
From nobody Sun Nov  1 22:48:50 2015
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CE801A00E6; Sun,  1 Nov 2015 22:48:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.76
X-Spam-Level: 
X-Spam-Status: No, score=-1.76 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8BNqZ8ebkmZU; Sun,  1 Nov 2015 22:48:47 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E1B51A00DC; Sun,  1 Nov 2015 22:48:45 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CDJ77298; Mon, 02 Nov 2015 06:48:43 +0000 (GMT)
Received: from NKGEML408-HUB.china.huawei.com (10.98.56.39) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.235.1; Mon, 2 Nov 2015 06:48:42 +0000
Received: from NKGEML512-MBS.china.huawei.com ([169.254.8.187]) by nkgeml408-hub.china.huawei.com ([10.98.56.39]) with mapi id 14.03.0235.001; Mon, 2 Nov 2015 14:48:38 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: Thomas Narten <narten@us.ibm.com>
Thread-Topic: New Version Notification for draft-xu-sfc-using-mpls-spring-04.txt
Thread-Index: AQHQ6uEhwUT+nrZsQk6IpAAbYfyXTp4z7JRggEylwuCAAEs5gIABG47wgAJPYQCABFL7aQ==
Date: Mon, 2 Nov 2015 06:48:37 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB4184E@NKGEML512-MBS.china.huawei.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB3DFAF@NKGEML512-MBS.china.huawei.com> <m3a8r3dkvk.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB3E2EE@NKGEML512-MBS.china.huawei.com>, <m3vb9oumf1.wl-narten@us.ibm.com>
In-Reply-To: <m3vb9oumf1.wl-narten@us.ibm.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.185.102]
Content-Type: multipart/alternative; boundary="_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB4184ENKGEML512MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Y09_hwMHM1NUDqY3_C2T76K0RHo>
Cc: "'mpls@ietf.org'" <mpls@ietf.org>, "mpls-chairs@tools.ietf.org" <mpls-chairs@tools.ietf.org>, "'sfc@ietf.org'" <sfc@ietf.org>, "sfc-chairs@tools.ietf.org" <sfc-chairs@tools.ietf.org>
Subject: Re: [sfc] New Version Notification for draft-xu-sfc-using-mpls-spring-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2015 06:48:49 -0000

--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB4184ENKGEML512MBSchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB4184ENKGEML512MBSchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html dir=3D"ltr">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<style id=3D"owaParaStyle">P {
	MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px
}
</style>
</head>
<body fPStyle=3D"1" ocsi=3D"0">
<div style=3D"direction: ltr;font-family: Tahoma;color: #000000;font-size: =
10pt;">
<p>Hi Thomas,<br>
<br>
________________________________________<br>
=B7=A2=BC=FE=C8=CB: Thomas Narten [narten@us.ibm.com]<br>
=B7=A2=CB=CD=CA=B1=BC=E4: 2015=C4=EA10=D4=C231=C8=D5 4:33<br>
=CA=D5=BC=FE=C8=CB: Xuxiaohu<br>
=B3=AD=CB=CD: 'sfc@ietf.org'; sfc-chairs@tools.ietf.org; 'mpls@ietf.org'; m=
pls-chairs@tools.ietf.org<br>
=D6=F7=CC=E2: Re: New Version Notification for draft-xu-sfc-using-mpls-spri=
ng-04.txt<br>
<br>
&gt; According to the following statement quoted from the current SFC chart=
er:<br>
&gt;<br>
&gt; &quot;... The WG will examine existing identifier schemes,<br>
&gt;&nbsp;&nbsp; if there is a need for such identifiers in the context of =
the Generic SFC<br>
&gt;&nbsp;&nbsp; encapsulation, before defining any new identifier scheme.<=
br>
&gt; ...&quot;<br>
&gt;<br>
&gt; It seems that this MPLS-SPRING-based SFC encapsulation scheme should b=
e<br>
&gt; relevant to the SFC WG. At least, it could be investigated as a light-=
weight<br>
&gt; SFC encapsulation approach (from the aspect of reducing and even avoid=
ing any<br>
&gt; impact on the data plane).<br>
<br>
The charter also says:<br>
<br>
&nbsp;&nbsp; 3. Generic SFC Encapsulation: This document will describe a si=
ngle<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; service-level data plane encapsulation forma=
t that:<br>
<br>
I want to emphasize the term &quot;a single ... encapsulation format&quot; =
It<br>
has been my understanding that the intention of this WG from the<br>
beginning was to produce one encapsulation, not multiple ones.<br>
<br>
[Xiaohu] My understanding is that the intention of this WG from the<br>
beginning was to produce one encapsulation IF NEEDED. That' s why the follo=
wing text is contained in the charter:<br>
</p>
<p>&nbsp;&quot;... The WG will examine existing identifier schemes,<br>
if there is a need for such identifiers in the context of the Generic SFC<b=
r>
encapsulation, before defining any new identifier scheme...&quot;<br>
<br>
<br>
I think it has been clear for some time already that the WG has<br>
selected the NSH document as its desired approach.<br>
</p>
<p>[Xiaohu]&nbsp;I wonder whether&nbsp;the work of examining existing ident=
ifier schemes as mentioned in the charter been finished or the WG now belie=
ve that work is not neccessary anymore?</p>
<p>&nbsp;</p>
<p>Best regards,</p>
<p>Xiaohu</p>
<p><br>
Are you suggesting that the WG take on this document as an additional<br>
encapsulation for SFC? I do not think that is consistent with the<br>
intent of the charter. Also, my read of the overall list discussion<br>
with respect to this document is that the WG has not shown a strong<br>
interest in this document nor indicated a compelling need for it.<br>
<br>
If the WG disagrees with this assessment, I expect folk would speak<br>
up.<br>
<br>
Thomas</p>
</div>
</body>
</html>

--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0CB4184ENKGEML512MBSchi_--


From nobody Mon Nov  2 11:06:31 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 308BB1B2A45 for <sfc@ietfa.amsl.com>; Mon,  2 Nov 2015 11:06:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WRVyJ59UO7mE for <sfc@ietfa.amsl.com>; Mon,  2 Nov 2015 11:06:28 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72B0C1B2A42 for <sfc@ietf.org>; Mon,  2 Nov 2015 11:06:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3855; q=dns/txt; s=iport; t=1446491188; x=1447700788; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=eJGYN8AmFfEOHHu9IF9I7LsPERwHC4E2iXsBZQK3y8k=; b=lYRBU/Ab4ybAclFLPL69UDEqrhy5ROTM7MCzj9Uq90oBLAyCXvjMF/sF BcO5/KKluOF/xgCTIPkrJgWV1JhedVzp4gKspEcrcknst9EaPOc+q4wh9 Zzt4oXMChXCD69vYS31NcFm+tv6BMSuuSBneulvyqn05iI0VgiJ3R0y7E I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D1AQAyszdW/4ENJK1egztTb79FAQ2BWhcMhXYCgTs4FAEBAQEBAQGBCoQ1AQEBAwEBAQE3NAsFCwIBCBIGHhAnCxcOAgQOBQkSiA0IDcFNAQEBAQEBAQEBAQEBAQEBAQEBAQEBGIZ3ghCCboRcg1CBFAWSZoNdAYUciAiBWUiDd5YhAR8BAUKEBHIBhX0BAQE
X-IronPort-AV: E=Sophos;i="5.20,236,1444694400"; d="scan'208";a="43246441"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-5.cisco.com with ESMTP; 02 Nov 2015 19:06:27 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id tA2J6Rx0020359 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 2 Nov 2015 19:06:27 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 2 Nov 2015 13:06:26 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Mon, 2 Nov 2015 13:06:26 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Agenda for Yokohoma
Thread-Index: AQHREbvLPKJexxAMg0+Ng/fkiLt8rp6JH62+
Date: Mon, 2 Nov 2015 19:06:26 +0000
Message-ID: <12BA7054-08EA-4BFE-B7B3-6F1E80497741@cisco.com>
References: <m3ziz2dakl.wl-narten@us.ibm.com>
In-Reply-To: <m3ziz2dakl.wl-narten@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/_410ftcKAjUvQVCMmMNlApM8MUg>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Agenda for Yokohoma
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2015 19:06:30 -0000

Dear WG:

Just a quick reminder that the chairs need all presentations for this weeks=
 meeting no later than COB *today*.

Thank you!

Sent from my iPhone

> On Oct 28, 2015, at 4:04 PM, Thomas Narten <narten@us.ibm.com> wrote:
>=20
> The agenda for Yokohama is been posted at the usual places. E.g.,
>=20
>    Sfc Status Pages
>    http://tools.ietf.org/wg/sfc/agenda
>=20
> I've included the current contents below.
>=20
> If you are a presenter please plan to send Jim & I slides no later
> than Monday 11/2 so that we have time to review and post prior to the
> meeting.
>=20
> Thomas & Jim
>=20
>=20
> IETF-94 sfc agenda
> Session 2015-11-05 0900-1130: Room 502 - Audio stream - sfc chatroom
>=20
> Agenda
>=20
>=20
>=20
>=20
>          IETF94 Yokohama SFC Agenda
>          Total time: 2.5 hours
>=20
>          00:00 Introduction (WG-chairs) - [5 minutes]
>                   Agenda bashing, note-well, (WG-chairs) - [5 minutes]
>=20
>          00:05 SFC Security Requirements (Presenter + open-mic) - [25 min=
utes]
>=20
>                  - SFC Environment Security Requirements (Daniel Migault)=
 - [15 minutes]
>                          - http://www.ietf.org/id/draft-mglt-sfc-security=
-environment-req-00.txt
>=20
>                  - SFC Security Requirements Q&A (open-mic) - [10 minutes=
]
>=20
>=20
>          00:30 SFC Use Cases (Presenters + open-mic) - [40 minutes]
>=20
>                  - SFC Use Cases in Mobile Networks (Jeff Napper) - [10 m=
inutes]
>                          - https://datatracker.ietf.org/doc/draft-ietf-sf=
c-use-case-mobility/
>=20
>                  - SFC Use Cases for Network Security (Eric Wang) - [10 m=
inutes]
>                          - https://www.ietf.org/internet-drafts/draft-wan=
g-sfc-ns-use-cases-00.txt
>=20
>                  - SFC Use Cases in Broadband (Wei Meng) - [10 minutes]
>                          - https://datatracker.ietf.org/doc/draft-meng-sf=
c-broadband-usecases/
>=20
>                  - SFC Use Cases Q&A (open-mic) - [10 minutes]
>=20
>=20
>          01:10 SFC Architecture Items (Presenters + open-mic) - [50 Minut=
es]
>=20
>                  - UDP Overlay Transport For Network Service Header (Sure=
ndra Kumar) - [10 minutes]
>                          - https://datatracker.ietf.org/doc/draft-kumar-s=
fc-nsh-udp-transport/
>=20
>                  - Map Assisted SFC Proxy using LISP (Albert Cabellos) - =
[10 minutes]
>                          - https://datatracker.ietf.org/doc/draft-cabello=
s-sfc-map-assisted-proxy/
>=20
>                  - Packet Generation in Service Function Chains (Reinaldo=
 Penno) - [10 minutes]
>                          - https://datatracker.ietf.org/doc/draft-penno-s=
fc-packet/
>=20
>                  - Hierarchical Service Function Chaining (Dave Dolson) -=
 [10 minutes]
>                          - https://datatracker.ietf.org/doc/draft-dolson-=
sfc-hierarchical/
>=20
>                  - SFC Architecture Items Q&A (open-mic) - [10 minutes]
>=20
>          02:00 SFC Miscellaneous (Presenters + open-mic) - [25 minutes]
>=20
>                  - SFC Trace Issue Analysis & Solutions (Lei Zhu) - [10 m=
inutes]
>                          - https://datatracker.ietf.org/doc/draft-yang-sf=
c-trace-issue-analysis/
>=20
>                  - SFC: Subscriber & Host Identification Considerations (=
TBD) - [10 minutes]
>                          - https://datatracker.ietf.org/doc/draft-sarikay=
a-sfc-hostid-serviceheader/
>=20
>                  - SFC Miscellaneous Q&A (open-mic) - [5 minutes]
>=20
>=20
>          02:25 Closing (WG-chairs) - [5 minutes]
>=20
>=20
>=20
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Nov  3 15:30:48 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 765ED1B35F3 for <sfc@ietfa.amsl.com>; Tue,  3 Nov 2015 15:30:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ubBW5yxOwLsm for <sfc@ietfa.amsl.com>; Tue,  3 Nov 2015 15:30:45 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98CB01B30D7 for <sfc@ietf.org>; Tue,  3 Nov 2015 15:30:45 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 59B751C0095 for <sfc@ietf.org>; Tue,  3 Nov 2015 15:30:45 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (122x210x83x163.ap122.ftth.ucom.ne.jp [122.210.83.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 043CF1C01B0 for <sfc@ietf.org>; Tue,  3 Nov 2015 15:30:44 -0800 (PST)
To: "sfc@ietf.org" <sfc@ietf.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <563943A2.7020704@joelhalpern.com>
Date: Tue, 3 Nov 2015 18:30:42 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2jmPb5YhPX2GpHWaw1MrfYn5Vog>
Subject: [sfc] Meeting preparation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2015 23:30:46 -0000

It would be helpful if someone would offer to take minutes for the SFC 
session.  If no one does, we will have to delay the start of the meeting 
until we have a note taker.

Please contact Carlos and me (who are standing in for the WG chairs) if 
you are willing to help us in this regard.

Thank you,
Joel


From nobody Tue Nov  3 22:52:45 2015
Return-Path: <amorris@amsl.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF8621ACF5E for <sfc@ietfa.amsl.com>; Tue,  3 Nov 2015 22:52:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XKgvDoE4UA84 for <sfc@ietfa.amsl.com>; Tue,  3 Nov 2015 22:52:42 -0800 (PST)
Received: from mail.amsl.com (mail.amsl.com [4.31.198.40]) by ietfa.amsl.com (Postfix) with ESMTP id 5931F1ACF54 for <sfc@ietf.org>; Tue,  3 Nov 2015 22:52:42 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id F36CF1E5A28 for <sfc@ietf.org>; Tue,  3 Nov 2015 22:52:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kM51BpYAFLKB for <sfc@ietf.org>; Tue,  3 Nov 2015 22:52:03 -0800 (PST)
Received: from t20010c4000003024c477d45ae53775ca.v6.meeting.ietf94.jp (t20010c4000003024c477d45ae53775ca.v6.meeting.ietf94.jp [IPv6:2001:c40:0:3024:c477:d45a:e537:75ca]) by c8a.amsl.com (Postfix) with ESMTPA id 9B5E01E5A1E for <sfc@ietf.org>; Tue,  3 Nov 2015 22:52:03 -0800 (PST)
From: Alexa Morris <amorris@amsl.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Date: Tue, 3 Nov 2015 22:52:41 -0800
Message-Id: <2E6E3DA2-0C80-4034-BB2E-A3A54FF65CF2@amsl.com>
To: sfc@ietf.org
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Sendlaterdate: Tue, 3 Nov 2015 22:52:41 -0800
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-Nlijs5jxJ-auu-42hjMYTOkNZA>
Subject: [sfc] Queue for Remote SFC Attendees
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2015 06:52:43 -0000

If you are planning to participate in the SFC session here at IETF 94 =
Thursday =97 either locally in Yokohama or as a remote participant =97 =
we want to make sure that you are aware that the IETF is providing =
remote participants with a fairly new way to ask questions or make =
comments. In addition to using the Jabber room, for the SFC session =
there is also the opportunity for remote participants to enter a virtual =
queue and ask questions directly into the meeting room.=20

This experimental queue was used in several sessions at IETF 92 and IETF =
93, so you may have already seen it in action. There will be two queues =
for the SFC session =97 a virtual queue and an actual (in-room) queue. =
Remote attendees will log into the Meetecho platform and will have a =
virtual mic line that they can enter if they have a question or comment. =
In-room participants will continue to use normal mic lines.=20

Instructions for remote participants are at =
http://ietf94.conf.meetecho.com/index.php/Remote_Participation.=20

Information on how to join the Meetecho session is at =
http://ietf94.conf.meetecho.com/.

Verify that you are WebRTC compliant (required to use the virtual queue) =
by performing a self-test here: =
http://ietf94.conf.meetecho.com/index.php/Self_Test.=20

Regards,
Alexa

----------
Alexa Morris / Executive Director / IETF
48377 Fremont Blvd., Suite 117, Fremont, CA  94538
Phone: +1.510.492.4089 / Fax: +1.510.492.4001
Email: amorris@amsl.com

Managed by Association Management Solutions (AMS)
Forum Management, Meeting and Event Planning
www.amsl.com <http://www.amsl.com/>


From nobody Wed Nov  4 17:27:20 2015
Return-Path: <jclarke@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3230F1B35C1 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 17:27:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ftzwaEW3leY3 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 17:27:18 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E16D1B35BF for <sfc@ietf.org>; Wed,  4 Nov 2015 17:27:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=940; q=dns/txt; s=iport; t=1446686838; x=1447896438; h=to:from:subject:message-id:date:mime-version: content-transfer-encoding; bh=n/7+vNvLpWhVTJTedoCz4HNZvxnXckfphJInC4/QCFI=; b=VNW/8IxLD7dBYzZKcpC3JfFH8huguHJ4l1C9/QPBzIOF7tn/Nfzr8qiX QN7hPEPbuBLXeEdcewTiBKF4XgalWJJ/7ltwwkff6kJ9W/pCQcRYmFbUT /Fv56rJfhi6Zk7t5M9azGrZMOr7eE47RyHoGPEgUPK81hirLFHUda1VzJ M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AYAgAJsDpW/4sNJK1egzu/NgENgV6GCIFMOBQBAQEBAQEBgQqEXxVANgIFFgsCCwMCAQIBWAgBAYgqoR6PcJB8LYEBhVOJM3KCToFDBY4RiDeNI4kbkyYfAQFChCIghB+BSQEBAQ
X-IronPort-AV: E=Sophos;i="5.20,245,1444694400"; d="scan'208";a="41935315"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-9.cisco.com with ESMTP; 05 Nov 2015 01:27:17 +0000
Received: from [10.24.137.99] ([10.24.137.99]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id tA51RGeY018048 for <sfc@ietf.org>; Thu, 5 Nov 2015 01:27:16 GMT
To: sfc@ietf.org
From: Joe Clarke <jclarke@cisco.com>
Organization: Cisco Systems, Inc.
Message-ID: <563AB073.1030609@cisco.com>
Date: Wed, 4 Nov 2015 20:27:15 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HiPleHTHBvdRZnGMmVYMwWqgd_g>
Subject: [sfc] SFC Security Requirements comments
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 01:27:19 -0000

I figure I'll get the ball rolling with comments on 
draft-mglt-sfc-security-environment-req-00.

In particular, I want to comment on section SFC Data Plane Requirements. 
  It was raised today in the session that REQ16 and REQ17 are 
problematic given certain use cases.  The use case of load balancing 
within a domain was brought up.  I can think of other use cases where 
REQ17, specifically, would be a problem.

If you assume that REQ14 and REQ15 are in place (and these are very 
important IMHO), then the risks associated with REQ16 and REQ17 are 
mitigated.  One could not inject their own metadata or modify existing 
metadata unless they could provide proper authn.

Additionally, on REQ17, while this is a good recommendation in general 
(i.e., think about what you want to send and be frugal with space), it 
uses a strong word, MUST without providing any real guidance as to what 
the limit might be.

Joe


From nobody Wed Nov  4 17:38:48 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D2581B35A0 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 17:38:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ePJrOQZWI7mR for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 17:38:38 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D566D1B34E4 for <sfc@ietf.org>; Wed,  4 Nov 2015 17:38:38 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id C37A7240954 for <sfc@ietf.org>; Wed,  4 Nov 2015 17:38:38 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from dhcp-25-165.meeting.ietf94.jp (dhcp-25-165.meeting.ietf94.jp [133.93.25.165]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 58DB2240C11 for <sfc@ietf.org>; Wed,  4 Nov 2015 17:38:38 -0800 (PST)
To: sfc@ietf.org
References: <563AB073.1030609@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <563AB2E0.70005@joelhalpern.com>
Date: Wed, 4 Nov 2015 20:37:36 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <563AB073.1030609@cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HeDZoC5NJWuQJhUXWZbQ9W4_J8E>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 01:38:44 -0000

 From where I sit, and with the deploymenbts I expect, requiring 
authentication of SFC NSH or of the whole packet seems excessive.  Given 
that the NSH header metadata is going to be modified at many service 
functions, this means that SF have to be able to generate the 
authentication.

And there is a very challenging quesiton as to who would be expected to 
do the work of validating the authentication?  Every Service Function?

So I am doubtful of REQ-14 mandating authentication within the SFC 
space.  When we have inter-domain links, authentication and encryption 
become relevant.
I understand that hard-shell / weak innards security is questionable. 
But adding significant overhead in both sapce and time seems highly 
questionable.

Yours,
Joel

On 11/4/15 8:27 PM, Joe Clarke wrote:
> I figure I'll get the ball rolling with comments on
> draft-mglt-sfc-security-environment-req-00.
>
> In particular, I want to comment on section SFC Data Plane Requirements.
>   It was raised today in the session that REQ16 and REQ17 are
> problematic given certain use cases.  The use case of load balancing
> within a domain was brought up.  I can think of other use cases where
> REQ17, specifically, would be a problem.
>
> If you assume that REQ14 and REQ15 are in place (and these are very
> important IMHO), then the risks associated with REQ16 and REQ17 are
> mitigated.  One could not inject their own metadata or modify existing
> metadata unless they could provide proper authn.
>
> Additionally, on REQ17, while this is a good recommendation in general
> (i.e., think about what you want to send and be frugal with space), it
> uses a strong word, MUST without providing any real guidance as to what
> the limit might be.
>
> Joe
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Nov  4 17:54:18 2015
Return-Path: <sbarkai@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 010F61A883F for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 17:54:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cbuXGYFrnZFR for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 17:54:15 -0800 (PST)
Received: from mail-pa0-x22d.google.com (mail-pa0-x22d.google.com [IPv6:2607:f8b0:400e:c03::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0B801B366D for <sfc@ietf.org>; Wed,  4 Nov 2015 17:54:12 -0800 (PST)
Received: by pasz6 with SMTP id z6so72724676pas.2 for <sfc@ietf.org>; Wed, 04 Nov 2015 17:54:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=YdlEg2g6VoNKgL5/5O6QQ8ndaK2lWsGjFuPkKVzSXgo=; b=qhaCGxfpdDCC16OSeJl1n9KYq/f3ktuvXU5p4KAIjq8YYNC2NxZn86QyRJWGt4PV3z 25qy+ZDxPrMLtVgE6LrVTcz4iKLDKA/iC+w0QsIf/9gRHGC+pMKu5wbS7iKcj+5eGsdR Eq/MemePGmVE64n4yxFXj6l4Ygskh94k6RzrPofY7bqW0Q+zUOguUVz/u9C0pSxnCrcq f4mH2T5tuwnQYoN8B1oVa5u/ZMlG7zndtDp45IQD7224kqJsbSQmymJXVE8oWseNVae0 HUKm6BWs0PIraWA7L9mlhHxa65wdHGV/RgsWb6/Uw6BY+zwqN/BPAKxQtvo44hXRWQHP f7JQ==
X-Received: by 10.66.227.1 with SMTP id rw1mr6101000pac.35.1446688452273; Wed, 04 Nov 2015 17:54:12 -0800 (PST)
Received: from ?IPv6:2600:1010:b05e:a1d1:f4f6:ca59:fbf7:6fae? ([2600:1010:b05e:a1d1:f4f6:ca59:fbf7:6fae]) by smtp.gmail.com with ESMTPSA id ve8sm4436459pbc.48.2015.11.04.17.54.10 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 04 Nov 2015 17:54:11 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Sharon <sbarkai@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <563AB2E0.70005@joelhalpern.com>
Date: Wed, 4 Nov 2015 17:54:09 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <BB121B64-82AF-4490-8BAD-01C6245BD248@gmail.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/rnkWEER2xEhSWQpRy3eogIo6-uU>
Cc: sfc@ietf.org
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 01:54:17 -0000

This is part of the motivation for the draft Alberto presented stripping NSH=
 before SFs, keeping attack surface same as "normal" networking.=20

However stripping context while keeping SFC connectionless requires some map=
-assistance so packets can show up anywhere and chains can fork physically a=
nd logically.

--szb

> On Nov 4, 2015, at 5:37 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>=20
> =46rom where I sit, and with the deploymenbts I expect, requiring authenti=
cation of SFC NSH or of the whole packet seems excessive.  Given that the NS=
H header metadata is going to be modified at many service functions, this me=
ans that SF have to be able to generate the authentication.
>=20
> And there is a very challenging quesiton as to who would be expected to do=
 the work of validating the authentication?  Every Service Function?
>=20
> So I am doubtful of REQ-14 mandating authentication within the SFC space. =
 When we have inter-domain links, authentication and encryption become relev=
ant.
> I understand that hard-shell / weak innards security is questionable. But a=
dding significant overhead in both sapce and time seems highly questionable.=

>=20
> Yours,
> Joel
>=20
>> On 11/4/15 8:27 PM, Joe Clarke wrote:
>> I figure I'll get the ball rolling with comments on
>> draft-mglt-sfc-security-environment-req-00.
>>=20
>> In particular, I want to comment on section SFC Data Plane Requirements.
>>  It was raised today in the session that REQ16 and REQ17 are
>> problematic given certain use cases.  The use case of load balancing
>> within a domain was brought up.  I can think of other use cases where
>> REQ17, specifically, would be a problem.
>>=20
>> If you assume that REQ14 and REQ15 are in place (and these are very
>> important IMHO), then the risks associated with REQ16 and REQ17 are
>> mitigated.  One could not inject their own metadata or modify existing
>> metadata unless they could provide proper authn.
>>=20
>> Additionally, on REQ17, while this is a good recommendation in general
>> (i.e., think about what you want to send and be frugal with space), it
>> uses a strong word, MUST without providing any real guidance as to what
>> the limit might be.
>>=20
>> Joe
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Nov  4 18:03:40 2015
Return-Path: <haibin.song@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E93C1B36B7 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 18:03:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lrz6QGMAh9Nj for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 18:03:36 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 163AD1B36D6 for <sfc@ietf.org>; Wed,  4 Nov 2015 18:03:35 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BZY09389; Thu, 05 Nov 2015 02:03:34 +0000 (GMT)
Received: from nkgeml407-hub.china.huawei.com (10.98.56.38) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 5 Nov 2015 02:03:33 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.75]) by nkgeml407-hub.china.huawei.com ([10.98.56.38]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 10:03:25 +0800
From: "Songhaibin (A)" <haibin.song@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Map-Assisted SFC Proxy using LISP
Thread-Index: AdEXbi5kBRq8c4XcS3K4te8cyDufew==
Date: Thu, 5 Nov 2015 02:03:24 +0000
Message-ID: <E33E01DFD5BEA24B9F3F18671078951F653A7C3A@nkgeml501-mbs.china.huawei.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.187.247]
Content-Type: multipart/alternative; boundary="_000_E33E01DFD5BEA24B9F3F18671078951F653A7C3Ankgeml501mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.563AB8F6.00A4, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.2.75, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: efe51565d5c8f783d2d5ed51eea12dfa
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8zpjIF9MSydYJ87tg1x7LpMZFxg>
Subject: [sfc] Map-Assisted SFC Proxy using LISP
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 02:03:39 -0000

--_000_E33E01DFD5BEA24B9F3F18671078951F653A7C3Ankgeml501mbschi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi,

Legacy service function support is obviously important in the SFC WG. I wou=
ld like to request the authors of this draft to read draft-song-sfc-legacy-=
sf-mapping<http://tools.ietf.org/id/draft-song-sfc-legacy-sf-mapping-06.txt=
>. I think there is a lot of overlapping between these two drafts.

BR,
-Haibin

--_000_E33E01DFD5BEA24B9F3F18671078951F653A7C3Ankgeml501mbschi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:\5B8B\4F53;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@\5B8B\4F53";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	text-align:justify;
	text-justify:inter-ideograph;
	font-size:10.5pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
/* Page Definitions */
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" style=3D"text-justify-t=
rim:punctuation">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Legacy service function support=
 is obviously important in the SFC WG. I would like to request the authors =
of this draft to read
</span><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Tim=
es New Roman&quot;,&quot;serif&quot;"><a href=3D"http://tools.ietf.org/id/d=
raft-song-sfc-legacy-sf-mapping-06.txt">draft-song-sfc-legacy-sf-mapping</a=
>. I think there is a lot of overlapping between these two
 drafts.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Times New Roman&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Times New Roman&quot;,&quot;serif&quot;">BR,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Times New Roman&quot;,&quot;serif&quot;">-Haibin</span><span l=
ang=3D"EN-US"><o:p></o:p></span></p>
</div>
</body>
</html>

--_000_E33E01DFD5BEA24B9F3F18671078951F653A7C3Ankgeml501mbschi_--


From nobody Wed Nov  4 22:59:37 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE95F1B3AFA for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 22:59:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iX4nXBi57ZJF for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 22:59:35 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8CF61B3AF2 for <sfc@ietf.org>; Wed,  4 Nov 2015 22:59:34 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BZY29571; Thu, 05 Nov 2015 06:59:32 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 5 Nov 2015 06:59:31 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Wed, 4 Nov 2015 22:59:22 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AdEXl754lhI5rgRLTVue7vT08dxMOg==
Date: Thu, 5 Nov 2015 06:59:22 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D572077E6@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.186.9]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D572077E6dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.563AFE55.0017, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 0d7ffcfdc27b9529ea4ea7848b8e9f8d
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/R2jzchFF3D7kJ_KEXNC0Kw5iDFI>
Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 06:59:37 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D572077E6dfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08) that n=
sh can use for the transport; just need to register an Ethertype for nsh. T=
he gre/udp transport provides all features nsh needs with additional securi=
ty capability.

Lucy

--_000_2691CE0099834E4A9C5044EEC662BB9D572077E6dfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">There is a gre/udp tunnel transport (draft-ietf-tsvw=
g-gre-in-udp-08) that nsh can use for the transport; just need to register =
an Ethertype for nsh. The gre/udp transport provides all features nsh needs=
 with additional security capability.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Lucy<o:p></o:p></p>
</div>
</body>
</html>

--_000_2691CE0099834E4A9C5044EEC662BB9D572077E6dfweml701chm_--


From nobody Wed Nov  4 23:10:46 2015
Return-Path: <kreeger@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1DF41A6F71 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:10:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TtmCEmev3ZJ2 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:10:41 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B05371B3B27 for <sfc@ietf.org>; Wed,  4 Nov 2015 23:10:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4893; q=dns/txt; s=iport; t=1446707437; x=1447917037; h=from:to:subject:date:message-id:mime-version; bh=9//FiHxao3x/diP268Qfrp8VK5r/ulebRhC16jfvj0s=; b=mdyOQaPu1BZeOKAI6tOgTbOtRHKL4i3Uor3XCguN4RUSKVGUMVx1AiX4 QVaKSdvfolLP/TsJ5axOBEaV7+DB6CPB4h/OHZy9/mfKcUtFyy7CQd5A/ 7qTq5RRX5d2Uwp2SF3KSPeGeEVkVAhU8czAgBDLV/QdhBeQBRhbZ0fTOa Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D8AQDt/zpW/49dJa1egm5NU28GvWkBDYFehhKBNjgUAQEBAQEBAYEKhDUBAgQtXgEIEQMBAig5FAkKBAESiC7CCgEBAQEBBQEBAQEBAR2LUoR7hD0FjVSIdAGNIpxAAR8BAUKEBHKEGIEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,246,1444694400";  d="scan'208,217";a="205440941"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 05 Nov 2015 07:10:36 +0000
Received: from XCH-RTP-008.cisco.com (xch-rtp-008.cisco.com [64.101.220.148]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id tA57Aais030322 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 5 Nov 2015 07:10:36 GMT
Received: from xch-rtp-007.cisco.com (64.101.220.147) by XCH-RTP-008.cisco.com (64.101.220.148) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 5 Nov 2015 02:10:35 -0500
Received: from xch-rtp-007.cisco.com ([64.101.220.147]) by XCH-RTP-007.cisco.com ([64.101.220.147]) with mapi id 15.00.1104.000; Thu, 5 Nov 2015 02:10:34 -0500
From: "Larry Kreeger (kreeger)" <kreeger@cisco.com>
To: Lucy yong <lucy.yong@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO6w==
Date: Thu, 5 Nov 2015 07:10:34 +0000
Message-ID: <D2612F72.171FE3%kreeger@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.70.232.166]
Content-Type: multipart/alternative; boundary="_000_D2612F72171FE3kreegerciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/pUyXGZkErrzMIpsiEnrJBMftv7o>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 07:10:42 -0000

--_000_D2612F72171FE3kreegerciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Lucy,

One of the motivations for carrying NSH directly on UDP is to avoid unneces=
sary overhead or complication.  Adding the GRE header in between does not s=
eem to add any additional benefit that I can see - only additional overhead=
.

Thanks, Larry

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Date: Wednesday, November 4, 2015 at 11:59 PM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08) that n=
sh can use for the transport; just need to register an Ethertype for nsh. T=
he gre/udp transport provides all features nsh needs with additional securi=
ty capability.

Lucy

--_000_D2612F72171FE3kreegerciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <819C12A05ABC7A42AE7208215520D36C@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Hi Lucy,</div>
<div><br>
</div>
<div>One of the motivations for carrying NSH directly on UDP is to avoid un=
necessary overhead or complication. &nbsp;Adding the GRE header in between =
does not seem to add any additional benefit that I can see &#8211; only add=
itional overhead.</div>
<div><br>
</div>
<div>Thanks, Larry</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Lucy yong &lt;=
<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Wednesday, November 4, 2015 a=
t 11:59 PM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>[sfc] comment on draft-kum=
ar-sfc-nsh-udp-transport<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">There is a gre/udp tunnel transport (draft-ietf-tsvw=
g-gre-in-udp-08) that nsh can use for the transport; just need to register =
an Ethertype for nsh. The gre/udp transport provides all features nsh needs=
 with additional security capability.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Lucy<o:p></o:p></p>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D2612F72171FE3kreegerciscocom_--


From nobody Wed Nov  4 23:19:23 2015
Return-Path: <davidme@marvell.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 606EC1B3B45 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:19:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.266
X-Spam-Level: 
X-Spam-Status: No, score=-2.266 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1SzbtUQRg8TH for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:19:17 -0800 (PST)
Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DEE2E1B3B49 for <sfc@ietf.org>; Wed,  4 Nov 2015 23:19:16 -0800 (PST)
Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.15.0.59/8.15.0.59) with SMTP id tA57FHSL024496; Wed, 4 Nov 2015 23:18:20 -0800
Received: from il-exch01.marvell.com ([199.203.130.101]) by mx0b-0016f401.pphosted.com with ESMTP id 1xyx878jrc-1 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 04 Nov 2015 23:18:20 -0800
Received: from IL-EXCH01.marvell.com (10.4.102.220) by IL-EXCH01.marvell.com (10.4.102.220) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Thu, 5 Nov 2015 09:18:13 +0200
Received: from IL-EXCH01.marvell.com ([fe80::41:1c9f:8611:3a4a]) by IL-EXCH01.marvell.com ([fe80::41:1c9f:8611:3a4a%20]) with mapi id 15.00.1044.021; Thu, 5 Nov 2015 09:18:13 +0200
From: David Melman <davidme@marvell.com>
To: "Larry Kreeger (kreeger)" <kreeger@cisco.com>, Lucy yong <lucy.yong@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NA6Xg
Date: Thu, 5 Nov 2015 07:18:13 +0000
Message-ID: <64b04ef6b62f4f1eb1cdae645d172620@IL-EXCH01.marvell.com>
References: <D2612F72.171FE3%kreeger@cisco.com>
In-Reply-To: <D2612F72.171FE3%kreeger@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.94.250.30]
Content-Type: multipart/alternative; boundary="_000_64b04ef6b62f4f1eb1cdae645d172620ILEXCH01marvellcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-11-05_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=inbound_notspam policy=inbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1507310000 definitions=main-1511050126
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/BfHD6hVCgHgcSASUlg_R9zp18Yk>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 07:19:22 -0000

--_000_64b04ef6b62f4f1eb1cdae645d172620ILEXCH01marvellcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

+1, agree with Larry.   NSH directly over UDP is lightweight and easily sup=
ported today.

David Melman
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeger=
)
Sent: Thursday, November 05, 2015 9:11 AM
To: Lucy yong; sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Hi Lucy,

One of the motivations for carrying NSH directly on UDP is to avoid unneces=
sary overhead or complication.  Adding the GRE header in between does not s=
eem to add any additional benefit that I can see - only additional overhead=
.

Thanks, Larry

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Date: Wednesday, November 4, 2015 at 11:59 PM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08) that n=
sh can use for the transport; just need to register an Ethertype for nsh. T=
he gre/udp transport provides all features nsh needs with additional securi=
ty capability.

Lucy

--_000_64b04ef6b62f4f1eb1cdae645d172620ILEXCH01marvellcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&#43;1, agree with Lar=
ry. &nbsp;&nbsp;NSH directly over UDP is lightweight and easily supported t=
oday.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">David Melman<o:p></o:p=
></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Larry Kreeger (kreeger)<br>
<b>Sent:</b> Thursday, November 05, 2015 9:11 AM<br>
<b>To:</b> Lucy yong; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Hi Lucy=
,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">One of =
the motivations for carrying NSH directly on UDP is to avoid unnecessary ov=
erhead or complication. &nbsp;Adding the GRE header in between does not see=
m to add any additional benefit that I can
 see &#8211; only additional overhead.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
 Larry<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of Lucy yong &lt;<a href=3D"mailto:lucy=
.yong@huawei.com">lucy.yong@huawei.com</a>&gt;<br>
<b>Date: </b>Wednesday, November 4, 2015 at 11:59 PM<br>
<b>To: </b>&quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt=
;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<b>Subject: </b>[sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p></o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">There is a gre/udp tunne=
l transport (draft-ietf-tsvwg-gre-in-udp-08) that nsh can use for the trans=
port; just need to register an Ethertype for nsh. The gre/udp transport pro=
vides all features nsh needs with additional
 security capability.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:black">Lucy<o:p></o:p></span></=
p>
</div>
</div>
</div>
</body>
</html>

--_000_64b04ef6b62f4f1eb1cdae645d172620ILEXCH01marvellcom_--


From nobody Wed Nov  4 23:33:00 2015
Return-Path: <sarikaya2012@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E72A91B3B4F for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:32:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level: 
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ztOjFLeZSWiL for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:32:58 -0800 (PST)
Received: from mail-qk0-x231.google.com (mail-qk0-x231.google.com [IPv6:2607:f8b0:400d:c09::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDA8F1B3B6F for <sfc@ietf.org>; Wed,  4 Nov 2015 23:32:54 -0800 (PST)
Received: by qkcl124 with SMTP id l124so29503828qkc.3 for <sfc@ietf.org>; Wed, 04 Nov 2015 23:32:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=g0x1zYNbeMmMERZp/REx96fmWnl4LGfK2zWanuATX3U=; b=HBWf4+pW3uDLt2YkZugNxugnCmXikR8ZVFBbtVNf8ky6HDif5GKZ0zpJcBDhj0o+8+ yHN4tj0p32Rlvsnqo619nZ9ntBJqzYO3XR4+KM0aX3Y2aTHqe8z6gHz3HfYrFeQf7Zo6 YmLUBVvNua3naPogijj5FT0RdNYShKDVmXeQWkGjEumB1fjMTOFbGvW2uNzP6zCeY4pM j0dE/KPiZuHnUAEnfHcfcWF1mne7By0hg7OO/VcbI6Y+i1Gq1cbpAczx41r+Kb4/Jeou aN8VKT/z2j8ZiD+jnGaHm9RB1aKxN/9ltdepeFKwJq9tSwEZ/XE04eMyuKCPaLGgLoyF LXNw==
MIME-Version: 1.0
X-Received: by 10.55.49.197 with SMTP id x188mr5395603qkx.45.1446708773949; Wed, 04 Nov 2015 23:32:53 -0800 (PST)
Received: by 10.55.148.68 with HTTP; Wed, 4 Nov 2015 23:32:53 -0800 (PST)
In-Reply-To: <D2612F72.171FE3%kreeger@cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com>
Date: Thu, 5 Nov 2015 01:32:53 -0600
Message-ID: <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com>
From: Behcet Sarikaya <sarikaya2012@gmail.com>
To: "Larry Kreeger (kreeger)" <kreeger@cisco.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ADUx9pSMzGJ1f184DddijyJWlpI>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Lucy yong <lucy.yong@huawei.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: sarikaya@ieee.org
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 07:32:59 -0000

On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
<kreeger@cisco.com> wrote:
> Hi Lucy,
>
> One of the motivations for carrying NSH directly on UDP is to avoid
> unnecessary overhead or complication.  Adding the GRE header in between d=
oes
> not seem to add any additional benefit that I can see =E2=80=93 only addi=
tional
> overhead.
>

The point was not with VXLAN-GPE.

Behcet
> Thanks, Larry
>
> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
> <lucy.yong@huawei.com>
> Date: Wednesday, November 4, 2015 at 11:59 PM
> To: "sfc@ietf.org" <sfc@ietf.org>
> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>
> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08) that
> nsh can use for the transport; just need to register an Ethertype for nsh=
.
> The gre/udp transport provides all features nsh needs with additional
> security capability.
>
>
>
> Lucy
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Nov  4 23:45:00 2015
Return-Path: <kreeger@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E66631B3BA4 for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:44:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wKUEP5IxwbMN for <sfc@ietfa.amsl.com>; Wed,  4 Nov 2015 23:44:57 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B3091B3BA1 for <sfc@ietf.org>; Wed,  4 Nov 2015 23:44:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1672; q=dns/txt; s=iport; t=1446709497; x=1447919097; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=U1NToBp+xM5PF7TfTCiT98pakm+Ap/WfsqlWAoij190=; b=Cxa1TmwhODQRN1akF5WZWX2rVyuPltg7VlPZEtDKOU9ExWHWz02nR/q9 cdFrt1d3lh01dXvYdNyZXHXg44HIDMw3OpqX9U3GG1k8pG5yBX0Ibxpit l9+j1QE0gaqMM3nwxz2UJBLvyihmeCkQSRANFZXAUV7kfVcowmSLuNqEu s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D9AQDgBztW/4QNJK1egztTbwa9agENgV4XCoVxAoE0OBQBAQEBAQEBfwuENQEBAQQBAQFrCxACAQgRAwECAS4hBgsdCAIEDgWIGQMSDb0eDYQ8AQEBAQEBAQEBAQEBAQEBAQEBAQEBFASLUoJTggaEXwWNVIh0AYsugXSBWpMVg2CDcQEfAQFChARyhBiBBwEBAQ
X-IronPort-AV: E=Sophos;i="5.20,246,1444694400"; d="scan'208";a="47815037"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 05 Nov 2015 07:44:56 +0000
Received: from XCH-RTP-007.cisco.com (xch-rtp-007.cisco.com [64.101.220.147]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tA57iu4H013375 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 5 Nov 2015 07:44:56 GMT
Received: from xch-rtp-007.cisco.com (64.101.220.147) by XCH-RTP-007.cisco.com (64.101.220.147) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 5 Nov 2015 02:44:55 -0500
Received: from xch-rtp-007.cisco.com ([64.101.220.147]) by XCH-RTP-007.cisco.com ([64.101.220.147]) with mapi id 15.00.1104.000; Thu, 5 Nov 2015 02:44:55 -0500
From: "Larry Kreeger (kreeger)" <kreeger@cisco.com>
To: "sarikaya@ieee.org" <sarikaya@ieee.org>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NXPyAgACJkgA=
Date: Thu, 5 Nov 2015 07:44:55 +0000
Message-ID: <D26136E4.172046%kreeger@cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com>
In-Reply-To: <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.70.232.166]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <E0A2D7F6D1BACA41A3A430A90EE2B305@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/3ujqh2al9AVO4chdBWKcVc90FsY>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 07:44:59 -0000

Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE
also adds additional overhead which may not always be needed.  Carrying
NSH directly over UDP avoids that as well.  Lucy brought up a new option
that I had never heard suggested before, which was to carry NSH in GRE
over UDP.  This adds a GRE header in between the UDP header and NSH, but
in my opinion doesn=B9t bring any benefits - just more overhead and
complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>> unnecessary overhead or complication.  Adding the GRE header in between
>>does
>> not seem to add any additional benefit that I can see =AD only additiona=
l
>> overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
>> <lucy.yong@huawei.com>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org" <sfc@ietf.org>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that
>> nsh can use for the transport; just need to register an Ethertype for
>>nsh.
>> The gre/udp transport provides all features nsh needs with additional
>> security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>


From nobody Thu Nov  5 01:15:57 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0979E1A8F38 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 01:15:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 35m-Atj593nT for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 01:15:53 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E19F11A8A57 for <sfc@ietf.org>; Thu,  5 Nov 2015 01:15:52 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CDR77009; Thu, 05 Nov 2015 09:15:49 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 5 Nov 2015 09:15:48 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 01:15:45 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: "Larry Kreeger (kreeger)" <kreeger@cisco.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nj0aAgAADXYD//5JgsA==
Date: Thu, 5 Nov 2015 09:15:44 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com>
In-Reply-To: <D26136E4.172046%kreeger@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.185.91]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.563B1E45.0144, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 12c4e40d24481eaab7e09d45ac4d8eb4
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/B1VSvLSKu1EoLwBk_wYCr7Mdzww>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 09:15:56 -0000

Hi Larry,

The benefit is to avoid working a UDP transport for NSH.=20

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeger=
)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org
Cc: sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
><kreeger@cisco.com> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid =20
>>unnecessary overhead or complication.  Adding the GRE header in=20
>>between does  not seem to add any additional benefit that I can see =AD=20
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
>> <lucy.yong@huawei.com>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org" <sfc@ietf.org>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)=20
>>that  nsh can use for the transport; just need to register an=20
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional =20
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 01:18:44 2015
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB94E1A1A69 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 01:18:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.999
X-Spam-Level: 
X-Spam-Status: No, score=-101.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bcBwMky14PQH for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 01:18:41 -0800 (PST)
Received: from mail-oi0-x230.google.com (mail-oi0-x230.google.com [IPv6:2607:f8b0:4003:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0C5D1A01F4 for <sfc@ietf.org>; Thu,  5 Nov 2015 01:18:41 -0800 (PST)
Received: by oifu63 with SMTP id u63so43814226oif.2 for <sfc@ietf.org>; Thu, 05 Nov 2015 01:18:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=5JPHlSus6yu1nyM2n6UPR0lorP/YUH7sZ+Y4YEDki9k=; b=HZTIwUP5Zd8MHHjUn7QbpXiiSOfvb7hAACMjczXNFzM0IV5jjcre8x+TiBltlvlXn7 jtoJ45LSzAg6h5bjRbM3Pygj1j3Hz6izI5WvMyr2UDbUpeH3+NsexogPL5LFL9aXk0ei sOuqtgzvAd7u/BGHrVW1o9YjzBe/Cq73859ocdQuZIlIeTatA3pL/t8eoNBl/NOvy4ms p06iCJ9Qnm5vy8ABdzTPKSUqDj+2ctRc51iOkVcsKRKfAzZU8YGKe5wuFoSzNjLDH3so yd3dBH/TXU6u9q2adUXghDCi2bccjl7H5NG9KbTfbHLlft3Sdsn9rAKKDQyiVo7FYKc6 V4ww==
MIME-Version: 1.0
X-Received: by 10.202.198.213 with SMTP id w204mr3659056oif.72.1446715121068;  Thu, 05 Nov 2015 01:18:41 -0800 (PST)
Received: by 10.60.6.132 with HTTP; Thu, 5 Nov 2015 01:18:40 -0800 (PST)
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>
Date: Thu, 5 Nov 2015 04:18:40 -0500
Message-ID: <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Lucy yong <lucy.yong@huawei.com>
Content-Type: multipart/alternative; boundary=001a113523b8e21a640523c79c33
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/kUTTOwNzr5ORk-CYZYcFPu07sz4>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 09:18:43 -0000

--001a113523b8e21a640523c79c33
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<no-hats>
I think that getting a UDP port is a lot more straightforward than an
Ethertype.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> wrote:

> Hi Larry,
>
> The benefit is to avoid working a UDP transport for NSH.
>
> Thanks,
> Lucy
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger
> (kreeger)
> Sent: Thursday, November 05, 2015 1:45 AM
> To: sarikaya@ieee.org
> Cc: sfc@ietf.org
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>
> Hi Behcet,
>
> I=C2=B9m not sure I=C2=B9m following what your point is.  It is true that=
 VXLAN-GPE
> also adds additional overhead which may not always be needed.  Carrying N=
SH
> directly over UDP avoids that as well.  Lucy brought up a new option that=
 I
> had never heard suggested before, which was to carry NSH in GRE over UDP.
> This adds a GRE header in between the UDP header and NSH, but in my opini=
on
> doesn=C2=B9t bring any benefits - just more overhead and complication.
>
> Thanks, Larry
>
> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>
> >On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
> ><kreeger@cisco.com> wrote:
> >> Hi Lucy,
> >>
> >> One of the motivations for carrying NSH directly on UDP is to avoid
> >>unnecessary overhead or complication.  Adding the GRE header in
> >>between does  not seem to add any additional benefit that I can see =C2=
=AD
> >>only additional  overhead.
> >>
> >
> >The point was not with VXLAN-GPE.
> >
> >Behcet
> >> Thanks, Larry
> >>
> >> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
> >> <lucy.yong@huawei.com>
> >> Date: Wednesday, November 4, 2015 at 11:59 PM
> >> To: "sfc@ietf.org" <sfc@ietf.org>
> >> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >>
> >> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
> >>that  nsh can use for the transport; just need to register an
> >>Ethertype for nsh.
> >> The gre/udp transport provides all features nsh needs with additional
> >>security capability.
> >>
> >>
> >>
> >> Lucy
> >>
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--001a113523b8e21a640523c79c33
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">&lt;no-hats&gt;<div>I think that getting a UDP port is a l=
ot more straightforward than an Ethertype.</div><div>Not having extra bytes=
 is also an advantage.</div><div><br></div><div>Regards,</div><div>Alia=C2=
=A0</div><div>&lt;/no-hats&gt;</div></div><div class=3D"gmail_extra"><br><d=
iv class=3D"gmail_quote">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <span di=
r=3D"ltr">&lt;<a href=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">luc=
y.yong@huawei.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">H=
i Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<span class=3D"im HOEnZb"><br>
-----Original Message-----<br>
From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@ietf.=
org</a>] On Behalf Of Larry Kreeger (kreeger)<br>
</span><span class=3D"im HOEnZb">Sent: Thursday, November 05, 2015 1:45 AM<=
br>
To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a><br>
Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
<br>
</span><div class=3D"HOEnZb"><div class=3D"h5">Hi Behcet,<br>
<br>
I=C2=B9m not sure I=C2=B9m following what your point is.=C2=A0 It is true t=
hat VXLAN-GPE also adds additional overhead which may not always be needed.=
=C2=A0 Carrying NSH directly over UDP avoids that as well.=C2=A0 Lucy broug=
ht up a new option that I had never heard suggested before, which was to ca=
rry NSH in GRE over UDP.=C2=A0 This adds a GRE header in between the UDP he=
ader and NSH, but in my opinion doesn=C2=B9t bring any benefits - just more=
 overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.=C2=A0 Adding the GRE header i=
n<br>
&gt;&gt;between does=C2=A0 not seem to add any additional benefit that I ca=
n see =C2=AD<br>
&gt;&gt;only additional=C2=A0 overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that=C2=A0 nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noref=
errer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</div></div></blockquote></div><br></div>

--001a113523b8e21a640523c79c33--


From nobody Thu Nov  5 01:43:21 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CF3F1A9069 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 01:43:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6PXZQZQaKe5R for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 01:43:17 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCAF31A9079 for <sfc@ietf.org>; Thu,  5 Nov 2015 01:43:13 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CDR81435; Thu, 05 Nov 2015 09:43:09 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 5 Nov 2015 09:42:56 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 01:42:47 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nj0aAgAADXYD//5JgsIAAh9IA//99fpA=
Date: Thu, 5 Nov 2015 09:42:46 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D57207973@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
In-Reply-To: <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.185.91]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D57207973dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090205.563B24AE.0055, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 12c4e40d24481eaab7e09d45ac4d8eb4
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/kxvHXuUgDC3D0hx1p-h2NTvGo1M>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 09:43:20 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D57207973dfweml701chm_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

VGhpcyBpcyBzdWdnZXN0aW5nIHRoYXQgYW55IHR1bm5lbGVkIHByb3RvY29sIHNob3VsZCBoYXZl
IGl0cyBvd24gVURQIHRyYW5zcG9ydCwgd2hpY2ggZG9lcyBub3QgYWxpZ24gd2l0aCBVRFAgcG9y
dCB1c2FnZSAoUkZDNzYwNSkuIEdSRS9VRFAgZG9lcyBub3QgYWRkIGNvbXBsZXhpdHkgdG8gdHVu
bmVsIGVuZHBvaW50cyBhbmQgcHJvdmlkZXMgcG90ZW50aWFsIGV4dGVuc2liaWxpdHkgZm9yIHRy
YW5zcG9ydCBpZiBuZWNlc3NhcnkuIFdlIGRvbuKAmXQgd2FudCB0byBlbmhhbmNlIE5TSCBmb3Ig
YW55IHRyYW5zcG9ydCByZWxhdGVkIGVuaGFuY2VtZW50IGluIGZ1dHVyZS4NCg0KTHVjeQ0KDQpG
cm9tOiBBbGlhIEF0bGFzIFttYWlsdG86YWthdGxhc0BnbWFpbC5jb21dDQpTZW50OiBUaHVyc2Rh
eSwgTm92ZW1iZXIgMDUsIDIwMTUgMzoxOSBBTQ0KVG86IEx1Y3kgeW9uZw0KQ2M6IExhcnJ5IEty
ZWVnZXIgKGtyZWVnZXIpOyBzYXJpa2F5YUBpZWVlLm9yZzsgc2ZjQGlldGYub3JnDQpTdWJqZWN0
OiBSZTogW3NmY10gY29tbWVudCBvbiBkcmFmdC1rdW1hci1zZmMtbnNoLXVkcC10cmFuc3BvcnQN
Cg0KPG5vLWhhdHM+DQpJIHRoaW5rIHRoYXQgZ2V0dGluZyBhIFVEUCBwb3J0IGlzIGEgbG90IG1v
cmUgc3RyYWlnaHRmb3J3YXJkIHRoYW4gYW4gRXRoZXJ0eXBlLg0KTm90IGhhdmluZyBleHRyYSBi
eXRlcyBpcyBhbHNvIGFuIGFkdmFudGFnZS4NCg0KUmVnYXJkcywNCkFsaWENCjwvbm8taGF0cz4N
Cg0KT24gVGh1LCBOb3YgNSwgMjAxNSBhdCA0OjE1IEFNLCBMdWN5IHlvbmcgPGx1Y3kueW9uZ0Bo
dWF3ZWkuY29tPG1haWx0bzpsdWN5LnlvbmdAaHVhd2VpLmNvbT4+IHdyb3RlOg0KSGkgTGFycnks
DQoNClRoZSBiZW5lZml0IGlzIHRvIGF2b2lkIHdvcmtpbmcgYSBVRFAgdHJhbnNwb3J0IGZvciBO
U0guDQoNClRoYW5rcywNCkx1Y3kNCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206
IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnPG1haWx0bzpzZmMtYm91bmNlc0BpZXRm
Lm9yZz5dIE9uIEJlaGFsZiBPZiBMYXJyeSBLcmVlZ2VyIChrcmVlZ2VyKQ0KU2VudDogVGh1cnNk
YXksIE5vdmVtYmVyIDA1LCAyMDE1IDE6NDUgQU0NClRvOiBzYXJpa2F5YUBpZWVlLm9yZzxtYWls
dG86c2FyaWtheWFAaWVlZS5vcmc+DQpDYzogc2ZjQGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5v
cmc+DQpTdWJqZWN0OiBSZTogW3NmY10gY29tbWVudCBvbiBkcmFmdC1rdW1hci1zZmMtbnNoLXVk
cC10cmFuc3BvcnQNCkhpIEJlaGNldCwNCg0KScK5bSBub3Qgc3VyZSBJwrltIGZvbGxvd2luZyB3
aGF0IHlvdXIgcG9pbnQgaXMuICBJdCBpcyB0cnVlIHRoYXQgVlhMQU4tR1BFIGFsc28gYWRkcyBh
ZGRpdGlvbmFsIG92ZXJoZWFkIHdoaWNoIG1heSBub3QgYWx3YXlzIGJlIG5lZWRlZC4gIENhcnJ5
aW5nIE5TSCBkaXJlY3RseSBvdmVyIFVEUCBhdm9pZHMgdGhhdCBhcyB3ZWxsLiAgTHVjeSBicm91
Z2h0IHVwIGEgbmV3IG9wdGlvbiB0aGF0IEkgaGFkIG5ldmVyIGhlYXJkIHN1Z2dlc3RlZCBiZWZv
cmUsIHdoaWNoIHdhcyB0byBjYXJyeSBOU0ggaW4gR1JFIG92ZXIgVURQLiAgVGhpcyBhZGRzIGEg
R1JFIGhlYWRlciBpbiBiZXR3ZWVuIHRoZSBVRFAgaGVhZGVyIGFuZCBOU0gsIGJ1dCBpbiBteSBv
cGluaW9uIGRvZXNuwrl0IGJyaW5nIGFueSBiZW5lZml0cyAtIGp1c3QgbW9yZSBvdmVyaGVhZCBh
bmQgY29tcGxpY2F0aW9uLg0KDQpUaGFua3MsIExhcnJ5DQoNCk9uIDExLzUvMTUsIDQ6MzIgUE0s
ICJCZWhjZXQgU2FyaWtheWEiIDxzYXJpa2F5YTIwMTJAZ21haWwuY29tPG1haWx0bzpzYXJpa2F5
YTIwMTJAZ21haWwuY29tPj4gd3JvdGU6DQoNCj5PbiBUaHUsIE5vdiA1LCAyMDE1IGF0IDE6MTAg
QU0sIExhcnJ5IEtyZWVnZXIgKGtyZWVnZXIpDQo+PGtyZWVnZXJAY2lzY28uY29tPG1haWx0bzpr
cmVlZ2VyQGNpc2NvLmNvbT4+IHdyb3RlOg0KPj4gSGkgTHVjeSwNCj4+DQo+PiBPbmUgb2YgdGhl
IG1vdGl2YXRpb25zIGZvciBjYXJyeWluZyBOU0ggZGlyZWN0bHkgb24gVURQIGlzIHRvIGF2b2lk
DQo+PnVubmVjZXNzYXJ5IG92ZXJoZWFkIG9yIGNvbXBsaWNhdGlvbi4gIEFkZGluZyB0aGUgR1JF
IGhlYWRlciBpbg0KPj5iZXR3ZWVuIGRvZXMgIG5vdCBzZWVtIHRvIGFkZCBhbnkgYWRkaXRpb25h
bCBiZW5lZml0IHRoYXQgSSBjYW4gc2VlIMKtDQo+Pm9ubHkgYWRkaXRpb25hbCAgb3ZlcmhlYWQu
DQo+Pg0KPg0KPlRoZSBwb2ludCB3YXMgbm90IHdpdGggVlhMQU4tR1BFLg0KPg0KPkJlaGNldA0K
Pj4gVGhhbmtzLCBMYXJyeQ0KPj4NCj4+IEZyb206IHNmYyA8c2ZjLWJvdW5jZXNAaWV0Zi5vcmc8
bWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnPj4gb24gYmVoYWxmIG9mIEx1Y3kgeW9uZw0KPj4g
PGx1Y3kueW9uZ0BodWF3ZWkuY29tPG1haWx0bzpsdWN5LnlvbmdAaHVhd2VpLmNvbT4+DQo+PiBE
YXRlOiBXZWRuZXNkYXksIE5vdmVtYmVyIDQsIDIwMTUgYXQgMTE6NTkgUE0NCj4+IFRvOiAic2Zj
QGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5vcmc+IiA8c2ZjQGlldGYub3JnPG1haWx0bzpzZmNA
aWV0Zi5vcmc+Pg0KPj4gU3ViamVjdDogW3NmY10gY29tbWVudCBvbiBkcmFmdC1rdW1hci1zZmMt
bnNoLXVkcC10cmFuc3BvcnQNCj4+DQo+PiBUaGVyZSBpcyBhIGdyZS91ZHAgdHVubmVsIHRyYW5z
cG9ydCAoZHJhZnQtaWV0Zi10c3Z3Zy1ncmUtaW4tdWRwLTA4KQ0KPj50aGF0ICBuc2ggY2FuIHVz
ZSBmb3IgdGhlIHRyYW5zcG9ydDsganVzdCBuZWVkIHRvIHJlZ2lzdGVyIGFuDQo+PkV0aGVydHlw
ZSBmb3IgbnNoLg0KPj4gVGhlIGdyZS91ZHAgdHJhbnNwb3J0IHByb3ZpZGVzIGFsbCBmZWF0dXJl
cyBuc2ggbmVlZHMgd2l0aCBhZGRpdGlvbmFsDQo+PnNlY3VyaXR5IGNhcGFiaWxpdHkuDQo+Pg0K
Pj4NCj4+DQo+PiBMdWN5DQo+Pg0KPj4NCj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fDQo+PiBzZmMgbWFpbGluZyBsaXN0DQo+PiBzZmNAaWV0Zi5vcmc8
bWFpbHRvOnNmY0BpZXRmLm9yZz4NCj4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlz
dGluZm8vc2ZjDQo+Pg0KDQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fXw0Kc2ZjIG1haWxpbmcgbGlzdA0Kc2ZjQGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5v
cmc+DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KDQpfX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0Kc2ZjIG1haWxpbmcgbGlz
dA0Kc2ZjQGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQpodHRwczovL3d3dy5pZXRmLm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KDQo=

--_000_2691CE0099834E4A9C5044EEC662BB9D57207973dfweml701chm_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_2691CE0099834E4A9C5044EEC662BB9D57207973dfweml701chm_--


From nobody Thu Nov  5 02:11:52 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B93F1AC3D5 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 02:11:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FDg_hHT1IUU5 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 02:11:48 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0804C1AC3CD for <sfc@ietf.org>; Thu,  5 Nov 2015 02:11:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9795; q=dns/txt; s=iport; t=1446718308; x=1447927908; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=AjKYTe3mlnArG51w77xqQSXqF1qzvbGCpbeYEyIsc68=; b=i4FtzIHkbRY7TtAwCph0jCMMnIZteFcD/3zPtRvIDJmQjW+ETmXg0L88 FqquLOCCwYY/Dp8+jFxL5kCjX66IWGCO3vJ97OtuVEV6tDXrgVXcxBIE+ rbe2WpMfYDNTZFAqc8v46QmYNHANjyaxnoa3Cw5/Y/MFKvHh9s0td3H2E 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AOAgBTKjtW/4QNJK1egm5NU2+9cwENg?= =?us-ascii?q?V4XAQmFcQKBNTgUAQEBAQEBAYEKhDUBAQEEAQEBawsMBAIBCA4DAwEBAQEJHgc?= =?us-ascii?q?PEgYLFAkIAgQBDQWIGQMSDb0wDYQ8AQEBAQEBAQEBAQEBAQEBAQEBAQEBFASLU?= =?us-ascii?q?oJTgigNhDEFkmeDYQGLLoF0gVqHZIsyg2CDcQEfAQFCgg4DHYFWcoUfAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,247,1444694400";  d="scan'208,217";a="204734577"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 05 Nov 2015 10:11:47 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tA5ABlQk001351 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 5 Nov 2015 10:11:47 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 5 Nov 2015 04:11:46 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Thu, 5 Nov 2015 04:11:46 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Alia Atlas <akatlas@gmail.com>, Lucy yong <lucy.yong@huawei.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpU=
Date: Thu, 5 Nov 2015 10:11:46 +0000
Message-ID: <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
In-Reply-To: <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: multipart/alternative; boundary="_000_4lx4t6nneg0sxa2xob0057ph1446718008074emailandroidcom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/F4ih2jm22xzCn6m3TvPzr6q283c>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 10:11:50 -0000

--_000_4lx4t6nneg0sxa2xob0057ph1446718008074emailandroidcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com>
Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, sfc@i=
etf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Hi Behcet,

I^1m not sure I^1m following what your point is.  It is true that VXLAN-GPE=
 also adds additional overhead which may not always be needed.  Carrying NS=
H directly over UDP avoids that as well.  Lucy brought up a new option that=
 I had never heard suggested before, which was to carry NSH in GRE over UDP=
.  This adds a GRE header in between the UDP header and NSH, but in my opin=
ion doesn^1t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see=20
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_4lx4t6nneg0sxa2xob0057ph1446718008074emailandroidcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta content=3D"text/html; charset=3Dutf-8">
</head>
<body>
<div>I did go through the process of getting the ethertype for NSH and I al=
so have obtained a UDP port# in the past. I have to agree with Alia.</div>
<div><br>
</div>
<div>Lucy,</div>
<div>I appreciate you guys taking a crack at NSH over GRE over UDP nested e=
ncapsulation. It simply calls for unnecessary overhead and complexity in fo=
rmulating and processing such a packet along the tunnel path.</div>
<div><br>
</div>
<div>I admit i have not read your draft yet, will certainly do.</div>
<div><br>
</div>
<div>Regard,</div>
<div>Surendra.</div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
<div id=3D"composer_signature">
<div style=3D"font-size:9px">Sent from a thumb typed device.</div>
</div>
<br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;akatlas@gmail.com&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;lucy.yong@huawei.com&gt; <br>
Cc: sarikaya@ieee.org, &quot;Larry Kreeger (kreeger)&quot; &lt;kreeger@cisc=
o.com&gt;, sfc@ietf.org
<br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <br>
<br>
<div>
<div dir=3D"ltr">&lt;no-hats&gt;
<div>I think that getting a UDP port is a lot more straightforward than an =
Ethertype.</div>
<div>Not having extra bytes is also an advantage.</div>
<div><br>
</div>
<div>Regards,</div>
<div>Alia&nbsp;</div>
<div>&lt;/no-hats&gt;</div>
</div>
<div class=3D"gmail_extra"><br>
<div class=3D"gmail_quote">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <span =
dir=3D"ltr">
&lt;<a href=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@hua=
wei.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex; border-left:1=
px #ccc solid; padding-left:1ex">
Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<span class=3D"im HOEnZb"><br>
-----Original Message-----<br>
From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@ietf.=
org</a>] On Behalf Of Larry Kreeger (kreeger)<br>
</span><span class=3D"im HOEnZb">Sent: Thursday, November 05, 2015 1:45 AM<=
br>
To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a><br>
Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
<br>
</span>
<div class=3D"HOEnZb">
<div class=3D"h5">Hi Behcet,<br>
<br>
I&sup1;m not sure I&sup1;m following what your point is.&nbsp; It is true t=
hat VXLAN-GPE also adds additional overhead which may not always be needed.=
&nbsp; Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy broug=
ht up a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn&sup1;t bring any bene=
fits - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see &shy;<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noref=
errer" target=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</body>
</html>

--_000_4lx4t6nneg0sxa2xob0057ph1446718008074emailandroidcom_--


From nobody Thu Nov  5 05:07:50 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 648581B2AE3 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 05:07:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dktIB3fjvHZl for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 05:07:44 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08DE51B2ADF for <sfc@ietf.org>; Thu,  5 Nov 2015 05:07:43 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CDS09714; Thu, 05 Nov 2015 13:07:38 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 5 Nov 2015 13:07:37 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 05:07:31 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nj0aAgAADXYD//5JgsIAAh9IAgAAO1gD//6qAIA==
Date: Thu, 5 Nov 2015 13:07:30 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com>
In-Reply-To: <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.185.197]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D572079FDdfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.563B549D.002E, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 12c4e40d24481eaab7e09d45ac4d8eb4
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/eEGzo_syXe2d8Lxn_gOsSSHulnE>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 13:07:48 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D572079FDdfweml701chm_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_2691CE0099834E4A9C5044EEC662BB9D572079FDdfweml701chm_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.im
	{mso-style-name:im;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If SFC is deployed in Eth=
ernet network, do we need NSH over Ethernet?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lucy<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Surendra=
 Kumar (smkumar) [mailto:smkumar@cisco.com]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regard,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org=
">sfc-bounces@ietf.org</a>] On Behalf Of Larry Kreeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.o=
rg</a></span><br>
<span class=3D"im">Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></sp=
an><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_2691CE0099834E4A9C5044EEC662BB9D572079FDdfweml701chm_--


From nobody Thu Nov  5 05:17:53 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C73CF1B2B59 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 05:17:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 97Ze3FIrFT62 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 05:17:49 -0800 (PST)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 223931B2B5D for <sfc@ietf.org>; Thu,  5 Nov 2015 05:17:49 -0800 (PST)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-3.sandvine.com (192.168.196.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 5 Nov 2015 08:17:48 -0500
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Thu, 5 Nov 2015 08:17:50 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: Lucy yong <lucy.yong@huawei.com>, "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NXPyAgACJkgD//5MqAIAAANIAgAAO1gCAADEZAP//rsNg
Date: Thu, 5 Nov 2015 13:17:49 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830D88192@wtl-exchp-2.sandvine.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [183.77.156.199]
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830D88192wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/aU9P13cilySRlHpek12s-URb6vs>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 13:17:51 -0000

--_000_E8355113905631478EFF04F5AA706E9830D88192wtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I find it to be a useful concept when SFF and SF nodes have layer2 connecti=
ons.


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
Sent: Thursday, November 05, 2015 10:08 PM
To: Surendra Kumar (smkumar); Alia Atlas
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_E8355113905631478EFF04F5AA706E9830D88192wtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.im
	{mso-style-name:im;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I find it to be a useful =
concept when SFF and SF nodes have layer2 connections.<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Lucy yong<br>
<b>Sent:</b> Thursday, November 05, 2015 10:08 PM<br>
<b>To:</b> Surendra Kumar (smkumar); Alia Atlas<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If SFC is deployed in Eth=
ernet network, do we need NSH over Ethernet?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lucy<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Surendra=
 Kumar (smkumar) [<a href=3D"mailto:smkumar@cisco.com">mailto:smkumar@cisco=
.com</a>]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>; Larr=
y Kreeger (kreeger);
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regard,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org=
">sfc-bounces@ietf.org</a>] On Behalf Of Larry Kreeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.o=
rg</a></span><br>
<span class=3D"im">Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></sp=
an><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830D88192wtlexchp2sandvi_--


From nobody Thu Nov  5 05:22:04 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82AE81B2B7B for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 05:22:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zjYfDMTUorjV for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 05:22:02 -0800 (PST)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id EF9EB1B2B7A for <sfc@ietf.org>; Thu,  5 Nov 2015 05:22:01 -0800 (PST)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 5 Nov 2015 08:22:01 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "Larry Kreeger (kreeger)" <kreeger@cisco.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NXPyAgACJkgD//4MgkA==
Date: Thu, 5 Nov 2015 13:22:03 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830D881D4@wtl-exchp-2.sandvine.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com>
In-Reply-To: <D26136E4.172046%kreeger@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [183.77.156.199]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Egdy0iiLfcL0WKI1dLXUqKzhUKU>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 13:22:03 -0000

I have the same comment with the VxLAN-GPE encapsulation; it seems unnecess=
ary if UDP encap is available.

Even so, if we accept VxLAN-GPE as a good idea it seems irrational to say U=
DP/GRE is a bad idea.


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeger=
)
Sent: Thursday, November 05, 2015 4:45 PM
To: sarikaya@ieee.org
Cc: sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
><kreeger@cisco.com> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid =20
>>unnecessary overhead or complication.  Adding the GRE header in=20
>>between does  not seem to add any additional benefit that I can see =AD=20
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
>> <lucy.yong@huawei.com>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org" <sfc@ietf.org>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)=20
>>that  nsh can use for the transport; just need to register an=20
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional =20
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 06:10:34 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 765D71A6F65 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 06:10:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YEYWAmQ1vee6 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 06:10:26 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 519651B2A55 for <sfc@ietf.org>; Thu,  5 Nov 2015 06:10:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16568; q=dns/txt; s=iport; t=1446732626; x=1447942226; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=6GNKAzSkCy5Muxm/WTIptPOSDE+8ofHfSXZuXERVDAk=; b=jM8K14mFGRVVF5CD2zluDsb1dwSAuuSjlYTUVsHDGFM2FLRzj7i/Vijx KamMXwpqmvC9VXRU1buIadaqQHiwIs7ZjqMMq9meTV0CJS8RDuO883Leg 3WH0hu2Yt7d3A2pt9b+sltgEqUEdsuyQfBMMKfAf3IQlNXjkbtcH59cUI g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AOAgAlYjtW/4QNJK1egm5NU2++CQENgV4XAQmFcQKBLjgUAQEBAQEBAYEKhDUBAQEEAQEBawsMBAIBCA4DAwEBAQEJHgcPEgYLFAkIAgQBDQWIGQMSDb05DYQ8AQEBAQEBAQEBAQEBAQEBAQEBAQEBFASLUoJTgigNCYQoBY1UhRODYQGLLoF0gVqHZIsyg2CDcQEfAQFCgg4DHYFWcoUfAQEB
X-IronPort-AV: E=Sophos; i="5.20,247,1444694400"; d="scan'208,217"; a="47066571"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-2.cisco.com with ESMTP; 05 Nov 2015 14:10:25 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tA5EAP65027047 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 5 Nov 2015 14:10:25 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 5 Nov 2015 08:10:24 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Thu, 5 Nov 2015 08:10:24 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>, Lucy yong <lucy.yong@huawei.com>, "Alia Atlas" <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAAuKA//+qHBA=
Date: Thu, 5 Nov 2015 14:10:24 +0000
Message-ID: <0by1y3xsqdhwe9stsmw39mf5.1446732352825@email.android.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>, <E8355113905631478EFF04F5AA706E9830D88192@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830D88192@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: multipart/alternative; boundary="_000_0by1y3xsqdhwe9stsmw39mf51446732352825emailandroidcom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/kKAHP4_jpV2-HAP5zxw1mtquvdo>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 14:10:32 -0000

--_000_0by1y3xsqdhwe9stsmw39mf51446732352825emailandroidcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Layer2 tunnels are just fine, they provide topological freedom.

Surendra


Sent from a thumb typed device.


-------- Original message --------
From: Dave Dolson <ddolson@sandvine.com>
Date: 2015/11/05 10:17 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com>, "Surendra Kumar (smkumar)" <smkumar@c=
isco.com>, Alia Atlas <akatlas@gmail.com>
Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, sfc@i=
etf.org
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I find it to be a useful concept when SFF and SF nodes have layer2 connecti=
ons.


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
Sent: Thursday, November 05, 2015 10:08 PM
To: Surendra Kumar (smkumar); Alia Atlas
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_0by1y3xsqdhwe9stsmw39mf51446732352825emailandroidcom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta content=3D"text/html; charset=3Diso-8859-1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style>
<!--
@font-face
	{font-family:Calibri}
@font-face
	{font-family:Tahoma}
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif"}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif"}
span.BalloonTextChar
	{font-family:"Tahoma","sans-serif"}
span.im
	{}
span.EmailStyle20
	{font-family:"Calibri","sans-serif";
	color:#1F497D}
span.EmailStyle21
	{font-family:"Calibri","sans-serif";
	color:#1F497D}
.MsoChpDefault
	{font-size:10.0pt}
@page WordSection1
	{margin:1.0in 1.0in 1.0in 1.0in}
div.WordSection1
	{}
-->
</style>
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>Layer2 tunnels are just fine, they provide topological freedom.</div>
<div><br>
</div>
<div>Surendra</div>
<div><br>
</div>
<div><br>
</div>
<div id=3D"composer_signature">
<div style=3D"font-size:9px">Sent from a thumb typed device.</div>
</div>
<br>
<br>
-------- Original message --------<br>
From: Dave Dolson &lt;ddolson@sandvine.com&gt; <br>
Date: 2015/11/05 10:17 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;lucy.yong@huawei.com&gt;, &quot;Surendra Kumar (smkumar)&=
quot; &lt;smkumar@cisco.com&gt;, Alia Atlas &lt;akatlas@gmail.com&gt;
<br>
Cc: sarikaya@ieee.org, &quot;Larry Kreeger (kreeger)&quot; &lt;kreeger@cisc=
o.com&gt;, sfc@ietf.org
<br>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <br>
<br>
<div>
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">I find it to be a usefu=
l concept when SFF and SF nodes have layer2 connections.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt; font-family:&quo=
t;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:10.0pt; font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [m=
ailto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Lucy yong<br>
<b>Sent:</b> Thursday, November 05, 2015 10:08 PM<br>
<b>To:</b> Surendra Kumar (smkumar); Alia Atlas<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">If SFC is deployed in E=
thernet network, do we need NSH over Ethernet?</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">Lucy</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt; font-family:&quo=
t;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:10.0pt; font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Surend=
ra Kumar (smkumar) [<a href=3D"mailto:smkumar@cisco.com">mailto:smkumar@cis=
co.com</a>]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>; Larr=
y Kreeger (kreeger);
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,</p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">Regard,</p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.</span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport </p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; </p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.</p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">Regards,</p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;</p>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:</p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org=
">sfc-bounces@ietf.org</a>] On Behalf Of Larry Kreeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.o=
rg</a></span><br>
<span class=3D"im">Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></sp=
an><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_0by1y3xsqdhwe9stsmw39mf51446732352825emailandroidcom_--


From nobody Thu Nov  5 07:09:31 2015
Return-Path: <smajee@yahoo.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EF751B2EDB for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 07:09:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.709
X-Spam-Level: 
X-Spam-Status: No, score=-2.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jmjTltCuu2zv for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 07:09:25 -0800 (PST)
Received: from nm28-vm5.bullet.mail.ne1.yahoo.com (nm28-vm5.bullet.mail.ne1.yahoo.com [98.138.91.250]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A27931B2EA9 for <sfc@ietf.org>; Thu,  5 Nov 2015 07:09:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1446736147; bh=fd2xZAD2uaOl6Ei2B+8hfe1bcg2hMwcF/MAadpoLui0=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject; b=V66CHRlsCkrV2lK6zYWrlGr3TOIfWRzRnbbea7I/ZtV7OTsH1J6BJVnsnO+wz1x7KrPSb1uJInHlxTz3OGcgMTQujgs/b+SRtZ7MqAZJVwXktikR/WrStQLDewKuSRBCXqVTbcZRvyPJPAhBfCpqYpE4pbfIvcrhuJizk9JYRLX2M1yimCl12JtKAjcTLr2NPZTmaYG7CcDfBDKZTNmeW4sTgVneF3RRIMqBkSx69HHrSgTawZfrOuVM5schLRVbkJucDsJolDrn2u7UeeCb459nnhmps3NdiKTNhrp27SDVB8LPb+icutTFh0yJx1his9yec7ntzyV8I0vFYI6z9A==
Received: from [98.138.226.180] by nm28.bullet.mail.ne1.yahoo.com with NNFMP;  05 Nov 2015 15:09:07 -0000
Received: from [98.138.84.47] by tm15.bullet.mail.ne1.yahoo.com with NNFMP; 05 Nov 2015 15:09:07 -0000
Received: from [127.0.0.1] by smtp115.mail.ne1.yahoo.com with NNFMP; 05 Nov 2015 15:09:07 -0000
X-Yahoo-Newman-Id: 233130.53132.bm@smtp115.mail.ne1.yahoo.com
X-Yahoo-Newman-Property: ymail-3
X-YMail-OSG: YjNn9kEVM1niXu5DNSG9KYHKY7m.WTuU6zLuQtB63pZ9L.3 KVUWVeBpQFqldWjKtR6zppcwxb0gy3MJbB86oa8HX7U.wWtZejKJ2iYOKVxP zWfS3En0XqeAcwiuPWoTePGE._i7nxAiZ6z7HSSxKabxZm1ZWKwpP_GMKHbQ o.JFL6JWcFlfju9adjsa1w6ZO.GMXSfM.ZdUCfWJS6CZYBfpcyguzEyDWVtY 6kQjYwYxeA.GDjeComM8ht_U0hwDF3cLyX6IJaBtKBa0XXiE.ZPDpnM6EgBo 5f0HKtED0fj4nVLjFx5RLj72qat.IckZJaov8le018IRVxpL0A1ow99fI6Na AkJxIwrTUqKHLSb9yxl.9oPMJJFP9LvxOQzrdAntMGwSp_GU06gULmTZyr4w Puw9wp.GGSfbfsUv8.5qn6w6JBIFgUZWP6LZUy15ulp_sZDuy97yJPpXg3L5 jj76yp7p3xG9Asg1E9.31fGDWneaxuMUFVp0q_s8aQBHXEmN.jsq20X68QCE vOqWaORu49mzQvjoiyKiD5LHkbNxf3w--
X-Yahoo-SMTP: fs7iLCSswBBDBLcI2rgu6.1JrA--
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Sumandra Majee <smajee@yahoo.com>
X-Mailer: iPhone Mail (13A452)
In-Reply-To: <E8355113905631478EFF04F5AA706E9830D881D4@wtl-exchp-2.sandvine.com>
Date: Thu, 5 Nov 2015 10:09:05 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <E15D8888-0261-43F3-862F-AFD82B53B2D5@yahoo.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <E8355113905631478EFF04F5AA706E9830D881D4@wtl-exchp-2.sandvine.com>
To: Dave Dolson <ddolson@sandvine.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/y6UvRrowYQrwBYlkdoUyHdslWrM>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 15:09:29 -0000

I think all of these methods will be useful in different scenario. However i=
f the current deployment didn't require any tunnel then NSH over UDP is a ve=
ry straightforward. To me that is the fundamental motivation. =20

Sent from my iPhone

> On Nov 5, 2015, at 8:22 AM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> I have the same comment with the VxLAN-GPE encapsulation; it seems unneces=
sary if UDP encap is available.
>=20
> Even so, if we accept VxLAN-GPE as a good idea it seems irrational to say U=
DP/GRE is a bad idea.
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreege=
r)
> Sent: Thursday, November 05, 2015 4:45 PM
> To: sarikaya@ieee.org
> Cc: sfc@ietf.org
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> Hi Behcet,
>=20
> I=C2=B9m not sure I=C2=B9m following what your point is.  It is true that V=
XLAN-GPE also adds additional overhead which may not always be needed.  Carr=
ying NSH directly over UDP avoids that as well.  Lucy brought up a new optio=
n that I had never heard suggested before, which was to carry NSH in GRE ove=
r UDP.  This adds a GRE header in between the UDP header and NSH, but in my o=
pinion doesn=C2=B9t bring any benefits - just more overhead and complication=
.
>=20
> Thanks, Larry
>=20
>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>>=20
>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
>> <kreeger@cisco.com> wrote:
>>> Hi Lucy,
>>>=20
>>> One of the motivations for carrying NSH directly on UDP is to avoid =20
>>> unnecessary overhead or complication.  Adding the GRE header in=20
>>> between does  not seem to add any additional benefit that I can see =C2=AD=
=20
>>> only additional  overhead.
>>=20
>> The point was not with VXLAN-GPE.
>>=20
>> Behcet
>>> Thanks, Larry
>>>=20
>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
>>> <lucy.yong@huawei.com>
>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)=20
>>> that  nsh can use for the transport; just need to register an=20
>>> Ethertype for nsh.
>>> The gre/udp transport provides all features nsh needs with additional =20=

>>> security capability.
>>>=20
>>>=20
>>>=20
>>> Lucy
>>>=20
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 07:26:24 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91EA91B2FAD for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 07:26:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AHzvGvS7qB6U for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 07:26:17 -0800 (PST)
Received: from hub021-ca-4.exch021.serverdata.net (hub021-ca-4.exch021.serverdata.net [64.78.22.171]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 678B51B2F5F for <sfc@ietf.org>; Thu,  5 Nov 2015 07:22:56 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-4.exch021.domain.local ([10.254.4.39]) with mapi id 14.03.0224.002;  Thu, 5 Nov 2015 07:22:56 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Songhaibin (A)" <haibin.song@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Map-Assisted SFC Proxy using LISP
Thread-Index: AdEXbi5kBRq8c4XcS3K4te8cyDufewAbojYg
Date: Thu, 5 Nov 2015 15:22:55 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E95506C@MBX021-W3-CA-2.exch021.domain.local>
References: <E33E01DFD5BEA24B9F3F18671078951F653A7C3A@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <E33E01DFD5BEA24B9F3F18671078951F653A7C3A@nkgeml501-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: multipart/alternative; boundary="_000_CDF2F015F4429F458815ED2A6C2B6B0B2E95506CMBX021W3CA2exch_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/xBAaHd_gpDmWbAMj4C70wrbg1SE>
Subject: Re: [sfc] Map-Assisted SFC Proxy using LISP
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 15:26:22 -0000

--_000_CDF2F015F4429F458815ED2A6C2B6B0B2E95506CMBX021W3CA2exch_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Haibin,

After reading your draft, I feel that it would benefit from splitting the n=
otion of "non-transparent legacy service function" into separate distinctio=
ns based on the OSI model.

The service function may be "transparent" at L2, L3, L4, in which case you =
could, indeed, manipulate the MAC header to your advantage.  Such service f=
unctions would forward traffic at L2, either through MAC bridging and/or vi=
a a 2-member port-based VLAN.

Other service functions may be "transparent" at L3 and L4, only.   Such ser=
vice functions may forward traffic based on IP forwarding tables which are =
populated statically or dynamically.

Theoretically, there are service functions may be "transparent" at L3, only=
 (e.g., port translation without address translation), but I can't think of=
 any practical examples (I'm excluding service functions that originate the=
ir own sympathetic flows in this analysis).

Lastly, we have service functions that are not "transparent" at all, such a=
s those that perform SNAPT.   You do cover this case by explicitly excludin=
g it, which is fine, I think.

Thanks.

    Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Songhaibin (A)
Sent: Wednesday, November 4, 2015 9:03 PM
To: sfc@ietf.org
Subject: [sfc] Map-Assisted SFC Proxy using LISP

Hi,

Legacy service function support is obviously important in the SFC WG. I wou=
ld like to request the authors of this draft to read draft-song-sfc-legacy-=
sf-mapping<http://tools.ietf.org/id/draft-song-sfc-legacy-sf-mapping-06.txt=
>. I think there is a lot of overlapping between these two drafts.

BR,
-Haibin

--_000_CDF2F015F4429F458815ED2A6C2B6B0B2E95506CMBX021W3CA2exch_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	font-size:10.5pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"text-justify-t=
rim:punctuation">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Haibi=
n,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">After=
 reading your draft, I feel that it would benefit from splitting the notion=
 of &#8220;non-transparent legacy service function&#8221; into separate dis=
tinctions based on the OSI model.&nbsp;&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">The s=
ervice function may be &#8220;transparent&#8221; at L2, L3, L4, in which ca=
se you could, indeed, manipulate the MAC header to your advantage. &nbsp;Su=
ch service functions would forward traffic at L2, either
 through MAC bridging and/or via a 2-member port-based VLAN.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Other=
 service functions may be &#8220;transparent&#8221; at L3 and L4, only.&nbs=
p;&nbsp; Such service functions may forward traffic based on IP forwarding =
tables which are populated statically or dynamically.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Theor=
etically, there are service functions may be &#8220;transparent&#8221; at L=
3, only (e.g., port translation without address translation), but I can&#82=
17;t think of any practical examples (I&#8217;m excluding service
 functions that originate their own sympathetic flows in this analysis).<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Lastl=
y, we have service functions that are not &#8220;transparent&#8221; at all,=
 such as those that perform SNAPT.&nbsp;&nbsp; You do cover this case by ex=
plicitly excluding it, which is fine, I think.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Thank=
s.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">&nbsp=
;&nbsp;&nbsp; Ron<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"font-size=
:11.0pt;color:#1F497D"><o:p>&nbsp;</o:p></span></a></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left"><b><span st=
yle=3D"font-size:11.0pt">From:</span></b><span style=3D"font-size:11.0pt"> =
sfc [mailto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Songhaibin (A)<br>
<b>Sent:</b> Wednesday, November 4, 2015 9:03 PM<br>
<b>To:</b> sfc@ietf.org<br>
<b>Subject:</b> [sfc] Map-Assisted SFC Proxy using LISP<o:p></o:p></span></=
p>
</div>
</div>
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left"><o:p>&nbsp;=
</o:p></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:ZH-CN">Hi,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:ZH-CN"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:ZH-CN">Legacy se=
rvice function support is obviously important in the SFC WG. I would like t=
o request the authors of this draft to read
</span><span style=3D"font-size:11.0pt;font-family:&quot;Times New Roman&qu=
ot;,serif;mso-fareast-language:ZH-CN"><a href=3D"http://tools.ietf.org/id/d=
raft-song-sfc-legacy-sf-mapping-06.txt">draft-song-sfc-legacy-sf-mapping</a=
>. I think there is a lot of overlapping between
 these two drafts.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif;mso-fareast-language:ZH-CN"><o:p>&nbsp;</o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif;mso-fareast-language:ZH-CN">BR,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif;mso-fareast-language:ZH-CN">-Haibin</span><span s=
tyle=3D"mso-fareast-language:ZH-CN"><o:p></o:p></span></p>
</div>
</body>
</html>

--_000_CDF2F015F4429F458815ED2A6C2B6B0B2E95506CMBX021W3CA2exch_--


From nobody Thu Nov  5 07:29:16 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFA111B30D8 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 07:29:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EPajayV2MVaw for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 07:29:13 -0800 (PST)
Received: from hub021-ca-4.exch021.serverdata.net (hub021-ca-4.exch021.serverdata.net [64.78.22.171]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E4E61B3027 for <sfc@ietf.org>; Thu,  5 Nov 2015 07:25:12 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-4.exch021.domain.local ([10.254.4.39]) with mapi id 14.03.0224.002;  Thu, 5 Nov 2015 07:25:11 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q5xuabff0gtUet7dPFbRQaWp6NjRaQ
Date: Thu, 5 Nov 2015 15:25:11 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com>
In-Reply-To: <563AB2E0.70005@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/lFlcDQdX1ZPpGc7bRQqW573wjtk>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 15:29:15 -0000

Joel,

Is the question whether there should be authentication at all, or whether i=
t should be mandatory vs. optional?    If optional, it would lend itself to=
 carriage within the metadata (although type 1 could be challenging).

   Ron


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Wednesday, November 4, 2015 8:38 PM
To: sfc@ietf.org
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14

 From where I sit, and with the deploymenbts I expect, requiring authentica=
tion of SFC NSH or of the whole packet seems excessive.  Given that the NSH=
 header metadata is going to be modified at many service functions, this me=
ans that SF have to be able to generate the authentication.

And there is a very challenging quesiton as to who would be expected to do =
the work of validating the authentication?  Every Service Function?

So I am doubtful of REQ-14 mandating authentication within the SFC space.  =
When we have inter-domain links, authentication and encryption become relev=
ant.
I understand that hard-shell / weak innards security is questionable.=20
But adding significant overhead in both sapce and time seems highly questio=
nable.

Yours,
Joel

On 11/4/15 8:27 PM, Joe Clarke wrote:
> I figure I'll get the ball rolling with comments on=20
> draft-mglt-sfc-security-environment-req-00.
>
> In particular, I want to comment on section SFC Data Plane Requirements.
>   It was raised today in the session that REQ16 and REQ17 are=20
> problematic given certain use cases.  The use case of load balancing=20
> within a domain was brought up.  I can think of other use cases where=20
> REQ17, specifically, would be a problem.
>
> If you assume that REQ14 and REQ15 are in place (and these are very=20
> important IMHO), then the risks associated with REQ16 and REQ17 are=20
> mitigated.  One could not inject their own metadata or modify existing=20
> metadata unless they could provide proper authn.
>
> Additionally, on REQ17, while this is a good recommendation in general=20
> (i.e., think about what you want to send and be frugal with space), it=20
> uses a strong word, MUST without providing any real guidance as to=20
> what the limit might be.
>
> Joe
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 09:40:30 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 111A61A21B0 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 09:40:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jSiRT67bfUVY for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 09:40:27 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F8AC1A0366 for <sfc@ietf.org>; Thu,  5 Nov 2015 09:40:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2888; q=dns/txt; s=iport; t=1446745227; x=1447954827; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=qCDR/7gcZXQIPAqIQvbzh1yUm/vfUvov39RD6/vZrsk=; b=DPw3wtaU1EucxIMVpSOZBAPfb41RdZfqbavyO/5pKLAeVRfd4F7el3TF 4ALFv0BfgikYzvnW0HFh6sX9IfyZ6B4mWVMloxwTn2c2n5mID/DLp5UG4 kt8EAVpfphKEhk0bV6gaTsFMf+I0CJQWYnsE3PvLmUX9MuwogGgaITAA2 U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AQBQCNkztW/5hdJa1egztTbwa/bhcKhW8CgTQ8EAEBAQEBAQGBCoQ1AQEBAwEBAQE3NAsFCwIBCBgeECEGCyUCBA4FiBkDCggNvSoNhDoBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUghCCboJTgWIkg0uBFQWWSAGLLoF0lHCHUQE4K4QEcoNWAR4HHIEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,248,1444694400"; d="scan'208";a="204737021"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-4.cisco.com with ESMTP; 05 Nov 2015 17:40:26 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tA5HeQBL001011 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 5 Nov 2015 17:40:26 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 5 Nov 2015 11:40:26 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 5 Nov 2015 11:40:25 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Sharon <sbarkai@gmail.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q+SPQ5Wk3fbkGb2eKMd9WDJ56ND3iAgAEIYQA=
Date: Thu, 5 Nov 2015 17:40:25 +0000
Message-ID: <AAAD26E5-A735-475E-8D7D-E19F8567E1CB@cisco.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <BB121B64-82AF-4490-8BAD-01C6245BD248@gmail.com>
In-Reply-To: <BB121B64-82AF-4490-8BAD-01C6245BD248@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.230]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <E100BAF3D800AF4BAF41E1F7E480ED6E@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1vBinle38ce-GpRSp5qhJFxRoKw>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 17:40:29 -0000

> On Nov 4, 2015, at 8:54 PM, Sharon <sbarkai@gmail.com> wrote:
>=20
> This is part of the motivation for the draft Alberto presented stripping =
NSH before SFs, keeping attack surface same as "normal" networking.=20


Are you implying that the SFs are more trusted w/o NSH? =20

>=20
> However stripping context while keeping SFC connectionless requires some =
map-assistance so packets can show up anywhere and chains can fork physical=
ly and logically.
>=20
> --szb
>=20
>> On Nov 4, 2015, at 5:37 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>>=20
>> From where I sit, and with the deploymenbts I expect, requiring authenti=
cation of SFC NSH or of the whole packet seems excessive.  Given that the N=
SH header metadata is going to be modified at many service functions, this =
means that SF have to be able to generate the authentication.
>>=20
>> And there is a very challenging quesiton as to who would be expected to =
do the work of validating the authentication?  Every Service Function?
>>=20
>> So I am doubtful of REQ-14 mandating authentication within the SFC space=
.  When we have inter-domain links, authentication and encryption become re=
levant.
>> I understand that hard-shell / weak innards security is questionable. Bu=
t adding significant overhead in both sapce and time seems highly questiona=
ble.
>>=20
>> Yours,
>> Joel
>>=20
>>> On 11/4/15 8:27 PM, Joe Clarke wrote:
>>> I figure I'll get the ball rolling with comments on
>>> draft-mglt-sfc-security-environment-req-00.
>>>=20
>>> In particular, I want to comment on section SFC Data Plane Requirements=
.
>>> It was raised today in the session that REQ16 and REQ17 are
>>> problematic given certain use cases.  The use case of load balancing
>>> within a domain was brought up.  I can think of other use cases where
>>> REQ17, specifically, would be a problem.
>>>=20
>>> If you assume that REQ14 and REQ15 are in place (and these are very
>>> important IMHO), then the risks associated with REQ16 and REQ17 are
>>> mitigated.  One could not inject their own metadata or modify existing
>>> metadata unless they could provide proper authn.
>>>=20
>>> Additionally, on REQ17, while this is a good recommendation in general
>>> (i.e., think about what you want to send and be frugal with space), it
>>> uses a strong word, MUST without providing any real guidance as to what
>>> the limit might be.
>>>=20
>>> Joe
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 12:50:32 2015
Return-Path: <sbarkai@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 319A11A1A5D for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 12:50:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RLgF-Ow384Rp for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 12:50:29 -0800 (PST)
Received: from mail-pa0-x22e.google.com (mail-pa0-x22e.google.com [IPv6:2607:f8b0:400e:c03::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 490521A1A55 for <sfc@ietf.org>; Thu,  5 Nov 2015 12:50:29 -0800 (PST)
Received: by pacdm15 with SMTP id dm15so73454714pac.3 for <sfc@ietf.org>; Thu, 05 Nov 2015 12:50:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=+mDSaj+deZKXKvLPmF+wlS5gqPP/Ws441hfGDgJJfqg=; b=sXlQpIG4Ajw6aAIAgCThEBG/YQ7VNByPSp99o2Sc8ehwLw2NBUMiYERxN+s7hVFV6L xZU7Op7rxu7WSGn8iB9XaWoHFn3sEmaVwpkq1wwWpoZe1M7mr/2Mx/KV1+qbWMDh1y4C gUXgwY/Q8dUV5mgTdOhbcJtyifCJJgom8wII2B2ih2aUmys76aEG9cKIUSw4aUQtkrOx mKmlr0no3GPN+jM2L/mmTWBBIRA4rFQuPkUS5ZXwVCjQMZZ2r9+CdddGBZoma59m9Lz7 bT9CgjYS3OJpHX6jwyPHe0Pi1p2mLbkElNkP+7tmu76DLN8Pk0tHAKj7JK+HrUjljLZH XFQA==
X-Received: by 10.68.117.108 with SMTP id kd12mr11974998pbb.154.1446756628909;  Thu, 05 Nov 2015 12:50:28 -0800 (PST)
Received: from ?IPv6:2600:1010:b05e:a1d1:dda7:e597:1cd9:7e11? ([2600:1010:b05e:a1d1:dda7:e597:1cd9:7e11]) by smtp.gmail.com with ESMTPSA id y16sm9478177pbt.88.2015.11.05.12.50.27 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 05 Nov 2015 12:50:28 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Sharon <sbarkai@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <AAAD26E5-A735-475E-8D7D-E19F8567E1CB@cisco.com>
Date: Thu, 5 Nov 2015 12:50:26 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <65234E83-411F-4370-B5BC-6760E73D5536@gmail.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <BB121B64-82AF-4490-8BAD-01C6245BD248@gmail.com> <AAAD26E5-A735-475E-8D7D-E19F8567E1CB@cisco.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hdyk-7ffAkfCIGoTDTmydnF-t9c>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 20:50:31 -0000

Yes.

--szb

> On Nov 5, 2015, at 9:40 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
>=20
>> On Nov 4, 2015, at 8:54 PM, Sharon <sbarkai@gmail.com> wrote:
>>=20
>> This is part of the motivation for the draft Alberto presented stripping N=
SH before SFs, keeping attack surface same as "normal" networking.
>=20
>=20
> Are you implying that the SFs are more trusted w/o NSH? =20
>=20
>>=20
>> However stripping context while keeping SFC connectionless requires some m=
ap-assistance so packets can show up anywhere and chains can fork physically=
 and logically.
>>=20
>> --szb
>>=20
>>> On Nov 4, 2015, at 5:37 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:=

>>>=20
>>> =46rom where I sit, and with the deploymenbts I expect, requiring authen=
tication of SFC NSH or of the whole packet seems excessive.  Given that the N=
SH header metadata is going to be modified at many service functions, this m=
eans that SF have to be able to generate the authentication.
>>>=20
>>> And there is a very challenging quesiton as to who would be expected to d=
o the work of validating the authentication?  Every Service Function?
>>>=20
>>> So I am doubtful of REQ-14 mandating authentication within the SFC space=
.  When we have inter-domain links, authentication and encryption become rel=
evant.
>>> I understand that hard-shell / weak innards security is questionable. Bu=
t adding significant overhead in both sapce and time seems highly questionab=
le.
>>>=20
>>> Yours,
>>> Joel
>>>=20
>>>> On 11/4/15 8:27 PM, Joe Clarke wrote:
>>>> I figure I'll get the ball rolling with comments on
>>>> draft-mglt-sfc-security-environment-req-00.
>>>>=20
>>>> In particular, I want to comment on section SFC Data Plane Requirements=
.
>>>> It was raised today in the session that REQ16 and REQ17 are
>>>> problematic given certain use cases.  The use case of load balancing
>>>> within a domain was brought up.  I can think of other use cases where
>>>> REQ17, specifically, would be a problem.
>>>>=20
>>>> If you assume that REQ14 and REQ15 are in place (and these are very
>>>> important IMHO), then the risks associated with REQ16 and REQ17 are
>>>> mitigated.  One could not inject their own metadata or modify existing
>>>> metadata unless they could provide proper authn.
>>>>=20
>>>> Additionally, on REQ17, while this is a good recommendation in general
>>>> (i.e., think about what you want to send and be frugal with space), it
>>>> uses a strong word, MUST without providing any real guidance as to what=

>>>> the limit might be.
>>>>=20
>>>> Joe
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20


From nobody Thu Nov  5 13:19:38 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CB0B1A8A90 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 13:19:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2z2k9oNAqtu8 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 13:19:35 -0800 (PST)
Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by ietfa.amsl.com (Postfix) with ESMTP id 4BF431A8A75 for <sfc@ietf.org>; Thu,  5 Nov 2015 13:19:35 -0800 (PST)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga102.fm.intel.com with ESMTP; 05 Nov 2015 13:19:25 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,248,1444719600";  d="scan'208,217";a="812780195"
Received: from orsmsx103.amr.corp.intel.com ([10.22.225.130]) by orsmga001.jf.intel.com with ESMTP; 05 Nov 2015 13:19:25 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX103.amr.corp.intel.com ([169.254.2.103]) with mapi id 14.03.0248.002; Thu, 5 Nov 2015 13:19:25 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AdEXp8m6yQaw1JVOQR+GEAPtWpkjCw==
Date: Thu, 5 Nov 2015 21:19:24 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.139]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958581E222B1ORSMSX114amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ZuxyJxWKQf6wlTULMJR4k2RmfsM>
Subject: [sfc]  will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 21:19:37 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958581E222B1ORSMSX114amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958581E222B1ORSMSX114amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#2E=
75B6;mso-style-textfill-fill-color:#2E75B6;mso-style-textfill-fill-alpha:10=
0.0%">Hi
<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6;mso-style-textfill-fill=
-color:#2E75B6;mso-style-textfill-fill-alpha:100.0%"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6;mso-style-textfill-fill=
-color:#2E75B6;mso-style-textfill-fill-alpha:100.0%">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved.
 In the discussion about Map assisted SFC Proxy, we discussed the potential=
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the
 SF is trusted for this operation. &nbsp;</span><span style=3D"color:#2E75B=
6;mso-style-textfill-fill-color:#2E75B6;mso-style-textfill-fill-alpha:100.0=
%"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6;mso-style-textfill-fill=
-color:#2E75B6;mso-style-textfill-fill-alpha:100.0%"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6;mso-style-textfill-fill=
-color:#2E75B6;mso-style-textfill-fill-alpha:100.0%">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the
 sake of the 5 tuple, as well as for NSH header changes (e.g. SI decrement =
or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If =
not, the SFF (or the Proxy) has to keep that state and VERIFY it on the out=
bound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6;mso-style-textfill-fill=
-color:#2E75B6;mso-style-textfill-fill-alpha:100.0%"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6;mso-style-textfill-fill=
-color:#2E75B6;mso-style-textfill-fill-alpha:100.0%">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF
 is part of the infrastructure and is trusted. We need to close on this for=
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958581E222B1ORSMSX114amrcor_--


From nobody Thu Nov  5 14:12:09 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E56901B3C54 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 14:12:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nDx6sdb6QwUF for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 14:11:59 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 472EF1B3C3E for <sfc@ietf.org>; Thu,  5 Nov 2015 14:11:58 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CDS54576; Thu, 05 Nov 2015 22:11:55 +0000 (GMT)
Received: from DFWEML706-CHM.china.huawei.com (10.193.5.225) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 5 Nov 2015 22:11:54 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml706-chm ([10.193.5.225]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 14:11:51 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Dave Dolson <ddolson@sandvine.com>, Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nj0aAgAADXYD//5JgsIAAh9IAgAAO1gD//6qAIIAAiXuAgAAOsQD///8BsA==
Date: Thu, 5 Nov 2015 22:11:51 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D57207BB5@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>, <E8355113905631478EFF04F5AA706E9830D88192@wtl-exchp-2.sandvine.com> <0by1y3xsqdhwe9stsmw39mf5.1446732352825@email.android.com>
In-Reply-To: <0by1y3xsqdhwe9stsmw39mf5.1446732352825@email.android.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.185.205]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D57207BB5dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.563BD42C.00AB, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 12c4e40d24481eaab7e09d45ac4d8eb4
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CRMY-0Q-raflFYxAEnYTs-2Hxc8>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 22:12:08 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D57207BB5dfweml701chm_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 8:10 AM
To: Dave Dolson; Lucy yong; Alia Atlas
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Layer2 tunnels are just fine, they provide topological freedom.
[Lucy] UDP can't be over L2 directly.   You need Ethertype for NSH in L2 sp=
ace.

