb417Kkzbadd+mHQ8w71yxkn7B4XA=; b=Bydp4n/Oci75EbpAYYyopcjK75qc4OeB6BxiyzZF/aknxJ1Ybbru+BSl kvCH3QnE1qutXdFmMTwLDcGhoVEdl1PtZIlwLYcJYrhinC8tnokwDYwGB qipKF13jPVrXTMtxMdJd9RwBI76j4IGBCe1daqNWK/9cslgavRqrcdzoN w=;
IronPort-PHdr: =?us-ascii?q?9a23=3A1GMjOReDh21d/IARgbjMVx2rlGMj4e+mNxMJ6p?= =?us-ascii?q?chl7NFe7ii+JKnJkHE+PFxlwGQD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFn?= =?us-ascii?q?pnwd4TgxRmBceEDUPhK/u/ZDQ7E8JLSFZN9HCgOk8TE8H7NBXf?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AOAAAeyjVd/5NdJa1lGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBVQIBAQEBAQsBgUNQA4FCIAQLKgqHWgONfoI2JZdQgS4?= =?us-ascii?q?UgRADVAkBAQEMAQEtAgEBhEACgmMjNgcOAQMBAQQBAQIBBm2FHgyFSgEBAQE?= =?us-ascii?q?CARIoBgEBNwEECwIBCA4KHhAyJQIEDgUbB4MAgWsDDg8BAqAkAoE4iGCCI4J?= =?us-ascii?q?5AQEFgkeCQRiCEwmBNAGLXheBQD+BEAEnDBOCHi4+gQSDBBwBAR6DPYImnGG?= =?us-ascii?q?NGW0JAoIZi0aIRhuCLYcljjiheoMLAgQCBAUCDgEBBYFXCSiBWHAVZQGCQT6?= =?us-ascii?q?CBBiDWYpTcoEpjC6BIgGBIAEB?=
X-IronPort-AV: E=Sophos;i="5.64,295,1559520000"; d="scan'208";a="604922224"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 22 Jul 2019 14:41:43 +0000
Received: from XCH-ALN-013.cisco.com (xch-aln-013.cisco.com [173.36.7.23]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id x6MEfhof000994 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 22 Jul 2019 14:41:43 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-013.cisco.com (173.36.7.23) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 22 Jul 2019 09:41:42 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 22 Jul 2019 10:41:41 -0400
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 22 Jul 2019 10:41:41 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A+E0OFgwJOF+nmED8skUUyz0mEUDe6rGuft+raDTbGRjnnNINmSadoisDQCHCw5vBkLuo1/RJ/yDE8rywJA4Y0B0Hph84p4LU3GgecZJKEezFB+Ab2/bDaJoM809HKk9Bm++MlNyWgJodv9CNHaSm3qB3lU6Vh9Bu+UseeufpQz1wJsXEsJtvwe1v5vxnnC7e7Jgq4k0crHU0Zj8iSZlBesS031HFzqkOLamZ+N+eeFqnkpeGfcXDZs97GA8DieC7/m/h0BeHX8vEfg1MjrTqKZFOo7l4pWkU56bhWIMFeuvUxR5nyQqRp44T7UMPBSAfv4vbCVoY/raA/E9FZGoXw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f6PyODbST1TT9Guc1mBmPNYrkKczfsjZSJje7mO/eB0=; b=XIVdkX6Q/DfpE9wn8I0+/DnxhbEVAGZRtkDKf3E5GI7Nr1HkRcAJTgXhGaeFkb+R+XH/OXnY3TXdo5Mq39P5Ks8uWxoXMDHjdTheOgWccU27mqrWtpZPCxkg3UA1vBk+whTpmhYAn/nuefWG7ZzFLRJB99K0tDb+SfVs8xaaCrUIvsudt/iPxItSxL8Tvw7Z/X0WwfwiXYTgzzdZD7SKXbqszkecw/4K762eeYu8uFoXZgXoIOvfFsrKKec4KLZji6p4gbcs+SExEQsbY4XeLrg2+0+LxV8TcX5iFKwBSBcPyNGjN3avZ7W0VA9nR2iF6I3NBVbabNjknCj6whqkfg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f6PyODbST1TT9Guc1mBmPNYrkKczfsjZSJje7mO/eB0=; b=fdlxHBRIopLQ9jcfLbNh2iQA4Wf6RGvpkLKh7RTh2OfT3W18dxnAKRLOhLhCsjoyUJpRPWmilFLDUL9CSFa5M0mB4WrLAiozRju2PJPqtpYFeG7Eh2iqVAvzvDj0lR9+OUHgAQ1+fcrBpJQBPQporhWxgcWHIGDA/oSVCRHb3fc=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB3027.namprd11.prod.outlook.com (20.177.147.223) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.17; Mon, 22 Jul 2019 14:41:41 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::28e3:f8a3:596:b998%3]) with mapi id 15.20.2094.011; Mon, 22 Jul 2019 14:41:41 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Jeff Haas <jhaas@pfrc.org>
CC: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: Re: Draft agenda posted for IETF 105
Thread-Topic: Draft agenda posted for IETF 105
Thread-Index: AQHVPYN26wwRhvG50UKWzUp1yAFk/abWrDgAgAAMJICAAAPAgA==
Date: Mon, 22 Jul 2019 14:41:40 +0000
Message-ID: <A00DF6BB-1924-48E2-A0D1-A970EE692A8E@cisco.com>
References: <20190718161241.GE21401@pfrc.org> <2BCA3525-0E7B-419A-A2A8-985F545F6EA8@cisco.com> <20190722142813.GB28302@pfrc.org>
In-Reply-To: <20190722142813.GB28302@pfrc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com; 
x-originating-ip: [173.38.117.77]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5dcbdbb6-c7b1-49f3-941e-08d70eb2b5a9
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB3027; 
x-ms-traffictypediagnostic: BL0PR11MB3027:
x-microsoft-antispam-prvs: <BL0PR11MB30274232A0717554A55CF0B1C7C40@BL0PR11MB3027.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 01068D0A20
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(346002)(366004)(376002)(136003)(396003)(199004)(189003)(51914003)(66946007)(64756008)(66556008)(66476007)(86362001)(66446008)(5660300002)(57306001)(446003)(66066001)(305945005)(4326008)(25786009)(6436002)(68736007)(6116002)(6512007)(478600001)(91956017)(76116006)(7736002)(3846002)(11346002)(6486002)(2616005)(36756003)(71200400001)(71190400001)(476003)(6506007)(14444005)(256004)(316002)(53936002)(6246003)(6916009)(99286004)(33656002)(53546011)(2906002)(50226002)(26005)(186003)(8676002)(102836004)(8936002)(14454004)(76176011)(486006)(81166006)(229853002)(81156014); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3027; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: CphcK0hftr9gSqcQT702fKGhiVkvuIGouiKYojAPPKibogeMXEYU/D70W5v76zrtSOwgTWOrb8TrktPKk4hwZ65rUovUTrM7/4UwQtf5QwKoqflgn4SMBdNr8jkVxYLhEUfXvUlT4aFURVFFYTHxHdmovEnouEI1U7bKuutuY+i6bAXnKO2bpUDbUpO4Jyz++PBIyOjpbbHbNHjfrGt9Hs3I2CR9v1ZlfLxy6Iuk/lcuZFoCNlm3hV1RCPZEkkCP1nat16iotBUTrCLzU4dbZONYQNIFZGaczhM/XmhvggRUWyX9wX1ffHrtz4soBaNqu54otwxwKvzblFGaJpXhiOTvDySUsq6Kce9VgBNatYMrhADyWDkh/pwGX/w9qnegc0T2VpHYi6oMHHSCh4qerKs2Kfnu7hyZCZnus1Zb1ZA=
Content-Type: text/plain; charset="us-ascii"
Content-ID: <2FF4C6E3C5D2304D9748CDD6C7EC91C7@namprd11.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 5dcbdbb6-c7b1-49f3-941e-08d70eb2b5a9
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2019 14:41:40.9572 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3027
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.23, xch-aln-013.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/pFk0qdyyDo0Vt7VzGeXyP2S8Usw>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 14:41:53 -0000

Jeff,

> On Jul 22, 2019, at 10:28 AM, Jeffrey Haas <jhaas@pfrc.org> wrote:
>=20
> [largely speaking as an individual contributor]
>=20
> Carlos,
>=20
> On Mon, Jul 22, 2019 at 01:44:46PM +0000, Carlos Pignataro (cpignata) wro=
te:
>>> On Jul 18, 2019, at 12:12 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:
>>> Please note we are reserving the end of the session for discussion abou=
t BFD
>>> v2.  We are using Greg's presentation as a seed item for that discussio=
n.
>>=20
>> To further seed and guide this discussion, it would be useful and produc=
tive to start with the problems intended to be solved with BFD v2.
>=20
> To offer an observation I'll be using during the BFD session:
> BFD is a "popular" protocol.  Much like BGP or DNS, it has certain
> properties that make it attractive to have other things added to it.
>=20
> In BFD's case, it's the fact that we have a continuous stream of
> communication between two systems.
>=20
> At some point, if this is the primary useful property, one might envision
> that the BFD protocol and general machinery are forked to provide such a
> channel for other mechanisms.  Especially for things that don't need to b=
e
> in constant contact every 3.3ms. :-)

I believe that an identification of unique potentially useful properties of=
 the protocol is a potentially fruitful approach. Things like:
1. continuous stream of communication between two systems (as you wrote abo=
ve)
2. Underlying data protocol independence.
3. Boostrapping by other protocols or events.
4. State maintenance in the endpoints (and here S-BFD with a difference)

>=20
>> Is performance metrics like packet loss and packet delay the main goal? =
Or a new on-demand auth?
>=20
> I'll note that IPPM already has solution space stuff here.  This is much =
why
> we're inviting them specifically.
>=20
> The auth space is also covered to a large extent in open drafts that we'l=
l
> hopefully decide how to conclude this upcoming session.

I agree on both counts.

>=20
>> If the former, why not shim IOAM to BFD (and to actual data packets as w=
ell) instead of refactoring the protocol?
>=20
> I look forward to hearing from those who are working on such things in IP=
PM.
>=20
>> Further, even better, S-BFD seems much (much!) more friendly to this set=
 of uses than BFD. Why not start with S-BFD which has implementation?
>=20
> I'm sympathetic with this view, but will note that s-bfd is using the sam=
e
> packet format.  So, we're still having a discussion about bfd PDUs.

Agreed also. And (as per above) decomposing in protocol characteristics use=
ful in a different context can provide a good understanding of matching.

And even what augmentations of BFD are useful and whether other protocols c=
an piggy-back. For example, appending IOAM can in some cases (but not in ot=
hers) re-use the BFD interesting characteristics.

>=20
>> Maybe this starts the discussion early, but starting with this proposed =
solution confused me.
>=20
> To a large extent, this presentation order is being done not because the
> chairs believe this is the way to go, but mostly because we're being
> pressurd into even having this discussion because we keep getting proposa=
ls
> to put more stuff into BFD.

Thanks for the clarification.

>=20
>> We could add TLVs. But starting with the problem statement will enable u=
s to think holistically on universe of potential solutions.
>>=20
>>=20
>> A second topic after the Intention and Goals, would be Charter. How does=
 design Perf Mgmt intersect with other WGs?
>=20
> As I noted in the invite mail for this topic, such things are currently o=
ut
> of charter. =20

Ack. Thanks!

Carlos.

>=20
>=20
> -- Jeff


From nobody Thu Jul 25 13:27:15 2019
Return-Path: <ketant@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B22881201DB; Thu, 25 Jul 2019 13:26:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=izwbBgD5; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=FucZ0aG/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o0nRPcivW4_2; Thu, 25 Jul 2019 13:26:56 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF6981201D1; Thu, 25 Jul 2019 13:26:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15782; q=dns/txt; s=iport; t=1564086415; x=1565296015; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=8nvCDaEqgk7pblkM1CHxEp5pvsZGQpnLHW4J7xrwpbk=; b=izwbBgD5cT30boh+9JCk6sAyG5nOgEk/n+khSSedt3tTzZsRYekZfWuM qM8+4v23ho0HPzkwNzEEhHI8Ej5G/Od6oY9asbV3+J75rnXBM2KvF9q0X W4ZaZYCfFB04SsTPgSLj4IV+GXpCP2IcE7pUyroz4aoAbRyom7JplwYCm A=;
IronPort-PHdr: =?us-ascii?q?9a23=3AvjDLMRxDLxY30BvXCy+N+z0EezQntrPoPwUc9p?= =?us-ascii?q?sgjfdUf7+++4j5YR2N/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1?= =?us-ascii?q?kAgMQSkRYnBZuGBFHyKuLCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AlAABbEDpd/5pdJa1mGwEBAQEDAQE?= =?us-ascii?q?BBwMBAQGBVAUBAQELAYEUL1ADbVUgBAsqhB2DRwOMfoJbknuEV4EugSQDVAk?= =?us-ascii?q?BAQEMAQEtAgEBhEACF4JHIzUIDgEDAQEEAQECAQZthR4MhUoBAQEBAxIRChM?= =?us-ascii?q?BATcBDwIBCA4DBAEBKAMCAgIwFAkIAgQBDQUIGoMBgR1NAx0BokICgTiIYHG?= =?us-ascii?q?BMoJ6AQEFhQUYghMJgTQBi14XgUA/gRFGgkw+hEY0glUygiaMJTWCI4R/lnk?= =?us-ascii?q?JAoIalCuYDI06l1UCBAIEBQIOAQEFgVEBNoFYcBWDJ4JCDBeDTopTcoEpjSs?= =?us-ascii?q?BAQ?=
X-IronPort-AV: E=Sophos;i="5.64,308,1559520000";  d="scan'208,217";a="604508900"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Jul 2019 20:26:43 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x6PKQhwT032238 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 25 Jul 2019 20:26:43 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 15:26:42 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 15:26:42 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 25 Jul 2019 15:26:42 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=h0orv6XR+KqbIvest1FbbDRjiRgyFAldPKCt02H6qw2p7G1E9s6baYeSInt7AXHbz/F62QLUtVXJyFV9yXv8u15EzhvnQ1PAUOy9eT+pSrHDyyILg6U8MQSDSeTOB0//fJmcn9IL6IL5wwqYzzz/3VACfvRQKqKb3bsGFxkEWd0QVTJ534EfZBEil9E1vcumQDOhRQXEOg/O4pjekuhoibqhEfo6zpG0Q4upZU727prQVxunsb5H7fMGWL4BjDgGV7YwNfHAFSSMbaOjUe26h1WTQ1jRPm9VYAD53QQjlsFWb9wripx5O8Au9R4cnkdDfihd5pNR/0sGYyL0tpbD5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8nvCDaEqgk7pblkM1CHxEp5pvsZGQpnLHW4J7xrwpbk=; b=WZh1rDfcr1X+a9tG7QwcmWL7mJ8y54roKPR6oj9c1wfneTTeTCkwmXo2Ll5qCok1wWIhxHsNt0P2PslTv3cdQ92q+L7YE1haz5jkx/rrixw+yyIRYpSOoq2jR7fzrA9vMkBU6sVqsOI7K7jAFTJG2EtaV83EeG6q5vVCs40p8SZyUsGCfkymP40nq2W8QK2skOiJgQx9+tEXAEjQfpTJXV0uUhhqcm8OAzM6TI4dOzJW7qMDzRyfOy4QXOVdJqcHvJ2CeY4j/WtZorat+tMuNsTZ3Ue/fi13HvtvDtv7L3OwzoF/h7o2/wF07yrXFRfw1Z+1vejAbPCbd7bTxmm/zw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8nvCDaEqgk7pblkM1CHxEp5pvsZGQpnLHW4J7xrwpbk=; b=FucZ0aG/2X4VWkvDtlqvdS/1dib5rPOPxw0v5vtgobcgulqdq2kXDTv/Yu89A91q/826HpKhBKPxCXnl4U1L3Rzgf4+29bMOp8HDNu/MUcQceTs91xT2W2hJjp96WJCp3js5NMnRHwmdTNQJsWpjoq+R3LX093z4wJlBnXvjyWo=
Received: from DM5PR11MB2027.namprd11.prod.outlook.com (10.168.103.22) by DM5PR11MB1386.namprd11.prod.outlook.com (10.168.106.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.15; Thu, 25 Jul 2019 20:26:40 +0000
Received: from DM5PR11MB2027.namprd11.prod.outlook.com ([fe80::2ce9:4479:69b6:d12c]) by DM5PR11MB2027.namprd11.prod.outlook.com ([fe80::2ce9:4479:69b6:d12c%4]) with mapi id 15.20.2094.013; Thu, 25 Jul 2019 20:26:40 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Susan Hares <shares@ndzh.com>, "'Albert Fu'" <afu14@bloomberg.net>, "idr@ietf.org" <idr@ietf.org>
CC: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Subject: RE: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Topic: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Index: AQHVQyZEs3uqzXY/bUCNHu2zKW3otKbbxrOAgAAA9zA=
Date: Thu, 25 Jul 2019 20:26:40 +0000
Message-ID: <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com>
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com>
In-Reply-To: <01c901d54326$80a67af0$81f370d0$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ketant@cisco.com; 
x-originating-ip: [2001:420:c0c8:1002::8]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 05409174-108c-4090-3933-08d7113e66f2
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:DM5PR11MB1386; 
x-ms-traffictypediagnostic: DM5PR11MB1386:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM5PR11MB1386EFED84E6A755A49B8BE1C1C10@DM5PR11MB1386.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0109D382B0
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(376002)(39860400002)(396003)(346002)(136003)(189003)(199004)(53936002)(81166006)(6506007)(76176011)(110136005)(7696005)(33656002)(25786009)(99286004)(54906003)(74316002)(7736002)(66946007)(52536014)(186003)(6246003)(476003)(66556008)(102836004)(5660300002)(8936002)(229853002)(76116006)(66476007)(66446008)(316002)(2906002)(64756008)(81156014)(478600001)(6306002)(2501003)(86362001)(68736007)(14454004)(55016002)(6436002)(236005)(11346002)(71200400001)(446003)(54896002)(9686003)(486006)(256004)(14444005)(6116002)(790700001)(8676002)(4326008)(53546011)(9326002)(71190400001)(46003); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR11MB1386; H:DM5PR11MB2027.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 0BAxhPBuYG94IkA+FlHdiJd922AQ6yCy0GK2CUiyqUaN4DZR614AXMtC5AEu/QnEt3sQLYZg9Z5eFkoOXT/XqaUTC2Ozw/BNOueUAk9DZXdSwoifvEO4+pI1fT4gGX81U9AhGQfCYtI3Zdw3Zc1xWQsQzWnPfhwNGqZHLS4qXDlKizF3jDLjeoYA1VUEa5Rn3fC67i1JSnRgvi/pqOWys3CEKxegWD6KvlXsvpEh/oQ24XC59RtU+kcLG4vAiRsKoEEPvk6C3RfN7NZU5MdVq7TWDDsw7NuYtN3yXP0kCdzCEA9QvrYVtw1XKozVIvv0+FpZHcl7vyUrXcxbzcLZ2+xvZxgBWkCjRF5bcYBt8QGKltmGydAMnddg/BuNQ2snJJB93nNmTx2GvsKGBgkvwhfKcgAt5Az/loOiqn4NZnw=
Content-Type: multipart/alternative; boundary="_000_DM5PR11MB202727A18322CE10B30D93F2C1C10DM5PR11MB2027namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 05409174-108c-4090-3933-08d7113e66f2
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Jul 2019 20:26:40.7107 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ketant@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1386
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/nbhKkLxBk62uzA6ckZVLznt_Yf4>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 20:26:59 -0000

--_000_DM5PR11MB202727A18322CE10B30D93F2C1C10DM5PR11MB2027namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR11MB202727A18322CE10B30D93F2C1C10DM5PR11MB2027namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR11MB202727A18322CE10B30D93F2C1C10DM5PR11MB2027namp_--


From nobody Thu Jul 25 13:34:04 2019
Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5DE21201EF; Thu, 25 Jul 2019 13:33:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ajWZDWk1xGYt; Thu, 25 Jul 2019 13:33:48 -0700 (PDT)
Received: from mail-qk1-x736.google.com (mail-qk1-x736.google.com [IPv6:2607:f8b0:4864:20::736]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B880B1201DB; Thu, 25 Jul 2019 13:33:47 -0700 (PDT)
Received: by mail-qk1-x736.google.com with SMTP id d15so37435732qkl.4; Thu, 25 Jul 2019 13:33:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=date:from:to:cc:message-id:in-reply-to:references:subject :mime-version; bh=nPXD8rt1YwAqwL33aizXFprmte4IVUFvESsm6NLNXZs=; b=nEHo9AZZBq/FTCqbZZKK2rLxyLwJ1b/bgr9eDzG/FBDudHY/VUCCMqKCn473KFI0DV cJRB2+jDAq0NdLQg6G8VMi17WhKjrTrkROI5fbUgti9+hUMnIhhyMEeEPMRdn1DvUaNG pevn3bEr9/IFgOuuHSxY0pktHmywyMo4WMQ0wguA+rL+U8GFsvEWkLqf3kOniTRDmalL krc37fsKACNoQTtpW1DDruJojyMW5l2YjJVthtv2aVLXLuavEtywVHM9lJzRRLvnQIPd 6N6snPEDV5mOPbwFJNIC7yeuyH7xpKwHM2T96VMaGqW2tHfgZwGM1Kk4sYB4xlAtBRLD eeNA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:message-id:in-reply-to :references:subject:mime-version; bh=nPXD8rt1YwAqwL33aizXFprmte4IVUFvESsm6NLNXZs=; b=CEFd/YS9J4qFnoLCMrygAqydLJ0+xiqM7EYEIAAL2VoC+D7RzbQTxEWVcaChwzGa02 ESkpKPf4dO8RILQ22bax1IjME6HOgVtWfoG7ajvz8qKEt2wZftjV8NGw4W69sejQ3MCK UQFIsNdRUu+sqjbyxPE13IM9rHlujtZTLzIteY3vq+jjsfg1/4fdPjX911+V79/qxx4S tAjO1Pev5L+aqw5PTWM893+IunqHxQTJs0X3CiLkHmmyhLsuk2iIRfCvScHzYgGNpP9z OfezKn1wDDLZ/XPsSsmdKFPk7LVHslvX2IZRvN8sCqMA4OnXibFJmVwljjnd2Ioq7C0x vayA==
X-Gm-Message-State: APjAAAWYBkeIUgValnoHo+xHYrQOeG8i9tXeAQvhVS4sR9Ay8RrRmU+G 7mY4vWamPZDhKIx6Id6Pfjs=
X-Google-Smtp-Source: APXvYqxCiRLVW87u7oVVmUGRtV2W077rT+X9Eti1v5DXVNGjuQqhg6onOfhdzYZtndUC9GSB1svErQ==
X-Received: by 2002:a37:a2cc:: with SMTP id l195mr57447072qke.362.1564086826833;  Thu, 25 Jul 2019 13:33:46 -0700 (PDT)
Received: from [2001:67c:370:128:2083:8e8c:ff7f::] ([2001:67c:370:128:cc7f:9003:6f91:7ebf]) by smtp.gmail.com with ESMTPSA id z19sm23587256qtu.43.2019.07.25.13.33.45 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 25 Jul 2019 13:33:46 -0700 (PDT)
Date: Thu, 25 Jul 2019 16:33:39 -0400
From: Jeff Tantsura <jefftant.ietf@gmail.com>
To: Susan Hares <shares@ndzh.com>, Albert Fu <afu14@bloomberg.net>,  "=?utf-8?Q?idr=40ietf.org?=" <idr@ietf.org>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>
Cc: "=?utf-8?Q?lsr=40ietf.org?=" <lsr@ietf.org>,  "=?utf-8?Q?rtg-bfd=40ietf.org?=" <rtg-bfd@ietf.org>
Message-ID: <45346fa5-13c2-4565-9795-a2e89d33fc6e@Spark>
In-Reply-To: <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com>
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com>
Subject: Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
X-Readdle-Message-ID: 45346fa5-13c2-4565-9795-a2e89d33fc6e@Spark
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="5d3a1229_5451cf49_12dc6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/EZW7IGt_3HKT07WEPwCrqjJBsYs>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 20:33:51 -0000

--5d3a1229_5451cf49_12dc6
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Sue,

I support progress of this draft, it addresses real problem.
On Redback side of things we have implemented this around 2013, logic (pr=
oprietary) kept in B=46D=C2=A0indeed, so +1 Ketan. I=E2=80=99d document i=
t as an informal feature, that is recommended (same for YANG)

Cheers,
Jeff
On Jul 25, 2019, 4:27 PM -0400, Ketan Talaulikar (ketant) <ketant=40cisco=
.com>, wrote:
> Hi Albert,
>
> Thanks for your feedback from an operator perspective =E2=80=93 it is v=
aluable. This =E2=80=9CB=46D hold up=E2=80=9D behaviour that you desire i=
s best handled by B=46D since I would expect that similar behaviour would=
 be desired across routing protocols (OSP=46, ISIS, BGP) and perhaps othe=
r clients.
>
> IMHO this is not something that we should be tackling within the scope =
of this BGP draft. Would you agree=3F
>
> That said, this seems like a local implementation aspect to me. We shou=
ld however discuss within the B=46D WG if there is value in documenting t=
his.
>
> Thanks,
> Ketan
>
> =46rom: Idr <idr-bounces=40ietf.org> On Behalf Of Susan Hares
> Sent: 25 July 2019 16:21
> To: 'Albert =46u' <afu14=40bloomberg.net>; idr=40ietf.org
> Subject: Re: =5BIdr=5D draft-merciaz-idr-bgp-bfd-strict-mode
>
> Albert:
>
> To clarify, do you support WG adoption with the draft as is.
>
> As a WG chair, I have to trust that all =C2=A0drafts are improved durin=
g the WG process.=C2=A0 Can this small change be made after adoption or s=
hould it be made before the draft is considered for adoption.
>
> Sue Hares
>
> =46rom: Idr =5Bmailto:idr-bounces=40ietf.org=5D On Behalf Of Albert =46=
u (BLOOMBERG/ 120 PARK)
> Sent: Thursday, July 25, 2019 4:19 PM
> To: idr=40ietf.org
> Subject: =5BIdr=5D draft-merciaz-idr-bgp-bfd-strict-mode
>
> I am in support of this draft, and would like to request a small change=
 to make this draft more operationally useful.
>
> We have encountered several traffic blackhole problems in our productio=
n network without this feature. As such, we have deployed BGP with strict=
 B=46D mode on a proprietary vendor implementation for a while.
>
> Since a lot of MetroE circuit failures occur with interfaces still up, =
ie. break in the middle issues, the traditional knobs like interface hold=
-time/debounce timer can not be used to dampen interface flaps.
>
> We have observed that interface issues tend to occur in bursts and woul=
d like to request that an option be added in =22Section 4 Operation:=22 t=
o delay BGP from coming up until B=46D is proven stable continuously for =
a period of time (i.e. B=46D hold up feature).
>
> This is a feature that we are currently using in the proprietary vendor=
 deployment. In our case, since we have multiple redundant paths, we have=
 some links where we delay BGP from coming up until B=46D has been stable=
 continuously for 60 seconds.
>
> Thanks
> Albert =46u
> Bloomberg
> >
> =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
> Lsr mailing list
> Lsr=40ietf.org
> https://www.ietf.org/mailman/listinfo/lsr

--5d3a1229_5451cf49_12dc6
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

<html xmlns=3D=22http://www.w3.org/1999/xhtml=22>
<head>
<title></title>
</head>
<body>
<div name=3D=22messageBodySection=22>
<div dir=3D=22auto=22>Sue,
<div dir=3D=22auto=22><br /></div>
<div dir=3D=22auto=22>I support progress of this draft, it addresses real=
 problem.&=23160;
<div dir=3D=22auto=22>On Redback side of things we have implemented this =
around 2013, logic (proprietary) kept in B=46D&=23160;<span style=3D=22ca=
ret-color: rgb(39, 39, 40);=22>indeed</span>, so +1 Ketan. I=E2=80=99d do=
cument it as an informal feature, that is recommended (same for YANG) &=23=
160;</div>
</div>
</div>
</div>
<div name=3D=22messageSignatureSection=22><br />
<div class=3D=22match=46ont=22>Cheers,
<div>Jeff</div>
</div>
</div>
<div name=3D=22messageReplySection=22>On Jul 25, 2019, 4:27 PM -0400, Ket=
an Talaulikar (ketant) &lt;ketant=40cisco.com&gt;, wrote:<br />
<blockquote type=3D=22cite=22 class=3D=22spark=5Fquote=22 style=3D=22marg=
in: 5px 5px; padding-left: 10px; border-left: thin solid =231abc9c;=22>
<div class=3D=22WordSection1=22>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>Hi Albert,</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>Thanks for your feedback from=
 an operator perspective =E2=80=93 it is valuable. This =E2=80=9CB=46D ho=
ld up=E2=80=9D behaviour that you desire is best handled by B=46D since I=
 would expect that similar behaviour would be desired across routing prot=
ocols (OSP=46, ISIS, BGP) and perhaps other clients.</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>IMHO this is not something th=
at we should be tackling within the scope of this BGP draft. Would you ag=
ree=3F</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>That said, this seems like a =
local implementation aspect to me. We should however discuss within the B=
=46D WG if there is value in documenting this.</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>Thanks,</span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-family:&quot;Calibri&quo=
t;,sans-serif;mso-fareast-language:EN-US=22>Ketan</span><span style=3D=22=
font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;mso-fareast-l=
anguage:EN-US=22></span></p>
<p class=3D=22MsoNormal=22><span style=3D=22font-size:11.0pt;font-family:=
&quot;Calibri&quot;,sans-serif;mso-fareast-language:EN-US=22>&=23160;</sp=
an></p>
<div>
<div style=3D=22border:none;border-top:solid =23E1E1E1 1.0pt;padding:3.0p=
t 0cm 0cm 0cm=22>
<p class=3D=22MsoNormal=22><b><span lang=3D=22EN-US=22 style=3D=22font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,sans-serif=22 xml:lang=3D=22EN-=
US=22>=46rom:</span></b> <span lang=3D=22EN-US=22 style=3D=22font-size:11=
.0pt;font-family:&quot;Calibri&quot;,sans-serif=22 xml:lang=3D=22EN-US=22=
>Idr &lt;idr-bounces=40ietf.org&gt; <b>On Behalf Of</b> Susan Hares<br />=

<b>Sent:</b> 25 July 2019 16:21<br />
<b>To:</b> 'Albert =46u' &lt;afu14=40bloomberg.net&gt;; idr=40ietf.org<br=
 />
<b>Subject:</b> Re: =5BIdr=5D draft-merciaz-idr-bgp-bfd-strict-mode</span=
></p>
</div>
</div>
<p class=3D=22MsoNormal=22>&=23160;</p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>Albert:</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>To clarify, do you support WG adoption with the draf=
t as is.&=23160;</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>As a WG chair, I have to trust that all &=23160;draf=
ts are improved during the WG process.&=23160; Can this small change be m=
ade after adoption or should it be made before the draft is considered fo=
r adoption.</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>&=23160;</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>Sue Hares</span></p>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-size:=
11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:=231=46497D=22 xm=
l:lang=3D=22EN-US=22>&=23160;</span></p>
<div>
<div style=3D=22border:none;border-top:solid =23B5C4D=46 1.0pt;padding:3.=
0pt 0cm 0cm 0cm=22>
<p class=3D=22MsoNormal=22><b><span lang=3D=22EN-US=22 style=3D=22font-si=
ze:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif=22 xml:lang=3D=22EN-U=
S=22>=46rom:</span></b> <span lang=3D=22EN-US=22 style=3D=22font-size:10.=
0pt;font-family:&quot;Tahoma&quot;,sans-serif=22 xml:lang=3D=22EN-US=22>I=
dr =5B<a href=3D=22mailto:idr-bounces=40ietf.org=22>mailto:idr-bounces=40=
ietf.org</a>=5D <b>On Behalf Of</b> Albert =46u (BLOOMBERG/ 120 PARK)<br =
/>
<b>Sent:</b> Thursday, July 25, 2019 4:19 PM<br />
<b>To:</b> <a href=3D=22mailto:idr=40ietf.org=22>idr=40ietf.org</a><br />=

<b>Subject:</b> =5BIdr=5D draft-merciaz-idr-bgp-bfd-strict-mode</span></p=
>
</div>
</div>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 xml:lang=3D=22EN-US=22=
>&=23160;</span></p>
<div>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-famil=
y:&quot;BB.Proportional&quot;,serif=22 xml:lang=3D=22EN-US=22>I am in sup=
port of this draft, and would like to request a small change to make this=
 draft more operationally useful.<br />
<br />
We have encountered several traffic blackhole problems in our production =
network without this feature. As such, we have deployed BGP with strict B=
=46D mode on a proprietary vendor implementation for a while.<br />
&=23160;<br />
Since a lot of MetroE circuit failures occur with interfaces still up, ie=
. break in the middle issues, the traditional knobs like interface hold-t=
ime/debounce timer can not be used to dampen interface flaps.&=23160;</sp=
an><span lang=3D=22EN-US=22 xml:lang=3D=22EN-US=22></span></p>
</div>
<div>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-famil=
y:&quot;BB.Proportional&quot;,serif=22 xml:lang=3D=22EN-US=22><br />
We have observed that interface issues tend to occur in bursts and would =
like to request that an option be added in =22Section 4 Operation:=22 to =
delay BGP from coming up until B=46D is proven stable continuously for a =
period of time (i.e. B=46D hold up feature).&=23160;</span><span lang=3D=22=
EN-US=22 xml:lang=3D=22EN-US=22></span></p>
</div>
<div>
<p class=3D=22MsoNormal=22 style=3D=22margin-bottom:12.0pt=22><span lang=3D=
=22EN-US=22 style=3D=22font-family:&quot;BB.Proportional&quot;,serif=22 x=
ml:lang=3D=22EN-US=22><br />
This is a feature that we are currently using in the proprietary vendor d=
eployment. In our case, since we have multiple redundant paths, we have s=
ome links where we delay BGP from coming up until B=46D has been stable c=
ontinuously for 60 seconds.<br />
<br />
Thanks<br />
Albert =46u<br />
Bloomberg</span><span lang=3D=22EN-US=22 xml:lang=3D=22EN-US=22></span></=
p>
<div>
<div>
<blockquote style=3D=22margin: 5px 5px; padding-left: 10px; border-left: =
thin solid =23e67e22;=22 class=3D=22spark=5Fquote=22>
<p class=3D=22MsoNormal=22><span lang=3D=22EN-US=22 style=3D=22font-famil=
y:&quot;BB.Proportional&quot;,serif=22 xml:lang=3D=22EN-US=22>&=23160;</s=
pan></p>
</blockquote>
</div>
</div>
</div>
</div>
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F<br />
Lsr mailing list<br />
Lsr=40ietf.org<br />
https://www.ietf.org/mailman/listinfo/lsr<br /></blockquote>
</div>
</body>
</html>

--5d3a1229_5451cf49_12dc6--


From nobody Thu Jul 25 14:13:54 2019
Return-Path: <albert.f168@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DD5A1201F1; Thu, 25 Jul 2019 14:13:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.747
X-Spam-Level: 
X-Spam-Status: No, score=-1.747 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RlnAIqh5j--Y; Thu, 25 Jul 2019 14:13:39 -0700 (PDT)
Received: from mail-vs1-xe32.google.com (mail-vs1-xe32.google.com [IPv6:2607:f8b0:4864:20::e32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1D0E1201DB; Thu, 25 Jul 2019 14:13:39 -0700 (PDT)
Received: by mail-vs1-xe32.google.com with SMTP id m23so34699198vso.1; Thu, 25 Jul 2019 14:13:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XOMDS7MH03legfjAn3UrK2CZXjfWfSJ7fghg9ao3d/Q=; b=QWRVnq84T6pQ/lJ0Mq6gGwM8rd73sQZrTiD8B9cS4IesCLT2iajKM6Mv/TN3bToKTr S0D5xq9M4zQNN1Kg8+ax5jUKP2cBLPBq8XYi5L3VL1nv65TaQgqu6h68mAsEkGEjAMeP z+2yTTfhreFLGbbA/75gEFY+imk9Bl6xSySvr/hAhWd0t25jGnE1XodlBmwZeczDtMkG N+8AP4lHsY004FemtX34+KfiHHba21EXUc6v/LdhGVDBxIeJlgdEUM82Xo8KwxoRcxty 1c59MKC4moU7tkbxMkDLSIWBwzUOgo8XCOqyKmJd+G+Y/2U2X/SYZF5jKTuXthypwmEX iucw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XOMDS7MH03legfjAn3UrK2CZXjfWfSJ7fghg9ao3d/Q=; b=GL5Z3iZ4vK5rJ3to+KMLmjCypBX0GH0GqBvIucsH5wngxk0ldnt+nDBgruT/cZlT/E /Def+Njjwv2SJZnhIHG/B+fyTajsSvijRy1BqxD9lfQPrDckniXb3jai5vWRIDogkv15 5aVFzYsCJ1KaO2Sy84uyk6/3+WNM25xAaaSErABvVnF2vh/Nu+/IzTp264VmNZJXFHle wRc6BQbvP3LVIhTJobZNisI52RGs6Bj/IsDhdlinQo6AZ0EhqUxqkgWfD4IYVYPWA8uK 91uGy0dcLeNCb42+0asL9iTHJ44AQO8lJpb54aWycikugTSTPhAEJ+iMzumskHGrWhi1 9vQg==
X-Gm-Message-State: APjAAAVK/gHfnZ2HCJjNT6Zt8wvAkNCdX6dFel1x9tfmRqC4EY4R6a9g 9NM7WGg0lXcvD6Kz+9AI03zhnE9il+k8u7cksg==
X-Google-Smtp-Source: APXvYqwKCJM09W4c7kHaMqsC3J+eqFVSpodwYRobOahB2eGVKrsSVDDfQkNuYcWwXiOOTzr15lxkgwXCTk0b+Ip4S8A=
X-Received: by 2002:a67:f281:: with SMTP id m1mr10877224vsk.184.1564089218593;  Thu, 25 Jul 2019 14:13:38 -0700 (PDT)
MIME-Version: 1.0
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com>
In-Reply-To: <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com>
From: Albert F <albert.f168@gmail.com>
Date: Thu, 25 Jul 2019 17:13:25 -0400
Message-ID: <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com>
Subject: Re: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
To: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
Cc: Susan Hares <shares@ndzh.com>, Albert Bloomberg <afu14@bloomberg.net>, "idr@ietf.org" <idr@ietf.org>,  "lsr@ietf.org" <lsr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004578cc058e87e62c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/USStY-eHvzTVetyrcX7RDtVvSZI>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 21:13:42 -0000

--0000000000004578cc058e87e62c
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Ketan,

I think it will be good to mention this in the doc, as I expect most large
networks concerned with network stability impacted by link flaps to enable
the BFD hold-up feature.

For example, if one side has BFD hold-up enabled (> BGP hold time) and the
other side does not, the BGP keepalive message from one side may be delayed
even if BFD is up. This may have implication on the BGP session
transitiining to established phase.

Thanks
Albert



On Thu, Jul 25, 2019, 4:27 PM Ketan Talaulikar (ketant) <ketant@cisco.com>
wrote:

> Hi Albert,
>
>
>
> Thanks for your feedback from an operator perspective =E2=80=93 it is val=
uable.
> This =E2=80=9CBFD hold up=E2=80=9D behaviour that you desire is best hand=
led by BFD since I
> would expect that similar behaviour would be desired across routing
> protocols (OSPF, ISIS, BGP) and perhaps other clients.
>
>
>
> IMHO this is not something that we should be tackling within the scope of
> this BGP draft. Would you agree?
>
>
>
> That said, this seems like a local implementation aspect to me. We should
> however discuss within the BFD WG if there is value in documenting this.
>
>
>
> Thanks,
>
> Ketan
>
>
>
> *From:* Idr <idr-bounces@ietf.org> *On Behalf Of *Susan Hares
> *Sent:* 25 July 2019 16:21
> *To:* 'Albert Fu' <afu14@bloomberg.net>; idr@ietf.org
> *Subject:* Re: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
>
>
>
> Albert:
>
>
>
> To clarify, do you support WG adoption with the draft as is.
>
>
>
> As a WG chair, I have to trust that all  drafts are improved during the W=
G
> process.  Can this small change be made after adoption or should it be ma=
de
> before the draft is considered for adoption.
>
>
>
> Sue Hares
>
>
>
> *From:* Idr [mailto:idr-bounces@ietf.org <idr-bounces@ietf.org>] *On
> Behalf Of *Albert Fu (BLOOMBERG/ 120 PARK)
> *Sent:* Thursday, July 25, 2019 4:19 PM
> *To:* idr@ietf.org
> *Subject:* [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
>
>
>
> I am in support of this draft, and would like to request a small change t=
o
> make this draft more operationally useful.
>
> We have encountered several traffic blackhole problems in our production
> network without this feature. As such, we have deployed BGP with strict B=
FD
> mode on a proprietary vendor implementation for a while.
>
> Since a lot of MetroE circuit failures occur with interfaces still up, ie=
.
> break in the middle issues, the traditional knobs like interface
> hold-time/debounce timer can not be used to dampen interface flaps.
>
>
> We have observed that interface issues tend to occur in bursts and would
> like to request that an option be added in "Section 4 Operation:" to dela=
y
> BGP from coming up until BFD is proven stable continuously for a period o=
f
> time (i.e. BFD hold up feature).
>
>
> This is a feature that we are currently using in the proprietary vendor
> deployment. In our case, since we have multiple redundant paths, we have
> some links where we delay BGP from coming up until BFD has been stable
> continuously for 60 seconds.
>
> Thanks
> Albert Fu
> Bloomberg
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
>

--0000000000004578cc058e87e62c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Hi Ketan,<div dir=3D"auto"><br></div><div dir=3D"auto">I =
think it will be good to mention this in the doc, as I expect most large ne=
tworks concerned with network stability impacted by link flaps to enable th=
e BFD hold-up feature.</div><div dir=3D"auto"><br></div><div dir=3D"auto">F=
or example, if one side has BFD hold-up enabled (&gt; BGP hold time) and th=
e other side does not, the BGP keepalive message from one side may be delay=
ed even if BFD is up. This may have implication on the BGP session transiti=
ining to established phase.</div><div dir=3D"auto"><br></div><div dir=3D"au=
to">Thanks</div><div dir=3D"auto">Albert</div><div dir=3D"auto"><br></div><=
div dir=3D"auto"><br></div></div><br><div class=3D"gmail_quote"><div dir=3D=
"ltr" class=3D"gmail_attr">On Thu, Jul 25, 2019, 4:27 PM Ketan Talaulikar (=
ketant) &lt;<a href=3D"mailto:ketant@cisco.com">ketant@cisco.com</a>&gt; wr=
ote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-IN" link=3D"blue" vlink=3D"purple">
<div class=3D"m_2983448012030580957WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif">Hi Albert,<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif">Thanks for your feedback from an operator perspective =E2=80=93 it i=
s valuable. This =E2=80=9CBFD hold up=E2=80=9D behaviour that you desire is=
 best handled by BFD since I would expect that
 similar behaviour would be desired across routing protocols (OSPF, ISIS, B=
GP) and perhaps other clients.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif">IMHO this is not something that we should be tackling within the sco=
pe of this BGP draft. Would you agree?<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif">That said, this seems like a local implementation aspect to me. We s=
hould however discuss within the BFD WG if there is value in documenting th=
is.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif">Thanks,<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif">Ketan</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibr=
i&quot;,sans-serif"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<div>
<div style=3D"border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Idr &lt;<a href=3D"mailto:idr-bounces@ietf.org" target=3D"_blank" rel=3D"no=
referrer">idr-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Susan Hares<br>
<b>Sent:</b> 25 July 2019 16:21<br>
<b>To:</b> &#39;Albert Fu&#39; &lt;<a href=3D"mailto:afu14@bloomberg.net" t=
arget=3D"_blank" rel=3D"noreferrer">afu14@bloomberg.net</a>&gt;; <a href=3D=
"mailto:idr@ietf.org" target=3D"_blank" rel=3D"noreferrer">idr@ietf.org</a>=
<br>
<b>Subject:</b> Re: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode<u></u><u></=
u></span></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Albert:
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">To clarify, do you sup=
port WG adoption with the draft as is.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">As a WG chair, I have =
to trust that all =C2=A0drafts are improved during the WG process.=C2=A0 Ca=
n this small change be made after adoption or should it be
 made before the draft is considered for adoption. <u></u><u></u></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Sue Hares<u></u><u></u=
></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,sans-serif">From:</span></b><span lang=3D"EN-U=
S" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"> Id=
r [<a href=3D"mailto:idr-bounces@ietf.org" target=3D"_blank" rel=3D"norefer=
rer">mailto:idr-bounces@ietf.org</a>]
<b>On Behalf Of </b>Albert Fu (BLOOMBERG/ 120 PARK)<br>
<b>Sent:</b> Thursday, July 25, 2019 4:19 PM<br>
<b>To:</b> <a href=3D"mailto:idr@ietf.org" target=3D"_blank" rel=3D"norefer=
rer">idr@ietf.org</a><br>
<b>Subject:</b> [Idr] draft-merciaz-idr-bgp-bfd-strict-mode<u></u><u></u></=
span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;BB.P=
roportional&quot;,serif">I am in support of this draft, and would like to r=
equest a small change to make this draft more operationally useful.<br>
<br>
We have encountered several traffic blackhole problems in our production ne=
twork without this feature. As such, we have deployed BGP with strict BFD m=
ode on a proprietary vendor implementation for a while.<br>
=C2=A0<br>
Since a lot of MetroE circuit failures occur with interfaces still up, ie. =
break in the middle issues, the traditional knobs like interface hold-time/=
debounce timer can not be used to dampen interface flaps.=C2=A0</span><span=
 lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;BB.P=
roportional&quot;,serif"><br>
We have observed that interface issues tend to occur in bursts and would li=
ke to request that an option be added in &quot;Section 4 Operation:&quot; t=
o delay BGP from coming up until BFD is proven stable continuously for a pe=
riod of time (i.e. BFD hold up feature).=C2=A0</span><span lang=3D"EN-US"><=
u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"EN-US" =
style=3D"font-family:&quot;BB.Proportional&quot;,serif"><br>
This is a feature that we are currently using in the proprietary vendor dep=
loyment. In our case, since we have multiple redundant paths, we have some =
links where we delay BGP from coming up until BFD has been stable continuou=
sly for 60 seconds.<br>
<br>
Thanks<br>
Albert Fu<br>
Bloomberg</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;BB.P=
roportional&quot;,serif"><u></u>=C2=A0<u></u></span></p>
</blockquote>
</div>
</div>
</div>
</div>
</div>

_______________________________________________<br>
Idr mailing list<br>
<a href=3D"mailto:Idr@ietf.org" target=3D"_blank" rel=3D"noreferrer">Idr@ie=
tf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/idr" rel=3D"noreferrer nor=
eferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/idr</a><br=
>
</blockquote></div>

--0000000000004578cc058e87e62c--


From nobody Thu Jul 25 15:22:43 2019
Return-Path: <acee@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09FE81202A7; Thu, 25 Jul 2019 15:22:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=YkowyzlL; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=XZHmhWFg
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jlXGM82o_WG8; Thu, 25 Jul 2019 15:22:25 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0809B12029F; Thu, 25 Jul 2019 15:22:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22851; q=dns/txt; s=iport; t=1564093345; x=1565302945; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=bPf1ClhI21M/OQQ5ZDhpNl1a+Z9sZU5PZbTxoeis6RE=; b=YkowyzlLr1Jqs0zqdjEJUwymS3IpCGL3UBBEaFb14fnoXo8gz2tQ9//c czLxeJu9Zrax9z5AkmsyoKtc5+awGW1cPnsMUE6zG2TB7VKjo0HkALGjK e0GPujQJjWT85D81YQMcKYzvRHGieC0/c1mvqomMliOMEPQ7gNVLuZ/02 Y=;
IronPort-PHdr: =?us-ascii?q?9a23=3A5dYV/hej4Jm6hooo+yGUqyOJlGMj4e+mNxMJ6p?= =?us-ascii?q?chl7NFe7ii+JKnJkHE+PFxlwKUD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFl?= =?us-ascii?q?cejNkO2QkpAcqLE0r+effhYiESF8VZX1gj9Ha+YgBY?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AXAAB3Kjpd/5JdJa1mGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBVQMBAQEBCwGBFC9QA21VIAQLKoQdg0cDjQCCNiV+iFaJJ4R?= =?us-ascii?q?XgS6BJANUCQEBAQwBARgBCgoCAQGEQAIXgkcjNgcOAQMBAQQBAQIBBm2FHgy?= =?us-ascii?q?FSgEBAQEDAQEQER0BASwLAQ8CAQgRAwEBASgDAgICHwYLFAkIAgQBDQUigwA?= =?us-ascii?q?BgR1NAx0BDqIkAoE4iGBxgTKCegEBBYULDQuCEwMGgTQBi14XgX+BEScME4I?= =?us-ascii?q?XNT6CGkcBAYIBDQmCVTKCJowlNYFyMYR/lgwtQAkCghqQGYN3G5gMjTqJP44?= =?us-ascii?q?WAgQCBAUCDgEBBYFXDiOBWHAVOyoBgkGCQgwXg06FFIU/coEpjS0BAQ?=
X-IronPort-AV: E=Sophos;i="5.64,308,1559520000";  d="scan'208,217";a="602859904"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Jul 2019 22:22:23 +0000
Received: from XCH-RCD-014.cisco.com (xch-rcd-014.cisco.com [173.37.102.24]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id x6PMMNcY011160 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 25 Jul 2019 22:22:23 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-014.cisco.com (173.37.102.24) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 17:22:23 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 18:22:22 -0400
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 25 Jul 2019 17:22:22 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZI/yDt1YZ49wsKbZuVaKNfgDhuMIehcM3SQ1lq4GIXzRT4gqJ+KXaFQ6mi9Rtu2J9W3MUTxXSLRwSIDa4eY1MU2pNxRiDnCirOqAJVA1NNoSDl81D96UkMPfcuFrb5MYTLEgX9rjtBggDZfwepZaXC64A235zZdiFp3H/Hw7eXRFvjHbmnIR/JXYF7Q9RgiLBTHYeuHnl79MWHEvBkm+EjjL/qBRD3YOQSTIFTkChfRtfmKlT5RxuEEyOXCSfySKMaECrmQI/3zG5ykHVavwvseMJjrbkgrP2DpnEPasI8ZZqJAA68YfHphBCyQMcQUITDcl2N3qAXewFQS+Dehigw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bPf1ClhI21M/OQQ5ZDhpNl1a+Z9sZU5PZbTxoeis6RE=; b=XDSRPCKEPYBFiTdwhjsxyGzrNNx2C94NO9nPFAnOGeJWR2X480eoR81kcXDtRWq+4P3VeN7bzGZoJe2OnSbkiNPWIij1KkUSBdVjZTUeDFAXxzrC1/Va68tTs+T2seo5mIf21LwhjiYTgST8IbC+zjxA/mgU56udmGNLZOq1HnrOAEikl5yrXigrbXd9jGa72IiBzeVQ7CSkUSYrclCQZc/U797hU3AVyUB+iNWMwtiQIvFdBfUy3U1/TUYtiS6fNJgADBbtrzZLNLs3j8YqMQrIhPW5i+r9BdrImqrm86pfW/jdaeTf+QEzw9XeRQQVkDvPZs1ZxLZE0xRzV9mu8Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bPf1ClhI21M/OQQ5ZDhpNl1a+Z9sZU5PZbTxoeis6RE=; b=XZHmhWFg7DweqxsVSoyAUIBZeHM7ugEgV7FPNVXnOS6t0msmQPPSnstXUXF/gRMKZaG09Adk9ivchwx2gIO5FfDMMgCHLQ1rtdkW3Br75w44UNHFE0n3RoOm9IpnZ5o6NjX5rIAJvNyl7i7Z3ZadrIFBdoEvCPmDGxnnln2dCZM=
Received: from MWHPR11MB1902.namprd11.prod.outlook.com (10.175.53.139) by MWHPR11MB1549.namprd11.prod.outlook.com (10.172.54.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.16; Thu, 25 Jul 2019 22:22:20 +0000
Received: from MWHPR11MB1902.namprd11.prod.outlook.com ([fe80::64fa:549d:e02a:a2b2]) by MWHPR11MB1902.namprd11.prod.outlook.com ([fe80::64fa:549d:e02a:a2b2%5]) with mapi id 15.20.2115.005; Thu, 25 Jul 2019 22:22:20 +0000
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Albert F <albert.f168@gmail.com>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>
CC: "idr@ietf.org" <idr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Albert Bloomberg <afu14@bloomberg.net>, Susan Hares <shares@ndzh.com>, "lsr@ietf.org" <lsr@ietf.org>
Subject: Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Topic: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Index: AQHVQyZErzjTIXhNX0O5ABhVo40ILabbxrOAgAABiACAAA0QgP//0DKA
Date: Thu, 25 Jul 2019 22:22:20 +0000
Message-ID: <82732FCE-F604-4501-AED0-EE35E86A72B8@cisco.com>
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com> <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com>
In-Reply-To: <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=acee@cisco.com; 
x-originating-ip: [2001:420:c0c4:1003::3d5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c65f61c8-602b-4606-598a-08d7114e8f79
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:MWHPR11MB1549; 
x-ms-traffictypediagnostic: MWHPR11MB1549:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <MWHPR11MB15493FC473182AE00116F7F2C2C10@MWHPR11MB1549.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0109D382B0
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(376002)(396003)(136003)(39860400002)(189003)(199004)(6246003)(66946007)(64756008)(66446008)(91956017)(66556008)(229853002)(6306002)(76116006)(53936002)(6436002)(606006)(71200400001)(66476007)(2616005)(54896002)(86362001)(236005)(110136005)(2906002)(6486002)(7736002)(316002)(36756003)(99286004)(81166006)(53546011)(966005)(8676002)(6636002)(81156014)(486006)(25786009)(8936002)(102836004)(478600001)(476003)(76176011)(14454004)(256004)(4326008)(446003)(68736007)(6116002)(54906003)(11346002)(33656002)(5660300002)(186003)(14444005)(46003)(71190400001)(6512007)(6506007); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR11MB1549; H:MWHPR11MB1902.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: aN6DoJcK8RQzwPgtGVBnDB5fLXQDTLATcGfLA5EdA+z5RJwUl1p5eXPjynZK70u2dGNowO3jh7bw4i1ojeBu9lIXUL3Fxwfshvg4NpsChpWhv98OK5resmiZ/TCM/kzAoSkUZ3i2zco05si3SM6oPasfsNCPDUIMiC+JEaNXrTtrTcpWDTphEzKAefznLI0eyoCT80WdgwWSwCBEr2fSBJaD3DgEmBrDgTapnBNcEj44gzBoihw0r5Ee4CaIhVJncsnvBxY4eS5FK82Hob3vALdfl7omhukz0mr/NyoIFlOs64PuskOSWCyeX5fk6JjeDL1fS5YmYnOkdodNeN4b12kmEVQAPSPRn2YlXK+QOZ7quKs+Rt6XO5mZUfJFRfWhTM+3/eFXy2m0ALO1alwCs6VhVyO6o4pkou7xDQKs0Ps=
Content-Type: multipart/alternative; boundary="_000_82732FCEF6044501AED0EE35E86A72B8ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: c65f61c8-602b-4606-598a-08d7114e8f79
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Jul 2019 22:22:20.6669 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: acee@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1549
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.24, xch-rcd-014.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/LZHewPmNKR4PdTmFUs0aYz2s62E>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 22:22:35 -0000