Lucy

Surendra


Sent from a thumb typed device.


-------- Original message --------
From: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: 2015/11/05 10:17 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>, "Surendr=
a Kumar (smkumar)" <smkumar@cisco.com<mailto:smkumar@cisco.com>>, Alia Atla=
s <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
I find it to be a useful concept when SFF and SF nodes have layer2 connecti=
ons.


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
Sent: Thursday, November 05, 2015 10:08 PM
To: Surendra Kumar (smkumar); Alia Atlas
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_2691CE0099834E4A9C5044EEC662BB9D57207BB5dfweml701chm_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman","serif";}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma","sans-serif";}
span.emailstyle20
	{mso-style-name:emailstyle20;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.im
	{mso-style-name:im;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Surendra=
 Kumar (smkumar) [mailto:smkumar@cisco.com]
<br>
<b>Sent:</b> Thursday, November 05, 2015 8:10 AM<br>
<b>To:</b> Dave Dolson; Lucy yong; Alia Atlas<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">Layer2 tunnels are just fine, they provide topologic=
al freedom.<o:p></o:p></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">[Lucy] UDP can&#821=
7;t be over L2 directly. &nbsp;&nbsp;You need Ethertype for NSH in L2 space=
.<o:p></o:p></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lucy<o:p></o:p></sp=
an></i></b></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Dave Dolson &lt;<a href=3D"mailto:ddolson@sandvine.com">ddolson@sandv=
ine.com</a>&gt;
<br>
Date: 2015/11/05 10:17 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt;, &quot;Surendra Kumar (smkumar)&quot; &lt;<a href=3D"mailto:smk=
umar@cisco.com">smkumar@cisco.com</a>&gt;, Alia Atlas &lt;<a href=3D"mailto=
:akatlas@gmail.com">akatlas@gmail.com</a>&gt;
<br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I find it to be a useful =
concept when SFF and SF nodes have layer2 connections.</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [<a =
href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Lucy yong<br>
<b>Sent:</b> Thursday, November 05, 2015 10:08 PM<br>
<b>To:</b> Surendra Kumar (smkumar); Alia Atlas<br>
<b>Cc:</b> <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>; Larr=
y Kreeger (kreeger);
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If SFC is deployed in Eth=
ernet network, do we need NSH over Ethernet?</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lucy</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Surendra=
 Kumar (smkumar) [<a href=3D"mailto:smkumar@cisco.com">mailto:smkumar@cisco=
.com</a>]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>; Larr=
y Kreeger (kreeger);
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regard,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org=
">sfc-bounces@ietf.org</a>] On Behalf Of Larry Kreeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.o=
rg</a></span><br>
<span class=3D"im">Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></sp=
an><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_2691CE0099834E4A9C5044EEC662BB9D57207BB5dfweml701chm_--


From nobody Thu Nov  5 14:17:55 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BD0C1B3C5F for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 14:17:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lhJHoW82ilbr for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 14:17:52 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D1921B3C61 for <sfc@ietf.org>; Thu,  5 Nov 2015 14:17:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3749; q=dns/txt; s=iport; t=1446761872; x=1447971472; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=QoxRUXgVwI0z9noS42AGATwAI9tnLHjMm4c0fPe1gWo=; b=eH7PRrw7qNM5uOl+mI1NOHAJfh5CdLr6zuZt6+n+7pYyUu6Tf2SB7LKu N0pwPrA9de3Ncu1eXtEYx782i7oOVBTnvj3L3N/GiSNzo+3nWDHcbH+wX IOqv/mhp/re+z9/TDdRZvPnN89XZT+gG2CQPvumfvZ/D5vhj5vfcpta3E Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AQBQC21DtW/4QNJK1egztTbwa/cBcKhW8CgTs8EAEBAQEBAQGBCoQ1AQEBAwEBAQE3NAsFCwIBCBgeECEGCyUCBA4FiBkDCggNvFANhD4BAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUghCCboJTgWIkg0uBFQWWSAGLLoF0lHCHUQE4K4QEcoNWAR4HHIEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,249,1444694400"; d="scan'208";a="205525852"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-8.cisco.com with ESMTP; 05 Nov 2015 22:17:51 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tA5MHpIr008272 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 5 Nov 2015 22:17:51 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 5 Nov 2015 16:17:50 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 5 Nov 2015 16:17:50 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Sharon <sbarkai@gmail.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q+SPQ5Wk3fbkGb2eKMd9WDJ56ND3iAgAEIYQCAADUYAIAAGGkA
Date: Thu, 5 Nov 2015 22:17:50 +0000
Message-ID: <BACC0A7D-CE41-48AE-B7D3-C591731E9E6F@cisco.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <BB121B64-82AF-4490-8BAD-01C6245BD248@gmail.com> <AAAD26E5-A735-475E-8D7D-E19F8567E1CB@cisco.com> <65234E83-411F-4370-B5BC-6760E73D5536@gmail.com>
In-Reply-To: <65234E83-411F-4370-B5BC-6760E73D5536@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.230]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <3D7C13A5FB267B46BB719D9F880F1423@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/V_07h4hCUfK7JFfhjGhgSFAiTPI>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2015 22:17:54 -0000

I find that a tough assumption to accept within a given administrative doma=
in.  Let's ignore NSH for a moment: SFs perform a slew of operations that r=
equire trust, including in some cases holding a trusted certificate.  If yo=
u can't trust you services, then the you need to consider why you've deploy=
ed them.  Taking it one step further: why trust the network nodes then?

Certainly, we should allow for verification/authenticity (when needed) but =
we need to be pragmatic with our trust model.

Paul


> On Nov 5, 2015, at 3:50 PM, Sharon <sbarkai@gmail.com> wrote:
>=20
> Yes.
>=20
> --szb
>=20
>> On Nov 5, 2015, at 9:40 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>>=20
>>=20
>>> On Nov 4, 2015, at 8:54 PM, Sharon <sbarkai@gmail.com> wrote:
>>>=20
>>> This is part of the motivation for the draft Alberto presented strippin=
g NSH before SFs, keeping attack surface same as "normal" networking.
>>=20
>>=20
>> Are you implying that the SFs are more trusted w/o NSH? =20
>>=20
>>>=20
>>> However stripping context while keeping SFC connectionless requires som=
e map-assistance so packets can show up anywhere and chains can fork physic=
ally and logically.
>>>=20
>>> --szb
>>>=20
>>>> On Nov 4, 2015, at 5:37 PM, Joel M. Halpern <jmh@joelhalpern.com> wrot=
e:
>>>>=20
>>>> From where I sit, and with the deploymenbts I expect, requiring authen=
tication of SFC NSH or of the whole packet seems excessive.  Given that the=
 NSH header metadata is going to be modified at many service functions, thi=
s means that SF have to be able to generate the authentication.
>>>>=20
>>>> And there is a very challenging quesiton as to who would be expected t=
o do the work of validating the authentication?  Every Service Function?
>>>>=20
>>>> So I am doubtful of REQ-14 mandating authentication within the SFC spa=
ce.  When we have inter-domain links, authentication and encryption become =
relevant.
>>>> I understand that hard-shell / weak innards security is questionable. =
But adding significant overhead in both sapce and time seems highly questio=
nable.
>>>>=20
>>>> Yours,
>>>> Joel
>>>>=20
>>>>> On 11/4/15 8:27 PM, Joe Clarke wrote:
>>>>> I figure I'll get the ball rolling with comments on
>>>>> draft-mglt-sfc-security-environment-req-00.
>>>>>=20
>>>>> In particular, I want to comment on section SFC Data Plane Requiremen=
ts.
>>>>> It was raised today in the session that REQ16 and REQ17 are
>>>>> problematic given certain use cases.  The use case of load balancing
>>>>> within a domain was brought up.  I can think of other use cases where
>>>>> REQ17, specifically, would be a problem.
>>>>>=20
>>>>> If you assume that REQ14 and REQ15 are in place (and these are very
>>>>> important IMHO), then the risks associated with REQ16 and REQ17 are
>>>>> mitigated.  One could not inject their own metadata or modify existin=
g
>>>>> metadata unless they could provide proper authn.
>>>>>=20
>>>>> Additionally, on REQ17, while this is a good recommendation in genera=
l
>>>>> (i.e., think about what you want to send and be frugal with space), i=
t
>>>>> uses a strong word, MUST without providing any real guidance as to wh=
at
>>>>> the limit might be.
>>>>>=20
>>>>> Joe
>>>>>=20
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20


From nobody Thu Nov  5 16:09:12 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E23131A21A6 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:09:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dam5u50bQ0DM for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:09:08 -0800 (PST)
Received: from g1t5425.austin.hp.com (g1t5425.austin.hp.com [15.216.225.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 971E51A1F73 for <sfc@ietf.org>; Thu,  5 Nov 2015 16:09:08 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g1t5425.austin.hp.com (Postfix) with ESMTPS id 6A08C44; Fri,  6 Nov 2015 00:09:07 +0000 (UTC)
Received: from G1W5784.americas.hpqcorp.net (16.193.26.2) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Fri, 6 Nov 2015 00:07:10 +0000
Received: from G2W2527.americas.hpqcorp.net ([169.254.7.38]) by G1W5784.americas.hpqcorp.net ([16.193.26.2]) with mapi id 14.03.0169.001; Fri, 6 Nov 2015 00:07:10 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Alia Atlas <akatlas@gmail.com>, Lucy yong <lucy.yong@huawei.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NCSqAgAADXYCAABlfAIAAANIAgAD1ldA=
Date: Fri, 6 Nov 2015 00:07:10 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254A39FA@G2W2527.americas.hpqcorp.net>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
In-Reply-To: <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.196.64.191]
Content-Type: multipart/alternative; boundary="_000_94DA9C7F532AD946852C9C5527195239254A39FAG2W2527americas_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/7EzJqQ1S990TN548U2TgBleolPY>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 00:09:11 -0000

--_000_94DA9C7F532AD946852C9C5527195239254A39FAG2W2527americas_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_94DA9C7F532AD946852C9C5527195239254A39FAG2W2527americas_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_94DA9C7F532AD946852C9C5527195239254A39FAG2W2527americas_--


From nobody Thu Nov  5 16:10:50 2015
Return-Path: <sbarkai@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98D3E1A21BC for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:10:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yfgYSkPsrFGd for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:10:47 -0800 (PST)
Received: from mail-pa0-x22c.google.com (mail-pa0-x22c.google.com [IPv6:2607:f8b0:400e:c03::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC3FC1A21BA for <sfc@ietf.org>; Thu,  5 Nov 2015 16:10:47 -0800 (PST)
Received: by padhx2 with SMTP id hx2so94245316pad.1 for <sfc@ietf.org>; Thu, 05 Nov 2015 16:10:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=RPfYaHURA7cOFZlbktfSdQXuCI2WnVw4zPueQzMK0s4=; b=GLmdkFsXLyWuTE9vC6BXLJ8KzHKcAAOvUS6sZ9VW4EavuIx+v2pGurvntjTU7HPvrw fgkqhFVflp4VAvFnOEGqR/b1LyOu6VtqRkzon70IoZUlH8vnm6Lsq9bkUVWgJo90lb6B x/Tov/8aTCttETmtH/uPy5+oQhRoLBqY0AiWX89dzRFKpb21IRU6NprKqwsnWyYKMqM0 Gd0IGGRVD+C+qzFqJx/6RxDssJcx8abUQBg7pXrIrWRaEh9nDdDfgSzdZZkxYT7LiVq0 MJX6GTUcSvE+TpuSJQzcP0F0PrcfzflLiQc0f916qompyk94uLYSMSBmtWotkWgUGss2 WEJA==
X-Received: by 10.66.102.74 with SMTP id fm10mr13093016pab.33.1446768647373; Thu, 05 Nov 2015 16:10:47 -0800 (PST)
Received: from [100.96.229.235] (67.sub-70-214-0.myvzw.com. [70.214.0.67]) by smtp.gmail.com with ESMTPSA id fk8sm9987739pab.33.2015.11.05.16.10.45 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 05 Nov 2015 16:10:46 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Sharon <sbarkai@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <BACC0A7D-CE41-48AE-B7D3-C591731E9E6F@cisco.com>
Date: Thu, 5 Nov 2015 16:10:44 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <574C590B-346A-40F7-87A5-12F65145D930@gmail.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <BB121B64-82AF-4490-8BAD-01C6245BD248@gmail.com> <AAAD26E5-A735-475E-8D7D-E19F8567E1CB@cisco.com> <65234E83-411F-4370-B5BC-6760E73D5536@gmail.com> <BACC0A7D-CE41-48AE-B7D3-C591731E9E6F@cisco.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-Th8qT6ClatmmnyAwLK7ktzvrqs>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 00:10:49 -0000

I guess the point is that by stripping the NSH before the SFs we trust the S=
Fs no more and no less then we trust any service endpoint or bump on the wir=
e we apply today. The NSH gives more context information then before which e=
xposes the solution to bugs and assumptions. Having no context information m=
aximizes dev-ops permutation freedom.=20

There's also the legacy functions, macs, sriov etc considerations.

Having said that I do believe that in this new sfc domain the notion of an N=
SH allows us to dynamically link NFV solutions using destination based conne=
ctionless networking - which is very good. Probably the only way to scale ov=
erlays and avoid circuits and state fragility.

--szb

> On Nov 5, 2015, at 2:17 PM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> I find that a tough assumption to accept within a given administrative dom=
ain.  Let's ignore NSH for a moment: SFs perform a slew of operations that r=
equire trust, including in some cases holding a trusted certificate.  If you=
 can't trust you services, then the you need to consider why you've deployed=
 them.  Taking it one step further: why trust the network nodes then?
>=20
> Certainly, we should allow for verification/authenticity (when needed) but=
 we need to be pragmatic with our trust model.
>=20
> Paul
>=20
>=20
>> On Nov 5, 2015, at 3:50 PM, Sharon <sbarkai@gmail.com> wrote:
>>=20
>> Yes.
>>=20
>> --szb
>>=20
>>> On Nov 5, 2015, at 9:40 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>>>=20
>>>=20
>>>> On Nov 4, 2015, at 8:54 PM, Sharon <sbarkai@gmail.com> wrote:
>>>>=20
>>>> This is part of the motivation for the draft Alberto presented strippin=
g NSH before SFs, keeping attack surface same as "normal" networking.
>>>=20
>>>=20
>>> Are you implying that the SFs are more trusted w/o NSH? =20
>>>=20
>>>>=20
>>>> However stripping context while keeping SFC connectionless requires som=
e map-assistance so packets can show up anywhere and chains can fork physica=
lly and logically.
>>>>=20
>>>> --szb
>>>>=20
>>>>> On Nov 4, 2015, at 5:37 PM, Joel M. Halpern <jmh@joelhalpern.com> wrot=
e:
>>>>>=20
>>>>> =46rom where I sit, and with the deploymenbts I expect, requiring auth=
entication of SFC NSH or of the whole packet seems excessive.  Given that th=
e NSH header metadata is going to be modified at many service functions, thi=
s means that SF have to be able to generate the authentication.
>>>>>=20
>>>>> And there is a very challenging quesiton as to who would be expected t=
o do the work of validating the authentication?  Every Service Function?
>>>>>=20
>>>>> So I am doubtful of REQ-14 mandating authentication within the SFC spa=
ce.  When we have inter-domain links, authentication and encryption become r=
elevant.
>>>>> I understand that hard-shell / weak innards security is questionable. B=
ut adding significant overhead in both sapce and time seems highly questiona=
ble.
>>>>>=20
>>>>> Yours,
>>>>> Joel
>>>>>=20
>>>>>> On 11/4/15 8:27 PM, Joe Clarke wrote:
>>>>>> I figure I'll get the ball rolling with comments on
>>>>>> draft-mglt-sfc-security-environment-req-00.
>>>>>>=20
>>>>>> In particular, I want to comment on section SFC Data Plane Requiremen=
ts.
>>>>>> It was raised today in the session that REQ16 and REQ17 are
>>>>>> problematic given certain use cases.  The use case of load balancing
>>>>>> within a domain was brought up.  I can think of other use cases where=

>>>>>> REQ17, specifically, would be a problem.
>>>>>>=20
>>>>>> If you assume that REQ14 and REQ15 are in place (and these are very
>>>>>> important IMHO), then the risks associated with REQ16 and REQ17 are
>>>>>> mitigated.  One could not inject their own metadata or modify existin=
g
>>>>>> metadata unless they could provide proper authn.
>>>>>>=20
>>>>>> Additionally, on REQ17, while this is a good recommendation in genera=
l
>>>>>> (i.e., think about what you want to send and be frugal with space), i=
t
>>>>>> uses a strong word, MUST without providing any real guidance as to wh=
at
>>>>>> the limit might be.
>>>>>>=20
>>>>>> Joe
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>=20
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>=20


From nobody Thu Nov  5 16:13:11 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0E291A6F59 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:13:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rHh64DTRuZDO for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:13:07 -0800 (PST)
Received: from g2t2354.austin.hp.com (g2t2354.austin.hp.com [15.217.128.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5B5F1A6F58 for <sfc@ietf.org>; Thu,  5 Nov 2015 16:13:06 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g2t2354.austin.hp.com (Postfix) with ESMTPS id 2B5574D; Fri,  6 Nov 2015 00:13:06 +0000 (UTC)
Received: from G1W5782.americas.hpqcorp.net (16.193.26.0) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Fri, 6 Nov 2015 00:10:49 +0000
Received: from G2W2527.americas.hpqcorp.net ([169.254.7.38]) by G1W5782.americas.hpqcorp.net ([16.193.26.0]) with mapi id 14.03.0169.001; Fri, 6 Nov 2015 00:10:49 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Lucy yong <lucy.yong@huawei.com>, "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NCSqAgAADXYCAABlfAIAAANIAgAAO1gCAADEaAIAAuPBQ
Date: Fri, 6 Nov 2015 00:10:48 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.196.64.191]
Content-Type: multipart/alternative; boundary="_000_94DA9C7F532AD946852C9C5527195239254A3A0FG2W2527americas_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8J5hpKWTKFNgvXo0jTCoHLHTgVo>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 00:13:11 -0000

--_000_94DA9C7F532AD946852C9C5527195239254A3A0FG2W2527americas_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

It is definitely a useful option to run directly over Ethernet to allow for=
 small scale environments which don't need NVO3 overlays.

Cheers,

Paul

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
Sent: Thursday, November 05, 2015 5:08 AM
To: Surendra Kumar (smkumar); Alia Atlas
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_94DA9C7F532AD946852C9C5527195239254A3A0FG2W2527americas_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.im
	{mso-style-name:im;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">It is definitely a useful option to r=
un directly over Ethernet to allow for small scale environments which don&#=
8217;t need NVO3 overlays.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Paul<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> sfc [mailto:sfc-bounces@ietf.o=
rg]
<b>On Behalf Of </b>Lucy yong<br>
<b>Sent:</b> Thursday, November 05, 2015 5:08 AM<br>
<b>To:</b> Surendra Kumar (smkumar); Alia Atlas<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">If SFC is deployed in Ethernet networ=
k, do we need NSH over Ethernet?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Lucy<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> Surendra Kumar (smkumar) [<a hre=
f=3D"mailto:smkumar@cisco.com">mailto:smkumar@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>; Larr=
y Kreeger (kreeger);
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regard,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org=
">sfc-bounces@ietf.org</a>] On Behalf Of Larry Kreeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.o=
rg</a></span><br>
<span class=3D"im">Cc: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></sp=
an><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_94DA9C7F532AD946852C9C5527195239254A3A0FG2W2527americas_--


From nobody Thu Nov  5 16:16:09 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C28AC1A212D for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:16:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cbLmZDF5m0K2 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 16:16:06 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BDE81A1BFF for <sfc@ietf.org>; Thu,  5 Nov 2015 16:16:06 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 2C75224119F; Thu,  5 Nov 2015 16:16:06 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from dhcp-25-165.meeting.ietf94.jp (dhcp-25-165.meeting.ietf94.jp [133.93.25.165]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 9D22F240EBB; Thu,  5 Nov 2015 16:16:05 -0800 (PST)
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <563BF143.4090600@joelhalpern.com>
Date: Thu, 5 Nov 2015 19:16:03 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ydpFZdBzMJu3QZPYK5A9ynlN7BI>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 00:16:07 -0000

Optional authentication is fine.  As you say, we have a TLV structure. 
With a little care we can define how to use that to allow for 
authentication when useful.

Mandatory authentication (as appears to be described by the current 
REQ-14 text) is what causes me concern.

Yours,
Joel

On 11/5/15 10:25 AM, Ron Parker wrote:
> Joel,
>
> Is the question whether there should be authentication at all, or whether it should be mandatory vs. optional?    If optional, it would lend itself to carriage within the metadata (although type 1 could be challenging).
>
>     Ron
>
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Wednesday, November 4, 2015 8:38 PM
> To: sfc@ietf.org
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>
>   From where I sit, and with the deploymenbts I expect, requiring authentication of SFC NSH or of the whole packet seems excessive.  Given that the NSH header metadata is going to be modified at many service functions, this means that SF have to be able to generate the authentication.
>
> And there is a very challenging quesiton as to who would be expected to do the work of validating the authentication?  Every Service Function?
>
> So I am doubtful of REQ-14 mandating authentication within the SFC space.  When we have inter-domain links, authentication and encryption become relevant.
> I understand that hard-shell / weak innards security is questionable.
> But adding significant overhead in both sapce and time seems highly questionable.
>
> Yours,
> Joel
>
> On 11/4/15 8:27 PM, Joe Clarke wrote:
>> I figure I'll get the ball rolling with comments on
>> draft-mglt-sfc-security-environment-req-00.
>>
>> In particular, I want to comment on section SFC Data Plane Requirements.
>>    It was raised today in the session that REQ16 and REQ17 are
>> problematic given certain use cases.  The use case of load balancing
>> within a domain was brought up.  I can think of other use cases where
>> REQ17, specifically, would be a problem.
>>
>> If you assume that REQ14 and REQ15 are in place (and these are very
>> important IMHO), then the risks associated with REQ16 and REQ17 are
>> mitigated.  One could not inject their own metadata or modify existing
>> metadata unless they could provide proper authn.
>>
>> Additionally, on REQ17, while this is a good recommendation in general
>> (i.e., think about what you want to send and be frugal with space), it
>> uses a strong word, MUST without providing any real guidance as to
>> what the limit might be.
>>
>> Joe
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Nov  5 16:21:39 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EE921A6FA7; Thu,  5 Nov 2015 16:21:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piC4-7t3B0Vi; Thu,  5 Nov 2015 16:21:34 -0800 (PST)
Received: from mail-pa0-x231.google.com (mail-pa0-x231.google.com [IPv6:2607:f8b0:400e:c03::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 270ED1A6F59; Thu,  5 Nov 2015 16:21:33 -0800 (PST)
Received: by padhx2 with SMTP id hx2so94519795pad.1; Thu, 05 Nov 2015 16:21:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=AaSBqt31v/FXpRg12mZBlLy86yHlVpPAeAqyP5kOcmw=; b=UB8MhXiJLlFU5xAUwl/DbajzxHp0g51AWwWqCnXOK667Gb9k0DwJCveerXFRr8fYbd V3c7pr3GANrNpYtw5Tp7FRKbzsnKKDUIAB492/wuv2SHbzajblfFBanYtsrVuowKTWtK Mmnm+bvN1OSqnSy32lbQPlgIETSBjEcL9T8ezPfwEm5ncR14V2Ll7sd+wyWF9IlZ5H0L m6MhMmIBLOENc3WPEadfQQJARypxRGjyQsmtoSTqPnpVGtUNcifKy+sZwOVygJ2ZQULW nmFdfziuUr/R3o5vsdaGzW5VkYuyW1psV526+n+pjSmNxhRz6mzt3Eu5MaqFb4Bv0f9E e8LQ==
X-Received: by 10.68.65.42 with SMTP id u10mr13271212pbs.8.1446769292672; Thu, 05 Nov 2015 16:21:32 -0800 (PST)
Received: from t20010c400000308028a91aeec12dfbcc.v6.meeting.ietf94.jp (t20010c400000308028a91aeec12dfbcc.v6.meeting.ietf94.jp. [2001:c40:0:3080:28a9:1aee:c12d:fbcc]) by smtp.gmail.com with ESMTPSA id b6sm9958242pbu.90.2015.11.05.16.21.29 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 05 Nov 2015 16:21:32 -0800 (PST)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net>
Date: Thu, 5 Nov 2015 16:21:27 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net>
To: "Bottorff, Paul" <paul.bottorff@hpe.com>
X-Mailer: Apple Mail (2.2104)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/s8ZJ59rlQtMP9DvA2ExQOXRji98>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 00:21:36 -0000

As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over =
anything. And then every encapsulation spec doesn=92t need to special =
case NSH.

Like the analogy I used at the mic =85 why doest=92t VXLAN-GPE have a =
code point for DNS?  ;-)

Answer: it makes no sense. Run NSH as a transport layer client and it =
will work over everything we have already built and has a good chance to =
work over anything we will build.

NSH is no more an overlay than SMTP is for email.

Dino

> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> =
wrote:
>=20
> It is definitely a useful option to run directly over Ethernet to =
allow for small scale environments which don=92t need NVO3 overlays.
> =20
> Cheers,
> =20
> Paul
> =20
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
> Sent: Thursday, November 05, 2015 5:08 AM
> To: Surendra Kumar (smkumar); Alia Atlas
> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> =20
> If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
> =20
> Lucy
> =20
> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]=20
> Sent: Thursday, November 05, 2015 4:12 AM
> To: Alia Atlas; Lucy yong
> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> =20
> I did go through the process of getting the ethertype for NSH and I =
also have obtained a UDP port# in the past. I have to agree with Alia.
> =20
> Lucy,
> I appreciate you guys taking a crack at NSH over GRE over UDP nested =
encapsulation. It simply calls for unnecessary overhead and complexity =
in formulating and processing such a packet along the tunnel path.
> =20
> I admit i have not read your draft yet, will certainly do.
> =20
> Regard,
> Surendra.
> =20
> =20
> =20
> Sent from a thumb typed device.
>=20
>=20
> -------- Original message --------
> From: Alia Atlas <akatlas@gmail.com>=20
> Date: 2015/11/05 6:18 PM (GMT+09:00)=20
> To: Lucy yong <lucy.yong@huawei.com>=20
> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, =
sfc@ietf.org=20
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport=20
>=20
> <no-hats>=20
> I think that getting a UDP port is a lot more straightforward than an =
Ethertype.
> Not having extra bytes is also an advantage.
> =20
> Regards,
> Alia=20
> </no-hats>
> =20
> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> =
wrote:
> Hi Larry,
>=20
> The benefit is to avoid working a UDP transport for NSH.
>=20
> Thanks,
> Lucy
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger =
(kreeger)
> Sent: Thursday, November 05, 2015 1:45 AM
> To: sarikaya@ieee.org
> Cc: sfc@ietf.org
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> Hi Behcet,
>=20
> I=B9m not sure I=B9m following what your point is.  It is true that =
VXLAN-GPE also adds additional overhead which may not always be needed.  =
Carrying NSH directly over UDP avoids that as well.  Lucy brought up a =
new option that I had never heard suggested before, which was to carry =
NSH in GRE over UDP.  This adds a GRE header in between the UDP header =
and NSH, but in my opinion doesn=B9t bring any benefits - just more =
overhead and complication.
>=20
> Thanks, Larry
>=20
> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>=20
> >On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
> ><kreeger@cisco.com> wrote:
> >> Hi Lucy,
> >>
> >> One of the motivations for carrying NSH directly on UDP is to avoid
> >>unnecessary overhead or complication.  Adding the GRE header in
> >>between does  not seem to add any additional benefit that I can see =
=AD
> >>only additional  overhead.
> >>
> >
> >The point was not with VXLAN-GPE.
> >
> >Behcet
> >> Thanks, Larry
> >>
> >> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
> >> <lucy.yong@huawei.com>
> >> Date: Wednesday, November 4, 2015 at 11:59 PM
> >> To: "sfc@ietf.org" <sfc@ietf.org>
> >> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >>
> >> There is a gre/udp tunnel transport =
(draft-ietf-tsvwg-gre-in-udp-08)
> >>that  nsh can use for the transport; just need to register an
> >>Ethertype for nsh.
> >> The gre/udp transport provides all features nsh needs with =
additional
> >>security capability.
> >>
> >>
> >>
> >> Lucy
> >>
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> =20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 16:37:43 2015
Return-Path: <aldrin.ietf@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 923211A7001; Thu,  5 Nov 2015 16:37:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cY6X8H9lCqTZ; Thu,  5 Nov 2015 16:37:39 -0800 (PST)
Received: from mail-pa0-x235.google.com (mail-pa0-x235.google.com [IPv6:2607:f8b0:400e:c03::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 568A71A6FFE; Thu,  5 Nov 2015 16:37:39 -0800 (PST)
Received: by pacdm15 with SMTP id dm15so78827306pac.3; Thu, 05 Nov 2015 16:37:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=sm8FGeabSz7EwkewI7i2osR3uzKf/GK/EZ+a29M07Ks=; b=y2KamYTyc+yjrERSsEznLBQhZ3yuV9cGEHadqEVd2Gjb2wGNXZNxK8Iw6YalQv3RUX yrkTuJGNZMZiD8FnPJK5c4La0w6tefaLbD17VqkNrEQuznze1mJYDg4qQ6wWJfOvOZFe WTQuSBQNCysmCND7wi1srqO9QcZbCWazqyzSIutb8IZspRs3w+GIkdtSVwgHw8uMwswY SJfV0QF51iam6zEm2ylgBgQYd0dwxoHFFyY2mYrWiJSKn2A48+knZCIpMEf13rTJtriA mBFFttaP+62yrYreZ52uaRYPLXt8C8qOZJ93FBCF0yJ+5eP7peyJNq0TdaXrmHrlkUKZ CnmQ==
X-Received: by 10.68.129.40 with SMTP id nt8mr13265416pbb.118.1446770258909; Thu, 05 Nov 2015 16:37:38 -0800 (PST)
Received: from [192.168.1.5] (c-73-189-176-93.hsd1.ca.comcast.net. [73.189.176.93]) by smtp.gmail.com with ESMTPSA id xe9sm10104667pbc.4.2015.11.05.16.37.37 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 05 Nov 2015 16:37:38 -0800 (PST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Sam Aldrin <aldrin.ietf@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com>
Date: Thu, 5 Nov 2015 16:37:37 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/xWTvQEfsERONeQIbXWEZdVAF9Eo>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 00:37:41 -0000

Need for a new protocol should not be based on how hard or easy it is easy t=
o get ethertype or UDP port. That is procedural pain than technical merit.

I tend to agree with Dino. If NSH could run as a transport client just like a=
ny other application, we should do that. Otherwise authors should provide mo=
re stronger reasons on why NSH is different and the need for a new protocol.=
=20

AFAIK, every protocol started off with being lightweight and simple, till ne=
w one came up :D

Sam

Sent from my iPhone

> On Nov 5, 2015, at 4:21 PM, Dino Farinacci <farinacci@gmail.com> wrote:
>=20
> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over a=
nything. And then every encapsulation spec doesn=E2=80=99t need to special c=
ase NSH.
>=20
> Like the analogy I used at the mic =E2=80=A6 why doest=E2=80=99t VXLAN-GPE=
 have a code point for DNS?  ;-)
>=20
> Answer: it makes no sense. Run NSH as a transport layer client and it will=
 work over everything we have already built and has a good chance to work ov=
er anything we will build.
>=20
> NSH is no more an overlay than SMTP is for email.
>=20
> Dino
>=20
>> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote:=

>>=20
>> It is definitely a useful option to run directly over Ethernet to allow f=
or small scale environments which don=E2=80=99t need NVO3 overlays.
>>=20
>> Cheers,
>>=20
>> Paul
>>=20
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
>> Sent: Thursday, November 05, 2015 5:08 AM
>> To: Surendra Kumar (smkumar); Alia Atlas
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>=20
>> If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
>>=20
>> Lucy
>>=20
>> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]=20
>> Sent: Thursday, November 05, 2015 4:12 AM
>> To: Alia Atlas; Lucy yong
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>=20
>> I did go through the process of getting the ethertype for NSH and I also h=
ave obtained a UDP port# in the past. I have to agree with Alia.
>>=20
>> Lucy,
>> I appreciate you guys taking a crack at NSH over GRE over UDP nested enca=
psulation. It simply calls for unnecessary overhead and complexity in formul=
ating and processing such a packet along the tunnel path.
>>=20
>> I admit i have not read your draft yet, will certainly do.
>>=20
>> Regard,
>> Surendra.
>>=20
>>=20
>>=20
>> Sent from a thumb typed device.
>>=20
>>=20
>> -------- Original message --------
>> From: Alia Atlas <akatlas@gmail.com>=20
>> Date: 2015/11/05 6:18 PM (GMT+09:00)=20
>> To: Lucy yong <lucy.yong@huawei.com>=20
>> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, sfc=
@ietf.org=20
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport=20
>>=20
>> <no-hats>=20
>> I think that getting a UDP port is a lot more straightforward than an Eth=
ertype.
>> Not having extra bytes is also an advantage.
>>=20
>> Regards,
>> Alia=20
>> </no-hats>
>>=20
>> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> wrote:
>> Hi Larry,
>>=20
>> The benefit is to avoid working a UDP transport for NSH.
>>=20
>> Thanks,
>> Lucy
>>=20
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeg=
er)
>> Sent: Thursday, November 05, 2015 1:45 AM
>> To: sarikaya@ieee.org
>> Cc: sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>=20
>> Hi Behcet,
>>=20
>> I=C2=B9m not sure I=C2=B9m following what your point is.  It is true that=
 VXLAN-GPE also adds additional overhead which may not always be needed.  Ca=
rrying NSH directly over UDP avoids that as well.  Lucy brought up a new opt=
ion that I had never heard suggested before, which was to carry NSH in GRE o=
ver UDP.  This adds a GRE header in between the UDP header and NSH, but in m=
y opinion doesn=C2=B9t bring any benefits - just more overhead and complicat=
ion.
>>=20
>> Thanks, Larry
>>=20
>>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>>>=20
>>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
>>> <kreeger@cisco.com> wrote:
>>>> Hi Lucy,
>>>>=20
>>>> One of the motivations for carrying NSH directly on UDP is to avoid
>>>> unnecessary overhead or complication.  Adding the GRE header in
>>>> between does  not seem to add any additional benefit that I can see =C2=
=AD
>>>> only additional  overhead.
>>>=20
>>> The point was not with VXLAN-GPE.
>>>=20
>>> Behcet
>>>> Thanks, Larry
>>>>=20
>>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
>>>> <lucy.yong@huawei.com>
>>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>>=20
>>>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>>> that  nsh can use for the transport; just need to register an
>>>> Ethertype for nsh.
>>>> The gre/udp transport provides all features nsh needs with additional
>>>> security capability.
>>>>=20
>>>>=20
>>>>=20
>>>> Lucy
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> nvo3 mailing list
> nvo3@ietf.org
> https://www.ietf.org/mailman/listinfo/nvo3


From nobody Thu Nov  5 17:28:39 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB6BA1A012D; Thu,  5 Nov 2015 17:28:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Za_RzX_T0wrB; Thu,  5 Nov 2015 17:28:35 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE77D1A039C; Thu,  5 Nov 2015 17:28:30 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BZZ22769; Fri, 06 Nov 2015 01:28:28 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 6 Nov 2015 01:28:27 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 17:28:23 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: Sam Aldrin <aldrin.ietf@gmail.com>, Dino Farinacci <farinacci@gmail.com>
Thread-Topic: [nvo3] [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nj0aAgAADXYD//5JgsIAAh9IAgAAO1gD//6qAIIABP+wAgAAC+oCAAASEgP//hQcw
Date: Fri, 6 Nov 2015 01:28:22 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com>
In-Reply-To: <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.187.136]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.563C023C.009B, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 055928c503e6cc4f1d3333df8c2adbf0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/BjOxVVHlviZOvf7ZWX1hjMcHlic>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 01:28:38 -0000

ICANCg0KTmVlZCBmb3IgYSBuZXcgcHJvdG9jb2wgc2hvdWxkIG5vdCBiZSBiYXNlZCBvbiBob3cg
aGFyZCBvciBlYXN5IGl0IGlzIGVhc3kgdG8gZ2V0IGV0aGVydHlwZSBvciBVRFAgcG9ydC4gVGhh
dCBpcyBwcm9jZWR1cmFsIHBhaW4gdGhhbiB0ZWNobmljYWwgbWVyaXQuDQpbTHVjeV0gQWdyZWUu
DQoNCkkgdGVuZCB0byBhZ3JlZSB3aXRoIERpbm8uIElmIE5TSCBjb3VsZCBydW4gYXMgYSB0cmFu
c3BvcnQgY2xpZW50IGp1c3QgbGlrZSBhbnkgb3RoZXIgYXBwbGljYXRpb24sIHdlIHNob3VsZCBk
byB0aGF0LiBPdGhlcndpc2UgYXV0aG9ycyBzaG91bGQgcHJvdmlkZSBtb3JlIHN0cm9uZ2VyIHJl
YXNvbnMgb24gd2h5IE5TSCBpcyBkaWZmZXJlbnQgYW5kIHRoZSBuZWVkIGZvciBhIG5ldyBwcm90
b2NvbC4gDQpbTHVjeV0gVGhlIHJlYXNvbiB0aGF0IFNGQyBXRyBjaGFydGVyIGV4cGxpY2l0bHkg
c3RhdGVzIHRvIHdvcmsgb24gdHJhbnNwb3J0IGluZGVwZW5kZW50IFNGQyBwcm90b2NvbCBpcyB0
aGF0IFNGQyBjYW4gYmUgZGVwbG95ZWQgaW4gZGlmZmVyZW50IHRyYW5zcG9ydCBuZXR3b3Jrcy4g
SGF2aW5nIE5TSCBhcyBhbiBhcHBsaWNhdGlvbiBhbmQgYSB0cmFuc3BvcnQgKEw0KSBjbGllbnQg
aXMgbm90IGVmZmljaWVudCBmb3IgbWFueSB0cmFuc3BvcnQgbmV0d29ya3MgYW5kIGludHJvZHVj
ZSBvcGVyYXRpb24gY29tcGxleC4NCg0KTHVjeQ0KDQpBRkFJSywgZXZlcnkgcHJvdG9jb2wgc3Rh
cnRlZCBvZmYgd2l0aCBiZWluZyBsaWdodHdlaWdodCBhbmQgc2ltcGxlLCB0aWxsIG5ldyBvbmUg
Y2FtZSB1cCA6RA0KDQpTYW0NCg0KU2VudCBmcm9tIG15IGlQaG9uZQ0KDQo+IE9uIE5vdiA1LCAy
MDE1LCBhdCA0OjIxIFBNLCBEaW5vIEZhcmluYWNjaSA8ZmFyaW5hY2NpQGdtYWlsLmNvbT4gd3Jv
dGU6DQo+IA0KPiBBcyBJIG1lbnRpb25lZCBhdCB0aGUgbWljLCBpZiBOU0ggcnVucyBvdmVyIFVE
UC9JUCwgdGhlbiBpdCBjYW4gcnVuIG92ZXIgYW55dGhpbmcuIEFuZCB0aGVuIGV2ZXJ5IGVuY2Fw
c3VsYXRpb24gc3BlYyBkb2VzbuKAmXQgbmVlZCB0byBzcGVjaWFsIGNhc2UgTlNILg0KPiANCj4g
TGlrZSB0aGUgYW5hbG9neSBJIHVzZWQgYXQgdGhlIG1pYyDigKYgd2h5IGRvZXN04oCZdCBWWExB
Ti1HUEUgaGF2ZSBhIGNvZGUgDQo+IHBvaW50IGZvciBETlM/ICA7LSkNCj4gDQo+IEFuc3dlcjog
aXQgbWFrZXMgbm8gc2Vuc2UuIFJ1biBOU0ggYXMgYSB0cmFuc3BvcnQgbGF5ZXIgY2xpZW50IGFu
ZCBpdCB3aWxsIHdvcmsgb3ZlciBldmVyeXRoaW5nIHdlIGhhdmUgYWxyZWFkeSBidWlsdCBhbmQg
aGFzIGEgZ29vZCBjaGFuY2UgdG8gd29yayBvdmVyIGFueXRoaW5nIHdlIHdpbGwgYnVpbGQuDQo+
IA0KPiBOU0ggaXMgbm8gbW9yZSBhbiBvdmVybGF5IHRoYW4gU01UUCBpcyBmb3IgZW1haWwuDQo+
IA0KPiBEaW5vDQo+IA0KPj4gT24gTm92IDUsIDIwMTUsIGF0IDQ6MTAgUE0sIEJvdHRvcmZmLCBQ
YXVsIDxwYXVsLmJvdHRvcmZmQGhwZS5jb20+IHdyb3RlOg0KPj4gDQo+PiBJdCBpcyBkZWZpbml0
ZWx5IGEgdXNlZnVsIG9wdGlvbiB0byBydW4gZGlyZWN0bHkgb3ZlciBFdGhlcm5ldCB0byBhbGxv
dyBmb3Igc21hbGwgc2NhbGUgZW52aXJvbm1lbnRzIHdoaWNoIGRvbuKAmXQgbmVlZCBOVk8zIG92
ZXJsYXlzLg0KPj4gDQo+PiBDaGVlcnMsDQo+PiANCj4+IFBhdWwNCj4+IA0KPj4gRnJvbTogc2Zj
IFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBMdWN5IHlvbmcNCj4+
IFNlbnQ6IFRodXJzZGF5LCBOb3ZlbWJlciAwNSwgMjAxNSA1OjA4IEFNDQo+PiBUbzogU3VyZW5k
cmEgS3VtYXIgKHNta3VtYXIpOyBBbGlhIEF0bGFzDQo+PiBDYzogc2FyaWtheWFAaWVlZS5vcmc7
IExhcnJ5IEtyZWVnZXIgKGtyZWVnZXIpOyBzZmNAaWV0Zi5vcmcNCj4+IFN1YmplY3Q6IFJlOiBb
c2ZjXSBjb21tZW50IG9uIGRyYWZ0LWt1bWFyLXNmYy1uc2gtdWRwLXRyYW5zcG9ydA0KPj4gDQo+
PiBJZiBTRkMgaXMgZGVwbG95ZWQgaW4gRXRoZXJuZXQgbmV0d29yaywgZG8gd2UgbmVlZCBOU0gg
b3ZlciBFdGhlcm5ldD8NCj4+IA0KPj4gTHVjeQ0KPj4gDQo+PiBGcm9tOiBTdXJlbmRyYSBLdW1h
ciAoc21rdW1hcikgW21haWx0bzpzbWt1bWFyQGNpc2NvLmNvbV0NCj4+IFNlbnQ6IFRodXJzZGF5
LCBOb3ZlbWJlciAwNSwgMjAxNSA0OjEyIEFNDQo+PiBUbzogQWxpYSBBdGxhczsgTHVjeSB5b25n
DQo+PiBDYzogc2FyaWtheWFAaWVlZS5vcmc7IExhcnJ5IEtyZWVnZXIgKGtyZWVnZXIpOyBzZmNA
aWV0Zi5vcmcNCj4+IFN1YmplY3Q6IFJFOiBbc2ZjXSBjb21tZW50IG9uIGRyYWZ0LWt1bWFyLXNm
Yy1uc2gtdWRwLXRyYW5zcG9ydA0KPj4gDQo+PiBJIGRpZCBnbyB0aHJvdWdoIHRoZSBwcm9jZXNz
IG9mIGdldHRpbmcgdGhlIGV0aGVydHlwZSBmb3IgTlNIIGFuZCBJIGFsc28gaGF2ZSBvYnRhaW5l
ZCBhIFVEUCBwb3J0IyBpbiB0aGUgcGFzdC4gSSBoYXZlIHRvIGFncmVlIHdpdGggQWxpYS4NCj4+
IA0KPj4gTHVjeSwNCj4+IEkgYXBwcmVjaWF0ZSB5b3UgZ3V5cyB0YWtpbmcgYSBjcmFjayBhdCBO
U0ggb3ZlciBHUkUgb3ZlciBVRFAgbmVzdGVkIGVuY2Fwc3VsYXRpb24uIEl0IHNpbXBseSBjYWxs
cyBmb3IgdW5uZWNlc3Nhcnkgb3ZlcmhlYWQgYW5kIGNvbXBsZXhpdHkgaW4gZm9ybXVsYXRpbmcg
YW5kIHByb2Nlc3Npbmcgc3VjaCBhIHBhY2tldCBhbG9uZyB0aGUgdHVubmVsIHBhdGguDQo+PiAN
Cj4+IEkgYWRtaXQgaSBoYXZlIG5vdCByZWFkIHlvdXIgZHJhZnQgeWV0LCB3aWxsIGNlcnRhaW5s
eSBkby4NCj4+IA0KPj4gUmVnYXJkLA0KPj4gU3VyZW5kcmEuDQo+PiANCj4+IA0KPj4gDQo+PiBT
ZW50IGZyb20gYSB0aHVtYiB0eXBlZCBkZXZpY2UuDQo+PiANCj4+IA0KPj4gLS0tLS0tLS0gT3Jp
Z2luYWwgbWVzc2FnZSAtLS0tLS0tLQ0KPj4gRnJvbTogQWxpYSBBdGxhcyA8YWthdGxhc0BnbWFp
bC5jb20+DQo+PiBEYXRlOiAyMDE1LzExLzA1IDY6MTggUE0gKEdNVCswOTowMCkNCj4+IFRvOiBM
dWN5IHlvbmcgPGx1Y3kueW9uZ0BodWF3ZWkuY29tPg0KPj4gQ2M6IHNhcmlrYXlhQGllZWUub3Jn
LCAiTGFycnkgS3JlZWdlciAoa3JlZWdlcikiIDxrcmVlZ2VyQGNpc2NvLmNvbT4sIA0KPj4gc2Zj
QGlldGYub3JnDQo+PiBTdWJqZWN0OiBSZTogW3NmY10gY29tbWVudCBvbiBkcmFmdC1rdW1hci1z
ZmMtbnNoLXVkcC10cmFuc3BvcnQNCj4+IA0KPj4gPG5vLWhhdHM+DQo+PiBJIHRoaW5rIHRoYXQg
Z2V0dGluZyBhIFVEUCBwb3J0IGlzIGEgbG90IG1vcmUgc3RyYWlnaHRmb3J3YXJkIHRoYW4gYW4g
RXRoZXJ0eXBlLg0KPj4gTm90IGhhdmluZyBleHRyYSBieXRlcyBpcyBhbHNvIGFuIGFkdmFudGFn
ZS4NCj4+IA0KPj4gUmVnYXJkcywNCj4+IEFsaWENCj4+IDwvbm8taGF0cz4NCj4+IA0KPj4gT24g
VGh1LCBOb3YgNSwgMjAxNSBhdCA0OjE1IEFNLCBMdWN5IHlvbmcgPGx1Y3kueW9uZ0BodWF3ZWku
Y29tPiB3cm90ZToNCj4+IEhpIExhcnJ5LA0KPj4gDQo+PiBUaGUgYmVuZWZpdCBpcyB0byBhdm9p
ZCB3b3JraW5nIGEgVURQIHRyYW5zcG9ydCBmb3IgTlNILg0KPj4gDQo+PiBUaGFua3MsDQo+PiBM
dWN5DQo+PiANCj4+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+PiBGcm9tOiBzZmMgW21h
aWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mIExhcnJ5IEtyZWVnZXIgDQo+
PiAoa3JlZWdlcikNCj4+IFNlbnQ6IFRodXJzZGF5LCBOb3ZlbWJlciAwNSwgMjAxNSAxOjQ1IEFN
DQo+PiBUbzogc2FyaWtheWFAaWVlZS5vcmcNCj4+IENjOiBzZmNAaWV0Zi5vcmcNCj4+IFN1Ympl
Y3Q6IFJlOiBbc2ZjXSBjb21tZW50IG9uIGRyYWZ0LWt1bWFyLXNmYy1uc2gtdWRwLXRyYW5zcG9y
dA0KPj4gDQo+PiBIaSBCZWhjZXQsDQo+PiANCj4+IEnCuW0gbm90IHN1cmUgScK5bSBmb2xsb3dp
bmcgd2hhdCB5b3VyIHBvaW50IGlzLiAgSXQgaXMgdHJ1ZSB0aGF0IFZYTEFOLUdQRSBhbHNvIGFk
ZHMgYWRkaXRpb25hbCBvdmVyaGVhZCB3aGljaCBtYXkgbm90IGFsd2F5cyBiZSBuZWVkZWQuICBD
YXJyeWluZyBOU0ggZGlyZWN0bHkgb3ZlciBVRFAgYXZvaWRzIHRoYXQgYXMgd2VsbC4gIEx1Y3kg
YnJvdWdodCB1cCBhIG5ldyBvcHRpb24gdGhhdCBJIGhhZCBuZXZlciBoZWFyZCBzdWdnZXN0ZWQg
YmVmb3JlLCB3aGljaCB3YXMgdG8gY2FycnkgTlNIIGluIEdSRSBvdmVyIFVEUC4gIFRoaXMgYWRk
cyBhIEdSRSBoZWFkZXIgaW4gYmV0d2VlbiB0aGUgVURQIGhlYWRlciBhbmQgTlNILCBidXQgaW4g
bXkgb3BpbmlvbiBkb2VzbsK5dCBicmluZyBhbnkgYmVuZWZpdHMgLSBqdXN0IG1vcmUgb3Zlcmhl
YWQgYW5kIGNvbXBsaWNhdGlvbi4NCj4+IA0KPj4gVGhhbmtzLCBMYXJyeQ0KPj4gDQo+Pj4gT24g
MTEvNS8xNSwgNDozMiBQTSwgIkJlaGNldCBTYXJpa2F5YSIgPHNhcmlrYXlhMjAxMkBnbWFpbC5j
b20+IHdyb3RlOg0KPj4+IA0KPj4+IE9uIFRodSwgTm92IDUsIDIwMTUgYXQgMToxMCBBTSwgTGFy
cnkgS3JlZWdlciAoa3JlZWdlcikgDQo+Pj4gPGtyZWVnZXJAY2lzY28uY29tPiB3cm90ZToNCj4+
Pj4gSGkgTHVjeSwNCj4+Pj4gDQo+Pj4+IE9uZSBvZiB0aGUgbW90aXZhdGlvbnMgZm9yIGNhcnJ5
aW5nIE5TSCBkaXJlY3RseSBvbiBVRFAgaXMgdG8gYXZvaWQgDQo+Pj4+IHVubmVjZXNzYXJ5IG92
ZXJoZWFkIG9yIGNvbXBsaWNhdGlvbi4gIEFkZGluZyB0aGUgR1JFIGhlYWRlciBpbiANCj4+Pj4g
YmV0d2VlbiBkb2VzICBub3Qgc2VlbSB0byBhZGQgYW55IGFkZGl0aW9uYWwgYmVuZWZpdCB0aGF0
IEkgY2FuIHNlZSANCj4+Pj4gwq0gb25seSBhZGRpdGlvbmFsICBvdmVyaGVhZC4NCj4+PiANCj4+
PiBUaGUgcG9pbnQgd2FzIG5vdCB3aXRoIFZYTEFOLUdQRS4NCj4+PiANCj4+PiBCZWhjZXQNCj4+
Pj4gVGhhbmtzLCBMYXJyeQ0KPj4+PiANCj4+Pj4gRnJvbTogc2ZjIDxzZmMtYm91bmNlc0BpZXRm
Lm9yZz4gb24gYmVoYWxmIG9mIEx1Y3kgeW9uZyANCj4+Pj4gPGx1Y3kueW9uZ0BodWF3ZWkuY29t
Pg0KPj4+PiBEYXRlOiBXZWRuZXNkYXksIE5vdmVtYmVyIDQsIDIwMTUgYXQgMTE6NTkgUE0NCj4+
Pj4gVG86ICJzZmNAaWV0Zi5vcmciIDxzZmNAaWV0Zi5vcmc+DQo+Pj4+IFN1YmplY3Q6IFtzZmNd
IGNvbW1lbnQgb24gZHJhZnQta3VtYXItc2ZjLW5zaC11ZHAtdHJhbnNwb3J0DQo+Pj4+IA0KPj4+
PiBUaGVyZSBpcyBhIGdyZS91ZHAgdHVubmVsIHRyYW5zcG9ydCANCj4+Pj4gKGRyYWZ0LWlldGYt
dHN2d2ctZ3JlLWluLXVkcC0wOCkgdGhhdCAgbnNoIGNhbiB1c2UgZm9yIHRoZSANCj4+Pj4gdHJh
bnNwb3J0OyBqdXN0IG5lZWQgdG8gcmVnaXN0ZXIgYW4gRXRoZXJ0eXBlIGZvciBuc2guDQo+Pj4+
IFRoZSBncmUvdWRwIHRyYW5zcG9ydCBwcm92aWRlcyBhbGwgZmVhdHVyZXMgbnNoIG5lZWRzIHdp
dGggDQo+Pj4+IGFkZGl0aW9uYWwgc2VjdXJpdHkgY2FwYWJpbGl0eS4NCj4+Pj4gDQo+Pj4+IA0K
Pj4+PiANCj4+Pj4gTHVjeQ0KPj4+PiANCj4+Pj4gDQo+Pj4+IF9fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+Pj4+IHNmYyBtYWlsaW5nIGxpc3QNCj4+Pj4g
c2ZjQGlldGYub3JnDQo+Pj4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8v
c2ZjDQo+PiANCj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fDQo+PiBzZmMgbWFpbGluZyBsaXN0DQo+PiBzZmNAaWV0Zi5vcmcNCj4+IGh0dHBzOi8vd3d3
LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo+PiANCj4+IF9fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+PiBzZmMgbWFpbGluZyBsaXN0DQo+PiBz
ZmNAaWV0Zi5vcmcNCj4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2Zj
DQo+PiANCj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
DQo+PiBzZmMgbWFpbGluZyBsaXN0DQo+PiBzZmNAaWV0Zi5vcmcNCj4+IGh0dHBzOi8vd3d3Lmll
dGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo+IA0KPiBfX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fXw0KPiBudm8zIG1haWxpbmcgbGlzdA0KPiBudm8zQGll
dGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbnZvMw0K


From nobody Thu Nov  5 17:31:07 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5C451A0123; Thu,  5 Nov 2015 17:31:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y_0qBRCwovF0; Thu,  5 Nov 2015 17:31:02 -0800 (PST)
Received: from mail-pa0-x234.google.com (mail-pa0-x234.google.com [IPv6:2607:f8b0:400e:c03::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 113691A026F; Thu,  5 Nov 2015 17:31:02 -0800 (PST)
Received: by pacdm15 with SMTP id dm15so80291348pac.3; Thu, 05 Nov 2015 17:31:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=A76yi88ME1koM7rf5eZO9KtDB0sbIn8i83kTC1KTzIY=; b=G0vUQ+acC56ID2FMK/PRZ/UIokasnByu8CGijOpMZIatMgcv7ChZJzSa3EUSyz5wAn +nK8lyXvRGahZORPDHQ3Bx/I9D1iziM3o7ZkxSZkn2YhkeDTMcJMxV3sbhu79epo/obK QnVIsHp+zAAPE0rpSGJXsbSZjiu0nNPuAqOOFgqNczR8aglrveczYpplbjrKxIAIBW/5 t3TR163w0+cAfUwjHQS6csIcMLFaBf/61Qlu6olZBtOeGiFiYnH7XB+Wjn7yD+wOpFDu //opGmh+4fjPAXcgewEvOx8b8o4eBx1sCDh1KKQQ22IpVVAvrIRCjt/Ibl1nhMtp1KN9 qbZA==
X-Received: by 10.68.142.37 with SMTP id rt5mr13639539pbb.64.1446773461660; Thu, 05 Nov 2015 17:31:01 -0800 (PST)
Received: from t20010c400000308028a91aeec12dfbcc.v6.meeting.ietf94.jp (t20010c400000308028a91aeec12dfbcc.v6.meeting.ietf94.jp. [2001:c40:0:3080:28a9:1aee:c12d:fbcc]) by smtp.gmail.com with ESMTPSA id yz3sm10198537pbb.37.2015.11.05.17.30.58 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 05 Nov 2015 17:31:00 -0800 (PST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm>
Date: Thu, 5 Nov 2015 17:30:56 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <86EE498A-ED2E-4400-AFD9-01FF51A52793@gmail.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com> <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm>
To: Lucy Yong <lucy.yong@huawei.com>
X-Mailer: Apple Mail (2.2104)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/19ViQVsPqj1KtQ5HcExJxJ07dpw>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Alia Atlas <akatlas@gmail.com>, Sam Aldrin <aldrin.ietf@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 01:31:04 -0000

Lucy, an IP packet can run over *any* transport network.

Dino

> On Nov 5, 2015, at 5:28 PM, Lucy yong <lucy.yong@huawei.com> wrote:
>=20
>=20
>=20
> Need for a new protocol should not be based on how hard or easy it is =
easy to get ethertype or UDP port. That is procedural pain than =
technical merit.
> [Lucy] Agree.
>=20
> I tend to agree with Dino. If NSH could run as a transport client just =
like any other application, we should do that. Otherwise authors should =
provide more stronger reasons on why NSH is different and the need for a =
new protocol.=20
> [Lucy] The reason that SFC WG charter explicitly states to work on =
transport independent SFC protocol is that SFC can be deployed in =
different transport networks. Having NSH as an application and a =
transport (L4) client is not efficient for many transport networks and =
introduce operation complex.
>=20
> Lucy
>=20
> AFAIK, every protocol started off with being lightweight and simple, =
till new one came up :D
>=20
> Sam
>=20
> Sent from my iPhone
>=20
>> On Nov 5, 2015, at 4:21 PM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>>=20
>> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run =
over anything. And then every encapsulation spec doesn=E2=80=99t need to =
special case NSH.
>>=20
>> Like the analogy I used at the mic =E2=80=A6 why doest=E2=80=99t =
VXLAN-GPE have a code=20
>> point for DNS?  ;-)
>>=20
>> Answer: it makes no sense. Run NSH as a transport layer client and it =
will work over everything we have already built and has a good chance to =
work over anything we will build.
>>=20
>> NSH is no more an overlay than SMTP is for email.
>>=20
>> Dino
>>=20
>>> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> =
wrote:
>>>=20
>>> It is definitely a useful option to run directly over Ethernet to =
allow for small scale environments which don=E2=80=99t need NVO3 =
overlays.
>>>=20
>>> Cheers,
>>>=20
>>> Paul
>>>=20
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
>>> Sent: Thursday, November 05, 2015 5:08 AM
>>> To: Surendra Kumar (smkumar); Alia Atlas
>>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> If SFC is deployed in Ethernet network, do we need NSH over =
Ethernet?
>>>=20
>>> Lucy
>>>=20
>>> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
>>> Sent: Thursday, November 05, 2015 4:12 AM
>>> To: Alia Atlas; Lucy yong
>>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>>> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> I did go through the process of getting the ethertype for NSH and I =
also have obtained a UDP port# in the past. I have to agree with Alia.
>>>=20
>>> Lucy,
>>> I appreciate you guys taking a crack at NSH over GRE over UDP nested =
encapsulation. It simply calls for unnecessary overhead and complexity =
in formulating and processing such a packet along the tunnel path.
>>>=20
>>> I admit i have not read your draft yet, will certainly do.
>>>=20
>>> Regard,
>>> Surendra.
>>>=20
>>>=20
>>>=20
>>> Sent from a thumb typed device.
>>>=20
>>>=20
>>> -------- Original message --------
>>> From: Alia Atlas <akatlas@gmail.com>
>>> Date: 2015/11/05 6:18 PM (GMT+09:00)
>>> To: Lucy yong <lucy.yong@huawei.com>
>>> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com>,=20
>>> sfc@ietf.org
>>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> <no-hats>
>>> I think that getting a UDP port is a lot more straightforward than =
an Ethertype.
>>> Not having extra bytes is also an advantage.
>>>=20
>>> Regards,
>>> Alia
>>> </no-hats>
>>>=20
>>> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> =
wrote:
>>> Hi Larry,
>>>=20
>>> The benefit is to avoid working a UDP transport for NSH.
>>>=20
>>> Thanks,
>>> Lucy
>>>=20
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger=20=

>>> (kreeger)
>>> Sent: Thursday, November 05, 2015 1:45 AM
>>> To: sarikaya@ieee.org
>>> Cc: sfc@ietf.org
>>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> Hi Behcet,
>>>=20
>>> I=C2=B9m not sure I=C2=B9m following what your point is.  It is true =
that VXLAN-GPE also adds additional overhead which may not always be =
needed.  Carrying NSH directly over UDP avoids that as well.  Lucy =
brought up a new option that I had never heard suggested before, which =
was to carry NSH in GRE over UDP.  This adds a GRE header in between the =
UDP header and NSH, but in my opinion doesn=C2=B9t bring any benefits - =
just more overhead and complication.
>>>=20
>>> Thanks, Larry
>>>=20
>>>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> =
wrote:
>>>>=20
>>>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
>>>> <kreeger@cisco.com> wrote:
>>>>> Hi Lucy,
>>>>>=20
>>>>> One of the motivations for carrying NSH directly on UDP is to =
avoid=20
>>>>> unnecessary overhead or complication.  Adding the GRE header in=20
>>>>> between does  not seem to add any additional benefit that I can =
see=20
>>>>> only additional  overhead.
>>>>=20
>>>> The point was not with VXLAN-GPE.
>>>>=20
>>>> Behcet
>>>>> Thanks, Larry
>>>>>=20
>>>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
>>>>> <lucy.yong@huawei.com>
>>>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>>>=20
>>>>> There is a gre/udp tunnel transport=20
>>>>> (draft-ietf-tsvwg-gre-in-udp-08) that  nsh can use for the=20
>>>>> transport; just need to register an Ethertype for nsh.
>>>>> The gre/udp transport provides all features nsh needs with=20
>>>>> additional security capability.
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> Lucy
>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> nvo3 mailing list
>> nvo3@ietf.org
>> https://www.ietf.org/mailman/listinfo/nvo3
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov  5 17:35:01 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD76F1A1A04; Thu,  5 Nov 2015 17:34:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rf1rNXZKwTAR; Thu,  5 Nov 2015 17:34:56 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 070481A19F7; Thu,  5 Nov 2015 17:34:55 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BZZ23087; Fri, 06 Nov 2015 01:34:54 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 6 Nov 2015 01:34:53 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 17:34:44 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: Dino Farinacci <farinacci@gmail.com>
Thread-Topic: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRGDLS65VjTuYLlEyLYqcDkvykBZ6ONeoQ
Date: Fri, 6 Nov 2015 01:34:43 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D57207D89@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com> <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm> <86EE498A-ED2E-4400-AFD9-01FF51A52793@gmail.com>
In-Reply-To: <86EE498A-ED2E-4400-AFD9-01FF51A52793@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.187.136]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.563C03BE.00B1, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 3306a0997bcfea404ea025cc59bcdae7
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/izPDTLSxTm9zEgBLidlB4Yz826Y>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Alia Atlas <akatlas@gmail.com>, Sam Aldrin <aldrin.ietf@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 01:34:59 -0000
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From nobody Thu Nov  5 17:35:47 2015
Return-Path: <aldrin.ietf@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DC3A1A026F; Thu,  5 Nov 2015 17:35:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S7WglH3NT4fD; Thu,  5 Nov 2015 17:35:43 -0800 (PST)
Received: from mail-pa0-x231.google.com (mail-pa0-x231.google.com [IPv6:2607:f8b0:400e:c03::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7426F1A039F; Thu,  5 Nov 2015 17:35:43 -0800 (PST)
Received: by pasz6 with SMTP id z6so108682643pas.2; Thu, 05 Nov 2015 17:35:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=+5M5auMZkunbBNobJkTLYnApvLL1azFQRFiueP6D0kk=; b=kPXZ556GXYD6AgWsb8Ip4jT3pyhwXNVYFFYaqe9URuNjst4gkTpZvS+92b0A16vHmz DMmQuwdRXNcEcQmU+w+qKIekL57WnHwThQmd43a1qHKrYcoVofO64/K/WdptLFTtPnXt XvEE2AcVCcK848Pn5OpKncSahFpvAXBMeEKEU5MukVJ4BPM083zBAI0R0IzDHgu4mxN+ uV8W9+bSXOP5Iz0K0I6nr/v31EbcRv47abdnzo7GtkdQ6B7/LLQ/h1QuYVCKJllT96vq c5dk6aeN0WUfXzaa3CqFX4hYd4KJ6yJ73rXPS1XhlWeEZZ0cPmlssuUThKmd8X1p5cFc Qy2A==
X-Received: by 10.66.158.97 with SMTP id wt1mr13901538pab.155.1446773742988; Thu, 05 Nov 2015 17:35:42 -0800 (PST)
Received: from [192.168.1.10] (c-73-189-176-93.hsd1.ca.comcast.net. [73.189.176.93]) by smtp.gmail.com with ESMTPSA id qv5sm10167389pbc.71.2015.11.05.17.35.41 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 05 Nov 2015 17:35:42 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_49931A4A-08BF-44F9-AFF5-1B16309959E5"
Mime-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
From: Sam Aldrin <aldrin.ietf@gmail.com>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm>
Date: Thu, 5 Nov 2015 17:35:40 -0800
Message-Id: <6441EBDB-3339-458B-9AA2-F083CB68941D@gmail.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com> <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm>
To: Lucy yong <lucy.yong@huawei.com>
X-Mailer: Apple Mail (2.3096.5)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/DDu-vyN3-5iuJY0DSD-U8OINlzE>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Dino Farinacci <farinacci@gmail.com>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 01:35:46 -0000

--Apple-Mail=_49931A4A-08BF-44F9-AFF5-1B16309959E5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Nov 5, 2015, at 5:28 PM, Lucy yong <lucy.yong@huawei.com> wrote:
>=20
>=20
>=20
> Need for a new protocol should not be based on how hard or easy it is =
easy to get ethertype or UDP port. That is procedural pain than =
technical merit.
> [Lucy] Agree.
>=20
> I tend to agree with Dino. If NSH could run as a transport client just =
like any other application, we should do that. Otherwise authors should =
provide more stronger reasons on why NSH is different and the need for a =
new protocol.=20
> [Lucy] The reason that SFC WG charter explicitly states to work on =
transport independent SFC protocol is that SFC can be deployed in =
different transport networks.
We have IP and it works,=20
> Having NSH as an application and a transport (L4) client is not =
efficient for many transport networks and introduce operation complex.
May be, May be not. That is something to be brought forth to make a =
strong case for.

-sam
>=20
> Lucy
>=20
> AFAIK, every protocol started off with being lightweight and simple, =
till new one came up :D
>=20
> Sam
>=20
> Sent from my iPhone
>=20
>> On Nov 5, 2015, at 4:21 PM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>>=20
>> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run =
over anything. And then every encapsulation spec doesn=E2=80=99t need to =
special case NSH.
>>=20
>> Like the analogy I used at the mic =E2=80=A6 why doest=E2=80=99t =
VXLAN-GPE have a code=20
>> point for DNS?  ;-)
>>=20
>> Answer: it makes no sense. Run NSH as a transport layer client and it =
will work over everything we have already built and has a good chance to =
work over anything we will build.
>>=20
>> NSH is no more an overlay than SMTP is for email.
>>=20
>> Dino
>>=20
>>> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> =
wrote:
>>>=20
>>> It is definitely a useful option to run directly over Ethernet to =
allow for small scale environments which don=E2=80=99t need NVO3 =
overlays.
>>>=20
>>> Cheers,
>>>=20
>>> Paul
>>>=20
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
>>> Sent: Thursday, November 05, 2015 5:08 AM
>>> To: Surendra Kumar (smkumar); Alia Atlas
>>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> If SFC is deployed in Ethernet network, do we need NSH over =
Ethernet?
>>>=20
>>> Lucy
>>>=20
>>> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
>>> Sent: Thursday, November 05, 2015 4:12 AM
>>> To: Alia Atlas; Lucy yong
>>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>>> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> I did go through the process of getting the ethertype for NSH and I =
also have obtained a UDP port# in the past. I have to agree with Alia.
>>>=20
>>> Lucy,
>>> I appreciate you guys taking a crack at NSH over GRE over UDP nested =
encapsulation. It simply calls for unnecessary overhead and complexity =
in formulating and processing such a packet along the tunnel path.
>>>=20
>>> I admit i have not read your draft yet, will certainly do.
>>>=20
>>> Regard,
>>> Surendra.
>>>=20
>>>=20
>>>=20
>>> Sent from a thumb typed device.
>>>=20
>>>=20
>>> -------- Original message --------
>>> From: Alia Atlas <akatlas@gmail.com>
>>> Date: 2015/11/05 6:18 PM (GMT+09:00)
>>> To: Lucy yong <lucy.yong@huawei.com>
>>> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com>,=20
>>> sfc@ietf.org
>>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> <no-hats>
>>> I think that getting a UDP port is a lot more straightforward than =
an Ethertype.
>>> Not having extra bytes is also an advantage.
>>>=20
>>> Regards,
>>> Alia
>>> </no-hats>
>>>=20
>>> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> =
wrote:
>>> Hi Larry,
>>>=20
>>> The benefit is to avoid working a UDP transport for NSH.
>>>=20
>>> Thanks,
>>> Lucy
>>>=20
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger=20=

>>> (kreeger)
>>> Sent: Thursday, November 05, 2015 1:45 AM
>>> To: sarikaya@ieee.org
>>> Cc: sfc@ietf.org
>>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>=20
>>> Hi Behcet,
>>>=20
>>> I=C2=B9m not sure I=C2=B9m following what your point is.  It is true =
that VXLAN-GPE also adds additional overhead which may not always be =
needed.  Carrying NSH directly over UDP avoids that as well.  Lucy =
brought up a new option that I had never heard suggested before, which =
was to carry NSH in GRE over UDP.  This adds a GRE header in between the =
UDP header and NSH, but in my opinion doesn=C2=B9t bring any benefits - =
just more overhead and complication.
>>>=20
>>> Thanks, Larry
>>>=20
>>>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> =
wrote:
>>>>=20
>>>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
>>>> <kreeger@cisco.com> wrote:
>>>>> Hi Lucy,
>>>>>=20
>>>>> One of the motivations for carrying NSH directly on UDP is to =
avoid=20
>>>>> unnecessary overhead or complication.  Adding the GRE header in=20
>>>>> between does  not seem to add any additional benefit that I can =
see=20
>>>>> only additional  overhead.
>>>>=20
>>>> The point was not with VXLAN-GPE.
>>>>=20
>>>> Behcet
>>>>> Thanks, Larry
>>>>>=20
>>>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
>>>>> <lucy.yong@huawei.com>
>>>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>>>=20
>>>>> There is a gre/udp tunnel transport=20
>>>>> (draft-ietf-tsvwg-gre-in-udp-08) that  nsh can use for the=20
>>>>> transport; just need to register an Ethertype for nsh.
>>>>> The gre/udp transport provides all features nsh needs with=20
>>>>> additional security capability.
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> Lucy
>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> nvo3 mailing list
>> nvo3@ietf.org
>> https://www.ietf.org/mailman/listinfo/nvo3
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>

--Apple-Mail=_49931A4A-08BF-44F9-AFF5-1B16309959E5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Nov 5, 2015, at 5:28 PM, Lucy yong &lt;<a =
href=3D"mailto:lucy.yong@huawei.com" =
class=3D"">lucy.yong@huawei.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" class=3D"">Need for a new protocol should not be =
based on how hard or easy it is easy to get ethertype or UDP port. That =
is procedural pain than technical merit.</span><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" class=3D"">[Lucy] Agree.</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" class=3D"">I tend to agree with Dino. If NSH could =
run as a transport client just like any other application, we should do =
that. Otherwise authors should provide more stronger reasons on why NSH =
is different and the need for a new protocol.<span =
class=3D"Apple-converted-space">&nbsp;</span></span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">[Lucy] The reason that SFC =
WG charter explicitly states to work on transport independent SFC =
protocol is that SFC can be deployed in different transport =
networks.</span></div></blockquote>We have IP and it works,&nbsp;<br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><span =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D""> Having NSH as an application and a transport =
(L4) client is not efficient for many transport networks and introduce =
operation complex.</span><br style=3D"font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""></div></blockquote><div>May be, May be not. That is something =
to be brought forth to make a strong case for.</div><div><br =
class=3D""></div><div>-sam</div><blockquote type=3D"cite" class=3D""><div =
class=3D""><br style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">Lucy</span><br style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">AFAIK, every protocol =
started off with being lightweight and simple, till new one came up =
:D</span><br style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">Sam</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" class=3D"">Sent from my iPhone</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D"">On =
Nov 5, 2015, at 4:21 PM, Dino Farinacci &lt;<a =
href=3D"mailto:farinacci@gmail.com" class=3D"">farinacci@gmail.com</a>&gt;=
 wrote:<br class=3D""><br class=3D"">As I mentioned at the mic, if NSH =
runs over UDP/IP, then it can run over anything. And then every =
encapsulation spec doesn=E2=80=99t need to special case NSH.<br =
class=3D""><br class=3D"">Like the analogy I used at the mic =E2=80=A6 =
why doest=E2=80=99t VXLAN-GPE have a code<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">point for =
DNS? &nbsp;;-)<br class=3D""><br class=3D"">Answer: it makes no sense. =
Run NSH as a transport layer client and it will work over everything we =
have already built and has a good chance to work over anything we will =
build.<br class=3D""><br class=3D"">NSH is no more an overlay than SMTP =
is for email.<br class=3D""><br class=3D"">Dino<br class=3D""><br =
class=3D""><blockquote type=3D"cite" class=3D"">On Nov 5, 2015, at 4:10 =
PM, Bottorff, Paul &lt;<a href=3D"mailto:paul.bottorff@hpe.com" =
class=3D"">paul.bottorff@hpe.com</a>&gt; wrote:<br class=3D""><br =
class=3D"">It is definitely a useful option to run directly over =
Ethernet to allow for small scale environments which don=E2=80=99t need =
NVO3 overlays.<br class=3D""><br class=3D"">Cheers,<br class=3D""><br =
class=3D"">Paul<br class=3D""><br class=3D"">From: sfc [<a =
href=3D"mailto:sfc-bounces@ietf.org" =
class=3D"">mailto:sfc-bounces@ietf.org</a>] On Behalf Of Lucy yong<br =
class=3D"">Sent: Thursday, November 05, 2015 5:08 AM<br class=3D"">To: =
Surendra Kumar (smkumar); Alia Atlas<br class=3D"">Cc: <a =
href=3D"mailto:sarikaya@ieee.org" class=3D"">sarikaya@ieee.org</a>; =
Larry Kreeger (kreeger); <a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br class=3D"">Subject: Re: [sfc] comment on =
draft-kumar-sfc-nsh-udp-transport<br class=3D""><br class=3D"">If SFC is =
deployed in Ethernet network, do we need NSH over Ethernet?<br =
class=3D""><br class=3D"">Lucy<br class=3D""><br class=3D"">From: =
Surendra Kumar (smkumar) [<a href=3D"mailto:smkumar@cisco.com" =
class=3D"">mailto:smkumar@cisco.com</a>]<br class=3D"">Sent: Thursday, =
November 05, 2015 4:12 AM<br class=3D"">To: Alia Atlas; Lucy yong<br =
class=3D"">Cc: <a href=3D"mailto:sarikaya@ieee.org" =
class=3D"">sarikaya@ieee.org</a>; Larry Kreeger (kreeger); <a =
href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br =
class=3D"">Subject: RE: [sfc] comment on =
draft-kumar-sfc-nsh-udp-transport<br class=3D""><br class=3D"">I did go =
through the process of getting the ethertype for NSH and I also have =
obtained a UDP port# in the past. I have to agree with Alia.<br =
class=3D""><br class=3D"">Lucy,<br class=3D"">I appreciate you guys =
taking a crack at NSH over GRE over UDP nested encapsulation. It simply =
calls for unnecessary overhead and complexity in formulating and =
processing such a packet along the tunnel path.<br class=3D""><br =
class=3D"">I admit i have not read your draft yet, will certainly do.<br =
class=3D""><br class=3D"">Regard,<br class=3D"">Surendra.<br =
class=3D""><br class=3D""><br class=3D""><br class=3D"">Sent from a =
thumb typed device.<br class=3D""><br class=3D""><br class=3D"">-------- =
Original message --------<br class=3D"">From: Alia Atlas &lt;<a =
href=3D"mailto:akatlas@gmail.com" class=3D"">akatlas@gmail.com</a>&gt;<br =
class=3D"">Date: 2015/11/05 6:18 PM (GMT+09:00)<br class=3D"">To: Lucy =
yong &lt;<a href=3D"mailto:lucy.yong@huawei.com" =
class=3D"">lucy.yong@huawei.com</a>&gt;<br class=3D"">Cc: <a =
href=3D"mailto:sarikaya@ieee.org" class=3D"">sarikaya@ieee.org</a>, =
"Larry Kreeger (kreeger)" &lt;<a href=3D"mailto:kreeger@cisco.com" =
class=3D"">kreeger@cisco.com</a>&gt;,<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><a =
href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br =
class=3D"">Subject: Re: [sfc] comment on =
draft-kumar-sfc-nsh-udp-transport<br class=3D""><br =
class=3D"">&lt;no-hats&gt;<br class=3D"">I think that getting a UDP port =
is a lot more straightforward than an Ethertype.<br class=3D"">Not =
having extra bytes is also an advantage.<br class=3D""><br =
class=3D"">Regards,<br class=3D"">Alia<br class=3D"">&lt;/no-hats&gt;<br =
class=3D""><br class=3D"">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong =
&lt;lucy.yong@huawei.com&gt; wrote:<br class=3D"">Hi Larry,<br =
class=3D""><br class=3D"">The benefit is to avoid working a UDP =
transport for NSH.<br class=3D""><br class=3D"">Thanks,<br =
class=3D"">Lucy<br class=3D""><br class=3D"">-----Original =
Message-----<br class=3D"">From: sfc [mailto:sfc-bounces@ietf.org] On =
Behalf Of Larry Kreeger<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">(kreeger)<br =
class=3D"">Sent: Thursday, November 05, 2015 1:45 AM<br class=3D"">To: =
sarikaya@ieee.org<br class=3D"">Cc: sfc@ietf.org<br class=3D"">Subject: =
Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br class=3D""><br =
class=3D"">Hi Behcet,<br class=3D""><br class=3D"">I=C2=B9m not sure =
I=C2=B9m following what your point is. &nbsp;It is true that VXLAN-GPE =
also adds additional overhead which may not always be needed. =
&nbsp;Carrying NSH directly over UDP avoids that as well. &nbsp;Lucy =
brought up a new option that I had never heard suggested before, which =
was to carry NSH in GRE over UDP. &nbsp;This adds a GRE header in =
between the UDP header and NSH, but in my opinion doesn=C2=B9t bring any =
benefits - just more overhead and complication.<br class=3D""><br =
class=3D"">Thanks, Larry<br class=3D""><br class=3D""><blockquote =
type=3D"cite" class=3D"">On 11/5/15, 4:32 PM, "Behcet Sarikaya" =
&lt;sarikaya2012@gmail.com&gt; wrote:<br class=3D""><br class=3D"">On =
Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<span =
class=3D"Apple-converted-space">&nbsp;</span><br =
class=3D"">&lt;kreeger@cisco.com&gt; wrote:<br class=3D""><blockquote =
type=3D"cite" class=3D"">Hi Lucy,<br class=3D""><br class=3D"">One of =
the motivations for carrying NSH directly on UDP is to avoid<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">unnecessary =
overhead or complication. &nbsp;Adding the GRE header in<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">between does =
&nbsp;not seem to add any additional benefit that I can see<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">only =
additional &nbsp;overhead.<br class=3D""></blockquote><br class=3D"">The =
point was not with VXLAN-GPE.<br class=3D""><br class=3D"">Behcet<br =
class=3D""><blockquote type=3D"cite" class=3D"">Thanks, Larry<br =
class=3D""><br class=3D"">From: sfc &lt;sfc-bounces@ietf.org&gt; on =
behalf of Lucy yong<span class=3D"Apple-converted-space">&nbsp;</span><br =
class=3D"">&lt;lucy.yong@huawei.com&gt;<br class=3D"">Date: Wednesday, =
November 4, 2015 at 11:59 PM<br class=3D"">To: "sfc@ietf.org" =
&lt;sfc@ietf.org&gt;<br class=3D"">Subject: [sfc] comment on =
draft-kumar-sfc-nsh-udp-transport<br class=3D""><br class=3D"">There is =
a gre/udp tunnel transport<span =
class=3D"Apple-converted-space">&nbsp;</span><br =
class=3D"">(draft-ietf-tsvwg-gre-in-udp-08) that &nbsp;nsh can use for =
the<span class=3D"Apple-converted-space">&nbsp;</span><br =
class=3D"">transport; just need to register an Ethertype for nsh.<br =
class=3D"">The gre/udp transport provides all features nsh needs =
with<span class=3D"Apple-converted-space">&nbsp;</span><br =
class=3D"">additional security capability.<br class=3D""><br =
class=3D""><br class=3D""><br class=3D"">Lucy<br class=3D""><br =
class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D"">sfc@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></blockquote></blockquote><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D"">sfc@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D"">sfc@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D"">sfc@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></blockquote><br =
class=3D"">_______________________________________________<br =
class=3D"">nvo3 mailing list<br class=3D""><a =
href=3D"mailto:nvo3@ietf.org" class=3D"">nvo3@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/nvo3<br =
class=3D""></blockquote><span style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; =
display: inline !important;" =
class=3D"">_______________________________________________</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">sfc mailing list</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><a =
href=3D"mailto:sfc@ietf.org" style=3D"font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D"">sfc@ietf.org</a><br style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a></div></blockquote=
></div><br class=3D""></body></html>=

--Apple-Mail=_49931A4A-08BF-44F9-AFF5-1B16309959E5--


From nobody Thu Nov  5 17:50:52 2015
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 247D11A8788; Thu,  5 Nov 2015 17:50:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yMJH-6-GmVqX; Thu,  5 Nov 2015 17:50:46 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3EF1A1B2AC1; Thu,  5 Nov 2015 17:50:45 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BZZ23982; Fri, 06 Nov 2015 01:50:43 +0000 (GMT)
Received: from DFWEML706-CHM.china.huawei.com (10.193.5.225) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 6 Nov 2015 01:50:42 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml706-chm ([10.193.5.225]) with mapi id 14.03.0235.001; Thu, 5 Nov 2015 17:50:32 -0800
From: Lucy yong <lucy.yong@huawei.com>
To: Sam Aldrin <aldrin.ietf@gmail.com>
Thread-Topic: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRGDN9I6ne+CZLe0+nrpDvHON5RJ6OOmtg
Date: Fri, 6 Nov 2015 01:50:32 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D57207DB6@dfweml701-chm>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <9F812E1E-F487-4626-A074-8E4F2F836BED@gmail.com> <2691CE0099834E4A9C5044EEC662BB9D57207D6B@dfweml701-chm> <6441EBDB-3339-458B-9AA2-F083CB68941D@gmail.com>
In-Reply-To: <6441EBDB-3339-458B-9AA2-F083CB68941D@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.187.136]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D57207DB6dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.563C0773.0113, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 3306a0997bcfea404ea025cc59bcdae7
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/lX2bC_dH8-g69uEPIgN2V1MghVo>
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Dino Farinacci <farinacci@gmail.com>, Larry Kreeger <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 01:50:50 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D57207DB6dfweml701chm_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_2691CE0099834E4A9C5044EEC662BB9D57207DB6dfweml701chm_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_2691CE0099834E4A9C5044EEC662BB9D57207DB6dfweml701chm_--


From nobody Thu Nov  5 23:21:07 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B4481B3280 for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 23:21:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rd6m_oU6fhbu for <sfc@ietfa.amsl.com>; Thu,  5 Nov 2015 23:21:01 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 444691B3128 for <sfc@ietf.org>; Thu,  5 Nov 2015 23:21:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25302; q=dns/txt; s=iport; t=1446794461; x=1448004061; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=t1zPG3RtpdoXrtP7wZS/cWOmSpmXcbw2h4WNvANo+Mk=; b=Vx/nnmY+DskPnidvNfqvua6AsYeSxO+QdqFFZwCFEufB3wmpae9Y0Y8W w7uFOmrtW/JtSoqsmRIiP7cXgJRiuFA0KVD4nzsJGNj0UUQxRmoHSIlXn iUIIkQBVp804r7AQfUqpUBn9ROvZi+Eu+gjmg8N5pK2RuzFRWRly7giRL U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AfAgA8VDxW/4QNJK1egm5NU28GvgsBDYFgFwEJhW8CgTU4FAEBAQEBAQGBCoQ1AQEBBAEBASpBCwwEAgEIEQMBAQEBIAcHIQYLFAkIAgQBDQUIiBEDEg28OA2EPgEBAQEBAQEBAQEBAQEBAQEBAQEBARQEi1KCU4IoDQmEKAWNVIUTg2EBiy+BbYFih2WLMoNgg3EBHwEBQoIOAx2BVnKEDYEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,251,1444694400";  d="scan'208,217";a="205636533"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-7.cisco.com with ESMTP; 06 Nov 2015 07:20:59 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tA67KxMJ004610 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 6 Nov 2015 07:20:59 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 01:20:59 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 01:20:59 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Lucy yong <lucy.yong@huawei.com>, Dave Dolson <ddolson@sandvine.com>, "Alia Atlas" <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAAuKA//+qHBCAAOsZgIAAMgQQ
Date: Fri, 6 Nov 2015 07:20:59 +0000
Message-ID: <8575342074bc4514ba829e99ebfc2b7c@XCH-RCD-020.cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>, <E8355113905631478EFF04F5AA706E9830D88192@wtl-exchp-2.sandvine.com> <0by1y3xsqdhwe9stsmw39mf5.1446732352825@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D57207BB5@dfweml701-chm>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D57207BB5@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.5.248]
Content-Type: multipart/alternative; boundary="_000_8575342074bc4514ba829e99ebfc2b7cXCHRCD020ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AumtK8xPtHIQICdQFJshjHgpusA>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 07:21:06 -0000

--_000_8575342074bc4514ba829e99ebfc2b7cXCHRCD020ciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable



Not sure why you would run UDP directly over L2. It is just a mac-in-mac.


Surendra.

From: Lucy yong [mailto:lucy.yong@huawei.com]
Sent: Thursday, November 05, 2015 2:12 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com>; Dave Dolson <ddolson@sand=
vine.com>; Alia Atlas <akatlas@gmail.com>
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger) <kreeger@cisco.com>; sfc@iet=
f.org
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport


From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 8:10 AM
To: Dave Dolson; Lucy yong; Alia Atlas
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Layer2 tunnels are just fine, they provide topological freedom.
[Lucy] UDP can't be over L2 directly.   You need Ethertype for NSH in L2 sp=
ace.

Lucy

Surendra


Sent from a thumb typed device.


-------- Original message --------
From: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: 2015/11/05 10:17 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>, "Surendr=
a Kumar (smkumar)" <smkumar@cisco.com<mailto:smkumar@cisco.com>>, Alia Atla=
s <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
I find it to be a useful concept when SFF and SF nodes have layer2 connecti=
ons.


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
Sent: Thursday, November 05, 2015 10:08 PM
To: Surendra Kumar (smkumar); Alia Atlas
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_8575342074bc4514ba829e99ebfc2b7cXCHRCD020ciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman",serif;}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma",sans-serif;}
span.emailstyle20
	{mso-style-name:emailstyle20;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.im
	{mso-style-name:im;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<pre><span style=3D"font-family:&quot;Candara&quot;,sans-serif"><o:p>&nbsp;=
</o:p></span></pre>
<pre><span style=3D"font-family:&quot;Candara&quot;,sans-serif">Not sure wh=
y you would run UDP directly over L2. It is just a mac-in-mac.<o:p></o:p></=
span></pre>
<pre><span style=3D"font-family:&quot;Candara&quot;,sans-serif"><o:p>&nbsp;=
</o:p></span></pre>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> Lucy yong [mailto:lucy.yong@hu=
awei.com]
<br>
<b>Sent:</b> Thursday, November 05, 2015 2:12 PM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;smkumar@cisco.com&gt;; Dave Dolson =
&lt;ddolson@sandvine.com&gt;; Alia Atlas &lt;akatlas@gmail.com&gt;<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger) &lt;kreeger@cisco.com=
&gt;; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> Surendra Kumar (smkumar) [</span=
><a href=3D"mailto:smkumar@cisco.com"><span style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,sans-serif">mailto:smkumar@cisco.com</span></a><s=
pan style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">]
<br>
<b>Sent:</b> Thursday, November 05, 2015 8:10 AM<br>
<b>To:</b> Dave Dolson; Lucy yong; Alia Atlas<br>
<b>Cc:</b> </span><a href=3D"mailto:sarikaya@ieee.org"><span style=3D"font-=
size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">sarikaya@ieee.org</s=
pan></a><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans=
-serif">; Larry Kreeger (kreeger);
</span><a href=3D"mailto:sfc@ietf.org"><span style=3D"font-size:10.0pt;font=
-family:&quot;Tahoma&quot;,sans-serif">sfc@ietf.org</span></a><span style=
=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">Layer2 tunnels are just fine, they provide topologic=
al freedom.<o:p></o:p></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,sans-serif;color:#1F497D">[Lucy] UDP can&#8217;t be over =
L2 directly. &nbsp;&nbsp;You need Ethertype for NSH in L2 space.<o:p></o:p>=
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></i></b=
></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,sans-serif;color:#1F497D">Lucy<o:p></o:p></span></i></b><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Dave Dolson &lt;<a href=3D"mailto:ddolson@sandvine.com">ddolson@sandv=
ine.com</a>&gt;
<br>
Date: 2015/11/05 10:17 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt;, &quot;Surendra Kumar (smkumar)&quot; &lt;<a href=3D"mailto:smk=
umar@cisco.com">smkumar@cisco.com</a>&gt;, Alia Atlas &lt;<a href=3D"mailto=
:akatlas@gmail.com">akatlas@gmail.com</a>&gt;
<br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I find it to be a useful concept when=
 SFF and SF nodes have layer2 connections.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [</span><a href=3D"mailto:sf=
c-bounces@ietf.org"><span style=3D"font-size:10.0pt;font-family:&quot;Tahom=
a&quot;,sans-serif">mailto:sfc-bounces@ietf.org</span></a><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">]
<b>On Behalf Of </b>Lucy yong<br>
<b>Sent:</b> Thursday, November 05, 2015 10:08 PM<br>
<b>To:</b> Surendra Kumar (smkumar); Alia Atlas<br>
<b>Cc:</b> </span><a href=3D"mailto:sarikaya@ieee.org"><span style=3D"font-=
size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">sarikaya@ieee.org</s=
pan></a><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans=
-serif">; Larry Kreeger (kreeger);
</span><a href=3D"mailto:sfc@ietf.org"><span style=3D"font-size:10.0pt;font=
-family:&quot;Tahoma&quot;,sans-serif">sfc@ietf.org</span></a><span style=
=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"><br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">If SFC is deployed in Ethernet networ=
k, do we need NSH over Ethernet?</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Lucy</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> Surendra Kumar (smkumar) [</span=
><a href=3D"mailto:smkumar@cisco.com"><span style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,sans-serif">mailto:smkumar@cisco.com</span></a><s=
pan style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> </span><a href=3D"mailto:sarikaya@ieee.org"><span style=3D"font-=
size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">sarikaya@ieee.org</s=
pan></a><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans=
-serif">; Larry Kreeger (kreeger);
</span><a href=3D"mailto:sfc@ietf.org"><span style=3D"font-size:10.0pt;font=
-family:&quot;Tahoma&quot;,sans-serif">sfc@ietf.org</span></a><span style=
=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regard,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:</span><a href=3D"mailto:sfc-bounces@i=
etf.org">sfc-bounces@ietf.org</a><span class=3D"im">] On Behalf Of Larry Kr=
eeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: </span><a href=3D"mailto:sarikaya@ieee.org">sarikaya=
@ieee.org</a><br>
<span class=3D"im">Cc: </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org<=
/a><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_8575342074bc4514ba829e99ebfc2b7cXCHRCD020ciscocom_--


From nobody Fri Nov  6 00:59:46 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B37131AD05F; Fri,  6 Nov 2015 00:59:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q1Ec6kHpxID8; Fri,  6 Nov 2015 00:59:43 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 912101ACE53; Fri,  6 Nov 2015 00:59:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6163; q=dns/txt; s=iport; t=1446800383; x=1448009983; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=qwt5S6gVOl0RgJsWbuSsYEDR9XK9Gdy/nDBsv2Q9Tfk=; b=GV3xFu90uOFyKlOx8mPa8kiD4Iw1+c0F7PMipoeLzn5bCXfusv9XrE5c 7sgRAcNhZvXZiLaLUpj7mJj8vYvn+j6PnCfEnWjd6qqfHtXx5GV9GfGTw 5iR73j/oBttWl0KqUPlWcnGw7ywdYNqx+4ZWSoR/XEdpsj7r2ndxZKRAj 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AeAgCpazxW/4oNJK1egztTbwa+DgENgWAXCoIZg1YCgTY4FAEBAQEBAQGBCoQ1AQEBAwEBAQFrCwUHBAIBCBEDAQEBAScHIQYLFAkIAgQOBQiIEQMKCA28Sw2EPgEBAQEBAQEBAQEBAQEBAQEBAQEBARQEi1KCU4FXEQGEfQWNVIUTg2EBiy+BbYFih2WLMoNgg3EBHwEBQoIOAx2BVnKDUzqBBwEBAQ
X-IronPort-AV: E=Sophos;i="5.20,251,1444694400"; d="scan'208";a="204968651"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-4.cisco.com with ESMTP; 06 Nov 2015 08:59:42 +0000
Received: from XCH-ALN-009.cisco.com (xch-aln-009.cisco.com [173.36.7.19]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tA68xgrC011613 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 6 Nov 2015 08:59:42 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-009.cisco.com (173.36.7.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 02:59:41 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 02:59:41 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Dino Farinacci <farinacci@gmail.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAuVMAgAAC+oCAACcFIA==
Date: Fri, 6 Nov 2015 08:59:41 +0000
Message-ID: <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com>
In-Reply-To: <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.5.248]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/VwM5lBM-oYbKr2yitCjp0DELG1Q>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 08:59:45 -0000

Agree it would run everywhere if NSH is treated as an *application*, as you=
 point out.

The conflict is in how NSH wants to be transport independent. It is suppose=
d to be a feature than violation of layering: proper layering vs. overhead,=
 as shown below.

IP-strata | IP | UDP | NSH |=20
IP-strata | IP | UDP | VXLAN-GPE | IP | UDP | NSH |

Ignoring, other encapsulation of NSH, carrying NSH directly over UDP does m=
aintain that layering while removing the overhead. This draft is doing the =
right thing.

Surendra.


-----Original Message-----
From: Dino Farinacci [mailto:farinacci@gmail.com]=20
Sent: Thursday, November 05, 2015 4:21 PM
To: Bottorff, Paul <paul.bottorff@hpe.com>
Cc: Lucy Yong <lucy.yong@huawei.com>; Surendra Kumar (smkumar) <smkumar@cis=
co.com>; Alia Atlas <akatlas@gmail.com>; sarikaya@ieee.org; Larry Kreeger (=
kreeger) <kreeger@cisco.com>; sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over an=
ything. And then every encapsulation spec doesn't need to special case NSH.

Like the analogy I used at the mic . why doest't VXLAN-GPE have a code poin=
t for DNS?  ;-)

Answer: it makes no sense. Run NSH as a transport layer client and it will =
work over everything we have already built and has a good chance to work ov=
er anything we will build.

NSH is no more an overlay than SMTP is for email.

Dino

> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote:
>=20
> It is definitely a useful option to run directly over Ethernet to allow f=
or small scale environments which don't need NVO3 overlays.
> =20
> Cheers,
> =20
> Paul
> =20
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
> Sent: Thursday, November 05, 2015 5:08 AM
> To: Surendra Kumar (smkumar); Alia Atlas
> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> =20
> If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
> =20
> Lucy
> =20
> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]=20
> Sent: Thursday, November 05, 2015 4:12 AM
> To: Alia Atlas; Lucy yong
> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> =20
> I did go through the process of getting the ethertype for NSH and I also =
have obtained a UDP port# in the past. I have to agree with Alia.
> =20
> Lucy,
> I appreciate you guys taking a crack at NSH over GRE over UDP nested enca=
psulation. It simply calls for unnecessary overhead and complexity in formu=
lating and processing such a packet along the tunnel path.
> =20
> I admit i have not read your draft yet, will certainly do.
> =20
> Regard,
> Surendra.
> =20
> =20
> =20
> Sent from a thumb typed device.
>=20
>=20
> -------- Original message --------
> From: Alia Atlas <akatlas@gmail.com>=20
> Date: 2015/11/05 6:18 PM (GMT+09:00)=20
> To: Lucy yong <lucy.yong@huawei.com>=20
> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, sfc=
@ietf.org=20
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport=20
>=20
> <no-hats>=20
> I think that getting a UDP port is a lot more straightforward than an Eth=
ertype.
> Not having extra bytes is also an advantage.
> =20
> Regards,
> Alia=20
> </no-hats>
> =20
> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> wrote:
> Hi Larry,
>=20
> The benefit is to avoid working a UDP transport for NSH.
>=20
> Thanks,
> Lucy
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeg=
er)
> Sent: Thursday, November 05, 2015 1:45 AM
> To: sarikaya@ieee.org
> Cc: sfc@ietf.org
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> Hi Behcet,
>=20
> I=B9m not sure I=B9m following what your point is.  It is true that VXLAN=
-GPE also adds additional overhead which may not always be needed.  Carryin=
g NSH directly over UDP avoids that as well.  Lucy brought up a new option =
that I had never heard suggested before, which was to carry NSH in GRE over=
 UDP.  This adds a GRE header in between the UDP header and NSH, but in my =
opinion doesn=B9t bring any benefits - just more overhead and complication.
>=20
> Thanks, Larry
>=20
> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>=20
> >On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
> ><kreeger@cisco.com> wrote:
> >> Hi Lucy,
> >>
> >> One of the motivations for carrying NSH directly on UDP is to avoid
> >>unnecessary overhead or complication.  Adding the GRE header in
> >>between does  not seem to add any additional benefit that I can see =AD
> >>only additional  overhead.
> >>
> >
> >The point was not with VXLAN-GPE.
> >
> >Behcet
> >> Thanks, Larry
> >>
> >> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
> >> <lucy.yong@huawei.com>
> >> Date: Wednesday, November 4, 2015 at 11:59 PM
> >> To: "sfc@ietf.org" <sfc@ietf.org>
> >> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >>
> >> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
> >>that  nsh can use for the transport; just need to register an
> >>Ethertype for nsh.
> >> The gre/udp transport provides all features nsh needs with additional
> >>security capability.
> >>
> >>
> >>
> >> Lucy
> >>
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> =20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Nov  6 01:07:08 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 285AF1B2C46; Fri,  6 Nov 2015 01:07:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yhX0gnXYpUKx; Fri,  6 Nov 2015 01:07:04 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 182FA1B2BEA; Fri,  6 Nov 2015 01:07:04 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id EC5B31C0711; Fri,  6 Nov 2015 01:07:03 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (122x210x83x163.ap122.ftth.ucom.ne.jp [122.210.83.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 684801C0214; Fri,  6 Nov 2015 01:07:02 -0800 (PST)
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Dino Farinacci <farinacci@gmail.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <563C6DB4.1060707@joelhalpern.com>
Date: Fri, 6 Nov 2015 04:07:00 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CFHfIq-C3yD3PQv6IBAMGAnEgeg>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 09:07:06 -0000

I am having trouble understanding the conversation.
We have a clear agreement that we are not going to standardize on 
transport for NSH.
And even more that we are not going to pick "one".