--_000_82732FCEF6044501AED0EE35E86A72B8ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_82732FCEF6044501AED0EE35E86A72B8ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <EFCF8239FF2AAD49A13892F5CF2DC61C@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_82732FCEF6044501AED0EE35E86A72B8ciscocom_--


From nobody Thu Jul 25 15:35:53 2019
Return-Path: <merciaz@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B858D12023B; Thu, 25 Jul 2019 15:35:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=GR1TV/Ot; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=oTMFzA+9
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Igyp2UKjlZnL; Thu, 25 Jul 2019 15:35:48 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0CDF1202B7; Thu, 25 Jul 2019 15:35:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22617; q=dns/txt; s=iport; t=1564094147; x=1565303747; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=iSbLhneny0Jx0qlYe5wzTPEV7964v5AcBznBlobW6ZE=; b=GR1TV/Ot/oFJ0AqMikd6rPT49dk2X6IsGyJTlWPzWLHeXNR6ghnwojKa FxxCdMffk8JKVszupZkQ2UR323NRaHnaCs0y+GWK1QsLpPaY5qVhMUBdf OeAqGjyhExz8zdUywHaoiREGkpmh7WiDWrB4dbw5PYxAWFZIIWCsPEFea M=;
IronPort-PHdr: =?us-ascii?q?9a23=3AG6MawxI4YsYXc5+kVNmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvad2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXEj2NvXrZj4SF8VZX1gj9Ha+YgBY?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AoAACtLTpd/49dJa1mGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBVgIBAQEBCwGBFC9QA21VIAQLKoQdg0cDjH6CW36IVoknhFe?= =?us-ascii?q?CUgNUCQEBAQwBARgBCgoCAQGEQAIXgkcjNwYOAQMBAQQBAQIBBm2FHgyFSgE?= =?us-ascii?q?BAQEDAQEQER0BASwLAQ8CAQgRAwEBASgDAgICHwYLFAkIAgQBDQUigwABgR1?= =?us-ascii?q?NAx0BAgyiIAKBOIhgcYEygnoBAQWFCw0LghMDBoE0AYteF4FAP4ERJx+BTkk?= =?us-ascii?q?1PoIaRwEBggENCYJVMoImjCU1gXIxhH+WDC1ACQKCGpAZg3cbmAyNOok/jhY?= =?us-ascii?q?CBAIEBQIOAQEFgWYigVhwFTsqAYJBgkIMF4NOhRSFP3KBKY0tAQE?=
X-IronPort-AV: E=Sophos;i="5.64,308,1559520000";  d="scan'208,217";a="604585839"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Jul 2019 22:35:46 +0000
Received: from XCH-ALN-016.cisco.com (xch-aln-016.cisco.com [173.36.7.26]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x6PMZkL5026311 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 25 Jul 2019 22:35:46 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-016.cisco.com (173.36.7.26) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 17:35:45 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 17:35:45 -0500
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 25 Jul 2019 18:35:45 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JQUZPjU+wnTqxWfgX7clGZpxVomBGyWRDZoOc+y8XBHE+0FNb9SOcgXw1qlGzVc5iI+83GaPcLwmGpuuCmbLeaEw174qNj5EFhPDsiszN7mpfw6DQ0LWU5o6MKRyiGBRg3FFBkNjUNTtpvoVlx8cHVUfK+Ix5EvgROriCF62KtirmI9lG21UrLY5YzcL41odOF6mcmAlT+k06CvDr8dvmJyBez2DHrqBIUhPpi85Any4Fx7H5mExr2j5xzHG4GauTAlU8MqevER+O7dg2/2WQCyjqhJnUP7eS4oeppuj3Btnc06wM479v9ZqGykRkGAc7ub80iaIg9Q0H/4sTvp2kw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iSbLhneny0Jx0qlYe5wzTPEV7964v5AcBznBlobW6ZE=; b=TZnK8wgPHopHTRujif6osUiwHMPSfSaOQ6gmIuxLhAg2zr8rXjrk72C95gosqnzGxZVrtpPJCILgptdO6bQkGqMBFbb9bbwr3zP76TaKZpoelYB+kMaEgohuuBpi9fQIx7COXEy4/1MRv+bxixoVt5YXIi/AsC4s+qmzufpSQM3wkkD0PotAAJk65e67lkI/MLZE5PYK2I5JrBeREZtPHQ7RJsJxa0y7ZnSsWVVp4Q+ghgF1mg5P388ppxfPbB+H5d/qFdFRvVlewVA/U2WOeZokErGy3g8uEyRWZn4KB+PAoKFZb2osXjpjB2CZA27GdEKij2xVPRyMAgQsD171hw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iSbLhneny0Jx0qlYe5wzTPEV7964v5AcBznBlobW6ZE=; b=oTMFzA+9kb8D4dYsyRH0PHDCL9iDfePp8tv1X4xLnZwL1R1lrgaUg6eAaeEhARU6vU2lUfomy3tAHDMkub3DtNV56tAwQ/vso8RBofHa6BpFB3rLbh3Bk3WiRZka2hFXFzE/GoNjrhH0Lf1xzoKx2VN13ZDIeccr+LI/WjVyCJw=
Received: from BYAPR11MB3174.namprd11.prod.outlook.com (20.177.127.27) by BYAPR11MB2693.namprd11.prod.outlook.com (52.135.227.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.16; Thu, 25 Jul 2019 22:35:44 +0000
Received: from BYAPR11MB3174.namprd11.prod.outlook.com ([fe80::38e1:a172:b56d:eac8]) by BYAPR11MB3174.namprd11.prod.outlook.com ([fe80::38e1:a172:b56d:eac8%6]) with mapi id 15.20.2115.005; Thu, 25 Jul 2019 22:35:44 +0000
From: "Mercia Zheng (merciaz)" <merciaz@cisco.com>
To: Albert F <albert.f168@gmail.com>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>
CC: "idr@ietf.org" <idr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Albert Bloomberg <afu14@bloomberg.net>, Susan Hares <shares@ndzh.com>, "lsr@ietf.org" <lsr@ietf.org>
Subject: Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Topic: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Index: AQHVQyZEuBuXjfKpfUSGrUV39m+3lKbbxrOAgAABiACAAA0QgP//0+8A
Date: Thu, 25 Jul 2019 22:35:44 +0000
Message-ID: <7C337506-FEC8-4E8F-94A6-7566111F9019@cisco.com>
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com> <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com>
In-Reply-To: <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.c.190715
authentication-results: spf=none (sender IP is ) smtp.mailfrom=merciaz@cisco.com; 
x-originating-ip: [2001:420:c0c4:1007::202]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3188a83a-1082-4547-168e-08d711506e5d
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR11MB2693; 
x-ms-traffictypediagnostic: BYAPR11MB2693:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <BYAPR11MB2693D25A9EFBBFAC2F39E047ABC10@BYAPR11MB2693.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0109D382B0
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(396003)(136003)(346002)(376002)(39860400002)(189003)(199004)(51444003)(51914003)(66556008)(5660300002)(66946007)(2906002)(7736002)(6246003)(64756008)(53546011)(66476007)(102836004)(14454004)(66446008)(91956017)(71200400001)(81166006)(25786009)(99286004)(486006)(76116006)(256004)(14444005)(6116002)(86362001)(316002)(8936002)(6486002)(606006)(58126008)(53936002)(54896002)(9326002)(33656002)(186003)(6436002)(478600001)(8676002)(71190400001)(966005)(76176011)(229853002)(6636002)(4326008)(476003)(54906003)(446003)(36756003)(11346002)(46003)(2616005)(6506007)(68736007)(81156014)(6512007)(236005)(6306002)(110136005); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB2693; H:BYAPR11MB3174.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Jcnk4ttUs8ujDaDjJ69Jk6fS4gPFGvP9P8vm53zNYhVTwb9Flvl6VlKlRNbL7THDytyR89s3tJDkdH7nAMo/9zgLs72I22cYtfmmKX8lhaxBFIjnpBjG6JgR+/+9zhbvIEZskewD4VYaTXHF0a3RNVotU2tNSCXvNbxVobfioiJ5AD48AqjZZsxEu8ABIKeX/9XMtIM7xW4LPtkzeBHV+F7Lh8T87zFDwiZlyYxYhXw0P5BQXguChd3+Z8cnNdoNddrld5hE4YT6/n3SAdAvfUTYaLMoiCp98wpFONsvTME1oZWfxlF244v6gFcdrxbXMOi3/IwAS3hM690xRo/E29Z9yKRhn3Fr7A6/JehZ4nwPki5cTtAPMkNFwNLGDOKJHtZrq6X67fjZQVopJ2BZDMhXTajcWy3WjUNM+OMScLM=
Content-Type: multipart/alternative; boundary="_000_7C337506FEC84E8F94A67566111F9019ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 3188a83a-1082-4547-168e-08d711506e5d
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Jul 2019 22:35:44.0656 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: merciaz@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2693
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.26, xch-aln-016.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/UvgjLoOwxTGP0YQ2HKfWRy3iPfw>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 22:35:51 -0000

--_000_7C337506FEC84E8F94A67566111F9019ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgQWxiZXJ0LA0KDQpUaGFua3MgZm9yIHRoZSBzdXBwb3J0IGFuZCB2YWx1YWJsZSBjb21tZW50
cyBmcm9tIGEgY3VzdG9tZXLigJlzIHBlcnNwZWN0aXZlLg0KDQpUaGlzIEJGRCDigJhob2xkLXVw
4oCZIHJlcXVlc3QgYWN0dWFsbHkgYXBwbGllcyB0byBhbGwgQkZEIGNsaWVudHMgKGUuZy4gY29u
dHJvbCBwcm90b2NvbHMpLg0KSSB0aGluayB0aGF0IEJGRCB3b3VsZCBiZSBhIGJldHRlciBjb21w
b25lbnQgdG8gYXBwbGUgdGhpcyBCRkQgaG9sZC11cCBhcyBLZXRhbiBhbHNvIG1lbnRpb25lZC4N
Ckhvd2V2ZXIsIHNvbWUgc3BlY2lmaWNhdGlvbiB3aWxsIGJlIGluY2x1ZGVkIGluIHRoZSBuZXh0
IHJldmlzaW9uIG9mIHRoZSBkb2MuDQoNClRoYW5rcywNCi1NZXJjaWENCg0KRnJvbTogTHNyIDxs
c3ItYm91bmNlc0BpZXRmLm9yZz4gb24gYmVoYWxmIG9mIEFsYmVydCBGIDxhbGJlcnQuZjE2OEBn
bWFpbC5jb20+DQpEYXRlOiBUaHVyc2RheSwgSnVseSAyNSwgMjAxOSBhdCA1OjE0IFBNDQpUbzog
IktldGFuIFRhbGF1bGlrYXIgKGtldGFudCkiIDxrZXRhbnRAY2lzY28uY29tPg0KQ2M6ICJpZHJA
aWV0Zi5vcmciIDxpZHJAaWV0Zi5vcmc+LCAicnRnLWJmZEBpZXRmLm9yZyIgPHJ0Zy1iZmRAaWV0
Zi5vcmc+LCBBbGJlcnQgQmxvb21iZXJnIDxhZnUxNEBibG9vbWJlcmcubmV0PiwgU3VzYW4gSGFy
ZXMgPHNoYXJlc0BuZHpoLmNvbT4sICJsc3JAaWV0Zi5vcmciIDxsc3JAaWV0Zi5vcmc+DQpTdWJq
ZWN0OiBSZTogW0xzcl0gW0lkcl0gZHJhZnQtbWVyY2lhei1pZHItYmdwLWJmZC1zdHJpY3QtbW9k
ZQ0KDQpIaSBLZXRhbiwNCg0KSSB0aGluayBpdCB3aWxsIGJlIGdvb2QgdG8gbWVudGlvbiB0aGlz
IGluIHRoZSBkb2MsIGFzIEkgZXhwZWN0IG1vc3QgbGFyZ2UgbmV0d29ya3MgY29uY2VybmVkIHdp
dGggbmV0d29yayBzdGFiaWxpdHkgaW1wYWN0ZWQgYnkgbGluayBmbGFwcyB0byBlbmFibGUgdGhl
IEJGRCBob2xkLXVwIGZlYXR1cmUuDQoNCkZvciBleGFtcGxlLCBpZiBvbmUgc2lkZSBoYXMgQkZE
IGhvbGQtdXAgZW5hYmxlZCAoPiBCR1AgaG9sZCB0aW1lKSBhbmQgdGhlIG90aGVyIHNpZGUgZG9l
cyBub3QsIHRoZSBCR1Aga2VlcGFsaXZlIG1lc3NhZ2UgZnJvbSBvbmUgc2lkZSBtYXkgYmUgZGVs
YXllZCBldmVuIGlmIEJGRCBpcyB1cC4gVGhpcyBtYXkgaGF2ZSBpbXBsaWNhdGlvbiBvbiB0aGUg
QkdQIHNlc3Npb24gdHJhbnNpdGlpbmluZyB0byBlc3RhYmxpc2hlZCBwaGFzZS4NCg0KVGhhbmtz
DQpBbGJlcnQNCg0KDQoNCk9uIFRodSwgSnVsIDI1LCAyMDE5LCA0OjI3IFBNIEtldGFuIFRhbGF1
bGlrYXIgKGtldGFudCkgPGtldGFudEBjaXNjby5jb208bWFpbHRvOmtldGFudEBjaXNjby5jb20+
PiB3cm90ZToNCkhpIEFsYmVydCwNCg0KVGhhbmtzIGZvciB5b3VyIGZlZWRiYWNrIGZyb20gYW4g
b3BlcmF0b3IgcGVyc3BlY3RpdmUg4oCTIGl0IGlzIHZhbHVhYmxlLiBUaGlzIOKAnEJGRCBob2xk
IHVw4oCdIGJlaGF2aW91ciB0aGF0IHlvdSBkZXNpcmUgaXMgYmVzdCBoYW5kbGVkIGJ5IEJGRCBz
aW5jZSBJIHdvdWxkIGV4cGVjdCB0aGF0IHNpbWlsYXIgYmVoYXZpb3VyIHdvdWxkIGJlIGRlc2ly
ZWQgYWNyb3NzIHJvdXRpbmcgcHJvdG9jb2xzIChPU1BGLCBJU0lTLCBCR1ApIGFuZCBwZXJoYXBz
IG90aGVyIGNsaWVudHMuDQoNCklNSE8gdGhpcyBpcyBub3Qgc29tZXRoaW5nIHRoYXQgd2Ugc2hv
dWxkIGJlIHRhY2tsaW5nIHdpdGhpbiB0aGUgc2NvcGUgb2YgdGhpcyBCR1AgZHJhZnQuIFdvdWxk
IHlvdSBhZ3JlZT8NCg0KVGhhdCBzYWlkLCB0aGlzIHNlZW1zIGxpa2UgYSBsb2NhbCBpbXBsZW1l
bnRhdGlvbiBhc3BlY3QgdG8gbWUuIFdlIHNob3VsZCBob3dldmVyIGRpc2N1c3Mgd2l0aGluIHRo
ZSBCRkQgV0cgaWYgdGhlcmUgaXMgdmFsdWUgaW4gZG9jdW1lbnRpbmcgdGhpcy4NCg0KVGhhbmtz
LA0KS2V0YW4NCg0KRnJvbTogSWRyIDxpZHItYm91bmNlc0BpZXRmLm9yZzxtYWlsdG86aWRyLWJv
dW5jZXNAaWV0Zi5vcmc+PiBPbiBCZWhhbGYgT2YgU3VzYW4gSGFyZXMNClNlbnQ6IDI1IEp1bHkg
MjAxOSAxNjoyMQ0KVG86ICdBbGJlcnQgRnUnIDxhZnUxNEBibG9vbWJlcmcubmV0PG1haWx0bzph
ZnUxNEBibG9vbWJlcmcubmV0Pj47IGlkckBpZXRmLm9yZzxtYWlsdG86aWRyQGlldGYub3JnPg0K
U3ViamVjdDogUmU6IFtJZHJdIGRyYWZ0LW1lcmNpYXotaWRyLWJncC1iZmQtc3RyaWN0LW1vZGUN
Cg0KQWxiZXJ0Og0KDQpUbyBjbGFyaWZ5LCBkbyB5b3Ugc3VwcG9ydCBXRyBhZG9wdGlvbiB3aXRo
IHRoZSBkcmFmdCBhcyBpcy4NCg0KQXMgYSBXRyBjaGFpciwgSSBoYXZlIHRvIHRydXN0IHRoYXQg
YWxsICBkcmFmdHMgYXJlIGltcHJvdmVkIGR1cmluZyB0aGUgV0cgcHJvY2Vzcy4gIENhbiB0aGlz
IHNtYWxsIGNoYW5nZSBiZSBtYWRlIGFmdGVyIGFkb3B0aW9uIG9yIHNob3VsZCBpdCBiZSBtYWRl
IGJlZm9yZSB0aGUgZHJhZnQgaXMgY29uc2lkZXJlZCBmb3IgYWRvcHRpb24uDQoNClN1ZSBIYXJl
cw0KDQpGcm9tOiBJZHIgW21haWx0bzppZHItYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9m
IEFsYmVydCBGdSAoQkxPT01CRVJHLyAxMjAgUEFSSykNClNlbnQ6IFRodXJzZGF5LCBKdWx5IDI1
LCAyMDE5IDQ6MTkgUE0NClRvOiBpZHJAaWV0Zi5vcmc8bWFpbHRvOmlkckBpZXRmLm9yZz4NClN1
YmplY3Q6IFtJZHJdIGRyYWZ0LW1lcmNpYXotaWRyLWJncC1iZmQtc3RyaWN0LW1vZGUNCg0KSSBh
bSBpbiBzdXBwb3J0IG9mIHRoaXMgZHJhZnQsIGFuZCB3b3VsZCBsaWtlIHRvIHJlcXVlc3QgYSBz
bWFsbCBjaGFuZ2UgdG8gbWFrZSB0aGlzIGRyYWZ0IG1vcmUgb3BlcmF0aW9uYWxseSB1c2VmdWwu
DQoNCldlIGhhdmUgZW5jb3VudGVyZWQgc2V2ZXJhbCB0cmFmZmljIGJsYWNraG9sZSBwcm9ibGVt
cyBpbiBvdXIgcHJvZHVjdGlvbiBuZXR3b3JrIHdpdGhvdXQgdGhpcyBmZWF0dXJlLiBBcyBzdWNo
LCB3ZSBoYXZlIGRlcGxveWVkIEJHUCB3aXRoIHN0cmljdCBCRkQgbW9kZSBvbiBhIHByb3ByaWV0
YXJ5IHZlbmRvciBpbXBsZW1lbnRhdGlvbiBmb3IgYSB3aGlsZS4NCg0KU2luY2UgYSBsb3Qgb2Yg
TWV0cm9FIGNpcmN1aXQgZmFpbHVyZXMgb2NjdXIgd2l0aCBpbnRlcmZhY2VzIHN0aWxsIHVwLCBp
ZS4gYnJlYWsgaW4gdGhlIG1pZGRsZSBpc3N1ZXMsIHRoZSB0cmFkaXRpb25hbCBrbm9icyBsaWtl
IGludGVyZmFjZSBob2xkLXRpbWUvZGVib3VuY2UgdGltZXIgY2FuIG5vdCBiZSB1c2VkIHRvIGRh
bXBlbiBpbnRlcmZhY2UgZmxhcHMuDQoNCldlIGhhdmUgb2JzZXJ2ZWQgdGhhdCBpbnRlcmZhY2Ug
aXNzdWVzIHRlbmQgdG8gb2NjdXIgaW4gYnVyc3RzIGFuZCB3b3VsZCBsaWtlIHRvIHJlcXVlc3Qg
dGhhdCBhbiBvcHRpb24gYmUgYWRkZWQgaW4gIlNlY3Rpb24gNCBPcGVyYXRpb246IiB0byBkZWxh
eSBCR1AgZnJvbSBjb21pbmcgdXAgdW50aWwgQkZEIGlzIHByb3ZlbiBzdGFibGUgY29udGludW91
c2x5IGZvciBhIHBlcmlvZCBvZiB0aW1lIChpLmUuIEJGRCBob2xkIHVwIGZlYXR1cmUpLg0KDQpU
aGlzIGlzIGEgZmVhdHVyZSB0aGF0IHdlIGFyZSBjdXJyZW50bHkgdXNpbmcgaW4gdGhlIHByb3By
aWV0YXJ5IHZlbmRvciBkZXBsb3ltZW50LiBJbiBvdXIgY2FzZSwgc2luY2Ugd2UgaGF2ZSBtdWx0
aXBsZSByZWR1bmRhbnQgcGF0aHMsIHdlIGhhdmUgc29tZSBsaW5rcyB3aGVyZSB3ZSBkZWxheSBC
R1AgZnJvbSBjb21pbmcgdXAgdW50aWwgQkZEIGhhcyBiZWVuIHN0YWJsZSBjb250aW51b3VzbHkg
Zm9yIDYwIHNlY29uZHMuDQoNClRoYW5rcw0KQWxiZXJ0IEZ1DQpCbG9vbWJlcmcNCg0KX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCklkciBtYWlsaW5nIGxp
c3QNCklkckBpZXRmLm9yZzxtYWlsdG86SWRyQGlldGYub3JnPg0KaHR0cHM6Ly93d3cuaWV0Zi5v
cmcvbWFpbG1hbi9saXN0aW5mby9pZHINCg==

--_000_7C337506FEC84E8F94A67566111F9019ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <DA432CB54AB6E349BE327B1F1629E103@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_7C337506FEC84E8F94A67566111F9019ciscocom_--


From nobody Thu Jul 25 15:41:47 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 533BC120226; Thu, 25 Jul 2019 15:41:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id goEhyZjlbuAR; Thu, 25 Jul 2019 15:41:29 -0700 (PDT)
Received: from mail-lf1-x12b.google.com (mail-lf1-x12b.google.com [IPv6:2a00:1450:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56C941201D1; Thu, 25 Jul 2019 15:41:28 -0700 (PDT)
Received: by mail-lf1-x12b.google.com with SMTP id v85so35657618lfa.6; Thu, 25 Jul 2019 15:41:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Q+WmU2t0musgf2Z9C1vkYfLh/Ni9Z9a2uyX2pOERIDQ=; b=RQ3xSTIgKJXBAiqhJXh1a31dPMNGyt3gj2oRgWDFeUpeora4V1WXx8qC279p+78P5u PQcFc9NkUE3IxCkDa0nSYpQpzc8gIv6338Ist01F+AwprUht7RXaRZY/1sS7u6nrE9eP X3qOKK6N7SPFYfut+foRkgGA+5P+zIyZE6eQGY+/Wd8A7wlvD0rm3ns8YsDsBGeZg0rQ 5+j+0l8xhMk5mYzXX1+oBZHEJy+8CPdeUIGjNxzL3pW7ViLkXpDJdctgsfl6sLnEF08y ldiBzvN+cpT299x9VcNYBz14sEeYfnxCHSimduXUIOZ4W1zGaYMMY+W5trwI2CHmshDx +z1g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Q+WmU2t0musgf2Z9C1vkYfLh/Ni9Z9a2uyX2pOERIDQ=; b=pnRk/2Qs/U3R41N02uXUWjwrSjnZ0L85TuFPLhBaS07O+kvUNGcKA2UjyEXmfEgW4n hOM2EJRrIIOxagq4GoAylc8FRdc2MVo5qiLJMR08mb7+cDA1tSeiRYBQliKAoxrApWZs D2AKiKeqG6k1KZZCtrcrUUT1yrOQRwP+XpBeVeZGl0m9tgkH3lZYi+OHnTuV1wJHgU6i B5tsBtK8ihc5QcaJKkS/jIKTajwZPMvyezdWEZDidQKtUkWOU6KHU3OUpk5s/7R4b/oN 51JTEId/V9fQI6RHi9P6pM8bcxeoM4UeP3DvzTHoli9po1kyuyvec5wlSJtpw0ZAodPe ywjw==
X-Gm-Message-State: APjAAAV2/d0jVTppWx1XeHX3UU5cdusVRC1ICooqaHz5Unzy8r7k2o7D rbMIq4R73w7qKXz5NgHNl+JYg/SJl4uw9s+UaGg=
X-Google-Smtp-Source: APXvYqytmpD4sYhZ8nQGi53aAPYl1YLESvAbx5/diNiu3nF8dra40vTly8rz7ozHkhrQAQDmL5sNR4LX6gpga6LhE7Q=
X-Received: by 2002:a05:6512:48f:: with SMTP id v15mr11694691lfq.37.1564094486421;  Thu, 25 Jul 2019 15:41:26 -0700 (PDT)
MIME-Version: 1.0
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com> <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com> <82732FCE-F604-4501-AED0-EE35E86A72B8@cisco.com>
In-Reply-To: <82732FCE-F604-4501-AED0-EE35E86A72B8@cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 25 Jul 2019 18:41:14 -0400
Message-ID: <CA+RyBmW4ArDmej-U0Mad+qmawx-D8wcvv836Xjjo6PB8tNLEkg@mail.gmail.com>
Subject: Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
To: "Acee Lindem (acee)" <acee@cisco.com>
Cc: Albert F <albert.f168@gmail.com>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>,  "idr@ietf.org" <idr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Susan Hares <shares@ndzh.com>,  Albert Bloomberg <afu14@bloomberg.net>, "lsr@ietf.org" <lsr@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000042259f058e8920a5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/MVdg77onPp-Z8uOIxlwPHyFHCoM>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 22:41:32 -0000

--00000000000042259f058e8920a5
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Acee,
I imagine that there could be multiple clients of the same BFD session with
different requirements in regard to dampening behavior. For example, the
delay each client desires to use may be different for each client of the
BFD session. If that is a plausible use case, I think that placing
dampening to a client may be a better choice.