So yes, this draft describes a valid and useful way to transport NSH. 
there are many such.

Yours,
Joel

On 11/6/15 3:59 AM, Surendra Kumar (smkumar) wrote:
> Agree it would run everywhere if NSH is treated as an *application*, as you point out.
>
> The conflict is in how NSH wants to be transport independent. It is supposed to be a feature than violation of layering: proper layering vs. overhead, as shown below.
>
> IP-strata | IP | UDP | NSH |
> IP-strata | IP | UDP | VXLAN-GPE | IP | UDP | NSH |
>
> Ignoring, other encapsulation of NSH, carrying NSH directly over UDP does maintain that layering while removing the overhead. This draft is doing the right thing.
>
> Surendra.
>
>
> -----Original Message-----
> From: Dino Farinacci [mailto:farinacci@gmail.com]
> Sent: Thursday, November 05, 2015 4:21 PM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Lucy Yong <lucy.yong@huawei.com>; Surendra Kumar (smkumar) <smkumar@cisco.com>; Alia Atlas <akatlas@gmail.com>; sarikaya@ieee.org; Larry Kreeger (kreeger) <kreeger@cisco.com>; sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>
> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over anything. And then every encapsulation spec doesn't need to special case NSH.
>
> Like the analogy I used at the mic . why doest't VXLAN-GPE have a code point for DNS?  ;-)
>
> Answer: it makes no sense. Run NSH as a transport layer client and it will work over everything we have already built and has a good chance to work over anything we will build.
>
> NSH is no more an overlay than SMTP is for email.
>
> Dino
>
>> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote:
>>
>> It is definitely a useful option to run directly over Ethernet to allow for small scale environments which don't need NVO3 overlays.
>>
>> Cheers,
>>
>> Paul
>>
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
>> Sent: Thursday, November 05, 2015 5:08 AM
>> To: Surendra Kumar (smkumar); Alia Atlas
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
>>
>> Lucy
>>
>> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
>> Sent: Thursday, November 05, 2015 4:12 AM
>> To: Alia Atlas; Lucy yong
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> I did go through the process of getting the ethertype for NSH and I also have obtained a UDP port# in the past. I have to agree with Alia.
>>
>> Lucy,
>> I appreciate you guys taking a crack at NSH over GRE over UDP nested encapsulation. It simply calls for unnecessary overhead and complexity in formulating and processing such a packet along the tunnel path.
>>
>> I admit i have not read your draft yet, will certainly do.
>>
>> Regard,
>> Surendra.
>>
>>
>>
>> Sent from a thumb typed device.
>>
>>
>> -------- Original message --------
>> From: Alia Atlas <akatlas@gmail.com>
>> Date: 2015/11/05 6:18 PM (GMT+09:00)
>> To: Lucy yong <lucy.yong@huawei.com>
>> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> <no-hats>
>> I think that getting a UDP port is a lot more straightforward than an Ethertype.
>> Not having extra bytes is also an advantage.
>>
>> Regards,
>> Alia
>> </no-hats>
>>
>> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> wrote:
>> Hi Larry,
>>
>> The benefit is to avoid working a UDP transport for NSH.
>>
>> Thanks,
>> Lucy
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeger)
>> Sent: Thursday, November 05, 2015 1:45 AM
>> To: sarikaya@ieee.org
>> Cc: sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> Hi Behcet,
>>
>> I¹m not sure I¹m following what your point is.  It is true that VXLAN-GPE also adds additional overhead which may not always be needed.  Carrying NSH directly over UDP avoids that as well.  Lucy brought up a new option that I had never heard suggested before, which was to carry NSH in GRE over UDP.  This adds a GRE header in between the UDP header and NSH, but in my opinion doesn¹t bring any benefits - just more overhead and complication.
>>
>> Thanks, Larry
>>
>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>>
>>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
>>> <kreeger@cisco.com> wrote:
>>>> Hi Lucy,
>>>>
>>>> One of the motivations for carrying NSH directly on UDP is to avoid
>>>> unnecessary overhead or complication.  Adding the GRE header in
>>>> between does  not seem to add any additional benefit that I can see ­
>>>> only additional  overhead.
>>>>
>>>
>>> The point was not with VXLAN-GPE.
>>>
>>> Behcet
>>>> Thanks, Larry
>>>>
>>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
>>>> <lucy.yong@huawei.com>
>>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>>
>>>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>>> that  nsh can use for the transport; just need to register an
>>>> Ethertype for nsh.
>>>> The gre/udp transport provides all features nsh needs with additional
>>>> security capability.
>>>>
>>>>
>>>>
>>>> Lucy
>>>>
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> nvo3 mailing list
> nvo3@ietf.org
> https://www.ietf.org/mailman/listinfo/nvo3
>


From nobody Fri Nov  6 01:42:03 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 570321B3800; Fri,  6 Nov 2015 01:42:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JTpJJLWrYqib; Fri,  6 Nov 2015 01:42:00 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F346E1B37F9; Fri,  6 Nov 2015 01:41:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7474; q=dns/txt; s=iport; t=1446802920; x=1448012520; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=V71ufbQpgWoAKAMc8ayldmYBEQrNmYa86Pv35ieKqjY=; b=GivaevGIA0jwQzYODuVbwH0j2VaTrUcJ54mrmhxd2rggftQbwHvnuE8M kFV/Aj+lokN55EqrYVLYk+XctajJqGJ8N3Dhf85wvO6vW+A3fz2P1muyM AS3Yy9vn/s97ysEZ8MJ2KFFN5UZGtgt5CIUcdPtlePi8CBw1iyTZ6uuZx c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AeAgAEdTxW/5BdJa1egztTbwa+FwENgWAXCoVvAoE2OBQBAQEBAQEBgQqENQEBAQQBAQFrCwwEAgEIEQMBAQEBJwchBgsUCQgCBAENBQiIEQMSDbxIDYQ+AQEBAQEBAQEBAQEBAQEBAQEBAQEBFASLUoJTgVcRAYR9BY1UhRODYQGLL4FtgWKHZYsyg2CDcQEfAQFCgg4DHYFWcoNTOoEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,251,1444694400"; d="scan'208";a="204978487"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-4.cisco.com with ESMTP; 06 Nov 2015 09:41:59 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by rcdn-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id tA69fwDf000807 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 6 Nov 2015 09:41:58 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 03:41:58 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 03:41:58 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Dino Farinacci <farinacci@gmail.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [nvo3] [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAuVMAgAAC+oCAACcFIIAAa9EA//+cE4A=
Date: Fri, 6 Nov 2015 09:41:58 +0000
Message-ID: <5f7cdb0380e34c8d82c82892f070766e@XCH-RCD-020.cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <563C6DB4.1060707@joelhalpern.com>
In-Reply-To: <563C6DB4.1060707@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.5.248]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/w4tLH9NqnNK5WoiPOrB49mzHOpA>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 09:42:02 -0000

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]=20
Sent: Friday, November 06, 2015 1:07 AM
To: Surendra Kumar (smkumar) <smkumar@cisco.com>; Dino Farinacci <farinacci=
@gmail.com>; Bottorff, Paul <paul.bottorff@hpe.com>
Cc: sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>; Lucy Yong <lucy.yong@hua=
wei.com>; Alia Atlas <akatlas@gmail.com>; sarikaya@ieee.org; Larry Kreeger =
(kreeger) <kreeger@cisco.com>
Subject: Re: [nvo3] [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I am having trouble understanding the conversation.
We have a clear agreement that we are not going to standardize on transport=
 for NSH.
SK> Is the charter written in stone that it is not amendable, if gaps are f=
ound ?

And even more that we are not going to pick "one".
SK> Charter has a gap here. It is equivalent of designing a car without the=
 wheels. And wheels are not accessories.

Surendra.

So yes, this draft describes a valid and useful way to transport NSH.=20
there are many such.

Yours,
Joel

On 11/6/15 3:59 AM, Surendra Kumar (smkumar) wrote:
> Agree it would run everywhere if NSH is treated as an *application*, as y=
ou point out.
>
> The conflict is in how NSH wants to be transport independent. It is suppo=
sed to be a feature than violation of layering: proper layering vs. overhea=
d, as shown below.
>
> IP-strata | IP | UDP | NSH |
> IP-strata | IP | UDP | VXLAN-GPE | IP | UDP | NSH |
>
> Ignoring, other encapsulation of NSH, carrying NSH directly over UDP does=
 maintain that layering while removing the overhead. This draft is doing th=
e right thing.
>
> Surendra.
>
>
> -----Original Message-----
> From: Dino Farinacci [mailto:farinacci@gmail.com]
> Sent: Thursday, November 05, 2015 4:21 PM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Lucy Yong <lucy.yong@huawei.com>; Surendra Kumar (smkumar)=20
> <smkumar@cisco.com>; Alia Atlas <akatlas@gmail.com>;=20
> sarikaya@ieee.org; Larry Kreeger (kreeger) <kreeger@cisco.com>;=20
> sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>
> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over =
anything. And then every encapsulation spec doesn't need to special case NS=
H.
>
> Like the analogy I used at the mic . why doest't VXLAN-GPE have a code=20
> point for DNS?  ;-)
>
> Answer: it makes no sense. Run NSH as a transport layer client and it wil=
l work over everything we have already built and has a good chance to work =
over anything we will build.
>
> NSH is no more an overlay than SMTP is for email.
>
> Dino
>
>> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>>
>> It is definitely a useful option to run directly over Ethernet to allow =
for small scale environments which don't need NVO3 overlays.
>>
>> Cheers,
>>
>> Paul
>>
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
>> Sent: Thursday, November 05, 2015 5:08 AM
>> To: Surendra Kumar (smkumar); Alia Atlas
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
>>
>> Lucy
>>
>> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
>> Sent: Thursday, November 05, 2015 4:12 AM
>> To: Alia Atlas; Lucy yong
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> I did go through the process of getting the ethertype for NSH and I also=
 have obtained a UDP port# in the past. I have to agree with Alia.
>>
>> Lucy,
>> I appreciate you guys taking a crack at NSH over GRE over UDP nested enc=
apsulation. It simply calls for unnecessary overhead and complexity in form=
ulating and processing such a packet along the tunnel path.
>>
>> I admit i have not read your draft yet, will certainly do.
>>
>> Regard,
>> Surendra.
>>
>>
>>
>> Sent from a thumb typed device.
>>
>>
>> -------- Original message --------
>> From: Alia Atlas <akatlas@gmail.com>
>> Date: 2015/11/05 6:18 PM (GMT+09:00)
>> To: Lucy yong <lucy.yong@huawei.com>
>> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>,=20
>> sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> <no-hats>
>> I think that getting a UDP port is a lot more straightforward than an Et=
hertype.
>> Not having extra bytes is also an advantage.
>>
>> Regards,
>> Alia
>> </no-hats>
>>
>> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> wrote:
>> Hi Larry,
>>
>> The benefit is to avoid working a UDP transport for NSH.
>>
>> Thanks,
>> Lucy
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger=20
>> (kreeger)
>> Sent: Thursday, November 05, 2015 1:45 AM
>> To: sarikaya@ieee.org
>> Cc: sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> Hi Behcet,
>>
>> I=B9m not sure I=B9m following what your point is.  It is true that VXLA=
N-GPE also adds additional overhead which may not always be needed.  Carryi=
ng NSH directly over UDP avoids that as well.  Lucy brought up a new option=
 that I had never heard suggested before, which was to carry NSH in GRE ove=
r UDP.  This adds a GRE header in between the UDP header and NSH, but in my=
 opinion doesn=B9t bring any benefits - just more overhead and complication=
.
>>
>> Thanks, Larry
>>
>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>>
>>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
>>> <kreeger@cisco.com> wrote:
>>>> Hi Lucy,
>>>>
>>>> One of the motivations for carrying NSH directly on UDP is to avoid=20
>>>> unnecessary overhead or complication.  Adding the GRE header in=20
>>>> between does  not seem to add any additional benefit that I can see=20
>>>> =AD only additional  overhead.
>>>>
>>>
>>> The point was not with VXLAN-GPE.
>>>
>>> Behcet
>>>> Thanks, Larry
>>>>
>>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
>>>> <lucy.yong@huawei.com>
>>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>>
>>>> There is a gre/udp tunnel transport=20
>>>> (draft-ietf-tsvwg-gre-in-udp-08) that  nsh can use for the=20
>>>> transport; just need to register an Ethertype for nsh.
>>>> The gre/udp transport provides all features nsh needs with=20
>>>> additional security capability.
>>>>
>>>>
>>>>
>>>> Lucy
>>>>
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> nvo3 mailing list
> nvo3@ietf.org
> https://www.ietf.org/mailman/listinfo/nvo3
>


From nobody Fri Nov  6 04:36:17 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FD571A00DF; Fri,  6 Nov 2015 04:36:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.4
X-Spam-Level: 
X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, J_CHICKENPOX_42=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZsfABRIcthC9; Fri,  6 Nov 2015 04:36:13 -0800 (PST)
Received: from mail-pa0-x235.google.com (mail-pa0-x235.google.com [IPv6:2607:f8b0:400e:c03::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A0A41A00DC; Fri,  6 Nov 2015 04:36:13 -0800 (PST)
Received: by pasz6 with SMTP id z6so126343433pas.2; Fri, 06 Nov 2015 04:36:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=aW2AXEpcbGLsOnTQP7zJv926p57PSzsv3/D69d+F+gE=; b=kngI/w5XPjpJWcy8gmNZex6e0ovnMdpWGzT8A+bvCAsxIbNC66+kaxAQ9bJ8lujFGN 6OZJ6lcXnWs11l4dMYVvjNjSyDAqD4LyE3N80KZD/oghBh8SmcNooPc9iBVOxOFEvK3s I4tR6czVnFN4Fx9z2Kt3JRABpc+Ix98hfT1V2IVyToSFO8GOilPRPpHsUelufUQ5YSNW FmOgotkQUO6Eypczb0J2HuYFv9BhinE3SUu6kLxYKt2bgxG1jTjmn+gmw7m5ouuJfwpq rTg4FVEk5B6R3H3OrUayTbiPTkZWHXGuVfrd9bm0vLi9Ns3rZcH1xTa2uwcxsw9lQ8NQ 8HJw==
X-Received: by 10.68.133.133 with SMTP id pc5mr17517964pbb.93.1446813372871; Fri, 06 Nov 2015 04:36:12 -0800 (PST)
Received: from [10.71.7.211] ([101.110.53.38]) by smtp.gmail.com with ESMTPSA id pq1sm13899945pbb.91.2015.11.06.04.36.11 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 06 Nov 2015 04:36:12 -0800 (PST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Dino Farinacci <farinacci@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
Date: Fri, 6 Nov 2015 21:36:10 +0900
Content-Transfer-Encoding: quoted-printable
Message-Id: <0A891D0C-2D9C-4828-8BDE-706C56826315@gmail.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hpLxcGZ0VISfvwn3cBCSEsgCZYY>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 12:36:15 -0000

I'm having problems parsing your text.=20

But what I can say is that if NSH is to run over an overlay, then VXLAN can b=
e colocated with an NSH hop, be the next hop, or be many hops away.=20

If there is no overlay in the network, NSH doesn't need VXLAN.=20

There is no reason to have this coupling.=20

When does DNS use VXLAN? Answer: when there is an overlay in the network. Wh=
en does DNS use MPLS? Answer: when packets traverse a core network with MPLS=
 network.=20

That doesn't mean DNS  is spec'ed to run over VXLAN or MPLS. But DNS is tran=
sport independent.=20

Dino

> On Nov 6, 2015, at 5:59 PM, Surendra Kumar (smkumar) <smkumar@cisco.com> w=
rote:
>=20
> Agree it would run everywhere if NSH is treated as an *application*, as yo=
u point out.
>=20
> The conflict is in how NSH wants to be transport independent. It is suppos=
ed to be a feature than violation of layering: proper layering vs. overhead,=
 as shown below.
>=20
> IP-strata | IP | UDP | NSH |=20
> IP-strata | IP | UDP | VXLAN-GPE | IP | UDP | NSH |
>=20
> Ignoring, other encapsulation of NSH, carrying NSH directly over UDP does m=
aintain that layering while removing the overhead. This draft is doing the r=
ight thing.
>=20
> Surendra.
>=20
>=20
> -----Original Message-----
> From: Dino Farinacci [mailto:farinacci@gmail.com]=20
> Sent: Thursday, November 05, 2015 4:21 PM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Lucy Yong <lucy.yong@huawei.com>; Surendra Kumar (smkumar) <smkumar@ci=
sco.com>; Alia Atlas <akatlas@gmail.com>; sarikaya@ieee.org; Larry Kreeger (=
kreeger) <kreeger@cisco.com>; sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over a=
nything. And then every encapsulation spec doesn't need to special case NSH.=

>=20
> Like the analogy I used at the mic . why doest't VXLAN-GPE have a code poi=
nt for DNS?  ;-)
>=20
> Answer: it makes no sense. Run NSH as a transport layer client and it will=
 work over everything we have already built and has a good chance to work ov=
er anything we will build.
>=20
> NSH is no more an overlay than SMTP is for email.
>=20
> Dino
>=20
>> On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote:=

>>=20
>> It is definitely a useful option to run directly over Ethernet to allow f=
or small scale environments which don't need NVO3 overlays.
>>=20
>> Cheers,
>>=20
>> Paul
>>=20
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
>> Sent: Thursday, November 05, 2015 5:08 AM
>> To: Surendra Kumar (smkumar); Alia Atlas
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>=20
>> If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
>>=20
>> Lucy
>>=20
>> From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]=20
>> Sent: Thursday, November 05, 2015 4:12 AM
>> To: Alia Atlas; Lucy yong
>> Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
>> Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>=20
>> I did go through the process of getting the ethertype for NSH and I also h=
ave obtained a UDP port# in the past. I have to agree with Alia.
>>=20
>> Lucy,
>> I appreciate you guys taking a crack at NSH over GRE over UDP nested enca=
psulation. It simply calls for unnecessary overhead and complexity in formul=
ating and processing such a packet along the tunnel path.
>>=20
>> I admit i have not read your draft yet, will certainly do.
>>=20
>> Regard,
>> Surendra.
>>=20
>>=20
>>=20
>> Sent from a thumb typed device.
>>=20
>>=20
>> -------- Original message --------
>> From: Alia Atlas <akatlas@gmail.com>=20
>> Date: 2015/11/05 6:18 PM (GMT+09:00)=20
>> To: Lucy yong <lucy.yong@huawei.com>=20
>> Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>, sfc=
@ietf.org=20
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport=20
>>=20
>> <no-hats>=20
>> I think that getting a UDP port is a lot more straightforward than an Eth=
ertype.
>> Not having extra bytes is also an advantage.
>>=20
>> Regards,
>> Alia=20
>> </no-hats>
>>=20
>> On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com> wrote:
>> Hi Larry,
>>=20
>> The benefit is to avoid working a UDP transport for NSH.
>>=20
>> Thanks,
>> Lucy
>>=20
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger (kreeg=
er)
>> Sent: Thursday, November 05, 2015 1:45 AM
>> To: sarikaya@ieee.org
>> Cc: sfc@ietf.org
>> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>=20
>> Hi Behcet,
>>=20
>> I=C2=B9m not sure I=C2=B9m following what your point is.  It is true that=
 VXLAN-GPE also adds additional overhead which may not always be needed.  Ca=
rrying NSH directly over UDP avoids that as well.  Lucy brought up a new opt=
ion that I had never heard suggested before, which was to carry NSH in GRE o=
ver UDP.  This adds a GRE header in between the UDP header and NSH, but in m=
y opinion doesn=C2=B9t bring any benefits - just more overhead and complicat=
ion.
>>=20
>> Thanks, Larry
>>=20
>>> On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
>>>=20
>>> On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
>>> <kreeger@cisco.com> wrote:
>>>> Hi Lucy,
>>>>=20
>>>> One of the motivations for carrying NSH directly on UDP is to avoid
>>>> unnecessary overhead or complication.  Adding the GRE header in
>>>> between does  not seem to add any additional benefit that I can see =C2=
=AD
>>>> only additional  overhead.
>>>=20
>>> The point was not with VXLAN-GPE.
>>>=20
>>> Behcet
>>>> Thanks, Larry
>>>>=20
>>>> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
>>>> <lucy.yong@huawei.com>
>>>> Date: Wednesday, November 4, 2015 at 11:59 PM
>>>> To: "sfc@ietf.org" <sfc@ietf.org>
>>>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>>>=20
>>>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>>> that  nsh can use for the transport; just need to register an
>>>> Ethertype for nsh.
>>>> The gre/udp transport provides all features nsh needs with additional
>>>> security capability.
>>>>=20
>>>>=20
>>>>=20
>>>> Lucy
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20


From nobody Fri Nov  6 07:00:55 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6337A1A9032; Fri,  6 Nov 2015 06:00:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kz6VC6jI5-YH; Fri,  6 Nov 2015 06:00:50 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28AD61A9031; Fri,  6 Nov 2015 06:00:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=701; q=dns/txt; s=iport; t=1446818450; x=1448028050; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=tOIe/DRfg1ncKT77f5poGzLBzyLRMglOi+eVw6QCfQQ=; b=UhhoeaFxIT4YP42vrjEsB6aSVBVVUfYnJDCz6UG5K7QtE/3IUY1Cpknp aU5Ja9T+zSKJnTYzLcyJup1n4fVqnVrRcjxUz7K9wO4I6lVhHWFPLP6Gl ei3lIo/Wd+CJTvNNAzlDyHBAM8x/NG4z8HoEO3ZAwF5i4PcL9s3KVox2Q 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AiBQCFsTxW/5NdJa1egzuBQgbADoYQAoEzPBABAQEBAQEBgQqENQEBAQMBeQULAgEIGC4yJQIEDgWIJgjBbgEBAQEBAQEBAQEBAQEBAQEBAQEBARiGVIIQgm6EWYNLgRUBBJZIAY0knEMBOCuEBHKEDYEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,252,1444694400"; d="scan'208";a="42565529"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-7.cisco.com with ESMTP; 06 Nov 2015 14:00:49 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id tA6E0n7R009511 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 6 Nov 2015 14:00:49 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 08:00:48 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 08:00:48 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [nvo3] [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRGHGAVtZgJPIGsUekb37SdIaQfp6PGK8AgABSFYA=
Date: Fri, 6 Nov 2015 14:00:48 +0000
Message-ID: <A7D130AB-A794-4B3B-B31C-CFB1DF3EC3B9@cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <563C6DB4.1060707@joelhalpern.com>
In-Reply-To: <563C6DB4.1060707@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.230]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <C45152725154F44CB54332A76D9BDA34@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2D5X7ITWGwK9OLTlmDvCor8nSSs>
X-Mailman-Approved-At: Fri, 06 Nov 2015 07:00:53 -0800
Cc: "Surendra Kumar \(smkumar\)" <smkumar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, Dino Farinacci <farinacci@gmail.com>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 14:00:51 -0000

> On Nov 6, 2015, at 4:07 AM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>=20
> I am having trouble understanding the conversation.
> We have a clear agreement that we are not going to standardize on transpo=
rt for NSH.
> And even more that we are not going to pick "one".
>=20

I agree.  It seems that we are trying to solve a problem that doesn't need =
to be solved. =20

If an operator wants to use UDP/NSH in their environment, so be it.  Simila=
rly, if they chose to use VXLAN-GPE or something else, so be it.  NSH doesn=
't care, and nor should we.


> So yes, this draft describes a valid and useful way to transport NSH. the=
re are many such.
>=20
> Yours,
> Joel


From nobody Fri Nov  6 08:05:36 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 448EB1ACD69 for <sfc@ietfa.amsl.com>; Fri,  6 Nov 2015 08:05:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RPXpKxcOFbde for <sfc@ietfa.amsl.com>; Fri,  6 Nov 2015 08:05:33 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E3591ACD5E for <sfc@ietf.org>; Fri,  6 Nov 2015 08:05:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3736; q=dns/txt; s=iport; t=1446825928; x=1448035528; h=from:to:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=CtYg+aZBzIVeMWABvM5tWcAOCq3bRyYiH+q26ZSyclc=; b=CBmQ3uh0C7XmhsqeFp/XLk3c+HJFYYXWOsUVAznf1f+5Qlwyi/ukHMM1 6i6sooCgtPiq+grzG6noYZ6WHgVAZzIybZnGe1lyXpFOgpZ9TMC3Nja92 xSt5jzmXX+LWhY9R2fr1vWvwDHp1vfsmJWa6AX2tr7acV5BR7erpL0VW7 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ALGwCQzjxW/4UNJK1egztTTiEGviEBD?= =?us-ascii?q?YFgIYVvgTg4FAEBAQEBAQF/C4Q8OlEBPkInBByIJQ2hHKBTAQEBAQEBAQECAQE?= =?us-ascii?q?BAQEBAQEBAQEYhlSCEIJugUABgnoBAQtFgxeBFQWHRI8EAXuEIYgIgVtJkU2IU?= =?us-ascii?q?gEfAQFCgh6BZnIBg1I6gQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,252,1444694400"; d="scan'208";a="205219360"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 06 Nov 2015 16:05:27 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id tA6G5Ra7003669 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Fri, 6 Nov 2015 16:05:27 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 10:05:26 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 10:05:26 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Responses to NSH open tickets
Thread-Index: AQHRGKzzwNMRn7ESEEWTNnkkiNG1Nw==
Date: Fri, 6 Nov 2015 16:05:26 +0000
Message-ID: <1E890AFD-822D-44F0-95E5-72F507FFE1F1@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.230]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <16646EB63A131349A6EFFE48DBA90DD6@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/wso6MJd5b7chmKTxWVlZT28LeoM>
Subject: [sfc] Responses to NSH open tickets
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 16:05:35 -0000

Hi,

Below is my analysis and responses to the NSH tracking tickets and my sugge=
sted actions/next steps.

Thanks
Paul

------------
Ticket #1: Add a new field to include the SFC Identifier
http://trac.tools.ietf.org/wg/sfc/trac/ticket/1

Reply:
The current NSH draft specifies a pathID, this has proven simple and viable=
 to implement.  Implementation may (and do) utilize that pathID to represen=
t an abstract or specific path.  If further specificty is desired, the NSH =
metadata may be used to carry other path information.  I do not plan to upd=
ate the draft, given that there is no WG consensus for any changes.


Ticket #2: Remove "MD Type" field and the companion "MD-type 1"
http://trac.tools.ietf.org/wg/sfc/trac/ticket/2

Reply: Having the ability specify formats for NSH has proven very useful.  =
This was raised on on list and there was no consensus for change, I recomme=
nd this item be marked as resolved in the tracker.


Ticket #3: Critical Metadata
http://trac.tools.ietf.org/wg/sfc/trac/ticket/3

Reply:  it is unclear what suggested action is being requested.  If further=
 clarification of critical metadata in required, text can be added to the d=
raft, subject to WG review.


Ticket #4: Reuse the IPFIX registry for identifying context types
http://trac.tools.ietf.org/wg/sfc/trac/ticket/4

Reply:  The 400+ IPFIX information elements were created for a protocol for=
 IP Flow Information Export, and thus it would not be optimal to reuse
as there are many unneeded things. Consensus seems to want to prioritize pr=
ecision over blind reuse.  I do not plan to update the draft and suggest th=
at this item be marked as resolved in the tracker.


Ticket #5: Support of SF Spirals
http://trac.tools.ietf.org/wg/sfc/trac/ticket/5

Reply: This was answered on the list: http://www.ietf.org/mail-archive/web/=
sfc/current/msg03188.html and therefore no changes are needed.  Given that,=
 this item can be marked as resolved.

Ticket #6: Version Handling
https://tools.ietf.org/wg/sfc/trac/ticket/6

Reply: Discussed on list: http://www.ietf.org/mail-archive/web/sfc/current/=
msg03149.html.  There was no consensus to changed the adopted format, in fa=
ct the value of version bits seems well accepted and therefore no changes a=
re needed and the topic should be marked as resolved in the tracker.


Ticket #7: reserved bits
http://trac.tools.ietf.org/wg/sfc/trac/ticket/7

Reply: This text seems like a helpful clarification.  Barring objection, it=
 can be added to the draft.


Ticket #8:=20
http://trac.tools.ietf.org/wg/sfc/trac/ticket/8

Reply: NSH and the use case draft seem consistent.  However, it would be he=
lpful for the use case drafts to reference the allocations drafts, and vice=
 versa to provide a consistent view for readers. =20


Ticket #9: Remove Section 2.2
http://trac.tools.ietf.org/wg/sfc/trac/ticket/9

Reply: The current version of the draft states:  "A short reference is incl=
uded below, RFC 7498 [RFC7498], provides a
more comprehensive review of the SFC Problem Statement."  That seems like a=
 reasonable approach, and propose marking this item as resolved.


Ticket #10: O bit
http://trac.tools.ietf.org/wg/sfc/trac/ticket/10

Reply: Reserving a bit for OAM is acceptable, and done in other protocol sp=
ecifications.  OAM-specific drafts exist and will leverage the presence of =
the bit.   Further, over time new OAM uses may arise, having the explicit a=
bility to support them day-0 is key. The O bit was agreed upon by the WG du=
ring adoption, and there is no consensus to remove it.  I propose that a re=
ference be added to the OAM framework draft.

---------------=


From nobody Fri Nov  6 13:28:32 2015
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E86F1A03A6 for <sfc@ietfa.amsl.com>; Fri,  6 Nov 2015 13:28:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qBVqV87gSEH5 for <sfc@ietfa.amsl.com>; Fri,  6 Nov 2015 13:28:25 -0800 (PST)
Received: from g4t3425.houston.hp.com (g4t3425.houston.hp.com [15.201.208.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2424E1A0398 for <sfc@ietf.org>; Fri,  6 Nov 2015 13:28:24 -0800 (PST)
Received: from G9W0364.americas.hpqcorp.net (g9w0364.houston.hp.com [16.216.193.45]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g4t3425.houston.hp.com (Postfix) with ESMTPS id D0A3965; Fri,  6 Nov 2015 21:28:23 +0000 (UTC)
Received: from G9W3614.americas.hpqcorp.net (16.216.186.49) by G9W0364.americas.hpqcorp.net (16.216.193.45) with Microsoft SMTP Server (TLS) id 14.3.169.1; Fri, 6 Nov 2015 21:26:37 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.227]) by G9W3614.americas.hpqcorp.net ([16.216.186.49]) with mapi id 14.03.0169.001; Fri, 6 Nov 2015 21:26:37 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Lucy yong <lucy.yong@huawei.com>, Dave Dolson <ddolson@sandvine.com>, Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NCSqAgAADXYCAABlfAIAAANIAgAAO1gCAADEaAIAAAuKAgAAOsQCAAIaEgIAAmW2AgADpe3A=
Date: Fri, 6 Nov 2015 21:26:37 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF22222B1F@G4W3293.americas.hpqcorp.net>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm>, <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm>, <E8355113905631478EFF04F5AA706E9830D88192@wtl-exchp-2.sandvine.com> <0by1y3xsqdhwe9stsmw39mf5.1446732352825@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D57207BB5@dfweml701-chm> <8575342074bc4514ba829e99ebfc2b7c@XCH-RCD-020.cisco.com>
In-Reply-To: <8575342074bc4514ba829e99ebfc2b7c@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.216.65.175]
Content-Type: multipart/alternative; boundary="_000_A46D9C092EA46F489F135060986AD9FF22222B1FG4W3293americas_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/iRzPVj45W1_-oZ8g9Z-SADdNjIk>
Cc: "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 21:28:30 -0000

--_000_A46D9C092EA46F489F135060986AD9FF22222B1FG4W3293americas_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Surendra

https://datatracker.ietf.org/doc/draft-fedyk-sfc-mac-chain/  describes why =
you would want to run directly over L2 and it does not have to be MAC in MA=
C can be just MAC  in fact just a local assigned mac (and much simpler to i=
mplement on many devices too.)  In this case NSH is simple an Ethernet TAG =
and it can follow a MAC addresses or a VLAN TAG.

Cheers,
Don




From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar (smkuma=
r)
Sent: Friday, November 06, 2015 2:21 AM
To: Lucy yong; Dave Dolson; Alia Atlas
Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport




Not sure why you would run UDP directly over L2. It is just a mac-in-mac.


Surendra.

From: Lucy yong [mailto:lucy.yong@huawei.com]
Sent: Thursday, November 05, 2015 2:12 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com<mailto:smkumar@cisco.com>>;=
 Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>; Alia Atla=
s <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger) <k=
reeger@cisco.com<mailto:kreeger@cisco.com>>; sfc@ietf.org<mailto:sfc@ietf.o=
rg>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport


From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 8:10 AM
To: Dave Dolson; Lucy yong; Alia Atlas
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Layer2 tunnels are just fine, they provide topological freedom.
[Lucy] UDP can't be over L2 directly.   You need Ethertype for NSH in L2 sp=
ace.

Lucy

Surendra


Sent from a thumb typed device.


-------- Original message --------
From: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: 2015/11/05 10:17 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>, "Surendr=
a Kumar (smkumar)" <smkumar@cisco.com<mailto:smkumar@cisco.com>>, Alia Atla=
s <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
I find it to be a useful concept when SFF and SF nodes have layer2 connecti=
ons.


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
Sent: Thursday, November 05, 2015 10:08 PM
To: Surendra Kumar (smkumar); Alia Atlas
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

If SFC is deployed in Ethernet network, do we need NSH over Ethernet?

Lucy

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Thursday, November 05, 2015 4:12 AM
To: Alia Atlas; Lucy yong
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>; Larry Kreeger (kreeger); s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

I did go through the process of getting the ethertype for NSH and I also ha=
ve obtained a UDP port# in the past. I have to agree with Alia.

Lucy,
I appreciate you guys taking a crack at NSH over GRE over UDP nested encaps=
ulation. It simply calls for unnecessary overhead and complexity in formula=
ting and processing such a packet along the tunnel path.

I admit i have not read your draft yet, will certainly do.

Regard,
Surendra.



Sent from a thumb typed device.


-------- Original message --------
From: Alia Atlas <akatlas@gmail.com<mailto:akatlas@gmail.com>>
Date: 2015/11/05 6:18 PM (GMT+09:00)
To: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Cc: sarikaya@ieee.org<mailto:sarikaya@ieee.org>, "Larry Kreeger (kreeger)" =
<kreeger@cisco.com<mailto:kreeger@cisco.com>>, sfc@ietf.org<mailto:sfc@ietf=
.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
<no-hats>
I think that getting a UDP port is a lot more straightforward than an Ether=
type.
Not having extra bytes is also an advantage.

Regards,
Alia
</no-hats>

On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com<mailto:lucy=
.yong@huawei.com>> wrote:
Hi Larry,

The benefit is to avoid working a UDP transport for NSH.

Thanks,
Lucy

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Larry Kreeger (kreeger)
Sent: Thursday, November 05, 2015 1:45 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Hi Behcet,

I=B9m not sure I=B9m following what your point is.  It is true that VXLAN-G=
PE also adds additional overhead which may not always be needed.  Carrying =
NSH directly over UDP avoids that as well.  Lucy brought up a new option th=
at I had never heard suggested before, which was to carry NSH in GRE over U=
DP.  This adds a GRE header in between the UDP header and NSH, but in my op=
inion doesn=B9t bring any benefits - just more overhead and complication.

Thanks, Larry

On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com<mailto:sarik=
aya2012@gmail.com>> wrote:

>On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
><kreeger@cisco.com<mailto:kreeger@cisco.com>> wrote:
>> Hi Lucy,
>>
>> One of the motivations for carrying NSH directly on UDP is to avoid
>>unnecessary overhead or complication.  Adding the GRE header in
>>between does  not seem to add any additional benefit that I can see =AD
>>only additional  overhead.
>>
>
>The point was not with VXLAN-GPE.
>
>Behcet
>> Thanks, Larry
>>
>> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf =
of Lucy yong
>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
>> Date: Wednesday, November 4, 2015 at 11:59 PM
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.or=
g>>
>> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>>
>> There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-08)
>>that  nsh can use for the transport; just need to register an
>>Ethertype for nsh.
>> The gre/udp transport provides all features nsh needs with additional
>>security capability.
>>
>>
>>
>> Lucy
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_A46D9C092EA46F489F135060986AD9FF22222B1FG4W3293americas_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman",serif;}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma",sans-serif;}
span.emailstyle20
	{mso-style-name:emailstyle20;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.im
	{mso-style-name:im;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle28
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Hi Surendra<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><a href=3D"https://datatracker.ietf.o=
rg/doc/draft-fedyk-sfc-mac-chain/">https://datatracker.ietf.org/doc/draft-f=
edyk-sfc-mac-chain/</a>&nbsp; describes why you would
 want to run directly over L2 and it does not have to be MAC in MAC can be =
<u>just MAC</u> &nbsp;in fact just a local assigned mac (and much simpler t=
o implement on many devices too.) &nbsp;In this case NSH is simple an Ether=
net TAG and it can follow a MAC addresses
 or a VLAN TAG. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Don
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> sfc [mailto:sfc-bounces@ietf.o=
rg]
<b>On Behalf Of </b>Surendra Kumar (smkumar)<br>
<b>Sent:</b> Friday, November 06, 2015 2:21 AM<br>
<b>To:</b> Lucy yong; Dave Dolson; Alia Atlas<br>
<b>Cc:</b> sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<pre><span style=3D"font-family:&quot;Candara&quot;,sans-serif"><o:p>&nbsp;=
</o:p></span></pre>
<pre><span style=3D"font-family:&quot;Candara&quot;,sans-serif">Not sure wh=
y you would run UDP directly over L2. It is just a mac-in-mac.<o:p></o:p></=
span></pre>
<pre><span style=3D"font-family:&quot;Candara&quot;,sans-serif"><o:p>&nbsp;=
</o:p></span></pre>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> Lucy yong [<a href=3D"mailto:l=
ucy.yong@huawei.com">mailto:lucy.yong@huawei.com</a>]
<br>
<b>Sent:</b> Thursday, November 05, 2015 2:12 PM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;<a href=3D"mailto:smkumar@cisco.com=
">smkumar@cisco.com</a>&gt;; Dave Dolson &lt;<a href=3D"mailto:ddolson@sand=
vine.com">ddolson@sandvine.com</a>&gt;; Alia Atlas &lt;<a href=3D"mailto:ak=
atlas@gmail.com">akatlas@gmail.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>; Larr=
y Kreeger (kreeger) &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.=
com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> Surendra Kumar (smkumar) [</span=
><a href=3D"mailto:smkumar@cisco.com"><span style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,sans-serif">mailto:smkumar@cisco.com</span></a><s=
pan style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">]
<br>
<b>Sent:</b> Thursday, November 05, 2015 8:10 AM<br>
<b>To:</b> Dave Dolson; Lucy yong; Alia Atlas<br>
<b>Cc:</b> </span><a href=3D"mailto:sarikaya@ieee.org"><span style=3D"font-=
size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">sarikaya@ieee.org</s=
pan></a><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans=
-serif">; Larry Kreeger (kreeger);
</span><a href=3D"mailto:sfc@ietf.org"><span style=3D"font-size:10.0pt;font=
-family:&quot;Tahoma&quot;,sans-serif">sfc@ietf.org</span></a><span style=
=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">Layer2 tunnels are just fine, they provide topologic=
al freedom.<o:p></o:p></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,sans-serif;color:#1F497D">[Lucy] UDP can&#8217;t be over =
L2 directly. &nbsp;&nbsp;You need Ethertype for NSH in L2 space.<o:p></o:p>=
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></i></b=
></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,sans-serif;color:#1F497D">Lucy<o:p></o:p></span></i></b><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Dave Dolson &lt;<a href=3D"mailto:ddolson@sandvine.com">ddolson@sandv=
ine.com</a>&gt;
<br>
Date: 2015/11/05 10:17 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt;, &quot;Surendra Kumar (smkumar)&quot; &lt;<a href=3D"mailto:smk=
umar@cisco.com">smkumar@cisco.com</a>&gt;, Alia Atlas &lt;<a href=3D"mailto=
:akatlas@gmail.com">akatlas@gmail.com</a>&gt;
<br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I find it to be a useful concept when=
 SFF and SF nodes have layer2 connections.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [</span><a href=3D"mailto:sf=
c-bounces@ietf.org"><span style=3D"font-size:10.0pt;font-family:&quot;Tahom=
a&quot;,sans-serif">mailto:sfc-bounces@ietf.org</span></a><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">]
<b>On Behalf Of </b>Lucy yong<br>
<b>Sent:</b> Thursday, November 05, 2015 10:08 PM<br>
<b>To:</b> Surendra Kumar (smkumar); Alia Atlas<br>
<b>Cc:</b> </span><a href=3D"mailto:sarikaya@ieee.org"><span style=3D"font-=
size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">sarikaya@ieee.org</s=
pan></a><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans=
-serif">; Larry Kreeger (kreeger);
</span><a href=3D"mailto:sfc@ietf.org"><span style=3D"font-size:10.0pt;font=
-family:&quot;Tahoma&quot;,sans-serif">sfc@ietf.org</span></a><span style=
=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"><br>
<b>Subject:</b> Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">If SFC is deployed in Ethernet networ=
k, do we need NSH over Ethernet?</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Lucy</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> Surendra Kumar (smkumar) [</span=
><a href=3D"mailto:smkumar@cisco.com"><span style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,sans-serif">mailto:smkumar@cisco.com</span></a><s=
pan style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">]
<br>
<b>Sent:</b> Thursday, November 05, 2015 4:12 AM<br>
<b>To:</b> Alia Atlas; Lucy yong<br>
<b>Cc:</b> </span><a href=3D"mailto:sarikaya@ieee.org"><span style=3D"font-=
size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif">sarikaya@ieee.org</s=
pan></a><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans=
-serif">; Larry Kreeger (kreeger);
</span><a href=3D"mailto:sfc@ietf.org"><span style=3D"font-size:10.0pt;font=
-family:&quot;Tahoma&quot;,sans-serif">sfc@ietf.org</span></a><span style=
=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif"><br>
<b>Subject:</b> RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport</spa=
n><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I did go through the process of getting the ethertyp=
e for NSH and I also have obtained a UDP port# in the past. I have to agree=
 with Alia.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Lucy,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate you guys taking a crack at NSH over GRE=
 over UDP nested encapsulation. It simply calls for unnecessary overhead an=
d complexity in formulating and processing such a packet along the tunnel p=
ath.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I admit i have not read your draft yet, will certain=
ly do.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regard,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Surendra.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div id=3D"composer_signature">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.0pt">Sent from a thumb ty=
ped device.</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
-------- Original message --------<br>
From: Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com">akatlas@gmail.com=
</a>&gt; <br>
Date: 2015/11/05 6:18 PM (GMT&#43;09:00) <br>
To: Lucy yong &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.=
com</a>&gt; <br>
Cc: <a href=3D"mailto:sarikaya@ieee.org">sarikaya@ieee.org</a>, &quot;Larry=
 Kreeger (kreeger)&quot; &lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@c=
isco.com</a>&gt;,
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <br>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport <o:p></o:p>=
</p>
<div>
<div>
<p class=3D"MsoNormal">&lt;no-hats&gt; <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think that getting a UDP port is a lot more straig=
htforward than an Ethertype.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Not having extra bytes is also an advantage.<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&lt;/no-hats&gt;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong &lt;<a hre=
f=3D"mailto:lucy.yong@huawei.com" target=3D"_blank">lucy.yong@huawei.com</a=
>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Larry,<br>
<br>
The benefit is to avoid working a UDP transport for NSH.<br>
<br>
Thanks,<br>
Lucy<br>
<br>
<span class=3D"im">-----Original Message-----</span><br>
<span class=3D"im">From: sfc [mailto:</span><a href=3D"mailto:sfc-bounces@i=
etf.org">sfc-bounces@ietf.org</a><span class=3D"im">] On Behalf Of Larry Kr=
eeger (kreeger)</span><br>
<span class=3D"im">Sent: Thursday, November 05, 2015 1:45 AM</span><br>
<span class=3D"im">To: </span><a href=3D"mailto:sarikaya@ieee.org">sarikaya=
@ieee.org</a><br>
<span class=3D"im">Cc: </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org<=
/a><br>
<span class=3D"im">Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-tr=
ansport</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi Behcet,<br>
<br>
I=B9m not sure I=B9m following what your point is.&nbsp; It is true that VX=
LAN-GPE also adds additional overhead which may not always be needed.&nbsp;=
 Carrying NSH directly over UDP avoids that as well.&nbsp; Lucy brought up =
a new option that I had never heard suggested before,
 which was to carry NSH in GRE over UDP.&nbsp; This adds a GRE header in be=
tween the UDP header and NSH, but in my opinion doesn=B9t bring any benefit=
s - just more overhead and complication.<br>
<br>
Thanks, Larry<br>
<br>
On 11/5/15, 4:32 PM, &quot;Behcet Sarikaya&quot; &lt;<a href=3D"mailto:sari=
kaya2012@gmail.com">sarikaya2012@gmail.com</a>&gt; wrote:<br>
<br>
&gt;On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)<br>
&gt;&lt;<a href=3D"mailto:kreeger@cisco.com">kreeger@cisco.com</a>&gt; wrot=
e:<br>
&gt;&gt; Hi Lucy,<br>
&gt;&gt;<br>
&gt;&gt; One of the motivations for carrying NSH directly on UDP is to avoi=
d<br>
&gt;&gt;unnecessary overhead or complication.&nbsp; Adding the GRE header i=
n<br>
&gt;&gt;between does&nbsp; not seem to add any additional benefit that I ca=
n see =AD<br>
&gt;&gt;only additional&nbsp; overhead.<br>
&gt;&gt;<br>
&gt;<br>
&gt;The point was not with VXLAN-GPE.<br>
&gt;<br>
&gt;Behcet<br>
&gt;&gt; Thanks, Larry<br>
&gt;&gt;<br>
&gt;&gt; From: sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@=
ietf.org</a>&gt; on behalf of Lucy yong<br>
&gt;&gt; &lt;<a href=3D"mailto:lucy.yong@huawei.com">lucy.yong@huawei.com</=
a>&gt;<br>
&gt;&gt; Date: Wednesday, November 4, 2015 at 11:59 PM<br>
&gt;&gt; To: &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &=
lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
&gt;&gt; Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport<br>
&gt;&gt;<br>
&gt;&gt; There is a gre/udp tunnel transport (draft-ietf-tsvwg-gre-in-udp-0=
8)<br>
&gt;&gt;that&nbsp; nsh can use for the transport; just need to register an<=
br>
&gt;&gt;Ethertype for nsh.<br>
&gt;&gt; The gre/udp transport provides all features nsh needs with additio=
nal<br>
&gt;&gt;security capability.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Lucy<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sfc mailing list<br>
&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_A46D9C092EA46F489F135060986AD9FF22222B1FG4W3293americas_--


From nobody Fri Nov  6 13:51:00 2015
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0553F1A1AC1; Fri,  6 Nov 2015 13:50:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1OwbOMiYoXwg; Fri,  6 Nov 2015 13:50:56 -0800 (PST)
Received: from g4t3425.houston.hp.com (g4t3425.houston.hp.com [15.201.208.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99C271A1AB8; Fri,  6 Nov 2015 13:50:56 -0800 (PST)
Received: from G9W0364.americas.hpqcorp.net (g9w0364.houston.hp.com [16.216.193.45]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g4t3425.houston.hp.com (Postfix) with ESMTPS id 0CD2F6A; Fri,  6 Nov 2015 21:50:56 +0000 (UTC)
Received: from G9W3616.americas.hpqcorp.net (16.216.186.51) by G9W0364.americas.hpqcorp.net (16.216.193.45) with Microsoft SMTP Server (TLS) id 14.3.169.1; Fri, 6 Nov 2015 21:49:05 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.227]) by G9W3616.americas.hpqcorp.net ([16.216.186.51]) with mapi id 14.03.0169.001; Fri, 6 Nov 2015 21:49:05 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Dino Farinacci <farinacci@gmail.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRGHF93e7N0dRLhEm4LF2sltpDk56PgtCA
Date: Fri, 6 Nov 2015 21:49:04 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF22222B3A@G4W3293.americas.hpqcorp.net>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
In-Reply-To: <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.216.65.175]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/sdRwu_9r9PdaPnDccoJJ26YzT0E>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2015 21:50:59 -0000

Hi Surendra

A better set of "efficient" stacks for illustration=20
I replaced Ip-strata is really some form of L2  or L2 and MPLS.  MPLS not s=
hown but could follow the MAC [VLAN]

MAC [VLAN]|NSH| L2 or L3 packet
[MAC [VLAN]][MPLS]| IP | UDP | NSH |L2 or L3 packet <- Your Proposal
[MAC [VLAN][MPLS]| IP | UDP | VXLAN-GPE]| Inner MAC | NSH| L2 or L3 packet

And as we point in our draft out there is synergy in using MAC Chaining and=
 NSH=20

MAC_Chain[VLAN]| NSH| L2 or L3
[MAC [VLAN]] | IP | UDP | VXLAN-GPE]| MAC_Chain | NSH|L2 or L3
=20

Cheers
Don=20

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar
> (smkumar)
> Sent: Friday, November 06, 2015 4:00 AM
> To: Dino Farinacci; Bottorff, Paul
> Cc: sfc@ietf.org; <nvo3@ietf.org>; Lucy Yong; Alia Atlas; sarikaya@ieee.o=
rg;
> Larry Kreeger (kreeger)
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> Agree it would run everywhere if NSH is treated as an *application*, as y=
ou
> point out.
>=20
> The conflict is in how NSH wants to be transport independent. It is suppo=
sed
> to be a feature than violation of layering: proper layering vs. overhead,=
 as
> shown below.
>=20
> IP-strata | IP | UDP | NSH |
> IP-strata | IP | UDP | VXLAN-GPE | IP | UDP | NSH |
>=20
> Ignoring, other encapsulation of NSH, carrying NSH directly over UDP does
> maintain that layering while removing the overhead. This draft is doing t=
he
> right thing.
>=20
> Surendra.
>=20
>=20
> -----Original Message-----
> From: Dino Farinacci [mailto:farinacci@gmail.com]
> Sent: Thursday, November 05, 2015 4:21 PM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Lucy Yong <lucy.yong@huawei.com>; Surendra Kumar (smkumar)
> <smkumar@cisco.com>; Alia Atlas <akatlas@gmail.com>; sarikaya@ieee.org;
> Larry Kreeger (kreeger) <kreeger@cisco.com>; sfc@ietf.org;
> <nvo3@ietf.org> <nvo3@ietf.org>
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run over
> anything. And then every encapsulation spec doesn't need to special case
> NSH.
>=20
> Like the analogy I used at the mic . why doest't VXLAN-GPE have a code po=
int
> for DNS?  ;-)
>=20
> Answer: it makes no sense. Run NSH as a transport layer client and it wil=
l
> work over everything we have already built and has a good chance to work
> over anything we will build.
>=20
> NSH is no more an overlay than SMTP is for email.
>=20
> Dino
>=20
> > On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com>
> wrote:
> >
> > It is definitely a useful option to run directly over Ethernet to allow=
 for small
> scale environments which don't need NVO3 overlays.
> >
> > Cheers,
> >
> > Paul
> >
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
> > Sent: Thursday, November 05, 2015 5:08 AM
> > To: Surendra Kumar (smkumar); Alia Atlas
> > Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> > Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
> >
> > Lucy
> >
> > From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
> > Sent: Thursday, November 05, 2015 4:12 AM
> > To: Alia Atlas; Lucy yong
> > Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> > Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > I did go through the process of getting the ethertype for NSH and I als=
o
> have obtained a UDP port# in the past. I have to agree with Alia.
> >
> > Lucy,
> > I appreciate you guys taking a crack at NSH over GRE over UDP nested
> encapsulation. It simply calls for unnecessary overhead and complexity in
> formulating and processing such a packet along the tunnel path.
> >
> > I admit i have not read your draft yet, will certainly do.
> >
> > Regard,
> > Surendra.
> >
> >
> >
> > Sent from a thumb typed device.
> >
> >
> > -------- Original message --------
> > From: Alia Atlas <akatlas@gmail.com>
> > Date: 2015/11/05 6:18 PM (GMT+09:00)
> > To: Lucy yong <lucy.yong@huawei.com>
> > Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)" <kreeger@cisco.com>,
> > sfc@ietf.org
> > Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > <no-hats>
> > I think that getting a UDP port is a lot more straightforward than an
> Ethertype.
> > Not having extra bytes is also an advantage.
> >
> > Regards,
> > Alia
> > </no-hats>
> >
> > On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com>
> wrote:
> > Hi Larry,
> >
> > The benefit is to avoid working a UDP transport for NSH.
> >
> > Thanks,
> > Lucy
> >
> > -----Original Message-----
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger
> > (kreeger)
> > Sent: Thursday, November 05, 2015 1:45 AM
> > To: sarikaya@ieee.org
> > Cc: sfc@ietf.org
> > Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > Hi Behcet,
> >
> > I=B9m not sure I=B9m following what your point is.  It is true that VXL=
AN-GPE also
> adds additional overhead which may not always be needed.  Carrying NSH
> directly over UDP avoids that as well.  Lucy brought up a new option that=
 I
> had never heard suggested before, which was to carry NSH in GRE over UDP.
> This adds a GRE header in between the UDP header and NSH, but in my
> opinion doesn=B9t bring any benefits - just more overhead and complicatio=
n.
> >
> > Thanks, Larry
> >
> > On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
> >
> > >On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)
> > ><kreeger@cisco.com> wrote:
> > >> Hi Lucy,
> > >>
> > >> One of the motivations for carrying NSH directly on UDP is to avoid
> > >>unnecessary overhead or complication.  Adding the GRE header in
> > >>between does  not seem to add any additional benefit that I can see
> > >>=AD only additional  overhead.
> > >>
> > >
> > >The point was not with VXLAN-GPE.
> > >
> > >Behcet
> > >> Thanks, Larry
> > >>
> > >> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong
> > >> <lucy.yong@huawei.com>
> > >> Date: Wednesday, November 4, 2015 at 11:59 PM
> > >> To: "sfc@ietf.org" <sfc@ietf.org>
> > >> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> > >>
> > >> There is a gre/udp tunnel transport
> > >>(draft-ietf-tsvwg-gre-in-udp-08) that  nsh can use for the
> > >>transport; just need to register an Ethertype for nsh.
> > >> The gre/udp transport provides all features nsh needs with
> > >>additional security capability.
> > >>
> > >>
> > >>
> > >> Lucy
> > >>
> > >>
> > >> _______________________________________________
> > >> sfc mailing list
> > >> sfc@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/sfc
> > >>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Nov  6 17:36:19 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17FB81A0854; Fri,  6 Nov 2015 17:36:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y59wNCTQpAEM; Fri,  6 Nov 2015 17:36:15 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6C221A044E; Fri,  6 Nov 2015 17:36:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8221; q=dns/txt; s=iport; t=1446860174; x=1448069774; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=1Puj4fPZeZaRvHX8Es+iMXN4j6azPTpXPKZOdw08SSM=; b=EiniiaTDoKk7g6GYXkdgJzEA7UeWOpzJKG2/HcHrBM/uY58ydWjcxEoO uB+flMz/JYlPhi8JyTqDc+cai1RAMuPlD3DwWcW0KU/75fvJaKrp6W24n 6TGPpJkJZ5ur6nkeyf60nGGcBYMR41TVRyM/OagWERfz552QuywTcdvco 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AUAgAyVD1W/4gNJK1dgztTbwa+IgENg?= =?us-ascii?q?WEXCoIZg1YCgTU4FAEBAQEBAQGBCoQ1AQEBBAEBAWsLDAQCAQgRAwEBAQEnByE?= =?us-ascii?q?GCxQJCAIEAQ0FCIgRAxINvEcNhD8BAQEBAQEBAQEBAQEBAQEBAQEBAQEUBItSg?= =?us-ascii?q?lOBVxEBhH0FjVSFE4NhAYsvgW6BYodlizKDYINxAR8BAUKCDgMdgVZyg1M6gQc?= =?us-ascii?q?BAQE?=
X-IronPort-AV: E=Sophos;i="5.20,255,1444694400"; d="scan'208";a="42608255"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-9.cisco.com with ESMTP; 07 Nov 2015 01:36:13 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id tA71aDa6014931 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 7 Nov 2015 01:36:13 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 19:36:12 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 19:36:12 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Fedyk, Don" <don.fedyk@hpe.com>, Dino Farinacci <farinacci@gmail.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAuVMAgAAC+oCAACcFIIABQLwA///Gz/A=
Date: Sat, 7 Nov 2015 01:36:12 +0000
Message-ID: <5c234a2d108b40a789534021c4d1448c@XCH-RCD-020.cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <A46D9C092EA46F489F135060986AD9FF22222B3A@G4W3293.americas.hpqcorp.net>
In-Reply-To: <A46D9C092EA46F489F135060986AD9FF22222B3A@G4W3293.americas.hpqcorp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.155.34.162]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/aQBVJCwplV4qbhLDNcK-UBUdevQ>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Nov 2015 01:36:18 -0000

Don,

I was not proposing anything, just contrasting the packet layout when NSH i=
s purely over IP/UDP.=20

Surendra.

-----Original Message-----
From: Fedyk, Don [mailto:don.fedyk@hpe.com]=20
Sent: Friday, November 06, 2015 1:49 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com>; Dino Farinacci <farinacci=
@gmail.com>; Bottorff, Paul <paul.bottorff@hpe.com>
Cc: sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>; Lucy Yong <lucy.yong@hua=
wei.com>; Alia Atlas <akatlas@gmail.com>; sarikaya@ieee.org; Larry Kreeger =
(kreeger) <kreeger@cisco.com>
Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

Hi Surendra

A better set of "efficient" stacks for illustration I replaced Ip-strata is=
 really some form of L2  or L2 and MPLS.  MPLS not shown but could follow t=
he MAC [VLAN]

MAC [VLAN]|NSH| L2 or L3 packet
[MAC [VLAN]][MPLS]| IP | UDP | NSH |L2 or L3 packet <- Your Proposal [MAC [=
VLAN][MPLS]| IP | UDP | VXLAN-GPE]| Inner MAC | NSH| L2 or L3 packet

And as we point in our draft out there is synergy in using MAC Chaining and=
 NSH=20

MAC_Chain[VLAN]| NSH| L2 or L3
[MAC [VLAN]] | IP | UDP | VXLAN-GPE]| MAC_Chain | NSH|L2 or L3
=20

Cheers
Don=20

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar
> (smkumar)
> Sent: Friday, November 06, 2015 4:00 AM
> To: Dino Farinacci; Bottorff, Paul
> Cc: sfc@ietf.org; <nvo3@ietf.org>; Lucy Yong; Alia Atlas;=20
> sarikaya@ieee.org; Larry Kreeger (kreeger)
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> Agree it would run everywhere if NSH is treated as an *application*,=20
> as you point out.
>=20
> The conflict is in how NSH wants to be transport independent. It is=20
> supposed to be a feature than violation of layering: proper layering=20
> vs. overhead, as shown below.
>=20
> IP-strata | IP | UDP | NSH |
> IP-strata | IP | UDP | VXLAN-GPE | IP | UDP | NSH |
>=20
> Ignoring, other encapsulation of NSH, carrying NSH directly over UDP=20
> does maintain that layering while removing the overhead. This draft is=20
> doing the right thing.
>=20
> Surendra.
>=20
>=20
> -----Original Message-----
> From: Dino Farinacci [mailto:farinacci@gmail.com]
> Sent: Thursday, November 05, 2015 4:21 PM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Lucy Yong <lucy.yong@huawei.com>; Surendra Kumar (smkumar)=20
> <smkumar@cisco.com>; Alia Atlas <akatlas@gmail.com>;=20
> sarikaya@ieee.org; Larry Kreeger (kreeger) <kreeger@cisco.com>;=20
> sfc@ietf.org; <nvo3@ietf.org> <nvo3@ietf.org>
> Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
>=20
> As I mentioned at the mic, if NSH runs over UDP/IP, then it can run=20
> over anything. And then every encapsulation spec doesn't need to=20
> special case NSH.
>=20
> Like the analogy I used at the mic . why doest't VXLAN-GPE have a code=20
> point for DNS?  ;-)
>=20
> Answer: it makes no sense. Run NSH as a transport layer client and it=20
> will work over everything we have already built and has a good chance=20
> to work over anything we will build.
>=20
> NSH is no more an overlay than SMTP is for email.
>=20
> Dino
>=20
> > On Nov 5, 2015, at 4:10 PM, Bottorff, Paul <paul.bottorff@hpe.com>
> wrote:
> >
> > It is definitely a useful option to run directly over Ethernet to=20
> > allow for small
> scale environments which don't need NVO3 overlays.
> >
> > Cheers,
> >
> > Paul
> >
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Lucy yong
> > Sent: Thursday, November 05, 2015 5:08 AM
> > To: Surendra Kumar (smkumar); Alia Atlas
> > Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> > Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > If SFC is deployed in Ethernet network, do we need NSH over Ethernet?
> >
> > Lucy
> >
> > From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
> > Sent: Thursday, November 05, 2015 4:12 AM
> > To: Alia Atlas; Lucy yong
> > Cc: sarikaya@ieee.org; Larry Kreeger (kreeger); sfc@ietf.org
> > Subject: RE: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > I did go through the process of getting the ethertype for NSH and I=20
> > also
> have obtained a UDP port# in the past. I have to agree with Alia.
> >
> > Lucy,
> > I appreciate you guys taking a crack at NSH over GRE over UDP nested
> encapsulation. It simply calls for unnecessary overhead and complexity=20
> in formulating and processing such a packet along the tunnel path.
> >
> > I admit i have not read your draft yet, will certainly do.
> >
> > Regard,
> > Surendra.
> >
> >
> >
> > Sent from a thumb typed device.
> >
> >
> > -------- Original message --------
> > From: Alia Atlas <akatlas@gmail.com>
> > Date: 2015/11/05 6:18 PM (GMT+09:00)
> > To: Lucy yong <lucy.yong@huawei.com>
> > Cc: sarikaya@ieee.org, "Larry Kreeger (kreeger)"=20
> > <kreeger@cisco.com>, sfc@ietf.org
> > Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > <no-hats>
> > I think that getting a UDP port is a lot more straightforward than=20
> > an
> Ethertype.
> > Not having extra bytes is also an advantage.
> >
> > Regards,
> > Alia
> > </no-hats>
> >
> > On Thu, Nov 5, 2015 at 4:15 AM, Lucy yong <lucy.yong@huawei.com>
> wrote:
> > Hi Larry,
> >
> > The benefit is to avoid working a UDP transport for NSH.
> >
> > Thanks,
> > Lucy
> >
> > -----Original Message-----
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Larry Kreeger
> > (kreeger)
> > Sent: Thursday, November 05, 2015 1:45 AM
> > To: sarikaya@ieee.org
> > Cc: sfc@ietf.org
> > Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> >
> > Hi Behcet,
> >
> > I=B9m not sure I=B9m following what your point is.  It is true that=20
> > VXLAN-GPE also
> adds additional overhead which may not always be needed.  Carrying NSH=20
> directly over UDP avoids that as well.  Lucy brought up a new option=20
> that I had never heard suggested before, which was to carry NSH in GRE ov=
er UDP.
> This adds a GRE header in between the UDP header and NSH, but in my=20
> opinion doesn=B9t bring any benefits - just more overhead and complicatio=
n.
> >
> > Thanks, Larry
> >
> > On 11/5/15, 4:32 PM, "Behcet Sarikaya" <sarikaya2012@gmail.com> wrote:
> >
> > >On Thu, Nov 5, 2015 at 1:10 AM, Larry Kreeger (kreeger)=20
> > ><kreeger@cisco.com> wrote:
> > >> Hi Lucy,
> > >>
> > >> One of the motivations for carrying NSH directly on UDP is to=20
> > >>avoid unnecessary overhead or complication.  Adding the GRE header=20
> > >>in between does  not seem to add any additional benefit that I can=20
> > >>see =AD only additional  overhead.
> > >>
> > >
> > >The point was not with VXLAN-GPE.
> > >
> > >Behcet
> > >> Thanks, Larry
> > >>
> > >> From: sfc <sfc-bounces@ietf.org> on behalf of Lucy yong=20
> > >> <lucy.yong@huawei.com>
> > >> Date: Wednesday, November 4, 2015 at 11:59 PM
> > >> To: "sfc@ietf.org" <sfc@ietf.org>
> > >> Subject: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
> > >>
> > >> There is a gre/udp tunnel transport
> > >>(draft-ietf-tsvwg-gre-in-udp-08) that  nsh can use for the=20
> > >>transport; just need to register an Ethertype for nsh.
> > >> The gre/udp transport provides all features nsh needs with=20
> > >>additional security capability.
> > >>
> > >>
> > >>
> > >> Lucy
> > >>
> > >>
> > >> _______________________________________________
> > >> sfc mailing list
> > >> sfc@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/sfc
> > >>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Nov  6 17:51:22 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC42D1A0125; Fri,  6 Nov 2015 17:51:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.911
X-Spam-Level: 
X-Spam-Status: No, score=-13.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k376AdLBBd5Z; Fri,  6 Nov 2015 17:51:19 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A34E1A0121; Fri,  6 Nov 2015 17:51:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10224; q=dns/txt; s=iport; t=1446861079; x=1448070679; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=St/atsBQuBaKKn6UBZTdKAQ6yYfwoAkk9X/y5tt3pgU=; b=LndPFHOjG7ko/okfy4VSjdzj/qW7mrwO+Hh9gmP+WK5uPnm4ZkbYGRCm hfV7FTknm5hGGnXX2pZAiwTc2Q0hV4AmF2EzHf6pnSjHuo100+NUFgVzJ jaQyzDXRIs9AD5dIQmG/V60f5Ym0eWMDG570he2AuiQMPrQ/vzNVmVgVN g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AUAgBfWD1W/4sNJK1egztTbwa+IgENg?= =?us-ascii?q?WEXCoVvAhyBGTgUAQEBAQEBAYEKhDUBAQEDAQEBASAROgsFBwQCAQgRAwEBAQE?= =?us-ascii?q?CAiMDAgICHwYLFAEICAIEDgUIiBEDCggNsE2LfQ2EPwEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBARQEgQGKUYJTgVcRATWDBIFEBZJng2EBiy+BboFih2WLMoNgg3EBHwE?= =?us-ascii?q?BQoIOAx2BVnKDUzqBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,255,1444694400"; d="scan'208";a="44776199"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-6.cisco.com with ESMTP; 07 Nov 2015 01:51:17 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id tA71pHRw006222 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 7 Nov 2015 01:51:17 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 6 Nov 2015 19:51:16 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Fri, 6 Nov 2015 19:51:16 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Dino Farinacci <farinacci@gmail.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAuVMAgAAC+oCAACcFIIAApkIAgAB1afA=
Date: Sat, 7 Nov 2015 01:51:16 +0000
Message-ID: <beb5333386ef48569755b19c7d69fa82@XCH-RCD-020.cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <0A891D0C-2D9C-4828-8BDE-706C56826315@gmail.com>
In-Reply-To: <0A891D0C-2D9C-4828-8BDE-706C56826315@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.155.34.162]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6EF_CUhndoHrnrWyoLtlUw_Vc54>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Nov 2015 01:51:21 -0000
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From nobody Fri Nov  6 19:03:52 2015
Return-Path: <farinacci@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FAE21ACCFD; Fri,  6 Nov 2015 19:03:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.4
X-Spam-Level: 
X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, J_CHICKENPOX_42=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l2_zxsoFpAmd; Fri,  6 Nov 2015 19:03:49 -0800 (PST)
Received: from mail-pa0-x236.google.com (mail-pa0-x236.google.com [IPv6:2607:f8b0:400e:c03::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D8421A21B9; Fri,  6 Nov 2015 19:03:49 -0800 (PST)
Received: by pabfh17 with SMTP id fh17so140480207pab.0; Fri, 06 Nov 2015 19:03:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=51/eT/qydjY6sv+R+B1IElzbPxgiKVmnr94jH0wO/e8=; b=feJ9Qjq3cfnd/IiA+RVTTBO+Q17ReqXP7dv8REFMPvjooMSXos6XbZpFNh5WyWuYKC qOgO6Ewsv2UaAI/5+i+Cs37gkZw2K29C2R9SYKx+L33S2ZKPb2khlf9ZP4ZQfDeCk8NM Q9AMjy0+PNKbXRdO61fMVjV1M3sZKfjEl6BQoqSKYdBCZto7wluvZAZI73Op3R7TKs2z 1q8JayCJCPErY2+T/Y4HvDfiUbUlIsKbfdm91HXQryuzVX427DGr7asvlM97gZD/Nw2Q MUwzPsONUOGgWM69Jw8t2r/x9E7l0rkOBfKk0KFy6T5ew3wiyCaOK5QAWfxvAtCFd5aD pklw==
X-Received: by 10.68.93.37 with SMTP id cr5mr22014823pbb.143.1446865428993; Fri, 06 Nov 2015 19:03:48 -0800 (PST)
Received: from [10.234.181.29] (mobile-166-171-248-027.mycingular.net. [166.171.248.27]) by smtp.gmail.com with ESMTPSA id in6sm2542347pbd.86.2015.11.06.19.03.47 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 06 Nov 2015 19:03:48 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Dino Farinacci <farinacci@gmail.com>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <beb5333386ef48569755b19c7d69fa82@XCH-RCD-020.cisco.com>
Date: Sat, 7 Nov 2015 12:03:44 +0900
Content-Transfer-Encoding: quoted-printable
Message-Id: <5F01B8F7-F20E-44CE-A9BE-46300CF9E0CA@gmail.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <0A891D0C-2D9C-4828-8BDE-706C56826315@gmail.com> <beb5333386ef48569755b19c7d69fa82@XCH-RCD-020.cisco.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/L6fuwNmuDKXN1Fy6KwnsDtS9flE>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Nov 2015 03:03:50 -0000

> On Nov 7, 2015, at 10:51 AM, Surendra Kumar (smkumar) <smkumar@cisco.com> w=
rote:
>=20
> That doesn't mean DNS  is spec'ed to run over VXLAN or MPLS. But DNS is tr=
ansport independent.=20
> SK> It is spec'ed to work on IP/UDP, understood and makes sense.

It should be spec'ed to work ONLY over UDP/IP. Everything else comes for fre=
e (or at the cost of what these NSH packets run over).=20

Dino=


From nobody Sat Nov  7 10:45:32 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C17151B2BDB for <sfc@ietfa.amsl.com>; Sat,  7 Nov 2015 10:45:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sL3e8-dCDLtf for <sfc@ietfa.amsl.com>; Sat,  7 Nov 2015 10:45:30 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A3951B2BCF for <sfc@ietf.org>; Sat,  7 Nov 2015 10:45:30 -0800 (PST)
Received: from localhost ([::1]:49739 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1Zv8US-0001Ih-DQ; Sat, 07 Nov 2015 10:45:28 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-nsh@tools.ietf.org, smkumar@cisco.com
X-Trac-Project: sfc
Date: Sat, 07 Nov 2015 18:45:28 -0000
X-URL: http://tools.ietf.org/sfc/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/sfc/trac/ticket/17
Message-ID: <055.f7d737baaa5f79fd7977fb94bd0e455f@tools.ietf.org>
X-Trac-Ticket-ID: 17
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-nsh@tools.ietf.org, smkumar@cisco.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-nsh@ietf.org
Resent-Message-Id: <20151107184530.9A3951B2BCF@ietfa.amsl.com>
Resent-Date: Sat,  7 Nov 2015 10:45:30 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/vADAKj25fxUFryV8lJFyHBpJa30>
Cc: sfc@ietf.org
Subject: [sfc] #17 (architecture): Purge examples section to remove transports
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Nov 2015 18:45:31 -0000

#17: Purge examples section to remove transports

 Given the neutral stance taken by the WG on transports and the general
 agreement not to pick a specific transport, the NSH encapsulation draft
 must not document specific transports even if it is in the form of
 examples. There was general agreement on the mailing list to remove
 examples section from NSH draft on the mailing list.

 This ticket is to track removal of section 9, from NSH WG draft revision
 -01.

-- 
---------------------------+-----------------------------------------------
 Reporter:                 |      Owner:  draft-ietf-sfc-nsh@tools.ietf.org
  smkumar@cisco.com        |     Status:  new
     Type:  defect         |  Milestone:
 Priority:  major          |    Version:
Component:  architecture   |   Keywords:
 Severity:  Active WG      |
  Document                 |
---------------------------+-----------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/17>
sfc <http://tools.ietf.org/sfc/>


From nobody Sat Nov  7 11:06:21 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F9931B2D75; Sat,  7 Nov 2015 11:06:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m4yro5v9ym-P; Sat,  7 Nov 2015 11:06:16 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCE6F1B2D6B; Sat,  7 Nov 2015 11:06:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1538; q=dns/txt; s=iport; t=1446923177; x=1448132777; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=axN4qr1e/GvUFf6b2hN6vbOJbn4iyq2FR7ccytEW2LM=; b=FNysLJj94CpPe2fvqNiUxzSL0MpddFd5GjSRRqT4pLniKJA5wUAymnAk j5y/5Tt/WpbJJaZcU8oGai+oVt133BgbZRCnuL0EILXBvOUcbRseGyuG0 uuxMcpCk5DQdlGSqE6gOFQgX8u12JhDLZW2IDl8UBBey51TwBH3gNLQnn w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AvAgAESj5W/5pdJa1egztTYA8GviYBDYFhIYVvAoEiOBQBAQEBAQEBgQqENQEBAQMBOj8FBwQCAQgRBAEBAR4QIREdCAIEDgUIiBEDCggNvEkNhD8BAQEBAQEBAQEBAQEBAQEBAQEBAQEYi1KCU4F1hHEFlkgBhR2GFIFugiuSTodSAR8BAUKCER2BVnIBhAyBBwEBAQ
X-IronPort-AV: E=Sophos;i="5.20,258,1444694400"; d="scan'208";a="206099913"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-7.cisco.com with ESMTP; 07 Nov 2015 19:06:16 +0000
Received: from XCH-ALN-008.cisco.com (xch-aln-008.cisco.com [173.36.7.18]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id tA7J6E7F031217 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 7 Nov 2015 19:06:15 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sat, 7 Nov 2015 13:06:14 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Sat, 7 Nov 2015 13:06:14 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [nvo3] [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656Nbb+AgAADXYCAABlgAIAAANEA//+qQpWAAJWuAIAAuVMAgAAC+oCAACcFIIAAa9EAgABSFgCAAJP/oA==
Date: Sat, 7 Nov 2015 19:06:13 +0000
Message-ID: <b79d89d1a3e746eaba411a1c1e5b4fc9@XCH-RCD-020.cisco.com>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <563C6DB4.1060707@joelhalpern.com> <A7D130AB-A794-4B3B-B31C-CFB1DF3EC3B9@cisco.com>
In-Reply-To: <A7D130AB-A794-4B3B-B31C-CFB1DF3EC3B9@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.23.215]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/D3dXwUfLWwZYsSd42bGZJJchK0g>
Cc: "<nvo3@ietf.org>" <nvo3@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [sfc] [nvo3]  comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Nov 2015 19:06:18 -0000

We had a similar discussion a while back and there was general agreement to=
 purge section 9 from NSH draft to avoid picking transports. Seems like it =
did not make the last revision. Filed a ticket to track the removal: http:/=
/trac.tools.ietf.org/wg/sfc/trac/ticket/17

Regards,
Surendra.

-----Original Message-----
From: Paul Quinn (paulq)=20
Sent: Friday, November 06, 2015 6:01 AM
To: Joel M. Halpern <jmh@joelhalpern.com>
Cc: Surendra Kumar (smkumar) <smkumar@cisco.com>; Dino Farinacci <farinacci=
@gmail.com>; Bottorff, Paul <paul.bottorff@hpe.com>; sfc@ietf.org; <nvo3@ie=
tf.org> <nvo3@ietf.org>; Lucy Yong <lucy.yong@huawei.com>; Alia Atlas <akat=
las@gmail.com>; sarikaya@ieee.org; Larry Kreeger (kreeger) <kreeger@cisco.c=
om>
Subject: Re: [nvo3] [sfc] comment on draft-kumar-sfc-nsh-udp-transport


> On Nov 6, 2015, at 4:07 AM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>=20
> I am having trouble understanding the conversation.
> We have a clear agreement that we are not going to standardize on transpo=
rt for NSH.
> And even more that we are not going to pick "one".
>=20

I agree.  It seems that we are trying to solve a problem that doesn't need =
to be solved. =20

If an operator wants to use UDP/NSH in their environment, so be it.  Simila=
rly, if they chose to use VXLAN-GPE or something else, so be it.  NSH doesn=
't care, and nor should we.


> So yes, this draft describes a valid and useful way to transport NSH. the=
re are many such.
>=20
> Yours,
> Joel


From nobody Mon Nov  9 06:00:11 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5326D1B2BDF for <sfc@ietfa.amsl.com>; Mon,  9 Nov 2015 06:00:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lgXQqS1Byy08 for <sfc@ietfa.amsl.com>; Mon,  9 Nov 2015 06:00:07 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B076E1B2BDA for <sfc@ietf.org>; Mon,  9 Nov 2015 06:00:07 -0800 (PST)
Received: from localhost ([::1]:53708 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1ZvmzM-0005Y5-FQ; Mon, 09 Nov 2015 06:00:04 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Mon, 09 Nov 2015 14:00:04 -0000
X-URL: http://tools.ietf.org/sfc/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/sfc/trac/ticket/13#comment:2
Message-ID: <081.b26731e5a9d673dde4d7604609a72f63@tools.ietf.org>
References: <066.e47bcbfaf64ea83e17548ea0b67b4a27@tools.ietf.org>
X-Trac-Ticket-ID: 13
In-Reply-To: <066.e47bcbfaf64ea83e17548ea0b67b4a27@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-control-plane@ietf.org
Resent-Message-Id: <20151109140007.B076E1B2BDA@ietfa.amsl.com>
Resent-Date: Mon,  9 Nov 2015 06:00:07 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/nJjFyQtcYECxd29SirKigc3Btr8>
Cc: sfc@ietf.org
Subject: Re: [sfc] #13 (control-plane): Sumandra Majee's comments
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2015 14:00:09 -0000

#13: Sumandra Majee's comments


Comment (by mohamed.boucadair@orange.com):

 A proposal to handle the comments from Sumandra. No feedback was received
 since then.

 ===
 De : BOUCADAIR Mohamed IMT/OLN
 EnvoyÃ© : mercredi 16 septembre 2015 16:44
 Ã€ : 'Sumandra Majee'
 Objet : Your comments (was RE: [sfc] WG call for adoption of draft-ww-sfc-
 control-plane-06)

 Hi Sumandra,

 Thank you for the comments.

 I recorded your comments in the issue tracker so that we donâ€™t miss them.

 Please see inline.

 Cheers,
 Med

 De : sfc [mailto:sfc-bounces@ietf.org] De la part de Sumandra Majee
 EnvoyÃ© : samedi 15 aoÃ»t 2015 04:43
 Ã€ : Jim Guichard (jguichar); sfc@ietf.org
 Objet : Re: [sfc] WG call for adoption of draft-ww-sfc-control-plane-06

 Support the adoption.

 Following are my comments and we should be able to discuss this before the
 last call.

 1.      4.7 SF liveliness detection:  An inband liveliness also should be
 considered and this control point should be the only recipient of this
 information. In a large distributed system this architecture may have a)
 scalability issues b) issues with reaction time.  If node#1 has the health
 information for node#2 it can (sometimes) independently take local
 decision. This will scale well. Furthermore attributes like latency etc.
 are measured at the local node, and this makes the feedback loop between
 observer and corresponding local control point much shorter.  This is in
 addition to what is described in draft.

 [Med] What about adding this sentence to section 4.7:
 â€œLocal failure detect and repair mechanisms may be enabled by SFC-aware
 nodes. Control Elements may be fed directly or indirectly with inputs from
 these mechanisms.â€

 2.      4.8 Monitoring and counters: Yes it is needed, but I am not sure
 this needs to be part of this draft. Either way the list of attributes are
 best incomplete and it will be always be like that. Why bother with this
 section at all.

 [Med] The purpose is to provide a non-exhaustive list of counters to
 illustrate which kind of information we are talking about. I donâ€™t think
 it is harmful to maintain this list. The text already states â€œ(but not
 limited to)â€. If you think this is confusing, I can change the text to
 make it more clear.

 3.
 SFC Classification policy entry should be bound to one single service
            function chain (or one single SFP)
              The above appears to be unnecessary, if I create a policy
 object I would rather refer it to multiple places. Can you describe a case
 or thought process behind this assertion.

 [Med] The full sentence is :

    SFC Classification policy entry should be bound to one single service
    function chain (or one single SFP); when an incoming packet matches
    more than one classification entry, tie-breaking criteria should be
    specified (e.g., priority).  Such tie-breaking criteria should be
    instructed by the control plane.

 The purpose of the sentence is to ensure that the classifier can be fed by
 the control plane with appropriate information for the sake of
 deterministic behaviors. When a packet matches several classification
 entries, further instructions are needed to decide which processing is to
 be followed. I hope this makes sense to you.
 ====

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  control-plane@tools.ietf.org
     Type:  enhancement              |      Status:  new
 Priority:  minor                    |   Milestone:
Component:  control-plane            |     Version:
 Severity:  -                        |  Resolution:
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/13#comment:2>
sfc <http://tools.ietf.org/sfc/>


From nobody Mon Nov  9 10:22:41 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C8B71A9145; Mon,  9 Nov 2015 10:22:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.6
X-Spam-Level: 
X-Spam-Status: No, score=-3.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JpTKljBtax9g; Mon,  9 Nov 2015 10:22:38 -0800 (PST)
Received: from g2t2353.austin.hp.com (g2t2353.austin.hp.com [15.217.128.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFCD91A9142; Mon,  9 Nov 2015 10:22:37 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g2t2353.austin.hp.com (Postfix) with ESMTPS id 0AE9770; Mon,  9 Nov 2015 18:22:37 +0000 (UTC)
Received: from G2W4311.americas.hpqcorp.net (16.197.24.199) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Mon, 9 Nov 2015 18:21:42 +0000
Received: from G2W2527.americas.hpqcorp.net ([169.254.7.38]) by G2W4311.americas.hpqcorp.net ([16.197.24.199]) with mapi id 14.03.0169.001; Mon, 9 Nov 2015 18:21:42 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Dino Farinacci <farinacci@gmail.com>, "Surendra Kumar (smkumar)" <smkumar@cisco.com>
Thread-Topic: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
Thread-Index: AQHRF5kQC6Wi60JfcUupHgwI/CzO656NCSqAgAADXYCAABlfAIAAANIAgAAO1gCAADEaAIAAuPBQgAADXICAAJDLgIAAPHwAgADeJgCAABRAAIAEIKBg
Date: Mon, 9 Nov 2015 18:21:42 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254A3D6E@G2W2527.americas.hpqcorp.net>
References: <D2612F72.171FE3%kreeger@cisco.com> <CAC8QAcfGottzudzk_L1wsNtKVp1e79=+UwncV82dXDc=115AEQ@mail.gmail.com> <D26136E4.172046%kreeger@cisco.com> <2691CE0099834E4A9C5044EEC662BB9D57207923@dfweml701-chm> <CAG4d1rd4AamVTAQnP8wCS156PKmc1ztTL=SqoC73YtLUCE+5gA@mail.gmail.com> <4lx4t6nneg0sxa2xob0057ph.1446718008074@email.android.com> <2691CE0099834E4A9C5044EEC662BB9D572079FD@dfweml701-chm> <94DA9C7F532AD946852C9C5527195239254A3A0F@G2W2527.americas.hpqcorp.net> <A6F0833C-51AF-4972-819D-6A71D42AF8EE@gmail.com> <eea8bdfa00114be492f814bcb6514a4f@XCH-RCD-020.cisco.com> <0A891D0C-2D9C-4828-8BDE-706C56826315@gmail.com> <beb5333386ef48569755b19c7d69fa82@XCH-RCD-020.cisco.com> <5F01B8F7-F20E-44CE-A9BE-46300CF9E0CA@gmail.com>
In-Reply-To: <5F01B8F7-F20E-44CE-A9BE-46300CF9E0CA@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.193.232.30]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/f9lp43VwzJSoMq--wXzT6YJKrLw>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "<nvo3@ietf.org>" <nvo3@ietf.org>, Lucy Yong <lucy.yong@huawei.com>, Alia Atlas <akatlas@gmail.com>, "sarikaya@ieee.org" <sarikaya@ieee.org>, "Larry Kreeger \(kreeger\)" <kreeger@cisco.com>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2015 18:22:39 -0000

All:

Directly over Ethernet is the lowest overhead encapsulation (less than UDP)=
 and does not come for free with the direct over UDP proposal. In addition,=
 supporting NSH over VxLAN is also an L2 encapsulation. Both of these suppo=
rt MAC Chains as in https://datatracker.ietf.org/doc/draft-fedyk-sfc-mac-ch=
ain/  as well as NSH tuple match and MPLS forwarding. At very least we woul=
d need both direct Ethernet and direct UDP to cover all the proposals.

The NSH header is a tag header used to steer packets to intermediate destin=
ations (which are SFs). The proper layering is between the L2 and L3 header=
s not at L3 or L4.

Cheers,

Paul

-----Original Message-----
From: Dino Farinacci [mailto:farinacci@gmail.com]=20
Sent: Friday, November 06, 2015 7:04 PM
To: Surendra Kumar (smkumar)
Cc: Bottorff, Paul; Lucy Yong; Alia Atlas; sarikaya@ieee.org; Larry Kreeger=
 (kreeger); sfc@ietf.org; <nvo3@ietf.org>
Subject: Re: [sfc] comment on draft-kumar-sfc-nsh-udp-transport

> On Nov 7, 2015, at 10:51 AM, Surendra Kumar (smkumar) <smkumar@cisco.com>=
 wrote:
>=20
> That doesn't mean DNS  is spec'ed to run over VXLAN or MPLS. But DNS is t=
ransport independent.=20
> SK> It is spec'ed to work on IP/UDP, understood and makes sense.

It should be spec'ed to work ONLY over UDP/IP. Everything else comes for fr=
ee (or at the cost of what these NSH packets run over).=20

Dino


From nobody Tue Nov 10 16:32:44 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD3CA1B4476 for <sfc@ietfa.amsl.com>; Tue, 10 Nov 2015 16:32:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hTpMlcZ9RfR8 for <sfc@ietfa.amsl.com>; Tue, 10 Nov 2015 16:32:41 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9DD4B1B4474 for <sfc@ietf.org>; Tue, 10 Nov 2015 16:32:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9545; q=dns/txt; s=iport; t=1447201962; x=1448411562; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=gGCMxzb/v54PrPoRewadmXFWTOXwRzqDAjB/9Z8psVA=; b=J20wlOj/B/GeVXsNUvCVbSxvkOw/6e7NU2mVHn5z4X8hu7j1IWGpKWCd OGvbPIhzYgfoiQmJLlEXh3HxEbNnk1KRDSpy3084bHhB2DNa9oRvlzmgT gWQhzt5/oynH/aBsWpoxP0PB04QY53WFfPloQwWdPzNivqpSm68t9A+R7 I=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DYAgDji0JW/40NJK1EGoM7U28GvkQOgWUhhW8CgUQ4FAEBAQEBAQGBCoQ0AQEBAgEBI1YFCwIBCBIGKgICMhcOAgQOBQ6IGAgNO7JzkF4BAQEBAQEBAQEBAQEBAQEBAQEBAQEPCYZUghCCboFAg0iCbS+BFQWHRAqGf4d7AYJSgWCIc4FbhECWKQEfAUOCEQ0QgVZyAROEO4EHAQEB
X-IronPort-AV: E=Sophos;i="5.20,272,1444694400";  d="asc'?scan'208,217";a="49210459"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-3.cisco.com with ESMTP; 11 Nov 2015 00:32:41 +0000
Received: from XCH-RTP-002.cisco.com (xch-rtp-002.cisco.com [64.101.220.142]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id tAB0WdsU030489 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 11 Nov 2015 00:32:40 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-002.cisco.com (64.101.220.142) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 10 Nov 2015 19:32:39 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Tue, 10 Nov 2015 19:32:39 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: RFC Errata System <rfc-editor@rfc-editor.org>
Thread-Topic: [Technical Errata Reported] RFC7665 (4528)
Thread-Index: AQHRGyZl5mmsXA1EdEeCL84g0AADoZ6WTnKA
Date: Wed, 11 Nov 2015 00:32:38 +0000
Message-ID: <D69C74B6-0B32-4978-92AD-80C6D6B99A25@cisco.com>
References: <20151109193828.4E1521801AE@rfc-editor.org>
In-Reply-To: <20151109193828.4E1521801AE@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.111.202]
Content-Type: multipart/signed; boundary="Apple-Mail=_A9AA1298-F8FB-44BF-81D0-47307D6C2BB6"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CBNVcQWMGeyt0xj4M8JHaKTSyNs>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "BRUNGARD, DEBORAH A" <db3546@att.com>, "igor.duarte.cardoso@intel.com" <igor.duarte.cardoso@intel.com>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, "Alvaro Retana \(aretana\)" <aretana@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] [Technical Errata Reported] RFC7665 (4528)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Nov 2015 00:32:44 -0000

--Apple-Mail=_A9AA1298-F8FB-44BF-81D0-47307D6C2BB6
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_A7DC60F9-A7F5-4EF1-A127-B43ABD05201B"


--Apple-Mail=_A7DC60F9-A7F5-4EF1-A127-B43ABD05201B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi,

I believe this erratum is correct and should be Verified.

I tracked it down =E2=80=94 this was introduced in revision -10 of the =
sfc-architecture document, while working on resolving one Security =
AD=E2=80=99s DISCUSS.

In particular, you can see the text presented as a proposal in Prague =
(https://www.ietf.org/proceedings/93/slides/slides-93-sfc-6.pdf =
<https://www.ietf.org/proceedings/93/slides/slides-93-sfc-6.pdf>, see =
Slide 11). We missed this one as a WG.

Thanks,

=E2=80=94 Carlos.


> On Nov 9, 2015, at 8:38 PM, RFC Errata System =
<rfc-editor@rfc-editor.org> wrote:
>=20
> The following errata report has been submitted for RFC7665,
> "Service Function Chaining (SFC) Architecture".
>=20
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=3D7665&eid=3D4528
>=20
> --------------------------------------
> Type: Technical
> Reported by: Igor Duarte Cardoso <igor.duarte.cardoso@intel.com>
>=20
> Section: 6
>=20
> Original Text
> -------------
> packets at certain points on certain service chains, the control
> mechanism MUST verify that appropriate protective treatment of
> NSH information is available from the point where the
> information is added to the point where it will be removed.  If
> such mechanisms are unavailable, error notifications SHOULD be
> generated.
>=20
> Corrected Text
> --------------
> packets at certain points on certain service chains, the control
> mechanism MUST verify that appropriate protective treatment of
> SFC encapsulation information is available from the point where the
> information is added to the point where it will be removed.  If
> such mechanisms are unavailable, error notifications SHOULD be
> generated.
>=20
> Notes
> -----
> NSH has not been introduced earlier in the document. Moreover, the =
reference to NSH itself seems to have been a tiny mistake that slipped.
> The corrected text replaces NSH with SFC encapsulation.
>=20
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party (IESG)
> can log in to change the status and edit the report, if necessary.
>=20
> --------------------------------------
> RFC7665 (draft-ietf-sfc-architecture-11)
> --------------------------------------
> Title               : Service Function Chaining (SFC) Architecture
> Publication Date    : October 2015
> Author(s)           : J. Halpern, Ed., C. Pignataro, Ed.
> Category            : INFORMATIONAL
> Source              : Service Function Chaining
> Area                : Routing
> Stream              : IETF
> Verifying Party     : IESG
>=20


--Apple-Mail=_A7DC60F9-A7F5-4EF1-A127-B43ABD05201B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Hi,<div class=3D""><br class=3D""></div><div class=3D"">I =
believe this erratum is correct and should be Verified.</div><div =
class=3D""><br class=3D""></div><div class=3D"">I tracked it down =E2=80=94=
 this was introduced in revision -10 of the sfc-architecture document, =
while working on resolving one Security AD=E2=80=99s DISCUSS.</div><div =
class=3D""><br class=3D""></div><div class=3D"">In particular, you can =
see the text presented as a proposal in Prague (<a =
href=3D"https://www.ietf.org/proceedings/93/slides/slides-93-sfc-6.pdf" =
class=3D"">https://www.ietf.org/proceedings/93/slides/slides-93-sfc-6.pdf<=
/a>, see Slide 11). We missed this one as a WG.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Thanks,</div><div class=3D""><br =
class=3D""></div><div class=3D"">=E2=80=94 Carlos.</div><div =
class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D"">On =
Nov 9, 2015, at 8:38 PM, RFC Errata System &lt;<a =
href=3D"mailto:rfc-editor@rfc-editor.org" =
class=3D"">rfc-editor@rfc-editor.org</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">The =
following errata report has been submitted for RFC7665,<br =
class=3D"">"Service Function Chaining (SFC) Architecture".<br =
class=3D""><br class=3D"">--------------------------------------<br =
class=3D"">You may review the report below and at:<br class=3D""><a =
href=3D"http://www.rfc-editor.org/errata_search.php?rfc=3D7665&amp;eid=3D4=
528" =
class=3D"">http://www.rfc-editor.org/errata_search.php?rfc=3D7665&amp;eid=3D=
4528</a><br class=3D""><br =
class=3D"">--------------------------------------<br class=3D"">Type: =
Technical<br class=3D"">Reported by: Igor Duarte Cardoso =
&lt;igor.duarte.cardoso@intel.com&gt;<br class=3D""><br =
class=3D"">Section: 6<br class=3D""><br class=3D"">Original Text<br =
class=3D"">-------------<br class=3D"">packets at certain points on =
certain service chains, the control<br class=3D"">mechanism MUST verify =
that appropriate protective treatment of<br class=3D"">NSH information =
is available from the point where the<br class=3D"">information is added =
to the point where it will be removed. &nbsp;If<br class=3D"">such =
mechanisms are unavailable, error notifications SHOULD be<br =
class=3D"">generated.<br class=3D""><br class=3D"">Corrected Text<br =
class=3D"">--------------<br class=3D"">packets at certain points on =
certain service chains, the control<br class=3D"">mechanism MUST verify =
that appropriate protective treatment of<br class=3D"">SFC encapsulation =
information is available from the point where the<br =
class=3D"">information is added to the point where it will be removed. =
&nbsp;If<br class=3D"">such mechanisms are unavailable, error =
notifications SHOULD be<br class=3D"">generated.<br class=3D""><br =
class=3D"">Notes<br class=3D"">-----<br class=3D"">NSH has not been =
introduced earlier in the document. Moreover, the reference to NSH =
itself seems to have been a tiny mistake that slipped.<br class=3D"">The =
corrected text replaces NSH with SFC encapsulation.<br class=3D""><br =
class=3D"">Instructions:<br class=3D"">-------------<br class=3D"">This =
erratum is currently posted as "Reported". If necessary, please<br =
class=3D"">use "Reply All" to discuss whether it should be verified =
or<br class=3D"">rejected. When a decision is reached, the verifying =
party (IESG)<br class=3D"">can log in to change the status and edit the =
report, if necessary. <br class=3D""><br =
class=3D"">--------------------------------------<br class=3D"">RFC7665 =
(draft-ietf-sfc-architecture-11)<br =
class=3D"">--------------------------------------<br class=3D"">Title =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;: Service Function Chaining (SFC) Architecture<br =
class=3D"">Publication Date &nbsp;&nbsp;&nbsp;: October 2015<br =
class=3D"">Author(s) =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: J. =
Halpern, Ed., C. Pignataro, Ed.<br class=3D"">Category =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: =
INFORMATIONAL<br class=3D"">Source =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;: Service Function Chaining<br class=3D"">Area =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;: Routing<br class=3D"">Stream =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;: IETF<br class=3D"">Verifying Party &nbsp;&nbsp;&nbsp;&nbsp;: =
IESG<br class=3D""><br class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_A7DC60F9-A7F5-4EF1-A127-B43ABD05201B--

--Apple-Mail=_A9AA1298-F8FB-44BF-81D0-47307D6C2BB6
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=Z7Nu
-----END PGP SIGNATURE-----

--Apple-Mail=_A9AA1298-F8FB-44BF-81D0-47307D6C2BB6--


From nobody Tue Nov 10 16:38:07 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BC791B44C7 for <sfc@ietfa.amsl.com>; Tue, 10 Nov 2015 16:38:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BWhB5TT3oDyc for <sfc@ietfa.amsl.com>; Tue, 10 Nov 2015 16:38:04 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 927261B44C1 for <sfc@ietf.org>; Tue, 10 Nov 2015 16:38:04 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 7035A1C0653; Tue, 10 Nov 2015 16:38:04 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 0327B1C00FB; Tue, 10 Nov 2015 16:38:02 -0800 (PST)
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, RFC Errata System <rfc-editor@rfc-editor.org>
References: <20151109193828.4E1521801AE@rfc-editor.org> <D69C74B6-0B32-4978-92AD-80C6D6B99A25@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <56428DE9.4060206@joelhalpern.com>
Date: Tue, 10 Nov 2015 19:38:01 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <D69C74B6-0B32-4978-92AD-80C6D6B99A25@cisco.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ajiKnZiMCuIXml0r-MpOfBzVXsk>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "BRUNGARD, DEBORAH A" <db3546@att.com>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, "igor.duarte.cardoso@intel.com" <igor.duarte.cardoso@intel.com>, "Alvaro Retana \(aretana\)" <aretana@cisco.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [sfc] [Technical Errata Reported] RFC7665 (4528)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Nov 2015 00:38:06 -0000

Agreed.  (And thanks for tracking down the details Carlos.)
Joel

On 11/10/15 7:32 PM, Carlos Pignataro (cpignata) wrote:
> Hi,
>
> I believe this erratum is correct and should be Verified.
>
> I tracked it down â€” this was introduced in revision -10 of the
> sfc-architecture document, while working on resolving one Security ADâ€™s
> DISCUSS.
>
> In particular, you can see the text presented as a proposal in Prague
> (https://www.ietf.org/proceedings/93/slides/slides-93-sfc-6.pdf, see
> Slide 11). We missed this one as a WG.
>
> Thanks,
>
> â€” Carlos.
>
>
>> On Nov 9, 2015, at 8:38 PM, RFC Errata System
>> <rfc-editor@rfc-editor.org <mailto:rfc-editor@rfc-editor.org>> wrote:
>>
>> The following errata report has been submitted for RFC7665,
>> "Service Function Chaining (SFC) Architecture".
>>
>> --------------------------------------
>> You may review the report below and at:
>> http://www.rfc-editor.org/errata_search.php?rfc=7665&eid=4528
>>
>> --------------------------------------
>> Type: Technical
>> Reported by: Igor Duarte Cardoso <igor.duarte.cardoso@intel.com>
>>
>> Section: 6
>>
>> Original Text
>> -------------
>> packets at certain points on certain service chains, the control
>> mechanism MUST verify that appropriate protective treatment of
>> NSH information is available from the point where the
>> information is added to the point where it will be removed.  If
>> such mechanisms are unavailable, error notifications SHOULD be
>> generated.
>>
>> Corrected Text
>> --------------
>> packets at certain points on certain service chains, the control
>> mechanism MUST verify that appropriate protective treatment of
>> SFC encapsulation information is available from the point where the
>> information is added to the point where it will be removed.  If
>> such mechanisms are unavailable, error notifications SHOULD be
>> generated.
>>
>> Notes
>> -----
>> NSH has not been introduced earlier in the document. Moreover, the
>> reference to NSH itself seems to have been a tiny mistake that slipped.
>> The corrected text replaces NSH with SFC encapsulation.
>>
>> Instructions:
>> -------------
>> This erratum is currently posted as "Reported". If necessary, please
>> use "Reply All" to discuss whether it should be verified or
>> rejected. When a decision is reached, the verifying party (IESG)
>> can log in to change the status and edit the report, if necessary.
>>
>> --------------------------------------
>> RFC7665 (draft-ietf-sfc-architecture-11)
>> --------------------------------------
>> Title               : Service Function Chaining (SFC) Architecture
>> Publication Date    : October 2015
>> Author(s)           : J. Halpern, Ed., C. Pignataro, Ed.
>> Category            : INFORMATIONAL
>> Source              : Service Function Chaining
>> Area                : Routing
>> Stream              : IETF
>> Verifying Party     : IESG
>>
>


From nobody Wed Nov 11 08:04:48 2015
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 897121B7F1F for <sfc@ietfa.amsl.com>; Mon,  9 Nov 2015 08:33:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level: 
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5c4cIqlzgsU8 for <sfc@ietfa.amsl.com>; Mon,  9 Nov 2015 08:33:08 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) by ietfa.amsl.com (Postfix) with ESMTP id 377DC1B7F13 for <sfc@ietf.org>; Mon,  9 Nov 2015 08:33:07 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id CBEE918000B; Mon,  9 Nov 2015 08:31:51 -0800 (PST)
To: paulq@cisco.com, tnadeau@lucidvision.com, akatlas@gmail.com, db3546@att.com, aretana@cisco.com, jguichar@cisco.com, narten@us.ibm.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20151109163151.CBEE918000B@rfc-editor.org>
Date: Mon,  9 Nov 2015 08:31:51 -0800 (PST)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/LMK-werWKx7Nty5Fh-e8dBBbC7U>
X-Mailman-Approved-At: Wed, 11 Nov 2015 08:04:47 -0800
Cc: rfc-editor@rfc-editor.org, sfc@ietf.org, igor.duarte.cardoso@intel.com
Subject: [sfc] [Editorial Errata Reported] RFC7498 (4527)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2015 16:33:09 -0000

The following errata report has been submitted for RFC7498,
"Problem Statement for Service Function Chaining".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7498&eid=4527

--------------------------------------
Type: Editorial
Reported by: Igor Duarte Cardoso <igor.duarte.cardoso@intel.com>

Section: 4

Original Text
-------------
Although this problem statement does not introduce any protocols,
   when considering service function chaining, the three main areas
   begin investigated (see Section 3) by the WG have security aspects
   that warrant consideration.

Corrected Text
--------------
Although this problem statement does not introduce any protocols,
   when considering service function chaining, the three main areas
   being investigated (see Section 3) by the WG have security aspects
   that warrant consideration.