Regards,
Greg

On Thu, Jul 25, 2019 at 6:23 PM Acee Lindem (acee) <acee@cisco.com> wrote:

> Hi Albert, Ketan,
>
> The authors will document dampening in the operational considerations. I=
=E2=80=99m
> also of the mind that the dampening should be done in BFD rather than the
> BFD clients (e.g., BGP).
>
> Thanks,
> Acee
>
>
>
> *From: *Lsr <lsr-bounces@ietf.org> on behalf of Albert F <
> albert.f168@gmail.com>
> *Date: *Thursday, July 25, 2019 at 5:14 PM
> *To: *"Ketan Talaulikar (ketant)" <ketant@cisco.com>
> *Cc: *IDR List <idr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>,
> Albert Bloomberg <afu14@bloomberg.net>, Susan Hares <shares@ndzh.com>, "
> lsr@ietf.org" <lsr@ietf.org>
> *Subject: *Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
>
>
>
> Hi Ketan,
>
>
>
> I think it will be good to mention this in the doc, as I expect most larg=
e
> networks concerned with network stability impacted by link flaps to enabl=
e
> the BFD hold-up feature.
>
>
>
> For example, if one side has BFD hold-up enabled (> BGP hold time) and th=
e
> other side does not, the BGP keepalive message from one side may be delay=
ed
> even if BFD is up. This may have implication on the BGP session
> transitiining to established phase.
>
>
>
> Thanks
>
> Albert
>
>
>
>
>
>
>
> On Thu, Jul 25, 2019, 4:27 PM Ketan Talaulikar (ketant) <ketant@cisco.com=
>
> wrote:
>
> Hi Albert,
>
>
>
> Thanks for your feedback from an operator perspective =E2=80=93 it is val=
uable.
> This =E2=80=9CBFD hold up=E2=80=9D behaviour that you desire is best hand=
led by BFD since I
> would expect that similar behaviour would be desired across routing
> protocols (OSPF, ISIS, BGP) and perhaps other clients.
>
>
>
> IMHO this is not something that we should be tackling within the scope of
> this BGP draft. Would you agree?
>
>
>
> That said, this seems like a local implementation aspect to me. We should
> however discuss within the BFD WG if there is value in documenting this.
>
>
>
> Thanks,
>
> Ketan
>
>
>
> *From:* Idr <idr-bounces@ietf.org> *On Behalf Of *Susan Hares
> *Sent:* 25 July 2019 16:21
> *To:* 'Albert Fu' <afu14@bloomberg.net>; idr@ietf.org
> *Subject:* Re: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
>
>
>
> Albert:
>
>
>
> To clarify, do you support WG adoption with the draft as is.
>
>
>
> As a WG chair, I have to trust that all  drafts are improved during the W=
G
> process.  Can this small change be made after adoption or should it be ma=
de
> before the draft is considered for adoption.
>
>
>
> Sue Hares
>
>
>
> *From:* Idr [mailto:idr-bounces@ietf.org <idr-bounces@ietf.org>] *On
> Behalf Of *Albert Fu (BLOOMBERG/ 120 PARK)
> *Sent:* Thursday, July 25, 2019 4:19 PM
> *To:* idr@ietf.org
> *Subject:* [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
>
>
>
> I am in support of this draft, and would like to request a small change t=
o
> make this draft more operationally useful.
>
> We have encountered several traffic blackhole problems in our production
> network without this feature. As such, we have deployed BGP with strict B=
FD
> mode on a proprietary vendor implementation for a while.
>
> Since a lot of MetroE circuit failures occur with interfaces still up, ie=
.
> break in the middle issues, the traditional knobs like interface
> hold-time/debounce timer can not be used to dampen interface flaps.
>
>
> We have observed that interface issues tend to occur in bursts and would
> like to request that an option be added in "Section 4 Operation:" to dela=
y
> BGP from coming up until BFD is proven stable continuously for a period o=
f
> time (i.e. BFD hold up feature).
>
>
> This is a feature that we are currently using in the proprietary vendor
> deployment. In our case, since we have multiple redundant paths, we have
> some links where we delay BGP from coming up until BFD has been stable
> continuously for 60 seconds.
>
> Thanks
> Albert Fu
> Bloomberg
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
>
>

--00000000000042259f058e8920a5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Acee,<div>I imagine that there could be multiple client=
s of the same BFD session with different requirements in regard to dampenin=
g behavior. For example, the delay each client desires to use may be differ=
ent for each client of the BFD session. If that is a plausible use case, I =
think that placing dampening to a client may be a better choice.</div><div>=
<br></div><div>Regards,</div><div>Greg</div></div><br><div class=3D"gmail_q=
uote"><div dir=3D"ltr" class=3D"gmail_attr">On Thu, Jul 25, 2019 at 6:23 PM=
 Acee Lindem (acee) &lt;<a href=3D"mailto:acee@cisco.com">acee@cisco.com</a=
>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">





<div lang=3D"EN-US">
<div class=3D"gmail-m_8715235235768219239WordSection1">
<p class=3D"MsoNormal">Hi Albert, Ketan, <u></u><u></u></p>
<p class=3D"MsoNormal">The authors will document dampening in the operation=
al considerations. I=E2=80=99m also of the mind that the dampening should b=
e done in BFD rather than the BFD clients (e.g., BGP).
<u></u><u></u></p>
<p class=3D"MsoNormal">Thanks,<br>
Acee<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0in 0in">
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><b><span style=3D"font-s=
ize:12pt;color:black">From:
</span></b><span style=3D"font-size:12pt;color:black">Lsr &lt;<a href=3D"ma=
ilto:lsr-bounces@ietf.org" target=3D"_blank">lsr-bounces@ietf.org</a>&gt; o=
n behalf of Albert F &lt;<a href=3D"mailto:albert.f168@gmail.com" target=3D=
"_blank">albert.f168@gmail.com</a>&gt;<br>
<b>Date: </b>Thursday, July 25, 2019 at 5:14 PM<br>
<b>To: </b>&quot;Ketan Talaulikar (ketant)&quot; &lt;<a href=3D"mailto:keta=
nt@cisco.com" target=3D"_blank">ketant@cisco.com</a>&gt;<br>
<b>Cc: </b>IDR List &lt;<a href=3D"mailto:idr@ietf.org" target=3D"_blank">i=
dr@ietf.org</a>&gt;, &quot;<a href=3D"mailto:rtg-bfd@ietf.org" target=3D"_b=
lank">rtg-bfd@ietf.org</a>&quot; &lt;<a href=3D"mailto:rtg-bfd@ietf.org" ta=
rget=3D"_blank">rtg-bfd@ietf.org</a>&gt;, Albert Bloomberg &lt;<a href=3D"m=
ailto:afu14@bloomberg.net" target=3D"_blank">afu14@bloomberg.net</a>&gt;, S=
usan Hares &lt;<a href=3D"mailto:shares@ndzh.com" target=3D"_blank">shares@=
ndzh.com</a>&gt;, &quot;<a href=3D"mailto:lsr@ietf.org" target=3D"_blank">l=
sr@ietf.org</a>&quot; &lt;<a href=3D"mailto:lsr@ietf.org" target=3D"_blank"=
>lsr@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode<u></u=
><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">Hi Ketan, <u></u><u></u>=
</p>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">I think it will be good =
to mention this in the doc, as I expect most large networks concerned with =
network stability impacted by link flaps to enable the BFD hold-up feature.=
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">For example, if one side=
 has BFD hold-up enabled (&gt; BGP hold time) and the other side does not, =
the BGP keepalive message from one side may be delayed even if BFD is up. T=
his may have implication on the BGP session
 transitiining to established phase.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">Thanks<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">Albert<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">On Thu, Jul 25, 2019, 4:=
27 PM Ketan Talaulikar (ketant) &lt;<a href=3D"mailto:ketant@cisco.com" tar=
get=3D"_blank">ketant@cisco.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0in 0in 0in 6pt;margin-left:4=
.8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">Hi Albert,<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">Thanks for your feedback from an operator perspective =
=E2=80=93 it is valuable. This =E2=80=9CBFD hold up=E2=80=9D behaviour that=
 you desire is best handled by BFD since I would expect that similar behavi=
our would be desired across routing protocols (OSPF, ISIS,
 BGP) and perhaps other clients.<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">IMHO this is not something that we should be tackling =
within the scope of this BGP draft. Would you agree?<u></u><u></u></span></=
p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">That said, this seems like a local implementation aspe=
ct to me. We should however discuss within the BFD WG if there is value in =
documenting this.<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">Thanks,<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">Ketan<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">=C2=A0<u></u><u></u></span></p>
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<b>From:</b> Idr &lt;<a href=3D"mailto:idr-bounces@ietf.org" target=3D"_bla=
nk">idr-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Susan Hares<br>
<b>Sent:</b> 25 July 2019 16:21<br>
<b>To:</b> &#39;Albert Fu&#39; &lt;<a href=3D"mailto:afu14@bloomberg.net" t=
arget=3D"_blank">afu14@bloomberg.net</a>&gt;;
<a href=3D"mailto:idr@ietf.org" target=3D"_blank">idr@ietf.org</a><br>
<b>Subject:</b> Re: [Idr] draft-merciaz-idr-bgp-bfd-strict-mode<span lang=
=3D"EN-IN"><u></u><u></u></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span lang=3D"EN-IN">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">Albert: </span><span lang=3D"EN-IN"><u=
></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">=C2=A0</span><span lang=3D"EN-IN"><u><=
/u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">To clarify, do you support WG adoption=
 with the draft as is.=C2=A0
</span><span lang=3D"EN-IN"><u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">=C2=A0</span><span lang=3D"EN-IN"><u><=
/u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">As a WG chair, I have to trust that al=
l =C2=A0drafts are improved during the WG process.=C2=A0 Can this small cha=
nge be made after adoption or should it be made before the draft is conside=
red for adoption.
</span><span lang=3D"EN-IN"><u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">=C2=A0</span><span lang=3D"EN-IN"><u><=
/u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">Sue Hares</span><span lang=3D"EN-IN"><=
u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"color:rgb(31,73,125)">=C2=A0</span><span lang=3D"EN-IN"><u><=
/u><u></u></span></p>
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0in 0in">
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<b><span style=3D"font-size:10pt;font-family:Tahoma,sans-serif">From:</span=
></b><span style=3D"font-size:10pt;font-family:Tahoma,sans-serif"> Idr [<a =
href=3D"mailto:idr-bounces@ietf.org" target=3D"_blank">mailto:idr-bounces@i=
etf.org</a>]
<b>On Behalf Of </b>Albert Fu (BLOOMBERG/ 120 PARK)<br>
<b>Sent:</b> Thursday, July 25, 2019 4:19 PM<br>
<b>To:</b> <a href=3D"mailto:idr@ietf.org" target=3D"_blank">idr@ietf.org</=
a><br>
<b>Subject:</b> [Idr] draft-merciaz-idr-bgp-bfd-strict-mode</span><span lan=
g=3D"EN-IN"><u></u><u></u></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
=C2=A0<span lang=3D"EN-IN"><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"font-family:&quot;Times New Roman&quot;,serif">I am in suppo=
rt of this draft, and would like to request a small change to make this dra=
ft more operationally useful.<br>
<br>
We have encountered several traffic blackhole problems in our production ne=
twork without this feature. As such, we have deployed BGP with strict BFD m=
ode on a proprietary vendor implementation for a while.<br>
=C2=A0<br>
Since a lot of MetroE circuit failures occur with interfaces still up, ie. =
break in the middle issues, the traditional knobs like interface hold-time/=
debounce timer can not be used to dampen interface flaps.=C2=A0</span><span=
 lang=3D"EN-IN"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"font-family:&quot;Times New Roman&quot;,serif"><br>
We have observed that interface issues tend to occur in bursts and would li=
ke to request that an option be added in &quot;Section 4 Operation:&quot; t=
o delay BGP from coming up until BFD is proven stable continuously for a pe=
riod of time (i.e. BFD hold up feature).=C2=A0</span><span lang=3D"EN-IN"><=
u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt;margin-left:0.5in">
<span style=3D"font-family:&quot;Times New Roman&quot;,serif"><br>
This is a feature that we are currently using in the proprietary vendor dep=
loyment. In our case, since we have multiple redundant paths, we have some =
links where we delay BGP from coming up until BFD has been stable continuou=
sly for 60 seconds.<br>
<br>
Thanks<br>
Albert Fu<br>
Bloomberg</span><span lang=3D"EN-IN"><u></u><u></u></span></p>
<div>
<div>
<blockquote style=3D"margin-top:5pt;margin-bottom:5pt">
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">
<span style=3D"font-family:&quot;Times New Roman&quot;,serif">=C2=A0</span>=
<span lang=3D"EN-IN"><u></u><u></u></span></p>
</blockquote>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:0.5in">________________________=
_______________________<br>
Idr mailing list<br>
<a href=3D"mailto:Idr@ietf.org" target=3D"_blank">Idr@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/idr" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/idr</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>

</blockquote></div>

--00000000000042259f058e8920a5--


From nobody Thu Jul 25 20:09:54 2019
Return-Path: <acee@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A91C120277; Thu, 25 Jul 2019 20:09:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=JUnLSrDe; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=xP85PmFm
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jyl1MesTZSUg; Thu, 25 Jul 2019 20:09:37 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7038A120225; Thu, 25 Jul 2019 20:09:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=29683; q=dns/txt; s=iport; t=1564110577; x=1565320177; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=enj2FGhSz1g73vJaFuqF7ubUBPg9aQGye6XNordm+lc=; b=JUnLSrDe87lc22LwZvzoun0AI1XtO67glQ1ZpvJTeMxvGpO0ouidDp2B t3aemjaXERBsNc6VdnSHERR21g0ll2jXAGpHGrsBR4ZCIbilesXgI0fvT B1SkpiufrOmCBeTvNQzYeGS7HY97OJNiMBfPfbZu8ze95xEdWdLtFXe11 c=;
IronPort-PHdr: =?us-ascii?q?9a23=3AUduvKxWm33UHwZiavGfdfDftZZTV8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSANiJ8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dEwd4TgxRmBceEDUPhK/u/Zic3EexJVURu+DewNk0GUMs=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AQAAAwbjpd/5ldJa1lGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBVAQBAQEBCwGBFC9QA21VIAQLKoQdg0cDjQCCNiV+iFaNfoE?= =?us-ascii?q?ugSQDVAkBAQEMAQEYAQoKAgEBhEACF4JHIzUIDgEDAQEEAQECAQZthR4MhUo?= =?us-ascii?q?BAQEBAwEBEBEdAQEsCwEPAgEIEQMBAQEeAwcDAgICHwYLFAkIAgQOBSKDAAG?= =?us-ascii?q?BHU0DHQEOogsCgTiIYHGBMoJ6AQEFhQwNC4ITAwaBNAGLXheBf4ERJwwTgU5?= =?us-ascii?q?JNT6CGkcBAYIBDQmCVTKCJowlNYFyMYR/lgwtQAkCghqQGYN3G5gMlnmOFgI?= =?us-ascii?q?EAgQFAg4BAQWBUgE1gVhwFTsqAYJBgkIMF4NOhRSFP3KBKY0tAQE?=
X-IronPort-AV: E=Sophos;i="5.64,309,1559520000";  d="scan'208,217";a="300981858"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 Jul 2019 03:09:36 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id x6Q39ama022894 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 26 Jul 2019 03:09:36 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 22:09:35 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 25 Jul 2019 22:09:34 -0500
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 25 Jul 2019 23:09:34 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jCA2MF+h3I3Py3F9J0NfsdKbOAzHOHCahsAW2lofwShsBHsKvCHa91B16YnsDrw/iq6gHX6jSXQDo7ctNpRal1oOimHMC2UqiCnjquUmoKtZydy3Fi7Xmsjtz+6rEd1g+p+TzG6B23zx1AvPtbAtbwUFqw+hh+LcMzHwzgg44ozBH7yjleGMmj4Tz1LjLy8Oa8F8u7mjdnVZoPR07eg3W+G4DOeKfQn3jzyFbf3yqMsRvZVnGMM4q+Q151BOkP/v++D/VDK0wF46zZYYA2ulPnw71dWJk09xWvXEsGsvMlA8wuCm57Dcy0zm5U0a/2xv54YjWhrAR5EiHosA+ECUqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=enj2FGhSz1g73vJaFuqF7ubUBPg9aQGye6XNordm+lc=; b=K2y6PJUKF8NAl98c6YB0yedhmrRsXeidViQoRtlznieD+GE+XKOzYoMbkMa1rV35MKTJd03TK0hhcG6UMaoehC+iGys+bbsJuiZwpvoY2cn9Qi5LYThVwh9kK+AcmkmDbwgKMpUUbxPDZxBIDuUxdi3ecBAwJoWs74ROYSgwzlCmofXopFLdsdDVMEAH6RaxnQ70GwK9Lz+wRcqZwHKbwFUx8iS7qJxxbNAdPiaFgPw1IV4+lv8kDlG+BAen9XaDKzIFFyYzGEBEUbp0ADXDbdwEPkJ/LWjAf/bfO4d1xFrodyT5eZX9nKa59EW46nn6OPLw2ytrlwKWezzyoLwE1Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=enj2FGhSz1g73vJaFuqF7ubUBPg9aQGye6XNordm+lc=; b=xP85PmFmmDVdvRd7JT2lPxSftoEdO+o4mjJ9UoLszzEpPb9nHZBy6haUJQByMUDWHkmyzT9nVBnmo9Sr4f35PsjfF64uLNgcYG3NnUqAjwqw4dEytBfoEkMmbBkE2s5KHla5sszPjE91SUWPouzEYbUkcec8tKhKIDOWvJOlxTE=
Received: from MWHPR11MB1902.namprd11.prod.outlook.com (10.175.53.139) by MWHPR11MB1518.namprd11.prod.outlook.com (10.172.54.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.16; Fri, 26 Jul 2019 03:09:32 +0000
Received: from MWHPR11MB1902.namprd11.prod.outlook.com ([fe80::64fa:549d:e02a:a2b2]) by MWHPR11MB1902.namprd11.prod.outlook.com ([fe80::64fa:549d:e02a:a2b2%5]) with mapi id 15.20.2115.005; Fri, 26 Jul 2019 03:09:32 +0000
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: "idr@ietf.org" <idr@ietf.org>, Albert Bloomberg <afu14@bloomberg.net>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Albert F <albert.f168@gmail.com>, Susan Hares <shares@ndzh.com>
Subject: Re: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Topic: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Index: AQHVQyZErzjTIXhNX0O5ABhVo40ILabbxrOAgAABiACAAA0QgP//0DKAgABIVwCAAAfngA==
Date: Fri, 26 Jul 2019 03:09:32 +0000
Message-ID: <B0E27D1E-2831-4795-ACCB-8C45F1F8301D@cisco.com>
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com> <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com> <82732FCE-F604-4501-AED0-EE35E86A72B8@cisco.com> <CA+RyBmW4ArDmej-U0Mad+qmawx-D8wcvv836Xjjo6PB8tNLEkg@mail.gmail.com>
In-Reply-To: <CA+RyBmW4ArDmej-U0Mad+qmawx-D8wcvv836Xjjo6PB8tNLEkg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=acee@cisco.com; 
x-originating-ip: [2001:420:c0c4:1003::3d5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 65c72301-462a-4f02-fb08-08d71176ae85
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:MWHPR11MB1518; 
x-ms-traffictypediagnostic: MWHPR11MB1518:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <MWHPR11MB1518063B66F877B2C4E7084AC2C00@MWHPR11MB1518.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 01106E96F6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(366004)(376002)(346002)(396003)(136003)(189003)(199004)(51444003)(186003)(316002)(6512007)(66446008)(66556008)(64756008)(66476007)(91956017)(66946007)(54906003)(2906002)(76116006)(1411001)(606006)(229853002)(6246003)(53936002)(54896002)(6306002)(236005)(71190400001)(446003)(476003)(14444005)(71200400001)(2616005)(86362001)(99286004)(81166006)(36756003)(7736002)(8676002)(966005)(6916009)(6506007)(53546011)(14454004)(256004)(102836004)(486006)(6436002)(8936002)(9326002)(76176011)(11346002)(4326008)(33656002)(5660300002)(478600001)(6486002)(81156014)(46003)(6116002)(68736007)(25786009); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR11MB1518; H:MWHPR11MB1902.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: qtNGKDTfRVL2l+klRaSKmP+q0usGykS8Qmf+iBy3Kx+GVn0duP3Tpv7QjTSDJiVnxyTR6ejNA9XquKgW/us1k5AAiJrDfKDv59qnlKO3A3FHNzoOsmpgc28o9+JOxltEznqbVKVOApcnMxRf0xvnJDfTIewkAcPsAHLb2DpqWGZTaEvG2KZ7kigY4akHgyqnkMj3rtE/Rq86+bsPEnsn7aF2gmGIy3/P/eaAR047qeSM6o763SHKumqXG0DSd58qdRbjz4NbJ2oy9DAxTDYBvaSCzDnot0H9Vd3PQq7mbQSxddvsYwsyBRCXL3f+DmAG1b7uVsoGcmtRLhyMqXJNsBsHKH+HlMvbzZlZMlQGpK01eWSbwZdqF1yGJd8q9i0jernHHXtDdK+4YU9W6BduwyQoheCJ15TMQuyKQC8SySg=
Content-Type: multipart/alternative; boundary="_000_B0E27D1E28314795ACCB8C45F1F8301Dciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 65c72301-462a-4f02-fb08-08d71176ae85
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jul 2019 03:09:32.6132 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: acee@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1518
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/W2oxt8fBuaTghq13yS1a_TJRvPw>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jul 2019 03:09:40 -0000

--_000_B0E27D1E28314795ACCB8C45F1F8301Dciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B0E27D1E28314795ACCB8C45F1F8301Dciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <A0A5FD3DBBCB4B449E5A58342FB02B53@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_B0E27D1E28314795ACCB8C45F1F8301Dciscocom_--


From nobody Sat Jul 27 17:23:34 2019
Return-Path: <ginsberg@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 980A71200C1; Sat, 27 Jul 2019 17:23:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QnQavhbr; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=jk+Aa/2d
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JvSx4KB8pZGO; Sat, 27 Jul 2019 17:23:11 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72CF8120047; Sat, 27 Jul 2019 17:23:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=32546; q=dns/txt; s=iport; t=1564273391; x=1565482991; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Aqz/zxEjc47HwZ6mXS0u3TwIPOOZotpTkyS1zcuSYTY=; b=QnQavhbrgTCQzI8asrAIwFpIikkSgggdV16tdtb5ZIuUyCsgtmSTc3Rf 6JWGdGX8jznYTvwMwFz+z4BE/+yd2jzNChH8a1HOpiB42+lgXWnbUpkJS +y1e6GAY9+bzIYZOw8Q1OS3/jYfCbzQTDHkcMa9JCugjUYYe8aRvk6giY 0=;
IronPort-PHdr: =?us-ascii?q?9a23=3AGMpJjhL8zGxrOZqX3dmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvKd2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXEL6KuXgYjY1NM9DT1RiuXq8NBsdFQ=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AdAACC6Txd/5FdJa1mGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBVgEBAQEBAQsBgRQvUANtVSAECyqEHoNHA40Aglt+iFa?= =?us-ascii?q?Nf4JSA1QJAQEBDAEBGAEKCgIBAYRAAheCSyM3Bg4BAwEBBAEBAgEGbYUeDIV?= =?us-ascii?q?KAQEBAQMBARARChMBASwLAQ8CAQgRAwEBASEHAwICAh8GCxQJCAIEAQ0FCBq?= =?us-ascii?q?DAYEdTQMdAQIMny8CgTiIYHGBMoJ6AQEFhQMNC4ITAwaBNAGLXxeBQD+BEUa?= =?us-ascii?q?BTkk1PoIaRwEBgWMeDQmCVTKCJowmNYFyMYR/lhEtQAkCghqQHYQSmA6NO4k?= =?us-ascii?q?/jhcCBAIEBQIOAQEFgWYigVhwFTuCbIJCDBeDToUUhT4BcoEpjTUBAQ?=
X-IronPort-AV: E=Sophos;i="5.64,315,1559520000";  d="scan'208,217";a="604058173"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Jul 2019 00:23:09 +0000
Received: from XCH-RCD-014.cisco.com (xch-rcd-014.cisco.com [173.37.102.24]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id x6S0N95w009222 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 28 Jul 2019 00:23:09 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-014.cisco.com (173.37.102.24) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 27 Jul 2019 19:23:08 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 27 Jul 2019 20:23:07 -0400
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sat, 27 Jul 2019 19:23:07 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=K8URrcXJX8xmRLEmxMUkTZtvKe5wajaxU5m9cgro+x4JZ/qfbxLxf9xPcxM8iIp2VlB369xv2FWZG9F3xVa9OMb7MqWQGQG9DbxkwrwIZ6kDpgkepaMc9PCcm281K2GRl7QvZifunNXzIJEM/3h686K2F/z5KYl31H4OtVKUnwfjaSyj8baL+J2HhrBwmhBNrelPvdPc5A5uO7Z795ySQkhDXfCnaFdmIL4+yrMy6nb1klubmsLbh/RmV1k1oCdVRiUj5ufitEemh0lDa551UDT08zv8m1DNc5HzgBGq9nWAhTlY2KF7curbWHDjttU8fZ1aPTSgY4VyXHF66rQ/SQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Aqz/zxEjc47HwZ6mXS0u3TwIPOOZotpTkyS1zcuSYTY=; b=O3n9Yaw41MLlZg+U/BHx8btNTutGhuDVq2HSJZurGPTU/weaEbxFBxo1yi42ZZlY5pjSt9+h3rrUngjz8IM3eyiQgRoRzdYCWIVKBr/ZjwdO8cZbJ8wukjTo/tb8DJI8CCu+HGNB3FOt1QYwR3Tx+xiWk1fheVqNzAyA3PVi0qMwKtrxSIJeysmMpuK9qzFk6l2NTJEXt0pSuSXDfFZSDbRE0aOtKOMAbPwoanD2r5PnjCmxB3yF8ncPFJOaXdI6hVNDezxWVZfht8NRtm6qbm7Lonp3stS0B/slRQqlk/T+bNAlM4nD7XPgG4INqBL0M8WH3DaWaQFqwRYeuoAOYw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Aqz/zxEjc47HwZ6mXS0u3TwIPOOZotpTkyS1zcuSYTY=; b=jk+Aa/2dvizZv0yJ0VS1iV1TxllQaNSQGZJsoPSSS0WVOo/+/7t725D0tki8prUg4OFFxyEY1dqSTET3Psd2jKyXbuy4ceWZHE0DL/e1YhI+ojlMwVPN8KIks40gaiqQGTZIWXr5q6rSsQ8ymLMnQj/nxy0w0lvw/RSApGSRb5s=
Received: from BYAPR11MB3638.namprd11.prod.outlook.com (20.178.237.19) by BYAPR11MB3430.namprd11.prod.outlook.com (20.177.225.208) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2115.15; Sun, 28 Jul 2019 00:23:06 +0000
Received: from BYAPR11MB3638.namprd11.prod.outlook.com ([fe80::c8b3:b0b0:581d:e1ce]) by BYAPR11MB3638.namprd11.prod.outlook.com ([fe80::c8b3:b0b0:581d:e1ce%6]) with mapi id 15.20.2115.005; Sun, 28 Jul 2019 00:23:06 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, "Acee Lindem (acee)" <acee@cisco.com>
CC: "idr@ietf.org" <idr@ietf.org>, Albert Bloomberg <afu14@bloomberg.net>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Albert F <albert.f168@gmail.com>, Susan Hares <shares@ndzh.com>
Subject: RE: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Topic: [Lsr] [Idr] draft-merciaz-idr-bgp-bfd-strict-mode
Thread-Index: AQHVQyZEtts3+6RaKECqEhu8TqXFdqbbxrOAgAABiACAAA0QgIAAE0EAgAAFSACAAz5oIA==
Date: Sun, 28 Jul 2019 00:23:05 +0000
Message-ID: <BYAPR11MB36380DEC34EF63CE660D4E07C1C20@BYAPR11MB3638.namprd11.prod.outlook.com>
References: <5D3A0EB4029103460087056A_0_2148724@msclnypmsgsv03> <01c901d54326$80a67af0$81f370d0$@ndzh.com> <DM5PR11MB202727A18322CE10B30D93F2C1C10@DM5PR11MB2027.namprd11.prod.outlook.com> <CAEaWqmokZiFUVYr2Wcnk8hK38xZyL918RnBmrKaiPjh213hS=A@mail.gmail.com> <82732FCE-F604-4501-AED0-EE35E86A72B8@cisco.com> <CA+RyBmW4ArDmej-U0Mad+qmawx-D8wcvv836Xjjo6PB8tNLEkg@mail.gmail.com>
In-Reply-To: <CA+RyBmW4ArDmej-U0Mad+qmawx-D8wcvv836Xjjo6PB8tNLEkg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ginsberg@cisco.com; 
x-originating-ip: [2001:420:c0c8:1004::1fa]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b91cca3c-e5fd-4adf-274d-08d712f1c2cd
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR11MB3430; 
x-ms-traffictypediagnostic: BYAPR11MB3430:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <BYAPR11MB343001881B0216354CC36A46C1C20@BYAPR11MB3430.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 01128BA907
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(396003)(366004)(346002)(136003)(39860400002)(51444003)(189003)(199004)(81166006)(81156014)(76116006)(8676002)(8936002)(7696005)(102836004)(110136005)(53546011)(6506007)(6306002)(54896002)(99286004)(236005)(9686003)(53936002)(54906003)(25786009)(55016002)(46003)(790700001)(6116002)(256004)(66556008)(64756008)(66446008)(52536014)(71190400001)(71200400001)(86362001)(76176011)(66946007)(66476007)(2906002)(68736007)(229853002)(6436002)(7736002)(14444005)(11346002)(6246003)(316002)(5660300002)(446003)(4326008)(33656002)(486006)(186003)(476003)(74316002)(6636002)(478600001)(966005)(14454004)(606006); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3430; H:BYAPR11MB3638.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: dysd+0kWgx6+BiRCoRddhqwb0iyVI4cxYMMkahSLhxvUPslt8p6jTlTj2juFEwX++fqCdWkc3xJz5bZzJEiDp53nAInI7Bn6C18OEOuVXbWyr9++ewK++OIA9APRDUCuqQJqJsU6wqIDZLlw43P/itg3UPUjFnw4T8HsgKBasps8trjON5mu4X92OWhCDc086u81APZqZSMaac/7tnI2qsnhIkcOCNVGPjMex5Hb6Gpyc/YVY1In4o4LTk5ZhkcaB0KF9BLo+GCSUe9XfSNwTRGFZW4hQ6gLIxWri+0PJlI/mM28//7wTdtVUKbW1hq4Xo77KUEk1pQpBWe0myVZDVTs5I120djLLDsH2AgwwGFpoBZy4x5dXyEFA6EIVzb5ePnxwVKcEbsV/z3AJXcSS3VrcuIJusuj6XlmaP98Piw=
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB36380DEC34EF63CE660D4E07C1C20BYAPR11MB3638namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b91cca3c-e5fd-4adf-274d-08d712f1c2cd
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jul 2019 00:23:05.9328 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ginsberg@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3430
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.24, xch-rcd-014.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/I91paP9wjhGXJvsUgrNi90EQ_00>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Jul 2019 00:23:15 -0000

--_000_BYAPR11MB36380DEC34EF63CE660D4E07C1C20BYAPR11MB3638namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_BYAPR11MB36380DEC34EF63CE660D4E07C1C20BYAPR11MB3638namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BYAPR11MB36380DEC34EF63CE660D4E07C1C20BYAPR11MB3638namp_--


From nobody Mon Jul 29 16:57:57 2019
Return-Path: <afu14@bloomberg.net>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B0E4120025; Mon, 29 Jul 2019 16:57:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i5zgmCNZBcLO; Mon, 29 Jul 2019 16:57:38 -0700 (PDT)
Received: from mgnj12.bloomberg.net (mgnj12.bloomberg.net [69.191.244.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BC9A12002E; Mon, 29 Jul 2019 16:57:37 -0700 (PDT)
X-BB-Reception-Complete: 29 Jul 2019 19:57:36 -0400
X-IP-Listener: Outgoing Mail
X-IP-MID: 412579129
Received: from msllnjpmsgsv06.bloomberg.com (HELO msllnjpmsgsv06) ([10.126.134.166]) by mgnj12.bloomberg.net with SMTP; 29 Jul 2019 19:57:36 -0400
X-BLP-INETSVC: version=BLP_APP_S_INETSVC_1.0.1; host=mgnj12:25; conid=110
Date: Mon, 29 Jul 2019 23:57:36 -0000
From: "Albert Fu (BLOOMBERG/ 120 PARK)" <afu14@bloomberg.net>
Reply-To: "Albert Fu" <afu14@bloomberg.net>
To: gregimirsky@gmail.com, acee@cisco.com, ginsberg@cisco.com
Cc: idr@ietf.org, ketant@cisco.com, lsr@ietf.org, rtg-bfd@ietf.org, albert.f168@gmail.com, shares@ndzh.com
MIME-Version: 1.0
Message-ID: <5D3F87F001E105B200390031_0_1874@msllnjpmsgsv06>
X-BLP-GUID: 5D3F87F001E105B2003900310000
Subject: =?UTF-8?B?UkU6IFtMc3JdIFtJZHJdIGRyYWZ0LW1lcmNpYXotaWRyLWJncC1iZmQtc3RyaWN0LW1vZA==?= =?UTF-8?B?ZQ==?=
Content-Type: multipart/alternative; boundary="BOUNDARY_5D3F87F001E105B200390031_0_2049_msllnjpmsgsv06"
Content-ID: <ID_5D3F87F001E105B200390031_0_1874@msllnjpmsgsv06>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/KISo-2TpcPpEUJfXqHsoPr7jftU>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jul 2019 23:57:42 -0000

--BOUNDARY_5D3F87F001E105B200390031_0_2049_msllnjpmsgsv06
Content-Type: text/plain; charset=UTF-8
Content-Disposition: inline
Content-Transfer-Encoding: base64
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--BOUNDARY_5D3F87F001E105B200390031_0_2049_msllnjpmsgsv06
Content-Type: text/html; charset=UTF-8
Content-Disposition: inline
Content-Transfer-Encoding: base64
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--BOUNDARY_5D3F87F001E105B200390031_0_2049_msllnjpmsgsv06--


From nobody Tue Jul 30 09:41:05 2019
Return-Path: <rrahman@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3926E12015C for <rtg-bfd@ietfa.amsl.com>; Tue, 30 Jul 2019 09:41:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QBr40sUd; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=LHSd8MXb
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 94SIs474cYzN for <rtg-bfd@ietfa.amsl.com>; Tue, 30 Jul 2019 09:41:01 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10A2B12016F for <rtg-bfd@ietf.org>; Tue, 30 Jul 2019 09:41:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6791; q=dns/txt; s=iport; t=1564504859; x=1565714459; h=from:to:subject:date:message-id:mime-version; bh=w+c80LDFhu7zqgXGj+0Z/wVxTgTkpJFgWI107dbodVU=; b=QBr40sUdlNpD+CUPMEHztm/+KA7B7p3XLwxAUTOD1ND/UFHEiuG1IQnD YVuCD8eQYa1n10Fe2vNEIDiTmKPsNRKq393EGYNGIA+sG1tIeOtITeaXC cSMHt9ojf8lds8b2PAxMQkJwue/lz+27kWhFRnAhOG0onamBhkKXXGokQ w=;
IronPort-PHdr: =?us-ascii?q?9a23=3AdR8hMxwNXSYOP2rXCy+N+z0EezQntrPoPwUc9p?= =?us-ascii?q?sgjfdUf7+++4j5YhSN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1?= =?us-ascii?q?kAgMQSkRYnBZufE0T7KffsRyc7B89FElRi+iLzPA=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BKAAAEckBd/5pdJa1lHAECBAEIBAG?= =?us-ascii?q?BVAcBDAGBFC9QA21VIAQLKoQeg0cDhFKINEyVDIRXgS6BJANUCQEBAQwBASM?= =?us-ascii?q?KAgEBhEAZgiojNAkOAQMBAQQBAQIBBm2FHgELhWMRChMBATgRAUoCBDAnBDW?= =?us-ascii?q?DAAGBHU0DHQECDKFCAoE4iGBxgTKCegEBBYE2BAxBQIJIGIITAwaBNAGLXxe?= =?us-ascii?q?BQD+BOB+EDoFdAgMBggqCXjKCJo5+hQCIcY4SCQKCGoZbjTsbgi6HJYxtgVG?= =?us-ascii?q?EFYkoh0uQDwIEAgQFAg4BAQWBUDiBWHAVZQGCQYJag1mFFIU/coEpjVABAQ?=
X-IronPort-AV: E=Sophos;i="5.64,327,1559520000";  d="scan'208,217";a="602614051"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Jul 2019 16:40:59 +0000
Received: from XCH-ALN-016.cisco.com (xch-aln-016.cisco.com [173.36.7.26]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x6UGexi4030055 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <rtg-bfd@ietf.org>; Tue, 30 Jul 2019 16:40:59 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-016.cisco.com (173.36.7.26) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 30 Jul 2019 11:40:58 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 30 Jul 2019 12:40:57 -0400
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 30 Jul 2019 11:40:57 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PWyvZ+LpUj+koU+PpfRJZdAwhw71/YuqLUiAVXgtX575ak/hZ9c6HdVFl84bpaXhjRauWQleZlEPD2MFRWjArywC1Dc66o+C8TmPVzkjT0UHaUYpicK/avaIDg0MXMTSXbPRJNutX6sSvdBRtoYqCTbly4lbjeMPxly/3jpR0/xmIA+UyL6PG63RW8f5WaA61FKbVy/fbKlHlkjt15YyjRQJROvO7SItMmyAi62TPuIOFuYviZH6pnAj/eR7L8DrUHkWgoMlqJ9ltM6AHkkSe9lU2mRC8RYcwMJpmNg7U/JKN1LtKv4risKzLTOGy9bOv3KUYPhTpG3/82eYJp/CQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w+c80LDFhu7zqgXGj+0Z/wVxTgTkpJFgWI107dbodVU=; b=Z1r9mp4m81khsI5MVuKXCT/3dkkSBtkKNoiQI7aRC9atp2uN7YxLn5ZyFVW6Q9Ftg3MJnTxuo5Cnwh8s19iMAGYeuD2bIxqXo8eWhm0p/3ZA9+9uLWvQ/VTs9K7iDDCSiM83GjjZvSOoMPBmu0xLJ9tRqY7DfTJgkkeIy6mQ1qpJYDtNmLAa+tAeZQhNWELOxgk3hPCqLFLXnIgL8g1X+GvuNsuFkitQDtAFPAl5le9L2xGNkVpWX2IBjIn73m4ZgEaR3Yy09V/3DDI/OsOxAYSp/K9mqV3ke5E7JcxKyeq8ZDxwetlTLH5axc20Y2mQTYWw8adn1d9wHiS5ytVEVQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w+c80LDFhu7zqgXGj+0Z/wVxTgTkpJFgWI107dbodVU=; b=LHSd8MXbPAQgZN8bG8EXzcBoL3GgEqV3/zpXaoZm9xdRgFgkHI3Lj9Cf1SnX9tkC86GQzXdewnc6RxcTVe96a3nAmjJT2achrJd33Ohs/G3WF3xBLEcNCglemhSi+dQiiD3gdSPgEYIXFNjtoHpch0dYvN+TWx3u0yAb+3rc/rU=
Received: from MN2PR11MB4157.namprd11.prod.outlook.com (20.179.150.223) by MN2PR11MB4301.namprd11.prod.outlook.com (52.135.36.222) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2115.14; Tue, 30 Jul 2019 16:40:56 +0000
Received: from MN2PR11MB4157.namprd11.prod.outlook.com ([fe80::9541:3b65:a968:30d6]) by MN2PR11MB4157.namprd11.prod.outlook.com ([fe80::9541:3b65:a968:30d6%7]) with mapi id 15.20.2115.005; Tue, 30 Jul 2019 16:40:56 +0000
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: IETF105 - BFD draft minutes
Thread-Topic: IETF105 - BFD draft minutes
Thread-Index: AQHVRvWPZx4jr+mdxEyzE1AV6KsM1Q==
Date: Tue, 30 Jul 2019 16:40:56 +0000
Message-ID: <0E976DC6-C09D-4B33-B815-B31F87EDED6B@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.1a.0.190609
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rrahman@cisco.com; 
x-originating-ip: [2001:420:2840:1250:6900:eb73:e481:aee6]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2646d2af-6f53-4129-0e2a-08d7150cb206
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:MN2PR11MB4301; 
x-ms-traffictypediagnostic: MN2PR11MB4301:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <MN2PR11MB430196C62C0805434F65FA67ABDC0@MN2PR11MB4301.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-forefront-prvs: 0114FF88F6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(396003)(366004)(39860400002)(136003)(376002)(199004)(189003)(236005)(6486002)(6436002)(7736002)(5660300002)(2906002)(476003)(46003)(68736007)(5640700003)(2616005)(81156014)(81166006)(14454004)(186003)(486006)(606006)(6916009)(53936002)(33656002)(36756003)(966005)(58126008)(99286004)(8676002)(71190400001)(102836004)(8936002)(54896002)(6306002)(316002)(6512007)(2501003)(64756008)(66946007)(66446008)(256004)(76116006)(478600001)(25786009)(66556008)(6116002)(790700001)(86362001)(558084003)(66476007)(2351001)(6506007)(71200400001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4301; H:MN2PR11MB4157.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: N5un1XiwIJYn0g+buaAo1ufypCSFnwHqddowc3qsSr4HOacabb/7NNHEmHKIOxhnBax6z1wN8mKiusc2Zz9LDXqGdOuXXMXGEXR9VFDGCJmFAaIxeqIHItWTegW80IVKMMH3SKhPVahFmNtUVEqyoO5W/91kW9FveyrITdRyFcjzx31/Y1et+m4c/RtQHWEbBlzZ4JAJCkrNgeFm0jHLlSfqIF6Vk195omG0e8sU9gllOFTHqJb5KHSbPRSTwRUkXmlMB/HyaxojG8N+ootjVFvbWiIYa0CiiFo7bH59I+v7L+JDGu7Wot8FB5y+Zjo1fKvG2gEKDfhfaeXMaiLjOHmty+mtAECGuABllZPCEGHvQYKMOBWbHrhkOzMDqxol51wRjkwkhxg73hfl4O8hXLnZQJMsV0ixKeo/rZvpZEc=
Content-Type: multipart/alternative; boundary="_000_0E976DC6C09D4B33B815B31F87EDED6Bciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 2646d2af-6f53-4129-0e2a-08d7150cb206
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jul 2019 16:40:56.4347 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rrahman@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4301
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.26, xch-aln-016.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/mUxKaiei3ipm1CDINzIPg2ctdaY>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2019 16:41:03 -0000

--_000_0E976DC6C09D4B33B815B31F87EDED6Bciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

QkZEIFdHLA0KDQpUaGUgZHJhZnQgbWludXRlcyBoYXZlIGJlZW4gdXBsb2FkZWQ6DQpodHRwczov
L2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9taW51dGVzLTEwNS1iZmQvDQoNClBsZWFzZSByZXZp
ZXcgdGhlbSBhbmQgc3VibWl0IGFueSBwcm9wb3NlZCBjaGFuZ2VzIHRvIHRoZSBtaW51dGVzIGJ5
IEF1Z3VzdCAxMnRoLg0KDQpSZWdhcmRzLA0KUmVzaGFkIGFuZCBKZWZmLg0KDQo=

--_000_0E976DC6C09D4B33B815B31F87EDED6Bciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <6E85B1203DCDB545988A1F4E0BE26511@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_0E976DC6C09D4B33B815B31F87EDED6Bciscocom_--


From nobody Wed Jul 31 05:48:49 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 574611200E6; Wed, 31 Jul 2019 05:48:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OsNAXkuBerzL; Wed, 31 Jul 2019 05:48:45 -0700 (PDT)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 212C41200FF; Wed, 31 Jul 2019 05:48:44 -0700 (PDT)
Received: by mail-lj1-x231.google.com with SMTP id t28so65460835lje.9; Wed, 31 Jul 2019 05:48:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to:cc; bh=fOdE6JXwlUUhS/qQxtCzoNVQbwWBm2nSwIz1Ok6i22Y=; b=eGTOsSrX2/9nlE0BJxCW/shOF3IU9nMTURCdUKRhK4azBLY1M6WC20g93f2OnskWpK Zs6cZbhlD2OrrYmfNqvv8IlN9KgZ9YHuskY9UOHompidiJm7lc3c/ZGF5LBoAfUk4WGs AHSwGICNywMhiaroLcN02zQ6R5Rz9DrhiN+R/R5AHG4mNWvqK2xWahwT+qKGrfIQrpwN QmoR+OvKTvNw3bj8KpG+V0pExt6q/v7cVC1KAyQpPriIMgrddA3dYCakRYJe2pqGW/SG B5TTJKtsPpBMlpmWF+043P6W1gBSr/g/Q+7E7FWMEVSNys1kx+mKvb0ODa0cODZ0FEdh HQTw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=fOdE6JXwlUUhS/qQxtCzoNVQbwWBm2nSwIz1Ok6i22Y=; b=HIiStgdAzgWU7X0khzWcytApJmsJBoR9/8DzAfLM1B3xDNUWphDZ7Iy7xHJMW11ny6 oWW4d88beFImy7aK2+wVcdWp1zbWlIdxUh5rntty/lKFXVzY1MRfW3EY2sKv1BdQzGOZ MDNyJbSfrJt6NPjNsEOP1ViB0F6k5/Usl9X9/bpwEE93VKqu93cGLOMO19IML0Wh9+ID 2LDTKeaQ5AEwYWAcw910sXQSR8BnJQuesjPQpaqJ88PIPQCEKSw9Gr8iIpXVG+Y2NRfC ZRxce7QcpLJlhWa11H/+fCUYQvC7M05IW1psWykIkCX7CJ3iNkNlfKi6Nba9tn7uu/b6 UUfw==
X-Gm-Message-State: APjAAAX1KYcK1I3J0KV6bT5C5sk08FLYH8fyPlUppBejtZpkaDKIHyPd ziFxdRsol0j1KybIMnRP297k9ufvGoZ/MWZBrEUI932i
X-Google-Smtp-Source: APXvYqwe/Eclim2Ld3vkQNvbym1jXyTK8+7ZS8fprLWAsEOmh2RJXFPv/uTMFvWcYwbSRt3Sh1BRHco+PFP5EpbdQn0=
X-Received: by 2002:a2e:7614:: with SMTP id r20mr65340585ljc.42.1564577322731;  Wed, 31 Jul 2019 05:48:42 -0700 (PDT)
MIME-Version: 1.0
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 31 Jul 2019 08:48:31 -0400
Message-ID: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com>
Subject: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>,  Dinesh Dutt <didutt@gmail.com>, Joel Halpern <jmh@joelhalpern.com>, bfd-chairs@ietf.org, Martin Vigoureux <martin.vigoureux@nokia.com>
Cc: draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="0000000000008b8cf5058ef98b3b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/SfXfu3pCh9BxaRFrXbEOgGt6xjE>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 12:48:48 -0000

--0000000000008b8cf5058ef98b3b
Content-Type: text/plain; charset="UTF-8"

Dear All,
thank you for your comments, suggestions on this issue, probably the most
challenging for this specification. In the course of our discussions, we've
agreed to abandon the request to allocate the dedicated MAC address to be
used as the destination MAC address in the inner Ethernet frame. Also,
earlier using VNI 0 was changed from mandatory to one of the options an
implementation may offer to an operator. The most recent discussion was
whether VTEP's MAC address might be used as the destination MAC address in
the inner Ethernet frame. As I recall it, the comments from VXLAN experts
equally split with one for it and one against. Hence I would like to
propose a new text to resolve the issue. The idea is to let an operator
select Management VNI and use that VNI in VXLAN encapsulation of BFD
Control packets:
NEW TEXT:

An operator MUST select a VNI number to be used as Management VNI. VXLAN
packet for Management VNI MUST NOT be sent to a tenant. VNI number 1 is
RECOMMENDED as the default for Management VNI.

With that new text, what can be the value of the destination MAC in the
inner Ethernet? I tend to believe that it can be anything and ignored by
the reciever VTEP. Also, if the trapping is based on VNI number, the
destination IP address of the inner IP packet can from the range 127/8 for
IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly,
the TTL to be set to 1 (no change here).

Much appreciate your comments, questions, and suggestions.

Best regards,
Greg

--0000000000008b8cf5058ef98b3b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear All,<div>thank you for your comments, suggestions on =
this issue, probably the most challenging for this specification. In the co=
urse of our discussions, we&#39;ve agreed to abandon the request to allocat=
e the dedicated MAC address to be used as the destination MAC address in th=
e inner Ethernet frame. Also, earlier using VNI 0 was changed from mandator=
y to one of the options an implementation may offer to an operator. The mos=
t recent discussion was whether VTEP&#39;s MAC address might be used as the=
 destination MAC address in the inner Ethernet frame. As I recall it, the c=
omments from VXLAN experts equally split with one for it and one against. H=
ence I would like to propose a new text to resolve the issue. The idea is t=
o let an operator select Management VNI and use that VNI in VXLAN encapsula=
tion of BFD Control packets:</div><div>NEW TEXT:</div><blockquote style=3D"=
margin:0 0 0 40px;border:none;padding:0px"><div>An operator MUST select a V=
NI number to be used as Management VNI. VXLAN packet for Management VNI MUS=
T NOT be sent to a tenant. VNI number 1 is RECOMMENDED as the default for M=
anagement VNI.</div></blockquote><div>With that new text, what can be the v=
alue of the destination MAC in the inner Ethernet? I tend to believe that i=
t can be anything and ignored by the reciever VTEP. Also, if the trapping i=
s based on VNI number, the destination IP address of the inner IP packet ca=
n from the range 127/8 for IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF=
:7F00:0/104. And lastly, the TTL to be set to 1 (no change here).</div><div=
><br></div><div>Much appreciate your comments, questions, and suggestions.<=
/div><div><br></div><div>Best regards,</div><div>Greg</div></div>

--0000000000008b8cf5058ef98b3b--


From nobody Wed Jul 31 09:20:39 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7437C1203E1; Wed, 31 Jul 2019 09:20:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5cvrOEAlZmf3; Wed, 31 Jul 2019 09:20:35 -0700 (PDT)
Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [IPv6:2a00:1450:4864:20::12d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A8481203E9; Wed, 31 Jul 2019 09:20:28 -0700 (PDT)
Received: by mail-lf1-x12d.google.com with SMTP id c19so47864302lfm.10; Wed, 31 Jul 2019 09:20:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Sy22dU+9+wT0xjz3jl1Am9nZJ8AFf0TB5rVk3JZ3NtY=; b=CTw/hbvz75ztasxvWA4FJ7hazSdIN6uKLkp7yf5j1d5/41Puk2/gXUiL9Tc5vm/JDb aXdohLpv6GSzRuzfBfBAJ6KDipqUqBEdEXv+uJrvqO++vd7QIB/CIieJjCl/4n1qQF7H XcQNmsgANjstB3Dna9zlV3rWojEFQ+wLPfVzxwnBYpKWDPwWDOWySxu7P7evF/lN1PAC tUwetAWUPTyfr7OGAz9xhyTjSm3zKK2tTmNTtk27vdp0T97sN3UgCEqGkySMwM97vjvQ 6oB9SvjOlMte+TDrX+XBjGdHhVDCJ5OzSCfQhdcpS/12AHLOdB+/LmafdGj67MG99zX8 /PLg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Sy22dU+9+wT0xjz3jl1Am9nZJ8AFf0TB5rVk3JZ3NtY=; b=bu3sjczWgMDU6PjP7KoJIV8o3Da8dkofkjjCCo3pP8iXbDL/cdAcfua/TVxx6UA8fp wAKKROsZ9hId3IFCDex8U7g62SotOz5x3TJvW0330XXAXlNuSHTGwVoOSsxyFRtfZixG Ff0DE/M5S28mzDFG5KoMG3ZjrcgNBKqKKV7BCFwplA4YKRExZC/E1CXQRo3pwzs46ImY C/7faHETVfTKn0EUNYVMVPGNxOb+kMDfukx0o+jwMxDx7Vp/mhzzjgZNNmjkuxBDtGu3 y1PZR+7hrrHDfn856c8Avuuqa7fkuzzvvUOEdCW2jY0DONGgNh79Q6IIgjVrPm2izkUs P0MQ==
X-Gm-Message-State: APjAAAVIM4ljag/ca+sYDuuQPz0WgJgp6KzcAZc0bx1L4TQoaFKl1tKe y3PJ0TUErxE8ihyd5Fny8/+PDJhw2rxFuzzZi4A=
X-Google-Smtp-Source: APXvYqz11vL8d8tAWWvNp6ZXV+2vtwqGuPckAAXjmN9sFq9ZOe1eTgRFwVZNGL6glwkxXQ2IfFZkhnlmZujS1nHncKY=
X-Received: by 2002:ac2:5609:: with SMTP id v9mr55932034lfd.27.1564590026623;  Wed, 31 Jul 2019 09:20:26 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com> <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com>
In-Reply-To: <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 31 Jul 2019 12:20:15 -0400
Message-ID: <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com>
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Dinesh Dutt <didutt@gmail.com>
Cc: rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>,  Joel Halpern <jmh@joelhalpern.com>, bfd-chairs@ietf.org,  Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c18f29058efc804f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/ZcUrYHMxhS36rOyUTD7IH15dsdM>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 16:20:38 -0000

--000000000000c18f29058efc804f
Content-Type: text/plain; charset="UTF-8"

Hi Dinesh,
thank you for your consideration of the proposal and questions. What would
you see as the scope of testing the connectivity for the specific VNI? If
it is tenant-to-tenant, then VTEPs will treat these packets as regular user
frames. More likely, these could be Layer 2 OAM, e.g. CCM frames. The
reason to use 127/8 for IPv4, and 0:0:0:0:0:FFFF:7F00:0/104 for IPv6 is to
safeguard from leaking Ethernet frames with BFD Control packet to a tenant.
You've suggested using a MAC address to trap the control packet at VTEP.
What that address could be? We had proposed using the dedicated MAC and
VTEP's MAC and both raised concerns among VXLAN experts. The idea of using
Management VNI may be more acceptable based on its similarity to the
practice of using Management VLAN.