Notes
-----
\\"begin\\" replaced by \\"being\\", it seems to have been a missed typo.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC7498 (draft-ietf-sfc-problem-statement-13)
--------------------------------------
Title               : Problem Statement for Service Function Chaining
Publication Date    : April 2015
Author(s)           : P. Quinn, Ed., T. Nadeau, Ed.
Category            : INFORMATIONAL
Source              : Service Function Chaining
Area                : Routing
Stream              : IETF
Verifying Party     : IESG


From nobody Wed Nov 11 08:04:50 2015
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 507841B8265 for <sfc@ietfa.amsl.com>; Mon,  9 Nov 2015 11:39:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.912
X-Spam-Level: 
X-Spam-Status: No, score=-101.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HYj4mzH10ZVf for <sfc@ietfa.amsl.com>; Mon,  9 Nov 2015 11:39:44 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) by ietfa.amsl.com (Postfix) with ESMTP id 215521B8261 for <sfc@ietf.org>; Mon,  9 Nov 2015 11:39:44 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 4E1521801AE; Mon,  9 Nov 2015 11:38:28 -0800 (PST)
To: jmh@joelhalpern.com, cpignata@cisco.com, akatlas@gmail.com, db3546@att.com, aretana@cisco.com, jguichar@cisco.com, narten@us.ibm.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20151109193828.4E1521801AE@rfc-editor.org>
Date: Mon,  9 Nov 2015 11:38:28 -0800 (PST)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/zaNbdtHJJKK9Hd8f2k4cXhHNK6Q>
X-Mailman-Approved-At: Wed, 11 Nov 2015 08:04:47 -0800
Cc: rfc-editor@rfc-editor.org, sfc@ietf.org, igor.duarte.cardoso@intel.com
Subject: [sfc] [Technical Errata Reported] RFC7665 (4528)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2015 19:39:45 -0000

The following errata report has been submitted for RFC7665,
"Service Function Chaining (SFC) Architecture".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7665&eid=4528

--------------------------------------
Type: Technical
Reported by: Igor Duarte Cardoso <igor.duarte.cardoso@intel.com>

Section: 6

Original Text
-------------
packets at certain points on certain service chains, the control
mechanism MUST verify that appropriate protective treatment of
NSH information is available from the point where the
information is added to the point where it will be removed.  If
such mechanisms are unavailable, error notifications SHOULD be
generated.

Corrected Text
--------------
packets at certain points on certain service chains, the control
mechanism MUST verify that appropriate protective treatment of
SFC encapsulation information is available from the point where the
information is added to the point where it will be removed.  If
such mechanisms are unavailable, error notifications SHOULD be
generated.

Notes
-----
NSH has not been introduced earlier in the document. Moreover, the reference to NSH itself seems to have been a tiny mistake that slipped.
The corrected text replaces NSH with SFC encapsulation.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC7665 (draft-ietf-sfc-architecture-11)
--------------------------------------
Title               : Service Function Chaining (SFC) Architecture
Publication Date    : October 2015
Author(s)           : J. Halpern, Ed., C. Pignataro, Ed.
Category            : INFORMATIONAL
Source              : Service Function Chaining
Area                : Routing
Stream              : IETF
Verifying Party     : IESG


From nobody Wed Nov 11 08:13:30 2015
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 902711B2B4E; Wed, 11 Nov 2015 08:13:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level: 
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id stidIkeewiLj; Wed, 11 Nov 2015 08:13:24 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) by ietfa.amsl.com (Postfix) with ESMTP id 5ECA51B2B4D; Wed, 11 Nov 2015 08:13:24 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id CCAE5180003; Wed, 11 Nov 2015 08:12:02 -0800 (PST)
To: igor.duarte.cardoso@intel.com, jmh@joelhalpern.com, cpignata@cisco.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20151111161202.CCAE5180003@rfc-editor.org>
Date: Wed, 11 Nov 2015 08:12:02 -0800 (PST)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AemLCfrqFj2k-vXwTHy9p6jG_Z4>
Cc: akatlas@juniper.net, iesg@ietf.org, sfc@ietf.org, rfc-editor@rfc-editor.org
Subject: [sfc] [Errata Verified] RFC7665 (4528)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Nov 2015 16:13:25 -0000

The following errata report has been verified for RFC7665,
"Service Function Chaining (SFC) Architecture". 

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7665&eid=4528

--------------------------------------
Status: Verified
Type: Technical

Reported by: Igor Duarte Cardoso <igor.duarte.cardoso@intel.com>
Date Reported: 2015-11-09
Verified by: Alia Atlas (IESG)

Section: 6

Original Text
-------------
packets at certain points on certain service chains, the control
mechanism MUST verify that appropriate protective treatment of
NSH information is available from the point where the
information is added to the point where it will be removed.  If
such mechanisms are unavailable, error notifications SHOULD be
generated.

Corrected Text
--------------
packets at certain points on certain service chains, the control
mechanism MUST verify that appropriate protective treatment of
SFC encapsulation information is available from the point where the
information is added to the point where it will be removed.  If
such mechanisms are unavailable, error notifications SHOULD be
generated.

Notes
-----
NSH has not been introduced earlier in the document. Moreover, the reference to NSH itself seems to have been a tiny mistake that slipped.
The corrected text replaces NSH with SFC encapsulation.

--------------------------------------
RFC7665 (draft-ietf-sfc-architecture-11)
--------------------------------------
Title               : Service Function Chaining (SFC) Architecture
Publication Date    : October 2015
Author(s)           : J. Halpern, Ed., C. Pignataro, Ed.
Category            : INFORMATIONAL
Source              : Service Function Chaining
Area                : Routing
Stream              : IETF
Verifying Party     : IESG


From nobody Wed Nov 11 08:14:13 2015
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CA5D1AC432; Wed, 11 Nov 2015 08:14:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level: 
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2HA-Vzw_vmVv; Wed, 11 Nov 2015 08:14:07 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) by ietfa.amsl.com (Postfix) with ESMTP id EF57F1AC3EC; Wed, 11 Nov 2015 08:14:06 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 70242180003; Wed, 11 Nov 2015 08:12:45 -0800 (PST)
To: igor.duarte.cardoso@intel.com, paulq@cisco.com, tnadeau@lucidvision.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20151111161245.70242180003@rfc-editor.org>
Date: Wed, 11 Nov 2015 08:12:45 -0800 (PST)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/shEnGotupL6cdfzMU8MFFzKPs8o>
Cc: akatlas@juniper.net, iesg@ietf.org, sfc@ietf.org, rfc-editor@rfc-editor.org
Subject: [sfc] [Errata Held for Document Update] RFC7498 (4527)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Nov 2015 16:14:08 -0000

The following errata report has been held for document update 
for RFC7498, "Problem Statement for Service Function Chaining". 

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7498&eid=4527

--------------------------------------
Status: Held for Document Update
Type: Editorial

Reported by: Igor Duarte Cardoso <igor.duarte.cardoso@intel.com>
Date Reported: 2015-11-09
Held by: Alia Atlas (IESG)

Section: 4

Original Text
-------------
Although this problem statement does not introduce any protocols,
   when considering service function chaining, the three main areas
   begin investigated (see Section 3) by the WG have security aspects
   that warrant consideration.

Corrected Text
--------------
Although this problem statement does not introduce any protocols,
   when considering service function chaining, the three main areas
   being investigated (see Section 3) by the WG have security aspects
   that warrant consideration.

Notes
-----
\\\\\\\\\\\\\\\\"begin\\\\\\\\\\\\\\\\" replaced by \\\\\\\\\\\\\\\\"being\\\\\\\\\\\\\\\\", it seems to have been a missed typo.

--------------------------------------
RFC7498 (draft-ietf-sfc-problem-statement-13)
--------------------------------------
Title               : Problem Statement for Service Function Chaining
Publication Date    : April 2015
Author(s)           : P. Quinn, Ed., T. Nadeau, Ed.
Category            : INFORMATIONAL
Source              : Service Function Chaining
Area                : Routing
Stream              : IETF
Verifying Party     : IESG


From nobody Wed Nov 11 22:42:43 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCAB91B29CD for <sfc@ietfa.amsl.com>; Wed, 11 Nov 2015 22:42:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 85bSGJrQrabK for <sfc@ietfa.amsl.com>; Wed, 11 Nov 2015 22:42:39 -0800 (PST)
Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by ietfa.amsl.com (Postfix) with ESMTP id 12A271ACEFD for <sfc@ietf.org>; Wed, 11 Nov 2015 22:42:39 -0800 (PST)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP; 11 Nov 2015 22:42:29 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,280,1444719600";  d="scan'208,217";a="817924868"
Received: from orsmsx107.amr.corp.intel.com ([10.22.240.5]) by orsmga001.jf.intel.com with ESMTP; 11 Nov 2015 22:42:29 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX107.amr.corp.intel.com ([169.254.1.197]) with mapi id 14.03.0248.002; Wed, 11 Nov 2015 22:42:28 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc]  will you trust your SF?
Thread-Index: AdEXp8m6yQaw1JVOQR+GEAPtWpkjCwFbTtzQ
Date: Thu, 12 Nov 2015 06:42:28 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.138]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958581E2E869ORSMSX114amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/dAfZJisxXEsmkHVKCH5sh11hHL4>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 06:42:42 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2E869ORSMSX114amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958581E2E869ORSMSX114amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> sfc@ietf.org<br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2E869ORSMSX114amrcor_--


From nobody Wed Nov 11 23:32:15 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 651ED1A6FFB for <sfc@ietfa.amsl.com>; Wed, 11 Nov 2015 23:32:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u8cGIPxg4BMk for <sfc@ietfa.amsl.com>; Wed, 11 Nov 2015 23:32:10 -0800 (PST)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 8B3D91A6FF5 for <sfc@ietf.org>; Wed, 11 Nov 2015 23:32:10 -0800 (PST)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 12 Nov 2015 02:32:12 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVZFiGO/1AuG0GyjOiLT/Ut556X+7xQ
Date: Thu, 12 Nov 2015 07:32:11 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [182.248.147.153]
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830D9BE96wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ilhbFWTavCOYH7AfpUQWyFyVoWs>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 07:32:13 -0000

--_000_E8355113905631478EFF04F5AA706E9830D9BE96wtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_E8355113905631478EFF04F5AA706E9830D9BE96wtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi</span></a><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> sfc@ietf.org<br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830D9BE96wtlexchp2sandvi_--


From nobody Thu Nov 12 06:38:09 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 856C01B2F80 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 06:38:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id duyYlTZ7vs8K for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 06:38:03 -0800 (PST)
Received: from hub021-ca-3.exch021.serverdata.net (hub021-ca-3.exch021.serverdata.net [64.78.22.170]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 314741B2F7E for <sfc@ietf.org>; Thu, 12 Nov 2015 06:38:03 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-3.exch021.domain.local ([10.254.4.36]) with mapi id 14.03.0224.002;  Thu, 12 Nov 2015 06:38:02 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Dave Dolson <ddolson@sandvine.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVWq9pAcFkg4UqlQ9fogLg0pp6YhG2A///wavA=
Date: Thu, 12 Nov 2015 14:38:02 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: multipart/alternative; boundary="_000_CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0MBX021W3CA2exch_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cgLUBNDbYUY6Ii7sT6PWBKUjshk>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 14:38:06 -0000

--_000_CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0MBX021W3CA2exch_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Dave,

I agree with your analysis.   What we've been thinking of as "legacy SF" (i=
.e., incapable of processing NSH) can be applied equally to untrusted SF (i=
.e., capable of processing NSH, but local policy is to not provide NSH).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0MBX021W3CA2exch_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Dave,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I agree with your anal=
ysis.&nbsp;&nbsp; What we&#8217;ve been thinking of as &#8220;legacy SF&#82=
21; (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not
 provide NSH).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp; Ron<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D"><o:p>&nbsp;</o:p></span></a></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Dave Dolson<br>
<b>Sent:</b> Thursday, November 12, 2015 2:32 AM<br>
<b>To:</b> Elzur, Uri &lt;uri.elzur@intel.com&gt;; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [<a href=3D"mailto:sfc-bounc=
es@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0MBX021W3CA2exch_--


From nobody Thu Nov 12 07:23:02 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9483B1ACE64 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 07:23:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CRJYa2mqcyoB for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 07:23:00 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3DBAE1ACE62 for <sfc@ietf.org>; Thu, 12 Nov 2015 07:23:00 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 2A7EB240C32; Thu, 12 Nov 2015 07:23:00 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id BB097240662; Thu, 12 Nov 2015 07:22:59 -0800 (PST)
To: "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5644AED2.4070000@joelhalpern.com>
Date: Thu, 12 Nov 2015 10:22:58 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Ti-k98p2A5ElRcK2XQvqHqam-ew>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 15:23:01 -0000

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service 
function will not modify the service path identification, even while 
they expect it to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri (“Oo-Ree”)
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I’d like to
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the map
> (as the new 5 tuple may not be there) and to imply the SF is trusted for
> this operation.
>
> This goes beyond the question of what to do in the case the SF changed
> the 5-tuple. It is the question of: is the SF trusted - for the sake of
> the 5 tuple, as well as for NSH header changes (e.g. SI decrement or
> even SPI change in case a “Classifier” is incorporated). If not, the SFF
> (or the Proxy) has to keep that state and VERIFY it on the outbound…
>
> There are opinions as if we need to allow for some SF that are fully
> trusted and some that are not trusted. I assume all agree the SFF is
> part of the infrastructure and is trusted. We need to close on this for
> the NSH draft too.
>
> Thx
>
> Uri (“Oo-Ree”)
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Nov 12 07:31:20 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 144031ACEE4 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 07:31:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f1BAydz3slEA for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 07:31:17 -0800 (PST)
Received: from hub021-ca-2.exch021.serverdata.net (hub021-ca-2.exch021.serverdata.net [64.78.22.169]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4665A1ACED2 for <sfc@ietf.org>; Thu, 12 Nov 2015 07:31:17 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-2.exch021.domain.local ([10.254.4.33]) with mapi id 14.03.0224.002;  Thu, 12 Nov 2015 07:31:16 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVWq9pAcFkg4UqlQ9fogLg0pp6ZB/cA//97U9A=
Date: Thu, 12 Nov 2015 15:31:17 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E958F8C@MBX021-W3-CA-2.exch021.domain.local>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com>
In-Reply-To: <5644AED2.4070000@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/gHnoa0KbW5-Bt7MIrY2d6FzQ6YY>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 15:31:19 -0000

Joel,

As optional behavior for SFF, a stateful SFF would have the ability to enfo=
rce policy regarding attached SF's authorization to change path-id, remove =
meta-data, add meta-data, change meta-data, etc.

   Ron




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Thursday, November 12, 2015 10:23 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service functio=
n will not modify the service path identification, even while they expect i=
t to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in=20
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel=20
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I'd like to=20
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the=20
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the=20
> map (as the new 5 tuple may not be there) and to imply the SF is=20
> trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed=20
> the 5-tuple. It is the question of: is the SF trusted - for the sake=20
> of the 5 tuple, as well as for NSH header changes (e.g. SI decrement=20
> or even SPI change in case a "Classifier" is incorporated). If not,=20
> the SFF (or the Proxy) has to keep that state and VERIFY it on the=20
> outbound...
>
> There are opinions as if we need to allow for some SF that are fully=20
> trusted and some that are not trusted. I assume all agree the SFF is=20
> part of the infrastructure and is trusted. We need to close on this=20
> for the NSH draft too.
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 12 08:05:15 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBE2A1B29C9 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:05:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3RXjZK7DTVVe for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:05:11 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DB1F1B29CF for <sfc@ietf.org>; Thu, 12 Nov 2015 08:05:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11740; q=dns/txt; s=iport; t=1447344311; x=1448553911; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=RBvEULsAr3/kQxMxGg2YGUsB6ofefWjNQRLoeQjR5JA=; b=Q3iPQsQmXmRCHsbOzgf60a33jiC3iu42XUZMCzkBC+CKQXq65tu3wvA9 4vDnJCSiAIYgVolU9Io161DeMWV/UgOfhOtVWHxIoNERUtv96m29vNQby A1zgsxmsTnfLvgCL0hQXrvSRGfjCnYSjOtXkYrc07fdVf+15XJbYET3NH U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D7AQDSt0RW/5NdJa1bA4JuTVNvBr45A?= =?us-ascii?q?Q2BZYYQAoE6OBQBAQEBAQEBgQqENAEBAQQnBj8KEwIBCBEDAQEBKAcyFAkIAgQ?= =?us-ascii?q?BEoguxB0BAQEBAQEBAQEBAQEBAQEBAQEBAQEYhlSEfoRoEwEVEYQXBYgdhTeId?= =?us-ascii?q?AGNJoFbkhaEYoNxAR8BAUKEBHKENoEHAQEB?=
X-IronPort-AV: E=Sophos; i="5.20,282,1444694400"; d="scan'208,217"; a="44102870"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-9.cisco.com with ESMTP; 12 Nov 2015 16:05:10 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id tACG5Aku013707 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 12 Nov 2015 16:05:10 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 12 Nov 2015 10:05:09 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 12 Nov 2015 10:05:08 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVa0+xTCDtVR0Ky6Lo8W+YR+Z6YnmKA
Date: Thu, 12 Nov 2015 16:05:08 +0000
Message-ID: <D26A20AA.2D3D5%jguichar@cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D26A20AA2D3D5jguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/L7d1zOkp3bQRRuVVBEarmTSRVac>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 16:05:14 -0000

--_000_D26A20AA2D3D5jguicharciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_D26A20AA2D3D5jguicharciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <75015E3DA3C0984CBE98400C96FC61A0@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>[Chair hat off &#8230;]</div>
<div><br>
</div>
<div>Honestly the whole SF trust issue makes no sense to me from a practica=
l perspective. Presumably if I have programmatic control over network eleme=
nts then I can do whatever I want and it has nothing to do with NSH. The ar=
gument that an SF can do bad things
 is a red herring given that if I can gain access to <span style=3D"font-we=
ight: bold;">
any</span>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</div>
<div><br>
</div>
<div>Jim</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, U=
ri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>=
&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, November 12, 2015 a=
t 1:42 AM<br>
<span style=3D"font-weight:bold">To: </span>&quot;Elzur, Uri&quot; &lt;<a h=
ref=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc=
@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [sfc] will you trust y=
our SF?<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D26A20AA2D3D5jguicharciscocom_--


From nobody Thu Nov 12 08:11:05 2015
Return-Path: <repenno@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C618A1B29B7 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:11:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0zNcOgAk-ILd for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:11:00 -0800 (PST)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E0331B29D4 for <sfc@ietf.org>; Thu, 12 Nov 2015 08:11:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14542; q=dns/txt; s=iport; t=1447344660; x=1448554260; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=FbK9ozlkh+iqVyh4LBgKR1ttbG3f+gNSu53//oO1TDY=; b=aWiFhcGZP0iN/ptoxeki8TEXYqr+GsZWf5pMa0/Tjh8uW0Gl4TOT2y6L mePHF6HraHgjhzIM+A707sVxvrId9pNAVQ0a0pWatzJ+AGBSqfv9A+zap YyyuHirfKGAzyxmjf2QTryo+VZcNfMfWgAVYQ/yi3NqjhseZRAR16IPPC 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D7AQCzuURW/5NdJa1bA4JuTVNvBr45AQ2BZYYQAoE6OBQBAQEBAQEBgQqENAEBAQQnBj8KEwIBCBEDAQEBKAcyFAkIAgQBEoguxBUBAQEBAQEBAQEBAQEBAQEBAQEBAQEYhlSEfoRoEwEVEYQXBYgdhTeIdAGNJoFbkhaEYoNxAR8BAUKCER2BVnKENoEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,282,1444694400";  d="scan'208,217";a="206292832"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-2.cisco.com with ESMTP; 12 Nov 2015 16:10:44 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id tACGAiEv019948 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 12 Nov 2015 16:10:44 GMT
Received: from xch-rcd-009.cisco.com (173.37.102.19) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 12 Nov 2015 10:10:43 -0600
Received: from xch-rcd-009.cisco.com ([173.37.102.19]) by XCH-RCD-009.cisco.com ([173.37.102.19]) with mapi id 15.00.1104.000; Thu, 12 Nov 2015 10:10:44 -0600
From: "Reinaldo Penno (repenno)" <repenno@cisco.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVa0+xTCDtVR0Ky6Lo8W+YR+Z6YnmKA///PSIA=
Date: Thu, 12 Nov 2015 16:10:43 +0000
Message-ID: <D269F907.1DA82%repenno@cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com>
In-Reply-To: <D26A20AA.2D3D5%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.63.14]
Content-Type: multipart/alternative; boundary="_000_D269F9071DA82repennociscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/UwhIGgM1wqvuzphgtWjAJu2Hhqc>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 16:11:04 -0000

--_000_D269F9071DA82repennociscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_D269F9071DA82repennociscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <BC3579F8B1E9734A8019A9A4071DBCD8@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Could not agree more. We need to focus on the security aspects that NS=
H brings to the table and not generic things that were always there.&nbsp;<=
/div>
<div><br>
</div>
<div>I have the same concerns about the SFC security requirements draft/pre=
sentation in Yokohama. The document mixes generic security attacks that wer=
e always possible in IP networks with NSH specific things. &nbsp;I think so=
mebody went to the mike (Linda?) and
 said something like: too many requirements detract/weakens the real stuff =
we should be looking into.</div>
<div><br>
</div>
<div>Thanks,</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guic=
hard (jguichar)&quot; &lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, November 12, 2015 a=
t 8:05 AM<br>
<span style=3D"font-weight:bold">To: </span>&quot;Elzur, Uri&quot; &lt;<a h=
ref=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc=
@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [sfc] will you trust y=
our SF?<br>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-famil=
y: Calibri, sans-serif;">
<div>[Chair hat off &#8230;]</div>
<div><br>
</div>
<div>Honestly the whole SF trust issue makes no sense to me from a practica=
l perspective. Presumably if I have programmatic control over network eleme=
nts then I can do whatever I want and it has nothing to do with NSH. The ar=
gument that an SF can do bad things
 is a red herring given that if I can gain access to <span style=3D"font-we=
ight: bold;">
any</span>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</div>
<div><br>
</div>
<div>Jim</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, U=
ri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>=
&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, November 12, 2015 a=
t 1:42 AM<br>
<span style=3D"font-weight:bold">To: </span>&quot;Elzur, Uri&quot; &lt;<a h=
ref=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc=
@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [sfc] will you trust y=
our SF?<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</span></div>
</div>
</span>
</body>
</html>

--_000_D269F9071DA82repennociscocom_--


From nobody Thu Nov 12 08:49:41 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 543211B3022 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:49:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2dqEwD3w_XIo for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:49:38 -0800 (PST)
Received: from mail1.bemta14.messagelabs.com (mail1.bemta14.messagelabs.com [193.109.254.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E211B1B3020 for <sfc@ietf.org>; Thu, 12 Nov 2015 08:49:37 -0800 (PST)
Received: from [193.109.255.99] by server-10.bemta-14.messagelabs.com id 50/BD-01143-F13C4465; Thu, 12 Nov 2015 16:49:35 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-8.tower-48.messagelabs.com!1447346974!7953866!1
X-Originating-IP: [195.232.244.133]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12237 invoked from network); 12 Nov 2015 16:49:35 -0000
Received: from mailout01.vodafone.com (HELO mailout01.vodafone.com) (195.232.244.133) by server-8.tower-48.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 12 Nov 2015 16:49:35 -0000
Received: from mailint02.vodafone.com (mailint02.vodafone.com [195.232.244.199]) by mailout01.vodafone.com (Postfix) with ESMTP id 3nxTRf2jFxz1yBX; Thu, 12 Nov 2015 17:49:34 +0100 (CET)
Received: from mailint02.vodafone.com (localhost [127.0.0.1]) by mailint02.vodafone.com (Postfix) with ESMTP id 3nxTRf111WzQk7C; Thu, 12 Nov 2015 17:49:34 +0100 (CET)
Received: from VOEXC03W.internal.vodafone.com (voexc03w.dc-ratingen.de [145.230.101.23]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint02.vodafone.com (Postfix) with ESMTPS id 3nxTRf0f5SzQjcl; Thu, 12 Nov 2015 17:49:34 +0100 (CET)
Received: from VOEXC13W.internal.vodafone.com (145.230.101.15) by VOEXC03W.internal.vodafone.com (145.230.101.23) with Microsoft SMTP Server (TLS) id 14.3.224.2; Thu, 12 Nov 2015 17:49:33 +0100
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by voexc13w.internal.vodafone.com ([145.230.101.15]) with mapi id 14.03.0224.002; Thu, 12 Nov 2015 17:49:32 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVYVRld+fNH/UKvTOZYk+somZ6YcRcAgAACU4CAAB9fwA==
Date: Thu, 12 Nov 2015 16:49:32 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DEB309@VOEXM20W.internal.vodafone.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958F8C@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E958F8C@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QAfFjByU4D4vtXU9mg7TPEo2dMY>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 16:49:40 -0000

Hi Ron, Joel, Uri, WG,

>From my humble network operator's point of view: The SF security discussion=
 lost any relation to reality. You could ask, do you trust the network, the=
 operator? Operators enforce policies and handle metadata (data plane,  con=
trol plane) in the network, in SFCs, for charging etc. since ever. =20
If a SF is not doing what I expect, I would fix this issue (inhouse, or wit=
h the vendor). =20

The discussion about reclassification indicates that we probably should exp=
lain  this mechanism in some more detail in an existing draft (control plan=
e draft?). Will the SF itself modify a SFF forwarding table or is SF going =
to trigger C-Plane to modify forwarding table(s)? I would prefer the latter=
.

Cheers,
Walter

-----Urspr=FCngliche Nachricht-----
Von: sfc [mailto:sfc-bounces@ietf.org] Im Auftrag von Ron Parker
Gesendet: Donnerstag, 12. November 2015 16:31
An: Joel M. Halpern; Elzur, Uri; sfc@ietf.org
Betreff: Re: [sfc] will you trust your SF?

Joel,

As optional behavior for SFF, a stateful SFF would have the ability to enfo=
rce policy regarding attached SF's authorization to change path-id, remove =
meta-data, add meta-data, change meta-data, etc.

   Ron




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Thursday, November 12, 2015 10:23 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service functio=
n will not modify the service path identification, even while they expect i=
t to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in=20
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel=20
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I'd like to=20
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the=20
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the=20
> map (as the new 5 tuple may not be there) and to imply the SF is=20
> trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed=20
> the 5-tuple. It is the question of: is the SF trusted - for the sake=20
> of the 5 tuple, as well as for NSH header changes (e.g. SI decrement=20
> or even SPI change in case a "Classifier" is incorporated). If not,=20
> the SFF (or the Proxy) has to keep that state and VERIFY it on the=20
> outbound...
>
> There are opinions as if we need to allow for some SF that are fully=20
> trusted and some that are not trusted. I assume all agree the SFF is=20
> part of the infrastructure and is trusted. We need to close on this=20
> for the NSH draft too.
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 12 08:58:16 2015
Return-Path: <S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 495841B3041 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:58:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.01
X-Spam-Level: 
X-Spam-Status: No, score=-7.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vyRQzK13Wuqb for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 08:58:10 -0800 (PST)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9753C1B3047 for <sfc@ietf.org>; Thu, 12 Nov 2015 08:58:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1447347491; x=1478883491; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=03RV5qlqsShnrx66v6emD1A2euuN2srwBDyBv0MelvQ=; b=hAd9bdDTimUNGNtKTZN9ERtAG2avq32bPh6D2pdSsN1LismuwC7NDh6B IR3ZHNxELIRCduIwjTbaGT9axbdkVN6aX5u91r0qRCBz6MbmWSIjU3n1S 7ThQeZfOOCuqxxBw/GUAS0aznaZ1FrL3p3yGrIEoJDakYVUCrGMn7yeaT 0=;
X-IronPort-AV: E=Sophos;i="5.20,282,1444694400";  d="scan'208,217";a="187992116"
X-IPAS-Result: A2GzBAA+xERW/+sKqMBbAxkBAQEBDwEBAQEGAQEBAYI0gSBvBsAsIYVvAoIHAQEBAQEBBIEHgmI8AQEBAQEBIwI+LQEBAQEDLVwCAQgRAQIBAQEoBzIUAwYIAgQBEog7xB0BAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUhH6EaBMBDAkRhBcFiB2FN4h0hR2JZZIWhGKDcoRncoQ2gQcBAQE
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 12 Nov 2015 16:58:09 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by SEAEXCHMBX07.olympus.F5Net.com (192.168.15.50) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Thu, 12 Nov 2015 08:58:08 -0800
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1044.021; Thu, 12 Nov 2015 08:58:08 -0800
From: Sumandra Majee <S.Majee@F5.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, Dave Dolson <ddolson@sandvine.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVW2XpuevYqeUGQq3Yx3mF/qZ6YhG2AgAB2/AD//6EHgA==
Date: Thu, 12 Nov 2015 16:58:08 +0000
Message-ID: <D269FF81.46E82%s.majee@f5.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.4.150722
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: multipart/alternative; boundary="_000_D269FF8146E82smajeef5com_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Rg8yxsFwMu4Xp3kpDRVAOcyJGmA>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 16:58:15 -0000

--_000_D269FF8146E82smajeef5com_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I am bit lost on this whole trust issue. If there is concern about trusting=
 a particular SF it should go beyond just NSH headers. How does rcving SF-B=
 knows that payload is really from SF-A, or is the src_ip is not spoofed? T=
here are many ways to solve those.

So what is the concern,
   A) non transport level encryption scheme(all practical scheme has built =
in authentication)  doesn't protect NSH payload?
   B) Rcving SF must be able to verify that NSH hdr came from SF-A or more =
generally produced by one of the trusted SF?

I can smell yet another mess of shared secret and associated infrastructure=
 mess...

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Ron Parker <Ron_Parker@affirmednetworks.com<mailto:Ron_Parker@affirmednetwo=
rks.com>>
Date: Thursday, November 12, 2015 at 6:38 AM
To: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>, "Elzur=
, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ietf.org<mai=
lto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Dave,

I agree with your analysis.   What we've been thinking of as "legacy SF" (i=
.e., incapable of processing NSH) can be applied equally to untrusted SF (i=
.e., capable of processing NSH, but local policy is to not provide NSH).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_D269FF8146E82smajeef5com_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <9160EB72BE87BF42B83966F0E6BF7DF4@F5.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>I am bit lost on this whole trust issue. If there is concern about tru=
sting a particular SF it should go beyond just NSH headers. How does rcving=
 SF-B knows that payload is really from SF-A, or is the src_ip is not spoof=
ed? There are many ways to solve
 those.&nbsp;</div>
<div>&nbsp;</div>
<div>So what is the concern,</div>
<div>&nbsp; &nbsp;A) non transport level encryption scheme(all practical sc=
heme has built in authentication) &nbsp;doesn&#8217;t protect NSH payload?<=
/div>
<div>&nbsp; &nbsp;B) Rcving SF must be able to verify that NSH hdr came fro=
m SF-A or more generally produced by one of the trusted SF?</div>
<div><br>
</div>
<div>I can smell yet another mess of shared secret and associated infrastru=
cture mess&#8230;&nbsp;</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Ron Parker &lt=
;<a href=3D"mailto:Ron_Parker@affirmednetworks.com">Ron_Parker@affirmednetw=
orks.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, November 12, 2015 a=
t 6:38 AM<br>
<span style=3D"font-weight:bold">To: </span>Dave Dolson &lt;<a href=3D"mail=
to:ddolson@sandvine.com">ddolson@sandvine.com</a>&gt;, &quot;Elzur, Uri&quo=
t; &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;, =
&quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D=
"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [sfc] will you trust y=
our SF?<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Dave,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I agree with your anal=
ysis.&nbsp;&nbsp; What we&#8217;ve been thinking of as &#8220;legacy SF&#82=
21; (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not
 provide NSH).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp; Ron<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D"><o:p>&nbsp;</o:p></span></a></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Dave Dolson<br>
<b>Sent:</b> Thursday, November 12, 2015 2:32 AM<br>
<b>To:</b> Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@=
intel.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size: 10pt; font-family: Taho=
ma, sans-serif;">From:</span></b><span style=3D"font-size: 10pt; font-famil=
y: Tahoma, sans-serif;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailt=
o:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D269FF8146E82smajeef5com_--


From nobody Thu Nov 12 14:39:47 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E90E1B395D for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 14:39:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SLzr_itw4hME for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 14:39:43 -0800 (PST)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id E11571B395C for <sfc@ietf.org>; Thu, 12 Nov 2015 14:39:42 -0800 (PST)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 12 Nov 2015 17:39:44 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: Sumandra Majee <S.Majee@F5.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVZFiGO/1AuG0GyjOiLT/Ut556X+7xQgADNYgCAACclAIAAC58D
Date: Thu, 12 Nov 2015 22:39:43 +0000
Message-ID: <20151112223940.594948115.36028.48414@sandvine.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local>, <D269FF81.46E82%s.majee@f5.com>
In-Reply-To: <D269FF81.46E82%s.majee@f5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="windows-1256"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/e0SJA1DPv2ghFqLOm8ZICVpwl_E>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 22:39:45 -0000

I think the basic conclusion is that NSH-aware SFs must be trusted.

This m=FDeans one cannot have NSH-aware tenants in the same way that one ca=
n have virtual-machine tenants--which can be isolated.



From: Sumandra Majee
Sent: Friday, November 13, 2015 1:58 AM
To: Ron Parker; Dave Dolson; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?


I am bit lost on this whole trust issue. If there is concern about trusting=
 a particular SF it should go beyond just NSH headers. How does rcving SF-B=
 knows that payload is really from SF-A, or is the src_ip is not spoofed? T=
here are many ways to solve those.

So what is the concern,
   A) non transport level encryption scheme(all practical scheme has built =
in authentication)  doesn=92t protect NSH payload?
   B) Rcving SF must be able to verify that NSH hdr came from SF-A or more =
generally produced by one of the trusted SF?

I can smell yet another mess of shared secret and associated infrastructure=
 mess=85

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Ron Parker <Ron_Parker@affirmednetworks.com<mailto:Ron_Parker@affirmednetwo=
rks.com>>
Date: Thursday, November 12, 2015 at 6:38 AM
To: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>, "Elzur=
, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ietf.org<mai=
lto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Dave,

I agree with your analysis.   What we=92ve been thinking of as =93legacy SF=
=94 (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not provide NS=
H).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a =93legacy SF=94 device in the sense that it not be sent packets with NSH=
 headers.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called =93legacy=94 SFC are therefore eleva=
ted in importance. We should be discussing =93legacy and untrusted SF=94.
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, =93SFC Header Mapping for Legacy SF and Untrusted SF=94

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I=92d like to surfa=
ce this issue and hopefully it can be easily and quickly resolved. In the d=
iscussion about Map assisted SFC Proxy, we discussed the potential of an SF=
 (e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention =
may be needed in such case to update the map (as the new 5 tuple may not be=
 there) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a =93Classifier=94 is incorporated). If not, the SFF (or the Pro=
xy) has to keep that state and VERIFY it on the outbound=85

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568


From nobody Thu Nov 12 14:44:30 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D3791B397C for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 14:44:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id krOHLaDJLaGh for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 14:44:26 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F8001B397F for <sfc@ietf.org>; Thu, 12 Nov 2015 14:44:26 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 06EE21C07A1; Thu, 12 Nov 2015 14:44:26 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id CFD241C0669; Thu, 12 Nov 2015 14:44:19 -0800 (PST)
To: Dave Dolson <ddolson@sandvine.com>, Sumandra Majee <S.Majee@F5.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local> <D269FF81.46E82%s.majee@f5.com> <20151112223940.594948115.36028.48414@sandvine.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5645163F.2060801@joelhalpern.com>
Date: Thu, 12 Nov 2015 17:44:15 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <20151112223940.594948115.36028.48414@sandvine.com>
Content-Type: text/plain; charset=windows-1256; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/myDjc768q6YwYJSxc32KTIsSQmY>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 22:44:29 -0000

Trust is not usually an all-or-nothing proposition.  NSH aware SF (and 
even non-NSH-aware SF) are trusted to do certain things, and to not do 
certain things.  The more you have to trust it, the more constraints 
(testing, whatever).

So being able to say that I only trust this SF so much is helpful. 
Strictly necessary?  Probably not.  But being able to indicate that 
certain restrictions should be checked if possible seems desirable.
And being able to restrict the what kinds of trust are given allows the 
operator more flexibility.

Just for context, even operations staff are not trusted to do 
everything.  They have roles, and permissions based on those roles.

Yours,
Joel

On 11/12/15 5:39 PM, Dave Dolson wrote:
> I think the basic conclusion is that NSH-aware SFs must be trusted.
>
> This mýeans one cannot have NSH-aware tenants in the same way that one can have virtual-machine tenants--which can be isolated.
>
>
>
> From: Sumandra Majee
> Sent: Friday, November 13, 2015 1:58 AM
> To: Ron Parker; Dave Dolson; Elzur, Uri; sfc@ietf.org
> Subject: Re: [sfc] will you trust your SF?
>
>
> I am bit lost on this whole trust issue. If there is concern about trusting a particular SF it should go beyond just NSH headers. How does rcving SF-B knows that payload is really from SF-A, or is the src_ip is not spoofed? There are many ways to solve those.
>
> So what is the concern,
>     A) non transport level encryption scheme(all practical scheme has built in authentication)  doesn’t protect NSH payload?
>     B) Rcving SF must be able to verify that NSH hdr came from SF-A or more generally produced by one of the trusted SF?
>
> I can smell yet another mess of shared secret and associated infrastructure mess…
>
> From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of Ron Parker <Ron_Parker@affirmednetworks.com<mailto:Ron_Parker@affirmednetworks.com>>
> Date: Thursday, November 12, 2015 at 6:38 AM
> To: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>, "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
> Subject: Re: [sfc] will you trust your SF?
>
> Dave,
>
> I agree with your analysis.   What we’ve been thinking of as “legacy SF” (i.e., incapable of processing NSH) can be applied equally to untrusted SF (i.e., capable of processing NSH, but local policy is to not provide NSH).
>
>     Ron
>
>
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Thursday, November 12, 2015 2:32 AM
> To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.org<mailto:sfc@ietf.org>
> Subject: Re: [sfc] will you trust your SF?
>
> Uri,
>
> I think the consequences of not trusting the SF are that it be treated like a “legacy SF” device in the sense that it not be sent packets with NSH headers.
> Trusting the SF with NSH headers and metadata gives it the ability to move packets to any chain, perhaps crossing tenant boundaries.
>
> So therefore, SFs using NSH must be trusted. The architecture supports the SF-Proxy approach if operators have untrusted SFs.
>
> In my opinion, the issues of so-called “legacy” SFC are therefore elevated in importance. We should be discussing “legacy and untrusted SF”.
> E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
> could be entitled, “SFC Header Mapping for Legacy SF and Untrusted SF”
>
> -Dave
>
>
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
> Sent: Thursday, November 12, 2015 3:42 PM
> To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
> Subject: Re: [sfc] will you trust your SF?
>
> Hi
>
> Should I deduce from the no response on the list that the WG is in agreement that the SF should be trusted ?
> For multiple reasons that can simplify handling the external tunnel encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri (“Oo-Ree”)
> C: 949-378-7568
>
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
> Sent: Thursday, November 5, 2015 1:19 PM
> To: sfc@ietf.org<mailto:sfc@ietf.org>
> Subject: [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I’d like to surface this issue and hopefully it can be easily and quickly resolved. In the discussion about Map assisted SFC Proxy, we discussed the potential of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention may be needed in such case to update the map (as the new 5 tuple may not be there) and to imply the SF is trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed the 5-tuple. It is the question of: is the SF trusted - for the sake of the 5 tuple, as well as for NSH header changes (e.g. SI decrement or even SPI change in case a “Classifier” is incorporated). If not, the SFF (or the Proxy) has to keep that state and VERIFY it on the outbound…
>
> There are opinions as if we need to allow for some SF that are fully trusted and some that are not trusted. I assume all agree the SFF is part of the infrastructure and is trusted. We need to close on this for the NSH draft too.
>
> Thx
>
> Uri (“Oo-Ree”)
> C: 949-378-7568
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Nov 12 16:30:47 2015
Return-Path: <narten@us.ibm.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75AC91A8AEA for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 16:30:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.911
X-Spam-Level: 
X-Spam-Status: No, score=-6.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NEgaYr-XSS2n for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 16:30:41 -0800 (PST)
Received: from e39.co.us.ibm.com (e39.co.us.ibm.com [32.97.110.160]) (using TLSv1 with cipher CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0EE511A90FF for <sfc@ietf.org>; Thu, 12 Nov 2015 16:30:41 -0800 (PST)
Received: from localhost by e39.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <sfc@ietf.org> from <narten@us.ibm.com>; Thu, 12 Nov 2015 17:30:40 -0700
Received: from d01dlp01.pok.ibm.com (9.56.250.166) by e39.co.us.ibm.com (192.168.1.139) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Thu, 12 Nov 2015 17:30:38 -0700
X-IBM-Helo: d01dlp01.pok.ibm.com
X-IBM-MailFrom: narten@us.ibm.com
X-IBM-RcptTo: sfc@ietf.org
Received: from b01cxnp22036.gho.pok.ibm.com (b01cxnp22036.gho.pok.ibm.com [9.57.198.26]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id E9E4038C803B for <sfc@ietf.org>; Thu, 12 Nov 2015 19:30:37 -0500 (EST)
Received: from d01av01.pok.ibm.com (d01av01.pok.ibm.com [9.56.224.215]) by b01cxnp22036.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id tAD0UbjJ53870602 for <sfc@ietf.org>; Fri, 13 Nov 2015 00:30:37 GMT
Received: from d01av01.pok.ibm.com (localhost [127.0.0.1]) by d01av01.pok.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id tAD0UbKn012977 for <sfc@ietf.org>; Thu, 12 Nov 2015 19:30:37 -0500
Received: from cichlid.raleigh.ibm.com ([9.80.86.247]) by d01av01.pok.ibm.com (8.14.4/8.14.4/NCO v10.0 AVin) with ESMTP id tAD0Ua5B012863 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 12 Nov 2015 19:30:36 -0500
Received: from cichlid.raleigh.ibm.com.us.ibm.com (localhost.localdomain [127.0.0.1]) by cichlid.raleigh.ibm.com (8.14.4/8.12.5) with ESMTP id tAD0UZYE020504; Thu, 12 Nov 2015 19:30:35 -0500
Date: Thu, 12 Nov 2015 19:30:35 -0500
Message-ID: <m3fv0a68r8.wl-narten@us.ibm.com>
From: Thomas Narten <narten@us.ibm.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
In-Reply-To: <563BF143.4090600@joelhalpern.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (=?ISO-8859-4?Q?Goj=F2?=) APEL/10.8 EasyPG/1.0.0 Emacs/23.1 (x86_64-redhat-linux-gnu) MULE/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset=US-ASCII
X-TM-AS-MML: disable
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 15111300-0033-0000-0000-000006D153FA
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/WnOKaAwPqg3cHkNa9TbIXLj7pTs>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Ron Parker <Ron_Parker@affirmednetworks.com>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 00:30:45 -0000

FWIW, we need to be a bit more precise in our wording on security
requirements. There are two important nuances:

1) Mandatory to use, meaning the protocol only works if the feature is
enabled and works. This sort of implies that you can't *disable* its
usage in the field.

2) Mandatory to implement, but optional to use.  If something is
mandatory to implement, "compliant" implementations MUST support the
feature. Whether the feature is used in practice is a separate matter
left to the operator. The rational behind "mandatory to implement" is
that an operator may not actually have the option to enable security
if a product chooses not to implement an "optional" features.

draft-mglt-sfc-security-environment-req-00.txt is unclear at present
on which of the above is intended, but one can certainly read the
following:

   REQ14: Communications within the SFC Data Plane MUST be authenticated
          in order to prevent the traffic to be modified by an attacker.

as intending 1.

For completeness, I should point that even if the final spec calls for
2), vendors may choose not to follow the requirement (and then be
uncompliant), if they don't think it makes sense for their customers
(the original IPv6 mandate to include IPsec comes to mind, for
example). So if the WG chooses 2) - which is what I expect is the most
reasonable course, it should pay careful attention to making the
details something vendors think is useful, necessary and workable in
practice. I.e, the cost of mitigation matches the threat level.

Thomas


From nobody Thu Nov 12 16:50:02 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AE1B1ACCEB for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 16:50:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oILvw2mrvIQR for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 16:50:00 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F112B1A1AB5 for <sfc@ietf.org>; Thu, 12 Nov 2015 16:49:59 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id E076F258B1C; Thu, 12 Nov 2015 16:49:59 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 7F33F240ADB; Thu, 12 Nov 2015 16:49:44 -0800 (PST)
To: Thomas Narten <narten@us.ibm.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <564533A4.3040104@joelhalpern.com>
Date: Thu, 12 Nov 2015 19:49:40 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <m3fv0a68r8.wl-narten@us.ibm.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/nISyLt6RxVYjivKwFVGGymLXO5I>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Ron Parker <Ron_Parker@affirmednetworks.com>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 00:50:01 -0000

When it comes to per-packet authentication mechanisms, applied to every 
packet from every subscriber (which is what REQ14 asks us to implement) 
there is real cost in meeting such a requirement.

Which is why I expressed concern about the requirement during the 
meeting in Yokohama.  I do no think that particular requirement has WG 
consensus, and I think it is an over-reach.

Including Authentication as an optional capability, well specified and 
well integrated, makes good sense to me.  Making it mandatory to 
implement seems to much.  And claiming it is mandatory to use would be a 
flat lie.

Yours,
Joel

On 11/12/15 7:30 PM, Thomas Narten wrote:
> FWIW, we need to be a bit more precise in our wording on security
> requirements. There are two important nuances:
>
> 1) Mandatory to use, meaning the protocol only works if the feature is
> enabled and works. This sort of implies that you can't *disable* its
> usage in the field.
>
> 2) Mandatory to implement, but optional to use.  If something is
> mandatory to implement, "compliant" implementations MUST support the
> feature. Whether the feature is used in practice is a separate matter
> left to the operator. The rational behind "mandatory to implement" is
> that an operator may not actually have the option to enable security
> if a product chooses not to implement an "optional" features.
>
> draft-mglt-sfc-security-environment-req-00.txt is unclear at present
> on which of the above is intended, but one can certainly read the
> following:
>
>     REQ14: Communications within the SFC Data Plane MUST be authenticated
>            in order to prevent the traffic to be modified by an attacker.
>
> as intending 1.
>
> For completeness, I should point that even if the final spec calls for
> 2), vendors may choose not to follow the requirement (and then be
> uncompliant), if they don't think it makes sense for their customers
> (the original IPv6 mandate to include IPsec comes to mind, for
> example). So if the WG chooses 2) - which is what I expect is the most
> reasonable course, it should pay careful attention to making the
> details something vendors think is useful, necessary and workable in
> practice. I.e, the cost of mitigation matches the threat level.
>
> Thomas
>
>


From nobody Thu Nov 12 20:59:57 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 015891B4003 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 20:59:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id unAp3NoVXkGd for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 20:59:54 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36A531B4001 for <sfc@ietf.org>; Thu, 12 Nov 2015 20:59:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3174; q=dns/txt; s=iport; t=1447390794; x=1448600394; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=NgSve0TwC52UQAd+6xOxyT15zmPF2dq+BTdORX32NZM=; b=KhWTBA6Rgb+4njOWTzDJiG+/ebpZPhdFN3cYJ033A5ZJNw8NIi+2l3Rz ADLQ29y65dVVR3fGSMHlhzNyR2EyqbpxH832r1i+rqt9/SNuk58SJfTFC KBj4OxmawB/pQiSsU5991reTLe4+LXAIBK0gxCXRh4oTCE5It8jReGwUX 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ApAgDgbUVW/4gNJK1egztTbwa+OQENg?= =?us-ascii?q?WUXCoVvAoE3OBQBAQEBAQEBgQqENAEBAQQBAQE3NAsMBAIBCBEEAQEBHgkHJws?= =?us-ascii?q?UCQgCBAENBQiIJg3DOQEBAQEBAQEBAQEBAQEBAQEBAQEBARQEhlSEfok5BYVMk?= =?us-ascii?q?HwBiA2CYYIxgWKHZZMEAR8BAUKEBHKENoEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,285,1444694400"; d="scan'208";a="207303022"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Nov 2015 04:59:53 +0000
Received: from XCH-RCD-020.cisco.com (xch-rcd-020.cisco.com [173.37.102.30]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id tAD4xrhX032173 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 04:59:53 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-RCD-020.cisco.com (173.37.102.30) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 12 Nov 2015 22:59:52 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Thu, 12 Nov 2015 22:59:52 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q/E0Hn9hQJP0yk2D/Yc/gPMZ6N8hGAgACUU4CACwRhgIAABVUA///drYA=
Date: Fri, 13 Nov 2015 04:59:52 +0000
Message-ID: <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com>
In-Reply-To: <564533A4.3040104@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.74.211]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0F6Owpa9xSiL5XS3dRGBSboKRzs>
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 04:59:56 -0000

Authenticating SFC encapsulation is required to prevent various attacks lik=
e man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc. T=
he reason the requirement is saying 'MUST' is to do our best to provide BCP=
 for NSH security, if an operator turn-off security then it's a risk he is =
willing to take.

-Tiru

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Friday, November 13, 2015 6:20 AM
> To: Thomas Narten
> Cc: sfc@ietf.org; Ron Parker
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>=20
> When it comes to per-packet authentication mechanisms, applied to every
> packet from every subscriber (which is what REQ14 asks us to implement)
> there is real cost in meeting such a requirement.
>=20
> Which is why I expressed concern about the requirement during the meeting
> in Yokohama.  I do no think that particular requirement has WG consensus,
> and I think it is an over-reach.
>=20
> Including Authentication as an optional capability, well specified and we=
ll
> integrated, makes good sense to me.  Making it mandatory to implement
> seems to much.  And claiming it is mandatory to use would be a flat lie.
>=20
> Yours,
> Joel
>=20
> On 11/12/15 7:30 PM, Thomas Narten wrote:
> > FWIW, we need to be a bit more precise in our wording on security
> > requirements. There are two important nuances:
> >
> > 1) Mandatory to use, meaning the protocol only works if the feature is
> > enabled and works. This sort of implies that you can't *disable* its
> > usage in the field.
> >
> > 2) Mandatory to implement, but optional to use.  If something is
> > mandatory to implement, "compliant" implementations MUST support the
> > feature. Whether the feature is used in practice is a separate matter
> > left to the operator. The rational behind "mandatory to implement" is
> > that an operator may not actually have the option to enable security
> > if a product chooses not to implement an "optional" features.
> >
> > draft-mglt-sfc-security-environment-req-00.txt is unclear at present
> > on which of the above is intended, but one can certainly read the
> > following:
> >
> >     REQ14: Communications within the SFC Data Plane MUST be
> authenticated
> >            in order to prevent the traffic to be modified by an attacke=
r.
> >
> > as intending 1.
> >
> > For completeness, I should point that even if the final spec calls for
> > 2), vendors may choose not to follow the requirement (and then be
> > uncompliant), if they don't think it makes sense for their customers
> > (the original IPv6 mandate to include IPsec comes to mind, for
> > example). So if the WG chooses 2) - which is what I expect is the most
> > reasonable course, it should pay careful attention to making the
> > details something vendors think is useful, necessary and workable in
> > practice. I.e, the cost of mitigation matches the threat level.
> >
> > Thomas
> >
> >
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 12 21:37:44 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B6441B4053 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.911
X-Spam-Level: 
X-Spam-Status: No, score=-6.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id joF4rWX7cuqt for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:41 -0800 (PST)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by ietfa.amsl.com (Postfix) with ESMTP id 81F1D1B4052 for <sfc@ietf.org>; Thu, 12 Nov 2015 21:37:41 -0800 (PST)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP; 12 Nov 2015 21:37:41 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,285,1444719600"; d="scan'208";a="850108208"
Received: from orsmsx103.amr.corp.intel.com ([10.22.225.130]) by fmsmga002.fm.intel.com with ESMTP; 12 Nov 2015 21:37:42 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX103.amr.corp.intel.com ([169.254.2.103]) with mapi id 14.03.0248.002; Thu, 12 Nov 2015 21:37:41 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHV4JNN2Jxklnn0yE8m4Y59bhj56ZCbiAgAAsQ5A=
Date: Fri, 13 Nov 2015 05:37:40 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E2FF94@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958F8C@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E958F8C@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.139]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/9kyoarRMZMsvi25T8vbQ5Eww8eE>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:37:43 -0000

(Reply #2, may want to read the other one first)

Pls note comments on other mail on this thread. One of the implications of =
the trust is elimination of a potential SFF requirements to keep state for =
enforcing "correct" SF behavior. Some SF must be trusted as they can change=
 even the internal packet too. if he SF is "not trusted' then the SFF shoul=
d check the internal headers too...
 and so we should debate if we even have a class of "unstusted SF" that are=
 processing only a portion of the NSH header (e.g. SI).

Thx

Uri ("Oo-Ree")
C: 949-378-7568

-----Original Message-----
From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]=20
Sent: Thursday, November 12, 2015 7:31 AM
To: Joel M. Halpern; Elzur, Uri; sfc@ietf.org
Subject: RE: [sfc] will you trust your SF?

Joel,

As optional behavior for SFF, a stateful SFF would have the ability to enfo=
rce policy regarding attached SF's authorization to change path-id, remove =
meta-data, add meta-data, change meta-data, etc.

   Ron




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Thursday, November 12, 2015 10:23 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service functio=
n will not modify the service path identification, even while they expect i=
t to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in=20
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel=20
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I'd like to=20
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the=20
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the=20
> map (as the new 5 tuple may not be there) and to imply the SF is=20
> trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed=20
> the 5-tuple. It is the question of: is the SF trusted - for the sake=20
> of the 5 tuple, as well as for NSH header changes (e.g. SI decrement=20
> or even SPI change in case a "Classifier" is incorporated). If not,=20
> the SFF (or the Proxy) has to keep that state and VERIFY it on the=20
> outbound...
>
> There are opinions as if we need to allow for some SF that are fully=20
> trusted and some that are not trusted. I assume all agree the SFF is=20
> part of the infrastructure and is trusted. We need to close on this=20
> for the NSH draft too.
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 12 21:37:59 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAA001B4054 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kQOpccFugOOg for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:40 -0800 (PST)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by ietfa.amsl.com (Postfix) with ESMTP id 6BBAC1B4028 for <sfc@ietf.org>; Thu, 12 Nov 2015 21:37:40 -0800 (PST)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP; 12 Nov 2015 21:37:38 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,285,1444719600";  d="scan'208,217";a="850108190"
Received: from orsmsx110.amr.corp.intel.com ([10.22.240.8]) by fmsmga002.fm.intel.com with ESMTP; 12 Nov 2015 21:37:38 -0800
Received: from orsmsx152.amr.corp.intel.com (10.22.226.39) by ORSMSX110.amr.corp.intel.com (10.22.240.8) with Microsoft SMTP Server (TLS) id 14.3.248.2; Thu, 12 Nov 2015 21:37:37 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX152.amr.corp.intel.com ([169.254.8.204]) with mapi id 14.03.0248.002; Thu, 12 Nov 2015 21:37:36 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRxVdX2Lz3depkuRzRNYC1xZY56Y+1sAgAAwvcA=
Date: Fri, 13 Nov 2015 05:37:35 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E2FF8B@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.139]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958581E2FF8BORSMSX114amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Q6695Y7ONa5IL13uB9jm2_BlfmQ>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:37:45 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FF8BORSMSX114amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Few comments


1)      The NSH draft right now, is careful stating that an SF can ONLY dec=
rement the SI and technically can't change the SPI and w/o a classifier can=
't change metadata ("Context Header") either. It is not easy/possible from =
an SFF point of view to tell which SF comprises a Classifier too or not. wi=
thout Control Plane indication the SFF can't tell if an SF is to be trusted=
 or not. Now, this has implications.

2)      A Trusted SF - may be / should be  privy to the whole external pack=
et, as it may need it for further processing or simplification (e.g. in a m=
ulti tenancy scenario be able to associate dup  IP addresses with the right=
 tenant for employing diff policy/processing/SPI). As the SF is trusted, no=
 state in the SFF is required on the Tx, to ensure no abuse of the NSH (SI =
or SPI). State may still be required somewhere, for the case an internal fi=
eld has changed e.g. due to NAT which may change the classification results=
 and hence the forwarding/processing decision.

3)      "Local circuit" concept (i.e. between the SFF and the SF) - becomes=
 optional. One may prefer Eth+NSH locally as an example, and use some form =
of tunneling outside on the "transport", but one may also simply extend the=
 "tunnel" to the SF too. This promotes also, the question of the vTEP for t=
he external "transport". The local vSwitch (integrated w the SFF or not) sh=
ould have that responsibility. This is a bit out of scope for the SFC WG, t=
hough.

4)      Legacy and Proxy -  the SFF is to be programmed as to what encapsul=
ation to use on the "local circuit" . A Proxy is a trusted entity and there=
fore is no different from a trusted SF as above. A legacy SF is not partici=
pating in NSH processing and so it is may be irrelevant if it is to trusted=
 or not..

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]
Sent: Thursday, November 12, 2015 6:38 AM
To: Dave Dolson; Elzur, Uri; sfc@ietf.org
Subject: RE: [sfc] will you trust your SF?

Dave,

I agree with your analysis.   What we've been thinking of as "legacy SF" (i=
.e., incapable of processing NSH) can be applied equally to untrusted SF (i=
.e., capable of processing NSH, but local policy is to not provide NSH).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FF8BORSMSX114amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1130630606;
	mso-list-type:hybrid;
	mso-list-template-ids:1501169354 67698705 67698713 67698715 67698703 67698=
713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Few comments<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">1)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">The NSH draft =
right now, is careful stating that an SF can ONLY decrement the SI and tech=
nically can&#8217;t change the SPI and w/o a classifier can&#8217;t change =
metadata (&#8220;Context Header&#8221;) either. It is not
 easy/possible from an SFF point of view to tell which SF comprises a Class=
ifier too or not. without Control Plane indication the SFF can&#8217;t tell=
 if an SF is to be trusted or not. Now, this has implications.
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">2)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">A Trusted SF &=
#8211; may be / should be &nbsp;privy to the whole external packet, as it m=
ay need it for further processing or simplification (e.g. in a multi tenanc=
y scenario be able to associate dup &nbsp;IP addresses
 with the right tenant for employing diff policy/processing/SPI). As the SF=
 is trusted, no state in the SFF is required on the Tx, to ensure no abuse =
of the NSH (SI or SPI). State may still be required somewhere, for the case=
 an internal field has changed e.g.
 due to NAT which may change the classification results and hence the forwa=
rding/processing decision.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">3)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">&#8220;Local c=
ircuit&#8221; concept (i.e. between the SFF and the SF) &#8211; becomes opt=
ional. One may prefer Eth&#43;NSH locally as an example, and use some form =
of tunneling outside on the &#8220;transport&#8221;, but one may also
 simply extend the &#8220;tunnel&#8221; to the SF too. This promotes also, =
the question of the vTEP for the external &#8220;transport&#8221;. The loca=
l vSwitch (integrated w the SFF or not) should have that responsibility. Th=
is is a bit out of scope for the SFC WG, though.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">4)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Legacy and Pro=
xy - &nbsp;the SFF is to be programmed as to what encapsulation to use on t=
he &#8220;local circuit&#8221; . A Proxy is a trusted entity and therefore =
is no different from a trusted SF as above. A legacy
 SF is not participating in NSH processing and so it is may be irrelevant i=
f it is to trusted or not..<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Ron Parker [mailto:Ron_Parker@affirmedn=
etworks.com]
<br>
<b>Sent:</b> Thursday, November 12, 2015 6:38 AM<br>
<b>To:</b> Dave Dolson; Elzur, Uri; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Dave,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I agree with your anal=
ysis.&nbsp;&nbsp; What we&#8217;ve been thinking of as &#8220;legacy SF&#82=
21; (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not
 provide NSH).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp; Ron<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Dave Dolson<br>
<b>Sent:</b> Thursday, November 12, 2015 2:32 AM<br>
<b>To:</b> Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@=
intel.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [<a href=3D"mailto:sfc-bounc=
es@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FF8BORSMSX114amrcor_--


From nobody Thu Nov 12 21:38:00 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B72E1B4059 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.911
X-Spam-Level: 
X-Spam-Status: No, score=-6.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YBfNAlpl7kYX for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:46 -0800 (PST)
Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by ietfa.amsl.com (Postfix) with ESMTP id 6EF471B4057 for <sfc@ietf.org>; Thu, 12 Nov 2015 21:37:46 -0800 (PST)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP; 12 Nov 2015 21:37:46 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,285,1444719600"; d="scan'208";a="818866829"
Received: from orsmsx105.amr.corp.intel.com ([10.22.225.132]) by orsmga001.jf.intel.com with ESMTP; 12 Nov 2015 21:37:46 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX105.amr.corp.intel.com ([169.254.4.246]) with mapi id 14.03.0248.002; Thu, 12 Nov 2015 21:37:46 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHV4JNN2Jxklnn0yE8m4Y59bhj56ZCbiAgAAV3QCAAEu+UA==
Date: Fri, 13 Nov 2015 05:37:45 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E2FFB3@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958F8C@MBX021-W3-CA-2.exch021.domain.local> <C8C844F84E550E43865561FAE104718579DEB309@VOEXM20W.internal.vodafone.com>
In-Reply-To: <C8C844F84E550E43865561FAE104718579DEB309@VOEXM20W.internal.vodafone.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.139]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PVtk7fxqfTqmgg5BH7Uua9eeKIs>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:37:50 -0000

(reply #4, you may want to read them in order)

I can see how the title "trust your SF" is implying this is part of the Sec=
urity draft, sorry, but this was not my intention. At least not the main re=
ason for the message. . To me this is more part of the arch and NSH discuss=
ion as to the provisions of an SF and the state/enforcement required by an =
SFF

Thx

Uri ("Oo-Ree")
C: 949-378-7568

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Haeffner, Walter, Voda=
fone DE
Sent: Thursday, November 12, 2015 8:50 AM
To: Ron Parker; Joel M. Halpern; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Hi Ron, Joel, Uri, WG,

>From my humble network operator's point of view: The SF security discussio=
n lost any relation to reality. You could ask, do you trust the network, th=
e operator? Operators enforce policies and handle metadata (data plane,  co=
ntrol plane) in the network, in SFCs, for charging etc. since ever. =20
If a SF is not doing what I expect, I would fix this issue (inhouse, or wit=
h the vendor). =20

The discussion about reclassification indicates that we probably should exp=
lain  this mechanism in some more detail in an existing draft (control plan=
e draft?). Will the SF itself modify a SFF forwarding table or is SF going =
to trigger C-Plane to modify forwarding table(s)? I would prefer the latter=
.

Cheers,
Walter

-----Urspr=FCngliche Nachricht-----
Von: sfc [mailto:sfc-bounces@ietf.org] Im Auftrag von Ron Parker
Gesendet: Donnerstag, 12. November 2015 16:31
An: Joel M. Halpern; Elzur, Uri; sfc@ietf.org
Betreff: Re: [sfc] will you trust your SF?

Joel,

As optional behavior for SFF, a stateful SFF would have the ability to enfo=
rce policy regarding attached SF's authorization to change path-id, remove =
meta-data, add meta-data, change meta-data, etc.

   Ron




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Thursday, November 12, 2015 10:23 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service functio=
n will not modify the service path identification, even while they expect i=
t to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in=20
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel=20
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I'd like to=20
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the=20
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the=20
> map (as the new 5 tuple may not be there) and to imply the SF is=20
> trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed=20
> the 5-tuple. It is the question of: is the SF trusted - for the sake=20
> of the 5 tuple, as well as for NSH header changes (e.g. SI decrement=20
> or even SPI change in case a "Classifier" is incorporated). If not,=20
> the SFF (or the Proxy) has to keep that state and VERIFY it on the=20
> outbound...
>
> There are opinions as if we need to allow for some SF that are fully=20
> trusted and some that are not trusted. I assume all agree the SFF is=20
> part of the infrastructure and is trusted. We need to close on this=20
> for the NSH draft too.
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 12 21:38:01 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA5771B4057 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qtjAEjLh0deH for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:45 -0800 (PST)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by ietfa.amsl.com (Postfix) with ESMTP id C15EC1B4056 for <sfc@ietf.org>; Thu, 12 Nov 2015 21:37:45 -0800 (PST)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP; 12 Nov 2015 21:37:45 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,285,1444719600";  d="scan'208,217";a="850108223"
Received: from orsmsx102.amr.corp.intel.com ([10.22.225.129]) by fmsmga002.fm.intel.com with ESMTP; 12 Nov 2015 21:37:46 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX102.amr.corp.intel.com ([169.254.1.190]) with mapi id 14.03.0248.002; Thu, 12 Nov 2015 21:37:45 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHWP2QPh/sCJgiEiQkT8QZOnYVJ6ZFLGAgAAi7/A=
Date: Fri, 13 Nov 2015 05:37:44 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com>
In-Reply-To: <D269F907.1DA82%repenno@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.139]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFA6ORSMSX114amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/OB6sVY5Pw4R72tzNtZitwdW58c8>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:37:54 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFA6ORSMSX114amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFA6ORSMSX114amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">(reply #3, you may want to read the other ones first)
<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [mailto:repenn=
o@cisco.com]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guichard (jguichar)&quot; =
&lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFA6ORSMSX114amrcor_--


From nobody Thu Nov 12 21:38:12 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE83C1B4057 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DmoAQ4BHypgA for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:37:50 -0800 (PST)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by ietfa.amsl.com (Postfix) with ESMTP id EDA951B4058 for <sfc@ietf.org>; Thu, 12 Nov 2015 21:37:47 -0800 (PST)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP; 12 Nov 2015 21:37:47 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,285,1444719600";  d="scan'208,217";a="850108228"
Received: from orsmsx102.amr.corp.intel.com ([10.22.225.129]) by fmsmga002.fm.intel.com with ESMTP; 12 Nov 2015 21:37:48 -0800
Received: from orsmsx153.amr.corp.intel.com (10.22.226.247) by ORSMSX102.amr.corp.intel.com (10.22.225.129) with Microsoft SMTP Server (TLS) id 14.3.248.2; Thu, 12 Nov 2015 21:37:47 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX153.amr.corp.intel.com ([169.254.12.146]) with mapi id 14.03.0248.002; Thu, 12 Nov 2015 21:37:47 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Sumandra Majee <S.Majee@F5.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRxVdX2Lz3depkuRzRNYC1xZY56Y+1sAgAAnJACAAEpPcA==
Date: Fri, 13 Nov 2015 05:37:46 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E2FFC1@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local> <D269FF81.46E82%s.majee@f5.com>
In-Reply-To: <D269FF81.46E82%s.majee@f5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.139]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFC1ORSMSX114amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Dee_5GaQKkRxzwXk_F3J28YJwJc>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:37:58 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFC1ORSMSX114amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

(Reply #6, you may want to read them in order)

It is about the normative text in the arch an NSH draft and the provisions =
allowed for an SF. If trusted to decrement the SI, why not change the SPI. =
If not what is the requirement for SFF enforcement etc.

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Sumandra Majee [mailto:S.Majee@F5.com]
Sent: Thursday, November 12, 2015 8:58 AM
To: Ron Parker; Dave Dolson; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

I am bit lost on this whole trust issue. If there is concern about trusting=
 a particular SF it should go beyond just NSH headers. How does rcving SF-B=
 knows that payload is really from SF-A, or is the src_ip is not spoofed? T=
here are many ways to solve those.

So what is the concern,
   A) non transport level encryption scheme(all practical scheme has built =
in authentication)  doesn't protect NSH payload?
   B) Rcving SF must be able to verify that NSH hdr came from SF-A or more =
generally produced by one of the trusted SF?

I can smell yet another mess of shared secret and associated infrastructure=
 mess...

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Ron Parker <Ron_Parker@affirmednetworks.com<mailto:Ron_Parker@affirmednetwo=
rks.com>>
Date: Thursday, November 12, 2015 at 6:38 AM
To: Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>, "Elzur=
, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ietf.org<mai=
lto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Dave,

I agree with your analysis.   What we've been thinking of as "legacy SF" (i=
.e., incapable of processing NSH) can be applied equally to untrusted SF (i=
.e., capable of processing NSH, but local policy is to not provide NSH).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFC1ORSMSX114amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">(Reply #6, you may want to read them in order)<o:p></o:p></span></a><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It is about the normat=
ive text in the arch an NSH draft and the provisions allowed for an SF. If =
trusted to decrement the SI, why not change the SPI. If not what is the req=
uirement for SFF enforcement etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Sumandra Majee [mailto:S.Majee@F5.com] =
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:58 AM<br>
<b>To:</b> Ron Parker; Dave Dolson; Elzur, Uri; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I am bi=
t lost on this whole trust issue. If there is concern about trusting a part=
icular SF it should go beyond just NSH headers. How does rcving SF-B knows =
that payload is really from SF-A, or
 is the src_ip is not spoofed? There are many ways to solve those.&nbsp;<o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">So what=
 is the concern,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp; =
&nbsp;A) non transport level encryption scheme(all practical scheme has bui=
lt in authentication) &nbsp;doesn&#8217;t protect NSH payload?<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp; =
&nbsp;B) Rcving SF must be able to verify that NSH hdr came from SF-A or mo=
re generally produced by one of the trusted SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I can s=
mell yet another mess of shared secret and associated infrastructure mess&#=
8230;&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of Ron Parker &lt;<a href=3D"mailto:Ron=
_Parker@affirmednetworks.com">Ron_Parker@affirmednetworks.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 6:38 AM<br>
<b>To: </b>Dave Dolson &lt;<a href=3D"mailto:ddolson@sandvine.com">ddolson@=
sandvine.com</a>&gt;, &quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzu=
r@intel.com">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.or=
g</a>&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Dave,</span><span styl=
e=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I agree with your anal=
ysis.&nbsp;&nbsp; What we&#8217;ve been thinking of as &#8220;legacy SF&#82=
21; (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not
 provide NSH).</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp; Ron</span=
><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Dave Dolson<br>
<b>Sent:</b> Thursday, November 12, 2015 2:32 AM<br>
<b>To:</b> Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@=
intel.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.</spa=
n><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.</span><span style=3D"color:black"><o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.</span><=
span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a></span><=
span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;</span><span st=
yle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave</span><span styl=
e=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif;color:black">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,sans-serif;color:black"> sfc [<a =
href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?</span><span style=3D"colo=
r:black"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958581E2FFC1ORSMSX114amrcor_--


From nobody Thu Nov 12 21:47:20 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B38F71B4068 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:47:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DFlVSQKiOem7 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:47:13 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD0AA1B406E for <sfc@ietf.org>; Thu, 12 Nov 2015 21:47:13 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id C6DE9240ADB; Thu, 12 Nov 2015 21:47:13 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 49E88240C32; Thu, 12 Nov 2015 21:47:13 -0800 (PST)
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, Thomas Narten <narten@us.ibm.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com> <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5645795E.30003@joelhalpern.com>
Date: Fri, 13 Nov 2015 00:47:10 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ySbD9EFwMxro2w41WQT96TAKqiw>
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:47:15 -0000

Conversely, if the operators do not want it, and including it 
(authentication capability) in the product at suitable scale will 
introduce noticeable real costs, mandating implementation in the RFC is 
merely a recipe for almost all vendors to fudge in their descriptions of 
what they offer.  Mandating that we make it available is defensible, but 
really hard to make meaningful in practice.

Yours,
Joel

On 11/12/15 11:59 PM, Tirumaleswar Reddy (tireddy) wrote:
> Authenticating SFC encapsulation is required to prevent various attacks like man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc. The reason the requirement is saying 'MUST' is to do our best to provide BCP for NSH security, if an operator turn-off security then it's a risk he is willing to take.
>
> -Tiru
>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
>> Sent: Friday, November 13, 2015 6:20 AM
>> To: Thomas Narten
>> Cc: sfc@ietf.org; Ron Parker
>> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>>
>> When it comes to per-packet authentication mechanisms, applied to every
>> packet from every subscriber (which is what REQ14 asks us to implement)
>> there is real cost in meeting such a requirement.
>>
>> Which is why I expressed concern about the requirement during the meeting
>> in Yokohama.  I do no think that particular requirement has WG consensus,
>> and I think it is an over-reach.
>>
>> Including Authentication as an optional capability, well specified and well
>> integrated, makes good sense to me.  Making it mandatory to implement
>> seems to much.  And claiming it is mandatory to use would be a flat lie.
>>
>> Yours,
>> Joel
>>
>> On 11/12/15 7:30 PM, Thomas Narten wrote:
>>> FWIW, we need to be a bit more precise in our wording on security
>>> requirements. There are two important nuances:
>>>
>>> 1) Mandatory to use, meaning the protocol only works if the feature is
>>> enabled and works. This sort of implies that you can't *disable* its
>>> usage in the field.
>>>
>>> 2) Mandatory to implement, but optional to use.  If something is
>>> mandatory to implement, "compliant" implementations MUST support the
>>> feature. Whether the feature is used in practice is a separate matter
>>> left to the operator. The rational behind "mandatory to implement" is
>>> that an operator may not actually have the option to enable security
>>> if a product chooses not to implement an "optional" features.
>>>
>>> draft-mglt-sfc-security-environment-req-00.txt is unclear at present
>>> on which of the above is intended, but one can certainly read the
>>> following:
>>>
>>>      REQ14: Communications within the SFC Data Plane MUST be
>> authenticated
>>>             in order to prevent the traffic to be modified by an attacker.
>>>
>>> as intending 1.
>>>
>>> For completeness, I should point that even if the final spec calls for
>>> 2), vendors may choose not to follow the requirement (and then be
>>> uncompliant), if they don't think it makes sense for their customers
>>> (the original IPv6 mandate to include IPsec comes to mind, for
>>> example). So if the WG chooses 2) - which is what I expect is the most
>>> reasonable course, it should pay careful attention to making the
>>> details something vendors think is useful, necessary and workable in
>>> practice. I.e, the cost of mitigation matches the threat level.
>>>
>>> Thomas
>>>
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Nov 12 21:47:44 2015
Return-Path: <I.Smith@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1664B1B406D for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:47:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.011
X-Spam-Level: 
X-Spam-Status: No, score=-7.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CDbyiB-67EOA for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 21:47:41 -0800 (PST)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 19C8B1B406E for <sfc@ietf.org>; Thu, 12 Nov 2015 21:47:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1447393661; x=1478929661; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=IT9dCRUbcuoPFqvZrrSl+PRMKc5WsS+Su88sj8+JMGA=; b=CsZYO+yHqzm8BwiXx+XIpWE1yJWerO7/Oaway/EvPSoTMKWWWu5BZJ7F kuN2R2ofkxk5EkmNqawWDquNOMxQX0A+jMwPaLUtvzQlz8ahdFs3dTBEj zVN1jOIBa5rS1d8wwi4SjMo07khwTxsrjyaIYlLk/OvUPutxmYjeYs/tE E=;
X-IronPort-AV: E=Sophos;i="5.20,286,1444694400"; d="scan'208";a="188081719"
X-IPAS-Result: A2HOHAC5eEVW/+sKqMBeGQEBAQEPAQEBAQYBAQEBg1RvBq4uAYF7AY96BxcKhW8CggUBAQEBAQEEgQeCThQQAQEBAQEBTwI+LQEBAQEDAQEBawsMBAIBCBEEAQEBCR4HDxgLFAkIAgQBDQWIO8M0AQEBAQEBAQEBAQEBAQEBAQEBAQEBFASGVIR+hFmEYAWFTIgIiHSIDoJhhBOHZZMFhGdyhDaBBwEBAQ
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 13 Nov 2015 05:47:40 +0000
Received: from SEAEXCHMBX04.olympus.F5Net.com (192.168.15.226) by seaexchmbx02.olympus.F5Net.com (192.168.15.224) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Thu, 12 Nov 2015 21:47:39 -0800
Received: from SEAEXCHMBX04.olympus.F5Net.com ([fe80::c9a6:e310:2052:6c8a]) by SEAEXCHMBX04.olympus.F5Net.com ([fe80::c9a6:e310:2052:6c8a%21]) with mapi id 15.00.1044.021; Thu, 12 Nov 2015 21:47:39 -0800
From: Ian Smith <I.Smith@F5.com>
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q8fjhciUsDIEqc5EQnAEI6Fp6OE5iAgACUU4CACwRhgIAABVUAgABF6AD//4HMRw==
Date: Fri, 13 Nov 2015 05:47:38 +0000
Message-ID: <1447393658614.36390@F5.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com>, <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com>
In-Reply-To: <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/F6xU4O4_PDBQTIoPlC6Cn_7Y0DU>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Ron Parker <Ron_Parker@affirmednetworks.com>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 05:47:43 -0000

Integrity of both the data and the origin can (and perhaps should) be provi=
ded using AH - an already standardized, and implemented mechanism for preve=
nting such threats at the network level.  It seems far-fetched that we're e=
ntertaining the idea that up-stack protocols need to re-invent AH to satisf=
y data and origin integrity requirements.=0A=
=0A=
If an implementer would like to use NSH on a non-IP network, it should be e=
nough to simply say that they must provide the appropriate analog for AH, i=
f it exists and note the repercussions of using an NSH conveyance which lac=
ks data and origin integrity assurance.=0A=
=0A=
If the argument is that IPSec is too <anything> to use for NSH, then that i=
s, explicitly, a statement that data and origin integrity aren't important =
enough to make the (arguably less than re-inventing AH) effort to provide t=
he security.  =0A=
=0A=
So, we could be hard line and put MUST's in that will be ignored, or we cou=
ld be adventurous and shim into the NSH specification a lesser integrity me=
chanism that will require defense and maintenance, or we could be pragmatic=
 and stipulate the use of existing technology to satisfy the concerns being=
 raised while noting that the lack of enthusiasm for those existing technol=
ogies belies a pre-existing judgement about the validity of those concerns =
in real usage.=0A=
=0A=
    =0A=
________________________________________=0A=
From: sfc <sfc-bounces@ietf.org> on behalf of Tirumaleswar Reddy (tireddy) =
<tireddy@cisco.com>=0A=
Sent: Thursday, November 12, 2015 11:59 PM=0A=
To: Joel M. Halpern; Thomas Narten=0A=
Cc: Ron Parker; sfc@ietf.org=0A=
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14=0A=
=0A=
Authenticating SFC encapsulation is required to prevent various attacks lik=
e man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc. T=
he reason the requirement is saying 'MUST' is to do our best to provide BCP=
 for NSH security, if an operator turn-off security then it's a risk he is =
willing to take.=0A=
=0A=
-Tiru=0A=
=0A=
> -----Original Message-----=0A=
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern=0A=
> Sent: Friday, November 13, 2015 6:20 AM=0A=
> To: Thomas Narten=0A=
> Cc: sfc@ietf.org; Ron Parker=0A=
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14=0A=
>=0A=
> When it comes to per-packet authentication mechanisms, applied to every=
=0A=
> packet from every subscriber (which is what REQ14 asks us to implement)=
=0A=
> there is real cost in meeting such a requirement.=0A=
>=0A=
> Which is why I expressed concern about the requirement during the meeting=
=0A=
> in Yokohama.  I do no think that particular requirement has WG consensus,=
=0A=
> and I think it is an over-reach.=0A=
>=0A=
> Including Authentication as an optional capability, well specified and we=
ll=0A=
> integrated, makes good sense to me.  Making it mandatory to implement=0A=
> seems to much.  And claiming it is mandatory to use would be a flat lie.=
=0A=
>=0A=
> Yours,=0A=
> Joel=0A=
>=0A=
> On 11/12/15 7:30 PM, Thomas Narten wrote:=0A=
> > FWIW, we need to be a bit more precise in our wording on security=0A=
> > requirements. There are two important nuances:=0A=
> >=0A=
> > 1) Mandatory to use, meaning the protocol only works if the feature is=
=0A=
> > enabled and works. This sort of implies that you can't *disable* its=0A=
> > usage in the field.=0A=
> >=0A=
> > 2) Mandatory to implement, but optional to use.  If something is=0A=
> > mandatory to implement, "compliant" implementations MUST support the=0A=
> > feature. Whether the feature is used in practice is a separate matter=
=0A=
> > left to the operator. The rational behind "mandatory to implement" is=
=0A=
> > that an operator may not actually have the option to enable security=0A=
> > if a product chooses not to implement an "optional" features.=0A=
> >=0A=
> > draft-mglt-sfc-security-environment-req-00.txt is unclear at present=0A=
> > on which of the above is intended, but one can certainly read the=0A=
> > following:=0A=
> >=0A=
> >     REQ14: Communications within the SFC Data Plane MUST be=0A=
> authenticated=0A=
> >            in order to prevent the traffic to be modified by an attacke=
r.=0A=
> >=0A=
> > as intending 1.=0A=
> >=0A=
> > For completeness, I should point that even if the final spec calls for=
=0A=
> > 2), vendors may choose not to follow the requirement (and then be=0A=
> > uncompliant), if they don't think it makes sense for their customers=0A=
> > (the original IPv6 mandate to include IPsec comes to mind, for=0A=
> > example). So if the WG chooses 2) - which is what I expect is the most=
=0A=
> > reasonable course, it should pay careful attention to making the=0A=
> > details something vendors think is useful, necessary and workable in=0A=
> > practice. I.e, the cost of mitigation matches the threat level.=0A=
> >=0A=
> > Thomas=0A=
> >=0A=
> >=0A=
>=0A=
> _______________________________________________=0A=
> sfc mailing list=0A=
> sfc@ietf.org=0A=
> https://www.ietf.org/mailman/listinfo/sfc=0A=
=0A=
_______________________________________________=0A=
sfc mailing list=0A=
sfc@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sfc=0A=


From nobody Thu Nov 12 22:18:45 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA58F1B40BB for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:18:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aIunJoJd3D9T for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:18:42 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD7881B40B9 for <sfc@ietf.org>; Thu, 12 Nov 2015 22:18:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5677; q=dns/txt; s=iport; t=1447395521; x=1448605121; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=dbDYHpw0fEcuJ1SFLqo7wLIXHoi2eSjPOdwNpNbmqPc=; b=cSDl+CBEPotj0ak/VgTMCd8qlJd7u/MSBQQ1ImSAExqqHwJ7tRuqCsed +YsdxaFK/iBueAn9pzM8TSm/+rHCdWnIUiLiRCLgLDkunEBibR0SwvxQD Os004mxumHHNB26Ruya4a9T3MrBiw8SC/cQrncUaK2Zft6F0vyYvDcKN/ s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ApAgA1gEVW/4oNJK1egztTbwa+OQENg?= =?us-ascii?q?WUXCoVvAoE6OBQBAQEBAQEBgQqENAEBAQQBAQE3NAsMBAIBCA4DBAEBAR4JByc?= =?us-ascii?q?LFAkIAgQBDQUIE4gTDcMuAQEBAQEBAQEBAQEBAQEBAQEBAQEBFASGVIR+iTkFh?= =?us-ascii?q?UyQfAGIDYJhgjGBYodlkwQBHwEBQoQEcoQ2gQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,286,1444694400"; d="scan'208";a="44547052"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-8.cisco.com with ESMTP; 13 Nov 2015 06:18:35 +0000
Received: from XCH-RCD-019.cisco.com (xch-rcd-019.cisco.com [173.37.102.29]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tAD6IZkT005471 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 06:18:35 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-RCD-019.cisco.com (173.37.102.29) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 00:18:34 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 00:18:34 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: Ian Smith <I.Smith@F5.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q/E0Hn9hQJP0yk2D/Yc/gPMZ6N8hGAgACUU4CACwRhgIAABVUA///drYCAAHWTAP//opgQ
Date: Fri, 13 Nov 2015 06:18:34 +0000
Message-ID: <931cc4f8237949dfa07135da0e2b6a96@XCH-RCD-017.cisco.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com>, <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com> <1447393658614.36390@F5.com>
In-Reply-To: <1447393658614.36390@F5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.47.186]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/j0dhHel1vdNgP_dGQPkaPUIVTbU>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Ron Parker <Ron_Parker@affirmednetworks.com>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 06:18:44 -0000

AH would meet the REQ-14, but REQ-15 won't be met by AH. We have to first d=
iscuss and freeze the security requirements and then look into possible sol=
utions.

-Tiru

> -----Original Message-----
> From: Ian Smith [mailto:I.Smith@F5.com]
> Sent: Friday, November 13, 2015 11:18 AM
> To: Tirumaleswar Reddy (tireddy); Joel M. Halpern; Thomas Narten
> Cc: Ron Parker; sfc@ietf.org
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>=20
> Integrity of both the data and the origin can (and perhaps should) be
> provided using AH - an already standardized, and implemented mechanism
> for preventing such threats at the network level.  It seems far-fetched t=
hat
> we're entertaining the idea that up-stack protocols need to re-invent AH =
to
> satisfy data and origin integrity requirements.
>=20
> If an implementer would like to use NSH on a non-IP network, it should be
> enough to simply say that they must provide the appropriate analog for AH=
,
> if it exists and note the repercussions of using an NSH conveyance which
> lacks data and origin integrity assurance.
>=20
> If the argument is that IPSec is too <anything> to use for NSH, then that=
 is,
> explicitly, a statement that data and origin integrity aren't important e=
nough
> to make the (arguably less than re-inventing AH) effort to provide the
> security.
>=20
> So, we could be hard line and put MUST's in that will be ignored, or we c=
ould
> be adventurous and shim into the NSH specification a lesser integrity
> mechanism that will require defense and maintenance, or we could be
> pragmatic and stipulate the use of existing technology to satisfy the con=
cerns
> being raised while noting that the lack of enthusiasm for those existing
> technologies belies a pre-existing judgement about the validity of those
> concerns in real usage.
>=20
>=20
> ________________________________________
> From: sfc <sfc-bounces@ietf.org> on behalf of Tirumaleswar Reddy (tireddy=
)
> <tireddy@cisco.com>
> Sent: Thursday, November 12, 2015 11:59 PM
> To: Joel M. Halpern; Thomas Narten
> Cc: Ron Parker; sfc@ietf.org
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>=20
> Authenticating SFC encapsulation is required to prevent various attacks l=
ike
> man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc.
> The reason the requirement is saying 'MUST' is to do our best to provide =
BCP
> for NSH security, if an operator turn-off security then it's a risk he is=
 willing to
> take.
>=20
> -Tiru
>=20
> > -----Original Message-----
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> > Sent: Friday, November 13, 2015 6:20 AM
> > To: Thomas Narten
> > Cc: sfc@ietf.org; Ron Parker
> > Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
> >
> > When it comes to per-packet authentication mechanisms, applied to
> > every packet from every subscriber (which is what REQ14 asks us to
> > implement) there is real cost in meeting such a requirement.
> >
> > Which is why I expressed concern about the requirement during the
> > meeting in Yokohama.  I do no think that particular requirement has WG
> > consensus, and I think it is an over-reach.
> >
> > Including Authentication as an optional capability, well specified and
> > well integrated, makes good sense to me.  Making it mandatory to
> > implement seems to much.  And claiming it is mandatory to use would be =
a
> flat lie.
> >
> > Yours,
> > Joel
> >
> > On 11/12/15 7:30 PM, Thomas Narten wrote:
> > > FWIW, we need to be a bit more precise in our wording on security
> > > requirements. There are two important nuances:
> > >
> > > 1) Mandatory to use, meaning the protocol only works if the feature
> > > is enabled and works. This sort of implies that you can't *disable*
> > > its usage in the field.
> > >
> > > 2) Mandatory to implement, but optional to use.  If something is
> > > mandatory to implement, "compliant" implementations MUST support
> the
> > > feature. Whether the feature is used in practice is a separate
> > > matter left to the operator. The rational behind "mandatory to
> > > implement" is that an operator may not actually have the option to
> > > enable security if a product chooses not to implement an "optional"
> features.
> > >
> > > draft-mglt-sfc-security-environment-req-00.txt is unclear at present
> > > on which of the above is intended, but one can certainly read the
> > > following:
> > >
> > >     REQ14: Communications within the SFC Data Plane MUST be
> > authenticated
> > >            in order to prevent the traffic to be modified by an attac=
ker.
> > >
> > > as intending 1.
> > >
> > > For completeness, I should point that even if the final spec calls
> > > for 2), vendors may choose not to follow the requirement (and then
> > > be uncompliant), if they don't think it makes sense for their
> > > customers (the original IPv6 mandate to include IPsec comes to mind,
> > > for example). So if the WG chooses 2) - which is what I expect is
> > > the most reasonable course, it should pay careful attention to
> > > making the details something vendors think is useful, necessary and
> > > workable in practice. I.e, the cost of mitigation matches the threat =
level.
> > >
> > > Thomas
> > >
> > >
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 12 22:31:12 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 094AC1B40D8 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:31:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zAh0J_kO5ka7 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:31:07 -0800 (PST)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A0E2F1ACE81 for <sfc@ietf.org>; Thu, 12 Nov 2015 22:31:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4505; q=dns/txt; s=iport; t=1447396267; x=1448605867; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Qhzb6GZwTQWteswcJmieJQmwm/gBRjqxilrHu9YBoM8=; b=jF/6psdA8QijCBQWWXvvSS31s1vQwS+OrdbFLu0+G4Sb3MSkx6PDM7bE ORvsVwAJ4n/hdW3qMiZH+Z5tOicUzOsco8s2AF6Al2+XFpDicmOTr8bYN 6cyU7UtAmZ7Ky/njfm7bcmmuXoPM6Sh8zr+CD1cOK1/TcbQF/wfHgj+fP I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ApAgDggUVW/4YNJK1egztTbwa+OQENg?= =?us-ascii?q?WUXCoVvAoE7OBQBAQEBAQEBgQqENAEBAQMBAQEBNzQLDAQCAQgRBAEBAR4JByc?= =?us-ascii?q?LFAkIAgQBDQUIiB4IDcMjAQEBAQEBAQEBAQEBAQEBAQEBAQEBFASGVIR+iTkFh?= =?us-ascii?q?UyQfAGIDYJhgjGBYodljxODcQEfAQFChARyhDaBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,286,1444694400"; d="scan'208";a="46332445"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-4.cisco.com with ESMTP; 13 Nov 2015 06:31:05 +0000
Received: from XCH-RCD-016.cisco.com (xch-rcd-016.cisco.com [173.37.102.26]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id tAD6V5pt023856 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 06:31:05 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-RCD-016.cisco.com (173.37.102.26) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 00:31:04 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 00:31:05 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q/E0Hn9hQJP0yk2D/Yc/gPMZ6N8hGAgACUU4CACwRhgIAABVUA///drYCAAHVyAP//pGRw
Date: Fri, 13 Nov 2015 06:31:05 +0000
Message-ID: <61d64c31a4014320a4d6f494602aae8b@XCH-RCD-017.cisco.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com> <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com> <5645795E.30003@joelhalpern.com>
In-Reply-To: <5645795E.30003@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.47.186]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Pp0Qb9axGeatyzzKkOPLb1_W4Mo>
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 06:31:10 -0000

Yes, security comes at a cost and with the current threat landscape, REQ14 =
is saying it's MUST. I understand your point, we should discuss the negativ=
e implications if REQ14 is changed to "SHOULD" or "RECOMMENDED".
If NSH security is not implemented and SFC is subjected to attacks then ope=
rators will not even have the option protect NSH.

-Tiru

> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Friday, November 13, 2015 11:17 AM
> To: Tirumaleswar Reddy (tireddy); Thomas Narten
> Cc: sfc@ietf.org; Ron Parker
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>=20
> Conversely, if the operators do not want it, and including it (authentica=
tion
> capability) in the product at suitable scale will introduce noticeable re=
al costs,
> mandating implementation in the RFC is merely a recipe for almost all
> vendors to fudge in their descriptions of what they offer.  Mandating tha=
t we
> make it available is defensible, but really hard to make meaningful in
> practice.
>=20
> Yours,
> Joel
>=20
> On 11/12/15 11:59 PM, Tirumaleswar Reddy (tireddy) wrote:
> > Authenticating SFC encapsulation is required to prevent various attacks=
 like
> man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc.
> The reason the requirement is saying 'MUST' is to do our best to provide =
BCP
> for NSH security, if an operator turn-off security then it's a risk he is=
 willing to
> take.
> >
> > -Tiru
> >
> >> -----Original Message-----
> >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> >> Sent: Friday, November 13, 2015 6:20 AM
> >> To: Thomas Narten
> >> Cc: sfc@ietf.org; Ron Parker
> >> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
> >>
> >> When it comes to per-packet authentication mechanisms, applied to
> >> every packet from every subscriber (which is what REQ14 asks us to
> >> implement) there is real cost in meeting such a requirement.
> >>
> >> Which is why I expressed concern about the requirement during the
> >> meeting in Yokohama.  I do no think that particular requirement has
> >> WG consensus, and I think it is an over-reach.
> >>
> >> Including Authentication as an optional capability, well specified
> >> and well integrated, makes good sense to me.  Making it mandatory to
> >> implement seems to much.  And claiming it is mandatory to use would be
> a flat lie.
> >>
> >> Yours,
> >> Joel
> >>
> >> On 11/12/15 7:30 PM, Thomas Narten wrote:
> >>> FWIW, we need to be a bit more precise in our wording on security
> >>> requirements. There are two important nuances:
> >>>
> >>> 1) Mandatory to use, meaning the protocol only works if the feature
> >>> is enabled and works. This sort of implies that you can't *disable*
> >>> its usage in the field.
> >>>
> >>> 2) Mandatory to implement, but optional to use.  If something is
> >>> mandatory to implement, "compliant" implementations MUST support
> the
> >>> feature. Whether the feature is used in practice is a separate
> >>> matter left to the operator. The rational behind "mandatory to
> >>> implement" is that an operator may not actually have the option to
> >>> enable security if a product chooses not to implement an "optional"
> features.
> >>>
> >>> draft-mglt-sfc-security-environment-req-00.txt is unclear at present
> >>> on which of the above is intended, but one can certainly read the
> >>> following:
> >>>
> >>>      REQ14: Communications within the SFC Data Plane MUST be
> >> authenticated
> >>>             in order to prevent the traffic to be modified by an atta=
cker.
> >>>
> >>> as intending 1.
> >>>
> >>> For completeness, I should point that even if the final spec calls
> >>> for 2), vendors may choose not to follow the requirement (and then
> >>> be uncompliant), if they don't think it makes sense for their
> >>> customers (the original IPv6 mandate to include IPsec comes to mind,
> >>> for example). So if the WG chooses 2) - which is what I expect is
> >>> the most reasonable course, it should pay careful attention to
> >>> making the details something vendors think is useful, necessary and
> >>> workable in practice. I.e, the cost of mitigation matches the threat =
level.
> >>>
> >>> Thomas
> >>>
> >>>
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Thu Nov 12 22:33:38 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45D061B40E3 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:33:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ArvUYeLLP-OC for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:33:33 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4DE21B40E1 for <sfc@ietf.org>; Thu, 12 Nov 2015 22:33:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17585; q=dns/txt; s=iport; t=1447396413; x=1448606013; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=yo8V0S+ob0TaXFeVLSMCKh8OZwydVanvq21mFkf9CA0=; b=UQwH0BQcTVO6cBuIjD3Xy+LHXg+9A4eRKrLUxks7tScN2v54GwXxJOSy +NYIq6BTAi07GFAOGaMbWd0ZKtQzHr4FVBqu4olZwziCyvh7NLQqUNTU5 4TtjUsMqMbDUV7gnBfZt1a1FzKbw1c0VyPzijZJxQDiCzWcBQzNZHfjvM 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AoAgDygkVW/5tdJa1bA4JuTVNvBr45A?= =?us-ascii?q?Q2BZSOFbQKBOzgUAQEBAQEBAYEKhDQBAQEEJwY/ChMCAQgRAwEBASgHMhQJCAI?= =?us-ascii?q?EARIIiCYNwyQBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUhH6EaBMBDAkRhBcFi?= =?us-ascii?q?B2OKwGFHIgDgWKSFoRig3EBHwEBQoIRHYFWcoQ2gQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,286,1444694400";  d="scan'208,217";a="207861675"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by alln-iport-8.cisco.com with ESMTP; 13 Nov 2015 06:33:32 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id tAD6XW8S002930 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 06:33:32 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 00:33:31 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 00:33:32 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHWPy1kUYkzkbnUOLk0v1kIRkSp6Y8yqAgACMLoA=
Date: Fri, 13 Nov 2015 06:33:31 +0000
Message-ID: <348d84d5f11848f9a028ef5e0e56dfca@XCH-RCD-017.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com>
In-Reply-To: <D269F907.1DA82%repenno@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.47.186]
Content-Type: multipart/alternative; boundary="_000_348d84d5f11848f9a028ef5e0e56dfcaXCHRCD017ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/iYumjG34dX1zC5bdlzMT2Zx2b9A>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 06:33:37 -0000

--_000_348d84d5f11848f9a028ef5e0e56dfcaXCHRCD017ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Yes, https://tools.ietf.org/html/draft-mglt-sfc-security-environment-req-00=
#section-7 is already discussing NSH security aspects.

-Tiru

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Reinaldo Penno (repenn=
o)
Sent: Thursday, November 12, 2015 9:41 PM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_348d84d5f11848f9a028ef5e0e56dfcaXCHRCD017ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Yes, <a href=3D"https:=
//tools.ietf.org/html/draft-mglt-sfc-security-environment-req-00#section-7"=
>
https://tools.ietf.org/html/draft-mglt-sfc-security-environment-req-00#sect=
ion-7</a> is already discussing NSH security aspects.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Tiru<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Reinaldo Penno (repenno)<br>
<b>Sent:</b> Thursday, November 12, 2015 9:41 PM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guichard (jguichar)&quot; =
&lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi</span></a><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_348d84d5f11848f9a028ef5e0e56dfcaXCHRCD017ciscocom_--


From nobody Thu Nov 12 22:42:30 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 438D51B40FA for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:42:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p3KCvkxzeD44 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 22:42:26 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 236CB1B40F8 for <sfc@ietf.org>; Thu, 12 Nov 2015 22:42:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14325; q=dns/txt; s=iport; t=1447396946; x=1448606546; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=G7ZJ2wb2xnfKc0rwePOHcArKA5eVwOmfVqHM/MJHXzY=; b=ausMHGGmZhJaAyHQetIbpb96FtKLyJj1VuBLUrXOd4LdSHGgBWt0tSAa igjdY0qSUEPss/SM8fpIIi3s6RSKhv8PgqHBYgDzbEBCO8lRJrg2VtQRU CAPAT+0aYE1s6sGwTOwDsrLUMfL3b1p6gD/e48p+L6cO2PvapzAO46gM1 M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AoAgAIhkVW/5FdJa1bA4JuTVNvBr46AQ2BZYYQAoE7OBQBAQEBAQEBgQqENAEBAQQnBj8KEwIBCBEDAQEBKAcyFAkIAgQBEgiIJsMuAQEBAQEBAQEBAQEBAQEBAQEBAQEBGIZUhH6EaBMBFRGEFwWIHY4rAY0fgWKSFoRig3EBHwEBQoQEcoQ2gQcBAQE
X-IronPort-AV: E=Sophos;i="5.20,286,1444694400";  d="scan'208,217";a="207897377"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by alln-iport-7.cisco.com with ESMTP; 13 Nov 2015 06:42:09 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id tAD6g9NQ008399 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 06:42:09 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 00:42:08 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 00:42:08 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHWPy1kUYkzkbnUOLk0v1kIRkSp6Zf+EQ
Date: Fri, 13 Nov 2015 06:42:08 +0000
Message-ID: <496bb84d4a5342eca633574aa1c81f5f@XCH-RCD-017.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com>
In-Reply-To: <D26A20AA.2D3D5%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.47.186]
Content-Type: multipart/alternative; boundary="_000_496bb84d4a5342eca633574aa1c81f5fXCHRCD017ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/k-d0UKpLKqI71SmwMHeD8IUi8gQ>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 06:42:29 -0000

--_000_496bb84d4a5342eca633574aa1c81f5fXCHRCD017ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Agreed, SF are trusted network elements. A untrusted SF can do lot of damag=
e (clone traffic to attacker, leak privacy sensitive info etc.)