Regards,
Greg

On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt <didutt@gmail.com> wrote:

> Hi Greg,
>
> As long as the inner MAC address is such that the packet is trapped to the
> CPU, it should be fine for use as an inner MAC is it not? Stating that is
> better than trying to force a management VNI. What if someone wants to test
> connectivity on a specific VNI? I would not pick a loopback IP address for
> this since that address range is host/node local only. Is there a reason
> you're not using the VTEP IP as the inner IP address ?
>
> Dinesh
>
> On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky <gregimirsky@gmail.com> wrote:
>
>> Dear All,
>> thank you for your comments, suggestions on this issue, probably the most
>> challenging for this specification. In the course of our discussions, we've
>> agreed to abandon the request to allocate the dedicated MAC address to be
>> used as the destination MAC address in the inner Ethernet frame. Also,
>> earlier using VNI 0 was changed from mandatory to one of the options an
>> implementation may offer to an operator. The most recent discussion was
>> whether VTEP's MAC address might be used as the destination MAC address in
>> the inner Ethernet frame. As I recall it, the comments from VXLAN experts
>> equally split with one for it and one against. Hence I would like to
>> propose a new text to resolve the issue. The idea is to let an operator
>> select Management VNI and use that VNI in VXLAN encapsulation of BFD
>> Control packets:
>> NEW TEXT:
>>
>> An operator MUST select a VNI number to be used as Management VNI. VXLAN
>> packet for Management VNI MUST NOT be sent to a tenant. VNI number 1 is
>> RECOMMENDED as the default for Management VNI.
>>
>> With that new text, what can be the value of the destination MAC in the
>> inner Ethernet? I tend to believe that it can be anything and ignored by
>> the reciever VTEP. Also, if the trapping is based on VNI number, the
>> destination IP address of the inner IP packet can from the range 127/8 for
>> IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly,
>> the TTL to be set to 1 (no change here).
>>
>> Much appreciate your comments, questions, and suggestions.
>>
>> Best regards,
>> Greg
>>
>

--000000000000c18f29058efc804f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Dinesh,<div>thank you for your consideration of the pro=
posal and questions. What would you see as the scope of testing the connect=
ivity for the specific VNI? If it is tenant-to-tenant, then VTEPs will trea=
t these packets as regular user frames. More likely, these could be Layer 2=
 OAM, e.g. CCM frames. The reason to use 127/8 for IPv4, and 0:0:0:0:0:FFFF=
:7F00:0/104 for IPv6 is to safeguard from leaking Ethernet frames with BFD =
Control packet to a tenant.</div><div>You&#39;ve suggested using a MAC addr=
ess to trap the control packet at VTEP. What that address could be? We had =
proposed using the dedicated MAC and VTEP&#39;s MAC and both raised concern=
s among VXLAN experts. The idea of using Management VNI may be more accepta=
ble based on its similarity to the practice of using Management VLAN.</div>=
<div><br></div><div>Regards,</div><div>Greg</div></div><br><div class=3D"gm=
ail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jul 31, 2019 at 12=
:03 PM Dinesh Dutt &lt;<a href=3D"mailto:didutt@gmail.com">didutt@gmail.com=
</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:=
0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">=
<div dir=3D"ltr"><div>Hi Greg,</div><div><br></div><div>As long as the inne=
r MAC address is such that the packet is trapped to the CPU, it should be f=
ine for use as an inner MAC is it not? Stating that is better than trying t=
o force a management VNI. What if someone wants to test connectivity on a s=
pecific VNI? I would not pick a loopback IP address for this since that add=
ress range is host/node local only. Is there a reason you&#39;re not using =
the VTEP IP as the inner IP address ?</div><div><br></div><div>Dinesh<br></=
div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_at=
tr">On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky &lt;<a href=3D"mailto:gregi=
mirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt; wrote:<br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;=
border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">D=
ear All,<div>thank you for your comments, suggestions on this issue, probab=
ly the most challenging for this specification. In the course of our discus=
sions, we&#39;ve agreed to abandon the request to allocate the dedicated MA=
C address to be used as the destination MAC address in the inner Ethernet f=
rame. Also, earlier using VNI 0 was changed from mandatory to one of the op=
tions an implementation may offer to an operator. The most recent discussio=
n was whether VTEP&#39;s MAC address might be used as the destination MAC a=
ddress in the inner Ethernet frame. As I recall it, the comments from VXLAN=
 experts equally split with one for it and one against. Hence I would like =
to propose a new text to resolve the issue. The idea is to let an operator =
select Management VNI and use that VNI in VXLAN encapsulation of BFD Contro=
l packets:</div><div>NEW TEXT:</div><blockquote style=3D"margin:0px 0px 0px=
 40px;border:medium none;padding:0px"><div>An operator MUST select a VNI nu=
mber to be used as Management VNI. VXLAN packet for Management VNI MUST NOT=
 be sent to a tenant. VNI number 1 is RECOMMENDED as the default for Manage=
ment VNI.</div></blockquote><div>With that new text, what can be the value =
of the destination MAC in the inner Ethernet? I tend to believe that it can=
 be anything and ignored by the reciever VTEP. Also, if the trapping is bas=
ed on VNI number, the destination IP address of the inner IP packet can fro=
m the range 127/8 for IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00=
:0/104. And lastly, the TTL to be set to 1 (no change here).</div><div><br>=
</div><div>Much appreciate your comments, questions, and suggestions.</div>=
<div><br></div><div>Best regards,</div><div>Greg</div></div>
</blockquote></div>
</blockquote></div>

--000000000000c18f29058efc804f--


From nobody Wed Jul 31 10:38:54 2019
Return-Path: <didutt@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34715120018; Wed, 31 Jul 2019 09:03:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SHvYZ3bDszCc; Wed, 31 Jul 2019 09:03:49 -0700 (PDT)
Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E916E1202B5; Wed, 31 Jul 2019 09:03:48 -0700 (PDT)
Received: by mail-wr1-x435.google.com with SMTP id c2so67077094wrm.8; Wed, 31 Jul 2019 09:03:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=lm4L3A7OlPYMFgGhUe4DRvQYzeXl4XN3ID0apwPQrcc=; b=GGbSr+Zp0Xku6SByKHiP+VcKPL+AOLsHAFQ3nmQv0BTWMS8KammDiidho3MZAF+q10 jcMZ5ARrB1V2eWIGWiLNyCn0NNWRAm4Y46b7Am7OpULIjySv4OFhjTzoB+xpnTsEha3l FCFk+eX0JOhrW9HKYep6biJf7g21/dcQz6mbQp+1s/IaC/M54N7sTfdxOES+nYterYGB pzJhto9nYNdbDb48E9b/hHuTZXb6WoNsI+Zim1sbu7CLBuUeA7GZbaTilE6GI77lIQee HF91FNgExkfJEQ3kdCs8Nru1Eu927zXRgwiSy4pgpVqGGWh47ZxckH7/H70+nqeGiUtW 0QuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lm4L3A7OlPYMFgGhUe4DRvQYzeXl4XN3ID0apwPQrcc=; b=bFbVVZh0DgeBIiJ0/TcPvtqiqj91+FVufPApdH4LR5kjeACAlXAu2jOdYZS/7iuYiB wt1N7NdGXnTq73VL3uW61SKvP+Y+V6KEFs7lupdLVwRv+ypSdfumr8kFibLu2PvISFh6 c4LO7Ber1cccVnrzWksiqaQCPcF7YFvoe7GcbqlCn2mxX5659QEV9LcKZK5UsxvKEwWN xv0N3XMIjB6rnjrCGEjcJH6wmZbzj5zc+W/72+e6llU6iNMBwn16mzIf+gUMuPrK/BBj QCblrRj5RyzgxZQ4rUMJAxsAhbGGhRBhs1E3G4CJ9ZJd27bRLsUbwpLAfBvH32WxAmpt KslQ==
X-Gm-Message-State: APjAAAWmQWw5MA3+edpEDFDBlqu4YcRGW6mPkFXUyU6ZcWI+T4u+hefU rhuRfMjwCxJz41vGozGsg3ix2VJMOxatcBIFzes=
X-Google-Smtp-Source: APXvYqzmKCS0eAoMMG0L5FgDRVj0qhfB/lnLE234Yw7WuPJiRxtwuuIGSdgnS/0quqZqFvsut61GibMyvLDP5iFqMt0=
X-Received: by 2002:adf:cd04:: with SMTP id w4mr86484709wrm.230.1564589026660;  Wed, 31 Jul 2019 09:03:46 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com>
In-Reply-To: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com>
From: Dinesh Dutt <didutt@gmail.com>
Date: Wed, 31 Jul 2019 09:03:34 -0700
Message-ID: <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com>
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>,  Joel Halpern <jmh@joelhalpern.com>, bfd-chairs@ietf.org,  Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="0000000000002756e2058efc455a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/dM21D9dUHD4DEUHnQdVktV2SSjI>
X-Mailman-Approved-At: Wed, 31 Jul 2019 10:38:52 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 16:03:51 -0000

--0000000000002756e2058efc455a
Content-Type: text/plain; charset="UTF-8"

Hi Greg,

As long as the inner MAC address is such that the packet is trapped to the
CPU, it should be fine for use as an inner MAC is it not? Stating that is
better than trying to force a management VNI. What if someone wants to test
connectivity on a specific VNI? I would not pick a loopback IP address for
this since that address range is host/node local only. Is there a reason
you're not using the VTEP IP as the inner IP address ?

Dinesh

On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky <gregimirsky@gmail.com> wrote:

> Dear All,
> thank you for your comments, suggestions on this issue, probably the most
> challenging for this specification. In the course of our discussions, we've
> agreed to abandon the request to allocate the dedicated MAC address to be
> used as the destination MAC address in the inner Ethernet frame. Also,
> earlier using VNI 0 was changed from mandatory to one of the options an
> implementation may offer to an operator. The most recent discussion was
> whether VTEP's MAC address might be used as the destination MAC address in
> the inner Ethernet frame. As I recall it, the comments from VXLAN experts
> equally split with one for it and one against. Hence I would like to
> propose a new text to resolve the issue. The idea is to let an operator
> select Management VNI and use that VNI in VXLAN encapsulation of BFD
> Control packets:
> NEW TEXT:
>
> An operator MUST select a VNI number to be used as Management VNI. VXLAN
> packet for Management VNI MUST NOT be sent to a tenant. VNI number 1 is
> RECOMMENDED as the default for Management VNI.
>
> With that new text, what can be the value of the destination MAC in the
> inner Ethernet? I tend to believe that it can be anything and ignored by
> the reciever VTEP. Also, if the trapping is based on VNI number, the
> destination IP address of the inner IP packet can from the range 127/8 for
> IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly,
> the TTL to be set to 1 (no change here).
>
> Much appreciate your comments, questions, and suggestions.
>
> Best regards,
> Greg
>

--0000000000002756e2058efc455a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi Greg,</div><div><br></div><div>As long as the inne=
r MAC address is such that the packet is trapped to the CPU, it should be f=
ine for use as an inner MAC is it not? Stating that is better than trying t=
o force a management VNI. What if someone wants to test connectivity on a s=
pecific VNI? I would not pick a loopback IP address for this since that add=
ress range is host/node local only. Is there a reason you&#39;re not using =
the VTEP IP as the inner IP address ?</div><div><br></div><div>Dinesh<br></=
div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_at=
tr">On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky &lt;<a href=3D"mailto:gregi=
mirsky@gmail.com">gregimirsky@gmail.com</a>&gt; wrote:<br></div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">Dear All,<div>thank=
 you for your comments, suggestions on this issue, probably the most challe=
nging for this specification. In the course of our discussions, we&#39;ve a=
greed to abandon the request to allocate the dedicated MAC address to be us=
ed as the destination MAC address in the inner Ethernet frame. Also, earlie=
r using VNI 0 was changed from mandatory to one of the options an implement=
ation may offer to an operator. The most recent discussion was whether VTEP=
&#39;s MAC address might be used as the destination MAC address in the inne=
r Ethernet frame. As I recall it, the comments from VXLAN experts equally s=
plit with one for it and one against. Hence I would like to propose a new t=
ext to resolve the issue. The idea is to let an operator select Management =
VNI and use that VNI in VXLAN encapsulation of BFD Control packets:</div><d=
iv>NEW TEXT:</div><blockquote style=3D"margin:0px 0px 0px 40px;border:mediu=
m none;padding:0px"><div>An operator MUST select a VNI number to be used as=
 Management VNI. VXLAN packet for Management VNI MUST NOT be sent to a tena=
nt. VNI number 1 is RECOMMENDED as the default for Management VNI.</div></b=
lockquote><div>With that new text, what can be the value of the destination=
 MAC in the inner Ethernet? I tend to believe that it can be anything and i=
gnored by the reciever VTEP. Also, if the trapping is based on VNI number, =
the destination IP address of the inner IP packet can from the range 127/8 =
for IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly=
, the TTL to be set to 1 (no change here).</div><div><br></div><div>Much ap=
preciate your comments, questions, and suggestions.</div><div><br></div><di=
v>Best regards,</div><div>Greg</div></div>
</blockquote></div>

--0000000000002756e2058efc455a--


From nobody Wed Jul 31 10:44:39 2019
Return-Path: <santosh.pallagatti@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC251205DC; Wed, 31 Jul 2019 10:44:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZtAr4KoPvWhK; Wed, 31 Jul 2019 10:44:25 -0700 (PDT)
Received: from mail-wr1-x432.google.com (mail-wr1-x432.google.com [IPv6:2a00:1450:4864:20::432]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DCFF1201ED; Wed, 31 Jul 2019 10:44:25 -0700 (PDT)
Received: by mail-wr1-x432.google.com with SMTP id n9so70727860wru.0; Wed, 31 Jul 2019 10:44:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cPdRfI6xuxx/ctmheEnBOKwUO5eli21wPX+MRGVQYlY=; b=umGkaob9FFOyz9hFUb6WV20tRpBa6X43cmt7yiuPJwITvoO0uKowUOFX3eIfL1AjBa o1cnBQLs2YCrIF+rXsDoRvIqqr+rKw4+TcKfTiR4WZMW6Wmlf6+g6h9CMC9shwDC4mGm OoNfIizmJRwD9CplTQYwT+swDSvK/mC5li03bk1Rs6gVxpc+yD1XS5KRFEzqt52Cu9Qn 4DboXiQj9xKPu8UlOdWHWCVPkufeviS7Uq5nKwnL0ZecYMB/f0uA9B71+hEgkKe2xYGp mzMcJj3wDE+gzyOgWXCY/yxXz5+hjjcHnsZ71zgvTVVoq93x7NS3SW7aw5fbmJaxd9bx DCqg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cPdRfI6xuxx/ctmheEnBOKwUO5eli21wPX+MRGVQYlY=; b=KAfMwvDvPsX2XAk0obItyyAbhqL6kxvyNlaj4Db/StgvCpn4VqljEHuffLjddm8zEi yFa4av5R45a9ZyuyaMP+m0t//H9yZpPyHW9dN+yg7MlMccSpBHfb/c/8URJSjU7RGh1w KZsW58fG0EoO97fYM90Tf4e86u2DPsyWTD08/O4hnUTwAb1CMu3CQCBKInVyuVvVDund fi1e+mwOZmylxVLW3mk0oWTGoLBPoeNQTrhqgyWYLtkBv8Cov5rjWoNX6btKAmBfXvf1 E8VfQt+Ca+dRfH1ffB7RFy97SMFvKiHMpytSSmhirqTuyUK1O33fme5Yomak9HYdxpGQ MHYw==
X-Gm-Message-State: APjAAAXEsOX4S+p2uphxCr6MUp0c3alT7UGV7o+qhyzYGksPg+B3y6NP Ss4G7s6UU96sQE6Ihq+535JupXCq5ak6oHiO824=
X-Google-Smtp-Source: APXvYqwEg7ISVvy7QFgci9lwgCkxvxi9Mc7aXpJ1jL+QKR0T7p/4N3ezS8nzfv5m2kUH+uZLTX6TMHpaOyooyNEaHtQ=
X-Received: by 2002:a05:6000:145:: with SMTP id r5mr55739000wrx.208.1564595063798;  Wed, 31 Jul 2019 10:44:23 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com> <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com> <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com>
In-Reply-To: <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com>
From: Santosh P K <santosh.pallagatti@gmail.com>
Date: Wed, 31 Jul 2019 10:44:13 -0700
Message-ID: <CACi9rdvKTLwBQn9mcJksGTW79QTFj0d45DOpDT1Jee4QpGnv3Q@mail.gmail.com>
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: Dinesh Dutt <didutt@gmail.com>, rtg-bfd WG <rtg-bfd@ietf.org>,  "T. Sridhar" <tsridhar@vmware.com>, Joel Halpern <jmh@joelhalpern.com>, bfd-chairs@ietf.org,  Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="000000000000fec26b058efdac9e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/xkxGbmMiTx8_NUM6xD7RATXT04Y>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 17:44:28 -0000

--000000000000fec26b058efdac9e
Content-Type: text/plain; charset="UTF-8"

I have checked with implementation in data path. When we receive a packet
with valid VNI then lookup for MAC will happen and it is VTEP own MAC then
it will be trapped to control plane for processing. I think we can have
following options
1. Optional managment VNI
2. Mandatory inner MAC set to VTEP mac
3. Inner IP TTL set to 1 to avoid forwarding of packet via inner IP
address.


Thoughts?

Thansk
Santosh P K

On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Dinesh,
> thank you for your consideration of the proposal and questions. What would
> you see as the scope of testing the connectivity for the specific VNI? If
> it is tenant-to-tenant, then VTEPs will treat these packets as regular user
> frames. More likely, these could be Layer 2 OAM, e.g. CCM frames. The
> reason to use 127/8 for IPv4, and 0:0:0:0:0:FFFF:7F00:0/104 for IPv6 is to
> safeguard from leaking Ethernet frames with BFD Control packet to a tenant.
> You've suggested using a MAC address to trap the control packet at VTEP.
> What that address could be? We had proposed using the dedicated MAC and
> VTEP's MAC and both raised concerns among VXLAN experts. The idea of using
> Management VNI may be more acceptable based on its similarity to the
> practice of using Management VLAN.
>
> Regards,
> Greg
>
> On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt <didutt@gmail.com> wrote:
>
>> Hi Greg,
>>
>> As long as the inner MAC address is such that the packet is trapped to
>> the CPU, it should be fine for use as an inner MAC is it not? Stating that
>> is better than trying to force a management VNI. What if someone wants to
>> test connectivity on a specific VNI? I would not pick a loopback IP address
>> for this since that address range is host/node local only. Is there a
>> reason you're not using the VTEP IP as the inner IP address ?
>>
>> Dinesh
>>
>> On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky <gregimirsky@gmail.com>
>> wrote:
>>
>>> Dear All,
>>> thank you for your comments, suggestions on this issue, probably the
>>> most challenging for this specification. In the course of our discussions,
>>> we've agreed to abandon the request to allocate the dedicated MAC address
>>> to be used as the destination MAC address in the inner Ethernet frame.
>>> Also, earlier using VNI 0 was changed from mandatory to one of the options
>>> an implementation may offer to an operator. The most recent discussion was
>>> whether VTEP's MAC address might be used as the destination MAC address in
>>> the inner Ethernet frame. As I recall it, the comments from VXLAN experts
>>> equally split with one for it and one against. Hence I would like to
>>> propose a new text to resolve the issue. The idea is to let an operator
>>> select Management VNI and use that VNI in VXLAN encapsulation of BFD
>>> Control packets:
>>> NEW TEXT:
>>>
>>> An operator MUST select a VNI number to be used as Management VNI. VXLAN
>>> packet for Management VNI MUST NOT be sent to a tenant. VNI number 1 is
>>> RECOMMENDED as the default for Management VNI.
>>>
>>> With that new text, what can be the value of the destination MAC in the
>>> inner Ethernet? I tend to believe that it can be anything and ignored by
>>> the reciever VTEP. Also, if the trapping is based on VNI number, the
>>> destination IP address of the inner IP packet can from the range 127/8 for
>>> IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly,
>>> the TTL to be set to 1 (no change here).
>>>
>>> Much appreciate your comments, questions, and suggestions.
>>>
>>> Best regards,
>>> Greg
>>>
>>

--000000000000fec26b058efdac9e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I have checked with implementation in data path. When we r=
eceive a packet with valid VNI then lookup for MAC will happen and it is VT=
EP own MAC then it will be trapped to control plane for processing. I think=
 we can have following options=C2=A0<div>1. Optional managment VNI=C2=A0</d=
iv><div>2. Mandatory inner MAC set to VTEP mac</div><div>3. Inner IP TTL se=
t to 1 to avoid forwarding of packet via inner IP address.=C2=A0</div><div>=
<br></div><div><br></div><div>Thoughts?=C2=A0</div><div><br></div><div>Than=
sk</div><div>Santosh P K=C2=A0=C2=A0</div></div><br><div class=3D"gmail_quo=
te"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jul 31, 2019 at 9:20 AM G=
reg Mirsky &lt;<a href=3D"mailto:gregimirsky@gmail.com">gregimirsky@gmail.c=
om</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex=
"><div dir=3D"ltr">Hi Dinesh,<div>thank you for your consideration of the p=
roposal and questions. What would you see as the scope of testing the conne=
ctivity for the specific VNI? If it is tenant-to-tenant, then VTEPs will tr=
eat these packets as regular user frames. More likely, these could be Layer=
 2 OAM, e.g. CCM frames. The reason to use 127/8 for IPv4, and 0:0:0:0:0:FF=
FF:7F00:0/104 for IPv6 is to safeguard from leaking Ethernet frames with BF=
D Control packet to a tenant.</div><div>You&#39;ve suggested using a MAC ad=
dress to trap the control packet at VTEP. What that address could be? We ha=
d proposed using the dedicated MAC and VTEP&#39;s MAC and both raised conce=
rns among VXLAN experts. The idea of using Management VNI may be more accep=
table based on its similarity to the practice of using Management VLAN.</di=
v><div><br></div><div>Regards,</div><div>Greg</div></div><br><div class=3D"=
gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jul 31, 2019 at =
12:03 PM Dinesh Dutt &lt;<a href=3D"mailto:didutt@gmail.com" target=3D"_bla=
nk">didutt@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204=
);padding-left:1ex"><div dir=3D"ltr"><div>Hi Greg,</div><div><br></div><div=
>As long as the inner MAC address is such that the packet is trapped to the=
 CPU, it should be fine for use as an inner MAC is it not? Stating that is =
better than trying to force a management VNI. What if someone wants to test=
 connectivity on a specific VNI? I would not pick a loopback IP address for=
 this since that address range is host/node local only. Is there a reason y=
ou&#39;re not using the VTEP IP as the inner IP address ?</div><div><br></d=
iv><div>Dinesh<br></div></div><br><div class=3D"gmail_quote"><div dir=3D"lt=
r" class=3D"gmail_attr">On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky &lt;<a =
href=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.c=
om</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex=
"><div dir=3D"ltr">Dear All,<div>thank you for your comments, suggestions o=
n this issue, probably the most challenging for this specification. In the =
course of our discussions, we&#39;ve agreed to abandon the request to alloc=
ate the dedicated MAC address to be used as the destination MAC address in =
the inner Ethernet frame. Also, earlier using VNI 0 was changed from mandat=
ory to one of the options an implementation may offer to an operator. The m=
ost recent discussion was whether VTEP&#39;s MAC address might be used as t=
he destination MAC address in the inner Ethernet frame. As I recall it, the=
 comments from VXLAN experts equally split with one for it and one against.=
 Hence I would like to propose a new text to resolve the issue. The idea is=
 to let an operator select Management VNI and use that VNI in VXLAN encapsu=
lation of BFD Control packets:</div><div>NEW TEXT:</div><blockquote style=
=3D"margin:0px 0px 0px 40px;border:medium none;padding:0px"><div>An operato=
r MUST select a VNI number to be used as Management VNI. VXLAN packet for M=
anagement VNI MUST NOT be sent to a tenant. VNI number 1 is RECOMMENDED as =
the default for Management VNI.</div></blockquote><div>With that new text, =
what can be the value of the destination MAC in the inner Ethernet? I tend =
to believe that it can be anything and ignored by the reciever VTEP. Also, =
if the trapping is based on VNI number, the destination IP address of the i=
nner IP packet can from the range 127/8 for IPv4, and for IPv6 from the ran=
ge 0:0:0:0:0:FFFF:7F00:0/104. And lastly, the TTL to be set to 1 (no change=
 here).</div><div><br></div><div>Much appreciate your comments, questions, =
and suggestions.</div><div><br></div><div>Best regards,</div><div>Greg</div=
></div>
</blockquote></div>
</blockquote></div>
</blockquote></div>

--000000000000fec26b058efdac9e--


From nobody Wed Jul 31 10:54:09 2019
Return-Path: <jmh@joelhalpern.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D63A12065A; Wed, 31 Jul 2019 10:54:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mLklHAzCFhXd; Wed, 31 Jul 2019 10:54:04 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB4B012065C; Wed, 31 Jul 2019 10:53:59 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 45zLdg5krZz1P8y2; Wed, 31 Jul 2019 10:53:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1564595639; bh=mVejWudJFMRY6o53pAOu9cimg4O7QHY23fQH9iGyIss=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=f8R6tHc8J/gvqYVfdUTH+RS6y2bK3UOiVovuXEvWHvDOlntKd4bbtCCrfh8kT8NnJ QL2d66ZPLJqSB3UFfPmoyNCyKdVsoonB7dRcgSi5h+ME33/6CAXSs99xMsjwzokQKW NGiQ/Lm4YAUj2UH/fcFzp6VnnA8wB/xKXq6guatQ=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [172.20.7.244] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 45zLdf3pn4z1P8xp; Wed, 31 Jul 2019 10:53:57 -0700 (PDT)
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Santosh P K <santosh.pallagatti@gmail.com>
Cc: Greg Mirsky <gregimirsky@gmail.com>, Dinesh Dutt <didutt@gmail.com>, rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>, bfd-chairs@ietf.org, Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com> <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com> <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com> <CACi9rdvKTLwBQn9mcJksGTW79QTFj0d45DOpDT1Jee4QpGnv3Q@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <c57a3cf3-ab77-99df-0f78-104edef3275c@joelhalpern.com>
Date: Wed, 31 Jul 2019 13:53:56 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <CACi9rdvKTLwBQn9mcJksGTW79QTFj0d45DOpDT1Jee4QpGnv3Q@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/fz1crMkYaQTCTFdSNa_gO7grPzc>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 17:54:07 -0000

Sorry to ask a stupid question.  Whose implementation?