-Tiru
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Thursday, November 12, 2015 9:35 PM
To: Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_496bb84d4a5342eca633574aa1c81f5fXCHRCD017ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agreed, SF are trusted=
 network elements. A untrusted SF can do lot of damage (clone traffic to at=
tacker, leak privacy sensitive info etc.)
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Tiru<o:p></o:p></span=
></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Thursday, November 12, 2015 9:35 PM<br>
<b>To:</b> Elzur, Uri; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi</span></a><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_496bb84d4a5342eca633574aa1c81f5fXCHRCD017ciscocom_--


From nobody Thu Nov 12 23:24:58 2015
Return-Path: <repenno@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA2371B4181 for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 23:24:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NCiOgk2xIgYp for <sfc@ietfa.amsl.com>; Thu, 12 Nov 2015 23:24:54 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 036D01B417D for <sfc@ietf.org>; Thu, 12 Nov 2015 23:24:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22747; q=dns/txt; s=iport; t=1447399494; x=1448609094; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=hCUkvdpGOSafi2jlwnN3srMrrq1oo78TCH1/27B8Bxs=; b=VWV/EXxiUF2iyH+LE0vT4Yho4A/62uHdNEERvtXdNxjV9c541xTXcwz/ ktRH2Pc0ag0tbyxXd8dtO0IAwVtCl4Y69MsXVbIhPiJf/KVeDbTSt5uOu 3LKeaDhLrLHxw9EgkvTrAGxxAeVvtRO6ls1gxl6SeW8Of67MOjNlseO8J A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AoAgA6j0VW/4MNJK1bA4JuTVNvBr46AQ2BZYYQAoE8OBQBAQEBAQEBgQqENAEBAQQnBj8KEwIBCBEDAQEBIQcHMhQJCAIEARKILsMZAQEBAQEBAQEBAQEBAQEBAQEBAQEBGIZUhH6EaBMBFRGEFwWIHY4rAY0mgVuHZYoxhGKDcQEfAQFCghEdgVZyhDaBBwEBAQ
X-IronPort-AV: E=Sophos;i="5.20,286,1444694400";  d="scan'208,217";a="207744202"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-5.cisco.com with ESMTP; 13 Nov 2015 07:24:53 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tAD7OqSi003523 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 07:24:53 GMT
Received: from xch-rcd-009.cisco.com (173.37.102.19) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 01:24:52 -0600
Received: from xch-rcd-009.cisco.com ([173.37.102.19]) by XCH-RCD-009.cisco.com ([173.37.102.19]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 01:24:52 -0600
From: "Reinaldo Penno (repenno)" <repenno@cisco.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVa0+xTCDtVR0Ky6Lo8W+YR+Z6YnmKA///PSICAAWeXAP//l8+A
Date: Fri, 13 Nov 2015 07:24:52 +0000
Message-ID: <D26ACE44.1DB5B%repenno@cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.32.97]
Content-Type: multipart/alternative; boundary="_000_D26ACE441DB5Brepennociscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Q66IMWVLS9--PretZbcd5_QEkiU>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 07:24:57 -0000

--_000_D26ACE441DB5Brepennociscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.=94

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off =85]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things =96 add routes to VRFs that=
 should not be there, put interfaces into the wrong VRF, inject routes that=
 force traffic in a certain direction, the list goes on and on and on .. Wh=
at I can do from an SFC perspective is verify traffic from SF->SFF (which I=
 need for loop prevention anyway) to make sure that packets received from a=
n SF comply with the SFP policy implemented at the SFF e.g. I only expect t=
o receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I=92d like to surfa=
ce this issue and hopefully it can be easily and quickly resolved. In the d=
iscussion about Map assisted SFC Proxy, we discussed the potential of an SF=
 (e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention =
may be needed in such case to update the map (as the new 5 tuple may not be=
 there) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a =93Classifier=94 is incorporated). If not, the SFF (or the Pro=
xy) has to keep that state and VERIFY it on the outbound=85

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568


--_000_D26ACE441DB5Brepennociscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <F2DC95068714D448951CAA7251278C95@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;">
<div><font face=3D"Calibri,sans-serif">&quot;</font><span style=3D"color: r=
gb(31, 73, 125); font-family: Calibri, sans-serif; font-size: 15px;">The us=
e model where trusting he SF or not, becomes interesting is that of BYOD SF=
.</span><font color=3D"#1f497d" face=3D"Calibri,sans-serif"><span style=3D"=
font-size: 15px;">=94</span></font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<span style=3D"color: rgb(31, 73, 125); font-size: 15px;"><br>
</span></div>
<div><font color=3D"#1f497d" face=3D"Calibri,sans-serif"><span style=3D"fon=
t-size: 15px;">It seems again we are conflating generic security requiremen=
ts with NSH. &nbsp;If you trust&nbsp;the device then you accept it being pa=
rt of a chain. If a device is compromised changing
 NSH metadata is the least of the problems.&nbsp;</span></font></div>
<div><font color=3D"#1f497d" face=3D"Calibri,sans-serif"><span style=3D"fon=
t-size: 15px;"><br>
</span></font></div>
<div>I will reiterate my point about NSH security requirements. What <span =
style=3D"font-style: italic;">
new</span>&nbsp;<span style=3D"font-style: italic;">specific</span> NSH att=
acks (and only NSH) we should guard against. Solving device trust issue, IP=
 networks layer issues, transport issues, etc seems very much out of scope =
of this WG. &nbsp; &nbsp;</div>
<div><font color=3D"#1f497d" face=3D"Calibri,sans-serif"><span style=3D"fon=
t-size: 15px;"><br>
</span></font></div>
<div><font color=3D"#1f497d" face=3D"Calibri,sans-serif"><span style=3D"fon=
t-size: 15px;">T</span></font><font color=3D"#1f497d" face=3D"Calibri,sans-=
serif"><span style=3D"font-size: 15px;">hanks,</span></font></div>
<div><font color=3D"#1f497d" face=3D"Calibri,sans-serif"><span style=3D"fon=
t-size: 15px;"><br>
</span></font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION" style=3D"color: rgb(0, 0, 0); font-family=
: Calibri, sans-serif; font-size: 14px;">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>&quot;Elzur, Uri&quot; &lt;<a=
 href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, November 12, 2015 a=
t 9:37 PM<br>
<span style=3D"font-weight:bold">To: </span>Reinaldo Penno &lt;<a href=3D"m=
ailto:repenno@cisco.com">repenno@cisco.com</a>&gt;, &quot;Jim Guichard (jgu=
ichar)&quot; &lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</=
a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a=
 href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>RE: [sfc] will you trust y=
our SF?<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">(reply #3, you may want to read the other ones first)
<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guichard (jguichar)&quot; =
&lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off =85]<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things =96 add routes to VRFs =
that should not be there, put interfaces into the wrong VRF, inject routes =
that force traffic in a certain direction, the list goes on and on and on .=
. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I=92d like to surface this issue and hope=
fully it can be easily and quickly resolved. In the discussion about Map as=
sisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a =93Classifier=94 is incorporated). If not, th=
e SFF (or the Proxy) has to keep that state and VERIFY it on the outbound=
=85</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D26ACE441DB5Brepennociscocom_--


From nobody Fri Nov 13 06:12:38 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EA331A88F4 for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 06:12:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g3gIPaTKlIsn for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 06:12:35 -0800 (PST)
Received: from hub021-ca-6.exch021.serverdata.net (hub021-ca-6.exch021.serverdata.net [64.78.56.71]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 383261A88EB for <sfc@ietf.org>; Fri, 13 Nov 2015 06:12:35 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-6.exch021.domain.local ([10.254.4.92]) with mapi id 14.03.0224.002;  Fri, 13 Nov 2015 06:12:34 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q5xuabff0gtUet7dPFbRQaWp6N8hGAgACUU4CACwRhgIAABVUA///drYCAAJb5AIAABsig
Date: Fri, 13 Nov 2015 14:12:34 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E95AD32@MBX021-W3-CA-2.exch021.domain.local>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com> <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com> <5645795E.30003@joelhalpern.com>
In-Reply-To: <5645795E.30003@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1_aOLdl-JtP9s8JDEu5xHTfKp7c>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 14:12:37 -0000

I'll point out that SFC is not only for operators.   It has application in =
the enterprise, as well, where security concerns and practices may differ f=
rom the operator environment.

   Ron


-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]=20
Sent: Friday, November 13, 2015 12:47 AM
To: Tirumaleswar Reddy (tireddy) <tireddy@cisco.com>; Thomas Narten <narten=
@us.ibm.com>
Cc: sfc@ietf.org; Ron Parker <Ron_Parker@affirmednetworks.com>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14

Conversely, if the operators do not want it, and including it (authenticati=
on capability) in the product at suitable scale will introduce noticeable r=
eal costs, mandating implementation in the RFC is merely a recipe for almos=
t all vendors to fudge in their descriptions of what they offer.  Mandating=
 that we make it available is defensible, but really hard to make meaningfu=
l in practice.

Yours,
Joel

On 11/12/15 11:59 PM, Tirumaleswar Reddy (tireddy) wrote:
> Authenticating SFC encapsulation is required to prevent various attacks l=
ike man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc.=
 The reason the requirement is saying 'MUST' is to do our best to provide B=
CP for NSH security, if an operator turn-off security then it's a risk he i=
s willing to take.
>
> -Tiru
>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
>> Sent: Friday, November 13, 2015 6:20 AM
>> To: Thomas Narten
>> Cc: sfc@ietf.org; Ron Parker
>> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>>
>> When it comes to per-packet authentication mechanisms, applied to=20
>> every packet from every subscriber (which is what REQ14 asks us to=20
>> implement) there is real cost in meeting such a requirement.
>>
>> Which is why I expressed concern about the requirement during the=20
>> meeting in Yokohama.  I do no think that particular requirement has=20
>> WG consensus, and I think it is an over-reach.
>>
>> Including Authentication as an optional capability, well specified=20
>> and well integrated, makes good sense to me.  Making it mandatory to=20
>> implement seems to much.  And claiming it is mandatory to use would be a=
 flat lie.
>>
>> Yours,
>> Joel
>>
>> On 11/12/15 7:30 PM, Thomas Narten wrote:
>>> FWIW, we need to be a bit more precise in our wording on security=20
>>> requirements. There are two important nuances:
>>>
>>> 1) Mandatory to use, meaning the protocol only works if the feature=20
>>> is enabled and works. This sort of implies that you can't *disable*=20
>>> its usage in the field.
>>>
>>> 2) Mandatory to implement, but optional to use.  If something is=20
>>> mandatory to implement, "compliant" implementations MUST support the=20
>>> feature. Whether the feature is used in practice is a separate=20
>>> matter left to the operator. The rational behind "mandatory to=20
>>> implement" is that an operator may not actually have the option to=20
>>> enable security if a product chooses not to implement an "optional" fea=
tures.
>>>
>>> draft-mglt-sfc-security-environment-req-00.txt is unclear at present=20
>>> on which of the above is intended, but one can certainly read the
>>> following:
>>>
>>>      REQ14: Communications within the SFC Data Plane MUST be
>> authenticated
>>>             in order to prevent the traffic to be modified by an attack=
er.
>>>
>>> as intending 1.
>>>
>>> For completeness, I should point that even if the final spec calls=20
>>> for 2), vendors may choose not to follow the requirement (and then=20
>>> be uncompliant), if they don't think it makes sense for their=20
>>> customers (the original IPv6 mandate to include IPsec comes to mind,=20
>>> for example). So if the WG chooses 2) - which is what I expect is=20
>>> the most reasonable course, it should pay careful attention to=20
>>> making the details something vendors think is useful, necessary and=20
>>> workable in practice. I.e, the cost of mitigation matches the threat le=
vel.
>>>
>>> Thomas
>>>
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Fri Nov 13 07:59:21 2015
Return-Path: <narten@us.ibm.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB6711AD084 for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 07:59:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.911
X-Spam-Level: 
X-Spam-Status: No, score=-6.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ECzwyEnku3F3 for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 07:59:18 -0800 (PST)
Received: from e34.co.us.ibm.com (e34.co.us.ibm.com [32.97.110.152]) (using TLSv1 with cipher CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42AF41AD080 for <sfc@ietf.org>; Fri, 13 Nov 2015 07:59:18 -0800 (PST)
Received: from localhost by e34.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <sfc@ietf.org> from <narten@us.ibm.com>; Fri, 13 Nov 2015 08:59:17 -0700
Received: from d03dlp02.boulder.ibm.com (9.17.202.178) by e34.co.us.ibm.com (192.168.1.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Fri, 13 Nov 2015 08:59:15 -0700
X-IBM-Helo: d03dlp02.boulder.ibm.com
X-IBM-MailFrom: narten@us.ibm.com
X-IBM-RcptTo: sfc@ietf.org
Received: from b03cxnp08027.gho.boulder.ibm.com (b03cxnp08027.gho.boulder.ibm.com [9.17.130.19]) by d03dlp02.boulder.ibm.com (Postfix) with ESMTP id A973C3E40047 for <sfc@ietf.org>; Fri, 13 Nov 2015 08:59:14 -0700 (MST)
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by b03cxnp08027.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id tADFxEdk56492058 for <sfc@ietf.org>; Fri, 13 Nov 2015 08:59:14 -0700
Received: from d03av05.boulder.ibm.com (localhost [127.0.0.1]) by d03av05.boulder.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id tADFxDS4026737 for <sfc@ietf.org>; Fri, 13 Nov 2015 08:59:14 -0700
Received: from cichlid.raleigh.ibm.com ([9.80.94.73]) by d03av05.boulder.ibm.com (8.14.4/8.14.4/NCO v10.0 AVin) with ESMTP id tADFxCU5026664 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 13 Nov 2015 08:59:13 -0700
Received: from cichlid.raleigh.ibm.com.us.ibm.com (localhost.localdomain [127.0.0.1]) by cichlid.raleigh.ibm.com (8.14.4/8.12.5) with ESMTP id tADFxBL7030684; Fri, 13 Nov 2015 10:59:11 -0500
Date: Fri, 13 Nov 2015 10:59:11 -0500
Message-ID: <m3twopgab4.wl-narten@us.ibm.com>
From: Thomas Narten <narten@us.ibm.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E95AD32@MBX021-W3-CA-2.exch021.domain.local>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com> <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com> <5645795E.30003@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95AD32@MBX021-W3-CA-2.exch021.domain.local>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (=?ISO-8859-4?Q?Goj=F2?=) APEL/10.8 EasyPG/1.0.0 Emacs/23.1 (x86_64-redhat-linux-gnu) MULE/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset=US-ASCII
X-TM-AS-MML: disable
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 15111315-0017-0000-0000-00000F7BF7FE
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/drWTgIcfpArhG0GHw9dz0RgzI44>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>, "Tirumaleswar Reddy \(tireddy\)" <tireddy@cisco.com>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 15:59:20 -0000

To be clear, when I used the term "operator", I meant it as a general
way to refer to anyone who is actually involved in
operation/deployment. That definitely includes enterprise deployments.

At the end of the day, those actually using/deploying the technology
carry the most weight (IMO) in terms of defining requirements.

Thomas


From nobody Fri Nov 13 08:25:25 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E17CE1AD35D for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 08:25:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SSk7Q4vaW7Xt for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 08:25:22 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3CDB1AD35A for <sfc@ietf.org>; Fri, 13 Nov 2015 08:25:21 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEB31723; Fri, 13 Nov 2015 16:25:18 +0000 (GMT)
Received: from DFWEML705-CHM.china.huawei.com (10.193.5.142) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 13 Nov 2015 16:25:17 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml705-chm ([10.193.5.142]) with mapi id 14.03.0235.001; Fri, 13 Nov 2015 08:25:12 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Ian Smith <I.Smith@F5.com>, "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2rM2As28Sjho0GEHYq6zEOcSZ6OE5iAgACUU4CACwRhgIAABVUAgABF6ACAAA1YAIAAKyag
Date: Fri, 13 Nov 2015 16:25:11 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D820E6@dfweml701-chm>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com>, <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com> <1447393658614.36390@F5.com>
In-Reply-To: <1447393658614.36390@F5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.47.129.113]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.56460EEF.02BE, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: ff765a95f5a23e8c339b03182f97bb0e
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/9OKAuFGcZL4iwrjt5hnSjUCUjXU>
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 16:25:25 -0000

+1.=20

It brings back my comments during the WG adoption for this draft. The secur=
ity requirement for SFC can be very different under different deployment sc=
enarios. In a closed deployment, e.g. all SFs and SFFs are directly attache=
d and are placed in a enclosure of the provider CO, the security threats ar=
e different from the SFs hosted in public cloud and attached to SFFs via pu=
blic internet. Therefore,  security requirement are different.=20

Linda=20

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ian Smith
Sent: Thursday, November 12, 2015 11:48 PM
To: Tirumaleswar Reddy (tireddy); Joel M. Halpern; Thomas Narten
Cc: sfc@ietf.org; Ron Parker
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14

Integrity of both the data and the origin can (and perhaps should) be provi=
ded using AH - an already standardized, and implemented mechanism for preve=
nting such threats at the network level.  It seems far-fetched that we're e=
ntertaining the idea that up-stack protocols need to re-invent AH to satisf=
y data and origin integrity requirements.

If an implementer would like to use NSH on a non-IP network, it should be e=
nough to simply say that they must provide the appropriate analog for AH, i=
f it exists and note the repercussions of using an NSH conveyance which lac=
ks data and origin integrity assurance.

If the argument is that IPSec is too <anything> to use for NSH, then that i=
s, explicitly, a statement that data and origin integrity aren't important =
enough to make the (arguably less than re-inventing AH) effort to provide t=
he security. =20

So, we could be hard line and put MUST's in that will be ignored, or we cou=
ld be adventurous and shim into the NSH specification a lesser integrity me=
chanism that will require defense and maintenance, or we could be pragmatic=
 and stipulate the use of existing technology to satisfy the concerns being=
 raised while noting that the lack of enthusiasm for those existing technol=
ogies belies a pre-existing judgement about the validity of those concerns =
in real usage.

   =20
________________________________________
From: sfc <sfc-bounces@ietf.org> on behalf of Tirumaleswar Reddy (tireddy) =
<tireddy@cisco.com>
Sent: Thursday, November 12, 2015 11:59 PM
To: Joel M. Halpern; Thomas Narten
Cc: Ron Parker; sfc@ietf.org
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14

Authenticating SFC encapsulation is required to prevent various attacks lik=
e man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc. T=
he reason the requirement is saying 'MUST' is to do our best to provide BCP=
 for NSH security, if an operator turn-off security then it's a risk he is =
willing to take.

-Tiru

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Friday, November 13, 2015 6:20 AM
> To: Thomas Narten
> Cc: sfc@ietf.org; Ron Parker
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>
> When it comes to per-packet authentication mechanisms, applied to=20
> every packet from every subscriber (which is what REQ14 asks us to=20
> implement) there is real cost in meeting such a requirement.
>
> Which is why I expressed concern about the requirement during the=20
> meeting in Yokohama.  I do no think that particular requirement has WG=20
> consensus, and I think it is an over-reach.
>
> Including Authentication as an optional capability, well specified and=20
> well integrated, makes good sense to me.  Making it mandatory to=20
> implement seems to much.  And claiming it is mandatory to use would be a =
flat lie.
>
> Yours,
> Joel
>
> On 11/12/15 7:30 PM, Thomas Narten wrote:
> > FWIW, we need to be a bit more precise in our wording on security=20
> > requirements. There are two important nuances:
> >
> > 1) Mandatory to use, meaning the protocol only works if the feature=20
> > is enabled and works. This sort of implies that you can't *disable*=20
> > its usage in the field.
> >
> > 2) Mandatory to implement, but optional to use.  If something is=20
> > mandatory to implement, "compliant" implementations MUST support the=20
> > feature. Whether the feature is used in practice is a separate=20
> > matter left to the operator. The rational behind "mandatory to=20
> > implement" is that an operator may not actually have the option to=20
> > enable security if a product chooses not to implement an "optional" fea=
tures.
> >
> > draft-mglt-sfc-security-environment-req-00.txt is unclear at present=20
> > on which of the above is intended, but one can certainly read the
> > following:
> >
> >     REQ14: Communications within the SFC Data Plane MUST be
> authenticated
> >            in order to prevent the traffic to be modified by an attacke=
r.
> >
> > as intending 1.
> >
> > For completeness, I should point that even if the final spec calls=20
> > for 2), vendors may choose not to follow the requirement (and then=20
> > be uncompliant), if they don't think it makes sense for their=20
> > customers (the original IPv6 mandate to include IPsec comes to mind,=20
> > for example). So if the WG chooses 2) - which is what I expect is=20
> > the most reasonable course, it should pay careful attention to=20
> > making the details something vendors think is useful, necessary and=20
> > workable in practice. I.e, the cost of mitigation matches the threat le=
vel.
> >
> > Thomas
> >
> >
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Nov 13 08:55:25 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B650B1B2B57 for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 08:55:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bMuG2J2KKnlb for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 08:55:16 -0800 (PST)
Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by ietfa.amsl.com (Postfix) with ESMTP id 51F281B2B3C for <sfc@ietf.org>; Fri, 13 Nov 2015 08:55:16 -0800 (PST)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga103.jf.intel.com with ESMTP; 13 Nov 2015 08:54:53 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,288,1444719600";  d="scan'208,217";a="819278455"
Received: from orsmsx107.amr.corp.intel.com ([10.22.240.5]) by orsmga001.jf.intel.com with ESMTP; 13 Nov 2015 08:54:52 -0800
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.91]) by ORSMSX107.amr.corp.intel.com ([169.254.1.197]) with mapi id 14.03.0248.002; Fri, 13 Nov 2015 08:54:52 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHWP2QPh/sCJgiEiQkT8QZOnYVJ6ZFLGAgAAi7/CAANx6AIAAFdYw
Date: Fri, 13 Nov 2015 16:54:51 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com>
In-Reply-To: <D26ACE44.1DB5B%repenno@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.138]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958581E3091EORSMSX114amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/B5ef9JFO5ZM4lKHnMNOX5YetMWE>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 16:55:21 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958581E3091EORSMSX114amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an "SF=
 can be trusted for NSH purposes"  then it can lead to some simplifications=
, I believe

I'm also ok leaving status quo as-is with a delicate balance of SF, SFF and=
 proxy roles. But I do think that making the assumption like you make, that=
 the issue of the SF being rogue or not is beyond this WG scope, can simpli=
fy our drafts. At the same time, we need to agree to the NSH SPECIFC securi=
ty aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF."

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958581E3091EORSMSX114amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Reinaldo<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an &#8220;SF can be trusted for=
 NSH purposes&#8221; &nbsp;then it can lead to some simplifications, I beli=
eve<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m also ok leav=
ing status quo as-is with a delicate balance of SF, SFF and proxy roles. Bu=
t I do think that making the assumption like you make, that the issue of th=
e SF being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [mailto:repenn=
o@cisco.com]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.&#8221;</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.el=
zur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;<a href=3D"mailto:repenno@cisco.com">repenno@=
cisco.com</a>&gt;, &quot;Jim Guichard (jguichar)&quot; &lt;<a href=3D"mailt=
o:jguichar@cisco.com">jguichar@cisco.com</a>&gt;, &quot;<a href=3D"mailto:s=
fc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc=
@ietf.org</a>&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [<a href=3D"mailto:repenno=
@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guichard (jguichar)&quot; =
&lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958581E3091EORSMSX114amrcor_--


From nobody Fri Nov 13 09:04:13 2015
Return-Path: <repenno@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68C451B2C38 for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 09:04:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Zomi9TOVdeo for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 09:04:07 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99AA61B2C23 for <sfc@ietf.org>; Fri, 13 Nov 2015 09:04:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28870; q=dns/txt; s=iport; t=1447434248; x=1448643848; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=yfvcTT2G9M3nYYGG7sWBHnUnBhfB9OwH7UN2k//JY4E=; b=Jt1Mq9bajv7AnGsKdaHPxqz5ijWadoWzT8YSQjLOszveieY7aImjw1wN +dGoS2bZBhdQ64i4RxhIhms2SJTryRkcOIdPBMCAcX4DIQA9tQIh+B963 yXcYRL4vgAJYrMvD16kba9A4K2GuEPvMauM752nLifzUXytLhfy03BWy0 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AnAgCVF0ZW/5ldJa1bA4JuTVNvBr5BAQ2BZYYQAoE7OBQBAQEBAQEBgQqENAEBAQQOGQY4BwoTAgEIEQMBAQEhBwcyFAkIAgQBEoguwSABAQEBAQEBAQEBAQEBAQEBAQEBAQEYhlSEfoRoEwEVEYQXBYgdjisBjSaBW4dlijGEYoNxAR8BAUKCER2BVnKENoEHAQEB
X-IronPort-AV: E=Sophos;i="5.20,288,1444694400";  d="scan'208,217";a="208067118"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-7.cisco.com with ESMTP; 13 Nov 2015 17:04:07 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id tADH46ut018611 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Nov 2015 17:04:06 GMT
Received: from xch-rcd-009.cisco.com (173.37.102.19) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 11:04:05 -0600
Received: from xch-rcd-009.cisco.com ([173.37.102.19]) by XCH-RCD-009.cisco.com ([173.37.102.19]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 11:04:05 -0600
From: "Reinaldo Penno (repenno)" <repenno@cisco.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVa0+xTCDtVR0Ky6Lo8W+YR+Z6YnmKA///PSICAAWeXAP//l8+AgAElYID//3x0gA==
Date: Fri, 13 Nov 2015 17:04:05 +0000
Message-ID: <D26B57EF.1DBCF%repenno@cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.32.97]
Content-Type: multipart/alternative; boundary="_000_D26B57EF1DBCFrepennociscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/GUlRPrit_RSIDSlvtLVl7EVC9dU>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2015 17:04:11 -0000

--_000_D26B57EF1DBCFrepennociscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Perfect, thank you.

From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Friday, November 13, 2015 at 8:54 AM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an =93=
SF can be trusted for NSH purposes=94  then it can lead to some simplificat=
ions, I believe

I=92m also ok leaving status quo as-is with a delicate balance of SF, SFF a=
nd proxy roles. But I do think that making the assumption like you make, th=
at the issue of the SF being rogue or not is beyond this WG scope, can simp=
lify our drafts. At the same time, we need to agree to the NSH SPECIFC secu=
rity aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.=94

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off =85]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things =96 add routes to VRFs that=
 should not be there, put interfaces into the wrong VRF, inject routes that=
 force traffic in a certain direction, the list goes on and on and on .. Wh=
at I can do from an SFC perspective is verify traffic from SF->SFF (which I=
 need for loop prevention anyway) to make sure that packets received from a=
n SF comply with the SFP policy implemented at the SFF e.g. I only expect t=
o receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I=92d like to surfa=
ce this issue and hopefully it can be easily and quickly resolved. In the d=
iscussion about Map assisted SFC Proxy, we discussed the potential of an SF=
 (e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention =
may be needed in such case to update the map (as the new 5 tuple may not be=
 there) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a =93Classifier=94 is incorporated). If not, the SFF (or the Pro=
xy) has to keep that state and VERIFY it on the outbound=85

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568


--_000_D26B57EF1DBCFrepennociscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <4A936825FA6BDA43AE272E6AFBE85061@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Perfect, thank you.</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>&quot;Elzur, Uri&quot; &lt;<a=
 href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Friday, November 13, 2015 at =
8:54 AM<br>
<span style=3D"font-weight:bold">To: </span>Reinaldo Penno &lt;<a href=3D"m=
ailto:repenno@cisco.com">repenno@cisco.com</a>&gt;, &quot;Jim Guichard (jgu=
ichar)&quot; &lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</=
a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a=
 href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>RE: [sfc] will you trust y=
our SF?<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Reinaldo<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an =93SF can be trusted for NSH=
 purposes=94 &nbsp;then it can lead to some simplifications, I believe<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I=92m also ok leaving =
status quo as-is with a delicate balance of SF, SFF and proxy roles. But I =
do think that making the assumption like you make, that the issue of the SF=
 being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.=94</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size: 12pt; fon=
t-family: 'Times New Roman', serif;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.el=
zur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;<a href=3D"mailto:repenno@cisco.com">repenno@=
cisco.com</a>&gt;, &quot;Jim Guichard (jguichar)&quot; &lt;<a href=3D"mailt=
o:jguichar@cisco.com">jguichar@cisco.com</a>&gt;, &quot;<a href=3D"mailto:s=
fc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc=
@ietf.org</a>&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [<a href=3D"mailto:repenno=
@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guichard (jguichar)&quot; =
&lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off =85]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things =96 add routes to VRFs =
that should not be there, put interfaces into the wrong VRF, inject routes =
that force traffic in a certain direction, the list goes on and on and on .=
. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I=92d like to surface this issue and hope=
fully it can be easily and quickly resolved. In the discussion about Map as=
sisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a =93Classifier=94 is incorporated). If not, th=
e SFF (or the Proxy) has to keep that state and VERIFY it on the outbound=
=85</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D26B57EF1DBCFrepennociscocom_--


From nobody Fri Nov 13 19:37:54 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ECB51B380A for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 19:37:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xn9vRTmn-vKe for <sfc@ietfa.amsl.com>; Fri, 13 Nov 2015 19:37:51 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3CAD1B3808 for <sfc@ietf.org>; Fri, 13 Nov 2015 19:37:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6726; q=dns/txt; s=iport; t=1447472270; x=1448681870; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=bqze39q3ocx0PZZAt/ZWo12JafcuRXZ54POdxO0330k=; b=IIl9vSz9dohRAZqHoGZQxxLo/pm5GjeQr/P/3JBpZAJWJd6tfJGUaTXn srigVra9P8i2Z6MQizCp4zTuvH6z494k4Bt0KrvhVBvZkBufHMkFg8DHG 1cn8Vk9Bhc32PO4Ob/QexvdstAEJnB60kIAvGwkg/9Ylg+CtyWTlkUWzx o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AsAgB/q0ZW/49dJa1egztTbwa+RQENg?= =?us-ascii?q?WQXCoVvAoE3OBQBAQEBAQEBgQqENAEBAQMBAQEBNzQLDAQCAQgRBAEBAR4JByc?= =?us-ascii?q?LFAkIAgQBDQUIiB4IDcAcAQEBAQEBAQEBAQEBAQEBAQEBAQEBFASGVIR+iTkFh?= =?us-ascii?q?UyQfAGIDYJhgjGBYodlijGIUwEfAQFChARyhDaBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,290,1444694400"; d="scan'208";a="208200353"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-8.cisco.com with ESMTP; 14 Nov 2015 03:37:50 +0000
Received: from XCH-ALN-019.cisco.com (xch-aln-019.cisco.com [173.36.7.29]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id tAE3bnwG022078 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 14 Nov 2015 03:37:50 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-ALN-019.cisco.com (173.36.7.29) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 Nov 2015 21:37:49 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Fri, 13 Nov 2015 21:37:49 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, Ian Smith <I.Smith@F5.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] SFC Security Requirements comments - REQ 14
Thread-Index: AQHRF2q/E0Hn9hQJP0yk2D/Yc/gPMZ6N8hGAgACUU4CACwRhgIAABVUA///drYCAAHWTAIAAsiKAgABTaGA=
Date: Sat, 14 Nov 2015 03:37:49 +0000
Message-ID: <e91021571bec4d0e964a3263feed4663@XCH-RCD-017.cisco.com>
References: <563AB073.1030609@cisco.com> <563AB2E0.70005@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95507B@MBX021-W3-CA-2.exch021.domain.local> <563BF143.4090600@joelhalpern.com> <m3fv0a68r8.wl-narten@us.ibm.com> <564533A4.3040104@joelhalpern.com>, <640f59e0a42b4f7b8bf98e90b8f47495@XCH-RCD-017.cisco.com> <1447393658614.36390@F5.com> <4A95BA014132FF49AE685FAB4B9F17F657D820E6@dfweml701-chm>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D820E6@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.74.48]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/93h2qxjul2jhLLG45IfcaNq9Lec>
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Nov 2015 03:37:53 -0000

> -----Original Message-----
> From: Linda Dunbar [mailto:linda.dunbar@huawei.com]
> Sent: Friday, November 13, 2015 9:55 PM
> To: Ian Smith; Tirumaleswar Reddy (tireddy); Joel M. Halpern; Thomas
> Narten
> Cc: sfc@ietf.org; Ron Parker
> Subject: RE: [sfc] SFC Security Requirements comments - REQ 14
>=20
> +1.
>=20
> It brings back my comments during the WG adoption for this draft. The
> security requirement for SFC can be very different under different
> deployment scenarios. In a closed deployment, e.g. all SFs and SFFs are
> directly attached and are placed in a enclosure of the provider CO, the
> security threats are different from the SFs hosted in public cloud and
> attached to SFFs via public internet. Therefore,  security requirement ar=
e
> different.

Yes, we can update the draft to discuss SFC deployments, threats possible a=
nd associated security requirements. That way a security requirements in on=
e deployment could be optional and in another deployment will be mandatory.=
=20

-Tiru

>=20
> Linda
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ian Smith
> Sent: Thursday, November 12, 2015 11:48 PM
> To: Tirumaleswar Reddy (tireddy); Joel M. Halpern; Thomas Narten
> Cc: sfc@ietf.org; Ron Parker
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>=20
> Integrity of both the data and the origin can (and perhaps should) be
> provided using AH - an already standardized, and implemented mechanism
> for preventing such threats at the network level.  It seems far-fetched t=
hat
> we're entertaining the idea that up-stack protocols need to re-invent AH =
to
> satisfy data and origin integrity requirements.
>=20
> If an implementer would like to use NSH on a non-IP network, it should be
> enough to simply say that they must provide the appropriate analog for AH=
,
> if it exists and note the repercussions of using an NSH conveyance which
> lacks data and origin integrity assurance.
>=20
> If the argument is that IPSec is too <anything> to use for NSH, then that=
 is,
> explicitly, a statement that data and origin integrity aren't important e=
nough
> to make the (arguably less than re-inventing AH) effort to provide the
> security.
>=20
> So, we could be hard line and put MUST's in that will be ignored, or we c=
ould
> be adventurous and shim into the NSH specification a lesser integrity
> mechanism that will require defense and maintenance, or we could be
> pragmatic and stipulate the use of existing technology to satisfy the con=
cerns
> being raised while noting that the lack of enthusiasm for those existing
> technologies belies a pre-existing judgement about the validity of those
> concerns in real usage.
>=20
>=20
> ________________________________________
> From: sfc <sfc-bounces@ietf.org> on behalf of Tirumaleswar Reddy (tireddy=
)
> <tireddy@cisco.com>
> Sent: Thursday, November 12, 2015 11:59 PM
> To: Joel M. Halpern; Thomas Narten
> Cc: Ron Parker; sfc@ietf.org
> Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
>=20
> Authenticating SFC encapsulation is required to prevent various attacks l=
ike
> man-in-middle attacker modifying NSH, attacker sending spoofed NSH etc.
> The reason the requirement is saying 'MUST' is to do our best to provide =
BCP
> for NSH security, if an operator turn-off security then it's a risk he is=
 willing to
> take.
>=20
> -Tiru
>=20
> > -----Original Message-----
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> > Sent: Friday, November 13, 2015 6:20 AM
> > To: Thomas Narten
> > Cc: sfc@ietf.org; Ron Parker
> > Subject: Re: [sfc] SFC Security Requirements comments - REQ 14
> >
> > When it comes to per-packet authentication mechanisms, applied to
> > every packet from every subscriber (which is what REQ14 asks us to
> > implement) there is real cost in meeting such a requirement.
> >
> > Which is why I expressed concern about the requirement during the
> > meeting in Yokohama.  I do no think that particular requirement has WG
> > consensus, and I think it is an over-reach.
> >
> > Including Authentication as an optional capability, well specified and
> > well integrated, makes good sense to me.  Making it mandatory to
> > implement seems to much.  And claiming it is mandatory to use would be =
a
> flat lie.
> >
> > Yours,
> > Joel
> >
> > On 11/12/15 7:30 PM, Thomas Narten wrote:
> > > FWIW, we need to be a bit more precise in our wording on security
> > > requirements. There are two important nuances:
> > >
> > > 1) Mandatory to use, meaning the protocol only works if the feature
> > > is enabled and works. This sort of implies that you can't *disable*
> > > its usage in the field.
> > >
> > > 2) Mandatory to implement, but optional to use.  If something is
> > > mandatory to implement, "compliant" implementations MUST support
> the
> > > feature. Whether the feature is used in practice is a separate
> > > matter left to the operator. The rational behind "mandatory to
> > > implement" is that an operator may not actually have the option to
> > > enable security if a product chooses not to implement an "optional"
> features.
> > >
> > > draft-mglt-sfc-security-environment-req-00.txt is unclear at present
> > > on which of the above is intended, but one can certainly read the
> > > following:
> > >
> > >     REQ14: Communications within the SFC Data Plane MUST be
> > authenticated
> > >            in order to prevent the traffic to be modified by an attac=
ker.
> > >
> > > as intending 1.
> > >
> > > For completeness, I should point that even if the final spec calls
> > > for 2), vendors may choose not to follow the requirement (and then
> > > be uncompliant), if they don't think it makes sense for their
> > > customers (the original IPv6 mandate to include IPsec comes to mind,
> > > for example). So if the WG chooses 2) - which is what I expect is
> > > the most reasonable course, it should pay careful attention to
> > > making the details something vendors think is useful, necessary and
> > > workable in practice. I.e, the cost of mitigation matches the threat =
level.
> > >
> > > Thomas
> > >
> > >
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Nov 15 15:56:52 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD4221ACE64 for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 15:56:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.187
X-Spam-Level: 
X-Spam-Status: No, score=-13.187 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WptKideEjw5J for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 15:56:47 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE5C91ACE62 for <sfc@ietf.org>; Sun, 15 Nov 2015 15:56:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4152; q=dns/txt; s=iport; t=1447631807; x=1448841407; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=CJdNDZEU8fwMdxPOjayh3uveE3SSjZDUaexN+vlVNcU=; b=a6MkoYvPgbmxiGEFoqWVw2n67gTBPYp/7Ph1VC4wCAxpuBqy9vQ/6FJV gMPuECQkgrjS/6tIrvEC2TUxVMicIADByQcyOau3SLW8j5HuyKx5PnxZX Q+GnOQs1h24C1zoPJE+gS6tW4l2YkS4gu12DKBk2gSX0GPw1WdMXY7Lgj 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AaAgC5GklW/4YNJK1bA4M7U28GvkkBD?= =?us-ascii?q?YFkFwqFbwKBJzgUAQEBAQEBAYEKhDQBAQEEAQEBNzQXBAIBCBEBAwEBAR4JByc?= =?us-ascii?q?LFAMGCAIEARIIiCYNuEsBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBItShHwmhBcFk?= =?us-ascii?q?meDYQGNH4FikhaEYoNxAR8BAUKCER2BVnKERIEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,299,1444694400"; d="scan'208";a="208489093"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-6.cisco.com with ESMTP; 15 Nov 2015 23:56:46 +0000
Received: from XCH-RCD-017.cisco.com (xch-rcd-017.cisco.com [173.37.102.27]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id tAFNukJA027943 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 15 Nov 2015 23:56:46 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-017.cisco.com (173.37.102.27) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 15 Nov 2015 17:56:46 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Sun, 15 Nov 2015 17:56:45 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y5m8AgATVnoA=
Date: Sun, 15 Nov 2015 23:56:45 +0000
Message-ID: <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com>
In-Reply-To: <5644AED2.4070000@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.19.230]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/WCvxTmacxMvfX1OML_txUv-3SYc>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Nov 2015 23:56:49 -0000

+1

There is infrastructure and there is application. The promise of SFC is to =
bring any vendor, third party or home grown SFs into the operator's network=
. This requires either the SFs (applications) be robust, certified (how?) t=
o work and maintain a secure environment or, simply make the SFFs (infrastr=
ucture) robust and secure with control plane enforcing trust between SFF an=
d SF.

It seems fine for SFs to influence the forwarding decisions at SFF via meta=
data (fully under SFF's control) but not itself make the forwarding decisio=
ns - as is allowed via the manipulation of the service index by the SFs. If=
 SFFs are the ones allowed to make forwarding decisions, why allow SFs to d=
ecrement the service index and on top of that check whether SF did the righ=
t thing - completely redundant and unnecessary and even incorrect if you th=
ink how it leads to a forwarding decision at SFF. IOW, ServicePath and Serv=
iceIndex is owned by SFF and should be opaque to SFs.

Making metadata available for SFs and SFFs, in the data plane, is NSH's val=
ue. While consuming that metadata to offer enhanced service is SFs value. S=
FFs on the other hand ensure traffic is forwarded along the right path to t=
he right SFs. Whether the SF instance is part of SFC1 or 10 or 100 or, how =
packets move from one SF to another must not be mixed with SF focus on deli=
vering service if we are to keep the architecture clean and simple.

As Uri points out, SFF clearly is infrastructure and the separation between=
 infrastructure and application is important to operators and needs to be m=
aintained.=20

Surendra.


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Thursday, November 12, 2015 7:23 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service functio=
n will not modify the service path identification, even while they expect i=
t to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in=20
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel=20
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I'd like to=20
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the=20
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the=20
> map (as the new 5 tuple may not be there) and to imply the SF is=20
> trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed=20
> the 5-tuple. It is the question of: is the SF trusted - for the sake=20
> of the 5 tuple, as well as for NSH header changes (e.g. SI decrement=20
> or even SPI change in case a "Classifier" is incorporated). If not,=20
> the SFF (or the Proxy) has to keep that state and VERIFY it on the=20
> outbound...
>
> There are opinions as if we need to allow for some SF that are fully=20
> trusted and some that are not trusted. I assume all agree the SFF is=20
> part of the infrastructure and is trusted. We need to close on this=20
> for the NSH draft too.
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Nov 15 16:03:05 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1029D1ACE7C for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 16:03:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r7Qbuh8XXHST for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 16:02:57 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53D831ACE7A for <sfc@ietf.org>; Sun, 15 Nov 2015 16:02:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15233; q=dns/txt; s=iport; t=1447632177; x=1448841777; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=HfAAkxUuKtmRj84/uAcK/4VUZOMrMT7EOczWbdbJl8A=; b=CqVDMvvlGKC+EVekQC9sEzVpdWgCUlopMTjFNO5GHym7gPpdJcLC25ut NBUis5iegx2K5UXG0GD2eVlvpulTvwB9xttQuy/NqdwUdCSMScSa1AS2v rZnU5ddRsD6e+zS0N7JK00VtaMzy3Es1BYnQ1TDk6tYZAMu9f83Iv7Pnd E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AZAgDSG0lW/4cNJK1bA4JuTVNvBr5JA?= =?us-ascii?q?Q2BZIYQAoEnOBQBAQEBAQEBgQqENAEBAQQnBj8KEwIBCBEDAQEBKAcyFAkIAgQ?= =?us-ascii?q?BEgiIJrhYAQEBAQEBAQEBAQEBAQEBAQEBAQEBGItShGgTARURhBcFiB2KSoNhA?= =?us-ascii?q?Y0fgWKSFoRig3EBHwEBQoQEcoREgQcBAQE?=
X-IronPort-AV: E=Sophos; i="5.20,299,1444694400"; d="scan'208,217"; a="44985909"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by rcdn-iport-9.cisco.com with ESMTP; 16 Nov 2015 00:02:56 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by alln-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id tAG02tCE030014 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 16 Nov 2015 00:02:55 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 15 Nov 2015 18:02:55 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Sun, 15 Nov 2015 18:02:55 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y8jcAgATWgrA=
Date: Mon, 16 Nov 2015 00:02:55 +0000
Message-ID: <d60f5b0d3ab046b89287c9576fa2a428@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com>
In-Reply-To: <D26A20AA.2D3D5%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.19.230]
Content-Type: multipart/alternative; boundary="_000_d60f5b0d3ab046b89287c9576fa2a428XCHRCD020ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/W8hTpA5609y4F3UwZAhW4BSUVSQ>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 00:03:02 -0000

--_000_d60f5b0d3ab046b89287c9576fa2a428XCHRCD020ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

This is akin to allowing any application in the data center make forwarding=
 decisions that the switches and routers then use to forward packets on!

The switch/router/fabric is better served with forwarding packets while the=
 applications do their stuff: Infrastructure vs. application. Don't mix the=
m.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Thursday, November 12, 2015 8:05 AM
To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_d60f5b0d3ab046b89287c9576fa2a428XCHRCD020ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">This is akin to allowing any application in the dat=
a center make forwarding decisions that the switches and routers then use t=
o forward packets on!<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">The switch/router/fabric is better served with forw=
arding packets while the applications do their stuff: Infrastructure vs. ap=
plication. Don&#8217;t mix them.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Thursday, November 12, 2015 8:05 AM<br>
<b>To:</b> Elzur, Uri &lt;uri.elzur@intel.com&gt;; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Elzur, Uri&quot; &lt;<a href=
=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ie=
tf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<b=
r>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi</span></a><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto=
:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_d60f5b0d3ab046b89287c9576fa2a428XCHRCD020ciscocom_--


From nobody Sun Nov 15 20:16:40 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD0B61B2BA6 for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 20:16:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.485
X-Spam-Level: 
X-Spam-Status: No, score=-14.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5JyRRQ30ydmX for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 20:16:34 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CF201B2BA4 for <sfc@ietf.org>; Sun, 15 Nov 2015 20:16:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25426; q=dns/txt; s=iport; t=1447647394; x=1448856994; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=nSAMr+yrd21gFVCHRYj5GS71JArj2kXjV+N+j7SjU2s=; b=kPXIJ7T8a/8uoqgCKWf75GCcuKV5httcEuCC2DLk78o3NG59c+CvhCvS kAxRIVDV/wDHhOTyKipVnisNdlQmAC9glr+++NcgnCfNlgqFfOUGKOcuo jtEJ3oZlfrM2p3fZkJiv2+MOqmKlTxPU/flIPlLjf38yK5euFNpyzTWoQ 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AhAgBqV0lW/5JdJa1UBwOCbk1Tbwa+S?= =?us-ascii?q?QENgWQhhW8CgSw4FAEBAQEBAQGBCoQ0AQEBBC1cAgEIEQEDAQEhBwcyFAMGCAI?= =?us-ascii?q?EARIIiCYNuHkBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBItShDA4FAwJEYQXBYgdj?= =?us-ascii?q?isBhRyCcYUSgWKSFoRig3EBHwEBQoQEcoREgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,300,1444694400";  d="scan'208,217";a="208689063"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by alln-iport-7.cisco.com with ESMTP; 16 Nov 2015 04:16:32 +0000
Received: from XCH-RCD-018.cisco.com (xch-rcd-018.cisco.com [173.37.102.28]) by rcdn-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tAG4GWra015865 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 16 Nov 2015 04:16:32 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-018.cisco.com (173.37.102.28) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 15 Nov 2015 22:16:31 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Sun, 15 Nov 2015 22:16:31 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56YYuaAgAB2+wCAAPtVgIAEN32g
Date: Mon, 16 Nov 2015 04:16:31 +0000
Message-ID: <318c1855e1d4429cbe85bb504d592e8f@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local> <7E05C330D7FD6D4FAD0728C46B89958581E2FF8B@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E2FF8B@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.19.230]
Content-Type: multipart/alternative; boundary="_000_318c1855e1d4429cbe85bb504d592e8fXCHRCD020ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/BiUGLcES_AldWfw5K7J_kV3YaWM>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 04:16:39 -0000

--_000_318c1855e1d4429cbe85bb504d592e8fXCHRCD020ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 9:38 PM
To: Ron Parker <Ron_Parker@affirmednetworks.com>; Dave Dolson <ddolson@sand=
vine.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Few comments


1)      The NSH draft right now, is careful stating that an SF can ONLY dec=
rement the SI and technically can't change the SPI and w/o a classifier can=
't change metadata ("Context Header") either. It is not easy/possible from =
an SFF point of view to tell which SF comprises a Classifier too or not. wi=
thout Control Plane indication the SFF can't tell if an SF is to be trusted=
 or not. Now, this has implications.
SK> The normative requirement that SF decrement SI is incorrect. It mixes f=
orwarding decision with service delivery! You are correct in observing cont=
rol plane involvement is required to put the environment/deployment in orde=
r and identifying the roles of the components.


2)      A Trusted SF - may be / should be  privy to the whole external pack=
et, as it may need it for further processing or simplification (e.g. in a m=
ulti tenancy scenario be able to associate dup  IP addresses with the right=
 tenant for employing diff policy/processing/SPI). As the SF is trusted, no=
 state in the SFF is required on the Tx, to ensure no abuse of the NSH (SI =
or SPI). State may still be required somewhere, for the case an internal fi=
eld has changed e.g. due to NAT which may change the classification results=
 and hence the forwarding/processing decision.
SK> Clear separation of service/application vs. infrastructure is absolutel=
y essential. This does not prevent co-location of architecture components. =
Having SFs make forwarding decisions while SFFs enforcing those decisions m=
uddles the water, whether SF is trusted or not. In multi-tenancy SF is bett=
er served with the use of metadata to identify tenant than the SPI itself a=
nd treat SPI+SI as opaque data.


3)      "Local circuit" concept (i.e. between the SFF and the SF) - becomes=
 optional. One may prefer Eth+NSH locally as an example, and use some form =
of tunneling outside on the "transport", but one may also simply extend the=
 "tunnel" to the SF too. This promotes also, the question of the vTEP for t=
he external "transport". The local vSwitch (integrated w the SFF or not) sh=
ould have that responsibility. This is a bit out of scope for the SFC WG, t=
hough.

4)      Legacy and Proxy -  the SFF is to be programmed as to what encapsul=
ation to use on the "local circuit" . A Proxy is a trusted entity and there=
fore is no different from a trusted SF as above. A legacy SF is not partici=
pating in NSH processing and so it is may be irrelevant if it is to trusted=
 or not..

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]
Sent: Thursday, November 12, 2015 6:38 AM
To: Dave Dolson; Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?

Dave,

I agree with your analysis.   What we've been thinking of as "legacy SF" (i=
.e., incapable of processing NSH) can be applied equally to untrusted SF (i=
.e., capable of processing NSH, but local policy is to not provide NSH).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_318c1855e1d4429cbe85bb504d592e8fXCHRCD020ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1130630606;
	mso-list-type:hybrid;
	mso-list-template-ids:1501169354 67698705 67698713 67698715 67698703 67698=
713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 9:38 PM<br>
<b>To:</b> Ron Parker &lt;Ron_Parker@affirmednetworks.com&gt;; Dave Dolson =
&lt;ddolson@sandvine.com&gt;; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Few comments</span></a><span style=3D"color:#1F497D"><o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">1)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">The NSH draft =
right now, is careful stating that an SF can ONLY decrement the SI and tech=
nically can&#8217;t change the SPI and w/o a classifier can&#8217;t change =
metadata (&#8220;Context Header&#8221;) either. It is not
 easy/possible from an SFF point of view to tell which SF comprises a Class=
ifier too or not. without Control Plane indication the SFF can&#8217;t tell=
 if an SF is to be trusted or not. Now, this has implications.
<o:p></o:p></span></p>
<p class=3D"MsoNormal">SK&gt; The normative requirement that SF decrement S=
I is <u>incorrect</u>. It mixes forwarding decision with service delivery! =
You are correct in observing control plane involvement is required to put t=
he environment/deployment in order and
 identifying the roles of the components.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">2)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">A Trusted SF &=
#8211; may be / should be &nbsp;privy to the whole external packet, as it m=
ay need it for further processing or simplification (e.g. in a multi tenanc=
y scenario be able to associate dup &nbsp;IP addresses
 with the right tenant for employing diff policy/processing/SPI). As the SF=
 is trusted, no state in the SFF is required on the Tx, to ensure no abuse =
of the NSH (SI or SPI). State may still be required somewhere, for the case=
 an internal field has changed e.g.
 due to NAT which may change the classification results and hence the forwa=
rding/processing decision.<o:p></o:p></span></p>
<p class=3D"MsoNormal">SK&gt; Clear separation of service/application vs. i=
nfrastructure is absolutely essential. This does not prevent co-location of=
 architecture components. Having SFs make forwarding decisions while SFFs e=
nforcing those decisions muddles the
 water, whether SF is trusted or not. In multi-tenancy SF is better served =
with the use of metadata to identify tenant than the SPI itself and treat S=
PI&#43;SI as opaque data.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">3)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">&#8220;Local c=
ircuit&#8221; concept (i.e. between the SFF and the SF) &#8211; becomes opt=
ional. One may prefer Eth&#43;NSH locally as an example, and use some form =
of tunneling outside on the &#8220;transport&#8221;, but one may also
 simply extend the &#8220;tunnel&#8221; to the SF too. This promotes also, =
the question of the vTEP for the external &#8220;transport&#8221;. The loca=
l vSwitch (integrated w the SFF or not) should have that responsibility. Th=
is is a bit out of scope for the SFC WG, though.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">4)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Legacy and Pro=
xy - &nbsp;the SFF is to be programmed as to what encapsulation to use on t=
he &#8220;local circuit&#8221; . A Proxy is a trusted entity and therefore =
is no different from a trusted SF as above. A legacy
 SF is not participating in NSH processing and so it is may be irrelevant i=
f it is to trusted or not..<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Ron Parker [<a href=3D"mailto:Ron_Parke=
r@affirmednetworks.com">mailto:Ron_Parker@affirmednetworks.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 6:38 AM<br>
<b>To:</b> Dave Dolson; Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@iet=
f.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Dave,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I agree with your anal=
ysis.&nbsp;&nbsp; What we&#8217;ve been thinking of as &#8220;legacy SF&#82=
21; (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not
 provide NSH).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp; Ron<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Dave Dolson<br>
<b>Sent:</b> Thursday, November 12, 2015 2:32 AM<br>
<b>To:</b> Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@=
intel.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [<a href=3D"mailto:sfc-bounc=
es@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_318c1855e1d4429cbe85bb504d592e8fXCHRCD020ciscocom_--


From nobody Sun Nov 15 21:59:53 2015
Return-Path: <tireddy@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D8C81B2DA2 for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 21:59:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c7s6tEm9kOVQ for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 21:59:50 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 240321B2DA5 for <sfc@ietf.org>; Sun, 15 Nov 2015 21:59:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5610; q=dns/txt; s=iport; t=1447653590; x=1448863190; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=bWdYerwiqeHiczQcHaj4AY2dkH/4wbgbGMgOhUF+m4k=; b=g1jE5Y1+3VqGjLIuBoFz6Wbt0rExpVk9SwcXGVMWmfJQi02O2nPL8+SL 4IfhkfZv0sIc0C5RbchJ55rSJWickZBi744+4yW4m2g4VTT8Kw2ncGrM9 VQUTUHzuiplXyKHvIk/9NFzPHC/TC2c9XLhGYjexggKHJJClyzZwTC0g8 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AiAgBVb0lW/5pdJa1bA4M7U28GvkkBD?= =?us-ascii?q?YFkFwqFbwKBLDgUAQEBAQEBAYEKhDQBAQEEAQEBNzQXBAIBCBEBAwEBAR4JByc?= =?us-ascii?q?LFAMGCAIEARIIiCYNuRMBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUhH6EfCaEF?= =?us-ascii?q?wWWSAGNH4FikhaEYoNxAR8BAUKCER2BVnKERIEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,300,1444694400"; d="scan'208";a="208160244"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 Nov 2015 05:59:49 +0000
Received: from XCH-RCD-017.cisco.com (xch-rcd-017.cisco.com [173.37.102.27]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id tAG5xncn021873 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 16 Nov 2015 05:59:49 GMT
Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-RCD-017.cisco.com (173.37.102.27) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 15 Nov 2015 23:59:48 -0600
Received: from xch-rcd-017.cisco.com ([173.37.102.27]) by XCH-RCD-017.cisco.com ([173.37.102.27]) with mapi id 15.00.1104.000; Sun, 15 Nov 2015 23:59:48 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHV4U41ySf1koI0WbjN6a2vAyip6eLGmA///5xKA=
Date: Mon, 16 Nov 2015 05:59:48 +0000
Message-ID: <377146c7095e46adaf77ac621a31eae4@XCH-RCD-017.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
In-Reply-To: <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.59.125]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/yF18H-5_H1gWY17nHQWhE2ANUtM>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 05:59:52 -0000

What kind of new requirements is SF not modifying service index bringing in=
to NSH security ?

If SF is trusted and it is not supposed to modify the service index but bec=
ause of a bug or bad configuration it modifies the SFP then it can be detec=
ted by SFF and rectified. But if an SF is untrusted (like an host installin=
g an malicious java script) then it can do lots of damage to the network an=
d may not always be possible to detect an infected SF.

If SF not modifying service index needs to be solved at the protocol level =
then it brings in new NSH security requirements like=20
- SF can decrypt the service path header but it cannot update and re-encryp=
t the Service Path Header.

We probably have to discuss the role of SF if it allowed to decrypt the ser=
vice path header, decrypt NSH metadata, modify NSH metadata, add NSH metada=
ta etc.

-Tiru

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar
> (smkumar)
> Sent: Monday, November 16, 2015 5:27 AM
> To: Joel M. Halpern; Elzur, Uri; sfc@ietf.org
> Subject: Re: [sfc] will you trust your SF?
>=20
> +1
>=20
> There is infrastructure and there is application. The promise of SFC is t=
o bring
> any vendor, third party or home grown SFs into the operator's network. Th=
is
> requires either the SFs (applications) be robust, certified (how?) to wor=
k and
> maintain a secure environment or, simply make the SFFs (infrastructure)
> robust and secure with control plane enforcing trust between SFF and SF.
>=20
> It seems fine for SFs to influence the forwarding decisions at SFF via
> metadata (fully under SFF's control) but not itself make the forwarding
> decisions - as is allowed via the manipulation of the service index by th=
e SFs.
> If SFFs are the ones allowed to make forwarding decisions, why allow SFs =
to
> decrement the service index and on top of that check whether SF did the
> right thing - completely redundant and unnecessary and even incorrect if =
you
> think how it leads to a forwarding decision at SFF. IOW, ServicePath and
> ServiceIndex is owned by SFF and should be opaque to SFs.
>=20
> Making metadata available for SFs and SFFs, in the data plane, is NSH's v=
alue.
> While consuming that metadata to offer enhanced service is SFs value. SFF=
s
> on the other hand ensure traffic is forwarded along the right path to the=
 right
> SFs. Whether the SF instance is part of SFC1 or 10 or 100 or, how packets
> move from one SF to another must not be mixed with SF focus on delivering
> service if we are to keep the architecture clean and simple.
>=20
> As Uri points out, SFF clearly is infrastructure and the separation betwe=
en
> infrastructure and application is important to operators and needs to be
> maintained.
>=20
> Surendra.
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Thursday, November 12, 2015 7:23 AM
> To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
> Subject: Re: [sfc] will you trust your SF?
>=20
> I have heard from concern from customers in this regard.
> For example, they have asked whether we can ensure that the service
> function will not modify the service path identification, even while they
> expect it to consume and produce metadata.
>=20
> Yours,
> Joel
>=20
> On 11/12/15 1:42 AM, Elzur, Uri wrote:
> > Hi
> >
> > Should I deduce from the no response on the list that the WG is in
> > agreement that the SF should be trusted ?
> >
> > For multiple reasons that can simplify handling the external tunnel
> > encapsulations (if present) as well as NSH header itself
> >
> > Thx
> >
> > Uri ("Oo-Ree")
> >
> > C: 949-378-7568
> >
> > *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> > *Sent:* Thursday, November 5, 2015 1:19 PM
> > *To:* sfc@ietf.org
> > *Subject:* [sfc] will you trust your SF?
> >
> > Hi
> >
> > in continuation of the discussion in the meeting today, I'd like to
> > surface this issue and hopefully it can be easily and quickly resolved.
> > In the discussion about Map assisted SFC Proxy, we discussed the
> > potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> > Control Plane intervention may be needed in such case to update the
> > map (as the new 5 tuple may not be there) and to imply the SF is
> > trusted for this operation.
> >
> > This goes beyond the question of what to do in the case the SF changed
> > the 5-tuple. It is the question of: is the SF trusted - for the sake
> > of the 5 tuple, as well as for NSH header changes (e.g. SI decrement
> > or even SPI change in case a "Classifier" is incorporated). If not,
> > the SFF (or the Proxy) has to keep that state and VERIFY it on the
> > outbound...
> >
> > There are opinions as if we need to allow for some SF that are fully
> > trusted and some that are not trusted. I assume all agree the SFF is
> > part of the infrastructure and is trusted. We need to close on this
> > for the NSH draft too.
> >
> > Thx
> >
> > Uri ("Oo-Ree")
> >
> > C: 949-378-7568
> >
> >
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Nov 15 22:26:22 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8617C1B2DE2 for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 22:26:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hJTjprFUMkv8 for <sfc@ietfa.amsl.com>; Sun, 15 Nov 2015 22:26:15 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B77DA1B2DDB for <sfc@ietf.org>; Sun, 15 Nov 2015 22:26:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=37596; q=dns/txt; s=iport; t=1447655174; x=1448864774; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=3dJ71+reyxMnUgAyXolyFExfDsSPm5ftIkn+Wnq+Mr0=; b=GGtcUgXp1kE0o4vBjwRfzAjuWCVeJ2ivy7oR8S52Y9YwbGCmLg4VAyKX zBCUR/rS3LWkrO0R/o+PoW4PjeIhZ1rjL/nf7Pbfa9ejYdQhPcIFVL2zE 6R715dh0WwkSnS+USo5lLcgGcwO2q6D4eRjdFq5yi7R1xo2XFBhaOX9xZ 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AhAgCZdklW/4kNJK1bA4JuTVNvBr5JA?= =?us-ascii?q?Q2BZIYQAoEsOBQBAQEBAQEBgQqENAEBAQQOGQY4BwoTAgEIEQECAQEBIQEGBzI?= =?us-ascii?q?UAwYIAgQBEgiIJrklAQEBAQEBAQEBAQEBAQEBAQEBAQEBGItShGgTARURhBcFi?= =?us-ascii?q?B2KSoNhAY0fgWKHZYoxhGKDcQEfAQFCghEdgVZyhESBBwEBAQ?=
X-IronPort-AV: E=Sophos; i="5.20,301,1444694400"; d="scan'208,217"; a="50647612"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by rcdn-iport-3.cisco.com with ESMTP; 16 Nov 2015 06:26:12 +0000
Received: from XCH-ALN-009.cisco.com (xch-aln-009.cisco.com [173.36.7.19]) by alln-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id tAG6QC5u015085 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 16 Nov 2015 06:26:12 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-009.cisco.com (173.36.7.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 16 Nov 2015 00:26:12 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Mon, 16 Nov 2015 00:26:11 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y8jcAgAABkICAAOF6AIAAHe8AgACfQICAA37B8A==
Date: Mon, 16 Nov 2015 06:26:11 +0000
Message-ID: <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.100.159]
Content-Type: multipart/alternative; boundary="_000_839169f654bb4759969c407a2f8a1553XCHRCD020ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/EtZpuz5UD4oVaWfZC00we2FLMy8>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 06:26:20 -0000

--_000_839169f654bb4759969c407a2f8a1553XCHRCD020ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


[Skipping to the top of this thread and repeating some things from previous=
 responses.]

Keep the separation

*        between packet forwarding and service delivery

*        between application and infrastructure

*        between metadata and forwarding data

*        etc.

Simple SFs without forwarding constraints enables SFs to focus on service d=
elivery and not service chaining and forwarding complexity, that goes into =
the SFFs. Enable SFs to consume metadata for value added service delivery a=
nd not for packet forwarding, that belongs in SFF.

Operators want the flexibility to on-board any SF into the service plane wi=
thout having to concern themselves about how that affects packet forwarding=
 in their infrastructure. Whether SF is trusted or not, SF must stay off do=
ing the SFF's job.

If ETSI/NFV is any guide, this separation in operators' view should be obvi=
ous.

NSH draft until the last couple of revisions stayed off the normative langu=
age in this regard and is misguided in specifying, for instance, the decrem=
ent of SI at SF as opposed to SFF. This tosses architecture robustness out =
the window.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, November 13, 2015 8:55 AM
To: Reinaldo Penno (repenno) <repenno@cisco.com>; Jim Guichard (jguichar) <=
jguichar@cisco.com>; sfc@ietf.org
Subject: Re: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an "SF=
 can be trusted for NSH purposes"  then it can lead to some simplifications=
, I believe
SK>

I'm also ok leaving status quo as-is with a delicate balance of SF, SFF and=
 proxy roles. But I do think that making the assumption like you make, that=
 the issue of the SF being rogue or not is beyond this WG scope, can simpli=
fy our drafts. At the same time, we need to agree to the NSH SPECIFC securi=
ty aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF."

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_839169f654bb4759969c407a2f8a1553XCHRCD020ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1549730092;
	mso-list-type:hybrid;
	mso-list-template-ids:1576017144 -2080577320 67698691 67698693 67698689 67=
698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:3;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">[Skipping to the top of this thread and repeating s=
ome things from previous responses.]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Keep the separation
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between packet forwarding and service deliv=
ery<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between application and infrastructure<o:p>=
</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between metadata and forwarding data<o:p></=
o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Simple SFs without forwarding constraints enables S=
Fs to focus on service delivery and not service chaining and forwarding com=
plexity, that goes into the SFFs. Enable SFs to
 consume metadata for value added service delivery and not for packet forwa=
rding, that belongs in SFF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Operators want the flexibility to on-board any SF i=
nto the service plane without having to concern themselves about how that a=
ffects packet forwarding in their infrastructure.
 Whether SF is trusted or not, SF must stay off doing the SFF&#8217;s job.<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">If ETSI/NFV is any guide, this separation in operat=
ors&#8217; view should be obvious.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">NSH draft until the last couple of revisions stayed=
 off the normative language in this regard and is misguided in specifying, =
for instance, the decrement of SI at SF as opposed
 to SFF. This tosses architecture robustness out the window.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.</span><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Candara&quot;,sans-serif"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Elzur, Uri<br>
<b>Sent:</b> Friday, November 13, 2015 8:55 AM<br>
<b>To:</b> Reinaldo Penno (repenno) &lt;repenno@cisco.com&gt;; Jim Guichard=
 (jguichar) &lt;jguichar@cisco.com&gt;; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Reinaldo</span></a><span style=3D"color:#1F497D"><o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an &#8220;SF can be trusted for=
 NSH purposes&#8221; &nbsp;then it can lead to some simplifications, I beli=
eve<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m also ok leav=
ing status quo as-is with a delicate balance of SF, SFF and proxy roles. Bu=
t I do think that making the assumption like you make, that the issue of th=
e SF being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.&#8221;</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a><span style=3D"color:black">&g=
t;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;</span><a href=3D"mailto:repenno@cisco.com">r=
epenno@cisco.com</a><span style=3D"color:black">&gt;, &quot;Jim Guichard (j=
guichar)&quot; &lt;</span><a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a><span style=3D"color:black">&gt;, &quot;</span><a href=3D"mailto=
:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:black">&quot;
 &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"=
color:black">&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [</span><a href=3D"mailto:=
repenno@cisco.com">mailto:repenno@cisco.com</a><span style=3D"color:black">=
]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; </span><a href=3D"mailto:sf=
c@ietf.org">sfc@ietf.org</a><span style=3D"color:black"><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Jim Guichard (jguichar)&quot; &lt;</span><a href=3D"mailto:jguichar@ci=
sco.com">jguichar@cisco.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [</span><a href=3D"mailto:sfc-bounces@ietf.org"=
>mailto:sfc-bounces@ietf.org</a><span style=3D"color:black">]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span sty=
le=3D"color:black"><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_839169f654bb4759969c407a2f8a1553XCHRCD020ciscocom_--


From nobody Mon Nov 16 06:30:25 2015
Return-Path: <Nicolas.BOUTHORS@qosmos.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E773D1B2D10 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 06:30:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level: 
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fy1V-fn4RxkD for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 06:30:21 -0800 (PST)
Received: from mc24.lon.server.colt.net (mc24.lon.server.colt.net [212.74.77.104]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAA9A1B2DCF for <sfc@ietf.org>; Mon, 16 Nov 2015 06:30:19 -0800 (PST)
Received: from mc24.lon.server.colt.net (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DE39FDE0FB for <sfc@ietf.org>; Mon, 16 Nov 2015 14:30:17 +0000 (GMT)
Received: from mx5.qosmos.com (unknown [195.68.92.48]) by mc24.lon.server.colt.net (Postfix) with ESMTP id BCBB1DE0FC for <sfc@ietf.org>; Mon, 16 Nov 2015 14:30:17 +0000 (GMT)
X-IronPort-AV: E=Sophos;i="5.20,303,1444687200";  d="scan'208";a="66313"
Received: from lilas.jungle.qosmos.com (HELO mailbox.jungle.qosmos.com) ([10.12.1.9]) by mx5.qosmos.com with ESMTP; 16 Nov 2015 15:30:17 +0100
Received: from CAROUBIER.jungle.qosmos.com ([169.254.1.31]) by LILAS.jungle.qosmos.com ([fe80::5524:2c18:b2c3:74d4%14]) with mapi id 14.03.0123.003; Mon, 16 Nov 2015 15:30:17 +0100
From: Nicolas BOUTHORS <Nicolas.BOUTHORS@qosmos.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRICWe/W7iYOvzvkWerPCgguDUlp6es3rA
Date: Mon, 16 Nov 2015 14:30:16 +0000
Message-ID: <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
In-Reply-To: <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
Accept-Language: en-US, fr-FR
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.12.1.33]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1383-8.0.0.1202-21946.000
X-TM-AS-Result: No--38.611-5.0-31-10
X-imss-scan-details: No--38.611-5.0-31-10
X-TM-AS-User-Approved-Sender: No
X-TMASE-Version: IMSVA-9.0.0.1383-8.0.1202-21946.000
X-TMASE-Result: 10--38.611200-5.000000
X-TMASE-MatchedRID: 8HTFlOrbAtGJFjt3LWJs9TrNClyHxw+dBhfhOps3jaik/fnC3B0kLXf1 /1/GrapLV5EjGC5+8momlvWk39IHWP35TYepcsojosvhIYGFuLNMMoIiUWOqAOqLmFCMpwfUzFR 0FW455zlbHAuWwt+omDGbDsxMobaDws609c2YGieVUcz8XpiS9NZKsq3DGpalWltirZ/iPP7aM2 3jg516ZfrJJdr2AI+UwgQTtJ//HL1CFB88XbRv2WA/V00XWjDtHaNQx5aVhHmIlH0NRaWl1SjO8 if2jlXGmVxFjZL34wE3goV2dh3qnp3kwzI56VEdLTHwnYOikQ3AMyYDvAr9pszx6z1tcKfOkM/p hFoxokV1PfMBcCUTgpdKjxFCLQqgkvDxRj8UmOontU+a9VQNyGKaLwu81+av64D1DRNlnW1PmRf uVx1UBBQt9tGZn+icl1BzE0uHtvrD11TnHAQ1PfHkpkyUphL9ju+GX08gELBizP0XgUsFMHlgQx adX0I3tam21FfLf5XC02yG4erylBFLmwxEoXDzjNvYZHpO13eTxSVdDMsZvIeUNQK7Qj5c68wix V5hRISepZDs951cKB6F6WRPswqhvZvOS7oWjGYdxBAG5/hkW2EF8bGZ0cKCZ5yuplze9psFHZoY TKexeIFvvK1sbCI0c3R5e4vIrRNveCKWtaLcaARH1Nr7oERdlHLUcNM85drJ2i9a4v4pV9s1CHz kaGoiEVtxaPoSt7CWzX4LUFA/pPZyTDo2IZ6UwvqOGBrge3tHUnyTldwBxIMAMccR/DM6EWXAmF VxJU6Ku8mwsdVpIof8nP92kaSy5yniAynF21eeAiCmPx4NwMFrpUbb72MU1B0Hk1Q1KyLUZxEAl FPo846HM5rqDwqtlExlQIQeRG0=
X-TMASE-SNAP-Result: 1.801202.0001-0-1-22:0,12:0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8JF0UhrHlqhOhY77g9zmkLS6f_U>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 14:30:24 -0000
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From nobody Mon Nov 16 08:55:08 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37F4A1A6F7A for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 08:55:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.486
X-Spam-Level: 
X-Spam-Status: No, score=-14.486 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VBYN0li6vk5i for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 08:55:00 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5F851A6F83 for <sfc@ietf.org>; Mon, 16 Nov 2015 08:54:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6483; q=dns/txt; s=iport; t=1447692899; x=1448902499; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=qunJhLF8P50Y9b9gYrk6ooPWnhfFJbEFWQp182euBt8=; b=LyHYjgP4WY3Ab88yedU7ZWkwBg30STv874yET8XRzybGTkyOaBKh8uwa 1Trfax4kW4vYMTTQTT6bIpGu6ArFJfVnU291UdSIZiTKd4tnntmmzBRCq Qxh/k7JGpM8QY0N5I9JTJFFeaWLUJHzQmp6G9hleP1dWxlJ3FqaVq3W0f E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AdAgCHCUpW/5tdJa1bA4M7U28GvloBD?= =?us-ascii?q?YFkFwqFbwKBQzgUAQEBAQEBAYEKhDQBAQEEAQEBNzQXBAIBCBEBAwEBAR4JByc?= =?us-ascii?q?LFAMGCAIEARIIiCYNukABAQEBAQEBAQEBAQEBAQEBAQEBAQEUBItShHwmhBcFk?= =?us-ascii?q?meDYQGNH4FikhaEYoNxAR8BAUKCER2BVnKERIEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,303,1444694400"; d="scan'208";a="47348345"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-6.cisco.com with ESMTP; 16 Nov 2015 16:54:58 +0000
Received: from XCH-RCD-018.cisco.com (xch-rcd-018.cisco.com [173.37.102.28]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id tAGGsw5X012090 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 16 Nov 2015 16:54:58 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-018.cisco.com (173.37.102.28) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 16 Nov 2015 10:54:58 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Mon, 16 Nov 2015 10:54:57 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y5m8AgATVnoCAANZdAP//pXeQ
Date: Mon, 16 Nov 2015 16:54:57 +0000
Message-ID: <f0194e98e42043728c465528e0f82e74@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com> <377146c7095e46adaf77ac621a31eae4@XCH-RCD-017.cisco.com>
In-Reply-To: <377146c7095e46adaf77ac621a31eae4@XCH-RCD-017.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.87.69]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/fV1jr2gtcDIaR6AurRX163EDdm8>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 16:55:03 -0000

You are absolutely correct, there could be bugs in SF that affect any part =
of NSH and you can't blindly forward on data that comes back from SFs. Like=
wise, there could be bugs in SFFs too but SFFs being part of infra usually =
go through much stringent scrutiny and assessment.

To make the architecture robust, SFFs should not assume the integrity of th=
e SPI+SI coming back from SFs and forward on that, let alone requiring SFs =
to modify the forwarding-data in NSH.

Surendra.


-----Original Message-----
From: Tirumaleswar Reddy (tireddy)=20
Sent: Sunday, November 15, 2015 10:00 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com>; Joel M. Halpern <jmh@joel=
halpern.com>; Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: RE: [sfc] will you trust your SF?

What kind of new requirements is SF not modifying service index bringing in=
to NSH security ?

If SF is trusted and it is not supposed to modify the service index but bec=
ause of a bug or bad configuration it modifies the SFP then it can be detec=
ted by SFF and rectified. But if an SF is untrusted (like an host installin=
g an malicious java script) then it can do lots of damage to the network an=
d may not always be possible to detect an infected SF.

If SF not modifying service index needs to be solved at the protocol level =
then it brings in new NSH security requirements like
- SF can decrypt the service path header but it cannot update and re-encryp=
t the Service Path Header.

We probably have to discuss the role of SF if it allowed to decrypt the ser=
vice path header, decrypt NSH metadata, modify NSH metadata, add NSH metada=
ta etc.

-Tiru

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar
> (smkumar)
> Sent: Monday, November 16, 2015 5:27 AM
> To: Joel M. Halpern; Elzur, Uri; sfc@ietf.org
> Subject: Re: [sfc] will you trust your SF?
>=20
> +1
>=20
> There is infrastructure and there is application. The promise of SFC=20
> is to bring any vendor, third party or home grown SFs into the=20
> operator's network. This requires either the SFs (applications) be=20
> robust, certified (how?) to work and maintain a secure environment or,=20
> simply make the SFFs (infrastructure) robust and secure with control plan=
e enforcing trust between SFF and SF.
>=20
> It seems fine for SFs to influence the forwarding decisions at SFF via=20
> metadata (fully under SFF's control) but not itself make the=20
> forwarding decisions - as is allowed via the manipulation of the service =
index by the SFs.
> If SFFs are the ones allowed to make forwarding decisions, why allow=20
> SFs to decrement the service index and on top of that check whether SF=20
> did the right thing - completely redundant and unnecessary and even=20
> incorrect if you think how it leads to a forwarding decision at SFF.=20
> IOW, ServicePath and ServiceIndex is owned by SFF and should be opaque to=
 SFs.
>=20
> Making metadata available for SFs and SFFs, in the data plane, is NSH's v=
alue.
> While consuming that metadata to offer enhanced service is SFs value.=20
> SFFs on the other hand ensure traffic is forwarded along the right=20
> path to the right SFs. Whether the SF instance is part of SFC1 or 10=20
> or 100 or, how packets move from one SF to another must not be mixed=20
> with SF focus on delivering service if we are to keep the architecture cl=
ean and simple.
>=20
> As Uri points out, SFF clearly is infrastructure and the separation=20
> between infrastructure and application is important to operators and=20
> needs to be maintained.
>=20
> Surendra.
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Thursday, November 12, 2015 7:23 AM
> To: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
> Subject: Re: [sfc] will you trust your SF?
>=20
> I have heard from concern from customers in this regard.
> For example, they have asked whether we can ensure that the service=20
> function will not modify the service path identification, even while=20
> they expect it to consume and produce metadata.
>=20
> Yours,
> Joel
>=20
> On 11/12/15 1:42 AM, Elzur, Uri wrote:
> > Hi
> >
> > Should I deduce from the no response on the list that the WG is in=20
> > agreement that the SF should be trusted ?
> >
> > For multiple reasons that can simplify handling the external tunnel=20
> > encapsulations (if present) as well as NSH header itself
> >
> > Thx
> >
> > Uri ("Oo-Ree")
> >
> > C: 949-378-7568
> >
> > *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> > *Sent:* Thursday, November 5, 2015 1:19 PM
> > *To:* sfc@ietf.org
> > *Subject:* [sfc] will you trust your SF?
> >
> > Hi
> >
> > in continuation of the discussion in the meeting today, I'd like to=20
> > surface this issue and hopefully it can be easily and quickly resolved.
> > In the discussion about Map assisted SFC Proxy, we discussed the=20
> > potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> > Control Plane intervention may be needed in such case to update the=20
> > map (as the new 5 tuple may not be there) and to imply the SF is=20
> > trusted for this operation.
> >
> > This goes beyond the question of what to do in the case the SF=20
> > changed the 5-tuple. It is the question of: is the SF trusted - for=20
> > the sake of the 5 tuple, as well as for NSH header changes (e.g. SI=20
> > decrement or even SPI change in case a "Classifier" is=20
> > incorporated). If not, the SFF (or the Proxy) has to keep that state=20
> > and VERIFY it on the outbound...
> >
> > There are opinions as if we need to allow for some SF that are fully=20
> > trusted and some that are not trusted. I assume all agree the SFF is=20
> > part of the infrastructure and is trusted. We need to close on this=20
> > for the NSH draft too.
> >
> > Thx
> >
> > Uri ("Oo-Ree")
> >
> > C: 949-378-7568
> >
> >
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Nov 16 09:05:43 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0FBE1A6FC0 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 09:05:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g-s9LitbnDoz for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 09:05:39 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEB331A6FAC for <sfc@ietf.org>; Mon, 16 Nov 2015 09:05:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9730; q=dns/txt; s=iport; t=1447693538; x=1448903138; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=B4MGkyUHuCNF9wx3JfeNRDGQKTBM8c+GDXO9MITMFyA=; b=l8WBGaWU4T0M/aUxiAkNFiUGtY8x47HQU6FGlIqDeUKE4w8thVXsOicY W3OfZVb0aEB2flspaX2jSuA7SqXgt2jcgtHTId7gcaVh2my5OtZUFGq4E PWOAkdwJ8SwMg1s12wcdzQSUp+Lx8fFWuNj5rtKWs8oeR+ugE4RUWX9oA U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AfAgBbC0pW/5FdJa1aA4M7U28GgmG7e?= =?us-ascii?q?QENgWQXCoVvAhyBJzgUAQEBAQEBAYEKhDQBAQEEAQEBCRcRIBoXBAIBBgIRAQM?= =?us-ascii?q?BAQECAiMDAgICJQsUAQIGCAIEARIIE4gTDY0FnTWQEAEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBARQEgQGKUYQpSAsmglOBRAWSZ4NhAYYmhnmBYoRAjVaEYoNxAR8BAUK?= =?us-ascii?q?CER2BVnKERIEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,303,1444694400"; d="scan'208";a="50809243"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-3.cisco.com with ESMTP; 16 Nov 2015 17:05:37 +0000
Received: from XCH-RCD-020.cisco.com (xch-rcd-020.cisco.com [173.37.102.30]) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id tAGH5bjk001215 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 16 Nov 2015 17:05:37 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-020.cisco.com (173.37.102.30) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 16 Nov 2015 11:05:37 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Mon, 16 Nov 2015 11:05:37 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Nicolas BOUTHORS <Nicolas.BOUTHORS@qosmos.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y5m8AgATVnoCAAWT8AP//xC/Q
Date: Mon, 16 Nov 2015 17:05:37 +0000
Message-ID: <5147badbd3614782b4d858864ada4c80@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com> <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com>
In-Reply-To: <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.87.69]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/GGxb49Uz4Y6g4bVR_e70bhMHVtU>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2015 17:05:42 -0000

Tmljb2xhcywNCg0KSW5saW5lLg0KDQotLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTog
Tmljb2xhcyBCT1VUSE9SUyBbbWFpbHRvOk5pY29sYXMuQk9VVEhPUlNAcW9zbW9zLmNvbV0gDQpT
ZW50OiBNb25kYXksIE5vdmVtYmVyIDE2LCAyMDE1IDY6MzAgQU0NClRvOiBTdXJlbmRyYSBLdW1h
ciAoc21rdW1hcikgPHNta3VtYXJAY2lzY28uY29tPjsgSm9lbCBNLiBIYWxwZXJuIDxqbWhAam9l
bGhhbHBlcm4uY29tPjsgRWx6dXIsIFVyaSA8dXJpLmVsenVyQGludGVsLmNvbT47IHNmY0BpZXRm
Lm9yZw0KU3ViamVjdDogUkU6IFtzZmNdIHdpbGwgeW91IHRydXN0IHlvdXIgU0Y/DQoNCkFkJ2hv
YyBTZXJ2aWNlIGNoYWluaW5nIHNvbHV0aW9ucyBhcmUgaW4gcHJvZHVjdGlvbiB0b2RheSBpbiB2
YXJpb3VzIG5ldHdvcmtzLCBzdXBwb3J0aW5nIHRyYW5zcGFyZW50IGFuZCBub24gdHJhbnNwYXJl
bnQgbWlkZGxlYm94ZXMgdGhyb3VnaCB2YXJpb3VzIHNjaGVtZXMuDQpTSz4gQWdyZWUsIHdlYXJp
bmcgbXkgdmVuZG9yIGhhdCwgSSBkbyBpdCBmb3IgZGF5IGpvYiAtIEkgYWRtaXQuDQoNCkZpcmV3
YWxscyBmb3IgZXhhbXBsZSBhcmUgaW5zZXJ0ZWQgYmV0d2VlbiBjbGllbnRzIGFuZCBzZXJ2ZXJz
IHRyYW5zcGFyZW50bHksIGFuZCBpbiBlZmZlY3QgdGhleSBhcmUgdHJlYXRlZCBhcyB0cnVzdGVk
IGVudGl0aWVzLCBhcyB0aGV5IGFyZSBnaXZlbiBhY2Nlc3MgdG8gdGhlIGNvbnRlbnQgb2YgdGhl
IHRyYWZmaWMgYWxsb3dpbmcgdGhlbSB0byB2aWV3IGFuZCBtb2RpZnkgaXQuDQpTSz4gVkxBTiBz
dGl0Y2hpbmcgaGFzIGV4aXN0ZWQgZm9yIGEgbG9uZyBsb25nIHRpbWUgYW5kIHNlcnZpY2UgY2hh
aW5pbmcgaXMgbm90IHNvbWV0aGluZyBuZXcuDQoNCldobyBkb2VzIG5vdCB0cnVzdCBoaXMgRmly
ZXdhbGwgYXBwbGlhbmNlID8NClNLPiBUaGV5IHdlcmUgY29udHJvbGxlZCBieSBwaHlzaWNhbCBj
YWJsaW5nIGFuZCBhbiBpbmxpbmUgZGVwbG95bWVudCBtb2RlbCB3aXRoIGV2ZXJ5dGhpbmcgb24g
dGhlIHVuZGVybGF5IG5ldHdvcmsuIFRoZSBkcmF3YmFja3Mgb2YgdGhlIGxlZ2FjeSBhbmQgdGhl
IHJlYXNvbiBmb3IgU0ZDIC4uLiBhcmUgaW4gcHJvYmxlbSBzdGF0ZW1lbnRzIGFuZCB1c2UgY2Fz
ZXMuDQoNCkkgdGhpbmsgd2UgY2FuIHNhZmVseSBhc3N1bWUgdGhhdCB0aGUgc2FtZSB3aWxsIGFw
cGx5IHdoZW4gTlNIIGlzIHVzZWQgZm9yIHNlcnZpY2UgY2hhaW5pbmcuDQpTSz4gUHJvYmFibHkg
bm90LiBXZSBoYXZlIGNoYW5nZWQgZXZlcnl0aGluZyAtIGV4cGxpY2l0IHN0ZWVyaW5nLCBvdmVy
bGF5IG5ldHdvcmtzLCBtZXRhZGF0YSwgZXRjLiBBbHNvLCBub3RlIHRoYXQgdGhlcmUgYXJlIG1h
bnkgZGlmZmVyZW50IHR5cGVzIG9mIGZpcmV3YWxscywgbm90IGFsbCBvZiB0aGVtIGZhbGwgaW50
byB0aGUgdHJhZGl0aW9uYWwgZGVmaW5pdGlvbi4NCg0KU28gdGhlIHF1ZXN0aW9uIEkgaGF2ZSBp
cyB0aGVuIHdoeSB3b3VsZG4ndCB3ZSB0cnVzdCBTRnMgYXMgZmFyIGFzIHJvdXRpbmcgaXMgY29u
Y2VybmVkIHdoZW4gd2Ugd2lsbCBoYXZlIHRvIHRydXN0IHRoZW0gd2l0aCB0aGUgdHJhZmZpYyBj
b250ZW50ID8NClNLPiB0aGV5IGFyZSB0d28gZGlmZmVyZW50IHBsYW5lczogVXNlciBQbGFuZSB2
cy4gRm9yd2FyZGluZyBQbGFuZS4NCg0KU3VyZW5kcmEuDQoNCk5pY29sYXMNCg0KDQotLS0tLU9y
aWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogU3VyZW5kcmEgS3VtYXIgKHNta3VtYXIpIFttYWls
dG86c21rdW1hckBjaXNjby5jb21dDQpTZW50OiBsdW5kaSAxNiBub3ZlbWJyZSAyMDE1IDAwOjU3
DQpUbzogSm9lbCBNLiBIYWxwZXJuOyBFbHp1ciwgVXJpOyBzZmNAaWV0Zi5vcmcNClN1YmplY3Q6
IFJlOiBbc2ZjXSB3aWxsIHlvdSB0cnVzdCB5b3VyIFNGPw0KDQorMQ0KDQpUaGVyZSBpcyBpbmZy
YXN0cnVjdHVyZSBhbmQgdGhlcmUgaXMgYXBwbGljYXRpb24uIFRoZSBwcm9taXNlIG9mIFNGQyBp
cyB0byBicmluZyBhbnkgdmVuZG9yLCB0aGlyZCBwYXJ0eSBvciBob21lIGdyb3duIFNGcyBpbnRv
IHRoZSBvcGVyYXRvcidzIG5ldHdvcmsuIFRoaXMgcmVxdWlyZXMgZWl0aGVyIHRoZSBTRnMgKGFw
cGxpY2F0aW9ucykgYmUgcm9idXN0LCBjZXJ0aWZpZWQgKGhvdz8pIHRvIHdvcmsgYW5kIG1haW50
YWluIGEgc2VjdXJlIGVudmlyb25tZW50IG9yLCBzaW1wbHkgbWFrZSB0aGUgU0ZGcyAoaW5mcmFz
dHJ1Y3R1cmUpIHJvYnVzdCBhbmQgc2VjdXJlIHdpdGggY29udHJvbCBwbGFuZSBlbmZvcmNpbmcg
dHJ1c3QgYmV0d2VlbiBTRkYgYW5kIFNGLg0KDQpJdCBzZWVtcyBmaW5lIGZvciBTRnMgdG8gaW5m
bHVlbmNlIHRoZSBmb3J3YXJkaW5nIGRlY2lzaW9ucyBhdCBTRkYgdmlhIG1ldGFkYXRhIChmdWxs
eSB1bmRlciBTRkYncyBjb250cm9sKSBidXQgbm90IGl0c2VsZiBtYWtlIHRoZSBmb3J3YXJkaW5n
IGRlY2lzaW9ucyAtIGFzIGlzIGFsbG93ZWQgdmlhIHRoZSBtYW5pcHVsYXRpb24gb2YgdGhlIHNl
cnZpY2UgaW5kZXggYnkgdGhlIFNGcy4gSWYgU0ZGcyBhcmUgdGhlIG9uZXMgYWxsb3dlZCB0byBt
YWtlIGZvcndhcmRpbmcgZGVjaXNpb25zLCB3aHkgYWxsb3cgU0ZzIHRvIGRlY3JlbWVudCB0aGUg
c2VydmljZSBpbmRleCBhbmQgb24gdG9wIG9mIHRoYXQgY2hlY2sgd2hldGhlciBTRiBkaWQgdGhl
IHJpZ2h0IHRoaW5nIC0gY29tcGxldGVseSByZWR1bmRhbnQgYW5kIHVubmVjZXNzYXJ5IGFuZCBl
dmVuIGluY29ycmVjdCBpZiB5b3UgdGhpbmsgaG93IGl0IGxlYWRzIHRvIGEgZm9yd2FyZGluZyBk
ZWNpc2lvbiBhdCBTRkYuIElPVywgU2VydmljZVBhdGggYW5kIFNlcnZpY2VJbmRleCBpcyBvd25l
ZCBieSBTRkYgYW5kIHNob3VsZCBiZSBvcGFxdWUgdG8gU0ZzLg0KDQpNYWtpbmcgbWV0YWRhdGEg
YXZhaWxhYmxlIGZvciBTRnMgYW5kIFNGRnMsIGluIHRoZSBkYXRhIHBsYW5lLCBpcyBOU0gncyB2
YWx1ZS4gV2hpbGUgY29uc3VtaW5nIHRoYXQgbWV0YWRhdGEgdG8gb2ZmZXIgZW5oYW5jZWQgc2Vy
dmljZSBpcyBTRnMgdmFsdWUuIFNGRnMgb24gdGhlIG90aGVyIGhhbmQgZW5zdXJlIHRyYWZmaWMg
aXMgZm9yd2FyZGVkIGFsb25nIHRoZSByaWdodCBwYXRoIHRvIHRoZSByaWdodCBTRnMuIFdoZXRo
ZXIgdGhlIFNGIGluc3RhbmNlIGlzIHBhcnQgb2YgU0ZDMSBvciAxMCBvciAxMDAgb3IsIGhvdyBw
YWNrZXRzIG1vdmUgZnJvbSBvbmUgU0YgdG8gYW5vdGhlciBtdXN0IG5vdCBiZSBtaXhlZCB3aXRo
IFNGIGZvY3VzIG9uIGRlbGl2ZXJpbmcgc2VydmljZSBpZiB3ZSBhcmUgdG8ga2VlcCB0aGUgYXJj
aGl0ZWN0dXJlIGNsZWFuIGFuZCBzaW1wbGUuDQoNCkFzIFVyaSBwb2ludHMgb3V0LCBTRkYgY2xl
YXJseSBpcyBpbmZyYXN0cnVjdHVyZSBhbmQgdGhlIHNlcGFyYXRpb24gYmV0d2VlbiBpbmZyYXN0
cnVjdHVyZSBhbmQgYXBwbGljYXRpb24gaXMgaW1wb3J0YW50IHRvIG9wZXJhdG9ycyBhbmQgbmVl
ZHMgdG8gYmUgbWFpbnRhaW5lZC4NCg0KU3VyZW5kcmEuDQoNCg0KLS0tLS1PcmlnaW5hbCBNZXNz
YWdlLS0tLS0NCkZyb206IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhh
bGYgT2YgSm9lbCBNLiBIYWxwZXJuDQpTZW50OiBUaHVyc2RheSwgTm92ZW1iZXIgMTIsIDIwMTUg
NzoyMyBBTQ0KVG86IEVsenVyLCBVcmkgPHVyaS5lbHp1ckBpbnRlbC5jb20+OyBzZmNAaWV0Zi5v
cmcNClN1YmplY3Q6IFJlOiBbc2ZjXSB3aWxsIHlvdSB0cnVzdCB5b3VyIFNGPw0KDQpJIGhhdmUg
aGVhcmQgZnJvbSBjb25jZXJuIGZyb20gY3VzdG9tZXJzIGluIHRoaXMgcmVnYXJkLg0KRm9yIGV4
YW1wbGUsIHRoZXkgaGF2ZSBhc2tlZCB3aGV0aGVyIHdlIGNhbiBlbnN1cmUgdGhhdCB0aGUgc2Vy
dmljZSBmdW5jdGlvbiB3aWxsIG5vdCBtb2RpZnkgdGhlIHNlcnZpY2UgcGF0aCBpZGVudGlmaWNh
dGlvbiwgZXZlbiB3aGlsZSB0aGV5IGV4cGVjdCBpdCB0byBjb25zdW1lIGFuZCBwcm9kdWNlIG1l
dGFkYXRhLg0KDQpZb3VycywNCkpvZWwNCg0KT24gMTEvMTIvMTUgMTo0MiBBTSwgRWx6dXIsIFVy
aSB3cm90ZToNCj4gSGkNCj4NCj4gU2hvdWxkIEkgZGVkdWNlIGZyb20gdGhlIG5vIHJlc3BvbnNl
IG9uIHRoZSBsaXN0IHRoYXQgdGhlIFdHIGlzIGluIA0KPiBhZ3JlZW1lbnQgdGhhdCB0aGUgU0Yg
c2hvdWxkIGJlIHRydXN0ZWQgPw0KPg0KPiBGb3IgbXVsdGlwbGUgcmVhc29ucyB0aGF0IGNhbiBz
aW1wbGlmeSBoYW5kbGluZyB0aGUgZXh0ZXJuYWwgdHVubmVsIA0KPiBlbmNhcHN1bGF0aW9ucyAo
aWYgcHJlc2VudCkgYXMgd2VsbCBhcyBOU0ggaGVhZGVyIGl0c2VsZg0KPg0KPiBUaHgNCj4NCj4g
VXJpICgiT28tUmVlIikNCj4NCj4gQzogOTQ5LTM3OC03NTY4DQo+DQo+ICpGcm9tOiogc2ZjIFtt
YWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddICpPbiBCZWhhbGYgT2YgKkVsenVyLCBVcmkNCj4g
KlNlbnQ6KiBUaHVyc2RheSwgTm92ZW1iZXIgNSwgMjAxNSAxOjE5IFBNDQo+ICpUbzoqIHNmY0Bp
ZXRmLm9yZw0KPiAqU3ViamVjdDoqIFtzZmNdIHdpbGwgeW91IHRydXN0IHlvdXIgU0Y/DQo+DQo+
IEhpDQo+DQo+IGluIGNvbnRpbnVhdGlvbiBvZiB0aGUgZGlzY3Vzc2lvbiBpbiB0aGUgbWVldGlu
ZyB0b2RheSwgSSdkIGxpa2UgdG8gDQo+IHN1cmZhY2UgdGhpcyBpc3N1ZSBhbmQgaG9wZWZ1bGx5
IGl0IGNhbiBiZSBlYXNpbHkgYW5kIHF1aWNrbHkgcmVzb2x2ZWQuDQo+IEluIHRoZSBkaXNjdXNz
aW9uIGFib3V0IE1hcCBhc3Npc3RlZCBTRkMgUHJveHksIHdlIGRpc2N1c3NlZCB0aGUgDQo+IHBv
dGVudGlhbCBvZiBhbiBTRiAoZS5nLiBOQVQpIHRvIGxlZ2l0aW1hdGVseSBjaGFuZ2UgdGhlIDUg
dHVwbGUuDQo+IENvbnRyb2wgUGxhbmUgaW50ZXJ2ZW50aW9uIG1heSBiZSBuZWVkZWQgaW4gc3Vj
aCBjYXNlIHRvIHVwZGF0ZSB0aGUgDQo+IG1hcCAoYXMgdGhlIG5ldyA1IHR1cGxlIG1heSBub3Qg
YmUgdGhlcmUpIGFuZCB0byBpbXBseSB0aGUgU0YgaXMgDQo+IHRydXN0ZWQgZm9yIHRoaXMgb3Bl
cmF0aW9uLg0KPg0KPiBUaGlzIGdvZXMgYmV5b25kIHRoZSBxdWVzdGlvbiBvZiB3aGF0IHRvIGRv
IGluIHRoZSBjYXNlIHRoZSBTRiBjaGFuZ2VkIA0KPiB0aGUgNS10dXBsZS4gSXQgaXMgdGhlIHF1
ZXN0aW9uIG9mOiBpcyB0aGUgU0YgdHJ1c3RlZCAtIGZvciB0aGUgc2FrZSANCj4gb2YgdGhlIDUg
dHVwbGUsIGFzIHdlbGwgYXMgZm9yIE5TSCBoZWFkZXIgY2hhbmdlcyAoZS5nLiBTSSBkZWNyZW1l
bnQgDQo+IG9yIGV2ZW4gU1BJIGNoYW5nZSBpbiBjYXNlIGEgIkNsYXNzaWZpZXIiIGlzIGluY29y
cG9yYXRlZCkuIElmIG5vdCwgDQo+IHRoZSBTRkYgKG9yIHRoZSBQcm94eSkgaGFzIHRvIGtlZXAg
dGhhdCBzdGF0ZSBhbmQgVkVSSUZZIGl0IG9uIHRoZSANCj4gb3V0Ym91bmQuLi4NCj4NCj4gVGhl
cmUgYXJlIG9waW5pb25zIGFzIGlmIHdlIG5lZWQgdG8gYWxsb3cgZm9yIHNvbWUgU0YgdGhhdCBh
cmUgZnVsbHkgDQo+IHRydXN0ZWQgYW5kIHNvbWUgdGhhdCBhcmUgbm90IHRydXN0ZWQuIEkgYXNz
dW1lIGFsbCBhZ3JlZSB0aGUgU0ZGIGlzIA0KPiBwYXJ0IG9mIHRoZSBpbmZyYXN0cnVjdHVyZSBh
bmQgaXMgdHJ1c3RlZC4gV2UgbmVlZCB0byBjbG9zZSBvbiB0aGlzIA0KPiBmb3IgdGhlIE5TSCBk
cmFmdCB0b28uDQo+DQo+IFRoeA0KPg0KPiBVcmkgKCJPby1SZWUiKQ0KPg0KPiBDOiA5NDktMzc4
LTc1NjgNCj4NCj4NCj4NCj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX18NCj4gc2ZjIG1haWxpbmcgbGlzdA0KPiBzZmNAaWV0Zi5vcmcNCj4gaHR0cHM6Ly93
d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4NCg0KX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCnNmYyBtYWlsaW5nIGxpc3QNCnNmY0BpZXRm
Lm9yZw0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCg0KDQpUaGlz
IG1lc3NhZ2UgYW5kIGFueSBhdHRhY2htZW50cyAodGhlICJtZXNzYWdlIikgYXJlIGNvbmZpZGVu
dGlhbCwgaW50ZW5kZWQgc29sZWx5IGZvciB0aGUgYWRkcmVzc2Vlcy4gSWYgeW91IGFyZSBub3Qg
dGhlIGludGVuZGVkIHJlY2lwaWVudCwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGltbWVkaWF0
ZWx5IGJ5IGUtbWFpbCBhbmQgZGVsZXRlIHRoaXMgbWVzc2FnZSBmcm9tIHlvdXIgc3lzdGVtLiBJ
biB0aGlzIGNhc2UsIHlvdSBhcmUgbm90IGF1dGhvcml6ZWQgdG8gdXNlLCBjb3B5IHRoaXMgbWVz
c2FnZSBhbmQvb3IgZGlzY2xvc2UgdGhlIGNvbnRlbnQgdG8gYW55IG90aGVyIHBlcnNvbi4gRS1t
YWlscyBhcmUgc3VzY2VwdGlibGUgdG8gYWx0ZXJhdGlvbi4gTmVpdGhlciBRb3Ntb3Mgbm9yIGFu
eSBvZiBpdHMgc3Vic2lkaWFyaWVzIG9yIGFmZmlsaWF0ZXMgc2hhbGwgYmUgbGlhYmxlIGZvciB0
aGUgbWVzc2FnZSBpZiBhbHRlcmVkLCBjaGFuZ2VkIG9yIGZhbHNpZmllZC4NCg0KQ2UgbWVzc2Fn
ZSBldCB0b3V0ZXMgc2VzIHBpw6hjZXMgam9pbnRlcyAoY2ktYXByw6hzIGxlICJtZXNzYWdlIilz
b250IGNvbmZpZGVudGllbHMgZXQgw6l0YWJsaXMgw6AgbCdpbnRlbnRpb24gZXhjbHVzaXZlIGRl
IHNlcyBkZXN0aW5hdGFpcmVzLiBTaSB2b3VzIGF2ZXogcmXDp3UgY2UgbWVzc2FnZSBwYXIgZXJy
ZXVyLCBtZXJjaSBk4oCZZW4gaW5mb3JtZXIgaW1tw6lkaWF0ZW1lbnQgc29uIMOpbWV0dGV1ciBw
YXIgY291cnJpZXIgw6lsZWN0cm9uaXF1ZSBldCBk4oCZZWZmYWNlciBjZSBtZXNzYWdlIGRlIHZv
dHJlIHN5c3TDqG1lLiBEYW5zIGNldHRlIGh5cG90aMOoc2UsIHZvdXMgbuKAmcOqdGVzIHBhcyBh
dXRvcmlzw6kgw6AgdXRpbGlzZXIsIGNvcGllciBjZSBtZXNzYWdlIGV0L291IGVuIGRpdnVsZ3Vl
ciBsZSBjb250ZW51IMOgIHVuIHRpZXJzLiBUb3V0IG1lc3NhZ2Ugw6lsZWN0cm9uaXF1ZSBlc3Qg
c3VzY2VwdGlibGUgZCdhbHTDqXJhdGlvbi4gUW9zbW9zIGV0IHNlcyBmaWxpYWxlcyBkw6ljbGlu
ZW50IHRvdXRlIHJlc3BvbnNhYmlsaXTDqSBhdSB0aXRyZSBkZSBjZSBtZXNzYWdlIHMnaWwgYSDD
qXTDqSBhbHTDqXLDqSwgZMOpZm9ybcOpIG91IGZhbHNpZmnDqS4NCg==


From nobody Mon Nov 16 19:53:42 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16F521ACE4C for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 19:53:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.485
X-Spam-Level: 
X-Spam-Status: No, score=-7.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uoq2p_BSzJCD for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 19:53:38 -0800 (PST)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by ietfa.amsl.com (Postfix) with ESMTP id 140AB1ACE4E for <sfc@ietf.org>; Mon, 16 Nov 2015 19:53:38 -0800 (PST)
Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga101.jf.intel.com with ESMTP; 16 Nov 2015 19:53:37 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,305,1444719600";  d="scan'208,217";a="687173208"
Received: from orsmsx110.amr.corp.intel.com ([10.22.240.8]) by orsmga003.jf.intel.com with ESMTP; 16 Nov 2015 19:53:38 -0800
Received: from orsmsx112.amr.corp.intel.com ([169.254.12.72]) by ORSMSX110.amr.corp.intel.com ([169.254.3.225]) with mapi id 14.03.0248.002; Mon, 16 Nov 2015 19:53:37 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRIAFNDLBS8cf45U6LskOLWf1Je56fN51A
Date: Tue, 17 Nov 2015 03:53:37 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B899585891393FE@ORSMSX112.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
In-Reply-To: <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.138]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B899585891393FEORSMSX112amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/M5_DBK8SCx7PS2QdifHMtzwQFYU>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 03:53:41 -0000

--_000_7E05C330D7FD6D4FAD0728C46B899585891393FEORSMSX112amrcor_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

Sharing some thoughts in response:

Clearly some SFs must be trusted e.g. NAT. NAT  is an example of an SF that=
 is part of the infrastructure. At the same time some SFs may only be trust=
ed to do some things but not  everything, but clearly as they have been put=
 on a Service Chain, should get  access to some network processing=1B$B!D=
=1B(B this is part of moving from physical to virtual SFs

IOW, Part of the SFC functionality/intention and architectural direction is=
 about letting SFs influence the forwarding. To be clear, it seems like, In=
fluence =1B$B!b=1B(B direct or control the forwarding.
The question is what is the right balance. To me SFs =1B$B!b=1B(B  applicat=
ions, as mentioned above. At the same time, we may want to limit the potent=
ial damage a rogue/buggy SF may have on neighbors SPI etc. This is the task=
 of the SFC Security  draft to point out the critical risks and then we see=
 what is the best course of action to address them.  Altenatively we can ag=
ree to create two classes of SF (I=1B$B!G=1B(Bm not a fan=1B$B!D=1B(B) to b=
e indicated by the Control Plane (whch can be done today too!)

As to the SI vs SPI: if the criteria prevent damage to thy neighboring chai=
n, SI decrement is not a issue. And it is an indication of the SF being alv=
e and doing some action which may be better option that he SFF blindly decr=
ementing SI


Thx
Uri (=1B$B!H=1B(BOo-Ree=1B$B!I=1B(B)
C: 949-378-7568

-----Original Message-----
From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 3:57 PM
To: Joel M. Halpern; Elzur, Uri; sfc@ietf.org
Subject: RE: [sfc] will you trust your SF?

+1

There is infrastructure and there is application. The promise of SFC is to =
bring any vendor, third party or home grown SFs into the operator's network=
. This requires either the SFs (applications) be robust, certified (how?) t=
o work and maintain a secure environment or, simply make the SFFs (infrastr=
ucture) robust and secure with control plane enforcing trust between SFF an=
d SF.

It seems fine for SFs to influence the forwarding decisions at SFF via meta=
data (fully under SFF's control) but not itself make the forwarding decisio=
ns - as is allowed via the manipulation of the service index by the SFs. If=
 SFFs are the ones allowed to make forwarding decisions, why allow SFs to d=
ecrement the service index and on top of that check whether SF did the righ=
t thing - completely redundant and unnecessary and even incorrect if you th=
ink how it leads to a forwarding decision at SFF. IOW, ServicePath and Serv=
iceIndex is owned by SFF and should be opaque to SFs.

Making metadata available for SFs and SFFs, in the data plane, is NSH's val=
ue. While consuming that metadata to offer enhanced service is SFs value. S=
FFs on the other hand ensure traffic is forwarded along the right path to t=
he right SFs. Whether the SF instance is part of SFC1 or 10 or 100 or, how =
packets move from one SF to another must not be mixed with SF focus on deli=
vering service if we are to keep the architecture clean and simple.

As Uri points out, SFF clearly is infrastructure and the separation between=
 infrastructure and application is important to operators and needs to be m=
aintained.

Surendra.


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Thursday, November 12, 2015 7:23 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

I have heard from concern from customers in this regard.
For example, they have asked whether we can ensure that the service functio=
n will not modify the service path identification, even while they expect i=
t to consume and produce metadata.

Yours,
Joel

On 11/12/15 1:42 AM, Elzur, Uri wrote:
> Hi
>
> Should I deduce from the no response on the list that the WG is in
> agreement that the SF should be trusted ?
>
> For multiple reasons that can simplify handling the external tunnel
> encapsulations (if present) as well as NSH header itself
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Elzur, Uri
> *Sent:* Thursday, November 5, 2015 1:19 PM
> *To:* sfc@ietf.org<mailto:sfc@ietf.org>
> *Subject:* [sfc] will you trust your SF?
>
> Hi
>
> in continuation of the discussion in the meeting today, I'd like to
> surface this issue and hopefully it can be easily and quickly resolved.
> In the discussion about Map assisted SFC Proxy, we discussed the
> potential of an SF (e.g. NAT) to legitimately change the 5 tuple.
> Control Plane intervention may be needed in such case to update the
> map (as the new 5 tuple may not be there) and to imply the SF is
> trusted for this operation.
>
> This goes beyond the question of what to do in the case the SF changed
> the 5-tuple. It is the question of: is the SF trusted - for the sake
> of the 5 tuple, as well as for NSH header changes (e.g. SI decrement
> or even SPI change in case a "Classifier" is incorporated). If not,
> the SFF (or the Proxy) has to keep that state and VERIFY it on the
> outbound...
>
> There are opinions as if we need to allow for some SF that are fully
> trusted and some that are not trusted. I assume all agree the SFF is
> part of the infrastructure and is trusted. We need to close on this
> for the NSH draft too.
>
> Thx
>
> Uri ("Oo-Ree")
>
> C: 949-378-7568
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org<mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_7E05C330D7FD6D4FAD0728C46B899585891393FEORSMSX112amrcor_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-2022-=
jp">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from rtf -->
<style><!-- .EmailQuote { margin-left: 1pt; padding-left: 4pt; border-left:=
 #800000 2px solid; } --></style>
</head>
<body>
<font face=3D"Times New Roman" size=3D"3"><span style=3D"font-size:12pt;"><=
a name=3D"_MailEndCompose"></a>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Shar=
ing some thoughts in response:</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Clea=
rly some SFs must be trusted e.g. NAT. NAT&nbsp; is an example of an SF tha=
t is part of the infrastructure. At the same time some SFs may only be trus=
ted to do some things but not&nbsp; <u>everything</u>,
but clearly as they have been put on a Service Chain, should get&nbsp; acce=
ss to some network processing=1B$B!D=1B(B this is part of moving from physi=
cal to virtual SFs</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">IOW,=
 Part of the SFC functionality/intention and architectural direction is abo=
ut letting SFs influence the forwarding. To be clear, it seems like, Influe=
nce =1B$B!b=1B(B direct or control the forwarding.
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">The =
question is what is the right balance. To me SFs =1B$B!b=1B(B&nbsp; applica=
tions, as mentioned above. At the same time, we may want to limit the poten=
tial damage a rogue/buggy SF may have on neighbors SPI
etc. This is the task of the SFC Security&nbsp; draft to point out the crit=
ical risks and then we see what is the best course of action to address the=
m.&nbsp; Altenatively we can agree to create two classes of SF (I=1B$B!G=1B=
(Bm not a fan=1B$B!D=1B(B) to be indicated by the Control Plane
(whch can be done today too!) </span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">As t=
o the SI vs SPI: if the criteria prevent damage to thy neighboring chain, S=
I decrement is not a issue. And it is an indication of the SF being alve an=
d doing some action which may be better
option that he SFF blindly decrementing SI</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Thx<=
/span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Uri =
(=1B$B!H=1B(BOo-Ree=1B$B!I=1B(B)</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">C: 9=
49-378-7568</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">----=
-Original Message-----<br>

From: Surendra Kumar (smkumar) [<a href=3D"mailto:smkumar@cisco.com">mailto=
:smkumar@cisco.com</a>]
<br>

Sent: Sunday, November 15, 2015 3:57 PM<br>

To: Joel M. Halpern; Elzur, Uri; sfc@ietf.org<br>

Subject: RE: [sfc] will you trust your SF?</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&#43=
;1</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Ther=
e is infrastructure and there is application. The promise of SFC is to brin=
g any vendor, third party or home grown SFs into the operator's network. Th=
is requires either the SFs (applications)
be robust, certified (how?) to work and maintain a secure environment or, s=
imply make the SFFs (infrastructure) robust and secure with control plane e=
nforcing trust between SFF and SF.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">It s=
eems fine for SFs to influence the forwarding decisions at SFF via metadata=
 (fully under SFF's control) but not itself make the forwarding decisions -=
 as is allowed via the manipulation of
the service index by the SFs. If SFFs are the ones allowed to make forwardi=
ng decisions, why allow SFs to decrement the service index and on top of th=
at check whether SF did the right thing - completely redundant and unnecess=
ary and even incorrect if you think
how it leads to a forwarding decision at SFF. IOW, ServicePath and ServiceI=
ndex is owned by SFF and should be opaque to SFs.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Maki=
ng metadata available for SFs and SFFs, in the data plane, is NSH's value. =
While consuming that metadata to offer enhanced service is SFs value. SFFs =
on the other hand ensure traffic is forwarded
along the right path to the right SFs. Whether the SF instance is part of S=
FC1 or 10 or 100 or, how packets move from one SF to another must not be mi=
xed with SF focus on delivering service if we are to keep the architecture =
clean and simple.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">As U=
ri points out, SFF clearly is infrastructure and the separation between inf=
rastructure and application is important to operators and needs to be maint=
ained. </span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Sure=
ndra.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">----=
-Original Message-----</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">From=
: sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bounces@ietf.org<=
/a>] On Behalf Of Joel M. Halpern</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Sent=
: Thursday, November 12, 2015 7:23 AM</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">To: =
Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</=
a>&gt;; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></span></font></div=
>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Subj=
ect: Re: [sfc] will you trust your SF?</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">I ha=
ve heard from concern from customers in this regard.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">For =
example, they have asked whether we can ensure that the service function wi=
ll not modify the service path identification, even while they expect it to=
 consume and produce metadata.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Your=
s,</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">Joel=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">On 1=
1/12/15 1:42 AM, Elzur, Uri wrote:</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Hi</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Should I deduce from the no response on the list that the WG is in </span>=
</font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 agreement that the SF should be trusted ?</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 For multiple reasons that can simplify handling the external tunnel </span=
></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 encapsulations (if present) as well as NSH header itself</span></font></di=
v>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Thx</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Uri (&quot;Oo-Ree&quot;)</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 C: 949-378-7568</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 *From:* sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bounces@ie=
tf.org</a>] *On Behalf Of *Elzur, Uri</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 *Sent:* Thursday, November 5, 2015 1:19 PM</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 *To:* <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 *Subject:* [sfc] will you trust your SF?</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Hi</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 in continuation of the discussion in the meeting today, I'd like to </span=
></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 surface this issue and hopefully it can be easily and quickly resolved.</s=
pan></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 In the discussion about Map assisted SFC Proxy, we discussed the </span></=
font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 potential of an SF (e.g. NAT) to legitimately change the 5 tuple.</span></=
font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Control Plane intervention may be needed in such case to update the </span=
></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 map (as the new 5 tuple may not be there) and to imply the SF is </span></=
font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 trusted for this operation.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 This goes beyond the question of what to do in the case the SF changed </s=
pan></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 the 5-tuple. It is the question of: is the SF trusted - for the sake </spa=
n></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 of the 5 tuple, as well as for NSH header changes (e.g. SI decrement </spa=
n></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 or even SPI change in case a &quot;Classifier&quot; is incorporated). If n=
ot, </span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 the SFF (or the Proxy) has to keep that state and VERIFY it on the </span>=
</font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 outbound...</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 There are opinions as if we need to allow for some SF that are fully </spa=
n></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 trusted and some that are not trusted. I assume all agree the SFF is </spa=
n></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 part of the infrastructure and is trusted. We need to close on this </span=
></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 for the NSH draft too.</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Thx</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 Uri (&quot;Oo-Ree&quot;)</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 C: 949-378-7568</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 _______________________________________________</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 sfc mailing list</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
 <a href=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org=
/mailman/listinfo/sfc</a></span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&gt;=
</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">____=
___________________________________________</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">sfc =
mailing list</span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;"><a h=
ref=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;"><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/mail=
man/listinfo/sfc</a></span></font></div>
<div><font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">&nbs=
p;</span></font></div>
</span></font>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B899585891393FEORSMSX112amrcor_--


From nobody Mon Nov 16 19:56:05 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B66211ACE58 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 19:56:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.885
X-Spam-Level: 
X-Spam-Status: No, score=-6.885 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q23K6-tgl3Q4 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 19:55:59 -0800 (PST)
Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by ietfa.amsl.com (Postfix) with ESMTP id D7B6D1ACE57 for <sfc@ietf.org>; Mon, 16 Nov 2015 19:55:59 -0800 (PST)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP; 16 Nov 2015 19:55:59 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,305,1444719600";  d="scan'208,217";a="852579358"
Received: from orsmsx104.amr.corp.intel.com ([10.22.225.131]) by fmsmga002.fm.intel.com with ESMTP; 16 Nov 2015 19:55:55 -0800
Received: from orsmsx111.amr.corp.intel.com (10.22.240.12) by ORSMSX104.amr.corp.intel.com (10.22.225.131) with Microsoft SMTP Server (TLS) id 14.3.248.2; Mon, 16 Nov 2015 19:55:55 -0800
Received: from orsmsx112.amr.corp.intel.com ([169.254.12.72]) by ORSMSX111.amr.corp.intel.com ([169.254.11.251]) with mapi id 14.03.0248.002; Mon, 16 Nov 2015 19:55:55 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRxVdX2Lz3depkuRzRNYC1xZY56Y+1sAgAAwvcCABWrwgIABBflA
Date: Tue, 17 Nov 2015 03:55:54 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589139419@ORSMSX112.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <E8355113905631478EFF04F5AA706E9830D9BE96@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E958EA0@MBX021-W3-CA-2.exch021.domain.local> <7E05C330D7FD6D4FAD0728C46B89958581E2FF8B@ORSMSX114.amr.corp.intel.com> <318c1855e1d4429cbe85bb504d592e8f@XCH-RCD-020.cisco.com>
In-Reply-To: <318c1855e1d4429cbe85bb504d592e8f@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.138]
Content-Type: multipart/alternative; boundary="_000_7E05C330D7FD6D4FAD0728C46B89958589139419ORSMSX112amrcor_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HcmI2k5E9VytsIpXx1y3m62FrpI>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 03:56:04 -0000

--_000_7E05C330D7FD6D4FAD0728C46B89958589139419ORSMSX112amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Surendra

Pls see [UE] below

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 8:17 PM
To: Elzur, Uri; Ron Parker; Dave Dolson; sfc@ietf.org
Subject: RE: [sfc] will you trust your SF?


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 9:38 PM
To: Ron Parker <Ron_Parker@affirmednetworks.com<mailto:Ron_Parker@affirmedn=
etworks.com>>; Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.co=
m>>; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Few comments


1)      The NSH draft right now, is careful stating that an SF can ONLY dec=
rement the SI and technically can't change the SPI and w/o a classifier can=
't change metadata ("Context Header") either. It is not easy/possible from =
an SFF point of view to tell which SF comprises a Classifier too or not. wi=
thout Control Plane indication the SFF can't tell if an SF is to be trusted=
 or not. Now, this has implications.
SK> The normative requirement that SF decrement SI is incorrect. It mixes f=
orwarding decision with service delivery! You are correct in observing cont=
rol plane involvement is required to put the environment/deployment in orde=
r and identifying the roles of the components.
[UE] replied in the other thread


2)      A Trusted SF - may be / should be  privy to the whole external pack=
et, as it may need it for further processing or simplification (e.g. in a m=
ulti tenancy scenario be able to associate dup  IP addresses with the right=
 tenant for employing diff policy/processing/SPI). As the SF is trusted, no=
 state in the SFF is required on the Tx, to ensure no abuse of the NSH (SI =
or SPI). State may still be required somewhere, for the case an internal fi=
eld has changed e.g. due to NAT which may change the classification results=
 and hence the forwarding/processing decision.
SK> Clear separation of service/application vs. infrastructure is absolutel=
y essential. This does not prevent co-location of architecture components. =
Having SFs make forwarding decisions while SFFs enforcing those decisions m=
uddles the water, whether SF is trusted or not. In multi-tenancy SF is bett=
er served with the use of metadata to identify tenant than the SPI itself a=
nd treat SPI+SI as opaque data.
[UE] SF are not making forwarding decisions, however they can influence the=
m. They can also alter the packet content e.g NAT and this is desired


3)      "Local circuit" concept (i.e. between the SFF and the SF) - becomes=
 optional. One may prefer Eth+NSH locally as an example, and use some form =
of tunneling outside on the "transport", but one may also simply extend the=
 "tunnel" to the SF too. This promotes also, the question of the vTEP for t=
he external "transport". The local vSwitch (integrated w the SFF or not) sh=
ould have that responsibility. This is a bit out of scope for the SFC WG, t=
hough.

4)      Legacy and Proxy -  the SFF is to be programmed as to what encapsul=
ation to use on the "local circuit" . A Proxy is a trusted entity and there=
fore is no different from a trusted SF as above. A legacy SF is not partici=
pating in NSH processing and so it is may be irrelevant if it is to trusted=
 or not..

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]
Sent: Thursday, November 12, 2015 6:38 AM
To: Dave Dolson; Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?

Dave,

I agree with your analysis.   What we've been thinking of as "legacy SF" (i=
.e., incapable of processing NSH) can be applied equally to untrusted SF (i=
.e., capable of processing NSH, but local policy is to not provide NSH).

   Ron


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Thursday, November 12, 2015 2:32 AM
To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; sfc@ietf.=
org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Uri,

I think the consequences of not trusting the SF are that it be treated like=
 a "legacy SF" device in the sense that it not be sent packets with NSH hea=
ders.
Trusting the SF with NSH headers and metadata gives it the ability to move =
packets to any chain, perhaps crossing tenant boundaries.

So therefore, SFs using NSH must be trusted. The architecture supports the =
SF-Proxy approach if operators have untrusted SFs.

In my opinion, the issues of so-called "legacy" SFC are therefore elevated =
in importance. We should be discussing "legacy and untrusted SF".
E.g., in https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06
could be entitled, "SFC Header Mapping for Legacy SF and Untrusted SF"

-Dave


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 12, 2015 3:42 PM
To: Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958589139419ORSMSX112amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle28
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1130630606;
	mso-list-type:hybrid;
	mso-list-template-ids:1501169354 67698705 67698713 67698715 67698703 67698=
713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Hi Surendra<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Pls see [UE] below<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Surendra Kumar (smkumar) [mailto:smkuma=
r@cisco.com]
<br>
<b>Sent:</b> Sunday, November 15, 2015 8:17 PM<br>
<b>To:</b> Elzur, Uri; Ron Parker; Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 9:38 PM<br>
<b>To:</b> Ron Parker &lt;<a href=3D"mailto:Ron_Parker@affirmednetworks.com=
">Ron_Parker@affirmednetworks.com</a>&gt;; Dave Dolson &lt;<a href=3D"mailt=
o:ddolson@sandvine.com">ddolson@sandvine.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Few comments<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">1)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">The NSH draft =
right now, is careful stating that an SF can ONLY decrement the SI and tech=
nically can&#8217;t change the SPI and w/o a classifier can&#8217;t change =
metadata (&#8220;Context Header&#8221;) either. It is not
 easy/possible from an SFF point of view to tell which SF comprises a Class=
ifier too or not. without Control Plane indication the SFF can&#8217;t tell=
 if an SF is to be trusted or not. Now, this has implications.
<o:p></o:p></span></p>
<p class=3D"MsoNormal">SK&gt; The normative requirement that SF decrement S=
I is <u>incorrect</u>. It mixes forwarding decision with service delivery! =
You are correct in observing control plane involvement is required to put t=
he environment/deployment in order and
 identifying the roles of the components.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#1F497D">[UE] replied in the other thread<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">2)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">A Trusted SF &=
#8211; may be / should be &nbsp;privy to the whole external packet, as it m=
ay need it for further processing or simplification (e.g. in a multi tenanc=
y scenario be able to associate dup &nbsp;IP addresses
 with the right tenant for employing diff policy/processing/SPI). As the SF=
 is trusted, no state in the SFF is required on the Tx, to ensure no abuse =
of the NSH (SI or SPI). State may still be required somewhere, for the case=
 an internal field has changed e.g.
 due to NAT which may change the classification results and hence the forwa=
rding/processing decision.<o:p></o:p></span></p>
<p class=3D"MsoNormal">SK&gt; Clear separation of service/application vs. i=
nfrastructure is absolutely essential. This does not prevent co-location of=
 architecture components. Having SFs make forwarding decisions while SFFs e=
nforcing those decisions muddles the
 water, whether SF is trusted or not. In multi-tenancy SF is better served =
with the use of metadata to identify tenant than the SPI itself and treat S=
PI&#43;SI as opaque data.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#1F497D">[UE] SF are not making forwarding dec=
isions, however they can influence them. They can also alter the packet con=
tent e.g NAT and this is desired<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">3)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">&#8220;Local c=
ircuit&#8221; concept (i.e. between the SFF and the SF) &#8211; becomes opt=
ional. One may prefer Eth&#43;NSH locally as an example, and use some form =
of tunneling outside on the &#8220;transport&#8221;, but one may also
 simply extend the &#8220;tunnel&#8221; to the SF too. This promotes also, =
the question of the vTEP for the external &#8220;transport&#8221;. The loca=
l vSwitch (integrated w the SFF or not) should have that responsibility. Th=
is is a bit out of scope for the SFC WG, though.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">4)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Legacy and Pro=
xy - &nbsp;the SFF is to be programmed as to what encapsulation to use on t=
he &#8220;local circuit&#8221; . A Proxy is a trusted entity and therefore =
is no different from a trusted SF as above. A legacy
 SF is not participating in NSH processing and so it is may be irrelevant i=
f it is to trusted or not..<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Ron Parker [<a href=3D"mailto:Ron_Parke=
r@affirmednetworks.com">mailto:Ron_Parker@affirmednetworks.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 6:38 AM<br>
<b>To:</b> Dave Dolson; Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@iet=
f.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Dave,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I agree with your anal=
ysis.&nbsp;&nbsp; What we&#8217;ve been thinking of as &#8220;legacy SF&#82=
21; (i.e., incapable of processing NSH) can be applied equally to untrusted=
 SF (i.e., capable of processing NSH, but local policy is to not
 provide NSH).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp; Ron<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Dave Dolson<br>
<b>Sent:</b> Thursday, November 12, 2015 2:32 AM<br>
<b>To:</b> Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@=
intel.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the consequenc=
es of not trusting the SF are that it be treated like a &#8220;legacy SF&#8=
221; device in the sense that it not be sent packets with NSH headers.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Trusting the SF with N=
SH headers and metadata gives it the ability to move packets to any chain, =
perhaps crossing tenant boundaries.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">So therefore, SFs usin=
g NSH must be trusted. The architecture supports the SF-Proxy approach if o=
perators have untrusted SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In my opinion, the iss=
ues of so-called &#8220;legacy&#8221; SFC are therefore elevated in importa=
nce. We should be discussing &#8220;legacy and untrusted SF&#8221;.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">E.g., in <a href=3D"ht=
tps://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-06</a><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">could be entitled, &#8=
220;SFC Header Mapping for Legacy SF and Untrusted SF&#8221;<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [<a href=3D"mailto:sfc-bounc=
es@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 12, 2015 3:42 PM<br>
<b>To:</b> Elzur, Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi <o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958589139419ORSMSX112amrcor_--


From nobody Mon Nov 16 20:01:08 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98BE01ACE69 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 20:01:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.485
X-Spam-Level: 
X-Spam-Status: No, score=-7.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TEDTH5J-AfnS for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 20:01:00 -0800 (PST)
Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by ietfa.amsl.com (Postfix) with ESMTP id 98E6A1ACE66 for <sfc@ietf.org>; Mon, 16 Nov 2015 20:01:00 -0800 (PST)
Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga103.fm.intel.com with ESMTP; 16 Nov 2015 20:01:00 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,305,1444719600";  d="png'150?scan'150,208,217,150";a="852391443"
Received: from orsmsx107.amr.corp.intel.com ([10.22.240.5]) by orsmga002.jf.intel.com with ESMTP; 16 Nov 2015 20:01:01 -0800
Received: from orsmsx111.amr.corp.intel.com (10.22.240.12) by ORSMSX107.amr.corp.intel.com (10.22.240.5) with Microsoft SMTP Server (TLS) id 14.3.248.2; Mon, 16 Nov 2015 20:00:59 -0800
Received: from orsmsx112.amr.corp.intel.com ([169.254.12.72]) by ORSMSX111.amr.corp.intel.com ([169.254.11.251]) with mapi id 14.03.0248.002; Mon, 16 Nov 2015 20:00:59 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHWP2QPh/sCJgiEiQkT8QZOnYVJ6ZFLGAgAAi7/CAANx6AIAAFdYwgASQw4CAAOOFUA==
Date: Tue, 17 Nov 2015 04:00:58 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589139434@ORSMSX112.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com> <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com>
In-Reply-To: <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.138]
Content-Type: multipart/related; boundary="_004_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_"; type="multipart/alternative"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/40K6aaSoFiOOt4UmfL7VjfLeucM>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 04:01:06 -0000

--_004_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_
Content-Type: multipart/alternative;
	boundary="_000_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_"

--_000_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Draft-quinn-sfc-nsh-07 form February of this year has

[cid:image001.png@01D120A9.81B2DE00]

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 10:26 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org
Subject: RE: [sfc] will you trust your SF?


[Skipping to the top of this thread and repeating some things from previous=
 responses.]

Keep the separation

*         between packet forwarding and service delivery

*         between application and infrastructure

*         between metadata and forwarding data

*         etc.

Simple SFs without forwarding constraints enables SFs to focus on service d=
elivery and not service chaining and forwarding complexity, that goes into =
the SFFs. Enable SFs to consume metadata for value added service delivery a=
nd not for packet forwarding, that belongs in SFF.

Operators want the flexibility to on-board any SF into the service plane wi=
thout having to concern themselves about how that affects packet forwarding=
 in their infrastructure. Whether SF is trusted or not, SF must stay off do=
ing the SFF's job.

If ETSI/NFV is any guide, this separation in operators' view should be obvi=
ous.

NSH draft until the last couple of revisions stayed off the normative langu=
age in this regard and is misguided in specifying, for instance, the decrem=
ent of SI at SF as opposed to SFF. This tosses architecture robustness out =
the window.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, November 13, 2015 8:55 AM
To: Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>;=
 Jim Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an "SF=
 can be trusted for NSH purposes"  then it can lead to some simplifications=
, I believe
SK>

I'm also ok leaving status quo as-is with a delicate balance of SF, SFF and=
 proxy roles. But I do think that making the assumption like you make, that=
 the issue of the SF being rogue or not is beyond this WG scope, can simpli=
fy our drafts. At the same time, we need to agree to the NSH SPECIFC securi=
ty aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF."

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1549730092;
	mso-list-type:hybrid;
	mso-list-template-ids:1576017144 -2080577320 67698691 67698693 67698689 67=
698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:3;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Draft-quinn-sfc-nsh-07 form February of this year has
<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img width=3D"823" hei=
ght=3D"74" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D120A9.81B2DE00=
"></span><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Surendra Kumar (smkumar) [mailto:smkuma=
r@cisco.com]
<br>
<b>Sent:</b> Sunday, November 15, 2015 10:26 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); s=
fc@ietf.org<br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">[Skipping to the top of this thread and repeating s=
ome things from previous responses.]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Keep the separation
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between packet forwarding and service deliv=
ery<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between application and infrastructure<o:p>=
</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between metadata and forwarding data<o:p></=
o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Simple SFs without forwarding constraints enables S=
Fs to focus on service delivery and not service chaining and forwarding com=
plexity, that goes into the SFFs. Enable SFs to
 consume metadata for value added service delivery and not for packet forwa=
rding, that belongs in SFF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Operators want the flexibility to on-board any SF i=
nto the service plane without having to concern themselves about how that a=
ffects packet forwarding in their infrastructure.
 Whether SF is trusted or not, SF must stay off doing the SFF&#8217;s job.<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">If ETSI/NFV is any guide, this separation in operat=
ors&#8217; view should be obvious.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">NSH draft until the last couple of revisions stayed=
 off the normative language in this regard and is misguided in specifying, =
for instance, the decrement of SI at SF as opposed
 to SFF. This tosses architecture robustness out the window.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Friday, November 13, 2015 8:55 AM<br>
<b>To:</b> Reinaldo Penno (repenno) &lt;<a href=3D"mailto:repenno@cisco.com=
">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;<a href=3D"mailto:=
jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Reinaldo<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an &#8220;SF can be trusted for=
 NSH purposes&#8221; &nbsp;then it can lead to some simplifications, I beli=
eve<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m also ok leav=
ing status quo as-is with a delicate balance of SF, SFF and proxy roles. Bu=
t I do think that making the assumption like you make, that the issue of th=
e SF being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.&#8221;</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a><span style=3D"color:black">&g=
t;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;</span><a href=3D"mailto:repenno@cisco.com">r=
epenno@cisco.com</a><span style=3D"color:black">&gt;, &quot;Jim Guichard (j=
guichar)&quot; &lt;</span><a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a><span style=3D"color:black">&gt;, &quot;</span><a href=3D"mailto=
:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:black">&quot;
 &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"=
color:black">&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [</span><a href=3D"mailto:=
repenno@cisco.com">mailto:repenno@cisco.com</a><span style=3D"color:black">=
]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; </span><a href=3D"mailto:sf=
c@ietf.org">sfc@ietf.org</a><span style=3D"color:black"><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Jim Guichard (jguichar)&quot; &lt;</span><a href=3D"mailto:jguichar@ci=
sco.com">jguichar@cisco.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [</span><a href=3D"mailto:sfc-bounces@ietf.org"=
>mailto:sfc-bounces@ietf.org</a><span style=3D"color:black">]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span sty=
le=3D"color:black"><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_--

--_004_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=43475;
	creation-date="Tue, 17 Nov 2015 04:00:57 GMT";
	modification-date="Tue, 17 Nov 2015 04:00:57 GMT"
Content-ID: <image001.png@01D120A9.81B2DE00>
Content-Transfer-Encoding: base64
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--_004_7E05C330D7FD6D4FAD0728C46B89958589139434ORSMSX112amrcor_--


From nobody Mon Nov 16 20:05:01 2015
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1B101ACE86 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 20:04:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.486
X-Spam-Level: 
X-Spam-Status: No, score=-7.486 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YO4_6ChCcnC3 for <sfc@ietfa.amsl.com>; Mon, 16 Nov 2015 20:04:57 -0800 (PST)
Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by ietfa.amsl.com (Postfix) with ESMTP id B8D8D1ACE84 for <sfc@ietf.org>; Mon, 16 Nov 2015 20:04:57 -0800 (PST)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP; 16 Nov 2015 20:04:58 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.20,306,1444719600"; d="scan'208";a="852583930"
Received: from orsmsx104.amr.corp.intel.com ([10.22.225.131]) by fmsmga002.fm.intel.com with ESMTP; 16 Nov 2015 20:04:46 -0800
Received: from orsmsx154.amr.corp.intel.com (10.22.226.12) by ORSMSX104.amr.corp.intel.com (10.22.225.131) with Microsoft SMTP Server (TLS) id 14.3.248.2; Mon, 16 Nov 2015 20:04:45 -0800
Received: from orsmsx112.amr.corp.intel.com ([169.254.12.72]) by ORSMSX154.amr.corp.intel.com ([169.254.11.165]) with mapi id 14.03.0248.002; Mon, 16 Nov 2015 20:04:45 -0800
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Nicolas BOUTHORS <Nicolas.BOUTHORS@qosmos.com>, "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRIAFNDLBS8cf45U6LskOLWf1Je56fPLgAgABctdA=
Date: Tue, 17 Nov 2015 04:04:45 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589139456@ORSMSX112.amr.corp.intel.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com> <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com>
In-Reply-To: <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.22.254.138]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/lprfvZDxSFOys7CMXytiv2Xgk5U>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 04:04:59 -0000
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From nobody Tue Nov 17 00:51:50 2015
Return-Path: <Nicolas.BOUTHORS@qosmos.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C00D61B2CD0 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 00:51:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gddHrtkKRgm2 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 00:51:43 -0800 (PST)
Received: from mc28.lon.server.colt.net (mc28.lon.server.colt.net [212.74.77.108]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A25F81B2CCE for <sfc@ietf.org>; Tue, 17 Nov 2015 00:51:43 -0800 (PST)
Received: from mc28.lon.server.colt.net (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 00BD7F00E6 for <sfc@ietf.org>; Tue, 17 Nov 2015 08:51:12 +0000 (GMT)
Received: from mx5.qosmos.com (unknown [195.68.92.48]) by mc28.lon.server.colt.net (Postfix) with ESMTP id CFDD4F00DA for <sfc@ietf.org>; Tue, 17 Nov 2015 08:51:11 +0000 (GMT)
X-IronPort-AV: E=Sophos;i="5.20,307,1444687200";  d="scan'208";a="67585"
Received: from lilas.jungle.qosmos.com (HELO mailbox.jungle.qosmos.com) ([10.12.1.9]) by mx5.qosmos.com with ESMTP; 17 Nov 2015 09:51:11 +0100
Received: from CAROUBIER.jungle.qosmos.com ([169.254.1.31]) by LILAS.jungle.qosmos.com ([fe80::5524:2c18:b2c3:74d4%14]) with mapi id 14.03.0123.003; Tue, 17 Nov 2015 09:51:10 +0100
From: Nicolas BOUTHORS <Nicolas.BOUTHORS@qosmos.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRICWe/W7iYOvzvkWerPCgguDUlp6es3rAgADVpoCAAFH6gA==
Date: Tue, 17 Nov 2015 08:51:10 +0000
Message-ID: <76B41B8FACE1514795D30EC137FF391D8B3EB0@CAROUBIER.jungle.qosmos.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com> <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com> <7E05C330D7FD6D4FAD0728C46B89958589139456@ORSMSX112.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958589139456@ORSMSX112.amr.corp.intel.com>
Accept-Language: en-US, fr-FR
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.12.1.33]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1383-8.0.0.1202-21946.006
X-TM-AS-Result: No--32.223-5.0-31-10
X-imss-scan-details: No--32.223-5.0-31-10
X-TM-AS-User-Approved-Sender: No
X-TMASE-Version: IMSVA-9.0.0.1383-8.0.1202-21946.006
X-TMASE-Result: 10--32.222600-5.000000
X-TMASE-MatchedRID: IeZYkn8zfFqQ4R94VvPFuYWs+rMQjb4f1kqyrcMalqUhvFjBsLEZNPNV fm8Bd/bb60NpvSJliZ6yqup5qwJK8OsY/baZcXtaU+OjsPhIWDhStCTjSVI9jut/3xeV9XtnLVC QfSxiPca7v63adVEhhIR6ktsj4/uo3JnJK2Eeha9VnniKh7YTC7e5OgQzJQdYWyzYcUZOnastiY Zvl2ghihfDSmuAMQpg4SKPK6qFpYq1nd0IY98QVcOD5TU1KZy5H4CR7I+OfAhcKZwALwMGs1XJO 5JQvrlB8e5Od6LjZg+IL94gkfHKjgQdrmJPSazDgFd2TFaysMjNUTeBBPKQKiuq7DJrYeUmNf6y 58BlSM9eCZO/i8ReLrMxMjgM+Psnu9Vn7JGbxC6iy+EhgYW4s0wygiJRY6oA6ouYUIynB9TAktg DJtZ0Av0V7H8FKmQSELXk/LkjhRXaGR4xaWbezQI0yP/uoH+DHaNQx5aVhHmIlH0NRaWl1SjO8i f2jlXGmVxFjZL34wE3goV2dh3qnkqkgzox/CQaqVdeuk7LerQIgWIk/VdnUniUxMMGILzdHnKiP 0fP4zro/+wYEcqmrC3eYabOU2IseS5Pn4nSfgTzh2yKdnl7WNL5WpA78Ye8BoA1fKObuhOqYre3 JMS6hc3DBOwul+3L5T1jmXZ6BXyO1b2QizZxJ54RyjTmGyy+f6/Md8Lb2l9q4coTktrGX0zvHoP GMGRZeOZ2vlB/wXHOJIQ2+HWHEze/ZRYxF8bdRsqQuQlRTh8hotH7bEpEMkklF5L0lQHcBsTxCa cZZxUXOB12/JwCNIJET88x1AvDBL4/RE3F3weeAiCmPx4NwMFrpUbb72MU1B0Hk1Q1KyKrF5UpO UNpcI2j49Ftap9EkGUtrowrXLg=
X-TMASE-SNAP-Result: 1.801202.0001-0-1-22:0,12:0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0FBRFchqXadVBGLNrO6Us_B5tmQ>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 08:51:48 -0000

SGVsbG8gVXJpDQoNCkkgYWdyZWUgd2l0aCB0aGlzIHByb3Bvc2FsLiAgSXQgaXMgdGhlIGxvZ2lj
YWwgY29uY2x1c2lvbiBJIHJlYWNoIGZyb20gdGhlIG5vdGUgSSBtYWRlLg0KDQorMSBhbHNvIG9u
IHlvdXIgb3RoZXIgcG9pbnQgc3RhdGluZyB0aGF0IHRoZSBTSSBtb2RpZmljYXRpb24gaXMgYW4g
aW5kaWNhdGlvbiBmb3IgdGhlIFNGRiB0aGF0IHRoZSBTRiBpcyBhY3RpdmUuDQoNCg0KDQpGcm9t
ICBhIHNlY3VyaXR5IHBvaW50IG9mIHZpZXcgdGhlIHBvaW50cyB0aGF0IEkgY2FuIHNlZSB0aGF0
IHNob3VsZCBiZSB0YWNrbGVkOg0KDQotIENvbnRyb2wgaWYgU0ZzIGluIGEgY2hhaW4gY2FuIGJl
IGRlZGljYXRlZCB0byBhIGNoYWluIC8gdGVuYW50IG9yIGNhbiBwcm9jZXNzIHRyYWZmaWMgIGZy
b20gbXVsdGlwbGUgY2hhaW5zIC8gdGVuYW50cw0KDQogICBBbGxvd2luZyBhIGNoYWluIHVzZXIg
dG8gc3BlY2lmeSB0aGF0IGl0IHdhbnRzIGRlZGljYXRlZCByZXNvdXJjZXMgdG8gaGFuZGxlIGhp
cyB0cmFmZmljIHNlZW1zIHVzZWZ1bC4gIFRoaXMgZG9lcyBub3QgICBzZWVtIHRvbyBjb3N0bHkg
dG8gaW1wbGVtZW50Lg0KDQotIENvbnRyb2wgaWYvd2hhdCBJbmZvcm1hdGlvbiBjYW4gYmUgImxl
YWtlZCIgZnJvbSB0aGUgaW5mcmFzdHJ1Y3R1cmUgdG8gdGhlIFNGIHZpYSB0aGUgTlNIIG1ldGFk
YXRhDQoNCiBNZXRhZGF0YS9jb250ZXh0IGRhdGEgaGFzIGJlZW4gZGVmaW5lZCBhcyBhIG1lYW4g
dG8gIHNoYXJlIGluZm9ybWF0aW9uIGFtb25nc3QgU0ZzICBhbmQgY2xhc3NpZmllcnMsIGJldHdl
ZW4gU0ZzLCBhbmQgYmV0d2VlbiAgIGV4dGVybmFsIHN5c3RlbXMgYW5kIFNGcyAoZS5nLiwgb3Jj
aGVzdHJhdGlvbikuIFRoaXMgY291bGQgbGVhZCB0byBhIGdyZWF0IHZhcmlldHkgb2YgdXNlIGNh
c2VzIGZvciBNZXRhZGF0YSB0cmFuc3BvcnQNCiBTbyBJIGRvbid0IHRoaW5rIHRoZXJlIGlzIGEg
c3Ryb25nIGNhc2UgdG8gbWFrZSB0aGUgU0ZGIGFzIGFuIGVuZm9yY2VtZW50IHBvaW50IHRvIGNv
bnRyb2wgc3VjaCBpbmZvcm1hdGlvbiBleGNoYW5nZXMuDQoNCg0KTmljb2xhcw0KDQoNCi0tLS0t
T3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBFbHp1ciwgVXJpIFttYWlsdG86dXJpLmVsenVy
QGludGVsLmNvbV0NClNlbnQ6IG1hcmRpIDE3IG5vdmVtYnJlIDIwMTUgMDU6MDUNClRvOiBOaWNv
bGFzIEJPVVRIT1JTOyBTdXJlbmRyYSBLdW1hciAoc21rdW1hcik7IEpvZWwgTS4gSGFscGVybjsg
c2ZjQGlldGYub3JnDQpTdWJqZWN0OiBSRTogW3NmY10gd2lsbCB5b3UgdHJ1c3QgeW91ciBTRj8N
Cg0KTmljb2xhcw0KDQpQbHMgc2VlIHJlc3BvbnNlIGluIHRoZSBvdGhlciBtYWlsIG9uIHRoaXMg
dGhyZWFkLiBTb21lIFNGcyBhcmUgcGFydCBvZiB0aGUgaW5mcmFzdHJ1Y3R1cmUgYXMgeW91IHBv
aW50ZWQgb3V0LiBJZiB3ZSBhcmUgdG8gaGF2ZSAibGVzcyB0cnVzdGVkIFNGcyIgdG9vLCBpdCB3
aWwgaGF2ZSBpbXBsaWNhdGlvbnMgb24gdGhlIENvbnRyb2wgcGxhbmUgYW5kIG9uIHRoZSBhYmls
aXR5IG9mIHRoZXNlIGxlc3MgcHJpdmlsZWdlZCBTRiB0byBiZSB1c2VkIGluIG11bHRpLXRlbmFu
dCBlbnYuDQoNCkl0IG1heSBhZGQgdW5uZWNlc3NhcnkgY29tcGxleGl0eS4gU28gSSB3YXMgcHJv
cG9zaW5nIHRydXN0IHRoZSBTRiwgc3ViamVjdCB0byBXRyBhZ3JlZWQgcHJvY2Vzc2VkIGlucHV0
IG9mIFNGQyBTZWN1cml0eSB3b3JrDQoNClRoeA0KDQpVcmkgKOKAnE9vLVJlZeKAnSkNCkM6IDk0
OS0zNzgtNzU2OA0KDQoNCi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBOaWNvbGFz
IEJPVVRIT1JTIFttYWlsdG86Tmljb2xhcy5CT1VUSE9SU0Bxb3Ntb3MuY29tXQ0KU2VudDogTW9u
ZGF5LCBOb3ZlbWJlciAxNiwgMjAxNSA2OjMwIEFNDQpUbzogU3VyZW5kcmEgS3VtYXIgKHNta3Vt
YXIpOyBKb2VsIE0uIEhhbHBlcm47IEVsenVyLCBVcmk7IHNmY0BpZXRmLm9yZw0KU3ViamVjdDog
UkU6IFtzZmNdIHdpbGwgeW91IHRydXN0IHlvdXIgU0Y/DQoNCkFkJ2hvYyBTZXJ2aWNlIGNoYWlu
aW5nIHNvbHV0aW9ucyBhcmUgaW4gcHJvZHVjdGlvbiB0b2RheSBpbiB2YXJpb3VzIG5ldHdvcmtz
LCBzdXBwb3J0aW5nIHRyYW5zcGFyZW50IGFuZCBub24gdHJhbnNwYXJlbnQgbWlkZGxlYm94ZXMg
dGhyb3VnaCB2YXJpb3VzIHNjaGVtZXMuDQpGaXJld2FsbHMgZm9yIGV4YW1wbGUgYXJlIGluc2Vy
dGVkIGJldHdlZW4gY2xpZW50cyBhbmQgc2VydmVycyB0cmFuc3BhcmVudGx5LCBhbmQgaW4gZWZm
ZWN0IHRoZXkgYXJlIHRyZWF0ZWQgYXMgdHJ1c3RlZCBlbnRpdGllcywgYXMgdGhleSBhcmUgZ2l2
ZW4gYWNjZXNzIHRvIHRoZSBjb250ZW50IG9mIHRoZSB0cmFmZmljIGFsbG93aW5nIHRoZW0gdG8g
dmlldyBhbmQgbW9kaWZ5IGl0LiBXaG8gZG9lcyBub3QgdHJ1c3QgaGlzIEZpcmV3YWxsIGFwcGxp
YW5jZSA/DQoNCkkgdGhpbmsgd2UgY2FuIHNhZmVseSBhc3N1bWUgdGhhdCB0aGUgc2FtZSB3aWxs
IGFwcGx5IHdoZW4gTlNIIGlzIHVzZWQgZm9yIHNlcnZpY2UgY2hhaW5pbmcuDQoNClNvIHRoZSBx
dWVzdGlvbiBJIGhhdmUgaXMgdGhlbiB3aHkgd291bGRuJ3Qgd2UgdHJ1c3QgU0ZzIGFzIGZhciBh
cyByb3V0aW5nIGlzIGNvbmNlcm5lZCB3aGVuIHdlIHdpbGwgaGF2ZSB0byB0cnVzdCB0aGVtIHdp
dGggdGhlIHRyYWZmaWMgY29udGVudCA/DQoNCg0KTmljb2xhcw0KDQoNCi0tLS0tT3JpZ2luYWwg
TWVzc2FnZS0tLS0tDQpGcm9tOiBTdXJlbmRyYSBLdW1hciAoc21rdW1hcikgW21haWx0bzpzbWt1
bWFyQGNpc2NvLmNvbV0NClNlbnQ6IGx1bmRpIDE2IG5vdmVtYnJlIDIwMTUgMDA6NTcNClRvOiBK
b2VsIE0uIEhhbHBlcm47IEVsenVyLCBVcmk7IHNmY0BpZXRmLm9yZw0KU3ViamVjdDogUmU6IFtz
ZmNdIHdpbGwgeW91IHRydXN0IHlvdXIgU0Y/DQoNCisxDQoNClRoZXJlIGlzIGluZnJhc3RydWN0
dXJlIGFuZCB0aGVyZSBpcyBhcHBsaWNhdGlvbi4gVGhlIHByb21pc2Ugb2YgU0ZDIGlzIHRvIGJy
aW5nIGFueSB2ZW5kb3IsIHRoaXJkIHBhcnR5IG9yIGhvbWUgZ3Jvd24gU0ZzIGludG8gdGhlIG9w
ZXJhdG9yJ3MgbmV0d29yay4gVGhpcyByZXF1aXJlcyBlaXRoZXIgdGhlIFNGcyAoYXBwbGljYXRp
b25zKSBiZSByb2J1c3QsIGNlcnRpZmllZCAoaG93PykgdG8gd29yayBhbmQgbWFpbnRhaW4gYSBz
ZWN1cmUgZW52aXJvbm1lbnQgb3IsIHNpbXBseSBtYWtlIHRoZSBTRkZzIChpbmZyYXN0cnVjdHVy
ZSkgcm9idXN0IGFuZCBzZWN1cmUgd2l0aCBjb250cm9sIHBsYW5lIGVuZm9yY2luZyB0cnVzdCBi
ZXR3ZWVuIFNGRiBhbmQgU0YuDQoNCkl0IHNlZW1zIGZpbmUgZm9yIFNGcyB0byBpbmZsdWVuY2Ug
dGhlIGZvcndhcmRpbmcgZGVjaXNpb25zIGF0IFNGRiB2aWEgbWV0YWRhdGEgKGZ1bGx5IHVuZGVy
IFNGRidzIGNvbnRyb2wpIGJ1dCBub3QgaXRzZWxmIG1ha2UgdGhlIGZvcndhcmRpbmcgZGVjaXNp
b25zIC0gYXMgaXMgYWxsb3dlZCB2aWEgdGhlIG1hbmlwdWxhdGlvbiBvZiB0aGUgc2VydmljZSBp
bmRleCBieSB0aGUgU0ZzLiBJZiBTRkZzIGFyZSB0aGUgb25lcyBhbGxvd2VkIHRvIG1ha2UgZm9y
d2FyZGluZyBkZWNpc2lvbnMsIHdoeSBhbGxvdyBTRnMgdG8gZGVjcmVtZW50IHRoZSBzZXJ2aWNl
IGluZGV4IGFuZCBvbiB0b3Agb2YgdGhhdCBjaGVjayB3aGV0aGVyIFNGIGRpZCB0aGUgcmlnaHQg
dGhpbmcgLSBjb21wbGV0ZWx5IHJlZHVuZGFudCBhbmQgdW5uZWNlc3NhcnkgYW5kIGV2ZW4gaW5j
b3JyZWN0IGlmIHlvdSB0aGluayBob3cgaXQgbGVhZHMgdG8gYSBmb3J3YXJkaW5nIGRlY2lzaW9u
IGF0IFNGRi4gSU9XLCBTZXJ2aWNlUGF0aCBhbmQgU2VydmljZUluZGV4IGlzIG93bmVkIGJ5IFNG
RiBhbmQgc2hvdWxkIGJlIG9wYXF1ZSB0byBTRnMuDQoNCk1ha2luZyBtZXRhZGF0YSBhdmFpbGFi
bGUgZm9yIFNGcyBhbmQgU0ZGcywgaW4gdGhlIGRhdGEgcGxhbmUsIGlzIE5TSCdzIHZhbHVlLiBX
aGlsZSBjb25zdW1pbmcgdGhhdCBtZXRhZGF0YSB0byBvZmZlciBlbmhhbmNlZCBzZXJ2aWNlIGlz
IFNGcyB2YWx1ZS4gU0ZGcyBvbiB0aGUgb3RoZXIgaGFuZCBlbnN1cmUgdHJhZmZpYyBpcyBmb3J3
YXJkZWQgYWxvbmcgdGhlIHJpZ2h0IHBhdGggdG8gdGhlIHJpZ2h0IFNGcy4gV2hldGhlciB0aGUg
U0YgaW5zdGFuY2UgaXMgcGFydCBvZiBTRkMxIG9yIDEwIG9yIDEwMCBvciwgaG93IHBhY2tldHMg
bW92ZSBmcm9tIG9uZSBTRiB0byBhbm90aGVyIG11c3Qgbm90IGJlIG1peGVkIHdpdGggU0YgZm9j
dXMgb24gZGVsaXZlcmluZyBzZXJ2aWNlIGlmIHdlIGFyZSB0byBrZWVwIHRoZSBhcmNoaXRlY3R1
cmUgY2xlYW4gYW5kIHNpbXBsZS4NCg0KQXMgVXJpIHBvaW50cyBvdXQsIFNGRiBjbGVhcmx5IGlz
IGluZnJhc3RydWN0dXJlIGFuZCB0aGUgc2VwYXJhdGlvbiBiZXR3ZWVuIGluZnJhc3RydWN0dXJl
IGFuZCBhcHBsaWNhdGlvbiBpcyBpbXBvcnRhbnQgdG8gb3BlcmF0b3JzIGFuZCBuZWVkcyB0byBi
ZSBtYWludGFpbmVkLg0KDQpTdXJlbmRyYS4NCg0KDQotLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0t
LQ0KRnJvbTogc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBK
b2VsIE0uIEhhbHBlcm4NClNlbnQ6IFRodXJzZGF5LCBOb3ZlbWJlciAxMiwgMjAxNSA3OjIzIEFN
DQpUbzogRWx6dXIsIFVyaSA8dXJpLmVsenVyQGludGVsLmNvbT47IHNmY0BpZXRmLm9yZw0KU3Vi
amVjdDogUmU6IFtzZmNdIHdpbGwgeW91IHRydXN0IHlvdXIgU0Y/DQoNCkkgaGF2ZSBoZWFyZCBm
cm9tIGNvbmNlcm4gZnJvbSBjdXN0b21lcnMgaW4gdGhpcyByZWdhcmQuDQpGb3IgZXhhbXBsZSwg
dGhleSBoYXZlIGFza2VkIHdoZXRoZXIgd2UgY2FuIGVuc3VyZSB0aGF0IHRoZSBzZXJ2aWNlIGZ1
bmN0aW9uIHdpbGwgbm90IG1vZGlmeSB0aGUgc2VydmljZSBwYXRoIGlkZW50aWZpY2F0aW9uLCBl
dmVuIHdoaWxlIHRoZXkgZXhwZWN0IGl0IHRvIGNvbnN1bWUgYW5kIHByb2R1Y2UgbWV0YWRhdGEu
DQoNCllvdXJzLA0KSm9lbA0KDQpPbiAxMS8xMi8xNSAxOjQyIEFNLCBFbHp1ciwgVXJpIHdyb3Rl
Og0KPiBIaQ0KPg0KPiBTaG91bGQgSSBkZWR1Y2UgZnJvbSB0aGUgbm8gcmVzcG9uc2Ugb24gdGhl
IGxpc3QgdGhhdCB0aGUgV0cgaXMgaW4NCj4gYWdyZWVtZW50IHRoYXQgdGhlIFNGIHNob3VsZCBi
ZSB0cnVzdGVkID8NCj4NCj4gRm9yIG11bHRpcGxlIHJlYXNvbnMgdGhhdCBjYW4gc2ltcGxpZnkg
aGFuZGxpbmcgdGhlIGV4dGVybmFsIHR1bm5lbA0KPiBlbmNhcHN1bGF0aW9ucyAoaWYgcHJlc2Vu
dCkgYXMgd2VsbCBhcyBOU0ggaGVhZGVyIGl0c2VsZg0KPg0KPiBUaHgNCj4NCj4gVXJpICgiT28t
UmVlIikNCj4NCj4gQzogOTQ5LTM3OC03NTY4DQo+DQo+ICpGcm9tOiogc2ZjIFttYWlsdG86c2Zj
LWJvdW5jZXNAaWV0Zi5vcmddICpPbiBCZWhhbGYgT2YgKkVsenVyLCBVcmkNCj4gKlNlbnQ6KiBU
aHVyc2RheSwgTm92ZW1iZXIgNSwgMjAxNSAxOjE5IFBNDQo+ICpUbzoqIHNmY0BpZXRmLm9yZw0K
PiAqU3ViamVjdDoqIFtzZmNdIHdpbGwgeW91IHRydXN0IHlvdXIgU0Y/DQo+DQo+IEhpDQo+DQo+
IGluIGNvbnRpbnVhdGlvbiBvZiB0aGUgZGlzY3Vzc2lvbiBpbiB0aGUgbWVldGluZyB0b2RheSwg
SSdkIGxpa2UgdG8NCj4gc3VyZmFjZSB0aGlzIGlzc3VlIGFuZCBob3BlZnVsbHkgaXQgY2FuIGJl
IGVhc2lseSBhbmQgcXVpY2tseSByZXNvbHZlZC4NCj4gSW4gdGhlIGRpc2N1c3Npb24gYWJvdXQg
TWFwIGFzc2lzdGVkIFNGQyBQcm94eSwgd2UgZGlzY3Vzc2VkIHRoZQ0KPiBwb3RlbnRpYWwgb2Yg
YW4gU0YgKGUuZy4gTkFUKSB0byBsZWdpdGltYXRlbHkgY2hhbmdlIHRoZSA1IHR1cGxlLg0KPiBD
b250cm9sIFBsYW5lIGludGVydmVudGlvbiBtYXkgYmUgbmVlZGVkIGluIHN1Y2ggY2FzZSB0byB1
cGRhdGUgdGhlDQo+IG1hcCAoYXMgdGhlIG5ldyA1IHR1cGxlIG1heSBub3QgYmUgdGhlcmUpIGFu
ZCB0byBpbXBseSB0aGUgU0YgaXMNCj4gdHJ1c3RlZCBmb3IgdGhpcyBvcGVyYXRpb24uDQo+DQo+
IFRoaXMgZ29lcyBiZXlvbmQgdGhlIHF1ZXN0aW9uIG9mIHdoYXQgdG8gZG8gaW4gdGhlIGNhc2Ug
dGhlIFNGIGNoYW5nZWQNCj4gdGhlIDUtdHVwbGUuIEl0IGlzIHRoZSBxdWVzdGlvbiBvZjogaXMg
dGhlIFNGIHRydXN0ZWQgLSBmb3IgdGhlIHNha2UNCj4gb2YgdGhlIDUgdHVwbGUsIGFzIHdlbGwg
YXMgZm9yIE5TSCBoZWFkZXIgY2hhbmdlcyAoZS5nLiBTSSBkZWNyZW1lbnQNCj4gb3IgZXZlbiBT
UEkgY2hhbmdlIGluIGNhc2UgYSAiQ2xhc3NpZmllciIgaXMgaW5jb3Jwb3JhdGVkKS4gSWYgbm90
LA0KPiB0aGUgU0ZGIChvciB0aGUgUHJveHkpIGhhcyB0byBrZWVwIHRoYXQgc3RhdGUgYW5kIFZF
UklGWSBpdCBvbiB0aGUNCj4gb3V0Ym91bmQuLi4NCj4NCj4gVGhlcmUgYXJlIG9waW5pb25zIGFz
IGlmIHdlIG5lZWQgdG8gYWxsb3cgZm9yIHNvbWUgU0YgdGhhdCBhcmUgZnVsbHkNCj4gdHJ1c3Rl
ZCBhbmQgc29tZSB0aGF0IGFyZSBub3QgdHJ1c3RlZC4gSSBhc3N1bWUgYWxsIGFncmVlIHRoZSBT
RkYgaXMNCj4gcGFydCBvZiB0aGUgaW5mcmFzdHJ1Y3R1cmUgYW5kIGlzIHRydXN0ZWQuIFdlIG5l
ZWQgdG8gY2xvc2Ugb24gdGhpcw0KPiBmb3IgdGhlIE5TSCBkcmFmdCB0b28uDQo+DQo+IFRoeA0K
Pg0KPiBVcmkgKCJPby1SZWUiKQ0KPg0KPiBDOiA5NDktMzc4LTc1NjgNCj4NCj4NCj4NCj4gX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gc2ZjIG1haWxp
bmcgbGlzdA0KPiBzZmNAaWV0Zi5vcmcNCj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9s
aXN0aW5mby9zZmMNCj4NCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX18NCnNmYyBtYWlsaW5nIGxpc3QNCnNmY0BpZXRmLm9yZw0KaHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCg0KDQpUaGlzIG1lc3NhZ2UgYW5kIGFueSBhdHRh
Y2htZW50cyAodGhlICJtZXNzYWdlIikgYXJlIGNvbmZpZGVudGlhbCwgaW50ZW5kZWQgc29sZWx5
IGZvciB0aGUgYWRkcmVzc2Vlcy4gSWYgeW91IGFyZSBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVu
dCwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGltbWVkaWF0ZWx5IGJ5IGUtbWFpbCBhbmQgZGVs
ZXRlIHRoaXMgbWVzc2FnZSBmcm9tIHlvdXIgc3lzdGVtLiBJbiB0aGlzIGNhc2UsIHlvdSBhcmUg
bm90IGF1dGhvcml6ZWQgdG8gdXNlLCBjb3B5IHRoaXMgbWVzc2FnZSBhbmQvb3IgZGlzY2xvc2Ug
dGhlIGNvbnRlbnQgdG8gYW55IG90aGVyIHBlcnNvbi4gRS1tYWlscyBhcmUgc3VzY2VwdGlibGUg
dG8gYWx0ZXJhdGlvbi4gTmVpdGhlciBRb3Ntb3Mgbm9yIGFueSBvZiBpdHMgc3Vic2lkaWFyaWVz
IG9yIGFmZmlsaWF0ZXMgc2hhbGwgYmUgbGlhYmxlIGZvciB0aGUgbWVzc2FnZSBpZiBhbHRlcmVk
LCBjaGFuZ2VkIG9yIGZhbHNpZmllZC4NCg0KQ2UgbWVzc2FnZSBldCB0b3V0ZXMgc2VzIHBpw6hj
ZXMgam9pbnRlcyAoY2ktYXByw6hzIGxlICJtZXNzYWdlIilzb250IGNvbmZpZGVudGllbHMgZXQg
w6l0YWJsaXMgw6AgbCdpbnRlbnRpb24gZXhjbHVzaXZlIGRlIHNlcyBkZXN0aW5hdGFpcmVzLiBT
aSB2b3VzIGF2ZXogcmXDp3UgY2UgbWVzc2FnZSBwYXIgZXJyZXVyLCBtZXJjaSBk4oCZZW4gaW5m
b3JtZXIgaW1tw6lkaWF0ZW1lbnQgc29uIMOpbWV0dGV1ciBwYXIgY291cnJpZXIgw6lsZWN0cm9u
aXF1ZSBldCBk4oCZZWZmYWNlciBjZSBtZXNzYWdlIGRlIHZvdHJlIHN5c3TDqG1lLiBEYW5zIGNl
dHRlIGh5cG90aMOoc2UsIHZvdXMgbuKAmcOqdGVzIHBhcyBhdXRvcmlzw6kgw6AgdXRpbGlzZXIs
IGNvcGllciBjZSBtZXNzYWdlIGV0L291IGVuIGRpdnVsZ3VlciBsZSBjb250ZW51IMOgIHVuIHRp
ZXJzLiBUb3V0IG1lc3NhZ2Ugw6lsZWN0cm9uaXF1ZSBlc3Qgc3VzY2VwdGlibGUgZCdhbHTDqXJh
dGlvbi4gUW9zbW9zIGV0IHNlcyBmaWxpYWxlcyBkw6ljbGluZW50IHRvdXRlIHJlc3BvbnNhYmls
aXTDqSBhdSB0aXRyZSBkZSBjZSBtZXNzYWdlIHMnaWwgYSDDqXTDqSBhbHTDqXLDqSwgZMOpZm9y
bcOpIG91IGZhbHNpZmnDqS4NClRoaXMgbWVzc2FnZSBhbmQgYW55IGF0dGFjaG1lbnRzICh0aGUg
Im1lc3NhZ2UiKSBhcmUgY29uZmlkZW50aWFsLCBpbnRlbmRlZCBzb2xlbHkgZm9yIHRoZSBhZGRy
ZXNzZWVzLiBJZiB5b3UgYXJlIG5vdCB0aGUgaW50ZW5kZWQgcmVjaXBpZW50LCBwbGVhc2Ugbm90
aWZ5IHRoZSBzZW5kZXIgaW1tZWRpYXRlbHkgYnkgZS1tYWlsIGFuZCBkZWxldGUgdGhpcyBtZXNz
YWdlIGZyb20geW91ciBzeXN0ZW0uIEluIHRoaXMgY2FzZSwgeW91IGFyZSBub3QgYXV0aG9yaXpl
ZCB0byB1c2UsIGNvcHkgdGhpcyBtZXNzYWdlIGFuZC9vciBkaXNjbG9zZSB0aGUgY29udGVudCB0
byBhbnkgb3RoZXIgcGVyc29uLiBFLW1haWxzIGFyZSBzdXNjZXB0aWJsZSB0byBhbHRlcmF0aW9u
LiBOZWl0aGVyIFFvc21vcyBub3IgYW55IG9mIGl0cyBzdWJzaWRpYXJpZXMgb3IgYWZmaWxpYXRl
cyBzaGFsbCBiZSBsaWFibGUgZm9yIHRoZSBtZXNzYWdlIGlmIGFsdGVyZWQsIGNoYW5nZWQgb3Ig
ZmFsc2lmaWVkLg0KDQpDZSBtZXNzYWdlIGV0IHRvdXRlcyBzZXMgcGnDqGNlcyBqb2ludGVzIChj
aS1hcHLDqHMgbGUgIm1lc3NhZ2UiKXNvbnQgY29uZmlkZW50aWVscyBldCDDqXRhYmxpcyDDoCBs
J2ludGVudGlvbiBleGNsdXNpdmUgZGUgc2VzIGRlc3RpbmF0YWlyZXMuIFNpIHZvdXMgYXZleiBy
ZcOndSBjZSBtZXNzYWdlIHBhciBlcnJldXIsIG1lcmNpIGTigJllbiBpbmZvcm1lciBpbW3DqWRp
YXRlbWVudCBzb24gw6ltZXR0ZXVyIHBhciBjb3VycmllciDDqWxlY3Ryb25pcXVlIGV0IGTigJll
ZmZhY2VyIGNlIG1lc3NhZ2UgZGUgdm90cmUgc3lzdMOobWUuIERhbnMgY2V0dGUgaHlwb3Row6hz
ZSwgdm91cyBu4oCZw6p0ZXMgcGFzIGF1dG9yaXPDqSDDoCB1dGlsaXNlciwgY29waWVyIGNlIG1l
c3NhZ2UgZXQvb3UgZW4gZGl2dWxndWVyIGxlIGNvbnRlbnUgw6AgdW4gdGllcnMuIFRvdXQgbWVz
c2FnZSDDqWxlY3Ryb25pcXVlIGVzdCBzdXNjZXB0aWJsZSBkJ2FsdMOpcmF0aW9uLiBRb3Ntb3Mg
ZXQgc2VzIGZpbGlhbGVzIGTDqWNsaW5lbnQgdG91dGUgcmVzcG9uc2FiaWxpdMOpIGF1IHRpdHJl
IGRlIGNlIG1lc3NhZ2UgcydpbCBhIMOpdMOpIGFsdMOpcsOpLCBkw6lmb3Jtw6kgb3UgZmFsc2lm
acOpLg0K


From nobody Tue Nov 17 04:58:09 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 812291B2EDD for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 04:58:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.584
X-Spam-Level: 
X-Spam-Status: No, score=-1.584 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, J_CHICKENPOX_26=0.6, MIME_8BIT_HEADER=0.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AdCWXXXeYELc for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 04:58:06 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2DD51B2EDB for <sfc@ietf.org>; Tue, 17 Nov 2015 04:58:05 -0800 (PST)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id BC9DE403DC; Tue, 17 Nov 2015 13:58:03 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.75]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id 8546B1A006E; Tue, 17 Nov 2015 13:58:03 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA4.corporate.adroot.infra.ftgroup ([fe80::65de:2f08:41e6:ebbe%19]) with mapi id 14.03.0248.002; Tue, 17 Nov 2015 13:58:03 +0100
From: <mohamed.boucadair@orange.com>
To: =?utf-8?B?6rCV7YOc7Zi4KFNETiBQcm9qZWN0KQ==?= <th.kang@kt.com>, "sfc issue tracker" <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>
Thread-Topic: [sfc]  #14 (control-plane): Taeho's Comments
Thread-Index: AQHQ8I9T7TcVFn9cV0mTpQZNxo7kn55apC4ggEW8sLA=
Date: Tue, 17 Nov 2015 12:58:02 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9F3B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.30544c61f7d483f2c92b00ddfacd598d@tools.ietf.org> <EE1EEAC78A332D40ACF8B5796CBD26AC2915D873@MAIL-MBX-02>
In-Reply-To: <EE1EEAC78A332D40ACF8B5796CBD26AC2915D873@MAIL-MBX-02>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/U_9Ji4KKQnTd1m9OpPDBSj1R_iQ>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #14 (control-plane): Taeho's Comments
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 12:58:07 -0000
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From nobody Tue Nov 17 05:34:26 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB0CA1B2F40 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 05:34:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7sWMQCc3sEpv for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 05:34:22 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FA821B2F3F for <sfc@ietf.org>; Tue, 17 Nov 2015 05:34:22 -0800 (PST)
Received: from opfednr01.francetelecom.fr (unknown [xx.xx.xx.65]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id E41F540421; Tue, 17 Nov 2015 14:34:20 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.24]) by opfednr01.francetelecom.fr (ESMTP service) with ESMTP id A9A2C1A0054; Tue, 17 Nov 2015 14:34:20 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0248.002; Tue, 17 Nov 2015 14:34:20 +0100
From: <mohamed.boucadair@orange.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+A=
Date: Tue, 17 Nov 2015 13:34:19 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com>
In-Reply-To: <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/gi7q1m_OJYRqz8Qs9RAScUyWLrE>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 13:34:25 -0000

Hi Paul,

Thank you for sharing your feedback.

RFC7665 says the following:

"
This architecture does not mandate the degree of
   specificity of the SFP.  Architecturally, within the same SFC-enabled
   domain, some SFPs may be fully specified, selecting exactly which SFF
   and which SF are to be visited by packets using that SFP, while other
   SFPs may be quite vague, deferring to the SFF the decisions about the
   exact sequence of steps to be used to realize the SFC.  The
   specificity may be anywhere in between these extremes.
"

The control draft is completely aligned with that approach.=20

The control-plane document allows in particular to provision required infor=
mation when "deferring to the SFF the decisions about the
   exact sequence of steps to be used to realize the SFC". It happens that =
information is no more than the service chain itself (without any constrain=
ts).

Also, the current control-plane document allows to instruct a loose path (S=
FP) or a strict path (RSP), etc.=20

I fully agree that whether a full path is specified within a domain or if i=
t is deferred to SFFs is really deployment-specific. Nevertheless, the cont=
rol plan should accommodate all these flavors.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Paul Quinn (paulq) [mailto:paulq@cisco.com]
> Envoy=E9=A0: vendredi 16 octobre 2015 14:04
> =C0=A0: Joel M. Halpern
> Cc=A0: BOUCADAIR Mohamed IMT/OLN; sfc issue tracker; draft-ietf-sfc-contr=
ol-
> plane@tools.ietf.org; sfc@ietf.org
> Objet=A0: Re: [sfc] #15 (control-plane): Whether the control plane operat=
es
> on SFC IDs, SFP IDs, etc.
>=20
> Joel,
>=20
> I concur.
>=20
> The data plane deal with paths, not chains.  The relationship of paths to
> chains falls squarely in the control plane (or even more likely "policy"
> plane) realm.  The specificity of the path is left to implementation, in
> the architecture draft, but that's consistent with your position and
> provides the requisite functionality.
>=20
> Paul
>=20
> > On Sep 17, 2015, at 11:36 AM, Joel M. Halpern <jmh@joelhalpern.com>
> wrote:
> >
> > As far as I can tell, there is nothing in the Service Chaining work tha=
t
> requires correlating service path IDs with service chain IDs within the
> data plane.  Any such relationship exists entirely within the control
> plane or above, and would be driven by requirements other than the data
> plane.  When I look at this document, all of the requirements that talk
> about service function chain IDs can be accurately captured, in terms of
> data plane requirements, by service function path IDs.  Thus, the
> requirement that the data plane has is to see such path IDs.  Yes, in som=
e
> deployments those will be 1-1 with chain IDs.  They are still path IDs.
> >
> > Introducing a requirement for the data plane to see and work with chain
> IDs is not grounded in the work of the group.
> >
> > Yours,
> > Joel M. Halpern
> >
> > On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
> >> Re-,
> >>
> >> The control draft as it stands is compliant with the data plane
> architecture document.
> >>
> >> Indeed, the arch draft acknowledges the following:
> >> (1) SFPs are "associated with a given SFC".
> >> (2) SFPs are presented as a form of constrained SFCs.
> >> (3) Some deployments may not impose any constraint on the abstract SFC=
.
> >> (4) Some others may impose either loose or strict routes.
> >>
> >> Requiring SFP IDs for deployments that do not impose any constraint on
> the SFC is an oxymoron because according to the data plane architecture,
> an SFP is a "constrained version of the original SFC".
> >>
> >> For deployments that do not impose any constraint on the abstract SFC,
> but adopt a fully distributed SFC forwarding strategy, a chain identifier
> is sufficient.
> >>
> >> Because an SFP may be associated with several SFCs, the identifier of
> the SFC may be required to associate an SFP with its SFC.
> >>
> >> Below an excerpt from the arch draft, fwiw:
> >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> >>    A service function path (SFP) is a mechanism used by service
> chaining
> >>    to express the result of applying more granular policy and
> >>    operational constraints to the abstract requirements of a service
> >>    chain (SFC).  This architecture does not mandate the degree of
> >>    specificity of the SFP.  Architecturally, within the same SFC-
> enabled
> >>    domain, some SFPs may be fully specified, selecting exactly which
> SFF
> >>    and which SF are to be visited by packets using that SFP, while
> other
> >>    SFPs may be quite vague, deferring to the SFF the decisions about
> the
> >>    exact sequence of steps to be used to realize the SFC.  The
> >>    specificity may be anywhere in between these extremes.
> >>
> >>    As an example of such an intermediate specificity, there may be two
> >>    SFPs associated with a given SFC, where one SFP specifies that any
> >>    order of SFF and SF may be used as long as it is within data center
> >>    1, and where the second SFP allows the same latitude, but only
> within
> >>    data center 2.
> >>
> >>    Thus, the policies and logic of SFP selection or creation (dependin=
g
> >>    upon the solution) produce what may be thought of as a constrained
> >>    version of the original SFC.  Since multiple policies may apply to
> >>    different traffic that uses the same SFC, it also follows that ther=
e
> >>    may be multiple SFPs may be associated with a single SFC.
> >> =3D=3D=3D=3D=3D=3D=3D
> >>
> >> Cheers,
> >> Med
> >>
> >>> -----Message d'origine-----
> >>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com]
> >>> Envoy=E9 : mercredi 16 septembre 2015 19:15
> >>> =C0 : sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> >>> BOUCADAIR Mohamed IMT/OLN
> >>> Cc : sfc@ietf.org
> >>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
> operates
> >>> on SFC IDs, SFP IDs, etc.
> >>>
> >>> Given that we have an adopted architecture that specifies that the
> >>> system should function in terms of service function paths, I would
> >>> prefer that the control requirements draft align with the architectur=
e
> >>> in that regard.  We are, as far as I know, specifying the requirement=
s
> >>> for control mechanisms in support of the architecture and data plane
> we
> >>> standardize.
> >>>
> >>> Yours,
> >>> Joel
> >>>
> >>> On 9/16/15 9:46 AM, sfc issue tracker wrote:
> >>>> #15: Whether the control plane operates on SFC IDs, SFP IDs, etc.
> >>>>
> >>>>   The draft includes this note:
> >>>>
> >>>>            [[Note: The question of whether the data plane operates
> just
> >>> in
> >>>>            terms of SFP IDs or needs SFC IDs, as described in this
> >>> version
> >>>>            of the draft, is still under discussion among the
> authors.]]
> >>>>
> >>>>   The current version of the draft is more generic as it does not
> >>> preclude
> >>>>   manipulating service chains based on an identifier of the chain.
> Also,
> >>> it
> >>>>   does not assume that the SFP indirection level is mandatory (SFP
> IDs).
> >>>>
> >>>>   Note the current version accommodates various deployment contexts:
> >>> e.g.,
> >>>>   rely solely on a chain ID, rely on a chain ID and a SFP, supply a
> >>> strict
> >>>>   path, supply a loose path, etc. The purpose is to not dictate
> >>> deployment
> >>>>   choices on how forwarding is actually achieved within an SFC-
> enabled
> >>>>   domain.
> >>>>
> >>>>   An identifier of the chain is the minimum information that is
> needed,
> >>> but
> >>>>   other information may be supplied as well.
> >>>>
> >>>>   Feedback from the WG about which information to supply is needed.
> >>>>
> >>>>   FWIW, there is a ticket issue for this issue for the nsh spec.
> >>>>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Nov 17 05:48:56 2015
Return-Path: <joel.halpern@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 504BA1B2F79 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 05:48:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Qu3uKCGPWuL for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 05:48:52 -0800 (PST)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C0A31B2F5A for <sfc@ietf.org>; Tue, 17 Nov 2015 05:48:52 -0800 (PST)
X-AuditID: c6180641-f792c6d00000686a-42-564ac228879f
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 13.00.26730.822CA465; Tue, 17 Nov 2015 06:59:04 +0100 (CET)
Received: from EUSAAMB101.ericsson.se ([147.117.188.118]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Tue, 17 Nov 2015 08:48:50 -0500
From: Joel Halpern <joel.halpern@ericsson.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYl6OiFMYjzlEKe/O14io7+jJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAAfC8A==
Date: Tue, 17 Nov 2015 13:48:49 +0000
Message-ID: <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.11]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprPIsWRmVeSWpSXmKPExsUyuXRPoK7GIa8wg28PFC1mtElYfDz1hsni 8Nun7Bb7Xy1ltXjyYCu7xYW3i5kd2Dym/N7I6rFkyU8mj3NTvjN6tDw7yebx5fJntgDWKC6b lNSczLLUIn27BK6MF++uMBb0KVW8u/CVvYFxmXQXIweHhICJxO+9Tl2MnECmmMSFe+vZuhi5 OIQEjjBKrLqxgRXCWc4osfjuVCaQKjYBPYm17x+D2SIC2RIfVh5iBiliFrjFKPGg+SgLSEJY IE1i8e4WNoiidIlLm06wQNhhEqe3NrGC2CwCqhIP/v4Es3kFfCUWth1lh9j2jkniyefJYA2c AkkSc/vXMIPYjED3fT+1Bmwzs4C4xK0n85kg7haQWLLnPDOELSrx8vE/VghbSeLj7/nsEPV6 EjemTmGDsLUlli18zQyxWFDi5MwnLBMYxWYhGTsLScssJC2zkLQsYGRZxchRWpxalptuZLiJ ERhtxyTYHHcwLvhkeYhRgINRiYf3Q7xXmBBrYllxZe4hRgkOZiUR3uJXQCHelMTKqtSi/Pii 0pzU4kOM0hwsSuK882bcDxUSSE8sSc1OTS1ILYLJMnFwSjUw5jOlpdXMKVfWTrvLx3LAlNHn tI7dZ4b0T367+S6Z9Pvd33Vkav7DVu9HWXs3XHVJ41YTmbPPQavApEBJVdGQ8+MOxfCbTK+E vwev/ytte3rCpIUznafrRv0X//Bc1sM/U/bcqm/dryeGN0U7LhINPbu77YLPEg6rtoCayYrP 2yvC0y8zMbgqsRRnJBpqMRcVJwIAtm3vMrICAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/INwa5Yc68XWVJROEWfpBhEXIcBc>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 13:48:54 -0000

Your statement that " It happens that information is no more than the servi=
ce chain itself (without any constraints)." (Where "it" refers to " the exa=
ct sequence of steps to be used to realize the SFC".) Does not make sense t=
o me.  The SFC is the general description of the objective.  That is not th=
e same as the exact sequence of places that must be visited.

I stand by my earlier comments that almost all uses of SFC in the control r=
equirements draft should be SFP.

Yours,
Joel

-----Original Message-----
From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]=20
Sent: Tuesday, November 17, 2015 8:34 AM
To: Paul Quinn (paulq)
Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org; sfc@iet=
f.org; Joel M. Halpern
Subject: RE: [sfc] #15 (control-plane): Whether the control plane operates =
on SFC IDs, SFP IDs, etc.

Hi Paul,

Thank you for sharing your feedback.

RFC7665 says the following:

"
This architecture does not mandate the degree of
   specificity of the SFP.  Architecturally, within the same SFC-enabled
   domain, some SFPs may be fully specified, selecting exactly which SFF
   and which SF are to be visited by packets using that SFP, while other
   SFPs may be quite vague, deferring to the SFF the decisions about the
   exact sequence of steps to be used to realize the SFC.  The
   specificity may be anywhere in between these extremes.
"

The control draft is completely aligned with that approach.=20

The control-plane document allows in particular to provision required infor=
mation when "deferring to the SFF the decisions about the
   exact sequence of steps to be used to realize the SFC". It happens that =
information is no more than the service chain itself (without any constrain=
ts).

Also, the current control-plane document allows to instruct a loose path (S=
FP) or a strict path (RSP), etc.=20

I fully agree that whether a full path is specified within a domain or if i=
t is deferred to SFFs is really deployment-specific. Nevertheless, the cont=
rol plan should accommodate all these flavors.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9=A0: vendredi =
16=20
> octobre 2015 14:04 =C0=A0: Joel M. Halpern Cc=A0: BOUCADAIR Mohamed IMT/O=
LN;=20
> sfc issue tracker; draft-ietf-sfc-control- plane@tools.ietf.org;=20
> sfc@ietf.org Objet=A0: Re: [sfc] #15 (control-plane): Whether the=20
> control plane operates on SFC IDs, SFP IDs, etc.
>=20
> Joel,
>=20
> I concur.
>=20
> The data plane deal with paths, not chains.  The relationship of paths=20
> to chains falls squarely in the control plane (or even more likely "polic=
y"
> plane) realm.  The specificity of the path is left to implementation,=20
> in the architecture draft, but that's consistent with your position=20
> and provides the requisite functionality.
>=20
> Paul
>=20
> > On Sep 17, 2015, at 11:36 AM, Joel M. Halpern <jmh@joelhalpern.com>
> wrote:
> >
> > As far as I can tell, there is nothing in the Service Chaining work=20
> > that
> requires correlating service path IDs with service chain IDs within=20
> the data plane.  Any such relationship exists entirely within the=20
> control plane or above, and would be driven by requirements other than=20
> the data plane.  When I look at this document, all of the requirements=20
> that talk about service function chain IDs can be accurately captured,=20
> in terms of data plane requirements, by service function path IDs. =20
> Thus, the requirement that the data plane has is to see such path IDs. =20
> Yes, in some deployments those will be 1-1 with chain IDs.  They are stil=
l path IDs.
> >
> > Introducing a requirement for the data plane to see and work with=20
> > chain
> IDs is not grounded in the work of the group.
> >
> > Yours,
> > Joel M. Halpern
> >
> > On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
> >> Re-,
> >>
> >> The control draft as it stands is compliant with the data plane
> architecture document.
> >>
> >> Indeed, the arch draft acknowledges the following:
> >> (1) SFPs are "associated with a given SFC".
> >> (2) SFPs are presented as a form of constrained SFCs.
> >> (3) Some deployments may not impose any constraint on the abstract SFC


From nobody Tue Nov 17 06:02:56 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 658AD1B2FBD for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 06:02:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HJ4LDyR9TRNQ for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 06:02:45 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F26411B2FCB for <sfc@ietf.org>; Tue, 17 Nov 2015 06:02:44 -0800 (PST)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id 2A4672DC31F; Tue, 17 Nov 2015 15:02:43 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.31]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 03A9927C071; Tue, 17 Nov 2015 15:02:43 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM22.corporate.adroot.infra.ftgroup ([fe80::8c90:f4e9:be28:2a1%19]) with mapi id 14.03.0248.002; Tue, 17 Nov 2015 15:02:42 +0100
From: <mohamed.boucadair@orange.com>
To: Joel Halpern <joel.halpern@ericsson.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYl6OiFMYjzlEKe/O14io7+jJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAAfC8IAAAYXQ
Date: Tue, 17 Nov 2015 14:02:42 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se>
In-Reply-To: <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.10.16.122716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hIpI0cYtPO7tDxI_WtaIm8f4x_Y>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 14:02:54 -0000

Hi Joel,=20

Please see inline.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel Halpern [mailto:joel.halpern@ericsson.com]
> Envoy=E9=A0: mardi 17 novembre 2015 14:49
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq)
> Cc=A0: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Objet=A0: RE: [sfc] #15 (control-plane): Whether the control plane operat=
es
> on SFC IDs, SFP IDs, etc.
>=20
> Your statement that " It happens that information is no more than the
> service chain itself (without any constraints)." (Where "it" refers to "
> the exact sequence of steps to be used to realize the SFC".) Does not mak=
e
> sense to me.=20

[Med] RFC 7665 says:

"   Thus, the policies and logic of SFP selection or creation (depending
   upon the solution) produce what may be thought of as a constrained
   version of the original SFC. "=20

in short: SFP is defined as a constrained version of the original SFC.

What is the name to use to refer to a "non-constrained" SFC or to the infor=
mation that you will provision to an SFF when the path computation and sele=
ction decision is "deferred to the SFF"?

It does not make sense to call a non-constrained version of the SFC as SFP =
given that RFC7665 explicitly defines SFP as "constrained version of the or=
iginal SFC"!

 The SFC is the general description of the objective.  That
> is not the same as the exact sequence of places that must be visited.
>=20
> I stand by my earlier comments that almost all uses of SFC in the control
> requirements draft should be SFP.
>=20

[Med] I noted that Joel.. that's fair but this position is IMHO not aligned=
 with RFC7665 that allows to control any variation from a non-constrained S=
FC to a fully constrained SFC.=20

> Yours,
> Joel
>=20
> -----Original Message-----
> From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
> Sent: Tuesday, November 17, 2015 8:34 AM
> To: Paul Quinn (paulq)
> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Subject: RE: [sfc] #15 (control-plane): Whether the control plane operate=
s
> on SFC IDs, SFP IDs, etc.
>=20
> Hi Paul,
>=20
> Thank you for sharing your feedback.
>=20
> RFC7665 says the following:
>=20
> "
> This architecture does not mandate the degree of
>    specificity of the SFP.  Architecturally, within the same SFC-enabled
>    domain, some SFPs may be fully specified, selecting exactly which SFF
>    and which SF are to be visited by packets using that SFP, while other
>    SFPs may be quite vague, deferring to the SFF the decisions about the
>    exact sequence of steps to be used to realize the SFC.  The
>    specificity may be anywhere in between these extremes.
> "
>=20
> The control draft is completely aligned with that approach.
>=20
> The control-plane document allows in particular to provision required
> information when "deferring to the SFF the decisions about the
>    exact sequence of steps to be used to realize the SFC". It happens tha=
t
> information is no more than the service chain itself (without any
> constraints).
>=20
> Also, the current control-plane document allows to instruct a loose path
> (SFP) or a strict path (RSP), etc.
>=20
> I fully agree that whether a full path is specified within a domain or if
> it is deferred to SFFs is really deployment-specific. Nevertheless, the
> control plan should accommodate all these flavors.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9=A0: vendred=
i 16
> > octobre 2015 14:04 =C0=A0: Joel M. Halpern Cc=A0: BOUCADAIR Mohamed IMT=
/OLN;
> > sfc issue tracker; draft-ietf-sfc-control- plane@tools.ietf.org;
> > sfc@ietf.org Objet=A0: Re: [sfc] #15 (control-plane): Whether the
> > control plane operates on SFC IDs, SFP IDs, etc.
> >
> > Joel,
> >
> > I concur.
> >
> > The data plane deal with paths, not chains.  The relationship of paths
> > to chains falls squarely in the control plane (or even more likely
> "policy"
> > plane) realm.  The specificity of the path is left to implementation,
> > in the architecture draft, but that's consistent with your position
> > and provides the requisite functionality.
> >
> > Paul
> >
> > > On Sep 17, 2015, at 11:36 AM, Joel M. Halpern <jmh@joelhalpern.com>
> > wrote:
> > >
> > > As far as I can tell, there is nothing in the Service Chaining work
> > > that
> > requires correlating service path IDs with service chain IDs within
> > the data plane.  Any such relationship exists entirely within the
> > control plane or above, and would be driven by requirements other than
> > the data plane.  When I look at this document, all of the requirements
> > that talk about service function chain IDs can be accurately captured,
> > in terms of data plane requirements, by service function path IDs.
> > Thus, the requirement that the data plane has is to see such path IDs.
> > Yes, in some deployments those will be 1-1 with chain IDs.  They are
> still path IDs.
> > >
> > > Introducing a requirement for the data plane to see and work with
> > > chain
> > IDs is not grounded in the work of the group.
> > >
> > > Yours,
> > > Joel M. Halpern
> > >
> > > On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
> > >> Re-,
> > >>
> > >> The control draft as it stands is compliant with the data plane
> > architecture document.
> > >>
> > >> Indeed, the arch draft acknowledges the following:
> > >> (1) SFPs are "associated with a given SFC".
> > >> (2) SFPs are presented as a form of constrained SFCs.
> > >> (3) Some deployments may not impose any constraint on the abstract
> SFC


From nobody Tue Nov 17 06:06:17 2015
Return-Path: <joel.halpern@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99F531B2FE2 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 06:06:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yWL-kT628oI4 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 06:06:13 -0800 (PST)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF8A61B2FE1 for <sfc@ietf.org>; Tue, 17 Nov 2015 06:06:13 -0800 (PST)
X-AuditID: c6180641-f792c6d00000686a-ed-564ac6391c07
Received: from EUSAAHC005.ericsson.se (Unknown_Domain [147.117.188.87]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 83.D0.26730.936CA465; Tue, 17 Nov 2015 07:16:25 +0100 (CET)
Received: from EUSAAMB101.ericsson.se ([147.117.188.118]) by EUSAAHC005.ericsson.se ([147.117.188.87]) with mapi id 14.03.0248.002; Tue, 17 Nov 2015 09:06:10 -0500
From: Joel Halpern <joel.halpern@ericsson.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYl6OiFMYjzlEKe/O14io7+jJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAAfC8IAAAYXQgAADO9A=
Date: Tue, 17 Nov 2015 14:06:10 +0000
Message-ID: <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.11]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprPIsWRmVeSWpSXmKPExsUyuXRPuK7lMa8wgx8vZS1mtElYfDz1hsni 8Nun7Bb7Xy1ltXjyYCu7xYW3i5kd2Dym/N7I6rFkyU8mj3NTvjN6tDw7yebx5fJntgDWKC6b lNSczLLUIn27BK6Ms++PshX8NKs4tOEmcwPjLe0uRk4OCQETiZkX1rFB2GISF+6tB7K5OIQE jjBKrNr9nh3CWc4osXtJCzNIFZuAnsTa94+ZQGwRgWyJDysPMYMUMQvcYpR40HyUBSQhLJAm sXh3CxtEUbrEpU0nWCDsJIkdVxYygtgsAqoSi89OAdrAwcEr4CvR98MdYlkXi8T0rhnsIDWc QPWr118Eq2cEOu/7qTVgi5kFxCVuPZnPBHG2gMSSPeeZIWxRiZeP/7FC2EoSH3/PZ4eo15O4 MXUKG4StLbFs4Wuwel4BQYmTM5+wTGAUm4Vk7CwkLbOQtMxC0rKAkWUVI0dpcWpZbrqR4SZG YLQdk2Bz3MG44JPlIUYBDkYlHt4P8V5hQqyJZcWVuYcYJTiYlUR4i18BhXhTEiurUovy44tK c1KLDzFKc7AoifPOm3E/VEggPbEkNTs1tSC1CCbLxMEp1cA4PT5oddKmIl6p1izFq5cqj92J eXTvufez2GcsD6uWmDus9DCfM9mFpXvVjVf7txWcruTj+5D3VyzqVolyYOkypg3LW5omVoex WX3mXhJr6mkb/ePkRqeHmn1TqpYbrevP2JwTvrOF8/qkYqf1E/lbxAM7zGVyWZf1+RffVubk OBDb9onlh4USS3FGoqEWc1FxIgDH9YtbsgIAAA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/M83lrK5WhIEZKY_pweZW_oGhGzo>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 14:06:15 -0000

What is provisioned into the SFF reflects the SFP.  The control system deci=
des whether that SFP indicates the same set of all possible choices that th=
e SFC does, or is a proper subset. =20

In order to allow for an SFP that reflects meaningful constraints, what is =
provisioned has to be the SFP.
No special provision is needed for the case where the SFP is isomorphic to =
the SFC. In such a case, you still provision the SFP.  And the result is an=
 SFP with as much flexibility as the SFC.

If, in contrast, you declare that the provisioning includes the SFC then yo=
u are introducing extra complexity without adding any new cases that can be=
 handled.

Yours,
Joel

-----Original Message-----
From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]=20
Sent: Tuesday, November 17, 2015 9:03 AM
To: Joel Halpern; Paul Quinn (paulq)
Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org; sfc@iet=
f.org; Joel M. Halpern
Subject: RE: [sfc] #15 (control-plane): Whether the control plane operates =
on SFC IDs, SFP IDs, etc.

Hi Joel,=20

Please see inline.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel Halpern [mailto:joel.halpern@ericsson.com]
> Envoy=E9=A0: mardi 17 novembre 2015 14:49
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc=A0: sfc issue=20
> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Objet=A0: RE: [sfc] #15 (control-plane): Whether the control plane=20
> operates on SFC IDs, SFP IDs, etc.
>=20
> Your statement that " It happens that information is no more than the=20
> service chain itself (without any constraints)." (Where "it" refers to "
> the exact sequence of steps to be used to realize the SFC".) Does not=20
> make sense to me.

[Med] RFC 7665 says:

"   Thus, the policies and logic of SFP selection or creation (depending
   upon the solution) produce what may be thought of as a constrained
   version of the original SFC. "=20

in short: SFP is defined as a constrained version of the original SFC.

What is the name to use to refer to a "non-constrained" SFC or to the infor=
mation that you will provision to an SFF when the path computation and sele=
ction decision is "deferred to the SFF"?

It does not make sense to call a non-constrained version of the SFC as SFP =
given that RFC7665 explicitly defines SFP as "constrained version of the or=
iginal SFC"!

 The SFC is the general description of the objective.  That
> is not the same as the exact sequence of places that must be visited.
>=20
> I stand by my earlier comments that almost all uses of SFC in the=20
> control requirements draft should be SFP.
>=20

[Med] I noted that Joel.. that's fair but this position is IMHO not aligned=
 with RFC7665 that allows to control any variation from a non-constrained S=
FC to a fully constrained SFC.=20

> Yours,
> Joel
>=20
> -----Original Message-----
> From: mohamed.boucadair@orange.com=20
> [mailto:mohamed.boucadair@orange.com]
> Sent: Tuesday, November 17, 2015 8:34 AM
> To: Paul Quinn (paulq)
> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Subject: RE: [sfc] #15 (control-plane): Whether the control plane=20
> operates on SFC IDs, SFP IDs, etc.
>=20
> Hi Paul,
>=20
> Thank you for sharing your feedback.
>=20
> RFC7665 says the following:
>=20
> "
> This architecture does not mandate the degree of
>    specificity of the SFP.  Architecturally, within the same SFC-enabled
>    domain, some SFPs may be fully specified, selecting exactly which SFF
>    and which SF are to be visited by packets using that SFP, while other
>    SFPs may be quite vague, deferring to the SFF the decisions about the
>    exact sequence of steps to be used to realize the SFC.  The
>    specificity may be anywhere in between these extremes.
> "
>=20
> The control draft is completely aligned with that approach.
>=20
> The control-plane document allows in particular to provision required=20
> information when "deferring to the SFF the decisions about the
>    exact sequence of steps to be used to realize the SFC". It happens=20
> that information is no more than the service chain itself (without any=20
> constraints).
>=20
> Also, the current control-plane document allows to instruct a loose=20
> path
> (SFP) or a strict path (RSP), etc.
>=20
> I fully agree that whether a full path is specified within a domain or=20
> if it is deferred to SFFs is really deployment-specific. Nevertheless,=20
> the control plan should accommodate all these flavors.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9=A0: vendred=
i=20
> > 16 octobre 2015 14:04 =C0=A0: Joel M. Halpern Cc=A0: BOUCADAIR Mohamed=
=20
> > IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-=20
> > plane@tools.ietf.org; sfc@ietf.org Objet=A0: Re: [sfc] #15=20
> > (control-plane): Whether the control plane operates on SFC IDs, SFP IDs=
, etc.
> >
> > Joel,
> >
> > I concur.
> >
> > The data plane deal with paths, not chains.  The relationship of=20
> > paths to chains falls squarely in the control plane (or even more=20
> > likely
> "policy"
> > plane) realm.  The specificity of the path is left to=20
> > implementation, in the architecture draft, but that's consistent=20
> > with your position and provides the requisite functionality.
> >
> > Paul
> >
> > > On Sep 17, 2015, at 11:36 AM, Joel M. Halpern=20
> > > <jmh@joelhalpern.com>
> > wrote:
> > >
> > > As far as I can tell, there is nothing in the Service Chaining=20
> > > work that
> > requires correlating service path IDs with service chain IDs within=20
> > the data plane.  Any such relationship exists entirely within the=20
> > control plane or above, and would be driven by requirements other=20
> > than the data plane.  When I look at this document, all of the=20
> > requirements that talk about service function chain IDs can be=20
> > accurately captured, in terms of data plane requirements, by service fu=
nction path IDs.
> > Thus, the requirement that the data plane has is to see such path IDs.
> > Yes, in some deployments those will be 1-1 with chain IDs.  They are
> still path IDs.
> > >
> > > Introducing a requirement for the data plane to see and work with=20
> > > chain
> > IDs is not grounded in the work of the group.
> > >
> > > Yours,
> > > Joel M. Halpern
> > >
> > > On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
> > >> Re-,
> > >>
> > >> The control draft as it stands is compliant with the data plane
> > architecture document.
> > >>
> > >> Indeed, the arch draft acknowledges the following:
> > >> (1) SFPs are "associated with a given SFC".
> > >> (2) SFPs are presented as a form of constrained SFCs.
> > >> (3) Some deployments may not impose any constraint on the=20
> > >> abstract
> SFC


From nobody Tue Nov 17 06:28:05 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D35C1B32DD for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 06:28:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kxU0jCRqY8wk for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 06:28:02 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor34.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E14241B32DA for <sfc@ietf.org>; Tue, 17 Nov 2015 06:28:01 -0800 (PST)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr22.francetelecom.fr (ESMTP service) with ESMTP id 3EEBC2007E; Tue, 17 Nov 2015 15:28:00 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.32]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id 0175B1A0061; Tue, 17 Nov 2015 15:28:00 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0248.002; Tue, 17 Nov 2015 15:27:59 +0100
From: <mohamed.boucadair@orange.com>
To: Joel Halpern <joel.halpern@ericsson.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYl6OiFMYjzlEKe/O14io7+jJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAAfC8IAAAYXQgAADO9CAAAE/UA==
Date: Tue, 17 Nov 2015 14:27:58 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9F48D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se>
In-Reply-To: <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ZoiACSQGIRJ9D2mf_blKeRr9wfI>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 14:28:04 -0000

Re-,

Thank you for engaging.=20

Please see inline.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel Halpern [mailto:joel.halpern@ericsson.com]
> Envoy=E9=A0: mardi 17 novembre 2015 15:06
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq)
> Cc=A0: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Objet=A0: RE: [sfc] #15 (control-plane): Whether the control plane operat=
es
> on SFC IDs, SFP IDs, etc.
>=20
> What is provisioned into the SFF reflects the SFP.

[Med] Which one? Given than multiple SFPs may be bound to the same SFC=20

Excerpt from RFC7665:

" Since multiple policies may apply to
   different traffic that uses the same SFC, it also follows that there
   may be multiple SFPs associated with a single SFC."

The text talks about policies that are applied to the traffic whiteout any =
precision where these policies are applied.=20

  The control system
> decides whether that SFP indicates the same set of all possible choices
> that the SFC does, or is a proper subset.

[Med] That's indeed a valid case. The control plane accommodates that case.=
=20

>=20
> In order to allow for an SFP that reflects meaningful constraints, what i=
s
> provisioned has to be the SFP.

[Med] I would call that RSP. That's more clear.

> No special provision is needed for the case where the SFP is isomorphic t=
o
> the SFC. In such a case, you still provision the SFP.  And the result is
> an SFP with as much flexibility as the SFC.

[Med] This is confusing, Joel. SFP cannot be isomorphic to the SFC as the d=
efinition of an SFP is a "constrained version of SFC" (that is clearly ment=
ioned in RFC7665). I'm for more consistency in the use of the notions we ar=
e manipulating.=20

>=20
> If, in contrast, you declare that the provisioning includes the SFC then
> you are introducing extra complexity without adding any new cases that ca=
n
> be handled.

[Med] I'm not sure to see this extra complexity. I do even see benefits in =
having access to the SFC information allows, e.g., correlate between a serv=
ice path and a chain in deployments where a path may be shared among multip=
le chains.

>=20
> Yours,
> Joel
>=20
> -----Original Message-----
> From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
> Sent: Tuesday, November 17, 2015 9:03 AM
> To: Joel Halpern; Paul Quinn (paulq)
> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Subject: RE: [sfc] #15 (control-plane): Whether the control plane operate=
s
> on SFC IDs, SFP IDs, etc.
>=20
> Hi Joel,
>=20
> Please see inline.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: Joel Halpern [mailto:joel.halpern@ericsson.com]
> > Envoy=E9=A0: mardi 17 novembre 2015 14:49
> > =C0=A0: BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc=A0: sfc issue
> > tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> > sfc@ietf.org; Joel M. Halpern
> > Objet=A0: RE: [sfc] #15 (control-plane): Whether the control plane
> > operates on SFC IDs, SFP IDs, etc.
> >
> > Your statement that " It happens that information is no more than the
> > service chain itself (without any constraints)." (Where "it" refers to =
"
> > the exact sequence of steps to be used to realize the SFC".) Does not
> > make sense to me.
>=20
> [Med] RFC 7665 says:
>=20
> "   Thus, the policies and logic of SFP selection or creation (depending
>    upon the solution) produce what may be thought of as a constrained
>    version of the original SFC. "
>=20
> in short: SFP is defined as a constrained version of the original SFC.
>=20
> What is the name to use to refer to a "non-constrained" SFC or to the
> information that you will provision to an SFF when the path computation
> and selection decision is "deferred to the SFF"?
>=20
> It does not make sense to call a non-constrained version of the SFC as SF=
P
> given that RFC7665 explicitly defines SFP as "constrained version of the
> original SFC"!
>=20
>  The SFC is the general description of the objective.  That
> > is not the same as the exact sequence of places that must be visited.
> >
> > I stand by my earlier comments that almost all uses of SFC in the
> > control requirements draft should be SFP.
> >
>=20
> [Med] I noted that Joel.. that's fair but this position is IMHO not
> aligned with RFC7665 that allows to control any variation from a non-
> constrained SFC to a fully constrained SFC.
>=20
> > Yours,
> > Joel
> >
> > -----Original Message-----
> > From: mohamed.boucadair@orange.com
> > [mailto:mohamed.boucadair@orange.com]
> > Sent: Tuesday, November 17, 2015 8:34 AM
> > To: Paul Quinn (paulq)
> > Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> > sfc@ietf.org; Joel M. Halpern
> > Subject: RE: [sfc] #15 (control-plane): Whether the control plane
> > operates on SFC IDs, SFP IDs, etc.
> >
> > Hi Paul,
> >
> > Thank you for sharing your feedback.
> >
> > RFC7665 says the following:
> >
> > "
> > This architecture does not mandate the degree of
> >    specificity of the SFP.  Architecturally, within the same SFC-enable=
d
> >    domain, some SFPs may be fully specified, selecting exactly which SF=
F
> >    and which SF are to be visited by packets using that SFP, while othe=
r
> >    SFPs may be quite vague, deferring to the SFF the decisions about th=
e
> >    exact sequence of steps to be used to realize the SFC.  The
> >    specificity may be anywhere in between these extremes.
> > "
> >
> > The control draft is completely aligned with that approach.
> >
> > The control-plane document allows in particular to provision required
> > information when "deferring to the SFF the decisions about the
> >    exact sequence of steps to be used to realize the SFC". It happens
> > that information is no more than the service chain itself (without any
> > constraints).
> >
> > Also, the current control-plane document allows to instruct a loose
> > path
> > (SFP) or a strict path (RSP), etc.
> >
> > I fully agree that whether a full path is specified within a domain or
> > if it is deferred to SFFs is really deployment-specific. Nevertheless,
> > the control plan should accommodate all these flavors.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De=A0: Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9=A0: vendr=
edi
> > > 16 octobre 2015 14:04 =C0=A0: Joel M. Halpern Cc=A0: BOUCADAIR Mohame=
d
> > > IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
> > > plane@tools.ietf.org; sfc@ietf.org Objet=A0: Re: [sfc] #15
> > > (control-plane): Whether the control plane operates on SFC IDs, SFP
> IDs, etc.
> > >
> > > Joel,
> > >
> > > I concur.
> > >
> > > The data plane deal with paths, not chains.  The relationship of
> > > paths to chains falls squarely in the control plane (or even more
> > > likely
> > "policy"
> > > plane) realm.  The specificity of the path is left to
> > > implementation, in the architecture draft, but that's consistent
> > > with your position and provides the requisite functionality.
> > >
> > > Paul
> > >
> > > > On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
> > > > <jmh@joelhalpern.com>
> > > wrote:
> > > >
> > > > As far as I can tell, there is nothing in the Service Chaining
> > > > work that
> > > requires correlating service path IDs with service chain IDs within
> > > the data plane.  Any such relationship exists entirely within the
> > > control plane or above, and would be driven by requirements other
> > > than the data plane.  When I look at this document, all of the
> > > requirements that talk about service function chain IDs can be
> > > accurately captured, in terms of data plane requirements, by service
> function path IDs.
> > > Thus, the requirement that the data plane has is to see such path IDs=
.
> > > Yes, in some deployments those will be 1-1 with chain IDs.  They are
> > still path IDs.
> > > >
> > > > Introducing a requirement for the data plane to see and work with
> > > > chain
> > > IDs is not grounded in the work of the group.
> > > >
> > > > Yours,
> > > > Joel M. Halpern
> > > >
> > > > On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
> > > >> Re-,
> > > >>
> > > >> The control draft as it stands is compliant with the data plane
> > > architecture document.
> > > >>
> > > >> Indeed, the arch draft acknowledges the following:
> > > >> (1) SFPs are "associated with a given SFC".
> > > >> (2) SFPs are presented as a form of constrained SFCs.
> > > >> (3) Some deployments may not impose any constraint on the
> > > >> abstract
> > SFC


From nobody Tue Nov 17 10:14:33 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FD861A916B for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 10:14:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.485
X-Spam-Level: 
X-Spam-Status: No, score=-14.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o2WBvudai2ur for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 10:14:23 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDB401A90F8 for <sfc@ietf.org>; Tue, 17 Nov 2015 10:14:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=168779; q=dns/txt; s=iport; t=1447784062; x=1448993662; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=WFoRdvWc+KNJHL9pCiXC98osy2r1bBcXpqWEsknj7W0=; b=LwRF2P4Wm9knION7eNlC4RBJfEMyH3OvOza/xyPodidNCUI2IP4c//lI R1dDxfO3nr+YftyBF9h1xOqMNcDlJ3BJ8VhPM8J0AAPldy8vjme073QE+ Mf2/QqNTdH8ANJAg0KjgLECgdF9SKS8KqjIz3Wg6pNJ3qFJO/wDDZoIzS w=;
X-Files: image001.png : 85906
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DLAgCLbUtW/4YNJK1bA4JuTVNvBr5bD?= =?us-ascii?q?oFlhg8CgVA4FAEBAQEBAQGBCoQ0AQEBBAUJDAsCBgE3BwoTAgEIEQECAQEBBgE?= =?us-ascii?q?BARgBBgcCBRABDgwUAwYIAgQBEQEGAgaIILxLAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBDwmLUoRoCQoBFQQNhBcBBIgdikqDYgGENgGIbIFihECDJYoxhGKDcQEfAUO?= =?us-ascii?q?CER2BVnKEA4EHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,309,1444694400";  d="png'150?scan'150,208,217,150";a="51418314"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 17 Nov 2015 18:14:19 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id tAHIEKAx014781 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 17 Nov 2015 18:14:20 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 17 Nov 2015 12:14:19 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Tue, 17 Nov 2015 12:14:18 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y8jcAgAABkICAAOF6AIAAHe8AgACfQICAA37B8IAB8loAgAB2o2A=
Date: Tue, 17 Nov 2015 18:14:18 +0000
Message-ID: <fe5dab2b6e604654a7c81fa902a35852@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com> <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com> <7E05C330D7FD6D4FAD0728C46B89958589139434@ORSMSX112.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958589139434@ORSMSX112.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.114.180]
Content-Type: multipart/related; boundary="_004_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_"; type="multipart/alternative"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/voT2MHe1xEsuZkClUWm54NFeFEA>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 18:14:31 -0000

--_004_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_
Content-Type: multipart/alternative;
	boundary="_000_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_"

--_000_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Uri,

I've tried consolidate the crux of your other comments here to do a single =
response, please correct me if I misstate any of your comments/response or =
if I'm taking them out of context.