The reason I ask is that as far as I can tell, since the tenant does not 
have any control access to the VTEP, there is no reason for the VTEP to 
have a MAC address in the tenant space.  Yes, the device has a physical 
MAC address.  But the tenant could well be using that MAC address.  Yes, 
they would be violating the Ethernet spec.  But the whole point of 
segregation is not to care about such issues.

On the other hand, if you tell me that the VMWare implementation has an 
Ethernet address that is part of the tenant space, well, they made up 
this particular game.

Yours,
Joel

On 7/31/2019 1:44 PM, Santosh P K wrote:
> I have checked with implementation in data path. When we receive a 
> packet with valid VNI then lookup for MAC will happen and it is VTEP own 
> MAC then it will be trapped to control plane for processing. I think we 
> can have following options
> 1. Optional managment VNI
> 2. Mandatory inner MAC set to VTEP mac
> 3. Inner IP TTL set to 1 to avoid forwarding of packet via inner IP 
> address.
> 
> 
> Thoughts?
> 
> Thansk
> Santosh P K
> 
> On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky <gregimirsky@gmail.com 
> <mailto:gregimirsky@gmail.com>> wrote:
> 
>     Hi Dinesh,
>     thank you for your consideration of the proposal and questions. What
>     would you see as the scope of testing the connectivity for the
>     specific VNI? If it is tenant-to-tenant, then VTEPs will treat these
>     packets as regular user frames. More likely, these could be Layer 2
>     OAM, e.g. CCM frames. The reason to use 127/8 for IPv4, and
>     0:0:0:0:0:FFFF:7F00:0/104 for IPv6 is to safeguard from leaking
>     Ethernet frames with BFD Control packet to a tenant.
>     You've suggested using a MAC address to trap the control packet at
>     VTEP. What that address could be? We had proposed using the
>     dedicated MAC and VTEP's MAC and both raised concerns among VXLAN
>     experts. The idea of using Management VNI may be more acceptable
>     based on its similarity to the practice of using Management VLAN.
> 
>     Regards,
>     Greg
> 
>     On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt <didutt@gmail.com
>     <mailto:didutt@gmail.com>> wrote:
> 
>         Hi Greg,
> 
>         As long as the inner MAC address is such that the packet is
>         trapped to the CPU, it should be fine for use as an inner MAC is
>         it not? Stating that is better than trying to force a management
>         VNI. What if someone wants to test connectivity on a specific
>         VNI? I would not pick a loopback IP address for this since that
>         address range is host/node local only. Is there a reason you're
>         not using the VTEP IP as the inner IP address ?
> 
>         Dinesh
> 
>         On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky
>         <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>> wrote:
> 
>             Dear All,
>             thank you for your comments, suggestions on this issue,
>             probably the most challenging for this specification. In the
>             course of our discussions, we've agreed to abandon the
>             request to allocate the dedicated MAC address to be used as
>             the destination MAC address in the inner Ethernet frame.
>             Also, earlier using VNI 0 was changed from mandatory to one
>             of the options an implementation may offer to an operator.
>             The most recent discussion was whether VTEP's MAC address
>             might be used as the destination MAC address in the inner
>             Ethernet frame. As I recall it, the comments from VXLAN
>             experts equally split with one for it and one against. Hence
>             I would like to propose a new text to resolve the issue. The
>             idea is to let an operator select Management VNI and use
>             that VNI in VXLAN encapsulation of BFD Control packets:
>             NEW TEXT:
> 
>                 An operator MUST select a VNI number to be used as
>                 Management VNI. VXLAN packet for Management VNI MUST NOT
>                 be sent to a tenant. VNI number 1 is RECOMMENDED as the
>                 default for Management VNI.
> 
>             With that new text, what can be the value of the destination
>             MAC in the inner Ethernet? I tend to believe that it can be
>             anything and ignored by the reciever VTEP. Also, if the
>             trapping is based on VNI number, the destination IP address
>             of the inner IP packet can from the range 127/8 for IPv4,
>             and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And
>             lastly, the TTL to be set to 1 (no change here).
> 
>             Much appreciate your comments, questions, and suggestions.
> 
>             Best regards,
>             Greg
> 


From nobody Wed Jul 31 11:00:22 2019
Return-Path: <santosh.pallagatti@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCF8B120612; Wed, 31 Jul 2019 11:00:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.998
X-Spam-Level: 
X-Spam-Status: No, score=-0.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nGhzqjrSo3eg; Wed, 31 Jul 2019 11:00:17 -0700 (PDT)
Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7450012060E; Wed, 31 Jul 2019 11:00:17 -0700 (PDT)
Received: by mail-wr1-x42b.google.com with SMTP id f9so70649520wre.12; Wed, 31 Jul 2019 11:00:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XBMp9gY8+1yr/RgC3O9AC9++Whvvr6T9K3AZCUcPVyE=; b=a4kfMAKVliwmSWsNQkaDvSlSwyiQyVmKBGArJPRxnNvYcHAAAtYbCYLW1REOwkIGrM VONTNv22ZRkHbxTV4GnfeY8L8qqeqL2FrlnSjkK/DFJhJYstgwBtSdKKXeHtEKJUstS0 OXwxVS9jenO1Hd3wV1oketyfsbM+kdAKK4mF+vof+4CpQfubaQHeQeziXJsf6E5P9WOf pbjokf5DKfowAQOxKWgEGemvh7xnQc/Yn34UWTdFB2icylBpOgE46jJ29T5eFGR2I3RN QNvePxBuY3WLXGntnW/k0RM4SOYfjidvoZg1E47EYIf3LQR4Mc82GzlMVfqNHDEMpnUy FbgQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XBMp9gY8+1yr/RgC3O9AC9++Whvvr6T9K3AZCUcPVyE=; b=lVoEG03wNUpigEXyw6C2R8QA3IX+mqkPSsHSwl0Mzbgr1gEQSn/+4eomdV9jMkRaKu omUqTVr2QcDHv7gwQBorzTc5V6CdmAagiNEW7/D4qPe+1Y77rPEkBsVjXp0mSeYCNmG+ a3+5heSLIwt8rau5CWMW+T7j3nQy3Br6iLQbe+VYI80kx41EQk/9J06sgfQKvA0DJRXX Tq/Dmvh+O1pe6aQAGRrs/wqTsRRtfVlgGwrWHsiIyMAdKhTwiPzIxfCXWoc796z6hUwQ AX0AAcLxw2z1fFym1TYS5jiirz/9rJMC0JH5WUKYKzfXFr4XiX2vS9iyG/S2F2ONOh5M xb0Q==
X-Gm-Message-State: APjAAAWqPhzm1H0gVzdA/gVyyjX76DeBsaMrjSn6uUdITYq6tYDt99kF yG2HGf9CQvKKvxo005a6cCaNTUyDrNmhOaE1DE4=
X-Google-Smtp-Source: APXvYqyWz80J9qUQqgHTrNU9NzRyRCxe3qryqrXnKziNYGWkuW6zEO7CBiJuKcMwEkhkoCxrOZhT2FDqylzWJ3kdGWQ=
X-Received: by 2002:a5d:5644:: with SMTP id j4mr54763606wrw.144.1564596015966;  Wed, 31 Jul 2019 11:00:15 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com> <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com> <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com> <CACi9rdvKTLwBQn9mcJksGTW79QTFj0d45DOpDT1Jee4QpGnv3Q@mail.gmail.com> <c57a3cf3-ab77-99df-0f78-104edef3275c@joelhalpern.com>
In-Reply-To: <c57a3cf3-ab77-99df-0f78-104edef3275c@joelhalpern.com>
From: Santosh P K <santosh.pallagatti@gmail.com>
Date: Wed, 31 Jul 2019 11:00:04 -0700
Message-ID: <CACi9rdubTnzgCVZK0syRf3fsrpTU45SpQV57n2rNcNCqk+3+7Q@mail.gmail.com>
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Cc: Greg Mirsky <gregimirsky@gmail.com>, Dinesh Dutt <didutt@gmail.com>,  rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>, bfd-chairs@ietf.org,  Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="000000000000bfadc5058efde5ff"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/_9DQKVlXEvGq7gZIQFNNM73_hVI>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 18:00:20 -0000

--000000000000bfadc5058efde5ff
Content-Type: text/plain; charset="UTF-8"

Joel,
   Thanks for your inputs. I checked implementation within Vmware. Perhaps
I should have been more clear about MAC address space while checking
internally. I will cross check again for the same and get back on this
list.

Thanks
Santosh P K

On Wed, Jul 31, 2019 at 10:54 AM Joel M. Halpern <jmh@joelhalpern.com>
wrote:

> Sorry to ask a stupid question.  Whose implementation?
>
> The reason I ask is that as far as I can tell, since the tenant does not
> have any control access to the VTEP, there is no reason for the VTEP to
> have a MAC address in the tenant space.  Yes, the device has a physical
> MAC address.  But the tenant could well be using that MAC address.  Yes,
> they would be violating the Ethernet spec.  But the whole point of
> segregation is not to care about such issues.
>
> On the other hand, if you tell me that the VMWare implementation has an
> Ethernet address that is part of the tenant space, well, they made up
> this particular game.
>
> Yours,
> Joel
>
> On 7/31/2019 1:44 PM, Santosh P K wrote:
> > I have checked with implementation in data path. When we receive a
> > packet with valid VNI then lookup for MAC will happen and it is VTEP own
> > MAC then it will be trapped to control plane for processing. I think we
> > can have following options
> > 1. Optional managment VNI
> > 2. Mandatory inner MAC set to VTEP mac
> > 3. Inner IP TTL set to 1 to avoid forwarding of packet via inner IP
> > address.
> >
> >
> > Thoughts?
> >
> > Thansk
> > Santosh P K
> >
> > On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky <gregimirsky@gmail.com
> > <mailto:gregimirsky@gmail.com>> wrote:
> >
> >     Hi Dinesh,
> >     thank you for your consideration of the proposal and questions. What
> >     would you see as the scope of testing the connectivity for the
> >     specific VNI? If it is tenant-to-tenant, then VTEPs will treat these
> >     packets as regular user frames. More likely, these could be Layer 2
> >     OAM, e.g. CCM frames. The reason to use 127/8 for IPv4, and
> >     0:0:0:0:0:FFFF:7F00:0/104 for IPv6 is to safeguard from leaking
> >     Ethernet frames with BFD Control packet to a tenant.
> >     You've suggested using a MAC address to trap the control packet at
> >     VTEP. What that address could be? We had proposed using the
> >     dedicated MAC and VTEP's MAC and both raised concerns among VXLAN
> >     experts. The idea of using Management VNI may be more acceptable
> >     based on its similarity to the practice of using Management VLAN.
> >
> >     Regards,
> >     Greg
> >
> >     On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt <didutt@gmail.com
> >     <mailto:didutt@gmail.com>> wrote:
> >
> >         Hi Greg,
> >
> >         As long as the inner MAC address is such that the packet is
> >         trapped to the CPU, it should be fine for use as an inner MAC is
> >         it not? Stating that is better than trying to force a management
> >         VNI. What if someone wants to test connectivity on a specific
> >         VNI? I would not pick a loopback IP address for this since that
> >         address range is host/node local only. Is there a reason you're
> >         not using the VTEP IP as the inner IP address ?
> >
> >         Dinesh
> >
> >         On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky
> >         <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>> wrote:
> >
> >             Dear All,
> >             thank you for your comments, suggestions on this issue,
> >             probably the most challenging for this specification. In the
> >             course of our discussions, we've agreed to abandon the
> >             request to allocate the dedicated MAC address to be used as
> >             the destination MAC address in the inner Ethernet frame.
> >             Also, earlier using VNI 0 was changed from mandatory to one
> >             of the options an implementation may offer to an operator.
> >             The most recent discussion was whether VTEP's MAC address
> >             might be used as the destination MAC address in the inner
> >             Ethernet frame. As I recall it, the comments from VXLAN
> >             experts equally split with one for it and one against. Hence
> >             I would like to propose a new text to resolve the issue. The
> >             idea is to let an operator select Management VNI and use
> >             that VNI in VXLAN encapsulation of BFD Control packets:
> >             NEW TEXT:
> >
> >                 An operator MUST select a VNI number to be used as
> >                 Management VNI. VXLAN packet for Management VNI MUST NOT
> >                 be sent to a tenant. VNI number 1 is RECOMMENDED as the
> >                 default for Management VNI.
> >
> >             With that new text, what can be the value of the destination
> >             MAC in the inner Ethernet? I tend to believe that it can be
> >             anything and ignored by the reciever VTEP. Also, if the
> >             trapping is based on VNI number, the destination IP address
> >             of the inner IP packet can from the range 127/8 for IPv4,
> >             and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And
> >             lastly, the TTL to be set to 1 (no change here).
> >
> >             Much appreciate your comments, questions, and suggestions.
> >
> >             Best regards,
> >             Greg
> >
>

--000000000000bfadc5058efde5ff
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Joel,<div>=C2=A0 =C2=A0Thanks for your inputs. I checked i=
mplementation within Vmware. Perhaps I should have been more clear about MA=
C address space while checking internally. I will cross check again for the=
 same and get back on this list.=C2=A0</div><div><br></div><div>Thanks</div=
><div>Santosh P K=C2=A0</div></div><br><div class=3D"gmail_quote"><div dir=
=3D"ltr" class=3D"gmail_attr">On Wed, Jul 31, 2019 at 10:54 AM Joel M. Halp=
ern &lt;<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalpern.com</a>&gt; =
wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0=
px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Sorry to =
ask a stupid question.=C2=A0 Whose implementation?<br>
<br>
The reason I ask is that as far as I can tell, since the tenant does not <b=
r>
have any control access to the VTEP, there is no reason for the VTEP to <br=
>
have a MAC address in the tenant space.=C2=A0 Yes, the device has a physica=
l <br>
MAC address.=C2=A0 But the tenant could well be using that MAC address.=C2=
=A0 Yes, <br>
they would be violating the Ethernet spec.=C2=A0 But the whole point of <br=
>
segregation is not to care about such issues.<br>
<br>
On the other hand, if you tell me that the VMWare implementation has an <br=
>
Ethernet address that is part of the tenant space, well, they made up <br>
this particular game.<br>
<br>
Yours,<br>
Joel<br>
<br>
On 7/31/2019 1:44 PM, Santosh P K wrote:<br>
&gt; I have checked with implementation in data path. When we receive a <br=
>
&gt; packet with valid VNI then lookup for MAC will happen and it is VTEP o=
wn <br>
&gt; MAC then it will be trapped to control plane for processing. I think w=
e <br>
&gt; can have following options<br>
&gt; 1. Optional managment VNI<br>
&gt; 2. Mandatory inner MAC set to VTEP mac<br>
&gt; 3. Inner IP TTL set to 1 to avoid forwarding of packet via inner IP <b=
r>
&gt; address.<br>
&gt; <br>
&gt; <br>
&gt; Thoughts?<br>
&gt; <br>
&gt; Thansk<br>
&gt; Santosh P K<br>
&gt; <br>
&gt; On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky &lt;<a href=3D"mailto:greg=
imirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a> <br>
&gt; &lt;mailto:<a href=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">=
gregimirsky@gmail.com</a>&gt;&gt; wrote:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0Hi Dinesh,<br>
&gt;=C2=A0 =C2=A0 =C2=A0thank you for your consideration of the proposal an=
d questions. What<br>
&gt;=C2=A0 =C2=A0 =C2=A0would you see as the scope of testing the connectiv=
ity for the<br>
&gt;=C2=A0 =C2=A0 =C2=A0specific VNI? If it is tenant-to-tenant, then VTEPs=
 will treat these<br>
&gt;=C2=A0 =C2=A0 =C2=A0packets as regular user frames. More likely, these =
could be Layer 2<br>
&gt;=C2=A0 =C2=A0 =C2=A0OAM, e.g. CCM frames. The reason to use 127/8 for I=
Pv4, and<br>
&gt;=C2=A0 =C2=A0 =C2=A00:0:0:0:0:FFFF:7F00:0/104 for IPv6 is to safeguard =
from leaking<br>
&gt;=C2=A0 =C2=A0 =C2=A0Ethernet frames with BFD Control packet to a tenant=
.<br>
&gt;=C2=A0 =C2=A0 =C2=A0You&#39;ve suggested using a MAC address to trap th=
e control packet at<br>
&gt;=C2=A0 =C2=A0 =C2=A0VTEP. What that address could be? We had proposed u=
sing the<br>
&gt;=C2=A0 =C2=A0 =C2=A0dedicated MAC and VTEP&#39;s MAC and both raised co=
ncerns among VXLAN<br>
&gt;=C2=A0 =C2=A0 =C2=A0experts. The idea of using Management VNI may be mo=
re acceptable<br>
&gt;=C2=A0 =C2=A0 =C2=A0based on its similarity to the practice of using Ma=
nagement VLAN.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0Regards,<br>
&gt;=C2=A0 =C2=A0 =C2=A0Greg<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt &lt;<a=
 href=3D"mailto:didutt@gmail.com" target=3D"_blank">didutt@gmail.com</a><br=
>
&gt;=C2=A0 =C2=A0 =C2=A0&lt;mailto:<a href=3D"mailto:didutt@gmail.com" targ=
et=3D"_blank">didutt@gmail.com</a>&gt;&gt; wrote:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Hi Greg,<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0As long as the inner MAC address is s=
uch that the packet is<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0trapped to the CPU, it should be fine=
 for use as an inner MAC is<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0it not? Stating that is better than t=
rying to force a management<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0VNI. What if someone wants to test co=
nnectivity on a specific<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0VNI? I would not pick a loopback IP a=
ddress for this since that<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0address range is host/node local only=
. Is there a reason you&#39;re<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0not using the VTEP IP as the inner IP=
 address ?<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Dinesh<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0On Wed, Jul 31, 2019 at 5:48 AM Greg =
Mirsky<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a href=3D"mailto:gregimirsky@gma=
il.com" target=3D"_blank">gregimirsky@gmail.com</a> &lt;mailto:<a href=3D"m=
ailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt=
;&gt; wrote:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Dear All,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0thank you for your comm=
ents, suggestions on this issue,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0probably the most chall=
enging for this specification. In the<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0course of our discussio=
ns, we&#39;ve agreed to abandon the<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0request to allocate the=
 dedicated MAC address to be used as<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0the destination MAC add=
ress in the inner Ethernet frame.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Also, earlier using VNI=
 0 was changed from mandatory to one<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0of the options an imple=
mentation may offer to an operator.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0The most recent discuss=
ion was whether VTEP&#39;s MAC address<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0might be used as the de=
stination MAC address in the inner<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Ethernet frame. As I re=
call it, the comments from VXLAN<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0experts equally split w=
ith one for it and one against. Hence<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0I would like to propose=
 a new text to resolve the issue. The<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0idea is to let an opera=
tor select Management VNI and use<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0that VNI in VXLAN encap=
sulation of BFD Control packets:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0NEW TEXT:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0An operat=
or MUST select a VNI number to be used as<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Managemen=
t VNI. VXLAN packet for Management VNI MUST NOT<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0be sent t=
o a tenant. VNI number 1 is RECOMMENDED as the<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0default f=
or Management VNI.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0With that new text, wha=
t can be the value of the destination<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0MAC in the inner Ethern=
et? I tend to believe that it can be<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0anything and ignored by=
 the reciever VTEP. Also, if the<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0trapping is based on VN=
I number, the destination IP address<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0of the inner IP packet =
can from the range 127/8 for IPv4,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0and for IPv6 from the r=
ange 0:0:0:0:0:FFFF:7F00:0/104. And<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0lastly, the TTL to be s=
et to 1 (no change here).<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Much appreciate your co=
mments, questions, and suggestions.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Best regards,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Greg<br>
&gt; <br>
</blockquote></div>

--000000000000bfadc5058efde5ff--


From nobody Wed Jul 31 11:05:55 2019
Return-Path: <jmh@joelhalpern.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B51981201CE; Wed, 31 Jul 2019 11:05:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WBNWiWzlpiQB; Wed, 31 Jul 2019 11:05:51 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4815B12017C; Wed, 31 Jul 2019 11:05:51 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 45zLvM141hzKm71; Wed, 31 Jul 2019 11:05:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1564596351; bh=gSqIgmRRFGMpJmVMUro/HCzfA/axVGvGU5pRWSeIGnw=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=RjJmpDYh4p7sUzs7oiynKmaAqCCC2XP1hORG5qxPDWOH5DeeeDTt8/WxQfUtvSyj8 G8TgaXSqZ/ODwD3VhkcdKui9ZzhYdS2zbezS78VLGj4fZF8zB2f9youEz0bCVcYxeX dzVCYUVCitR8y2VLqhVpERO4WO8orlCOyX1jAyL0=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [172.20.7.244] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 45zLvL0djTz1P8xp; Wed, 31 Jul 2019 11:05:50 -0700 (PDT)
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Greg Mirsky <gregimirsky@gmail.com>, rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>, Dinesh Dutt <didutt@gmail.com>, bfd-chairs@ietf.org, Martin Vigoureux <martin.vigoureux@nokia.com>
Cc: draft-ietf-bfd-vxlan@ietf.org
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <edec6889-a19b-b4d9-f951-107630d61e20@joelhalpern.com>
Date: Wed, 31 Jul 2019 14:05:49 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/gXdYQ58_kG1iAZ0yNGeoyXNiul4>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 18:05:53 -0000

I made the mistake of assuming we were in agreement.
What Greg has proposed below makes very good sense to me.