Uri>>SF are not making forwarding decisions, however they can influence the=
m.
SK2> SI dictates what the next hop is at the SFF. IOW, this index clearly i=
nstructs the SFF where the packet must be sent next. An SI value of 2 may m=
ean send to a FW or 1 may mean the chain is done and forward on the underla=
y, etc.. So, this is not influencing, this is the actual decision - let's n=
ot confuse this. Also, this is not random, this is all programmed by the co=
ntrol plane.

Uri>>As to the SI vs SPI: if the criteria prevent damage to thy neighboring=
 chain, SI decrement is not a issue.
SK2> SFF is the one with the steering tables, which is programmed by the co=
ntrol plane dictating how the packets should be steered. There is a well fo=
rmulated structure that control plane manages. If an entity other than SFF =
wants to decrement, then that should be under control planes control to ens=
ure packet forwarding on the overlay network is correct. Otherwise you have=
 a wild west. By allowing this, you are removing the distinction between SF=
 and SFF - you might as well collapse them into one. The control plane now =
not only needs to manage the service chains but also the SFs - becomes intr=
actable.

Uri>> ...And it is an indication of the SF being alve and doing some action=
 which may be better option that he SFF blindly decrementing SI
SK2> As for knowing whether SF is alive, you don't need a decrement from th=
e SF, the fact that the SFF is receiving the packet from that SF is indicat=
ion enough. Anything beyond needs to well defined in the context of OAM and=
 not overload forwarding with OAM.

Uri>> Clearly some SFs must be trusted e.g. NAT. NAT  is an example of an S=
F that is part of the infrastructure.
SK2> This came up at the open-mic in Yokohama, I think Kent or someone had =
some good comments on it. NAT brings up a lot of questions. And so does rou=
ting that is part of many traditional firewalls or load balancers, which Ni=
colas brought up. As an example, what happens to the overlay when the packe=
t is transformed through a SF - does it terminate, or is it replaced with a=
 new one or continues through it ? What are the implications of each ? What=
 happens to the SPI+SI? It is not a question of mechanics but the underlay/=
overlay semantics come into picture to keep packet forwarding correctness i=
n the networks. Beyond that, what does it map to in SFC architecture, etc.

SK2> While I am happy to contribute to the NAT discussion, the SI issue we =
are talking does not warrant that - it is much general: SF vs. SFF. I would=
 prefer as WG, we address the SI even before we get to the NAT part to demo=
nstrate SFC with NSH is viable in real-world.

Finally, thanks for the SI snippet below. The "MUST" in that is the problem=
. Until the WG resolves this, please remove this requirement. It simply doe=
s not make sense to mix network forwarding with service delivery - they are=
 two distinct things. Let implementations make the right decision.

Surendra.

From: Elzur, Uri [mailto:uri.elzur@intel.com]
Sent: Monday, November 16, 2015 8:01 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com>; Reinaldo Penno (repenno) =
<repenno@cisco.com>; Jim Guichard (jguichar) <jguichar@cisco.com>; sfc@ietf=
.org
Subject: RE: [sfc] will you trust your SF?

Draft-quinn-sfc-nsh-07 form February of this year has

[cid:image001.png@01D12117.69E206C0]

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 10:26 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?


[Skipping to the top of this thread and repeating some things from previous=
 responses.]

Keep the separation

*        between packet forwarding and service delivery

*        between application and infrastructure

*        between metadata and forwarding data

*        etc.

Simple SFs without forwarding constraints enables SFs to focus on service d=
elivery and not service chaining and forwarding complexity, that goes into =
the SFFs. Enable SFs to consume metadata for value added service delivery a=
nd not for packet forwarding, that belongs in SFF.

Operators want the flexibility to on-board any SF into the service plane wi=
thout having to concern themselves about how that affects packet forwarding=
 in their infrastructure. Whether SF is trusted or not, SF must stay off do=
ing the SFF's job.

If ETSI/NFV is any guide, this separation in operators' view should be obvi=
ous.

NSH draft until the last couple of revisions stayed off the normative langu=
age in this regard and is misguided in specifying, for instance, the decrem=
ent of SI at SF as opposed to SFF. This tosses architecture robustness out =
the window.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, November 13, 2015 8:55 AM
To: Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>;=
 Jim Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an "SF=
 can be trusted for NSH purposes"  then it can lead to some simplifications=
, I believe
SK>

I'm also ok leaving status quo as-is with a delicate balance of SF, SFF and=
 proxy roles. But I do think that making the assumption like you make, that=
 the issue of the SF being rogue or not is beyond this WG scope, can simpli=
fy our drafts. At the same time, we need to agree to the NSH SPECIFC securi=
ty aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF."

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1549730092;
	mso-list-type:hybrid;
	mso-list-template-ids:1576017144 -2080577320 67698691 67698693 67698689 67=
698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:3;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Hi Uri,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">I&#8217;ve tried consolidate the crux of your other=
 comments here to do a single response, please correct me if I misstate any=
 of your comments/response or if I&#8217;m taking them out
 of context. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000">Uri&gt;&gt;SF are not making forwardi=
ng decisions, however they can influence them.</span><o:p></o:p></p>
<p class=3D"MsoNormal">SK2&gt; SI dictates what the next hop is at the SFF.=
 IOW, this index clearly instructs the SFF where the packet must be sent ne=
xt. An SI value of 2 may mean send to a FW or 1 may mean the chain is done =
and forward on the underlay, etc.. So,
 this is not influencing, this is the actual decision - let&#8217;s not con=
fuse this. Also, this is not random, this is all programmed by the control =
plane.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000">Uri&gt;&gt;As to the S=
I vs SPI: if the criteria prevent damage to thy neighboring chain, SI decre=
ment is not a issue.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; SFF is the one with the steering tables, wh=
ich is programmed by the control plane dictating how the packets should be =
steered. There is a well formulated structure that
 control plane manages. If an entity other than SFF wants to decrement, the=
n that should be under control planes control to ensure packet forwarding o=
n the overlay network is correct. Otherwise you have a wild west. By allowi=
ng this, you are removing the distinction
 between SF and SFF &#8211; you might as well collapse them into one. The c=
ontrol plane now not only needs to manage the service chains but also the S=
Fs - becomes intractable.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000">Uri&gt;&gt; &#8230;And=
 it is an indication of the SF being alve and doing some action which may b=
e better option that he SFF blindly decrementing SI</span><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Candara&quot;,sans-serif;color:#C00000"><o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; As for knowing whether SF is alive, you don=
&#8217;t need a decrement from the SF, the fact that the SFF is receiving t=
he packet from that SF is indication enough. Anything beyond
 needs to well defined in the context of OAM and not overload forwarding wi=
th OAM.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000">Uri&gt;&gt;</span><span style=3D"colo=
r:#C00000"> Clearly some SFs must be trusted e.g. NAT. NAT&nbsp; is an exam=
ple of an SF that is part of the infrastructure.</span><span style=3D"font-=
size:10.0pt;font-family:&quot;Candara&quot;,sans-serif;color:#C00000"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; This came up at the open-mic in Yokohama, I=
 think Kent or someone had some good comments on it. NAT brings up a lot of=
 questions. And so does routing that is part of many
 traditional firewalls or load balancers, which Nicolas brought up. As an e=
xample, what happens to the overlay when the packet is transformed through =
a SF &#8211; does it terminate, or is it replaced with a new one or continu=
es through it ? What are the implications
 of each ? What happens to the SPI&#43;SI? It is not a question of mechanic=
s but the underlay/overlay semantics come into picture to keep packet forwa=
rding correctness in the networks. Beyond that, what does it map to in SFC =
architecture, etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; While I am happy to contribute to the NAT d=
iscussion, the SI issue we are talking does not warrant that &#8211; it is =
much general: SF vs. SFF. I would prefer as WG, we address
 the SI even before we get to the NAT part to demonstrate SFC with NSH is v=
iable in real-world.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Finally, thanks for the SI snippet below. The &#822=
0;MUST&#8221; in that is the problem. Until the WG resolves this, please re=
move this requirement. It simply does not make sense to mix
 network forwarding with service delivery &#8211; they are two distinct thi=
ngs. Let implementations make the right decision.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Elzur, Uri [mailto:uri.elzur@intel.com]=
 <br>
<b>Sent:</b> Monday, November 16, 2015 8:01 PM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;smkumar@cisco.com&gt;; Reinaldo Pen=
no (repenno) &lt;repenno@cisco.com&gt;; Jim Guichard (jguichar) &lt;jguicha=
r@cisco.com&gt;; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Draft-quinn-sfc-nsh-07 form February of this year has
</span></a><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img width=3D"1029" he=
ight=3D"93" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D12120.5B47896=
0" alt=3D"cid:image001.png@01D12117.69E206C0"></span><span style=3D"color:#=
1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Surendra Kumar (smkumar) [<a href=3D"ma=
ilto:smkumar@cisco.com">mailto:smkumar@cisco.com</a>]
<br>
<b>Sent:</b> Sunday, November 15, 2015 10:26 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); <=
a href=3D"mailto:sfc@ietf.org">
sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">[Skipping to the top of this thread and repeating s=
ome things from previous responses.]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Keep the separation
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between packet forwarding and service deliv=
ery<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between application and infrastructure<o:p>=
</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">between metadata and forwarding data<o:p></=
o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol"><span style=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &qu=
ot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Candara&quot;,sans-serif">etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Simple SFs without forwarding constraints enables S=
Fs to focus on service delivery and not service chaining and forwarding com=
plexity, that goes into the SFFs. Enable SFs to
 consume metadata for value added service delivery and not for packet forwa=
rding, that belongs in SFF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Operators want the flexibility to on-board any SF i=
nto the service plane without having to concern themselves about how that a=
ffects packet forwarding in their infrastructure.
 Whether SF is trusted or not, SF must stay off doing the SFF&#8217;s job.<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">If ETSI/NFV is any guide, this separation in operat=
ors&#8217; view should be obvious.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">NSH draft until the last couple of revisions stayed=
 off the normative language in this regard and is misguided in specifying, =
for instance, the decrement of SI at SF as opposed
 to SFF. This tosses architecture robustness out the window.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Friday, November 13, 2015 8:55 AM<br>
<b>To:</b> Reinaldo Penno (repenno) &lt;<a href=3D"mailto:repenno@cisco.com=
">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;<a href=3D"mailto:=
jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Reinaldo<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an &#8220;SF can be trusted for=
 NSH purposes&#8221; &nbsp;then it can lead to some simplifications, I beli=
eve<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m also ok leav=
ing status quo as-is with a delicate balance of SF, SFF and proxy roles. Bu=
t I do think that making the assumption like you make, that the issue of th=
e SF being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.&#8221;</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a><span style=3D"color:black">&g=
t;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;</span><a href=3D"mailto:repenno@cisco.com">r=
epenno@cisco.com</a><span style=3D"color:black">&gt;, &quot;Jim Guichard (j=
guichar)&quot; &lt;</span><a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a><span style=3D"color:black">&gt;, &quot;</span><a href=3D"mailto=
:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:black">&quot;
 &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"=
color:black">&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [</span><a href=3D"mailto:=
repenno@cisco.com">mailto:repenno@cisco.com</a><span style=3D"color:black">=
]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; </span><a href=3D"mailto:sf=
c@ietf.org">sfc@ietf.org</a><span style=3D"color:black"><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Jim Guichard (jguichar)&quot; &lt;</span><a href=3D"mailto:jguichar@ci=
sco.com">jguichar@cisco.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [</span><a href=3D"mailto:sfc-bounces@ietf.org"=
>mailto:sfc-bounces@ietf.org</a><span style=3D"color:black">]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span sty=
le=3D"color:black"><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_--

--_004_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=85906;
	creation-date="Tue, 17 Nov 2015 18:14:17 GMT";
	modification-date="Tue, 17 Nov 2015 18:14:17 GMT"
Content-ID: <image001.png@01D12120.5B478960>
Content-Transfer-Encoding: base64
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--_004_fe5dab2b6e604654a7c81fa902a35852XCHRCD020ciscocom_--


From nobody Tue Nov 17 10:15:51 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F03A01B3060 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 10:15:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qyRRBvT3COQA for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 10:15:47 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56F021B305E for <sfc@ietf.org>; Tue, 17 Nov 2015 10:15:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13798; q=dns/txt; s=iport; t=1447784146; x=1448993746; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=vFxcnUhuZCUCd3zl+fwsUeHZmN8+yVmBq4uqavGeZYo=; b=FKLsVvR5cNCpSXEp0lAdcLGxYH1PStzITrxWafZcQysH6WiA5H2wRvsA 7OyXbMcmpd4cI7/fKcsRqbrR1Prkyq3CUzcvjfaZPry1o4hQot0zhPcCp ckUMVmOO/abp9/YDIqNRIAhgLVmv7dGafZF9O6tMdV66GU0kyWJHxOgut M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AUAgA2bktW/5tdJa1bA4M7U28GgmG7e?= =?us-ascii?q?gENgWUXCoVuAhyBNDgUAQEBAQEBAYEKhDQBAQEEAQEBCRcRIBoXBAIBBgIRAQM?= =?us-ascii?q?BAQECAiMDAgICJQsUAQIGCAIEARIIE4gTDY5TnTWQNgEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBARQEgQGJS4EGhDsBATQLCxuCU4FEBZJng2IBhiqGeYFihECNVoRig3E?= =?us-ascii?q?BHwEBQoIRHYFWcoNJOoEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,309,1444694400"; d="scan'208";a="47727154"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Nov 2015 18:15:45 +0000
Received: from XCH-RCD-020.cisco.com (xch-rcd-020.cisco.com [173.37.102.30]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id tAHIFj0l026267 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 17 Nov 2015 18:15:45 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-020.cisco.com (173.37.102.30) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 17 Nov 2015 12:15:44 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Tue, 17 Nov 2015 12:15:44 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Nicolas BOUTHORS <Nicolas.BOUTHORS@qosmos.com>, "Elzur, Uri" <uri.elzur@intel.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y5m8AgATVnoCAAWT8AIAA45GAgABQBgCAADggEA==
Date: Tue, 17 Nov 2015 18:15:44 +0000
Message-ID: <d26bbbba386c41a98298c1a1adf7d1d6@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <5644AED2.4070000@joelhalpern.com> <8b2582694db94bb6b8bcbd047531361a@XCH-RCD-020.cisco.com> <76B41B8FACE1514795D30EC137FF391D8B3C89@CAROUBIER.jungle.qosmos.com> <7E05C330D7FD6D4FAD0728C46B89958589139456@ORSMSX112.amr.corp.intel.com> <76B41B8FACE1514795D30EC137FF391D8B3EB0@CAROUBIER.jungle.qosmos.com>
In-Reply-To: <76B41B8FACE1514795D30EC137FF391D8B3EB0@CAROUBIER.jungle.qosmos.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.114.180]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/dLIdDjVynXxFWhXjZfdnZVG8Y9U>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 18:15:50 -0000
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=


From nobody Tue Nov 17 10:48:58 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 335291A6EDC for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 10:48:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KP9ZnPYG989C for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 10:48:51 -0800 (PST)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5785F1A21C2 for <sfc@ietf.org>; Tue, 17 Nov 2015 10:48:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=162552; q=dns/txt; s=iport; t=1447786131; x=1448995731; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=CFfoNgn1dlA64s50M20sFi8pHP8hogJIIRGoBP7S0NM=; b=b2o3U0F6lNdlOHToPkvYsflYWAMTTcoqU8Fc8+FQ97L72B94bTqMgeWt vLU4ST5/ffo6y9MOffkPBxNxmcN3rKch0ANm+0ZTldQIjeUGVn8aBn3Hd zcjMk2XXcbS4Sa9gKlazAvpJq5baO0rxuRIkjImOVm5rUSPmtV5/6jcrZ 8=;
X-Files: image001.png : 85906
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DLAgCEdUtW/4MNJK1bA4JuTVNvBr5bD?= =?us-ascii?q?oFlhg8CgVA4FAEBAQEBAQGBCoQ0AQEBBAUJFwIGATcHChMCAQgRAQIBAQEGAQE?= =?us-ascii?q?BGAEGBwIVAQ4MFAMGCAIEAREBBgiIILxNAQEBAQEBAQEBAQEBAQEBAQEBAQEBD?= =?us-ascii?q?wmGVIR+hGgJCgEVBA2EFwEEiB2KSoNiAYJWgWABiHOBW4RAgyWKMYRig3EBHwF?= =?us-ascii?q?DghEdgVZyhAOBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,309,1444694400";  d="png'150?scan'150,208,217,150";a="207948767"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 17 Nov 2015 18:48:50 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tAHImnSW008069 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 17 Nov 2015 18:48:49 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 17 Nov 2015 12:48:49 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Tue, 17 Nov 2015 12:48:49 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>, "Reinaldo Penno (repenno)" <repenno@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVa0+xTCDtVR0Ky6Lo8W+YR+Z6YnmKA///PSICAAWeXAP//l8+AgAElYICABAdZgIABacIAgADuawD//7XPgA==
Date: Tue, 17 Nov 2015 18:48:48 +0000
Message-ID: <D270DA0C.2E4EA%jguichar@cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com> <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com> <7E05C330D7FD6D4FAD0728C46B89958589139434@ORSMSX112.amr.corp.intel.com> <fe5dab2b6e604654a7c81fa902a35852@XCH-RCD-020.cisco.com>
In-Reply-To: <fe5dab2b6e604654a7c81fa902a35852@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.131.118.35]
Content-Type: multipart/mixed; boundary="_004_D270DA0C2E4EAjguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8FSn446NhgUHRMm9QE38YUoNTAc>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 18:48:56 -0000

--_004_D270DA0C2E4EAjguicharciscocom_
Content-Type: multipart/alternative;
	boundary="_000_D270DA0C2E4EAjguicharciscocom_"

--_000_D270DA0C2E4EAjguicharciscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi Surendra,

>Finally, thanks for the SI snippet below. The =93MUST=94 in that is the pr=
oblem. Until the WG resolves this, please remove this requirement. It simpl=
y does not make sense to mix network forwarding with service delivery =96 >=
they are two distinct things. Let implementations make the right decision.

Jim> removal of text from a WG document is a decision that the WG needs to =
make based on consensus (as determined by the chairs). This issue is not re=
solved and consensus must be reached before any change to the text is made.

Jim

From: Elzur, Uri [mailto:uri.elzur@intel.com]
Sent: Monday, November 16, 2015 8:01 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com<mailto:smkumar@cisco.com>>;=
 Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>; Ji=
m Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; sfc@=
ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?

Draft-quinn-sfc-nsh-07 form February of this year has

[cid:image001.png@01D12117.69E206C0]

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 10:26 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?


[Skipping to the top of this thread and repeating some things from previous=
 responses.]

Keep the separation

=B7        between packet forwarding and service delivery

=B7        between application and infrastructure

=B7        between metadata and forwarding data

=B7        etc.

Simple SFs without forwarding constraints enables SFs to focus on service d=
elivery and not service chaining and forwarding complexity, that goes into =
the SFFs. Enable SFs to consume metadata for value added service delivery a=
nd not for packet forwarding, that belongs in SFF.

Operators want the flexibility to on-board any SF into the service plane wi=
thout having to concern themselves about how that affects packet forwarding=
 in their infrastructure. Whether SF is trusted or not, SF must stay off do=
ing the SFF=92s job.

If ETSI/NFV is any guide, this separation in operators=92 view should be ob=
vious.

NSH draft until the last couple of revisions stayed off the normative langu=
age in this regard and is misguided in specifying, for instance, the decrem=
ent of SI at SF as opposed to SFF. This tosses architecture robustness out =
the window.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, November 13, 2015 8:55 AM
To: Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>;=
 Jim Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an =93=
SF can be trusted for NSH purposes=94  then it can lead to some simplificat=
ions, I believe
SK>

I=92m also ok leaving status quo as-is with a delicate balance of SF, SFF a=
nd proxy roles. But I do think that making the assumption like you make, th=
at the issue of the SF being rogue or not is beyond this WG scope, can simp=
lify our drafts. At the same time, we need to agree to the NSH SPECIFC secu=
rity aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.=94

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off =85]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things =96 add routes to VRFs that=
 should not be there, put interfaces into the wrong VRF, inject routes that=
 force traffic in a certain direction, the list goes on and on and on .. Wh=
at I can do from an SFC perspective is verify traffic from SF->SFF (which I=
 need for loop prevention anyway) to make sure that packets received from a=
n SF comply with the SFP policy implemented at the SFF e.g. I only expect t=
o receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I=92d like to surfa=
ce this issue and hopefully it can be easily and quickly resolved. In the d=
iscussion about Map assisted SFC Proxy, we discussed the potential of an SF=
 (e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention =
may be needed in such case to update the map (as the new 5 tuple may not be=
 there) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a =93Classifier=94 is incorporated). If not, the SFF (or the Pro=
xy) has to keep that state and VERIFY it on the outbound=85

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri (=93Oo-Ree=94)
C: 949-378-7568


--_000_D270DA0C2E4EAjguicharciscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <CF5CF4D18D98954E9A255B5639A6181B@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px;">
<div style=3D"font-family: Calibri, sans-serif;"><span style=3D"font-family=
: Candara, sans-serif; font-size: 10pt;">Hi Surendra,</span></div>
<div style=3D"font-family: Calibri, sans-serif;"><span style=3D"font-family=
: Candara, sans-serif; font-size: 10pt;">&nbsp;</span></div>
<span id=3D"OLK_SRC_BODY_SECTION" style=3D"font-family: Calibri, sans-serif=
;">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">&gt;Finally, thanks for the SI snippet below. The =
=93MUST=94 in that is the problem. Until the WG resolves this, please remov=
e this requirement. It simply does not make sense to mix
 network forwarding with service delivery =96 &gt;they are two distinct thi=
ngs. Let implementations make the right decision.</span></p>
</div>
</div>
</div>
</span>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;">Jim&gt; removal of text fr=
om a WG document is a decision that the WG needs to make based on consensus=
 (as determined by the chairs). This issue is not resolved and consensus mu=
st be reached before any change to the
 text is made.</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal" style=3D"font-family: Calibri, sans-serif;"><span st=
yle=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,sans-serif"><o:p></=
o:p></span></p>
<p class=3D"MsoNormal" style=3D"font-family: Calibri, sans-serif;"><span st=
yle=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,sans-serif"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 10pt;"><o:p><font face=3D"=
Calibri">Jim</font></o:p></span></p>
</div>
</div>
</div>
</span>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION" style=3D"font-family: Calibri, sans-serif=
;">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Elzur, Uri [<a href=3D"mailto:uri.elzur=
@intel.com">mailto:uri.elzur@intel.com</a>]
<br>
<b>Sent:</b> Monday, November 16, 2015 8:01 PM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;<a href=3D"mailto:smkumar@cisco.com=
">smkumar@cisco.com</a>&gt;; Reinaldo Penno (repenno) &lt;<a href=3D"mailto=
:repenno@cisco.com">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;=
<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Draft-quinn-sfc-nsh-07 form February of this year has
</span></a><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img width=3D"1029" he=
ight=3D"93" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D12120.5B47896=
0" alt=3D"cid:image001.png@01D12117.69E206C0"></span><span style=3D"color:#=
1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Surendra Kumar (smkumar) [<a href=3D"ma=
ilto:smkumar@cisco.com">mailto:smkumar@cisco.com</a>]
<br>
<b>Sent:</b> Sunday, November 15, 2015 10:26 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); <=
a href=3D"mailto:sfc@ietf.org">
sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">[Skipping to the top of this thread and repeating s=
ome things from previous responses.]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Keep the separation
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><!--[if !supportLists]--><span style=3D"font-size: 10pt;"><span sty=
le=3D"mso-list:Ignore">=B7<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; font-fami=
ly: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><!--[endif]--><span style=3D"font-size:10.0pt;font-fam=
ily:&quot;Candara&quot;,sans-serif">between packet forwarding and service d=
elivery<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><!--[if !supportLists]--><span style=3D"font-size: 10pt;"><span sty=
le=3D"mso-list:Ignore">=B7<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; font-fami=
ly: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><!--[endif]--><span style=3D"font-size:10.0pt;font-fam=
ily:&quot;Candara&quot;,sans-serif">between application and infrastructure<=
o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><!--[if !supportLists]--><span style=3D"font-size: 10pt;"><span sty=
le=3D"mso-list:Ignore">=B7<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; font-fami=
ly: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><!--[endif]--><span style=3D"font-size:10.0pt;font-fam=
ily:&quot;Candara&quot;,sans-serif">between metadata and forwarding data<o:=
p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><!--[if !supportLists]--><span style=3D"font-size: 10pt;"><span sty=
le=3D"mso-list:Ignore">=B7<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; font-fami=
ly: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><!--[endif]--><span style=3D"font-size:10.0pt;font-fam=
ily:&quot;Candara&quot;,sans-serif">etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Simple SFs without forwarding constraints enables S=
Fs to focus on service delivery and not service chaining and forwarding com=
plexity, that goes into the SFFs. Enable SFs to
 consume metadata for value added service delivery and not for packet forwa=
rding, that belongs in SFF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Operators want the flexibility to on-board any SF i=
nto the service plane without having to concern themselves about how that a=
ffects packet forwarding in their infrastructure.
 Whether SF is trusted or not, SF must stay off doing the SFF=92s job.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">If ETSI/NFV is any guide, this separation in operat=
ors=92 view should be obvious.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">NSH draft until the last couple of revisions stayed=
 off the normative language in this regard and is misguided in specifying, =
for instance, the decrement of SI at SF as opposed
 to SFF. This tosses architecture robustness out the window.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Friday, November 13, 2015 8:55 AM<br>
<b>To:</b> Reinaldo Penno (repenno) &lt;<a href=3D"mailto:repenno@cisco.com=
">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;<a href=3D"mailto:=
jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Reinaldo<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an =93SF can be trusted for NSH=
 purposes=94 &nbsp;then it can lead to some simplifications, I believe<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I=92m also ok leaving =
status quo as-is with a delicate balance of SF, SFF and proxy roles. But I =
do think that making the assumption like you make, that the issue of the SF=
 being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.=94</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a><span style=3D"color:black">&g=
t;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;</span><a href=3D"mailto:repenno@cisco.com">r=
epenno@cisco.com</a><span style=3D"color:black">&gt;, &quot;Jim Guichard (j=
guichar)&quot; &lt;</span><a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a><span style=3D"color:black">&gt;, &quot;</span><a href=3D"mailto=
:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:black">&quot;
 &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"=
color:black">&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [</span><a href=3D"mailto:=
repenno@cisco.com">mailto:repenno@cisco.com</a><span style=3D"color:black">=
]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; </span><a href=3D"mailto:sf=
c@ietf.org">sfc@ietf.org</a><span style=3D"color:black"><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Jim Guichard (jguichar)&quot; &lt;</span><a href=3D"mailto:jguichar@ci=
sco.com">jguichar@cisco.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off =85]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things =96 add routes to VRFs =
that should not be there, put interfaces into the wrong VRF, inject routes =
that force traffic in a certain direction, the list goes on and on and on .=
. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [</span><a href=3D"mailto:sfc-bounces@ietf.org"=
>mailto:sfc-bounces@ietf.org</a><span style=3D"color:black">]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span sty=
le=3D"color:black"><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I=92d like to surface this issue and hope=
fully it can be easily and quickly resolved. In the discussion about Map as=
sisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a =93Classifier=94 is incorporated). If not, th=
e SFF (or the Proxy) has to keep that state and VERIFY it on the outbound=
=85</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (=93Oo-Ree=94)</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</span><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1549730092;
	mso-list-type:hybrid;
	mso-list-template-ids:1576017144 -2080577320 67698691 67698693 67698689 67=
698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:3;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style>
</body>
</html>

--_000_D270DA0C2E4EAjguicharciscocom_--

--_004_D270DA0C2E4EAjguicharciscocom_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: attachment; filename="image001.png"; size=85906;
	creation-date="Tue, 17 Nov 2015 18:48:48 GMT";
	modification-date="Tue, 17 Nov 2015 18:48:48 GMT"
Content-ID: <image001.png@01D12120.5B478960>
Content-Transfer-Encoding: base64
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--_004_D270DA0C2E4EAjguicharciscocom_--


From nobody Tue Nov 17 11:46:13 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA1561A8702 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 11:46:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.584
X-Spam-Level: 
X-Spam-Status: No, score=-2.584 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wLSbG-45IIGp for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 11:46:01 -0800 (PST)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 263FE1A8701 for <sfc@ietf.org>; Tue, 17 Nov 2015 11:46:00 -0800 (PST)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by wtl-exchp-1.sandvine.com (192.168.194.178) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 17 Nov 2015 14:45:59 -0500
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Tue, 17 Nov 2015 14:46:01 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "Surendra Kumar (smkumar)" <smkumar@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>, "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVZFiGO/1AuG0GyjOiLT/Ut556Y4XQAgAABj4CAAOF7AIAAHe4AgACfQYCABAdYgIABacMAgADuawD//8Q4QA==
Date: Tue, 17 Nov 2015 19:46:00 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830DAA925@wtl-exchp-2.sandvine.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com> <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com> <7E05C330D7FD6D4FAD0728C46B89958589139434@ORSMSX112.amr.corp.intel.com> <fe5dab2b6e604654a7c81fa902a35852@XCH-RCD-020.cisco.com>
In-Reply-To: <fe5dab2b6e604654a7c81fa902a35852@XCH-RCD-020.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
Content-Type: multipart/related; boundary="_004_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_"; type="multipart/alternative"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/wM_B-hkthTyIpqP80yzzIxZPqXc>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 19:46:10 -0000

--_004_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_
Content-Type: multipart/alternative;
	boundary="_000_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_"

--_000_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Surendra,
In your comment,
SK2> As for knowing whether SF is alive, you don't need a decrement from th=
e SF, the fact that the SFF is receiving the packet from that SF is indicat=
ion enough.

You are making an assumption that it is easy for an SFF to determine where =
a packet came from. This may be true for local direct connections, but in o=
ther cases would require checking source MAC addresses or source IP address=
es (if these can even be trusted). Upon receiving a packet, decide whether =
it came from an SF or an SFF in order to decide whether to decrement the SI=
 or not.

As currently defined, with the SF decrementing the index, the SFF can forwa=
rd the packet purely based on lookup tables indexed by {SPI,SI}.


-Dave



From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar (smkuma=
r)
Sent: Tuesday, November 17, 2015 1:14 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org
Subject: Re: [sfc] will you trust your SF?

Hi Uri,

I've tried consolidate the crux of your other comments here to do a single =
response, please correct me if I misstate any of your comments/response or =
if I'm taking them out of context.

Uri>>SF are not making forwarding decisions, however they can influence the=
m.
SK2> SI dictates what the next hop is at the SFF. IOW, this index clearly i=
nstructs the SFF where the packet must be sent next. An SI value of 2 may m=
ean send to a FW or 1 may mean the chain is done and forward on the underla=
y, etc.. So, this is not influencing, this is the actual decision - let's n=
ot confuse this. Also, this is not random, this is all programmed by the co=
ntrol plane.

Uri>>As to the SI vs SPI: if the criteria prevent damage to thy neighboring=
 chain, SI decrement is not a issue.
SK2> SFF is the one with the steering tables, which is programmed by the co=
ntrol plane dictating how the packets should be steered. There is a well fo=
rmulated structure that control plane manages. If an entity other than SFF =
wants to decrement, then that should be under control planes control to ens=
ure packet forwarding on the overlay network is correct. Otherwise you have=
 a wild west. By allowing this, you are removing the distinction between SF=
 and SFF - you might as well collapse them into one. The control plane now =
not only needs to manage the service chains but also the SFs - becomes intr=
actable.

Uri>> ...And it is an indication of the SF being alve and doing some action=
 which may be better option that he SFF blindly decrementing SI
SK2> As for knowing whether SF is alive, you don't need a decrement from th=
e SF, the fact that the SFF is receiving the packet from that SF is indicat=
ion enough. Anything beyond needs to well defined in the context of OAM and=
 not overload forwarding with OAM.

Uri>> Clearly some SFs must be trusted e.g. NAT. NAT  is an example of an S=
F that is part of the infrastructure.
SK2> This came up at the open-mic in Yokohama, I think Kent or someone had =
some good comments on it. NAT brings up a lot of questions. And so does rou=
ting that is part of many traditional firewalls or load balancers, which Ni=
colas brought up. As an example, what happens to the overlay when the packe=
t is transformed through a SF - does it terminate, or is it replaced with a=
 new one or continues through it ? What are the implications of each ? What=
 happens to the SPI+SI? It is not a question of mechanics but the underlay/=
overlay semantics come into picture to keep packet forwarding correctness i=
n the networks. Beyond that, what does it map to in SFC architecture, etc.

SK2> While I am happy to contribute to the NAT discussion, the SI issue we =
are talking does not warrant that - it is much general: SF vs. SFF. I would=
 prefer as WG, we address the SI even before we get to the NAT part to demo=
nstrate SFC with NSH is viable in real-world.

Finally, thanks for the SI snippet below. The "MUST" in that is the problem=
. Until the WG resolves this, please remove this requirement. It simply doe=
s not make sense to mix network forwarding with service delivery - they are=
 two distinct things. Let implementations make the right decision.

Surendra.

From: Elzur, Uri [mailto:uri.elzur@intel.com]
Sent: Monday, November 16, 2015 8:01 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com<mailto:smkumar@cisco.com>>;=
 Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>; Ji=
m Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; sfc@=
ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?

Draft-quinn-sfc-nsh-07 form February of this year has

[cid:image001.png@01D12117.69E206C0]

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 10:26 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?


[Skipping to the top of this thread and repeating some things from previous=
 responses.]

Keep the separation

*        between packet forwarding and service delivery

*        between application and infrastructure

*        between metadata and forwarding data

*        etc.

Simple SFs without forwarding constraints enables SFs to focus on service d=
elivery and not service chaining and forwarding complexity, that goes into =
the SFFs. Enable SFs to consume metadata for value added service delivery a=
nd not for packet forwarding, that belongs in SFF.

Operators want the flexibility to on-board any SF into the service plane wi=
thout having to concern themselves about how that affects packet forwarding=
 in their infrastructure. Whether SF is trusted or not, SF must stay off do=
ing the SFF's job.

If ETSI/NFV is any guide, this separation in operators' view should be obvi=
ous.

NSH draft until the last couple of revisions stayed off the normative langu=
age in this regard and is misguided in specifying, for instance, the decrem=
ent of SI at SF as opposed to SFF. This tosses architecture robustness out =
the window.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, November 13, 2015 8:55 AM
To: Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>;=
 Jim Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an "SF=
 can be trusted for NSH purposes"  then it can lead to some simplifications=
, I believe
SK>

I'm also ok leaving status quo as-is with a delicate balance of SF, SFF and=
 proxy roles. But I do think that making the assumption like you make, that=
 the issue of the SF being rogue or not is beyond this WG scope, can simpli=
fy our drafts. At the same time, we need to agree to the NSH SPECIFC securi=
ty aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF."

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:m=3D"http://schema=
s.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html=
40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Candara","sans-serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Candara","sans-serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle29
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Surendra,<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In your comment,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">SK2&gt; As for knowing whether SF is al=
ive, you don&#8217;t need a decrement from the SF, the fact that the SFF is=
 receiving the packet from that SF is indication enough.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">You are making an assu=
mption that it is easy for an SFF to determine where a packet came from. Th=
is may be true for local direct connections, but in other cases would requi=
re checking source MAC addresses or
 source IP addresses (if these can even be trusted). Upon receiving a packe=
t, decide whether it came from an SF or an SFF in order to decide whether t=
o decrement the SI or not.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">As currently defined, =
with the SF decrementing the index, the SFF can forward the packet purely b=
ased on lookup tables indexed by {SPI,SI}.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Surendra Kumar (smkumar)<br>
<b>Sent:</b> Tuesday, November 17, 2015 1:14 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); s=
fc@ietf.org<br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Hi Uri,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">I&#8217;ve tried consolidate the crux o=
f your other comments here to do a single response, please correct me if I =
misstate any of your comments/response or if I&#8217;m taking them out
 of context. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;;color:#C00000">Uri&gt;&gt;SF are not mak=
ing forwarding decisions, however they can influence them.</span><o:p></o:p=
></p>
<p class=3D"MsoNormal">SK2&gt; SI dictates what the next hop is at the SFF.=
 IOW, this index clearly instructs the SFF where the packet must be sent ne=
xt. An SI value of 2 may mean send to a FW or 1 may mean the chain is done =
and forward on the underlay, etc.. So,
 this is not influencing, this is the actual decision - let&#8217;s not con=
fuse this. Also, this is not random, this is all programmed by the control =
plane.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;;color:#C00000"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000">Uri&gt;&gt;As to the S=
I vs SPI: if the criteria prevent damage to thy neighboring chain, SI decre=
ment is not a issue.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">SK2&gt; SFF is the one with the steerin=
g tables, which is programmed by the control plane dictating how the packet=
s should be steered. There is a well formulated structure that
 control plane manages. If an entity other than SFF wants to decrement, the=
n that should be under control planes control to ensure packet forwarding o=
n the overlay network is correct. Otherwise you have a wild west. By allowi=
ng this, you are removing the distinction
 between SF and SFF &#8211; you might as well collapse them into one. The c=
ontrol plane now not only needs to manage the service chains but also the S=
Fs - becomes intractable.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000">Uri&gt;&gt; &#8230;And=
 it is an indication of the SF being alve and doing some action which may b=
e better option that he SFF blindly decrementing SI</span><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Candara&quot;,&quot;sans-serif&quot;;color=
:#C00000"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">SK2&gt; As for knowing whether SF is al=
ive, you don&#8217;t need a decrement from the SF, the fact that the SFF is=
 receiving the packet from that SF is indication enough. Anything
 beyond needs to well defined in the context of OAM and not overload forwar=
ding with OAM.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;;color:#C00000"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;;color:#C00000">Uri&gt;&gt;</span><span s=
tyle=3D"color:#C00000"> Clearly some SFs must be trusted e.g. NAT. NAT&nbsp=
; is an example of an SF that is part of the infrastructure.</span><span st=
yle=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,&quot;sans-serif&qu=
ot;;color:#C00000"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">SK2&gt; This came up at the open-mic in=
 Yokohama, I think Kent or someone had some good comments on it. NAT brings=
 up a lot of questions. And so does routing that is part of
 many traditional firewalls or load balancers, which Nicolas brought up. As=
 an example, what happens to the overlay when the packet is transformed thr=
ough a SF &#8211; does it terminate, or is it replaced with a new one or co=
ntinues through it ? What are the implications
 of each ? What happens to the SPI&#43;SI? It is not a question of mechanic=
s but the underlay/overlay semantics come into picture to keep packet forwa=
rding correctness in the networks. Beyond that, what does it map to in SFC =
architecture, etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">SK2&gt; While I am happy to contribute =
to the NAT discussion, the SI issue we are talking does not warrant that &#=
8211; it is much general: SF vs. SFF. I would prefer as WG, we address
 the SI even before we get to the NAT part to demonstrate SFC with NSH is v=
iable in real-world.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Finally, thanks for the SI snippet belo=
w. The &#8220;MUST&#8221; in that is the problem. Until the WG resolves thi=
s, please remove this requirement. It simply does not make sense to
 mix network forwarding with service delivery &#8211; they are two distinct=
 things. Let implementations make the right decision.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Elzur, Uri [<a href=3D"mailto:uri.elzur=
@intel.com">mailto:uri.elzur@intel.com</a>]
<br>
<b>Sent:</b> Monday, November 16, 2015 8:01 PM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;<a href=3D"mailto:smkumar@cisco.com=
">smkumar@cisco.com</a>&gt;; Reinaldo Penno (repenno) &lt;<a href=3D"mailto=
:repenno@cisco.com">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;=
<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Draft-quinn-sfc-nsh-07 form February of this year has
</span></a><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img border=3D"0" widt=
h=3D"1029" height=3D"93" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D=
12146.812EF2A0" alt=3D"cid:image001.png@01D12117.69E206C0"><o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Surendra Kumar (smkumar) [<a href=3D"ma=
ilto:smkumar@cisco.com">mailto:smkumar@cisco.com</a>]
<br>
<b>Sent:</b> Sunday, November 15, 2015 10:26 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); <=
a href=3D"mailto:sfc@ietf.org">
sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">[Skipping to the top of this thread and=
 repeating some things from previous responses.]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Keep the separation
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;">&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,&quo=
t;sans-serif&quot;">between packet forwarding and service delivery<o:p></o:=
p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;">&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,&quo=
t;sans-serif&quot;">between application and infrastructure<o:p></o:p></span=
></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;">&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,&quo=
t;sans-serif&quot;">between metadata and forwarding data<o:p></o:p></span><=
/p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;">&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,&quo=
t;sans-serif&quot;">etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Simple SFs without forwarding constrain=
ts enables SFs to focus on service delivery and not service chaining and fo=
rwarding complexity, that goes into the SFFs. Enable SFs
 to consume metadata for value added service delivery and not for packet fo=
rwarding, that belongs in SFF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Operators want the flexibility to on-bo=
ard any SF into the service plane without having to concern themselves abou=
t how that affects packet forwarding in their infrastructure.
 Whether SF is trusted or not, SF must stay off doing the SFF&#8217;s job.<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">If ETSI/NFV is any guide, this separati=
on in operators&#8217; view should be obvious.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">NSH draft until the last couple of revi=
sions stayed off the normative language in this regard and is misguided in =
specifying, for instance, the decrement of SI at SF as opposed
 to SFF. This tosses architecture robustness out the window.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Friday, November 13, 2015 8:55 AM<br>
<b>To:</b> Reinaldo Penno (repenno) &lt;<a href=3D"mailto:repenno@cisco.com=
">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;<a href=3D"mailto:=
jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Reinaldo<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an &#8220;SF can be trusted for=
 NSH purposes&#8221; &nbsp;then it can lead to some simplifications, I beli=
eve<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,&quot;sans-serif&quot;">SK&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m also ok leav=
ing status quo as-is with a delicate balance of SF, SFF and proxy roles. Bu=
t I do think that making the assumption like you make, that the issue of th=
e SF being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.&#8221;</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,&quot;serif&quot;"><o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a><span style=3D"color:black">&g=
t;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;</span><a href=3D"mailto:repenno@cisco.com">r=
epenno@cisco.com</a><span style=3D"color:black">&gt;, &quot;Jim Guichard (j=
guichar)&quot; &lt;</span><a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a><span style=3D"color:black">&gt;, &quot;</span><a href=3D"mailto=
:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:black">&quot;
 &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"=
color:black">&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [</span><a href=3D"mailto:=
repenno@cisco.com">mailto:repenno@cisco.com</a><span style=3D"color:black">=
]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; </span><a href=3D"mailto:sf=
c@ietf.org">sfc@ietf.org</a><span style=3D"color:black"><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Jim Guichard (jguichar)&quot; &lt;</span><a href=3D"mailto:jguichar@ci=
sco.com">jguichar@cisco.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [</span><a href=3D"mailto:sfc-bounces@ietf.org"=
>mailto:sfc-bounces@ietf.org</a><span style=3D"color:black">]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span sty=
le=3D"color:black"><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_--

--_004_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=85906;
	creation-date="Tue, 17 Nov 2015 19:46:00 GMT";
	modification-date="Tue, 17 Nov 2015 19:46:00 GMT"
Content-ID: <image001.png@01D12146.812EF2A0>
Content-Transfer-Encoding: base64