Thank you Greg.
Joel

On 7/31/2019 8:48 AM, Greg Mirsky wrote:
> Dear All,
> thank you for your comments, suggestions on this issue, probably the 
> most challenging for this specification. In the course of our 
> discussions, we've agreed to abandon the request to allocate the 
> dedicated MAC address to be used as the destination MAC address in the 
> inner Ethernet frame. Also, earlier using VNI 0 was changed from 
> mandatory to one of the options an implementation may offer to an 
> operator. The most recent discussion was whether VTEP's MAC address 
> might be used as the destination MAC address in the inner Ethernet 
> frame. As I recall it, the comments from VXLAN experts equally split 
> with one for it and one against. Hence I would like to propose a new 
> text to resolve the issue. The idea is to let an operator select 
> Management VNI and use that VNI in VXLAN encapsulation of BFD Control 
> packets:
> NEW TEXT:
> 
>     An operator MUST select a VNI number to be used as Management VNI.
>     VXLAN packet for Management VNI MUST NOT be sent to a tenant. VNI
>     number 1 is RECOMMENDED as the default for Management VNI.
> 
> With that new text, what can be the value of the destination MAC in the 
> inner Ethernet? I tend to believe that it can be anything and ignored by 
> the reciever VTEP. Also, if the trapping is based on VNI number, the 
> destination IP address of the inner IP packet can from the range 127/8 
> for IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And 
> lastly, the TTL to be set to 1 (no change here).
> 
> Much appreciate your comments, questions, and suggestions.
> 
> Best regards,
> Greg


From nobody Wed Jul 31 11:26:57 2019
Return-Path: <didutt@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AF1F1206C3; Wed, 31 Jul 2019 11:25:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mgR7XhPmBoPy; Wed, 31 Jul 2019 11:25:36 -0700 (PDT)
Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B744612019C; Wed, 31 Jul 2019 11:25:35 -0700 (PDT)
Received: by mail-wr1-x434.google.com with SMTP id r1so70719307wrl.7; Wed, 31 Jul 2019 11:25:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xNlPx4DxEkgFLI3ccLdFML6TiUma/NrXd0DN2t8ndk0=; b=S0Z57nnO2VpnG2h/INijCbexPKZ0UlbcsdkDptOao7xmQ4JF9ZTiUS9gCe6IuH1eE0 BPZKgRN47b52d9FaFTDXVIqaO8bTloglF1ZI+YMGsf9Nv4i8Cd+m7w7ZNt7DjpRxiqNG XFS/OU4nGcbKsESepRGITdzUMp8K0Eu2dq8JYaHnqMYuyoU4oqZ6XKEOo1a6IMMaeRmB 3MEreNvkySwkeh8pJiB8vUYTQVP1dVW4dLtxxJHTKpU4nf10ABqxL3grCNGwK6/hdIy0 CV21srSHAMk4v7QEB8Pv661rryExu4JT2W93NBUTBeYhzknozWPtGa7mfo4tBGglYDwN iBOw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xNlPx4DxEkgFLI3ccLdFML6TiUma/NrXd0DN2t8ndk0=; b=tatoJEZCp5PWOnKq/BMTTO7xXl8OfX9XNb0HD+9E7tEXYckdy328YYkc5KWyOYHLL/ 8GGQmb0Sm18ESrzvu3zRSdL4MyaXXIMhEcsHbKFAu9dVYRJynOBZI9aZ57jCfbElLWDy jRMWrV5M5fwvjO4rCJ+R8HsWY+sodEI0iaZ4Ybmh9Osq6Dh4MQUOC3xs+C+fqbFLAB7f qtUWTihZjw2CptUsBzuYFaF0RxypLQg/rRYrIUbgSF/tzbbWqCJr+gs5SkNTMPEkoRtn cn/dxUWklkcqE/B0ioBChU7B2jY0imfFmpIGDKpLN4hwwCFg3lJBxXC33gaTYlIxCTXb uzdA==
X-Gm-Message-State: APjAAAXDSEclqlSONhJMEoxpmyJ9hrZQO+sattJg0dg43ZuFCZ0znbE6 0KdpgYY27qQBFHoZTAaf+WMf0UwJt0EGrA1mK1Y=
X-Google-Smtp-Source: APXvYqy+iPZaZmZBpZnL3iUiQMSYD9nW7xgsvhWHMU62grJAqLz+8moIY86wIrV76go5oP16VxOMCQ5P2tQrEAl5YUI=
X-Received: by 2002:adf:cd04:: with SMTP id w4mr86974739wrm.230.1564597534158;  Wed, 31 Jul 2019 11:25:34 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com> <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com> <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com>
In-Reply-To: <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com>
From: Dinesh Dutt <didutt@gmail.com>
Date: Wed, 31 Jul 2019 11:25:21 -0700
Message-ID: <CAOPNUTDqe1iA9N=+kJD4Mih1xu6LqTVi0D=mzvgjUn_KE6K7dA@mail.gmail.com>
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>,  Joel Halpern <jmh@joelhalpern.com>, bfd-chairs@ietf.org,  Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="0000000000003d7ab2058efe407e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/z8E_a5k_r4pLLs5YfNsL_Xm9_Us>
X-Mailman-Approved-At: Wed, 31 Jul 2019 11:26:55 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 18:25:37 -0000

--0000000000003d7ab2058efe407e
Content-Type: text/plain; charset="UTF-8"

Hi Greg,

On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Dinesh,
> thank you for your consideration of the proposal and questions. What would
> you see as the scope of testing the connectivity for the specific VNI? If
> it is tenant-to-tenant, then VTEPs will treat these packets as regular user
> frames. More likely, these could be Layer 2 OAM, e.g. CCM frames. The
> reason to use 127/8 for IPv4, and 0:0:0:0:0:FFFF:7F00:0/104 for IPv6 is to
> safeguard from leaking Ethernet frames with BFD Control packet to a tenant.
> You've suggested using a MAC address to trap the control packet at VTEP.
> What that address could be? We had proposed using the dedicated MAC and
> VTEP's MAC and both raised concerns among VXLAN experts. The idea of using
> Management VNI may be more acceptable based on its similarity to the
> practice of using Management VLAN.
>

If you use the inner IP address as the VTEP IP address, then use the MAC
address that the VTEP would respond with when replying to an ARP for that
VTEP IP address. If a VXLAN expert disagrees with this, could you kindly
tell me who it is so that I can understand their disagreement? So this
handles the case where the VNI is not a user-tenant VNI. If the VNI used in
the BFD packet is a user-tenant VNI, then the receiving VTEP MUST have an
IP address in that VNI (mapped to a VRF) else you cannot use that VNI in
the BFD packet. Why won't this combination address all the cases you've
listed? What am I missing? Define VNI 1 as a possible use, not VNI 0. I
objected to VNI 0 because there are too many switching siicon out there and
some of them will not be able to handle this scenario.

Dinesh

>
> Regards,
> Greg
>
> On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt <didutt@gmail.com> wrote:
>
>> Hi Greg,
>>
>> As long as the inner MAC address is such that the packet is trapped to
>> the CPU, it should be fine for use as an inner MAC is it not? Stating that
>> is better than trying to force a management VNI. What if someone wants to
>> test connectivity on a specific VNI? I would not pick a loopback IP address
>> for this since that address range is host/node local only. Is there a
>> reason you're not using the VTEP IP as the inner IP address ?
>>
>> Dinesh
>>
>> On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky <gregimirsky@gmail.com>
>> wrote:
>>
>>> Dear All,
>>> thank you for your comments, suggestions on this issue, probably the
>>> most challenging for this specification. In the course of our discussions,
>>> we've agreed to abandon the request to allocate the dedicated MAC address
>>> to be used as the destination MAC address in the inner Ethernet frame.
>>> Also, earlier using VNI 0 was changed from mandatory to one of the options
>>> an implementation may offer to an operator. The most recent discussion was
>>> whether VTEP's MAC address might be used as the destination MAC address in
>>> the inner Ethernet frame. As I recall it, the comments from VXLAN experts
>>> equally split with one for it and one against. Hence I would like to
>>> propose a new text to resolve the issue. The idea is to let an operator
>>> select Management VNI and use that VNI in VXLAN encapsulation of BFD
>>> Control packets:
>>> NEW TEXT:
>>>
>>> An operator MUST select a VNI number to be used as Management VNI. VXLAN
>>> packet for Management VNI MUST NOT be sent to a tenant. VNI number 1 is
>>> RECOMMENDED as the default for Management VNI.
>>>
>>> With that new text, what can be the value of the destination MAC in the
>>> inner Ethernet? I tend to believe that it can be anything and ignored by
>>> the reciever VTEP. Also, if the trapping is based on VNI number, the
>>> destination IP address of the inner IP packet can from the range 127/8 for
>>> IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly,
>>> the TTL to be set to 1 (no change here).
>>>
>>> Much appreciate your comments, questions, and suggestions.
>>>
>>> Best regards,
>>> Greg
>>>
>>

--0000000000003d7ab2058efe407e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hi Greg,<br></div><br><div class=3D"gmail=
_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jul 31, 2019 at 9:20 =
AM Greg Mirsky &lt;<a href=3D"mailto:gregimirsky@gmail.com">gregimirsky@gma=
il.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left=
:1ex"><div dir=3D"ltr">Hi Dinesh,<div>thank you for your consideration of t=
he proposal and questions. What would you see as the scope of testing the c=
onnectivity for the specific VNI? If it is tenant-to-tenant, then VTEPs wil=
l treat these packets as regular user frames. More likely, these could be L=
ayer 2 OAM, e.g. CCM frames. The reason to use 127/8 for IPv4, and 0:0:0:0:=
0:FFFF:7F00:0/104 for IPv6 is to safeguard from leaking Ethernet frames wit=
h BFD Control packet to a tenant.</div><div>You&#39;ve suggested using a MA=
C address to trap the control packet at VTEP. What that address could be? W=
e had proposed using the dedicated MAC and VTEP&#39;s MAC and both raised c=
oncerns among VXLAN experts. The idea of using Management VNI may be more a=
cceptable based on its similarity to the practice of using Management VLAN.=
</div></div></blockquote><div><br></div><div>If you use the inner IP addres=
s as the VTEP IP address, then use the MAC address that the VTEP would resp=
ond with when replying to an ARP for that VTEP IP address. If a VXLAN exper=
t disagrees with this, could you kindly tell me who it is so that I can und=
erstand their disagreement? So this handles the case where the VNI is not a=
 user-tenant VNI. If the VNI used in the BFD packet is a user-tenant VNI, t=
hen the receiving VTEP MUST have an IP address in that VNI (mapped to a VRF=
) else you cannot use that VNI in the BFD packet. Why won&#39;t this combin=
ation address all the cases you&#39;ve listed? What am I missing? Define VN=
I 1 as a possible use, not VNI 0. I objected to VNI 0 because there are too=
 many switching siicon out there and some of them will not be able to handl=
e this scenario.<br></div><div><br></div><div>Dinesh<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div><br></div><div>R=
egards,</div><div>Greg</div></div><br><div class=3D"gmail_quote"><div dir=
=3D"ltr" class=3D"gmail_attr">On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt =
&lt;<a href=3D"mailto:didutt@gmail.com" target=3D"_blank">didutt@gmail.com<=
/a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div dir=3D"ltr"><div>Hi Greg,</div><div><br></div><div>As long as the inner=
 MAC address is such that the packet is trapped to the CPU, it should be fi=
ne for use as an inner MAC is it not? Stating that is better than trying to=
 force a management VNI. What if someone wants to test connectivity on a sp=
ecific VNI? I would not pick a loopback IP address for this since that addr=
ess range is host/node local only. Is there a reason you&#39;re not using t=
he VTEP IP as the inner IP address ?</div><div><br></div><div>Dinesh<br></d=
iv></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_att=
r">On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky &lt;<a href=3D"mailto:gregim=
irsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt; wrote:<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">De=
ar All,<div>thank you for your comments, suggestions on this issue, probabl=
y the most challenging for this specification. In the course of our discuss=
ions, we&#39;ve agreed to abandon the request to allocate the dedicated MAC=
 address to be used as the destination MAC address in the inner Ethernet fr=
ame. Also, earlier using VNI 0 was changed from mandatory to one of the opt=
ions an implementation may offer to an operator. The most recent discussion=
 was whether VTEP&#39;s MAC address might be used as the destination MAC ad=
dress in the inner Ethernet frame. As I recall it, the comments from VXLAN =
experts equally split with one for it and one against. Hence I would like t=
o propose a new text to resolve the issue. The idea is to let an operator s=
elect Management VNI and use that VNI in VXLAN encapsulation of BFD Control=
 packets:</div><div>NEW TEXT:</div><blockquote style=3D"margin:0px 0px 0px =
40px;border:medium none;padding:0px"><div>An operator MUST select a VNI num=
ber to be used as Management VNI. VXLAN packet for Management VNI MUST NOT =
be sent to a tenant. VNI number 1 is RECOMMENDED as the default for Managem=
ent VNI.</div></blockquote><div>With that new text, what can be the value o=
f the destination MAC in the inner Ethernet? I tend to believe that it can =
be anything and ignored by the reciever VTEP. Also, if the trapping is base=
d on VNI number, the destination IP address of the inner IP packet can from=
 the range 127/8 for IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:=
0/104. And lastly, the TTL to be set to 1 (no change here).</div><div><br><=
/div><div>Much appreciate your comments, questions, and suggestions.</div><=
div><br></div><div>Best regards,</div><div>Greg</div></div>
</blockquote></div>
</blockquote></div>
</blockquote></div></div>

--0000000000003d7ab2058efe407e--


From nobody Wed Jul 31 12:07:45 2019
Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3144212004F; Wed, 31 Jul 2019 12:07:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JxHPo5mxkzoc; Wed, 31 Jul 2019 12:07:41 -0700 (PDT)
Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com [IPv6:2a00:1450:4864:20::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 773BE120018; Wed, 31 Jul 2019 12:07:40 -0700 (PDT)
Received: by mail-lj1-x22a.google.com with SMTP id v18so66676730ljh.6; Wed, 31 Jul 2019 12:07:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=VXEGsgO1mvFxej6rfXCC42yjOYvJMqqjT6K4A6K6vCw=; b=l1iwrbsO9HVkfcWAV7oKlBgb0Ktl40mDKlhM9d1A2F9I34rQe4fO1mcTWzA4QKHYIJ NnNrgoOKG0MhOVucFLUnY1EzevZrybqoUgmGMJbU5FCcrevP6H2Z2K1w9xxAf27oSmn4 SHDfiu/oDUrNGG+fAeUU6T1zaKVWVS8KvjrmbrGnVKGP191zsOwjIs2hBt4YOupjeiqQ mmw+U1xG7ZyR+R60SauKPaSa0KeHAVckRYa1vlXU2d6jMPX1monxb92PgDRVLeUkHpTS /Lgte7IMJHKpVfZ9zqVX0MjzIYnKgF3+mucSdgnINvjzeNOpj2ht+GAwISH/ykx4yovL f34Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=VXEGsgO1mvFxej6rfXCC42yjOYvJMqqjT6K4A6K6vCw=; b=tnSPkPQXnQfnGXtMshK77xhIPndCc9cGxSlwtd2WqhI4SokADghB5MZ4hIodqP8yA5 Z++8gf60RMy65Ox6RNbCd/rV5KZKqMkue6yZnw0wBVwye8ieXSMzIOL7KCGHPsad8MTE T8t9H6/KqA0UY5m4Hbd3FKxioc2vAVVLVo78k3jP4ddo5u3p36aVg6g9apYBDoNKWCCm VxjTV5tlCq7R5knFxumvfbs6HUHSmuhXwY9qbcRKDvYwikTozqZ+qQ5jHvnjIA7bKwax NiEiw/JlTD1nqyKjEO8FQuAhxjyVbFp3OAS6HmagNtvjPVGXg8kD1n4VCWoGz+JzADyY jMbA==
X-Gm-Message-State: APjAAAUhjU/qNA7wPB02vcA1I6JXyK3kskaN9feMC4Q2DKHes2Zvmeui 4xtNbhKxbjLpp+9beEV2zUhbu8m83rWOL4iIb+w=
X-Google-Smtp-Source: APXvYqxwF8myzqBJBaR2Cr59H0GbvdhWMtZ3QgsxY8LIdyfEV7JygejEqA7BeNNYWSW8FIiHLDqzAwjiV9ZuEysFztg=
X-Received: by 2002:a2e:7d0c:: with SMTP id y12mr15653696ljc.36.1564600058579;  Wed, 31 Jul 2019 12:07:38 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmW=byLBNfVQSdaEoMf-QnJtj13k788XhbZ9tqH4bcgqNQ@mail.gmail.com> <CAOPNUTBJztjmNgrDyHgMo8-nRazAaXACGJJZ6Lx8z8aRVBM+GA@mail.gmail.com> <CA+RyBmWrM3v37BO8O_VOGG-NJ+UbrtSVQ_2GwW0R+vLkxbtvHw@mail.gmail.com> <CAOPNUTDqe1iA9N=+kJD4Mih1xu6LqTVi0D=mzvgjUn_KE6K7dA@mail.gmail.com>
In-Reply-To: <CAOPNUTDqe1iA9N=+kJD4Mih1xu6LqTVi0D=mzvgjUn_KE6K7dA@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 31 Jul 2019 15:07:28 -0400
Message-ID: <CA+RyBmXoc1hbhbS9SPAKp8phqahjQVKZHGb58F7-=Y=wX2FkQg@mail.gmail.com>
Subject: Re: BFD over VXLAN: Trapping BFD Control packet at VTEP
To: Dinesh Dutt <didutt@gmail.com>
Cc: rtg-bfd WG <rtg-bfd@ietf.org>, "T. Sridhar" <tsridhar@vmware.com>,  Joel Halpern <jmh@joelhalpern.com>, bfd-chairs@ietf.org,  Martin Vigoureux <martin.vigoureux@nokia.com>, draft-ietf-bfd-vxlan@ietf.org
Content-Type: multipart/alternative; boundary="000000000000b50dba058efed6f6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/ClknM4eRAVJa2NbOfY1lexMYNEc>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jul 2019 19:07:43 -0000

--000000000000b50dba058efed6f6
Content-Type: text/plain; charset="UTF-8"

Hi Dinesh,
if I recall correctly, T.Sridhar has noted that VTEP's MAC must not be used
as the destination MAC address in the inner Ethernet frame. Also, I should
have been more precise in the proposed text, please see the updated version
to stress that the management VNI MUST NOT be one of the tenant's VNIs:
NEW TEXT:

An operator MUST select a VNI number to be used as Management VNI.
Management VNI number MUST NOT be one of the tenant's VNIs to prevent
sending VXLAN packets received on Management VNI to a tenant. VNI number 1
is RECOMMENDED as the default for Management VNI.


On Wed, Jul 31, 2019 at 2:25 PM Dinesh Dutt <didutt@gmail.com> wrote:

> Hi Greg,
>
> On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky <gregimirsky@gmail.com> wrote:
>
>> Hi Dinesh,
>> thank you for your consideration of the proposal and questions. What
>> would you see as the scope of testing the connectivity for the specific
>> VNI? If it is tenant-to-tenant, then VTEPs will treat these packets as
>> regular user frames. More likely, these could be Layer 2 OAM, e.g. CCM
>> frames. The reason to use 127/8 for IPv4, and 0:0:0:0:0:FFFF:7F00:0/104 for
>> IPv6 is to safeguard from leaking Ethernet frames with BFD Control packet
>> to a tenant.
>> You've suggested using a MAC address to trap the control packet at VTEP.
>> What that address could be? We had proposed using the dedicated MAC and
>> VTEP's MAC and both raised concerns among VXLAN experts. The idea of using
>> Management VNI may be more acceptable based on its similarity to the
>> practice of using Management VLAN.
>>
>
> If you use the inner IP address as the VTEP IP address, then use the MAC
> address that the VTEP would respond with when replying to an ARP for that
> VTEP IP address. If a VXLAN expert disagrees with this, could you kindly
> tell me who it is so that I can understand their disagreement? So this
> handles the case where the VNI is not a user-tenant VNI. If the VNI used in
> the BFD packet is a user-tenant VNI, then the receiving VTEP MUST have an
> IP address in that VNI (mapped to a VRF) else you cannot use that VNI in
> the BFD packet. Why won't this combination address all the cases you've
> listed? What am I missing? Define VNI 1 as a possible use, not VNI 0. I
> objected to VNI 0 because there are too many switching siicon out there and
> some of them will not be able to handle this scenario.
>
> Dinesh
>
>>
>> Regards,
>> Greg
>>
>> On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt <didutt@gmail.com> wrote:
>>
>>> Hi Greg,
>>>
>>> As long as the inner MAC address is such that the packet is trapped to
>>> the CPU, it should be fine for use as an inner MAC is it not? Stating that
>>> is better than trying to force a management VNI. What if someone wants to
>>> test connectivity on a specific VNI? I would not pick a loopback IP address
>>> for this since that address range is host/node local only. Is there a
>>> reason you're not using the VTEP IP as the inner IP address ?
>>>
>>> Dinesh
>>>
>>> On Wed, Jul 31, 2019 at 5:48 AM Greg Mirsky <gregimirsky@gmail.com>
>>> wrote:
>>>
>>>> Dear All,
>>>> thank you for your comments, suggestions on this issue, probably the
>>>> most challenging for this specification. In the course of our discussions,
>>>> we've agreed to abandon the request to allocate the dedicated MAC address
>>>> to be used as the destination MAC address in the inner Ethernet frame.
>>>> Also, earlier using VNI 0 was changed from mandatory to one of the options
>>>> an implementation may offer to an operator. The most recent discussion was
>>>> whether VTEP's MAC address might be used as the destination MAC address in
>>>> the inner Ethernet frame. As I recall it, the comments from VXLAN experts
>>>> equally split with one for it and one against. Hence I would like to
>>>> propose a new text to resolve the issue. The idea is to let an operator
>>>> select Management VNI and use that VNI in VXLAN encapsulation of BFD
>>>> Control packets:
>>>> NEW TEXT:
>>>>
>>>> An operator MUST select a VNI number to be used as Management VNI.
>>>> VXLAN packet for Management VNI MUST NOT be sent to a tenant. VNI number 1
>>>> is RECOMMENDED as the default for Management VNI.
>>>>
>>>> With that new text, what can be the value of the destination MAC in the
>>>> inner Ethernet? I tend to believe that it can be anything and ignored by
>>>> the reciever VTEP. Also, if the trapping is based on VNI number, the
>>>> destination IP address of the inner IP packet can from the range 127/8 for
>>>> IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. And lastly,
>>>> the TTL to be set to 1 (no change here).
>>>>
>>>> Much appreciate your comments, questions, and suggestions.
>>>>
>>>> Best regards,
>>>> Greg
>>>>
>>>

--000000000000b50dba058efed6f6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hi Dinesh,<div>if I recall=C2=A0correctly=
, T.Sridhar has noted that VTEP&#39;s MAC must not be used as the destinati=
on MAC address in the inner Ethernet frame. Also, I should have been more p=
recise in the proposed text, please see the updated version to stress that =
the management VNI MUST NOT be one of the tenant&#39;s VNIs:</div><div>NEW =
TEXT:</div></div><blockquote style=3D"margin:0 0 0 40px;border:none;padding=
:0px"><div dir=3D"ltr"><div>An operator MUST select a VNI number to be used=
 as Management VNI. Management VNI number MUST NOT be one of the tenant&#39=
;s VNIs to prevent sending VXLAN packets received on Management VNI to a te=
nant. VNI number 1 is RECOMMENDED as the default for Management VNI.=C2=A0=
=C2=A0</div></div></blockquote><br><div class=3D"gmail_quote"><div class=3D=
"gmail_attr" dir=3D"ltr">On Wed, Jul 31, 2019 at 2:25 PM Dinesh Dutt &lt;<a=
 href=3D"mailto:didutt@gmail.com">didutt@gmail.com</a>&gt; wrote:<br></div>=
<blockquote style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204=
,204,204);padding-left:1ex" class=3D"gmail_quote"><div dir=3D"ltr"><div dir=
=3D"ltr">Hi Greg,<br></div><br><div class=3D"gmail_quote"><div class=3D"gma=
il_attr" dir=3D"ltr">On Wed, Jul 31, 2019 at 9:20 AM Greg Mirsky &lt;<a tar=
get=3D"_blank" href=3D"mailto:gregimirsky@gmail.com">gregimirsky@gmail.com<=
/a>&gt; wrote:<br></div><blockquote style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex" class=3D"gmail_quote"><=
div dir=3D"ltr">Hi Dinesh,<div>thank you for your consideration of the prop=
osal and questions. What would you see as the scope of testing the connecti=
vity for the specific VNI? If it is tenant-to-tenant, then VTEPs will treat=
 these packets as regular user frames. More likely, these could be Layer 2 =
OAM, e.g. CCM frames. The reason to use 127/8 for IPv4, and 0:0:0:0:0:FFFF:=
7F00:0/104 for IPv6 is to safeguard from leaking Ethernet frames with BFD C=
ontrol packet to a tenant.</div><div>You&#39;ve suggested using a MAC addre=
ss to trap the control packet at VTEP. What that address could be? We had p=
roposed using the dedicated MAC and VTEP&#39;s MAC and both raised concerns=
 among VXLAN experts. The idea of using Management VNI may be more acceptab=
le based on its similarity to the practice of using Management VLAN.</div><=
/div></blockquote><div><br></div><div>If you use the inner IP address as th=
e VTEP IP address, then use the MAC address that the VTEP would respond wit=
h when replying to an ARP for that VTEP IP address. If a VXLAN expert disag=
rees with this, could you kindly tell me who it is so that I can understand=
 their disagreement? So this handles the case where the VNI is not a user-t=
enant VNI. If the VNI used in the BFD packet is a user-tenant VNI, then the=
 receiving VTEP MUST have an IP address in that VNI (mapped to a VRF) else =
you cannot use that VNI in the BFD packet. Why won&#39;t this combination a=
ddress all the cases you&#39;ve listed? What am I missing? Define VNI 1 as =
a possible use, not VNI 0. I objected to VNI 0 because there are too many s=
witching siicon out there and some of them will not be able to handle this =
scenario.<br></div><div><br></div><div>Dinesh<br></div><blockquote style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex" class=3D"gmail_quote"><div dir=3D"ltr"><div><br></div><div>Regards,=
</div><div>Greg</div></div><br><div class=3D"gmail_quote"><div class=3D"gma=
il_attr" dir=3D"ltr">On Wed, Jul 31, 2019 at 12:03 PM Dinesh Dutt &lt;<a ta=
rget=3D"_blank" href=3D"mailto:didutt@gmail.com">didutt@gmail.com</a>&gt; w=
rote:<br></div><blockquote style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex" class=3D"gmail_quote"><div dir=
=3D"ltr"><div>Hi Greg,</div><div><br></div><div>As long as the inner MAC ad=
dress is such that the packet is trapped to the CPU, it should be fine for =
use as an inner MAC is it not? Stating that is better than trying to force =
a management VNI. What if someone wants to test connectivity on a specific =
VNI? I would not pick a loopback IP address for this since that address ran=
ge is host/node local only. Is there a reason you&#39;re not using the VTEP=
 IP as the inner IP address ?</div><div><br></div><div>Dinesh<br></div></di=
v><br><div class=3D"gmail_quote"><div class=3D"gmail_attr" dir=3D"ltr">On W=
ed, Jul 31, 2019 at 5:48 AM Greg Mirsky &lt;<a target=3D"_blank" href=3D"ma=
ilto:gregimirsky@gmail.com">gregimirsky@gmail.com</a>&gt; wrote:<br></div><=
blockquote style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex" class=3D"gmail_quote"><div dir=3D"ltr">Dear All,=
<div>thank you for your comments, suggestions on this issue, probably the m=
ost challenging for this specification. In the course of our discussions, w=
e&#39;ve agreed to abandon the request to allocate the dedicated MAC addres=
s to be used as the destination MAC address in the inner Ethernet frame. Al=
so, earlier using VNI 0 was changed from mandatory to one of the options an=
 implementation may offer to an operator. The most recent discussion was wh=
ether VTEP&#39;s MAC address might be used as the destination MAC address i=
n the inner Ethernet frame. As I recall it, the comments from VXLAN experts=
 equally split with one for it and one against. Hence I would like to propo=
se a new text to resolve the issue. The idea is to let an operator select M=
anagement VNI and use that VNI in VXLAN encapsulation of BFD Control packet=
s:</div><div>NEW TEXT:</div><blockquote style=3D"margin:0px 0px 0px 40px;bo=
rder:medium none;padding:0px"><div>An operator MUST select a VNI number to =
be used as Management VNI. VXLAN packet for Management VNI MUST NOT be sent=
 to a tenant. VNI number 1 is RECOMMENDED as the default for Management VNI=
.</div></blockquote><div>With that new text, what can be the value of the d=
estination MAC in the inner Ethernet? I tend to believe that it can be anyt=
hing and ignored by the reciever VTEP. Also, if the trapping is based on VN=
I number, the destination IP address of the inner IP packet can from the ra=
nge 127/8 for IPv4, and for IPv6 from the range 0:0:0:0:0:FFFF:7F00:0/104. =
And lastly, the TTL to be set to 1 (no change here).</div><div><br></div><d=
iv>Much appreciate your comments, questions, and suggestions.</div><div><br=
></div><div>Best regards,</div><div>Greg</div></div>
</blockquote></div>
</blockquote></div>
</blockquote></div></div>
</blockquote></div></div>

--000000000000b50dba058efed6f6--