iVBORw0KGgoAAAANSUhEUgAABAUAAABdCAYAAADda9/9AAAAAXNSR0IArs4c6QAAAAlwSFlzAAAS
dAAAEnQB3mYfeAAAABl0RVh0U29mdHdhcmUATWljcm9zb2Z0IE9mZmljZX/tNXEAAP+QSURBVHhe
7P11dJ1pluaJPmJmZma0JEuWmTkYMiOpKquy+Hbf7p51566edf+9NN3TfWemu2e6q6sqs6qykoIj
HGa2ZZYlCyxGi5n5nPt7jwyyLYchoNKZ51t1ypH2gffb3wt7P/vZz3a2csl+2S1gt4DdAnYL2C1g
t4DdAnYL2C1gt4DdAnYL2C1gt8DvnQWcf+/u2H7DdgvYLWC3gN0CdgvYLWC3gN0CdgvYLWC3gN0C
dgvYLWCzgB0UsE8EuwXsFrBbwG4BuwXsFrBbwG4BuwXsFrBbwG4BuwV+Ty1gBwV+Tx+8/bbtFrBb
wG4BuwXsFrBbwG4BuwXsFrBbwG4BuwXsFrCDAvY5YLeA3QJ2C9gtYLeA3QJ2C9gtYLeA3QJ2C9gt
YLfA76kF7KDA7+mDt9+23QJ2C9gtYLeA3QJ2C9gtYLeA3QJ2C9gtYLeA3QJ2UMA+B+wWsFvAbgG7
BewWsFvAbgG7BewWsFvAbgG7BewW+D21gB0U+D198PbbtlvAbgG7BewWsFvAbgG7BewWsFvAbgG7
BewWsFvADgrY54DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL2C1gt4DdAr+nFrCDAr+nD95+23YL2C1g
t4DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL2EEB+xywW8BuAbsF7BawW8BuAbsF7BawW8BuAbsF7Baw
W+D31AJ2UOArP/gFTbVUqba5W8M+iUrKTFe8r6Pshv3Khv3d+oKlOS0sOUrOznJ2dJDDP8PdWefn
tOjgKEcXFzn9M/z+7/VPLgyqvapBdV1WBaanKTU+SH4u/xyz4Pf6KfwW3bxFi5Pdai+vUONCkILT
cpUX7SWX36IRfmtDsc5psrtOt+qGNeQar4KCWEV6Of2z7JGP37NV1tkB3blVoYYRZ7mnF6kgxlce
bOX2y26B57PALPO8WbUNfep3iFVWbqwSAlyf7yvs77ZbwG4BuwW+QQt8i7HrnCY6GlRf16yOoVnN
OXjINzxUIT6+8ua/vQMDFRTtK09nx98SZ+BZrT6n4Wsf6cN/Oqdbie/qvb9MVqSv60sICkxpqKFe
DXWt6pxckNXFTV5eBI/WBc1Oz2ja4iG3kASlpCcrNdz7a3aKJjXY2qTq2hb1ji/I0d1XgVFJSkyK
VUyQ+0vuKE9rsKNTrXdm5R4erfiYQHmv4lAuTXSqqbZBjR39mlhylpNPiKLC/eTu6SUH9wBFhgQo
1MtZ4AlaGu9SZ0OtatuHND7vKCcvT7kTYFrnpjU7Y9GSAhWZkq709EiFea8I/xcH1NE8oN7ZQMUn
RyjC39X2ffbrW7DAfIfKP/mF/tuxBeX/xZ/qxxGBzwgKWLU40qbG+tuq7RjVvDzk4cs8SklSUmyg
fF6GKNJqnOEGVde1qK1/WlYHZ7l6BygoPk1pCVGKIAB8GS+r1SLL4qKsVoA2Zyc5PtdismhhuEZX
f/rv9LPJfBX8SbTSf29BgUkNVX+hf/rv1ar2e0P/j4QIhTMnVp8V7G8W87LKwfEpAKt1WmNtTbp9
s1m9Vld5JWUojTMl1ud53B6rLJPNqvrN/66/rfVW0E9ilRwBKPDPHssxLsuiFi2sHAcngGbm4JP2
ckCXmf521d1sUMfYklwTUpSUzP4R4CYn+/7/LW494xq6fVwf/N1lXXQ8qH/1P4bYQYGnWd/KPLcu
2da79WnzXPiqzPPG6ia1DC/ILSqeczJZ8UEecrfP86dZ2v7vdgvYLPA8p+OLm2xhVEOt5Tp/7JTO
XKpTx+i8Fh09FRAdIPcZF7nMxypzx3btfTdHCT4vGwRv1dL8jKYmJjQxPUs2mM3rxS31z/hJAwqU
69Knp3W5d0RTS4uamVmUxcFF7jhADl6h8svYoQO+EYoO/ZpBAasBBSp09tApXW/r19ysRT7Zu7X3
nXf1+vpYhbycMcPysxyt1a2yazrTHqQ1O8IUG4MtH3rKi5rtrVPtpTM6fPq6KtoGNCNXOfiGK95/
SWNOgVLiNr13cIO2J3rLjc8uAgq0XjuuL87Xq3NiXrNT81rAO3R0d4GI4MkrVWv3ecg/JkyhgAL3
fs/BaVaDDRW6UCl17d6mrUVxCrWflt/OmgNcm5+Z1MTEgmbml3B0nvVnDSjQwvw4rA/LGjQ0Ip53
hja8947e+2GpsgNegv3SMqupOxW6dPyEztQOaWluRvOOgIwbf6Afv/OKXk/11ktwF489MMvMkPo7
W9U2F6iwyGglBLs/F6BttS5qbnpKE5PTmllgTjzrlPide9/yGTo9PqFJJxhVJgB40j1apvEl2tTb
j9NPcBvDWeT5pMljndF4W4XKfvG+zvaNaXbz9/Xd73xXf5Dj+3zzjbU7N23WrqM85n5LnpNlRhO9
nepsn5BDZIKiooPk/8RzkjOiv0EVn/5KhyqaNVp0QLu+88f6y3Xh8nmZz9aXbR0Q4C4tzGp6alLj
DrOaX/r9XfHP/Og4OyZ776irc0yLQdGKTAxX0BPnrAEFWlR99H19cKVVExkbtendn+gPS2MU7f7M
v2h/o90Cv9cW+OZBgaVpjTdc1Jljp3WqYU4O8SXaHOEjT81pbrxOZZ9e062mPk1G52r9Auj/S/c4
vBVS/LrecMtTqW+6coKdCOlexosgMj5DudtdFTTRr/6uOh3+okNjHnHKLE1VdlKoPEJTlRb6DaCu
Dv4KS8jRht3uimhvVceVE6oebFZb77DGFl5mUIAgvKJSDZXNmgqJkV+Qj9ycV85wsoUTzbp56LBO
XG1Wt2eMsrYUKcRLWpge1UgFQdStOY2OxWvjlhKo/7KBAk4ANFFZ67XFM0nD08NqAkypbV2Q+7p1
ysuLU7A7gEJ6hII8Hjk93UIU6i+5T1fpRi0Z2vgwgDmPl5yJ8ZKsNa8EFb36rv4qc1GhBdEKcXvW
nc5R7sEJSl+7UweDEtXb0KDTP4XtUd2r4SlAO+inv/UBtYObPMLSlLtOZGuntdBXp/qaqwRqPWR0
ZsjvLINdL9vlONuv7toT+ngsV6UekUoMfp47cJZnaLaKf/iv5DoTovDUALmZSPhZp8Xz/NRv+3sd
AxSes1ff/UmutrqnK80fRtSTxuw4reHKayq/MiG/78YqDNaa5xPfCxsxOlW5m/LVf/Gojg50qX5w
7jlBe5hYgXzH23+pn2xwllduyG9HIO1IyUUrgPMnDXLY/ZZ84wAFnmQH1p9bUDzneKHuTLTr6Gi7
anphlRGT2kGBb3FxOAQqPHOH3vqDZBU5JCs/0h6pPtX6AHLT7bWqOlSvuYId8kwBFHjih1yY57FK
L8xW7lCXTk+0Mc8nNDYvOyjwVEPb32C3wLIFvmFQwELg36GbF27pSq2T/PL3as++YrJbhpYOJWiq
XIHDVqhts3KdX7TRAl8+v8hBXskl2hBbqCVosS6uUBpfytnlpaCUApXG5vAcRjV457L6O6rU61+g
Pa+XanOahxydXOXm5ibXrz0KcZc/v7uBwKF4rF8d3oN6v86Cfww9cumlNCaDxuOa61R5RZ/aRoOU
sjlJ6VGeeigWXByCnVGmk3W96goq1Jb9W7QxPUTezlDmFkY0HDdHFrJK5wAS5pfIUJnEArZ38o1S
fFGQIvINrW5c1QOT8nOfks+ON3Rgd6qC0C1wdXWVq/ujdbm+is5MUnZzk241QCdNyVRmSLSCXsaI
7GWbFg5QRUu2K7LQCtUcdtRD4NBTbsY3TqlrwxWXN6HxO1e1eOGshphfFjMnlqfEb/fl6C7vqFyt
C0pXoWFSDQBKHRtTyyATz1DBX75Nf9neSzDEhtuoNY9VyvwLZP08YpS28y0lWAg80fn4/ZWYcJJn
7FptDccH4PR0cfsSUIAzYX6gVwMNw7JMwaL50pnvIZ+4PK17111unn1q6fC0UeyfG3dxClPChlcU
xVnk4MK++luRXUeTYhwNhvoOqXhOs19qB9h+oSnKexUA2KNHPRVLmjG6Ns/MVvrt3l5entG5yDN6
jTYABpaYeY6vaL+eYgFYQ0tjzPPGTs3GjjxlnqP5EZKozF27tOQ2SlnvsEacHPGR7Fa2W8BugWe1
wDe8K01oqr9eZe1T6vDP02vF67U+MeBBZjJwnTbsA7Fe7NB8mr+8cJQf8g+tYxqqK9fFawj5UT89
veQqj+B4pawpVemaRBFj3b1Y9SDgN69Rq0X94MCkp4IjMpWzYb1Ks3zlNndHty+e0dnrHRp2jlf6
pg1al+ik2brLKrvRqJ4FZ37XRd4BiUotLFZJXqh8ZqgBvnxdN27f0cTULPVMrnKPK1DhurUqivGA
8n1Ll05fVnlzv2YcPOUTk6zk7HwVpsUhkuTwJY46dzhCUHb9mq5Ut6pndIEgD1pUVLgigh216BWs
kKgUpUUEyH9FvbB1ql23r1zT1YpG3QH6XHSi7j4+RwWlRSpM8afS+KteOKZuHvLiZfLRTlN+8vPx
0aSPnwKCQxTg97AnNNN5S1Xnz+ta56IWYnJVUJyhTJ8xMpjlulzRou5Ji1zCcpRfsk4lWeEKfIw+
YcoVbup62U3VdA5r1NFXYekFyiXDHejjr0B/6HUmgn7UcVnsV+sNbHe1Vm3D02gduMs3MkM5JWu1
LidC94a5ONys+msXVFZ1R4NLbgRikYpLX6OSjQhBek5qoOKSKiqp4e8f0ogbcy+1VFuL85Qd5vb1
ZM4tc5rvqlTV6JxGwvK1g1rWMNeHBQaXRnrUdatK3S7BitmwUevXpSrm/opEY2PjLr0yCUNjLFox
1Ng63rWFg5OLXD152R65swIDfeWLUIEPuhyBwf4KeOJUcJBLeKriU5sUUdZOKQE03JwQBQL0PLej
/FWnm+3z85rsrNaNIxdVQQZvKYO1l5+ilKVuNVXe1I2mHtayk7zDYbCUlKi0IFJ+9wY6N6DOmis6
crFG3aNLcvFKVnbxRm3cGImiwoh6bsJOulil2xN+ispZr62lmUoOcn1Qp8z6brx5U5fLqbMdnIS3
xNwPZG/JX6O1hWnY24yPbBzA2NWjl3VrYBpHw9Q3BpJ9XKONO3KVFuKi+aZLunL9lqp7pzQ/Bwi6
EK5k5vzGzSmKdBxTX80ZHb98W829c3LyDFd0crbyinKUZvRTnmh0Av7helVcuc4e0aG+CQd5hqVw
f2lK9vFmLfpq0d2Aj48uDtZDW6XKrlaooqlfk3MAEL4xis8t0fqiDCUHrBbNzGuitVI3Ll7XzZZe
jVoJoHwpc4kjIzrvKf9gaPGFiYoEyH3xw4L90AX78rJdDuxtft7ymgQcfiqiwfg6a1R56Zoqm7o1
MEfttCv6GgkZyiouUH4yugqrzcWpVlUb+1U0qWsUHQOfcIXHxio+2AsquJ8ikuOVkR6Eng0fpuZ6
arBbXU316B40qrlrWNPQcqyU7kQgLFeyPk85UR4ratyXNM3aLj/ya/3q86uqGu/XYuttdYeZzJ8B
71wAUJOUu6VU60sp0Vmp+zDdqZpLZTp1uV7DaIe4+wcrPKNQBflZAHTuXyIAatXcIOO7dFXltazb
GQJiR28FRqcoo6hI+RmRd3+HNdV+XWUXr+pKmxs6PQXavCVeoU59arqKDevaNWDxkkd0vtat5yxL
DXzxs2N+UJ3VN1hndRqZgv4fnqvMtcXamRX8IHu/0K+2sku6dLlW3W7esnpnad2mQpWk+Wix66bK
D5/S1a5JjbpwnhG4pmavUdEaw6R59KGyJsbaVHXic334wWGdb5mX1986qu6kt3zYGK0GIPOOVFD2
Ru2F2ZbiZ4zOvHM1ekXsiYF+8p/0wceY4vhtVOV1nl/LIDTuUCWtWafS0iw+4/xgH5zrU2vFFR07
W63eKfYXnlNYaq5y8vPJ8HqJrfzBtUSteNMNHTtxU02jHkosKVVRbpT8hht1u/KWKpr7eNb+sEEK
VLKZMy6Cz3+V/XOmR00Xj+nzv/9Ix6q6tfgrqxprIhRiswOJFc4zz9T12rY+V0URZk5iB2c3ufv5
KTDAX/6Bi4ADlK11ssfW3tTFGs7IRXRr0nkusCqywzxXOQPRfaD07MrFCtV1DGjCyn7gx35ZYPaW
FCGH8TVdVs33Izp56bKuMa4B0A4nPxhu6E+FeaHl4BCs+LWUjfAMHs6zT2ig7qaullXqdsegprCw
c0CC0sz4CpMUuYJOYpnoUP3FMl28XKc+Fy95RmSpYAM+YZqf3GY7dfvCeV242a4+hzhlry9VcZqr
ppqu6NTVFvVMWOXN3usSEKmYou3amsH5yWfqLl7RlVut+JecGviTTlFrVLyxVFvinDTXU6PyY2d1
HT2fIfSBAtFmSsxYo8L8aEV4f9muiiZGUzm+Dn5Ea7/Gl7zky34cEwMrhI3L4h+nmNgkZQWt/A7W
f8ctXb1Yrqpm9vN52LfmDMgu0voSzsCAF9/F2YDUefuKTnOedc6GKDN/rdZk+GnpTrWqrlapvntC
s54hCk5lHpWusTEhHvwa4O+sSTa1qL72thpa7qhvfJ5kh4s8wlOUXlyidQgvhq/0ead71XqFssrf
fK4jN1o0MzWmpr7LCrtbaGXBB/ZNLda6dWu0Hp/czHMHZxJXvn4KCuCMCVrSoueSrH01qrl8Tacq
OjRi8VNwknk2BcqO8n5kDn1NU9j+NXYLvMQW+Ao7xDPcNTV98+Mo905bNRUardDQFYCA7ePeCs0t
0jbfRM16BSnU496hTP3tRJfqKm7o6oVrutnUqYFxaKZLOGouTWpigxwd2aQt6zMUH3hXsXlhSsO9
7Wom0K+opTTBqUd3Fr2gZPrLFQeu7FyZyhs71DNWTfbVQc5bExQ00KmGm6d17lqfBmd9lbz5oDzT
EH0yQ1uaQhyrUmeOUGNfTxY2PEnFeyOVRHbWVDwuzhB4IGJUXdWqMRzKHvcwhfV8X+KwCI4HQFjV
4WeT767VtVNndf5StRr6QD65J1fffnU2WuW0wCbom6u1e76vwKB7oMCMRhprVXP9ksqu1+h214gm
5hcQuHKSWz1U+6Eh9W3frPWpCMd9dWTg7kMFqBkjUJqh1tV1XFNTE/y9/0MPfGlmXGN0Xag8X6dr
c+cIfNZoM7XB7sMcqqC6A2gsTC41qr1/UkvOu7U5PVS+dzd862SfOqvO6+z5y7p8k2cys6AFhA29
u3B2KihP4Hl1uScrI39lVmaRALJJ9eUXdYkgzJScjMzxuQVHud5uUUd/H47yDm3KjlM8nEiH+UmN
9TUjrnRJN2s61D6XrXXfCVPyxgwlOFo0e/uEPvv7ozre4yDf3LXK80hVft7XVy9qZT4O1tVpDEaM
b3qMwkO9HnP4l7DrcO+AFtziFRaLU/foagzM0PrNwYqa8FQkZRsPOaL3n8aYphAYnOJZOVCrOIYT
EPAI+PDQg8OpCgyNVY7/DdUMM3+Gs5QUjMP4DMv5638L2a7ZcfU1VKn8erluEjycz8xXiR/sob52
tfSPaXyS3KEzgVo3c2Zmt3bm8nx9eb4EctMj3ax31NtxMBp6U7RmgAAgaFS+Q/Wqu4yTVlWn6h6r
fNqmcIxwhtdhZ1eCzPYq3Tx1TmU19aoyDiT13ExSsrUNZBPb1NSzTTvWZysfhMY6O0ZWskpV5Td1
CUbTlEeBtu+LUc7G5VInU1feXQE1+UKNmmYo2QjepFdhvRTaGC7U8o7cUWtDjaruDGqkbVYufrka
+CvjGGYozmO1TWJGw61k0k+c0oXyWlX3TWieOe7p26mubkCM+Sm1NM0qPCl/Wdzu3kOZ76VM5Yau
X7iim/Vtah2aIEMCk8QRcKyFtdI/qG07C5Ua5vPgWS+Oa/ROuS6cOq/TZ26rfWRKi64Ags7uarvt
oIFKJwVBd303NkohXwkUeHjmLE6P24DWhcVlCPiJ2MhMP6rv53T2coWul+OQj7InwcZyJGRxb8a5
bO5S7+YN2lSSqHD3e5ZYYJ/AbmdP6tT1WlUCJs+gj+LsHaR26Na11KTXdiZr43dfU0SaAQXYzeeH
1UNwe+3KVV1u6NSdEcrcGJRl1lm1CK/2TVKPvmej1oRznth+BnBoZhgmVataOke5lzZ1IPrm0k8m
Grrr0iIlHS6OCqCjgKFoP7xxTmm0t0311YCBfO8k2d7xzDf0umcU6zB8daCI5zRYRxCDNsnF683q
6hsm0wvAYyE4aWzCwe5WZ8l67dqaoRgfBj47rAE0fC4catfQ+FndqCxQVpKLZtsb1doMGIhWzJRH
i5on2AddN2lzHOUbL4QKGvHgmzpPrfpZ1p7vBh90ZwrQBAAoptPJgqGtW6jzHeCcPPKxznYQGOR/
XwGA5yUYZXEKTYYmzrTGAWwBUDsRo6i1jvJLCFNQ2KNlMTynxUmNtLaqtaNb3VNA1wSpS6O+8nGm
DAumocV/QlEB2drAHvjg4nNTU5qeYG9suK5rA3Os0Rn1treooQcV+EHpZvWA+sac9d0D6Yq5p8EC
C2Ry8I6aqm/BaOEZU6Y1GbdJ6x15TuzlQSuBHrQhFsY5uwEpT5e16tSlK7pYXKgMH8bbiZ3N76AF
4nSLLP2Q5PJmkbLCPV4cZDN6Al0dam3qUBeB0gKAlBbwA1xg1qEtY/XgrHWj5GHNIzS7mRnNTqJh
0d6kup5PbGy8hZ421sMddQ8uyvFmp9oHWV1vrlFGKPuAzYj4OmO9dMm4oEvXynWtvlt9gxNaAIBY
cmhWK2d239Q2bSiie0boCtD1RQ6LJfbXwVpVnD+tIyer1NA1zhwiWeGJuCpno4WIe3EpT68GhSvk
PijAPQCut98gAXCNJENjj/qHGZ9Zv45NamN8/YxvPUBsTvBy1x1zNo/1AAqXX1XN2AxJnWZNIKTs
5Rgm1V7UlfJKXa9pV9dErVqZZ/PWVEUPtOOb4Lddq9eUq7+CSl7TwSRq1m0mmtFoe42uf3hI13so
j0rIVNwuOgvY7O8oC3NnsJmSqSrmwjT701So/HMs+pfhsP2SV4U02ZNgTN6+qlNfnFf5bZJH7JeL
jj7y9mxTSxWB/xx+WdorOngw7j4osDTFOqq6pmuXAOEautgnxjVnzgCHRjW1EYRPjgJS0j0jwvPF
hKJJdEyPAthXndPpq6O6dKRMWRtS5GcZVH8z4DXnx4wjcFddh7r7AaV3rdeapJC7QD6sKvaBqquX
dOFyNf6aKQ1lbSLWOlfFfGwa1fTQdu3YCIDpeZfhyO9N9HWqjbF3jbOPo99icVlQnzP1AEafwRlf
hm4liTmPzPNZNEAmWPMd9Wq686kO17vKc7RNlS1t6h+FaXS1XYQQ0ptrVQDY+1Rc+kXmsv0zdgu8
pBb4ZkEB3E9Xdx+FaFxN7QTBTfEqiooVgPzdiwxYSJQSQ8KhkOIccgAY32Rpik3++kWdukBGxDlF
BQe2KSncV66oWE9QF3inpk5t187rlKu7dhLkJbGJyCsStHGffKKpv71crqNf9KjmwlE5TgTKHyfX
I2qzXi1x0HQnm5d1HjTXU4H5O7XPCaR46ogu3fFUXG6W0ghevcw24R6tnIxk5SbV0zLKR6kbduu1
HYXKY0M1W5ZHcKrW7fVUdBGBfcsxfVFBZmpiBPSTQNUCKPBYUm5J83eqdP2LY/rkxrCs4YXavila
UYEGTbVoqpUg5vQVMtde8l8zpSnjTBrlfw7J8jPndLVxWs4JW/TqPhx0+iE5zCJs2MO/ARiUnSRr
7LBZW7OCqBF8Ie/u8elrvGJeDndfj77BjYxz7r5XNUeGoOmXF3XhxDiU9216bcMmHSimY4BlTN1X
TsIkuKAzN6IVHh6iNSEOcuLvO6pBfz+jW8Okn0LXv6ZNtGcLcCf7Ntiq+rJTOka5SVcMgoZ7nOVm
c77IEs20kGE7owvX+zUfUagdPwRk8iOruchh01tP4AOz49RFwgUX+RRhI78YJW94VW8EJyrlDMF/
hQWFZuyKYzRngY7Gn8N+sYpKWat9ezaoKBO9BOgMX9eCWAQV76wbk+OsvxIjQK5XOfsdPTzl5eOu
haoOMuMEpGSgswi+7j9BlxBFJgQpkuDJQhCAwPQqlwmqHjynpz99Z/n4Byoh1UFlI8NqHZxSYRKC
n0+lxDJ/J4c00EfJwwzsjNBghQZSz/s8NPjHRg+dMjxTha+/RcZ0XJ0fXNDR270a27pX+0v36i20
RzxY81PdOFw1FTr6wZIclw7o1fVxZBIDFJaxWW++F6PRjiv62d8DcNw8o2OBjfIkiPb2zdLGN8gi
DHaqbwDXzAiZLQA2ThFwf/qxPjjdL2tqqopf2a34EIQzaRk5NdShjpYmXT/2KUHAvFxfI4iOzFLx
G+8oKN1XIx81AlZR4lKKercpgcLu7gm5Sk+jDrp2UAvhO7Rtww7tXEd22KQCHcjkpm7V/ncyVDo3
oqaPj+rmlQFN4rROLbDAH9V8IMs831uhq18c1RdXx+WeVKI92wiU6GbiRODaXVumM5+SxWqNULGx
JWUitimxBLh067LOnLqtxtkIpe0o1c4wb3m7LAHuDaurpladted13NtPLpvY45jnjjj7cwOAIp9/
rrNdOIklr+p7CcHydydTh6bISNtV/epog1qdezWEI/v1MjCX5+uXXouMu/qkPvnNUd2YhD2VA2sm
MVTBMGas6G0MARrVXL2sk8PjGnd5AxZatIJN4DB+WxUnvtDnZ7q1hE7JluJYRQcCqLHnT/cCzsBu
qq9xVljXhGjUsVx7geM8DwvNx+jaZGyRL+woP1PZAKDdcf0kmdSz+sAfYG8XLCNb6xAnuYfBXtm8
S7sn0MwZZw4XrNP+FD85EhBbrMwMx2BFJsF6enRDATxOKt6j74YXAAh0qaXsV/rV5LjujAKSmPE8
ug4Bp8day5j7H+lMBzoEyRu0Y2eoInwJ2ghuRglWbpdX69pnQ5rgPHyDMqWYqHyV7oNSPv6hfv5f
ynSOjhczr23X9rX7lLeZrPE0Wg7V1xGd4xUYo8yobEW9SBcLF7Rg4pO0Ji9GZW2JMGDWahs2cEIP
pq6iXt3+sB/So8iolpCBblfHb7rlnZOslFhv9lm0MkIzlf/GHyhofIqymBv6+GNA+jsjGsept5Dp
fXi7gyHiHa3UHTu0o2VYLrem5fP6G1qXRWbSBXDRAEyuvvKKSCSwX2l0kz3k15YIpGquq5JAI2zX
FtgKOVrrDdDcUqmLh9t069OLyuQ+glnntqSyaxAMoy16yyMF0GdA7XQY+riHs2uEwNrEICvt5egl
v3jOkXct7D1/q/cB2Y5PsF/vJcu8KVcl3lbO8VbVnsGX+OKcbqREAfImktl/Qa/RLVQxJZu0vY09
50iLLNv2ae2GNMW7mnI7Ai1n5jvZ6GTA3ocuGGasHs02kzkF4AzcskXbCvbqnR2AsN31unmiQQ2f
n9f1DPwSkjgBJv0x28e+c0Enj9eoxyNWa17foWhfgnSnec0MknhpbdDt62U6Meup0L3pZOR5Ti90
W5xxdOBpPPmFTpfTgSd1j17bCzvDrLf5EfUD6Jz9oAYhXoBA2HfLZSPGL2AM1ed14mSd+j3xL9/c
zX4JyO1AxwXqytsplau/VqbpOU+FUVoXju/k6BWuxA179UYoc7cGtujHVWo9e0ifjyfIn2SGU+IW
7csDZ+m7o04W5eSstyKytult48u6faRzXd7yg1m4MSFAtsS7d7hi12Qp/TrgNTovybteoRRwrQoj
zCEAyBKSqpxXvqfAzUPq7ahlPTbrehf09nGjb+HzOCiKMHd/5Xmd/By2W7+vEov4vkR8O8pqLLCS
uvCfjpXBGnIp0BpKaGzX4ijg9WWdO35TjTNBSgXE3OnPGeC6RJeTHnW2NpKhv6wTcx4K3J0Hy+0F
tGhgaIWnbdLBV+bk0vMzffz5R6od2q1tBzdr06ubYHIAgEyR4Lp9S7U3DuuTWQctvLoHliRMTc42
s0Yt7hGKR1OnKNxf3vg+cDA0eLtaFRdIMB12QNfqO9qcAvhh3E/3YEXnbQDM7oNNjKZA/gYV7C1W
ovOCDRSwGLHaENhfsDsfukgwOZuztK2O/WRK7iU8T/z3dzYDQPS16MbRGtUfvaCrccyDqFSYhfbL
bgG7Be5Z4OuKgVa3qAOHNNSg0vgraj59Vmc+J1Nm2apiFETD8LqcaSnk4u4hT0+Csfs+4rxGG3Ds
jlfrzgzUPjbXddlhCibYNcUF1oRYJfrPaOBQo66fq1ZIcJTiCgLkTJAQmeiviIR4hNoW1AJd8Ujd
rLzjdupVgr61yWwe4WzS02QnaIm46BWo4BBfpQZHKBZHwenqkCbDg+XKhmLbYpwJFJy8FRsWr83R
a7Xx9Ve1OZ4SA/iuZqhuUBWT8yKUBNKpeMRMaE01OGU2P9t+9cjFX1j61QDroezCkJxS1mnPO9u1
ITFQXrYgHtSzh+yhFcpig48CATlstFoO5N4KKPrN3RoOLtaWkmIVxkJjtX2EjEAG29nkcZ2irKDG
P1SJscVKp83cU+O7r2H+u9AyLzS/UEWWTsVX4dQtpGnzzv3avyXtbqs7i2Z8oWceva5LAxwUZKWy
aSPg2HNDN65B650KV8qmfXp1G0GKrTUem/x8tzL8ZjgQ2zUyS32p8b7MDCW7N1p1kcAQqrdXLlmJ
DSpN8Ubb4O6cSA2Tn+sZDXxaoXrPICXEwrKIClBIYoGC4rJUmAdw9NkxXaItWtVZgCH3XlUPBSoU
hsUbvHZnBvMcTEunL8laPpfNOIjnCGqaeYgWxIW8vJg3j3+Bc2CEYrJyFHnxomo//VAfEjiOrktW
TIgf78dWLoBZnu5yp03nizlaqw/a2duHzgRBGu6bV9sAdeozokvB026QTB5tw37515/rZHeYct7+
vr5P0J37WNTztO9Z+e+IcjKPEorXKXD+mj4/T/bLG/r+zoM6uCOTwNu0YDTzIk/xxz7Rr39TgbMB
2JMQoo2xnvKLSFVRWALrwFW3L7XoH07CqGkN124yFBty05QajbAjDuWECRzdKcdwHlTLoTPQRntk
Ifjb8+ZWyosiFEAxt21vISPbX39ZAR98otM1F3WMDHnoxgTFlwTj9IXwPZ/qWj9AVhRCqXclz529
qNP1jlNQoJv273+L+ZSmaJNttD0wmAuUtqwJT6f8aFaxPdDM229p1hZQrFLQaxlQ81kyQ5WDcsnd
o70H1mkt5VYeZu+DGTGR7I0z1gEdGQCNjOASwadxjJdGmlX+xQ0193srbPtaFRMghyH8Ydsm2CdS
g606ffSSjp2sVHhImKJKI+XrQF0xTnNbebtGg7Zp07qN2poOldxsxATQC12BGr3hrrqlANbWt90m
FmCiyzBHLujCJK36Nu3RK9sLlAG93saW4Z7mxzqUG/aJfnG0VReOViiV9oylURYN3jiry7faNZ6y
Xa/hqJakGY0OYz/m0Vicosmm3uhcUJDZY21IB/+G8xmTs1aBmbzHBcYIf2/DLKzJirZyzpxo040G
srzrkxTnbUptYJqx/8dnQQFur9Sl0XzlbtwObd53hYN/F6h7dOGaQDrJj72J549QYdMS5TO1Pra9
bLVzY3GYoKsM1kM3mfg1OLavrldOhFHcN8/JUHIHtCb2sD4/fEuXj1xVTBiMu/woJeSXytraqepP
pxRRsk279+/TbijtIUZnxDKhoYhF3fo/yejVwSKZzwQUeIEdhrK5wOQ8bdrWqbLjAcqLRlsh0KpB
gJdjf0PWNPk7+n5ovA7GxlGCskZhrZkq2pYHfZ7uKpjXxY+zey3nLzdu5f66ESQe7FoOXB9fHdiT
Mz4iF/p+fo2GBkbkj0bHlnWcQyuHzsJ7tDWkFd0KC20jnQKTlJK4U/tf2aXSDEraWIfW0Tj59fxS
R680q6cfdlsqoID5Ps7/gJgMFUexdq2j6nCHWVA2Sjbe2P0REQxHhDQBn/M2wixqvqTGIS/15e7V
vn2UOfI7vuYMm+9S4sJv9MFPGzXQM6zhBUCBF9VyYWxBqVnKL26FScNYCiib2p2l5Eft8CjwBmvN
Ytqe+EQpOmKrdh3Ypz1rExRhWDaTZLfnfq33f9nK+IY0bAEUcETkrbtaNQTVVYsxSico27w2jIz6
3f0yGQAGZGPq4+tqPHNeldlR8k/l7HqeI+D+e8n4TxpmUAsgboiiD2zRlgJKF217D3tVWigsRBIy
Fz0Uch94oLyL8rMqykZrLAgpFmzQlkLed298lgRFBjpq8pObaj9zQVWMzy+JvZvyipBkgPrEBGWE
083izFl9WFujmcQcvUHJaf6aDMVSauWMr9gHa2iGjHQ0zI64BPZVkiDWwwCllDvagDnbFkL75kBY
MiQWQoNy9OobjD0Nn/Su/Z19KF0sDFcM82amM0Sz3UtqrzF+2vI8fxge5V5JcpSfoGSgwVMZb7+q
g9sylQ7N0rbkF8bRGnIC/IHFiX/t4WJGAHt1iHbf1y/o5ihAdOF6bSyJVeBdX9VqodSW8S8dgjXJ
+XKLlp9hlCEEPj2D8PCTdPKkjXiqCl0BtcvO6OqNGbnnA07tf1Wv5Qfb7A5KoynKf05+8IU+u1Kp
y/6si8RshQKQm8/mA5hn4Na5Q00yqlHm3E0ENHO406STnQAXfVO8H1DArBlnL0pkEe9ek6OOGjq1
5BRo/e4tylo5blvS6pG9C+aO0SezeHOf2Zu1ec9+vbKFZ2NAi4keRc/MU4JEKcEdWC+ygwIvtFzt
H/qdtcA3CwoQyrgFpalkz05NLB7WofPH9Mv/70l97O0pb9Nb3SCseVCwdqynngsk1GZmygC6G3Xj
Bqhnv6NuD1ar3I+gcY4MDN/nDFWQgk5V3IDSSe1bGgHFDKCAwVsdbIcB7zEtjZygeMWkUTe5UduL
2RA872bVfCMV5cOGYd5pNm36ZUeVpCuq+Yqu1kC7TUhVXkkgseiAaqoRievyU+wmEOU4t4eVevms
7fM25TezvfO/ze8bhPOx6QKyOUwGsrVXt90ToLJRc5yKbsGKvcyJjGTB3j/Qn+XzTcGMET63hdKA
ropyVV6oU4tri9rrz+gI9Kl5kw0gc+zstqjh6mp19rjRJjBbBRMFSvmWQAEbi4D7dYbhYQ1OUnzM
RhWvzVasSdfZLmrBg/zkBfhj8j50crL1VR6prVNny4R8EjaqZEOuUoJd7yddnMhEJBZu0dbCm9Bf
EcuDemqSMlZKAQagcVYTJFybaQT1vqrTHtDiCIwsHAjEzlDFoDLWjBLcc+gMlSiPejEXxuhE1sQj
qkgb95FbOHJIX3zytzoy4yv/oj16dTvOcm4wAdLXvb4Zt8niDTpRGmAox5RBrPYTMAEi1uzVq3tn
5Xziii7/skLnPiIL7029tRs1sLGUkmzfqm0l1FA+se/WC4zdiGV5ohdBRm5oAvokNL6ny2/RonKw
BVr+GZ0iK7iA/Q7YPvdVL1PvSt4ah8kpNlO50Xu0Z2OOUqmluLc8nDwSlJ1bgEDWTf1quF3V3eME
IDBqzHpD/NLmlxlNgNB05aIrsHNLPoDC3QCSjguBPsEKwFHQRKNuXQOgWkxS0c7N2pgbYwsM7l/U
kEeia7B/CxTWjwZVRWnLHcoVwhiLk0eaSrMD1V7Woxv1XcqIC1WGL7/bX6U6SkDaQzP0GsBjBBHA
Q765YT/ZPEf2JfNbtn7iy+yOhy/GN9auyhus+fkElW5aq7Wp1PXf/zLq+9MKtGXXRh2jhnuJPcAm
PInuwfxgk25cR0+lBWWEAZzDkzicCzhGrE1HaixdF+5Qc9yrOqiTCeuKtW0toADOpJtvkIIAOGZv
0abyE+6xF+eRciw3d5w/nN6Ug7uU5B1FJhmBzK/6mJ/r89MabGxUW/2E/DMPasuWQgJJWm0+eFDy
CKKWducmldZ9ri8os2jvyAFQnAV4RXdgKELZbwAEZ0bAElvxeDmLsre/ob/ynaamnmd/D6gzTr3z
pNoqYGJcRr+mi/ZXTG0HJ8rZYGqVjQAWb5iHhrviqZn939RwG3DWOKCUNThzDjz9Wt43be90Ya/n
vx1NILvquUGpC/TulooeapT3aP22jVob67siSQ2wATiRQj30BgK5pl/XqqMhT0O5QYoGcLcuelJ2
QiDOGbihkODvfo0A7YBNza1DD4wYmG132+g+/zbIvXgDrnNeJQ20aam9R4N8X29zhU6dgcLclqGC
3VCCA6DPU24xmJIh/wjKeO79kO0MvWsz84fZr21n+JMus94NFmLmvrG9lTWFDb7U6Hf1BhxhJaWu
UcrGrdqRE70cdJgrKIT1TQch1yEtUoJgE7a1rbm7oM5y1IcwsnluAAu2M3+VEZpnaFuQdO9JylD0
Fs63DJgi9xaOh598g3wVwLk1t2Rs/vSZ8mXvMEwbi5l7BlDhZ50pJXoqSRBGjPF73GLTlZ69U7sK
OFcIlGyXH3tBGFod0NMthlFlY9HQDq67SbVnAdq6/XW7s163yeYuYCQbyILtLVMAixVdmvabVkTX
Aa0F8FoNAH/63XKOe6MlFEmioxp9qE8+RoQ6UYlhBL4kjtzQdApBk2pfZqBS8RX9zBfSrm78ToNq
zp3R5b5A1XXW6fYhdsT74yM/PU75VmWP5oMXFN11UGsSAAXMHDNrkDlhWeIBOwPSwfgq2rpVm4oj
CfyXywyIYmFFALwtca+2v6CUL8kkMXp0rb1ctQNpCvIjgJ0dVN9twJ7BBUWto612XKAewthsgevy
PHUx/quZKwboXY0thXDwwJ16Xe2d10DUOr1HiWwmbNL7c9yJZ5S1Rbvd0H2ZRY8kxiBbsOn6ETwt
u6hr1QsAz7SqvMhzxQ6LFn4HoNM63a/e2x1oR6TKa+cuytsABV7A+7exeW16KyGKzQpQwSs70QII
h5V29wmTSPNLLEQvASHjq+UaqbtNCUa2gmB8OAM+OYzWwQpgnLc71TvBPDL7JqUSA119mgoqVig+
3UoBTAfstDzH2WMplzIlc0/dZRfZqw1DA22uxNSdNj2dSEoObRdsuWDmeZh3G8A6bCpDOXkBOzx9
PtvfYbfAy2mBb3Y5GETdAec9jR7rrhwWgWUIP1ESMDvPocKGsNSj5iun6ENKLRLZ/A3FUdTqQcec
ppXbPEEdYlRhXu7yAi1eYHMzgbcBBR39kpS/EbQ8DuEfFMEe3iQmNUUd8oIrNV1Qw9dlUW8KIPDQ
ZTbl+3/BAR+SpsRABGrq0BtoS1dfkQ913NU4h91qdUvWVjIg4U+0lKHYQfM33RMeT/Us/woBiXWc
mmioaMPhUbSBC3sIELC9ByfcJ75Ym2MMYOEkAwDPUgs5yuHgCiIcEUqQSIDtiHiYOXBsIITVjaEX
oGiOMnlREpoCX6ba/A1MUFM3OguVzwl2BYGsj9fDRrLiWS+Zw/A+9X1ewx2jlLw6KaooVLFwrB8N
NpxBd2PouRw1YuW+jS3AwRdgCvTOyJGSj/AQI0IIQs/Gb7LIy3Zwkk9EOsCNj8Ly0ZnwXylwY+7b
SR5xCP2FLIE4oy/Rn6Bt64KVRA+xrx8QML9nHFtD9zdZK/M/V8t8mb8D2PFPUsHBV2nZFqKgy9Da
eqmj5KYt6ARMU1Jy+vAk4kY79Mp6KOpBOAfP77k//uDNPOX/lsdnHPNnmRsEEknQ0v9gST5DwQQi
0JTvOZTP8vEvew/zaAb0XiE46CnQvRFOejRv6eqLQxbvrvlmWpJNoRly33nnc9MAG0tBZF8ztHat
oce7P/J544Bxw5PQwYecNe2VqHjaMT4ECNwbH5nc4JRESpzG1daNejG/ZQ3x5Hm6KzQHFtLNLt08
f1stmZQQZEJ+vFEFyDUq99x4RaNm9WSHBX2VBQL4J/Zg54aghrYPOGvSFQEpnOOVoKFteE44NNFk
u316NHzfnqw/atN7ZrzQTUCsM5CSFCejym7WhW0qysEzksxxslK9c3GK/e/qnQCjRKHM/oN3Nfw+
GaaeelVe7lWbBxkpV2r2HWEjTMG8QgA23sZr/zYvs97HND3gpoTdhh66EhB4MA5HH+pJ2RdjKDeb
HIZ2PjFLrTiO5xwMrhjW9mN7trs8IzO1fS/BFA45WBTrYJr6bCi9py7r5q0mROXY0wCaXJkvjvPo
pkyh10GBsrvNsV/md9xbLks8zzn0XZaYv3PsgwtA08/DwrfOot0yh2isrf3CahclLcNjGulyQAQu
Gtr9SkBgxfs9oOhHRih5rkVzQ6OClQxJBT0LmFZLBiwzIPxK0QBYJ3PszQ7syy5fGoQ/yzNHtBAR
vlTvMurRG1XTOM65BTU6gqzs6KBm2qhn9uki+9srz8SN8vddTb0EwbHZWc5QE2w+5TcXKP3DZnOU
A8zPUgoG3v5Uo5v9jvt08fOXX3DAA0DA/JQBAsxuzYG7enkW7+F3Znm+NjD+S4a3NMM9EGU4uBIo
+sLmWHm4AXBzewQgJsD8MuDjWWzOezj/zJybB2CwzM3y3+aZP+Wzhi1j7pWz2juYssqVQDN2NUCA
AWiXkytmbcxrCpHOKc7rkCBK/IIMO8/8EBlXsw7M/EHELpW6cv/YPHQICN6fcfiPv439yp82fW+8
pTHXUzqFAGxD+YB6YJG6EtSas16LAPxBlLqAqNieg63GnYz5iDMZeoBfxufiMGNLHt0fXwAt6jan
k3FeozTKKR4a3wKgByKSRI9KRVeouMiIRD86snuAwPLfO6MZlcQ5VNnbrFO1A8oAnPamw1ZFJQmk
kSBtgnWIGZ5wMT/mmLNGE+pJEwkGgNEZuYMo60x8gmICVgqc3v1a2p8mZFNCYuaTcQiYW5NoQE0O
Qb/3CpBruB/7F3bAUcSFWgaivcMQaIxFzDRNefGsgRd+ToAulNbN4osFIWqcBuv3PvB17zvxV/2D
whRDSegMmkGT7DWLM92wQM7o5EXaaLaOm2UnZ84ZB/SdZqj/n+D8t4C8GIbsSnfEYtb5HPN8kfVD
YpD/XO7L/GWXAcuMFoXX8jz3W4FSWdizF1kHDgZMNAv+afvNV7CT/aN2C7yMFvhGQQGLqf3sQP0Z
wT+/WBS734PKvRNhJUCBRVC6uVnqbKEaXr98TpfcXeSftF+l4QR0Dh4EwFCDM0v05rs5igXlmyMK
sK1fE2TitHlwsPn6gvq6L9PlHzhrHNwm6Hcl24pSNyLtT7lMpj9K6VlRqoGmX9NPJhKKl2Nzo0ZH
LfJLT6D+OvjL9yHjeH9pjSy/4YFyLCPxGJ3QHKIxFk7wxwmbBIkPZZtAO72guWUnKmfvAW3Oj1QA
jofxIW0ACbZwoS7dk2DA25M/zUb3LEnfp5nkWf/9nu4AoMciXsk8h91KD23JBEA2YHzZoTbBuSto
sdWJQwzHDn3Bx1BaRzKfU5PQAqcJTEx2xjxyoFxnk72EqlqEGOSuTSkKxYlZMkrLtgDcdE6Aao8d
fDgIvKi9o6vfitMFWvhtxOzanOWdu037F1Hsh25Xew1dAhTdjbjU13sZ0TrKQEKX1GWZJMgnM2Se
/UM/Ah28p1ttNZNyjYcSv/VdJRagdQCXf45SlPnpSc0MlOv44Trd+OCigmG0hG+EEri62uCDb36W
AJ9M0AKaFD6evgr1RVPjmXQBPBSUsVfvpu/RWyYDbcvyfU1Wu6tbsTSJAzoKQPi4sVDVntH4kAXq
qjvlNTiK9xePAR5ZD044jKhT+wIArj4s/pbSIA+EBh2mcFQA8pYI9Fd98tR4z6Ln4eDF79gix+XL
kZrztBgyU7fRf2hrV2+Ek27XTqh/Llz5WdT++68Q/nvMNMsz2fz/1f0QMz76LDsyPpgxM0QQjy9l
aPUzlHsQhBrXfDmjwuecCfo845STU6gDPyhVpi/vs2XLzD/znEwrUQ9AO9s+QUtR264/i1Ajmbap
eOVv91fSHIHcCHaZJNNEaYGFsovOVtTGCUrHQgP1nVKouKurpz7/JHhCsvXBF6GRYmjusKIMk4Xk
8xMCPwTXZubomOCqYNMqlfF5++MpT4/ZgKMFdu3HDzj21BU9VRdHWtVUdkhHKxblHrVe+0tQKkcA
xOylLkuj6r78a82fGVQH08DsZysvWwbLBJw8N1cc3KceNY9a6gl6LQ/exj7C9zrjXI+h7m8L9lfV
JUMzAKHRYQuMB4QibYxiZo8tyIWdNW8E5mwBxL1vNl00DOC6HCw/Td7hyx8woH0QpWt5DqqY7EBA
d0AxY+5K3rtXhaj7u4zcUtkV5nS7izJzqBFf2VLn/hffzcrbFu5TNhVz9pkzhayhre3qc1Q9WO8F
GPzKfeaWaYnJgbqsafQEW9x9TvdH9qQh3v28hYB9ASBhfpF5dG8CmkCF88pCcmOZhfD8y+bRTxg7
EEkRNDP/nnHy2X6WObFIQEyM9eD8NfOB8dnYRSvs4OhEO9HIRKUVfUfbdhQpx2Oa+zLggrkNzl2j
9s6+6wMI4o0P98LtGvEh5hCDHB0jWZBDmUz2qEbwlcbH0NowZTKU4/UjFFff2q0hRJhdgumSgD6A
EzRBn+hkpZe8x/jQ5HF9ZHyw4txt46PzBEZ6eL6Y/Rhfgf3T/DuVQU+9HBBxjM6krKh5DIHq27qT
gc7HFFoC41Yt0JY6Fy0Xo/W5+rXMUPhSXxH2ghsdM3zn6fAwMiaS6YpY5cscTPvr+3MLLwgmhSft
hRPyt6rwzQPa4DUN2AgoeP8M4HthB3obHwmf2fUrOIq2fcWwExCbHsFX41R+ZISA/Eb4G3UOBxgo
gU481/oKXXyfLj6KVvzu/VoXg26LByAN/sxcOwLDnx2CkcXN2oCrFdfd9S4YHS62VstPfUQP9hDm
+dICAuUr+5aa7zfz3IYafT3r8FlGZH+P3QIviwW+UVDAOj2orpuHdRhlfa/SN7RnC051LPVcK6wT
PgmNiFrxGhRuBycIVhAgCQ0NVUpEm9ocUfVFFCaSutqH9mvqlsZRJp9EFXjBH0fXbyVC7SUv2AVu
0IwWDTWJYPHplxNsBoLD5C5VQwOrPD2lrs5B6v6ilJ1oVKG/7BvYWKj79mCjdbEFJvz+o1Zlw3aA
7poffJMgsF6tqORWpWxUDi3S7vs0tDUaRUH/zhgZDcoqok3dqC8tsahJdIcdMD3P4RsUpxSb0NWD
y4KC88g42SECSQvUKG+C7q8e4hIokl1yI4hydQVs8FpdIRcvnAMXEAdH1AI44Y5TsPJyNvXw7jip
HNzuOPnuZBbCMqPlV01GCUX28ipoljAGKPtbvnDCexuuICaIWvVEpjZ7+Nh8YCd3mBKZkfJG0XZ8
HuDDN8rWXu6hs5es3iiH6OQYBwEtDf15CMtfS41bM22zDlWqfjxJO/7wTa3xG1DtsauqPnqGA8hN
e7ckKeyrG23FrZvSDtqeJVhUxTztmwb95xDyfejRAQq03dL5v67QeHaptn8PanBSjHxCV3wNGcqe
6wiqVQ1opG8Supt1FVCAeYL93Qmg3I1woa0+/ssvC10KRu+MwcrBAYMu/izOkKlbnEfpenQIGy8A
2PgjsuSPQN3XQV0wmQxSBAst0FP76S6Rl2CrNb4fPywOqQ0Wz816F4WmxSgDAUKjLbp8sb6Zq8Yx
dqAjh1HOX/3+WZS00MpNc1PrJebexZtKCCoiu8Vn75uLDEhfg25eqEaM1E0xGVG2utEH38e8I/jP
pla7jFZeV2dGdWvMUTNJecqMJvP2pQEKz8nd6EO4slaw+WNAFONDzC470VFttxAQvdGglJAcJd2n
CyAa2HNb18+XkdWfVNg6s8+ZgbNO0VXJinVVBdTUWQTuwpPRIXhoCpBRM8G9yabTGs3X7JeOkxqu
uqDP/6ZVbjs2aP0rm1Vk+oaSLrQCCizS4vXWdJP+lozdzY4h7cyP/9pAAWcG7umBjgy0YHdAvMeb
MHjD1oDZk3RbN6qv6XIiLJpCyjhWbuWL1MXXXtW1FsotyP5viApjPlqUstab7i6tKr90EzGtEpz0
FawhC6J9qF53984iUBWm6ChfdAZoRVh/W/0u67VlE3XgxXd1AYzTO7CkYbJthuLuxFi9bHoCDy5D
JzdsjJlx2AYzj/DB5xB/pAPEPKUJnrTE83Z7HDByALT2wjF24Yxy8ySoWoXZ4BsVRZDkrfNGu+BK
vJK2UOq28gyA6WDalt2oomtGEAyo+HBRkcWFVg97r9tdQAh9xhUDZ+6g6O7Kvuxi29/vqn0/Zd9Y
/Z8Jq9DnCU9Bc+NUnS6dX9I62usW7d+opAQ69yBYebHKGyX+JG0mswiJZ5ULQMWUE7KPOZMh9QTw
f2KMaysJwy+wwqIju2jY3/evRbRtyJiOzTrZgHJ/H5MwIMj1Xp5vLgBHbh7c98oRGE0jD7MuZ9Fv
WeXsNu+llaKXASIp13MFXPN+gkvhBDBvnqcbz9P90e+iHtsbm7sTpFrc+Z2nZfWf9ixMQI74xZID
4rkwK2dX4lXM3ekxAjaU810IBAPINtvsyZg8mcOuRMaLtB7meH5wEYiaOeFO60IjgLu8v6LbEkmr
ZNpWNgFILThSasm6fMh++GKGpTMxBgi3RLbe+/mAmgcDYL21levUX1epzz9VW//1Tm2ibNSNDLFh
ctBnU/WnP9T7h6/rFt0nisYABdj3A6IibPud6Si14BioaMb30NxBj2hieBS/AKAGvSF/M757c8aF
Z8nDdOfsmTQJlmcKOI1OTDr7PR2NztEe9NKY2idaNE9LzeQNmexRX+ZS02GJvc+DeehMWaMn58Bj
R4aTj4Ii4pWHhsV4PWunMkG+hYicrnCAl9BeGBgc1MCCL8yXSMViJ+8wWq6SvKqdcURUEWFE2h0+
egbMjIxqbAJ/kfaTfj7LHR1e5HI2uhro37Q1Dqnj9DXlRG/R+uh7+yzgCN1/augo0OgSprgM/Gon
AIJGRKQr5uWxc422v7JBuXd/eInODL3dnAUE644IYboxRyGrrdxkWe+mPIt9DnDTts3eH7fpQAST
atr4iDCHA2ilaQzKGvc0MYCbWfPGL33wdY5m3rPePfBtnfjzURKx7Z2wmBcAlkeHRhDZpdwGYCM0
mFLYZwTeXsSm9s/YLfDbYoEX3Baebfi4+ZobaVfjtTYNDEOtZNG7oBYcdHfVL00262YtLUfmQuQf
HmdTjTXVXGHpCJKUoCh/pVyffuymuV2oF1ML5mKEWaZRw6UFz42ztKiaD1P6rk3aWBpLVtlQi0C/
ac3VM4hg2xgtTkYGEM3p0YgpOmfTN8GrbaNYjb7nCx04qVOZVz/V9c8u6JhnmlKKN2l3PK3iHr1d
03KJ35olM75oskcosg8bVHdxRMMErl30SPY2mSPjHJCWczY1D5QzFK7PUWfXCR1H0foDT0RntlI7
DYfZgYNrBIGzK7QyujQVraT1B/Qayu7xRoiOHtQptad17fhhHYddoS3ZivcyrikH/xAt2dBeqGqj
XUssokYbEcmhxcqL+RsoOMPNstFgLTA8+jk8JgAbHFCb7+3WiD+qDSYrgKPpbnZek3WZ4GAagPkx
OqL54SENDk1p1hunizT9kqGDDvIdHEQTzvwbrdVGcE78M+ngkN2qhkOIDX5GZsu6XaWp/vxJ1hK6
/LlPPtXRm7TvQQgnB1q0oW97s+GHou6dgdDd6QvYjwB1adsapeP9OtP2zbS9bK8uV3Vts/oC8lSw
abOK4+kFTdvIUb7zi1+e0fk7/krdX0Af+zwluhBULY5p8GfnqOOfhNa9XzuLaYVjnENYBl9HnOsC
KBAN9Xp+bFqNtJEcHBO93ldOJGxE9qOvnpabPZRUhPNMHXOVgFK67fwnUztcD5CB2rVjerIiqVP0
uluoaDU1qbb5Z0pWaKeF0zMKBW9h0LTYCoZtQhYBx8OANM6PpfMtGhsZVOtti3wjAlDex1l9psNu
Uv23PrUJDZ7qQmjw3e/pe28WKw8V/q98sTZN/bbbDO3Gag/pow8DFbC4Ueuz6ASC0ztac1InTwLi
uNPxIzcXcShaqHFwL5qyA4KvxT7a/Y3hmAIeDPQhAsUcNPJUjhz8BpQy2X4bVMIaXLNrLTohR3T8
0Cf6ACBpyzbatSHCxC5DP+k6VV49r0/LpuSculY7EeGytXi7fznKP4V63NxGHf/wgj67RI/wFILp
onTFBT/KOiAjYSi+OOzzJkOoCVp5kf1iTluHBtTfPYSDaEAME6jcHSPq2Wu2Z6m294LOHzoMK2JW
O9fz7MmAL0w0q/rUp/rokwuqbwshOzXCPcOqMM5PSLKKd0aq+kSVjnzE/J0rURFdVAygZuF9Q911
qrrRSOs6dyXsRVRwY7IiiGYXRlmHFw6pFVBxjH3IuThRYbYIHUonY+wbBjJzo5QnxIcWZ8+Rkn10
QpDpW6T7w6xpIWq0EAYG2CtoS0j3i1EUzPtHyPxRA+9kHDaTGee//bB/4bpO1Xx4Uec/wRkcQz0f
fQe6AhKdDKirgQz0J2dUiWBoyr4iZSMuatjQ8aXFymoh838WrQEn6MH0XTf7hItR8W+7qWtXAeJq
/JSxe7feBhQIRFHcizK1xUGEQWkx2JzMPqBJDbYgWnmZ2lc6HFT2BMklDHvz/KYReXNjTzd7hIsn
dfmBIXIGuKu/XqFyVP8TEM2Sabna0qBbVzs1E5Si3P1blMccc+f8sswbCvEyfV9z/Yje0nZzlAzm
UK96h2k9aYAGwFYPzilXghXPiAxlbyxR1s/Pqhqh3l/M7tf2NUlKQAgNREPDdPW5hKL95bpFRSEy
WZCF6CrnxAwihv3D2Jfn7zlMy7CJSJhBzBUHzi72xRHud3QckMiDvXlwUpH+nBuGQv80RHG1xU7v
9ZCIWIVg97pTlHW9RblgOt0Zwhto6XuEFn1Bmnlri14PJlN57/OGwYAtZqDb22rje5fB7UmClsH+
Xg0g3ufsYBgjBnBfUU6E/f2jeQZB9aqlI0l5nJfWG5X3uTH1t6KqT0vJutFoFWxBmDc/BKFRzknm
25Cx8wjnwQDit5MwhgwohX8yy+8NEdSOTIzRNYHa8HG+G+/fBaaQraSB0hkrAVCv7TnBTBlij+31
JLA3tdpmbNiUrKuhJU9j5wGzF6PdgVE1QJvDEDZXZ2w+O8MzGKIcid+xsP/2Ds0oBH/Hw1C8X2QD
Jaj0DiUhEjGt26aFaUUM7e0IMpnno50NqqtrVFVvgOLWlGjv1lj5shfNjpvzmrU+ioAgZ/PAAFTz
ANYGFO555skgQZAZnwP30cu9Bnu5yTc+Qxk5+Gl0PblEy0Bvp03KjVzu0GChK0MPbT6rK2vUOW+Y
bK9rdw7tAp8h4/7YLZsSu6leddxAOHmsRqNo/ViKTJcXA+uYtogjjJfsNz0REgCXOLa4YKDS/i89
owXl+jMqo8zQx2Gjsk3XGtv48BWboavfuq1uAIvIja9pJ7T7ELMGzLMlIO2nJ+XwhEko8Ox7RxRt
xs555IivuLwGH386Lr50wQAwbqm7qk+PtVGyE6jizflanxcEG+GRO7vbnnOGvW+R/542Io6jZp7D
CjR+VRgaCsxz4yuaee4ES9YPbZ3i9U3q/LxSpz44hF02agfioaYcygIbp4nOXGW36LYTtB5x532I
IhLcRqdxLqWr8iPa537goKPO21RANsvPDJ/2hQNtNaq+VaOWMRJgaw9oi7HtC3r/RqPACb9rqrVa
9Z98oI+DYKvszFUqvoDx6WtouX2mrB9B7e3K25CKwC+lYAB0XuhOjI7eUXvTmOJCKGQZh5V7C7Dz
2EldpeXsRGyw4jkTBkeZ2wa8gcHoyPnog66Ed8SMqjjHblzFf8swJcOAUehJVN2C8Tnoo9B0owVE
m3EAwznjiyJEOjoKEI4u18Ag4EQEZywg2jxxwRDzfJi9ZmGYc4juMdHG9ivFdK20Er19XB/+jHtr
8lLM3h/oT767TcVhX+EMfJE1bv+M3QL/DBZ4wW3hWUfKgWeo/Aa57qvVzc/QEPgVzsqkqeMjSCe7
5+RFJqRouzZuKr7fEs6Bdn/pO+hJ7kDvWRNA/0dUpuk1vWQxol0EPGRVPF3DlZBOn1IOCG9TODXe
oEtHYSWcu6KK6lY11k9qiTZdPXW0LOKEcDAt6koPaP9uAudINojHbsFHsamI1EVLX5xGcDAxTxvS
qVmlZuzRY8Ey0qLq05/q89P0SB/hgKEHatOdHnpV03sapeizpDgdY2h5tOMVvbGRPvC2jB40vMx1
2vwmPu2xiyo/9zP97ycWjJsI8okoGjQ9L2ozg7LilRoFtcrEWii2+sWt0/ad6ArQueDGyb/Vfzxk
DhfjqLBhImLnjiMdQJ1xakAgtGps86yP5rH3DaPQe4RWjhd0o5/M9ESvqiqHNO16QT3Nv9IvQKJ9
UxG4Obhbe/MC5d5+EzrY3+uD4+d1sRGH37tCrrR7nP+Dg9qcOKfOTz/Spx/+Su/XtKrNoUkjN7s1
8Z1X9fp+6ga376fGDGex/Lw+/P+d1K8J8l1QmvUJNG13IpRalKiphqs6/jf/Gdv+QN97nUxmdIG2
7iJAdrygKzd+o785848kNY0uBQgz2SV3Mjh+tLaMSyazEWLVeBXtC3/9gY5dv6pzN6hpDduptzft
17yhykNBd7fiBLWjkl32oY5eO6cja7Zo12sHtG8bAd7DKf0XsyjPJSQtSX5lteqpReV2DfMxwHsF
i8NQ18z6INuDWFN7+Rf6Rd3HsEVGuS/cIMboSRbLJ562avs3qCQz5H6N9EJvla4eZf5dQXQRMKD/
Vh1A2IJcEJk79zl6Fc4IY+6grd9BFNvRbXj4KAMoG+hGpZi6wswYahaZQ890h6Y9Zotqr5zV8eYE
zRXt1n7K+b+WyzafrXJPpl2ZHyJA4+U699Oz+gLQY5rMhwETfXH+8vft0mbqPsMMjX22lw4jx/SP
AHjN9IAuLwcY0HkO/EP6wMfUoHoplDHuObALJWj/u0AZGZV0VPbfYtUdvqibzKP/eu6fbM/A0JEN
x8adIM83EwHK7Sh6J/jdrb9fcZdkPGNQ3U5dOqmfo4icmBOjvDSAw8c2FECuxjId+/vPdK6jX8MO
C2R0G9RJP2YNd+nSCRxIK/Xw+du15+092pDmh6NN//M1W7V9ykHzX1zV7Y/+V5V9QPBomBm+sF9o
ju6enqsCWop1ff6f9J98UMd+7x0dXEO96DbudeGszpZd0ZH/ely/pkTE0JUXgTvcyGD6eeMMh+VS
d0sQfDdTZmqCTdvTOeZN5dGfqfUYQQ9Ag2FbLtLuycO0ZS2l1emamIez9M/50K0LaCWc+VgfHyez
1k3pFIr5fe11ujVTrW5AmAp/sr/BdHnY8V19H3X6LBSwHDxgRa3br3fIdh6j1de1f7iui9BhrQAG
NsCH9e7qFadsQOHtO9MUSw8rs0+7RJdo4x4jSos69tVf6D8f+5kt82NKR5zIGvnRpSWADjYJMctz
wikI6vHGndo8dklXfvn/1L/9hyW5UnvuGWTaspF5zMhQ+liljr7/n/TvO2v09o/e0b7NqTYhWPnE
KHHNZh1oPKWLJ/+L/l+n+T4yrs60ufVFZNUHqnEKOide9FVd3pcpNWGdf/75KZ2nAfo8bIexDlpx
jbB/XSFD+kvOASPct/FtvbOb+RcFM8GVtqS5u/QGgZz3Rd778X9SxS+g7BrxMPYJA6Q4e0VztpVo
5wGyp6FoZjQe06HP3tc//vq6qjkHff6W5zvzI33vjd3a7tVOG8pf6FeM4dNzg5r1vM53tWr/W2/p
YFGMaE///BeBjGcI5yuZdNPSci4GejUaBxHopUSTAQzk79yyAA1Ma827324Za6KF7Of6+yNVGqQu
wpma49oaAPWZc/oP//YLwB90QbxRG99/QG+/kqLwe5uYQ4CiC0q1Fme/49IH+m+XfqOf4ey7MMdd
PWEiBACKxKZRWggobOx9/ag++Ztf6hDgeRkCszfLBuVe+6be+WGBkq21Ovzzf9DPfnpYzX2Uj9Bv
/lrze/qj19cob7ZcZz78TIdrARtn6XkOYFg7QHB/vk3/4yHD+oFyvvYVvf7KQe2NJdipPaG/++n7
OgL7rIWWrW71i+rZ/qZ+/AP2YOfbOvz+r/XTn59EDHdADrQJvdz1Xb37GjR51PJfDMQ3HQjWqGgH
jMrT5/XB/+e0PsMOBrR38mKv8CErHh0h30CE+gigJprKdPi//0Ifnzqu85PU3J+fkNet1/SDP96s
wtAeXf7gF/rrv/5UlbeH5EA/+6td39F3XqNcLDdJ6et368DIcV2oPqcP//1x/RNA/aIROlwiswsL
wwe9gaiUVIURnD6U5X3emXS3JG1pnNaEF97Xz85MaHqSRAP8bwuBs7Mn8zx7t3YjHJ1pajGNPgI6
BBnr6SgxblqHntav/t1R/T3jM6KgVgvjIzPvE4weDV1IwgDcbZnh8WZVfoY6/qGLqu5pVzNtcOdb
WwDWPlvuZOGFQOTag3pnH/5azCqno+lMkQgwRyeoyc9uqM17r7Zk5isHFPYRVSUYV626dZauPccq
1dI/CWALIF+PVtWoH60uEd+ma4GLX47ytu7Tu69nUIfP7oYGTNLm7doLQGg9VaVLJC9O/YzuDNBi
XFGrdXVHGyMiRgl0Q4i3CTuz97nTDaVwh/ZyvJxD4O/o/3lJHwJIL5dYAoDBCPKhvj4sIYNElAF5
n/fhPHj/IgxGJxf874Q0eSU5abLiI/3t+Z/ZSkKNjoHFmW4LKaXaQ+ew4mhAHTQGgnMRez7Qo0OX
junv/qej+kfElz09KC1IjFNEPMAOAM6NW0f18f8yp/ZNb+lH727QpjRfQAE0yVLyVbijU+0nyvXF
v7+uUwDULgCzrjBJPb1oVxubr2TmuRttMqdaruj4L36h9784qbJhfJbgUTncekM/+aPtKokbUvnn
v9J//+nHuoI/aoVxUjE5oVf205azIPQBU8uARmN3SLiV6exVAOT4XXrraxFVfnGb2z9pt8C3ZYFv
FBRwYNFHFR7QK37FGqGXr9M0Was2HE7XGRxPFjWtWmKNwEsxGyqZHp97ES0OqV/MGlqJkCEORJWd
nsfNtE6bx3F38qB1X1SCUtMzlZWGYBioNYQ89kUyjTiKvnQXSMoMVWrOcu2WkQayQkFzpPe0j6mn
/RKRH5fgWCXvfk2vkLFdF5KvLaYH8mqUMtNKEWDC9HsPMFTbwFCtS5JKeWpW0GDTGWDJ1KiZTO1K
RAEHLzZ/iw54Q4e/eE3X6uihPkVkBfXMLyJFGbRbykM/IC6MMgCbLbgHPhNH6yUP+sIHXLqum6i2
9s2Y7ApItn+4opJBiLN4JUcrHCj5xR+oUYeFQuiPQwEN28N0QEg0jrZRbybDhwCbj6GcGTqtGZmp
7/KLVET6Zr2dApJPPWsQaTzDIrBpHUBb9E2iy0IoYmZWnAVKG/zgqznwPs8I/u4gvxV+Wf43UKfl
sFx0pmwkOVdZOCGx+zaq6eZ1XbvjRjADO8G06yJkCsxer20+2OrqdQ6QVnWNmywsz522duEJKUrN
QqkXDYhYeNwTppbQN1ShKcXansCIQ3OUb4I8U59sirF9UbTfc1Cvx/ZqbAF6KAG7t8lIvVDaZpXl
6gCdDiG37IB69TXVABqROUvCcbqP2pCFQZxpyx87K9V0cfCbg50Ba2YR+t8S9+sWqBBaYhWUrlWR
yZCuFJE0QmiUdPgy/wJ5LgHbEFNi3A4me449HB2Ze6QsDEvg0dux9jfR+qte/SFxigcECwV9erZb
hqqZvFH7/shRQUNBOC0rlKu/6m5lUxZekkN0prLzi/VKOD1IWqpRuwbxn3KXX1Sm8jaVogydamv3
Z4sPDPOHIM/X1CxG52tHzLKqv1GDN9uBlXZp/jAG3Ew7upXjcw6CfYOuRGCwIq6V2zqO9DGPFllP
brTqSmQNFpasUW4cANWqCBt9ngGo9r35hqw5HopcR5aaYP3x6hOTSWSN+iIQGsCewBiCiiOUWGye
07Jq+KKhf9Lz222lVLV7LE7uLqjq/mSpacvXCtgxjRZGSKLSi7KVGekIlf+ybtTc0QSq6R62chFT
UpOhku2sQcDBy6jx13YNo6wM+EH7rQBYWGmpCFWmw36iFeUy+5w9ll7be/9lAH3UafrlMqbeO3fU
jfO9YDJlfnQCyaVH9DqC9AivrwA2Lj8rJyjTPgA+gWiiyDFIwVFkwO+qK1gMA8ofdXZD8b6fmcMB
DkI8dDdZowgy/FcqdLtjkNavjM0ZSnRMitIKODvyUyglWkHrd/RTeO4m7WS/D6BV62Vo9bbn60Yt
Le1xs7JxwLNQpaZMzYbVulBukbVDr867y9/piipbhzRPDU9wCuBLYZ7WBG9QUvJ5xZ7ukBUFeU+Y
RPdBNieYBohvvvaKo4J9Lqm8uRd9A4TBPGk/lpyESjpjTEY0EpDq3vxwNDRtAJ4AMrQLZD2DaXmb
bOzAfFhCB8KBwNbv7jm1PG2NYBbre8vr8mDNRlyGEYX2zeC8mes4+hH0o88v0lraqGUBYDtzsk6Q
XXM3c3mdu2LXGvO7MJ9MRtsAogQV0P0Dk8ishS0C2AOUGaAITvWLM6TY86F8l7z9E/2bfDoCrKMt
J/fg6Jarbd/9C7ltQ49kO4K/K+IrUxNtnHo/ypAsLvMAKSHaFG/UYUxnARPIcJIZoTCTPX1of3GW
R0yBinbRidy1DHp1h/qnFuRMqV1gdKoyklOVnJKsZBTjnKzjnJ8woVg7qetCFWX2AgugAWeKWXIO
eA4eJuu7dbfiTPs22pZ6+ZiSC/YSgHoPytBo0oA6OorvoQhe2h78shK6yNT72MoUlwfnADDtExSv
tI2vKNUUezsDwhnmI4GdgwmAvELJ2m/k/DdiftgG1pxhZjzb3rvaBkv3EJIn2Vtf07xTmfwAzjrR
CHE2deORgKtJKUpn/iXHITqHsOQsZ4Y7InkJBXsVgE0dUNIPMh1aDIuKNe9mxle4UYEFjIh7c6HE
yOwtVkof3cOztO4VF2r3b+jKtTq19ZD5NauAMzsklvnHuZuGOGsiLWBfvEkOe2UU7YZ/7KjI0Vlk
niwaIlDv6HNB6NNCh0jKSDNKtKG0SIVJAKr3JgXnrHdMrta/xn4WfV2Xb9SrDbFe0gdMdRgssYlK
yWZ8yQn0pDetPM3ZgP8Gdd8HMbyowDBF5JkzZVn/yCYlyTr3p8zCtl5WvZinfglKKXlD7w0nqycE
Qeu1MY9V1i8vX/Nby/M8aNHU0IcpLC4bX9EmDGXrbOAMU8kb8asH8xz/KTBNuVspMwHcuXL9Fvs5
rJ4FnjnPKTIlRzn52cpKjlDo/fYq/FtoqtbsdWVPCNYl9A6aOD8nUPO30l3BP5x9JpszIJW1EWvq
/F/80F4iQLZSqhGVsU55b+9Q6FK3uiur1TCIuCFBemgaz2kDezNtJJer39BdoMQrfx/4NhpZ7tca
1DPN2jOADkyWtWiNuONApwJulfcCYrFu7mv5GF8StlXm5lcQtEY08EodgApsJPZRn3DmXDKlHKns
5/GBAD6AdrZ5HqP4/B0KIIFoxHkDoZW4Uk5sixEQLI5hHbqnzrFmWSvMc89HW+4CchrR763f/ws5
b3BX+LpMJX4diaIXN7n9k3YLfGsWePEY8lmG6EmtYT7Ibu6yau8SyqsziInNoB5rFGIdXTiwA0z9
92pONRT88EwV7o5W4lqopqZ+0HzGKN1Td+RLKxhTP33PcZIX9bjQ12LoD7zIRuJmFjqBxjy/ZdBS
UjhsqASmBEFPvGlq5kIY7zvJOPG83+uhjfrBDTsCZiSikfCd7D02FXSrcbRwBIxDtmhE3LhZCwer
FwEB5+7DF45kqOnGQAvCNYb+awTFTJDHweGLYwzL6vELemZoxgbtiEKo0XzGbPQmEIBm6onz64sj
8zT9uac/Ll+Fr9mq/YlF2mJugKDfZkNOygXKJBZQ+HeittKXA8xkNhzDOLTeIMhho+fcM/0G0Txi
g/WD6uVmVdwWkPa1e0DscWqNUJDVBO/8m80eOIQ824JdoN1FUOlQllvEMXEnEPILMJnMNcov3Kzt
44jBuXGg8sxsZxgZOL/EtdoYlqLsTdTYm2cLe8TJBF8ALT5+1LjbDiH6NyQCKv0oRUW2R48ThI1N
fZkNbOFw8Ego1Y4fIH5JFmKRZ7BkpWWVnwGOvi6KGN/jBh28KFzNvRzqVyuVGBOujcm+dx0aaHHR
WVr/ozTmj/EPEF6cNvWhzHOzWMw8Z74G+gO0PHKAOwclKnPnewSkptTDZAsBAEzrHjP3DN3V5uwy
1wGJHnJrFgfVdO2WrlRPKDArQVm0vPO9v4aeNkNgpKRs0cE/L9VubG5KcdxfWFXqkd9iXhnAzplX
YHKxNuwErFjaB/UPqus0TBAP9gjmBb78g8s1SJHZO/S9mHWsQVqfmrIPo3uAepZN4NK0JEJI0Yf5
+tiScqEFVRoAEyBE/jbmEYwE0/HDydUErqxZJsmXOetOfonKPfBDxc8ZAUzW+argAcFWdJ42/ihO
eUbhHAEvo7ZsWqixoBBaNQAOga8N3Hm45Z8JKhNKdissba02ENAaQTBnSmh8iVD8KPa1ZuerBBGu
aVgAHox3WeYJGwQmK2sLeiS5m+ngwm+Y0ibb3sJ9+RiQcmVduxHupL7zT3LZf1i7i9T0orRvaK7G
Fo6sFR/Ttu5r6GjiQPBgWm++lrRJu9AsMGwvI1DmagBVAFvT4sxKoOTqQ2D3kNYCa9s/gUwlZVSZ
pRqdxBbst2YtuxP8+JEdeqAtsWJuABoEkqnaSkeSPPN8+ZDFlK5RKuCHvXwfEUx0oG1lPC02QwiU
t9PBYMHWTcWAOctBRBRBVu56xB/JjHqwR1PCe/9yIPCIyN+mg/HQh9EWmEX4zYF7MXXxRnzt4fEB
rKVhg7B8lc6xTk2LO2MH09oQ4HXOqKqzmTqbYJS+5A9dzIm4wp3oLBRqA5TXOVOGYfZRwGlfgFzf
+90FHAmuCrXpdQKEA8wbol+rOW9tc5t55ggDY/v39eP1ABC2INmI7LFfGGX+F6eZsdfR/WDPDxWz
kzmHw27bhx2jlf36HyjNtEWD0bCyAsXBO1pppa/rz7M4IzifTT2xC/uJM6yd+2uYRII358ljWh38
vV8cTvsbKcrbThbfyPobIIS15G0y1+g32C5Ak4D0DdrzV4CvrA9nQ/OnnRoTjbIPU86Rpg2vRyjv
AL9v0HsDopl/M1opljUqfStRWZQ3LJ8xRkTP2IuSINMK17TkM/4E4qKm9t4nfp1e+3GO9pq90RBw
zCYO2B9ANxB3B9qZHohQ1o4lW5cDB/R/FtEYMP7BM5WxP2lrRq/Cw4Du+wD9SvGRTH81c86Z9e6N
Hs+9Nsw8X0/2ok1/mEgrOqPJwL0acUVznlKm6Mr5mbvrO4rbgLiq2Z9Yj0uI73kxf5ctydkdavZK
zus8xEjxxUydvwE73MnEG/E6LxyQFwc4zG8wBymVKf5uigptSpKch7AEphCENW31bGAac9QfX+ex
aWqAizD8qZ0AmQWUceJPMLvZJ5gT+Io+zKGVe7SVNqvJ215VSOFu1rrRneKchIm6aDqJmLMXf86Z
ZxsAs+WJFy2vQ7J26q34DSS5KJlcdSPC1ibrX3xQP07fAeOB52/mOTZ2Zs9dYF9aYC4ZoVhP/JeA
h5w4zi9f0zkBlkMO5QOwH+Z5do6UrHga1pgfgM5jg+MzAYnK2ESyKHMT7UZNtxujB8lvGqFZ4zNz
BnwFPMD2ix5GOwPKvSd7YRLn1JZI4LV9lF/QCWIWdoYH4G8AXUYefk68P3yN1h+IV+Z65qphG5g9
iTMm0NguLlIxabQPp3PYEsG6L6DZg/nE8w3KAgiEKbKWMh5UU60mKWDuiXPNFz992WtzlHtktta9
i3YQN250ikyiZIn9woe93A2fJWPLm4pcaxJ3Zi2bPXgZuH/YxzKgwDrt/LHxDzm38a/cV3ZvefKs
sP+L3QIvvQW+WVCAjLmhbN6nx5nDyv/5bOZAhicwnNfTPkZA6sNG4gOy/+IXGxU0fuLsL7/IInia
Oq4X/i3DkkCJmdezX8soZxivb+Yy309bN/N6lh8wAEEorye81wP2hMdTHpoDAX9gOK/HvgMHjCw/
j32Vy3RkIIvO68mXeY+/gsxr1TctB4z+vL7Zi5aRawqV0TmHgCLCgoOo2qON4WXLQJgDnsPmvrqR
cQyeNN6HR2kD04LM6zlHv0ht7KSTpgPWqDAbdknIao7Fk75zub7Pw7ye82ef/Hbo7aaWtbVBt2/W
qxE6vmWB7J/XKAJ71A6HhpHpAYRaDacxIBLrJ/K51tDKkSzPo9AvnUdPGLnJpCN+SefLL52DTgSh
AVG8XsReRqAuIHzVPcbBE7DIvFb7XqitfjAInraF2TLQzD181LsXWSlYF9/IZTKRvtB3eb3QZUqr
giJ4Pc+nTd9zBKKedZEYEDfEvB7/DQfouiFR/k/+cZ6VO8/qYc2QVR+Obc4Fm9fz3Mq995o5HxAq
pEC+dN45uzM3zGvVd8G8oJ7uq7QkW/3HTQcY9rCH/pG/gyGyahDCGerFGUoHtRe8ANSedoYaNgJ7
ajCv1S9nBYR5PWF9EqRxAD3b8AgscQbCnugQ8BshT/qdF7z9FR9zgl0SbF5P+ipbAMV8oCxx9Tnh
TNbcMB2+fCyOACYBnNfPZpPnvy8HqPFu9wVujCgi2fXn+JpnHZ+DbT8Jf879ZJWBmGQE7ZG/7DLA
hJcf2jhP35BX/xrAI59g83oOQ/AZXwR0v3bvhhaQU6MIDN5CZPf2bdV0e2uu7Lxck2F+kQAMDotA
9PDLAHVEtO/6bo9vs0aQNYLXk+/T0cxh83riW/DfSa4FmNeq73EiCQmz5KkT2ABKRvSQ13OY3f5W
uwV+FyzwzYICvwsWst+D3QJfxQI+GcrbGUI20ULdbcAD2uNX+c4X/axTuFJLdykgz0OhUehxPDNL
4EV/8GmfAyjpuK4T//Xn+uQS9GtagDrebNL//DnOYHC6St9+T28epEOA39fF3njaeOz/breA3QJ2
C9gtYLeA3QKPWWAOQOD6J2hjfIJ2VyNsJReV/4dmRLkBBRJ3aD+aUe/soEuU3XR2C9gt8NJawA4K
vLSPzj7wl8MC0O7DYhQQulxC87U0qH7RG6e2MBSBtRAj6PSi3/G1fo5Mnn+0UhB6208d4lZT8gzx
E3F2MozhdAOhK8lXoTR/rWO1f5ndAnYL2C1gt4DdAr+nFkD0L4CSx9I9roosmkcLhzIZSuMWlhBu
Rv8lNRLR099T09hv226B3xUL2Nfw78qTtN/Hb7cFCMS/Ws3l13B7ptuBwSW+hq/6er4CbYcQ2o8e
jEd0DqqxqfOjtaips7QYMShX6q3RtbBfdgvYLWC3gN0CdgvYLfDPaAGSCmEp67Q3fq2tpt8JLRQL
OkZLtm5JUO1NC8d/xuHZf9puAbsFvroF7KDAV7eh/RvsFrBb4IUsYHQKcCbMa8Xn7XV8L2RM+4fs
FrBbwG4BuwXsFvhmLGBEo43Q4Ur2HgKi9stuAbsFfncsYAcFfneepf1O7BawW8BuAbsF7BawW8Bu
AbsF7BawW8BuAbsF7BZ4LgvYQYHnMpf9zXYL2C1gt4DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL/O5Y
wA4K/O48S/ud2C1gt4DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL2C3wXBawgwLPZS77m+0WsFvAbgG7
BewWsFvAbgG7BewWsFvAbgG7BewW+N2xgB0U+MrPclEznfVq6hjQmFeMYpITFO2NIMtX/t5/xi9Y
mtJEX5tqW6a16Bul5MQwhXm/1Hf0z2hM+0/bLWC3gN0Cdgv8VlhgflS9re1qvLMg38QkJcUGyH60
/VY8ma9hEPOaGexQc+ug+i0RSkmPVIyfvaft12BY+1fYLWC3wO+JBb49UMA6p+nBPvX1Dmh4ZlGL
NC9x9/GWtxs9Th3c5ObtJZ8gT7nRluzlumY1UPZL/dM/ndOtxHf1vb/8iV5PcZPXy3UTD492vk89
V3+p/+2vOzWZ+br+6k/3aHfKN6kyO6cJ5kZ314BGZ5ckZzd5B4QqJDRYQd4uv90Ay+I0Y+9R38i0
Jued5ekbxLgD5eflTJO9u9fSjKZHB9QzMK6pWQd5+PnJw2lJ8+Pjmly0ykobvsUF7tvDX0FR0Qr3
dZClv0vdfaMaswqFftaExVlufmEKDQ1S4L3vXhjXaD/PanBM4zNLcnD1lKe3j3zcHTChlzx8/eTv
wRKfn9BQX58GRszvL8pipfWfk7Ot3Z+jZUkLC/y+hbE6usrNI1AhEaEKDvBgLT7PJOY+ZobU1dWn
3tF5uXoHKTic7/Fzl+tv+ZJemsaJ7OtR9+C0Fqy0QnQPUHBYiEKCfOT57e2Qz2Ps35P3MqeYn0tL
ZhHQAstpuaXmN38tsjYH1dnZq6GJWVmc3OThE8h8DlOIL/P5udaFGS0tNqdG1NvWpf7JOVn9WRfh
4axzN7l8Ozf0zZvsZfmFyRZVfvqP+l9/M6GsP/1T/dn31yr5mzzavg27WOc1Ndirnt5+m29loUWc
A6emk1ewgiPDFBXkoZcjNDbrnbViXqZFrbPTgzP0mew4qaGao/rV357XqYW9+pf/9jW9mxPwLe0Z
zzRA+5vsFnj5LICPOz6Ef9Q7rLFZycnVS97+IQoNC5A/DtJzH4cvnwV+r0b87bi81kmNtt7UxSNH
dOzMTdX3zWrO0UehSRHyW3ST+1yMMrZv057v5irBx+Wl28QtC3OanZ7S9Oy8TGz38l8cytzT9DTB
rLknEzB+k5d1WJ03D+sf/vGILrcOaG7RSUH5B3Twu9/Vm+tjFfLtzNIXukPLVK9az/y9/v790zpX
u6jgta/rrT/5nt7YEK3Auw7/Yk+VLr3/N/pvn5arZSpCxa/s19oQASad0cWWDvUv0O8XYCwoY7v2
/OiHervQRZNnf6lffnRGZ9omNEXE7hIQq7S939f33t6lrQneBPpD6rh5VqeOndSp641qHyIQDwjH
CYxQqMblFFeowr1v6fUCnKKeK/rgv/xCn1xu0qjFkZZCgA5LBD7zPFiCLWdXAmHNY3dXLTiv1e4f
flc/fGeNUnyexyQ4o32VOv7+r/SPH9fIJWyddv3RH+vt3RmK8/jtjnwWe9mbPvyN/unUbQ2MOgKS
ZGnze9/V93+4Xnm/zZPveR7Py/heC+fEUJfq2ubkFBSm+Phg+XwbHoh1WtOtF/T+f/tIp2+1aXTO
UT5xRdr8oz/VD7dnKP65Ed8FzbI2zv4ff6sPzt9UR84ebfveX+hfbU9RhPvL+GBe4jFbl7Q4P6up
qRnNzgE4vcS3sjx0fI/umyo79Jk+OHZDtUNzcrRa5WB1lWPsDu3/3jv68b5EBb4U98mzGe9Re/uo
Rh0ClZgRoQCX5wECARWW5jU7A0C/sCBzvNkvuwXsFviKFpjtUevl3+gXH59SWeMsIH2gojIO6O2f
vKID68Nf7gToVzTN7+LHv/lwa2lWEw0gt8dO6WT9jJSyTfu3+svTYUZzo3W6+Ol1lbUMaDIuX+sJ
jn67w4fVpoCnggoP6IBThgp9M5Ub5PSSoPJfMp3dQhSZu1c//MmwZoPTlRb8DU8ThwCFpRRr99uB
SmprVvvlE6oea9Od/hGNL/x2gwIOZNaD4pMVaTkia91VXbEGyW/TFhXlRCvAT8znKfW31evqoTLd
vNqkiZwUbYtNUUZuqGKX+jU03KTh2WhF5qzT+tJSrY3zk4+ri1yz1mubs7Omf3FJV8om5ZeRr8K8
ZMUHu8lpsU8d5acADW6oedRLkcX7VBziJbfFMfW11Oj6scvq7HCXb8EBMi7zWpzsV10D2ST3XJVu
yVFh+KT6mm7pw897tRCeog3bc5QXOqHexlp9eGxULazH4akFCYDu2S+yOn7xWrN1i+7UDam2plMD
XYM8P8OA+Ibnz7MPctV3uoakKHvj6/pedLa66+p1+qcjGqrt1fDkgpYABeyFM1/RwC/6cYdZzXRV
64sPR+RdsE5vxQEKvOh3Pc/nHDzkGZ2jTQcdFV3Yqbbr51XT2ao7AyMABEQaXs+LTAC6BcQra8cO
Dc5164OJXoDxCQIXBmUHBZ7nyXz19/rEKmvnq/pJ6IyC1kQr6Ld7a3rK/cKgGacUouyIzjaMypKx
V2/HBcjXGbAD4GPcMVapwR5wMl+WC/bcULOunGzU7aUM/SAhTIGAAs9++SowdZMOfDdCaUspygu3
L65nt539nXYLPMECHsQDmVu0xxmftb5NdUcb1FHVpd6OEc3aQYHfuWnzDR+Ji5qbaFfF+QpdqrLK
O3eP9r+ySWtj/OSpSY33XJbv4JIm++flPG8ozCC9mPjlAgbIImVs0c7UjVqCtuf4rVFcv8G56Ogn
37RtejNlkUwKFHOH5zmYX2Rc7gTWa7TNvJZG1BI4qn+snJeDwzeB9n+9M8zB1V8hacUqSC1Uf9Gk
5OKs4eZudXROKpPyGJcFahz7+1XtEKbIVBf5bipWXmGecrKC5eI/LY21am42RzkH3tVrRTipd03t
k7tNm3KT5NzvQaZ/UKGb92tfaRZMGkdNNVSp6vQVtcyEK2XnDu3dnKm0ME85zgyo69Zp+fV26ij4
m2XJZMKWoGMKBkC8Egs36a0f7dKG6GENVRwl+G/QHE7Umz/crnVRwxqErdHUWK9ZU1Iwb3JozwMK
kNEJSFL+ujB5to3qyOgtzcBIcHT67Q+pHXzilb7OvKxa7Dgpp4vHdMcKW2YR22GF3/47eJE19zJ8
ZlEL4/2qrxlUQOiU5r+1gwFQLihN6/fx4kQaSnHRBx9dUr2zRYtLtjqb5zQeQHFAonJfC1GwT5e6
zverHeAPko79+rYt4ArjpGS3Ytbepah/a3Pqm7hRBy1N9qqroVHD7gUqevsv9ad5DyCAxblZmItO
cvsmfvob+U6LlmaG1dHcpdqFSE3Canu+y0Ve0UXaGpmnTcaLZIG91I/3+W7e/u5vwgJfr7v4TYzw
m/9OJ1+FpJRqm3ltbdKFqY/02fEFOc/N/w4wrb55871sv/DNggLWKU3116usdVbdASV6Y+MmbU7w
v7tR+8g3pkSbDswQgLRrLnG5fvehNbgwqkGyrNV1rWrvHydYwVnzDVV0cpay02IUcV8hCEcNGnf9
7WrdarijkSk3+QUlKDk/V9mJ3nKb7lLTrQpVNvZrnOAsNjdP2dHOWuys0a26dg3MOcnqwIHiF6W4
jGxlpgTIa65PDTW1iO31aWJqDqTCVR5RGcrISVd6qDu01kZV36hR3Z1hCHwucguKVFRyujITohTm
STD0xJlA7na4TS1kJG+3UbM6tSgnzxAFBQcoyMdBC578GRZPRpja8PsxGc7oRJdaa+p0u6lLg9QN
Ljl6yDs0UanZjCee8X7l029BE601qr9VSxZrSjPO1A35xSghI02piSEKeAR0n+tvUvPNCtX2EriH
YOv0OGi10xppa2KM3RqascjJn7/PzFZ2cqj8H01XLI1rqK1BdTVNahuAIu/ko6CEVMWHUuBJ+YCr
h5scV6EOWmf71GlsV9+u3gmokxZXeQWZcWbw3MKhGy4bfmn8jtpuV6qqsU8jC3jfTtRWJqUrJz9O
4W4zGmuo5Dta1TbEb7v7ySsuW4VZKUoMdNXzLwqAE2d/ReaVqmjeS3P9bept79ZoWqoCe5rUNzau
pewcZY/1EGx4yJSw2kILF+azG3oaUD1dCRIeT4rwd27U+fMeV1dezmZWTaqrokl1N6yK3QFFf0eB
sgPvRhceILn5W7Xn9U453HGXdyCsAlbUovktgnMX8xu2H3GhZIDvdeWh8ueDvzP/7oT5mb8vPJ/4
DlcPubu7aclWNnRL1wfvqB1Hb5C0qHtQrFIyM5WZyJx41NDWWU12kSWqa1Rj14imDP/THY2G+DRl
ZyQrwbAkvpYddnkNNtWyntr6qMNF54HyjKS0cAUtkb7F1h5uMAQetQG08vE7zO+6JsY3rJl5divP
YIUlpCsrPUnxQa6rj2+6V52ALTUNHeoepabc2Vu+oREK9+dm3D3lEpSojCgYJi5Lmu6sVnVljW73
TmoJjQn/5DUqgF0S7wnjqqNGVbcaAJkW5RiWpsw89qNIH7nf22wsUxq706ja201q6h7VLHoVDqD8
4YkZjC9Bccxt21snOmFy8F2sXY9gxm9Fc6IHXQqPaCXzW0k+kxpsuq3q+kFN+sYrZU2ucgByH0qQ
z/Srg3u6XdemnrFpzfJsvfxjFM+zzUoOF1OPy4qdm9V0+bpq+xl/KHtVejw13OPs6y2qb+nV4IRF
ruwfCey7uSkh2ODuA56nBv/2BX1yvEx1rcPycp3QP7lXKpLvtQIeW4CVA5IB03LSlIzdH95vKX3q
bVED86iuc1Bj0wtyRCciMAabZaUqKWy17Cm6Jt1Nqq/Gvnxm0pGytlDGmhIjzymrnN1ZL6yd5w1T
HpqujjAG0NDxYG9zweYjLZW6xV5R3wljaJ71GhynpCz2sSTsYCb6bL/a6qp0pfaOppeoErcGK9I8
y4J4RXDG2Pa50TaeQb2qOKdgTMvqkazMQs7HJHRLXnStwDgabqlVVW0LZUnTmrEwtgC0TALQ/WF/
8IhMVmwU+goPlQVZtTDawXjrVN/arb4pA0d6yjc8QSlZPHcy2A/mz4Kme5g7ldWq6Z7WvLOnApPz
lJuboWTvWU3fqbPN84YeykbCeWa5iYpzGVb79Vuq7xnXDGvTmfPCPTBNa0qYr+x/Mz23VVdVqwbo
87Nzi9DIyW6l56igJFbBjlPcz01du9XCWcNp7eGngLDlcSWyfu6aclVrWSY5d7mn2sYu9XHeOLh7
yyckXBH+HrKw1/uGRSolLUjeK/YKy3QfgTrjaWpX1xjjWXKXT3Cs4jPSlZHE2vjKqfslzQ23q6n6
mi5euqzrFxrVathYx9A2qnHGvwKgdQ1VQnauMtOD5bEwDAvslsqqOjU056+ELM6izHiF2yYIjIKO
alVW16lhwEMB2DuvKFUJrKmloXrVVjFHOy1y9k5Sdl6swrxglDHfmtk3R0DpnIOND2LmW7DQV37k
IsjnHG6+zfcAlA/APnPy8JFfMNo4aHNYl/jv8Eil4W+5izO547pOnD6v8xX16nEc0Ad/16lKmA6O
lDAuUl7nHZak1Pw89jxved7/LRJPQ+zlV2+qtnNII06e8vKNUARnRmZWpMK/TBRmaUKj7Y2qb2hR
S+8omkCck+6+8otIVEpqslJiYLSa32E9DLTc1pWKZvXNeikGXyM1zl+uIx1qaW5Ra++YZmA7BvOb
WbnsL0Huj/gQRm+nl7XBmqrrVD9rg0koH9ZUAHZwwOfzCYlXXozvVyfVLYzATGxQLf5RR/8EJYHm
nhhbTJLSMpKUEI4/fO8pzTEv6mtUyX31oOXkCJspiTmTmxEiH8oTu2/f0s1a9vc5X4UmZikXpmKM
33My59ASm+ptUH3FLeYXbMIQ9q+0UBg6Zm9rVkv3iCYWnPFl4ygXyXqw95nTA42i7rpqVVW1Mgb2
4CD248xc5aUHyXN+UHdqGN/tdsov/RSWxPmRl6gon3vjs2hh7I5amHuNZu6h5bLozN7rG66olDSl
JcPOtMUP+EdT3WoldrjZ0KuRaZKXPpyZcWnKyE/gvJnTaFsNMUiTWvqYh8xZ85zT4txkHWhVXV03
ZwUlmL74l6lZfG+kQm3re17T3a3EEA1qgTE57YTfF5zMd2YoKQJW5zPvzQua43fqaytViziqow8s
08xYhfpMaAAwsLm1RwP4L26cVUnG1+bs8H3Er7LM4DM31Ku+vsN2Vi8Qy7h6hygMhmtaWoJiAlbx
W+aZG834AJzvXcMIjjsHc38JivKFcQr3yA3dKjejdfXQxblsbM7eV9PSw9m+oEXOUZ+wROIDzrX4
wFVFXZewfwf+SE3jHfVOoiaCHpZvEIwnNzSy8KuDY6MUmxzIaWK/vg0LPH/88zyjoiZ0YQzxMbyV
UX8/uft5P4LceikkK1+bvOM154Nz6nkP2cWhmCabUlOuy+fP60J5HQtyjMMV8RzvcMVmrNO2nVu1
pSRN0b5GiA7nnE23ufKsvjh8TuV187K6FWrbj76rHxyIkE/PDZ38/IjOVLSoaypUqWRl394WI9/W
izr2m891vnKQINZHCRtf1Vt/hmObggOM2F5b+ef6u5+f0LWmaduBtGbve3rPHBis+tmRFpWf+UKH
rjVpZLhfg950Htj1Y/3l997QvkREFFezkxEE6q1T+VnqwM9eVTkLemyaevFAnDx/AhFRn+6Xq6I9
P9QfbIa2bxxk85lugucbl3T27DVdZ2Gbw3XJiqMWxiazeZu27livEgL3wK+k6MbvdFSp4vCnOgr1
u2vWAn06TSXv/lB//pOtKo152JOZG2xT86kP9P7ZBpU7xCt1wzrtTiOrDdByhaC1e8wAC7HK3PSK
3nxnt7akh9zfECxzg+qtuaRzp87qTFmtmocm2TS95c9mmwRFOIhD5I7JbONEPxD1whHiN1tuXdH5
s1d0md+4gwjY/IKLPANjlFy6SZt2bdXGjGjmkaMsZFA6y4/r0KFLts2+ezZL6979S/2bVGztMqXB
C7/Q3/33IzretSSPrEJl7XZRQFS8Yl8AFLBa0F1ArG/Bl8DSl6B6BEHNAQLhiVDN3u4X8ZNS4mIU
jJBdH6KC87Nslsahp/5x3oj8mfpHmDJUzzxCk+E5zxudigXb98+blD+gwOjgFEGcu4Jd/BXAmnno
cglQRNEebU3FYQsLpN5rQRZP5nwWzmmUj9AoNF6OlgzKu8g40I5YsIlGOBL4BBGwx2k+hgDV/UXD
bxxyR/QJZqgNvXVBk4MuGm9qUFMzhzcHo4s/ATClEjv3bNF6gptwfsd2tCyOqwfH9ebFszqP83+r
jYPUsIdwbkMS8rV5yxbt2LZGqaEcqC8MWCwf1pNddbp5+rjOXLimK019GoVVYeZQAvce47GgNgLk
gEQcGECY+z+1OKpugKQbF9iPrsPU6BjUDB7XogedORIKtIWyie1b8pQS4rlCWJF9DKZUzaULOnvq
nMqqTZAAwu7Oc4uKVaRDmzqg5Pls/In+b68FKc/fopnuapWf/AT9hzqcHTKBm36iP4fxcTCYkoyL
p3Ti1BXdah3TVPAG7XjnXfm+vkZJBhFkfHdulxMgXNDFGwALjG+W0g2LB4J2iYXavJ3xbUUnAgfA
ebpH9ed+of/t81qNhK3RlggnWXoI8ueCFAeQWpjALKO85PrVOjUtJCt3/3v6k+9vVEGkh5wdcLYI
SJpvlOnClRu6fK1OnWatW3F6/NC9KN2grp3btDE7WlEEHQtjHWo88Ru9f7Fap52ylLN+o95KddRM
222VV7eqs39KFu84pW06qLe+s0ebUozjwP3M4vTVl+tEWbla74zJdfoOyuJXcNIJNPCprQ5BStjl
LI/oRFsA80DUE0CDIOf6uQu6eqNC13m+Y1MwcpjbAbFFWr9xo3bsYL1Hch7d+xDdVsYaKWM7f1rH
z1YS1PZrCrDMKRR1+nRKgybR4hiBzZaN8/cYUvQcB6KV9Yw+yBLgYM/QGR1vp/aZYKO6A3HOaUDe
wARlla7Xht07tSWHgAYHv7vmtH790y9UWdXLOobC+Ud/qhCcwnDbWUmwMdWuymN/q//483PqdYhT
dNZ39McEoCkvBArwfYiX9ty+rHOHj+rs1Ro1jqDrsORBIBeEk8auReTkv/fP9N4buwAF7u4R7H9z
A3W6dY3PcUbdasCRnKA+HDDBJ4pAuGS7dm5eq/XZofK2OZJ07OkD7Of8+NXldvWMTstx4w/03vec
9b2QXtVeuahTpy+rvJ7ytYj12vraXh1Mn1LtsU/1+bkrujZBIOieraIdP1JABs5woKPmB27rxmd/
rb8/W6+WWQRbAzejScN8LopVEG7sWMsVnf4C3Rf24yUIXc4eedrzr/+Ffvg6OkareuiwpYZbdfv8
CZ08f1kXqg0oMC83X3/5hQEKuM4CHkUpZcdr+tep90ABPkPZW2M5Zxvn+00ApnZAwOl5gOtgAPK1
W7R103ptKYhREGfUi29jBtRsVE3ZF/rgUKVaAWFm3QjWezrV4AEDwgow65Ojrd8LUmgqJTcLY+pv
BGD7pyO6eNNJRa/9kX78f6csLxoxPxsQW6HLh/5JPz+xwDLZrz/7d3+siA2hchhpVu353+hnhyjl
G4jTulc2aG0BejeVN1VtArUJtDf8U5W6/Q29/foO7UgmqH2wYTInSJycPaET56+prN6AAovy9AOc
Cw1F42CWRE+8sve9of8BUCBc0wTo1brEnlJe36Il104d+wBfwp0DizNq0cFP4Tk7tCcUcJjA9gEo
gF8wRHDGnvnZNYAk/JbZuUg0id7Tv/mfDmh/qu8qdiZ4wV9sr7qqM6fxDyrxQUg6jXMOOrkifh1B
GeiaEm3ZsVHFRtcAcHuk9ZqOvf+xTleOKChng0o25inJQgAEaFfTRmA2SSATtU5bXn1d3zmQR3Lh
rgCb0bCY6Fbb1VM6evyMTuNb9QMyOgGc+/v7Ah7MqNsrXUlbf6D/9zuZinos0HrW/WU5cdRyrUzn
z13UJWjezb0TNpFWk7AIjMtU/qZNWr9unYpT/Qkc2T3mRtVXe0WnfnVUVxFVHXNOQe/o+3rvR2sV
2Xtd18+e1uEygvkhD4Xm79ersCLfKAojoH+OmYv/OtPH3nDin/TrM11qdsK/3ZSr4vhJ3SEBVdM2
ILYYeZLESynYqd07N7M+IhXI5myZG1Ff9SWd/NVJXeskOeeWrtLXvifL9woU3HVV186c1pFLVWoc
9VZ4wUG97vauXi8MVgBlZxN3ALoundPp84Bat02SCsFYwH43b5J3mUUq3rBRW2FeJoe4yUKs0Vp5
Wp99cl7Xq++wt6Sp4NU/1/8AkB7pPqae8o/00//8gQ43uCk0vkAle17juflKNYf1/t98pmuc6daU
vXrzx6EKjb0HChDM9zCff/nf9TeHqzUUkK61O9/R92PiFfNcoAB+3yjrsOwD/eLzOrVOpFCiSZlp
oatmam/Z1mEH/uBiYKISt7yuN9/cZVuHtjOU82ZuAIDo+kWdOXcNUJSSznET4AOq4hOGJHLWb9ii
betzlRXncxeoYB6RYG0v5zOUfJ+rauZ8nyG4D1J0SpLiIvEoq4Y0uhirWM7I++cu+8j0AB3Lrl3U
ufOXVA6I2juG70rCyzMkVdklJKt2FaswLVL+MEhtM8isjfEONaGNdfTzc7pwi9gGX8zFw4vzBuGe
AVMGlaZ1331N7wEKxD7rUrC/7ytZ4JsFBVAzdyYTFrgwpaYuMrvd/ZpLilyBkjnJK4yALiSKg4x4
iGymbbKQ2W+7fEYfnm1SF47Omrd260cJISBFUxolU1d3vVI1p76QAVx3b85Wkjkh/JJVtPsPlVRY
quscQp8f6lEXC/3TOQ4QKwF3wiv6w10E861N6pzFGePvU7Z8Tz8iKx/30yO61OmphC0bVVIYJX+T
7/NMVMm6EtU0D2kYMCNt4259f9ca5SPyZrZ774hC7fvDGBW9CljReFgf32jQrUUybhx8C0uAAo/F
VNxgD4fvF0f14dVhOURs0Rt7k5Uc7innpTkN3T6vslNVusjm3IvEp0lCchpy4LGxfHpcZbUTckja
qndeS1UcaK3jNHTvpuu6UHtZhz7jYNyzVTsygwRQ+oKXmwKyt2n3X+Vq3TTIXeMN/fwf+zQzPKkx
MiSkTx/6Xs+4tdr8ByC8CR/r3/3DKV38HMbE+C69se0V/Wi3P8EoNMBzh3Wx7bzOXidQD9ui/GCc
MY3pTsUpHfn4rCqn/BWx+4+0Nz2KrMU8WdhaVZw+oi+OVao7jgzxDhgY9zKHs6hGHzuq05e7NB2d
r51/9R0lUkfvscj42m7qek21Th6yanZ2u/YWEYCHkEV67c/kR21+xdFDOlYtsjrL2d+lhWnN8cWL
sdlKK1ynAwc2a10GSDWqXy+UxEHYyaikz1t8FZPoTya2XZcHOtVU54TjAQAxEavkeJyNxWYCPYIq
Dmozzx86Wm3P+8uue28gY+LvKFfPQdRgO9U+kKLwGK8H42bN+cSDuJuuBiDYvFPeUcV694/zaWDg
KT+GZ9Bxhnz/slpMcbMXddR330cXA39bqvJFLuiqHnMaG7ipk5WN8itBGHHLW/qj75MdcJ/WQFMN
z/icjv5qjIPlLb22iUweDuLkbQC9L8pVMcy63PSH2vlj6klxcOdGAPuuXlP9tcP6nLvZt71QOaFf
gTEwUKnLnx3RZ2VDck3eqrf2kWmE+eNMNr+Zw+nEx6d1uj6Uw3KXHGBy2KxgYY7VnNFnhytVPeqr
9G1/pD0g8oEeS5oZ6iZLdZ1s+CHG56z92/KUFfwgI994+jP94kS7Bl3StAHA0JYxxREcZ37UH6vR
zdYujZKNnbapYjnLL32rDvxlrvJ3XlXFxU/0czLBN49/qHlPi0ZcEGR9s1B7XIfUWDGimckRQEUO
VncCj2r2OgKEmokA5ez6ifYn4hy5L2hmoFuNV8vVdPFzfcbceGVrjjKCslVcslZba1v18x4HLbK3
vfOOu0bPfqgPD/2DfhazWdv2sl+yH1ZDm684e1EV+bAV2CtDHTp0+xRr9HS75pNyte0v3iTz7it3
9r7h1irdbqzWKdbhzPwOvV4aLb+oQm34o3+lgNRfa/DvEdb8bEIeu3Zpb+kr+sFeMmTWIbWX4fS1
4jCXJyoypEh5ptDbC0Cx9IB+MgJ7YmFQvvlFODw5NtHKJXNYwHbxgJ0VGbFyLmCH5jKdOHxZZ+94
Kq3gO/qr70YqzBfGAvOolcx0Y+URHWLlze9ar1JDO+BZTHZc0/EPPtX5Ow7yLHpbf/D9GEX5L2l2
+I4aLp3UkRMXdNshU5s2AJxRHvbClwPrkTU511ipCrLWs0VbOb++qz/5Ybh8HQD6AEGqas7q41/P
cT4d1DuUtORsf1f/0tlXn/23E2riuWVvTGP/vweeA/yFAAAkJGptBqBV+ht6jXKi3QVhQor0BS5E
2jov6djxCwAWYZxt2/V2aqgCnGBRDLXo1rmTunSuU4MGxGV/Wb44owbJon7xiU40AQgmUte+H0AI
apgz4O+d1tu6du2aTgH+OHrtUWmKORvcaAe4Ubv+mJKdXbAczr6v3wy268bJz+TnPaFOhxglHvxz
bX+bM6RuWKNkt+YDoYT/RbhS136ivznSoCrLWr36BntBpIHfOY8Ti7RuW5M6BizyDdkOSLdPb6xN
BAA2+yyZxPw39IcR2/TqGGfb+XO69HmXLOMT3AcfXwUUsE40q+b0YX34aYMmo/O0A/HY1HBAVcN+
gslQfeGMLnT0yH1o5kFZy2Sbqk58omM3ejWK0Or2P3mXvWVZ66W3vU4VFWgofTglq+s+bS+O+gri
f3S5ieT8fSeQoP+SLn9+WLfccpS+9RXtiTMOAAGfYd5FxrBe+Z/ukUpY97b+wgkg7f84pUE6a0wi
sgjfiPPQW8HZe/TGDzzlsQT4cR4BxmEYnnwsKAa68NsAGp4f66f/AZDoozGNuB7U/tJ39KNXOM8W
7pCsKNMX+CEfno5VelS+ku+C1IvD9ao8/oU+PtKm2YQi9jQCMBx9jyVYKAT/N06d18X2XgWMYD/b
PPJTRM42vfPmlManatXkkKH3/rRY2aYsDqbAkmFjkjgKifZ/hJFAUiBqjdb/UYhSv0OQ214J+FOv
CwDwYwBYpgjuMZdonoTT5cP69aeXdHEyUms2fF9/mcnzgO4xPwKYX1sL++aoPhoe18hrrxFohipu
7Sv6Uzc/JfzD3+o3Z47qk5EF7dtHMubNrXot0GpjWV47Vq/2T8/pemKEAjcQ2NqWx5DulF/QF79C
YNQvW3v+xR8rPdhdbgTkozCFzp05qZq+QfWMA87b9rXnCLjvr3DDRLijxjOf6Tf8TpNjpLIP/LFe
jSHwc8UfHSLwqqlS+TU6M3RMauG9ndqeFiA3z3Albn1bP05cpx01F1X28TV1c46c/qxPPsPDcoxe
r1f/xT65Eew19aOONIjG0yRJm8cofl+y1Th6yT9lE+e5l7wCf6n/+NPz+ujXbRp5/aD2bP8D7YoJ
RCdmWF01Fbp2uUzH/h6Gm/Pr2l0cqWAC+JSd7+rHaRu0/eZ55nm5eisBxr265TUyIqdYSh//rwfk
1N+qpkFnTQ3RXQmf0neiQuc++o2+uD4oS2KJdv05CbZIT7lbxzTUYRi+jbrxAeys8QW9+mqJsgNS
tXbPH8A2yNeV0yd1osYCwO2FdpOhXnGmzLrRzYkAeutaHXxvq0qyEklG4ilGc87j93nC1OmIKlBm
Mmyg+yK0HoBEMI8z0YHqC4Jdsld/+B3ApGTYJ8+1M9PJLLZYW94BNHb+tX721yd17hOAFLdXtaf4
DdZhoHxnWlV986qONN/UZ2fwYwPW4CM5a559+frhD/Tx2RYNBWZr7Q/esbFRPJ2nNdXXClgAA+KL
jzQ0OKmZd3dpXRj7wRKigpeO6JNPK1Q/G6XcN/bpe8kwhc351HpDl44d05GyPi1GvqFcj3uMOxJP
/bW6Aohw+NaEnCJ36ruIm5pEpxOMA/NsbzG/zhxGR8fhVRKEJEWMYwUYc+faMZ04U6lG7zXa+pd/
rLXRJB4474c6KnTq55dhmdMZij3i8YTZcxnR/ubnsMALh5DP9BsOPgTPySqOu6wmNr8TH89QY71J
BQnhCgsAzYKS6e5ObaVpN3X/C+c11MABeopM2VSQUveCrK/LVOpdXqkVek60z6wGP2/QzQs1Cg+D
WpIfAO0ZihMTPjQmUl6WEVWeuqljlaOwxnfolZ0bQHyh5EeQyR4nKzM4oyUv6DPhINshfgqeIKC9
PKSpQF9o1tCpzVg4VN2gpodRrlC0AeXp1/dqfTJI491xuvL5uFRe5n+HkhUdxYGZhrNgNvZVA7w+
Mn1kJs8PySWxWDve3aFNSWF3afU4oFGUJ8x2QGWD9kmG0moMMtXPJnhB19s5xKPXauPmLdSZhynA
9tTIMsNoWBw/olM3ylUfTH05gXqa34vQ38330fIuKFqxvMhrKy50ibHeUDuUWautjvbhy9nLT36G
yjVVp4grA4qfT9WW3Xt1YFuGIm0tkCxa49iu7i+u6epAP2ijRdkUzDv33NSN69d1eTpUSRv2EaTk
Kj1sORi3ZIGiuo1Bj+9E0AunxXDfzL3SEmWkukzXG8hOBGSqZD1OH9mWSFu6gAMxI0huTsc0+lmV
mq+FqDmBVinQQv0iM7QmEsphUozCPz6mK31QxM5YNenWo1td0PdK39YfbtuhfYj+gbO8+OVgtDCg
oaFS7hWToKBZR1W936y6wRp1QG3zzypQXvS8nPqYGAiVmQ5rz3eZD5hA3vzpo9isBCVm3dCvCZRn
PGY0XJqtnFicdz8cO2j7blB8IVncvVhblEfAcn3oengI5n9BjcbpefR9zzdO826DusAQIgBSeJby
tx/g4C1WfgQZdGOj7GSl+izp7z7p1s1TtcrLJJPl1qWa4xVq7XBQRCklRQTWNlq8+TqyuGn+83I8
clmHWe9h4cxR/9gXo+BaB9UE86i8ok+OmYBoBzepNC1smbJOqVMGa9Chp00VTWQ3yOguUtNKnwbW
WLtuHr6ptjuuitq4TpsQa0yLuEvDJLOa5rugw0eu6Mj5KkVEsh8FREL/ht5Xj9P3WbMm/LK0/hW0
H0jBL5c8YQey9XHzUHadYLR4MI9tbbhA8ClhijEvgh33vkv68FfM2f5sRezdrk2la5SVEAq7Yl4F
WbQfg3IeiC0Xoejf+OKmOns8FbelVJs2Zykl7C5QRJYw2XdRXxy5quOnq/heHJXiUEXFxCkHICwh
tEAFG8jOFPlCnbylunKCILJKuevJIKQtKKzzjkYbOzU+aoTx5uTRchlKKUyeIACBdYBpefGKussL
XyJjGuJnUe8/3VLL5RA1pIRqbSj7a3aJiuZqFMce2zOfpV0H92l3IVkHw6rAbc9079fIp6d1Eue4
e3wesVYo0LQB9IxJUWF2iqJofRSQXqySLfmKfaLPbNhid1Rzolx11XMK3Qi7CcA4F8qiLXtJ6Ucy
5Sc+lpP65eUa+QbHKzMyQX4TZNRunNGJXgLV/O168+A6WAR3KeWUMOSELGkcenFXlQXSFswL2xp8
EcfdTGazhk0mk9a7/mS6d7E29q9RJoGP2S/nc+OVEHZYsx/eUuOVKNWkHlBpRK62HCQLOT2rv2vw
IqsGC24FLmGdGNQgYqNusfv11ltv6GAhYNqL4hYWgv8uAiLaig4ElSh/y050Xu5y3qxpinJjHcIA
aDH7+z3GxPyAuutv6IvKOc0B1u7bgWZQHHuR7aCcAQwFzJ/6VCduMf+qMhQV4qMMf0qZoNtGmhel
Zd4DF3XoH26rqsdLmQc3asPaQuUmU17jtaDxvH6ysI7yi45SiHu0EqKdNDp6SH4NTvIP9Zb7XSqZ
kyctVN3DODtLtHXrQb32aq6S75ffMZcotUsPNWNKVhwtSAfLhjXFvr2qQD3BQ29VGWBGtXpjNmgX
a3dbXrSCocyawq+FMUoXHSdU3kJgwvm4bIpJQDGYLeUDanFM096t7C3JUYqwrY1FpXPWBzgeh4ly
U+eqk8gohmpz+PNotqzciSkl8QxUeFKAQikrmqur0KgrtOx1m1Ric0geuaDe+4Slq3gtQe7x27oK
cYZT/a6bAhvPh8RMbonWsae0l0+QpFjuyuDoRgY/vVDFHS26GkZJGkybHa8c0N4czl4cfhdNKNF7
mjIgQJJqhFmNCKcBBQiEu25d1NWbDRpJ3KZ9r8AcyiVQtt0umc+McPkD5lf1ztnevnwWMQ7KDTPT
YR7Ez2tiMVdr129Svu/TJjM+Ba0XIzhHIviWzBg3DTdOqGoC4Iy19vhlyhToBHKmVuV9kSp+m6Af
oC0d8MZ2ZLJPTGQCFJOc+PzELfzIcCUnH1ARbM7swjGNlcercihAcyWIS+9DS4jnGmiWSGqkvHuH
9NnnbepDIHnMCijAvLAQFPW0tjFXHBT6CnoHezbiXd290sPlwTxqoxRwyfMJpWer3MFjfwUgOwhL
7MqRCnW7xKvgzbf1xmao3n4Es+bNlEnkZsAuOnEMn/iiTl6LVmhgiQrZf33CAeZ4JQfTzvHsMV27
0q3e2HTt37RN64ozlRyB/hdlBn0DgPiitNW2Bp7nMs8nXNHZaCk1lnO21ak3OE/rdr+qg5theeGv
OjLb5ijTinL/TO9fqNbxGxmKiArRtijGBzM3k1eSz6iGzh3X1XKSZrEZOrBph9athWERASBNmUH/
0JQmKOEImKWc6uppnWmgLDR5r959nfugLPBeOdtSfrYyYs/ri8+u6MqlazobFqH4XbEKiM7gBZsn
PkbRJ8l2k6A6dwo9GY9BNddI3jmv6sfv7NX2Qkq77pkgoFRbmMBLlhM61cR6mQJwYQzLMQLluCOj
mpj0VlIBycR339DWbBIvz2M623uNXxakiOQC5aTWKyOMMjGfDO18ZZ/25CQonrpeZ2ZUqM+8GgGm
am9TkrwdMCPUrEGYErfuqDt0g/bs261dRfgf9+qM54Yorcb3ITl3puqmzhCnpe6LlTf7f8WZCt1Z
DFf26+/olY2U9sHGNn7QQiYMn8UhNVHWV8HamsKRNfPLOrtc2nULsMAaladifJWNSfdKhhfwqwBk
HE4C0rTo4rkGymvyKFOivHSSEoXbzWiIzMt7b6FK96xXga2kiX05K0JOXZyJ6KKEwBpZ9ppe/OR9
brP/Hn/gq4RCz2A2As3gDASbdmhq4Qt9XnZUv/hfzutQAHoCviDN3jinGUVs/sVaAz1kOTnJ5kRd
7PXrN3R10lPdoNEt5w16RBbC9N51hIIJk+DmlSGNQb9KLynRrAEF7o8GSq9x3kDAfSPSVFy6Wbs3
Zdyt8+FNfpFsTCuG7uKn6OJURTZd0dWaFjUnpim3xJ/J3qcaFlTLHW/FbkpUfiw13U+6YxYHJC3A
DSPKt9qbcOSGGnSlsUc1LonayGG3LWNlNsdJ7jF5WrvvD/Vn+RY5hFATx48tDZFpKS9X9bVWdfvC
WOgny/lrqN+21YFj4LKgwcpbBCuOCg2nJn4CejCb7Fe/+A0DBPAbjtwQf6x+wXDgsaDQnqaU+O3a
tqlAJPjvXrS+8/enbs4TN8BKLMxChzo/Su1Qe+O4vBI3a/2WQjIBD3oROxoacelu7Smt1mgTmQEy
2CaRY4Va3neLLCgZ4ypKLEZHm1TxmbG4ceoM7Z3vbUGboHKAcnCc/eFi5VJ3uDwnyHRErdWG/eQj
Dh3SofeZf7PMvzV79Crzcl/OVwQE7luGsRhkmRKC2EhHpc9/ro8/qlYdh8nrr1PPHUn99HUCC+x6
LyC3xReGIWOqQFc1svkX/s28kU14GRSAnZFeqs1vAZ785gwUun/Qfz1nqIiIQ/qQyTJ1yXnrtLEE
bQyoXt/wAl9lXkChRaPDDeZOAZTDg3sICAHjll07Mpt+ScrYu0Nrr3ygi02UgHRkKMa/VTdvQs2v
m4AmPoDy/yE5m1IJKxMPwNBt6Y6aULutuDOriDVFGlv7IqAAbu4kv3MVmvxMvNZu3QidOcyQAJcv
By8CzxJt39+s0xeqbAeeoakb8G1hsEk3rsFGaV+QN3Xeg5WfQLs1z4Snw/hc5zvVCL24oneRjFKJ
JkoABeZ71NZSrzOUkGRR3rO9NNm2pu/+GPS9SKVu+Y5+GEOWyCNRsRTkPrTMKClZ5PudvKlVzN2k
jdspl0q89zydFRAfj4tmrilNNjfo6pVyXeu28Lt96i/HGbSJthr74WzPAzZWdVO/DtxHmc8koIAn
43f0oC4/BgAixBdHBn0LHyiCyXEaz0xSItl/Z2iYXj7YxYzNycy/SQ1Qx1lFRqfcCWr3GAHGp8b5
Xlrem51hJgx2qu5yJ/oX8coY3KwCWB2OrOIFMsuLaAokx+3QTkCVlPsF77DFAqgfJNCcY47PAcbc
P/zJwiza+pazn9NCc9FsBk+Mo/gcrIoqdE7KcE48cITHashUOrIuzVbmBLtqoZ9621ZdrhmWR2qx
Rg7EIeRJKcT1dlnDdmrtFujRODD3L1eCrrVQ37dV685wC0CtGc9zI3oPvs+IV3IfDhEpSskGENiN
oxx274bg9EAxzdkAs4ja+E8HAb3b1uO4B8rVK05Z2wqU3FiG0jzMDUoLNgNgOWlIrRdx0Chvc8/e
q9L0rwAI2NYAwLQBhr1rVddCbfdRSsrSCeY8qMWlNG2JvTV562tKTUbY9K6OiQXg+s7ta7pU0arZ
5l5ZB8t1il15mYlk9jXKdQiWawYdNBe8Xbtw5A0ocP9aoE7XCPR64QukUjpBh4aN6AstLxWYM9Fx
5JBXXD4INqaFqKWT8xQ6bFp0oHL8mGFQlOvb2tUQkKXXk2LRIFj5oZX/ffcZmrPanG2Pvc2UZBh2
Urtam/yU/udbtcEwz+4P2VEu7G2ZW1/Xn3igvu0fJ7rLsk1AdW5kj6i4rmrAKec51qShaJt1yN7u
TJAw3UcNMKUidxwKtGYtmf4XBgXuDZq9lhKhReN/cK5YbOyNJx3WgNFmLTEWB+79sePGrDHzaZgw
D9llkdKQBWqIvbJUVAoLZROgyn2bGR2RIAVBhXdDd+ne2jB1xU2XO9TZGaKs/8s2lRYwh+4Pi/2I
jkb5u97UnwZBb0djxv/+9xlRXLNGzJ/cl23BP48/wx5j7IANnGy6OKvYYn5UA63UqY/x73k79faO
NUq/H+UZAxCIRq9RybZpGA2/0PG+Kl1u24auBfXNjGcJraWIrCRF7dmhDVmA8PfG7uYj/2C6H3gS
GPG++5lNklVBEQA4IdSW153DJ5hXEcCYl+kwhIaMY3ih9u7wkUccLYxfqC6Oc4pSq050t251UGKx
D6bZvnTZCCP3LhJc/knMtyU0ugZP6OPKZt1KhiLP3rJsIQI+5pEpSfUiyZawYau27aY+/p5QBro5
EZR1GtDlhS98xZlFSsxCKCPKg8Wzk4B+xRngFpah/K1dqu8e0q8r0VlJpy1wVOjdZCHzHNHfRazt
HYHGDYDFtl3pSrmXlSdBF2FenByzDVdVfxN2iluSig4c1JZcbH1/0MwLL+6vlPsbGFb3r9rUff22
OjfDciGSdzS6OPGU2u3Apz1ySJ98eFnHAVzDcrZqv6HlF1Gv/5ABKF+LIPGUS9zQwrlYVaXozBht
DWUdjsM0wne/NuKpkHVF2pb5IoDAih+jDGN21kXuXpkqLITRuxn9lfv/jP6NH12wqMF3m8FpMSxR
GFGdUP+HZ0OUuXcfJQJxNtbUg48EKSx3i7YMjajn5zUaLK9W1zoSSmiy1bVQmpxfrJ07UpV4n0XF
vudPsmDrTm29hB5ONQkUymBtswcQ0GjfXLoOk4NSpokZmGO2Gj+z9/E5gK++NsCaRoD3uXT17chQ
DqCAg6ePAqNoS+/UrTracx93QnyesjdPWmQ7Oy/KOSVPmwM9FZqZoGAm6vPCUS88V3/PP/iNxgwm
K2JZYiKkQR96F5pLIAjepdtqGwN1BN0b7utSxx1Qvm7oiLs2cHiYLDg9hGenqC0hQzMLrbinSz0j
1Aza1NCZGBzkhlkQEJeirIwUpUd7PRKIQ38zyuue/Fv2Bm0ik7Us/PGki6xUKJm1wNtqrKfVRmuW
+oq8FTWOY3SHoJzNZQvZ30i+Y/VJycRnw5q3AQPmWs1pZPGMogyPwzsUgcYBtd6P0TsdETAylMrE
B+OcmabOrm8G8Q7EyZwGsRcOFjXmS8bjune4uwUqoiRJ6TlxCoUS/6Kk74etY2p5oATdv6cn2M4c
3gQvFha+I6r7JjhYqdVuq581gY1xNGwDA8ToHMN/ckb9OQBGwSrqwG7BCg/1V9gA7oBx6M2mswjd
up9aqBGEntxA4QehJ3Pw2hwuEzYbJAZWR2BhgWLXcGD7PCr0QwVYAs4MdK9hBNSuDSRo+waoqPFf
FyBwd2YAesxZvRUEyp2ZZdFfH6YMZMaXtlAcqJ7McxwWG/X57tuX/+AecGDMPTzuw+C8mXuzlSfc
m1c8G5cQRRft1w/J5MSfoRaLOsW+yQH1kzWcp0SnpxvgZHJM01vXKS8SNszXMymecas0zhwMILcw
JcLaiUT58bFcD8KaEajhBFIbPz0Mmu5IZm7GqjHmnBd6DL1zA3yHycqak8B0MGAeABitW5+u7Hj/
FxRjwsGcGKD+jvyWEyJDRsjzsTtyl18IdHOfNg2Yn7aZnOB8ilaP0PTH5ugBPtyrniko92bu3xsf
de4W3wSVJiI0Gkfmwtzw1DBtHcfUiYhecQz0u1X2IEfq+UvCVjerdZ4SF1azRzag6ZZiFcFLXH2z
Znw8654pi0bnEVEb6VH3BE6NrXOCuQlQdgJ6C1m49QgsZUQvB1zLQTZ/b2r070bbJmgwUJutHNGG
iBhhJfMeMrvMIQfqfscGGNfQrBx9oRKzH6EIYAMQ769DxuzPOkwoSFG09926WrQzbMGLoc8783ok
gWee9RLpb0ezDlbusiYwMJ9jXEvG3l/aEGORKo9x2GULiKktKmSMeYQAk/mQjehk5pFh9LhEaW0p
jlUqDAKTzRke0XDHosI3BCs2dJU8DrXMQWGAJQEd6jPz8Cv1Pjf13la5ICobnEQW2f/xyNXJi/as
sS6ab5pUL7X2cxZAAQPsRNIiMeGG+nDezlwrhoJMp5KRCv67Q11uqdqxKRUG3TMu0Se9zQENAKi+
uzeMw465qttVlzTZ7Stfd+jOlNI483J0D1Z8LE/77l5v5ayehGk348heN0vQ0Un9KUjx8hm1vH85
WmG3pCYBOIWQ2X74FLVS6zsHKOCeiR7HplKtvw8IPGmQ7K+IY0UggHbpUq1aESHM9HPXYC1aAmTu
PdamKDbmHqiw2neQqWafWWZrPeFEnyWjfgeAahR6dfi9ZMXK7+J5hGZq+ysr/m6GTCX6SVNW/A/K
jUa6YLuZLi7Lk4/pZ14IL8YXawMiyfFPzYA/y7NkjNzLgjlnTbLEKE0+MYgm8OO985SvmbX6WMBs
zpi7ILUNjL13oRcxb9aglQQP5Z0P7+XsD2afse3RD4AGyxT26zJivxGU5K0mggwlOipHu6IevUdz
dnA/tr3V+A4rAMJnMQfreQkQw+jvPHGZzhN4jA5pAh/BOy1e0auqTALiBHDGJrnLsXZcndRszy8C
CvAsjZ9n/E+zH65sRGIxe5zxl4wvtAJscnSLUAIlra8ND+rDS52qPn1aUzBcXJ0BBQAGnCjpcg1J
RkyX/fiZ7vHxNy3BFBhFu2JA0YoLD1fMqgcFZzJluiEhwVqASTE8OM48uAcKwIxD28rqHK20PEox
NmbDAHnBwaz6MSYW7ME5i9EEoywgIkzkCR65OHcQ+Ati/3NG2G56lDKbe+8wugT4B3KNRaivSBs3
pK+g6a/4GvyvScNo67coICiERNUT9gHHQIXArE1wQA9naECDaBosEvwuH9HMC3RqktmbnWBfVI0n
ym1bpOJgGzwMCNz9XQCXsKxkpTcgDnwbhvONfBXv9tF8TaVuXqfVejgxCHtS+NMIL08zNzYwwIgF
CrHz3XX4AAJkv0V/aXkdmsQp65ezY5zz2dMBP5dM3erdpQGLAlij7rXoFvTgM+J3QdUfnA9RiBFk
fKysypRpU8KDbYOYv4ZRZNbZIiIto+j2DCAGOT2BNgfte0c5g5d93eXEosXir8ScRMp1YancZX07
+lDWBKNvI9oDYxcoUSkbo5SP8gruwawNTgV5B6UAtDkvn/3fqh/7tAfyu/vv3ywoMDOu4TvNiLxx
CETkaeMfUhvzHepXzKbNJjE72amKQ8d1jlrFsziFPvF7tYEI3gF3PTAYqtr2jXrnh2uhN7njmM8v
I9mm1ICsjwvOpXFSnBDNeHiucPiarJAzm61RbX9qSzQWkFOU0jLDVdt6R7cHEAZrp/i9rdGmD+CN
qFNscvCXqIUuI+9OBn23ZR/47cc2AKNR4A3tiJrVcbooGLEP8MsnGv/uardyOLt645DixJYeoM6q
lM1lCfXQu4ePAweQM6iaCwvU2MT5MVu86MQ1DjoBu82pW2ZArHoZR8e8z8biv5uZXPFG43jYXvfs
w3+7IhxkxYGZhA47xWb8/2/vr6PsStM1T+wJZmZmZhAzs5RcNwsuN0+37Rm3vew/7D+82mu8lt32
zPSs1d3Tty8VZVVySsoUMyukkBQcIYWCmZn9+/aJkEJSCELKrM6sPHvdc6tKcc6Gd3/fy+/zPF35
m5tmphAAweExsrYEEbaWPv7TzVshVEzjtryjfdtyyYTjAFhKyVzDVCn5DrJwcgJkycjiiRtmbhgU
29KHvOr09doOiFwwIErV9xIVtpL5sGW3xD0ljUfPifLDQXPFsMWuWqvc7REg2ucpk7ZlD96ZFUSa
BImRG6dwdGGN0n420jOlAdB/ny30GHYFFCbJngCDWG6U/TQAmLBoNE0Hgei6S+9T7Tg4TusuQZ7B
SugFwK389Kf6/MYp9boGy38PlRDfp51f2zt96ft9reVjkMFNYwNtmszsDvFcc8xmPHEHIK8P4miO
ulDRJmPhDBKzp0eqihg92fWXW7U2wUsOJAFN5cm6R7PfzXvlxE7mHb+W1mKRMhrk7gLV5fCwRsYw
suzBJ2P1KY3j0A4SXE8Y587qC2YzOnN/XhlaCabIgb/eYs29WffHmn90f+w9F7P/FlgkHKmu8nz+
GMmJATODTRPJ8+57iQKfOa9Z005mHIT3/3y6bhPowhTiw4hCcbEOAQpaaLKgC/dn3rO1J3BkjSE3
5+KpJuaTGk+gW/A8j3JPC3mu+a4kE9RY+xAgrtAcuq/oanpnHYGeB5Uq45AYxHOzz40cSBDadPRC
ktIWNDxSI0+14D+hJ6iuPl4rtnZ726gtAckLnQIjB2TlDi3mWrqA/i2t97G01bMvjCNvMsdGNzsb
Z9zoB1g9XEi7dJqAjYrd0NgYa9W45U+/pDGNDLOWQaW2OWRvUK9wQC7mIcaomvWxBk279ROUDoh4
kvvop4JIktPbY1FCzTVC6RvzldDBCFrJVZXGpCqgBlC/MQBci+lwSCT591r7dbFTTafH4Iy8k6gS
/QUztCRMBpjdHUQus3RtjcE4U1tyXZdq0KeOB/UnxbSFGQcOBzK4kCr/lj36Zxsj6OqzJZNsARJr
wiQUjMzNmmBtLD4czBo3utvYakYJX14XdpRbOJ0W0bVKuFqth/ez1YD32lxNu2xvmFaBTxNrDaw+
7zC4EKylebu0lGlzcHEHEM9BLu74L9jqccKBx9XGpc9r9pEzrAa+6Tu0q/At/V/3M5piWuXRc7aE
mdFzRnchB8NCYaLKNz64ppGfqYqbZ3qprzPfUWB1zjzNpMH6Zq9MmX2++G/Gti787/kg/fFtGxti
s+/m+RYSDY6w2jBdKCdGAXvAg5jAuX9+2/RTys/SQTZfwvJBliUjG2aH07zvYqiUn/FcLNkzYgmu
1CiYAcPkUbyX6iqZAHcK3IDZSTpaGXO11smCH2ONAT2ZUjKMD5ZdN/J61DHK9ybxZ1gJ3sVv6YPE
fhJNPQAuMtNtdI1p+2f04uZ1wEbvj8vvn+9UscG3WdYzG9VGkgrwNpe5QY2Okpzi988CXTMGN47O
odA0xz5z81i802xyczb2EfA4TM4y5f4KN2zWCUH7zNiAhvALBpGfqf4+Pgy4OBgfUyScwYry8gdr
a+GPRvcbXxCf3s3c33MLdLiThpmEv4/y/voYWZ1hZPXZ1wsoHkm8foDLp93oXuBCjwHzRtVdC3MI
78MTgN6dYAu4Tt1X2S1G7dbhfz+jZNnTYYYRIAsciiqSkxd1gRG9uRIA+oailb0lR6set0S8gqCe
8xVrH9qScrZh1cWHzfZaiUez/s1/x09ypfNkkiC/b5BxziVRZsCDIanbD4DZuCddBs74mMjCiRGa
CeSHyZP/E+8InW6SwKOsI7pK5kwCwtwPdtHJhSQLmArZdFS89266vPBJTVHQdEkZu2v8cld0ntO8
DjRPMcNowPAoeAu5e/TzTJLzA4yI9IEfY5IfJFa7K8oYZylTBVmbqeA9Wk9X8Rthqb++9H9Uv1yu
/lmWcOZGqI7fPKJj95m1Xv0T7ducwnyK/2OFBS2XUx7zmsyVlI8wxzgAKnEoc2y0NSUE16phCuXh
xIy9JzPnT1mVubFhKhQjmgDswsPL3dr4tvWLcmZDGCVnOdavdMdUt6Deiwal9F51ne6cH1Ub6N0D
o1HKSYgGUfwlJwEDwDjdTlAmOmFwrCD5iYN/Y4Y1K7AEWkHAE6H/qcrxVwYZs0f3N4uh6O8EtZ9N
STUmHIRdd3+qRilBzCpNA4qCIjBAccyNP3mQWUeZDo0Z+jpalNwWZhxf6cGf8yWjVAyPtqky2hy6
JQ+jfIxzY5SVqQA+BcJlHA/LATOysdr53KgYhcunDOTkhgdQtOUqMT9Ej7tJaUuCAaHkXoOq+sgQ
cm2TrHRyJxsL4JUbCOm9gMNMglWBaJ46TBtdvwbHUHQmSELT20BycWCZgz76VYlK++O148/fVqF/
h8q+BsUdgKapaWazNiTpzTo5eb55Z8ABw0edUoF5u/TTfz5MQAw4HDmm2db5rOm8LMydOXnDuBAe
oJG6XtUZtNaMKIUGLdLCbff1EGaLpugYZcYGg/6NrPuqdfX8FX3SmaS3Du4gKQDDAG1jC05rCFRZ
3p3XdRSKpfpOnDIq3HNEo086VxgP9ohJ6DiZQNFE8d/aYYJYZgRp1b9z67YSVlEBDKKLZWEJ4bgM
AgpZCYDcQCTUOtGmPXlC6RF00YzR8j1pAKUMGN9TB5UYE0iNQe/l6gXl4ZKtvy96CG7APxqgP0cA
BWvI6jdQ1fdTChW7BdnMAchUScvfvbYu+eYu0DdiLAMJyCLnVIKh6gdJ3MM34NkAjCSnqW6MzXhq
Dn3kxhxlFK2Y+cP31HOnUpWMCwUmLK5csE6GoC6j6j5G5SKS2XsfWgwevScqSC5Wh41JvL3ISeP+
giKUgfxKp7i/CRKw6NhngqtpknDm/pCs44JDaDUS2CpbC4dFZ8a6sAW/rNl578PB0SRgaU8FJ8Cz
bgiqOgw17BdMrTxzzIEaPTCOQ+LCCBdZfgfoXg2dpgmIHU1wiAO7+LCCdfOsVkJhkQysoJIwHUdx
2lSUTSH0kYdHwMUMJ7liuoegEfPk/sBySI1yVluLWfc4EKBqPnN7BpEZGtIxkyjwAZQzNFyRGZ46
zV4rq2xWEdRONswWc5D4acVhvw1bRfMMbdO8++dnZ15hBxnqUVfNtgNm1nxTJTiZCQZwbmH7zdLa
zMjJvSoS5DiWmbCFoM7nD66dXKxV2WA8ANJ29qtqTVPx88lnrISZaAsz8U2PqS49PPsbnaqbkcMq
5kmZvw1xNRVb06mELLpgA3I5ojsn21RVg30kKRDoHazQMIBkb+LMgQcxyQgT6u6pg4o2juQQFFWe
PlRcjR579FgEaKwNa/TOfF7lGai+xoARlJdZqfOANl6ESaWnf1qdYPW8D4ZEwAtPwrowjqlZi1Yy
/ekLst9oRY7KohW8qUJlIKRn0p0UZAEaLhzookHmYVtpSSQREBkXCGgbHSXMZodPtWu8i+AMaruY
ZyIzgzvDHiUSdcVv8X0Mof8qT73Ed0iQmCSkpcdNIeTFetzqRmPkcAyHf8AqsixEOHQktj5Q3cNm
tU0z7jSfOLQuaPYue9bYNysB8cRd2JJ/VrBigu35be3oxygI89M+0G3eK60Eo2MFM8SLNBJI5SP9
jFt0EACSPQgHbM4mqvkCC8mJuSk6Lizw1YWD9UcgN2oYX0yS1h0b8IxbYvSLsWfG/zP3swQ1tKHn
i0xUzPRt3b51U9dXh2szAM1PVIGZt26tZh+W06vlBWgfLTjWtVifRiebJJbRVYuNqpW4thI+Rk5c
35IFSebuMl0+c1m/a43TFka3fgEDzKTpvjKZTny+7oqzcmk/rXLADRs7NyqDpMASKvUF64NOTDNz
TjU41eeaOqphXqlP09YEbNDiX8G20FRZCeB3HyCfYYpD5o+3CQljEncuJulhbIJJ6r/milz6Z5zU
vA86zcZ7YHooj1ZJbTE+nfdjOz9msElg6wAbIASE+nj21OPDFAX4IFQnukef9a/nv8mN+xhmkFQf
Xaps0q3rZVoBBlXSY4XOF9m7sFtVghNT7RSgqHiwF3CpbUtpXH0113Tpm4sqm4hWwX/3gfL92lR7
4ZKunT2sLwFAPLQ2QWFPG1cH7HdGjlaubmU046J+84+ugrtDnmsZnytM0nOaAZcpYda1ZScpqpli
oLVbFg7Wo0m8Gp1mDKZ5eaFBikwLZpyrS6UACuaGrlRI7OKMBn7hUJ1qamtUPo4OTktRmD8YF2BI
RHvdVUNrNUW0XAUk2Ci0rWMGLBZovu+Y9zTprzUkco05dnQNVDT4bFGeXQAMT2uEAl60x9OtJlDW
GmBXkgVO2AhvlzmNgNtw5R+vqqwrUNl/BtPHphXQp9rGZOcM/TMtL3NHzuky7CJlbWOM3dBh8226
qst8Az+Wr3+nSQHcQpBsoYu51qCuHlD7HUE9Be0n0BvH3oFqHDyvpZWNqh8JoDoBeA1OmpmUDAZs
pmBVjWpv3NLhTzw0uQkaEwCJPM1cDY50OwwEdy89UMdkqNK2MHawhhljMxdlQJhmekHT7KVKCTp3
Xw9IyT0ahl/ZdMg6G0oSUyFaYvDfwTcVGqcmKF0O6xYIssegJUlZCcgQbAnBTzsZBH5TZLkmGRyb
xoDNgsraC6jI4HSv+ro71APK7pxxfMi8uVt855zAJU5Fa7PU0nxKp64e0+8BbdqzLlMp4XQMTMKD
S9Wn5MZNXRuOUuKaPTroD5aBwT+g+pcMMnvJqcM6SpvO6Hpap0gmuBAADBAwPrx7U5WNvRqNAYhr
De3i8IC9VsWIStAE7dHG8XZ2YLTDyJAxjwEH2qBpfRsYwlRBdeRqwCHZmVZr9SDc5j20f2PgJ/pA
ie6HWz0I1FbkO0NGcQSZGLn0O/eopxMe4GCcK+hg8qrhXT0KsugXzGQBPLkSwMYAgsWu+tu68tXn
OgrAU0VgqDKGDYLwHCi0PgotXqXMCkAVrx7XMToNpjbBOmEyylSkhwe61FwD8nnlA3UGAn4I3Uxx
LHPK423qqCNA/h1jKw2+St5dqA3gHiS4DSqEwKX97y/oym/Iik6BBr2CEREf42jYMv6vfpCBNwkq
Wrj7+9000E/QOwObQgBUKmtNIgAnlNc/NNJH5nqQYIlMOZVHYnX5mjk4uG2TvrmkipMndBI96rDW
tF2jf9kbVSdOYuB75UNlNiUFQD6zW+kG6GtiBOJyndXCGDhRCJgaCQOSIA6mjbChUnfLugjEgpQe
g8PusyjIMnSIRukCDNNrkITZI6Zy0c27HvYiYKWCYBy/V3LMlxKQSYjMEtiP0j4Kt25N5RF9GQy/
7Nw2bQJcKtiVd1xzW5c/u6DqCei8tuYAZAQCPRcs2hyt29/U6cyX4AmMrdaKtAgFAcA3TWtyX+cD
VUFBWVvroMiNG7TaILAvAOa88ovinbqxBzeT0W+7AOXa1+iaMW1n1j+OmeTJXuYYLwF09MkZldf7
KHOknzU/DCUaybnAZK3eHqOKE1U6+dkROY2Ck5ASDrq/A4aOtd1xXzXMadbWOSt660atW5cKaFIw
84V52rqqVh/dO68vf09nwk4wNAhaPJnNH2zhN9dO62wL+iFzrz5EFmlm7mDadH1ATcie6+5nf7Gv
+rr57704i6bv3jjpVvfAwnsybaHJWrUtUhUANx77mErTULHykwExxSu07q8dxhboWOvq3ZSwa4s2
bkiQv2npY0RhlHc1ZOaBjQtJJXCKfTvEdQ1ytzXsi86dpHtivBvgJhIOMcwaZt1p0/1LR/SNK4lM
QGBTcCS8cHCHQfhvqYf3m5n4dn9ojjZs1mZmBJ2H+6FtRZ7oieFedEvfiMaDAR9ypipIwD8A0nVv
H9eEi763i/ZPcAi8TUnAkZld/0AlOgPyCDJ/6d0o+YCa7QWaex/MGw/KoA8cJTGRDeMIc8tBzJsX
bUlQ1eF7Ovf5YbkOr9RKUMXD0JczQ+hoeKPra0hAl04oYCWUVHtzFQsvew4Ajgl/V6J7XznqC6ed
WpeBznfheUgUVJz5TJ+fggmiN1Fe6Ls+upimsV/LNpy020+OogvRAcPQ8T2oHdbvfweg4QQ0YSSM
/AGm7KwASf4sgKpz8cqnTbbIUEAuXt9OEUoryFJj6QWd+KpcA1G79FdF+VpFpfzb8ZXgFG8r15WT
VLnag1gjgP5lwU1Pe74j4359XbTaDo7JNQruaAPyZ+7NI1KxaYAhXvtK165/oV97jmkHgImG2tUF
e9XbaZhs4EJ/yGiHL4wB2/NVZLgqoVmdpCtiFNycnl7ePUC9fTiwnX3g65i1aYDnzDrH1jzbnMFI
YpzhrA/T159e0pfnulgDRUrcmq14UN+e1F9mvA/bRneGNYEI20U3c7R9vMvJPkbyQCyHTY4RGZKR
jEm4mk4VZ6gMATvMaYZCjXV+lGTg2OZCwE/pxphBt6F/75LwvHjPVRFFMAJF4RS7BJHwLtTGmE91
qvqwfvvZnHYUAN6FfXcn2BiCpaSRhE8luAt1Yl5680rtSPd77YrsHHMsUyDY93azv9k7/e48E7Ic
AM3PWC/I9axOSdNlZJMf/9ub95ZIaHbrvq5eua10L3wcQFIHG0t08fOP9Luvy1U3vVH5Q6aTa04+
TuhzGE566BbpZ/9M8I56R6cUjk/jbkaSmM8fMPqJfT0IoF5vHzqC/eplUO1XGvl16PCZL3QEfI8R
6FotOlloNnuhDL114y4YSz6KZ777XQLUcGud4y/5IEvAcyvrS3XnJoHKyjgS9hMabGvQg+pKqANB
Ik/YqA2FmcowcaOxOYxUjuG4zDkSkODvWfczCKY9/l8POstl3FAAcm7sm5MjSatUgKPzoV0+cV6/
/vWM+rbyv7OY6WcdTPbxnsroxoH68tYUiblV62EpIRlAh2Y/drLb+DPMiXuhswaGQ8BcMTtvRiMk
ibqRU98g6PnmP4cliKqMAlZX1Q2dOQ4Y5MCc0kPWwdYSKH937LDxGThn1ySYO7SzBwPotiSV9Uts
nANJgWja/tesqdMnZ2Ev+c8k4d5dpVwAPwNJ0Bv2gful0HxerlLlRJLWgTdUHMuV0EkzdO1O0NHb
bdYRe6IXkO4eU0ygc9fLAHHSPeDGOnJfDg3hUvdr/CBXAx4NhfWVCX30mzC57StSfjz0xzMUPgCm
PHamWlXjjLkVg3cQRbhp7o+9O46NMn58D5XkPkdzf6x7RhE8zDgYgLTGp3ez7g/fLTiNd7ZCWc0n
dOnYP+jXk8zTrwADxdAAzhr2AVr8CfLPX++Wa+Z2wGvTYejAn2fcr73qqk5/DhNZo5di9uzXuvWF
SnIdUhg4Qq1fXYQFjETVxFvaA5VyAkiqVlHF2lskK4JTlZkPq8FlGIzODClgy5/or1YDdBv5dEHm
lR2WRV9Ef1n+I3ttoA+8AJ4fHzLMm+SYhb2En8B67OPfBya71cX6m2JEMqpwtQobvoQt4CN9DO7E
wBawtgBU83TEbncamsPzOnmuUSPhgLNuy1a4PzLKBFOt8K6qr16HwhRcoUOFyuc37pMkyqou6NSn
XwFsXq32oGQC/BF4I8g/eIQqhXeW1tSkUyWn9Hv3OR0yXYSAIDrirw73GltdpYryAeKDDK2C8aEw
is0GgGUnoIVnLk+rJhTfM2CzisNhj+D3E3RUd7EOh4ZdFRznb2OzWY5b/jpitv/GksCyfZtlyY22
JmdaydwwLhMdFbpzDHoKaCkGbNbZ2vTjzEwGZzNXsqkYqixb5onyOOBcAFrMXdTl26f0ZfUJfWP4
zFn/MwYQx7SHTUFnlxxvVR6ovQAi9kAl5+A4v35NJbehHSkf0vTDarL23+hLKNzm3MPhLN6qrRuL
lUl77bMtRT4AHYHIHT2nUxcb1ZDAbFU26J6gpj8dJM0OwAd8+TjBfZUe9htKJrhAybLXzzZoCCTg
SlBd3SJRTmu3azfzRHFWcR+nPnu1NtJOOAKS+r3zv9XfXGFOjxS0CdvmyLDJBSeYADmKpIJVRDAA
MYlrGKNgVvj8TVBBf6X/7aKpDKCGDEIwc37GOXAPJpEA6oo3Mno955D30Q9w09mzOn2z3grqhrsa
VVLSDTdsGYBiBC8BQfIMgF+WoGL72kj54Dze+vKX+uzkBTKHOPm3GvQ7HAe3P9mhlbHTGNyjOv7F
F/ry7n09cAAg4OGIHN7Zo73bk5Wzfg8zTEd1quyivvrfruk4Aa2HqTiwVhxnAhSXlwDPLFnET34J
BdSM3gehuzCsUOu2GrAI+MdLP9M/lnxJxp5KgGlTxYAxlkq1JgD0d18FeM1quOYS9Gef6+T1Szpx
uUVd0KT47QHn1hIQYEJeGAJmci9fwHjwzq6u2qRtAOBtXp2oqAWAnVdY7HNQ2bXcPqML5dd1EoCW
eCg2w0GWtugh5xfZDJzSFZcA2jx7U5cMHZRfjrIScQKiYSZI3qgDW4ehtSHo+fx/haOed44jPEv1
a2QY4Li0FbBnkOiglcH2blkzGEHPOQwk4JjnBkt0CcM5YpgaDAbDDEYITtnMlRu0YSVsDovbk+E0
L7t8ScfpNLhfU6MrsHPMNBFcNF/R5VzACfeBXp0JmM5raQX2ZcddnTp/TB//40lVDwUyhxejkPFq
3fhtrW5jeOdo0x7lFc45RCtv6yZml5kNJmPiQEovch2yB0jn3KW7uvCrWzpDRdYFo28A6hzMe55j
fftm4GhRaXztFm4AGfPhCh9ifRy5qdqj/4VAGpT/+VZ3A1ipmDTlRz5Q91V4u3+J3vrgkHZkQEm1
Yae2TpzV2csg9f4D75pN6IK8TWLQeAYudK/4+GUoBUNtYQqY9wT7RdE7O9Xhekk3ykgE1pzQp1Tp
XVFkszg1Zu06Q4uZEQYgp1UShsqx5rzOnbusi7fv0T0CBzZ6rZd31XEU4MxpRhJ8c7XurS3aUByl
IGt9IRvPMCUAALRl6rzOY8xP/MNlfU1Fa+H+rI4dc38BgE/Od1WZ8SoHZqC77pzU2fAEnLMiRXJv
070NuvvNl3IPCFX0W0lUNJm7bweR+LOzUDaBzLwRVPAtJEtGz4Au/qV+c+ULqhTcuwEII6HoaBJL
dAhEAlQY5MVsfOddlXz8kY4wS3u7ckxjns36rwSY78C+sjZuQq2njuurj36rw7UPVEmj7d9Xdmni
p/u0a1uSIuh88onL1Y7ddTp27YaO/sd70FF54KzihOHkm8KoeywVWrM+LJ/QV+Ert2gTLCBjZyp0
45PbuvCZqe6ZfcFagk3CnZYzNxc6gziPEbkDbY+R+YZKdUwnqKic+2WVzlGR8TaIx050oPGe/dJT
lAYAU8Wxv9X/h+Dgr95lDb109n2x8sBGwHxy8befw1Lxha4MugFWBp/1EIHR7+7oCs8xRbJuGo5d
18Bope7aro2rAaZ8BngMMMIwcHdCw+SAfkhYUawcUPF9vi1nyVSDoRD2YMRmvLlElz+tUgnB7Qw6
eJbAa5y5Y9fQaK3fu1pb6PCyzBpz8n5wd+/c16GZ89CeHf8H/ecTZu6afU3gP43WsrpDAmIUhiPo
ZXH1Qj9bf5Xkw0loS0n2oX/vDPmovrpFk6eMPXen+pmlVXu2aOtmgPyWeD4HbwAySaimzl3Wr2pH
lZAfr58BGvtEUdB6BVSlm6Ao+/iErj6A5YIAc6CuRver2zXz6bhqATUNcSFQpMtgEywDxQxTe5J4
8wBsrngbQeYwiOdlX+nvS4/hxyB/F0Mpa6rF0HH55yiMpKbFbmEo82Bb2bi7UzNnrujClU/0q4sz
VoecGT63ui3MSCNI+b7pdHPR2fL6Bx2VbXew1wBpnrqp8pJ76nDr1P0Gul0MTs8sttSTPb1tp7Zs
pAPSKhmzZ2AZSNu0VnlDZ3TsxH/Wv7/szbwu9+JNe/yEu/wZ9Ha/d1Hf/OOU+qbf1tZ49nIl1H2f
GGowKFy/aVVHxLj278AHCO5T86XP9fFnX+uri4Doqkp/+5/61PrOIe3OhwoRJqRV29H3o6d1s+RT
/U3JEWu/uZJMMPvQEcA+L/BWwuiUexwIExSHpWnV5gck3y6q5Lf/s24fRd9b7FSmA9TQkDIekkTC
aN5GzY60qAa0+S/OUWnvhbZ5qF01YOxUdfvqt/8JpqPDdE2x39NWb9GBPSRrSaa6+CepAOrOMezL
lwaB/pck4+hGdUJPzMGwMka3modvlLJ27QQUNV3hzvitt86SxPtCJ05eglEIdqMeH01tP6CfHkrE
xpXr2Ccf66OPz+t+1YDcfuukesbTfoHfsoL2dC8v2C8otHRWndbhv7vOONkEPixrgjG1MXS6awxr
bf1GZdOb/loNP6xXC6gPYL3B6ZM6V3oGv+qKDtMR404ieY57GccvcItMh2p3u/bwfmBfhmiBUcSr
F3Ty2BXdoWW+sqxRQ64U8f7HBp32MuNm+KEZG7V581rtSPZ+7QSW5eubTiPAfD1CUpRIq7pXL0mA
vzuvb0zdBByIySn0Qli28mCD2p4N9gGCmB1u04MrBK4nrqm0ukLVdHINu1MsmXygE7D4uEDV6p0F
fe7mNdqa6Gm7P9PNBrPQHrpxnE9f0a1zv9XfnoW2kjFFR0cSs4wzTjlQnGKMdOeB1VqT6qKxuku6
cJyO5lMEqABkjgZt1f61850v4Kw4sldHuqt08fRZ4pF7ur1mg3bs2qG1+PbxC427juwjHzpkPLxg
fQCcELBnw3wDRu8bHry7VvzU01/o4y8v0gEBnflEi3r+cUL7dsMoEEjwfPNTffTbo/rmUofaZu7p
H/26NOr0gTZmEOzvYlzS4Ywulh3Rr6Fz/Ao5ODnbmL3Gp2DgimZMezvvOJsEtdlTofg/e3arZwaf
thSKy4av9SV+geOcGcfmYRwjlJo+oLmHV3Xm94wF+f+cBADU3mlFWrsX9prjgIGfAfwao2Y6EA0A
qgEan2UczssDlhOouRc6xRzMOAh7w8UB2sGKc/rqH+/qJN3fU6Y4QbFgeBSa9CjoMtet0TqAdW1+
lf34riXwWu7/K98UFGchmVu0zRVkfCdvOQ2ScWNj93XR9j/HnHVQAuwBG7Rpywrl0cr7uGUY0L24
ldq1309RQed16nKpypo6NUZ7vjOMBRFJmcovLFRRbpoSIljMJinAIhobIptlgPlA9s5fa1oRWZBk
o1qaoIMDOMSHKseEQeZ8zgO4EtAlbN2jzRNky0IKtT0Niq2ltLSpclD96u2iEt2LonEgkCfIi8XZ
n5kmWIO+ZQowuEgzt7z4Yi60ba3YrZ+A2BuLgjkL/VdT27hmyfSGxOepcO06sqSpSgbwauHFOLiE
KmHTDvkAXud/6rwuw7HaPER23IENHRyLM5SvwuI85aZGA942z4/+yi9o4YvcJO3ZowT13VR2Ogap
M1AtyV7N3ISZ6eWZ2lqZNYXebHDMxn4wN0lVmnbQCfc4rc0xHRMEqlPMz/H3Kaqd40NUf1AgcckB
ip4lMcQc+aiZpRtzVTjvdtOHUAZePKdj50pUDqBjH9eLzsE4roHPeG6TKi4gn/uEScxkD48jV3Am
wos2aRfjJf5nL+riZaoacF+PGWXjj6OQmaP8oiIV5ICcHjCjrhY6RuB/H3ZlrmtzvGYxRtGUpAHB
NVYIXAtmo3OLtMqtHSo2Z03T8TAAV/A8nuUrS3DOdIowX2VADjODZxRgImre+2IQItM1Me0ErVjK
KigcoRTEoDkaMC56Oty8oRB664D8Y+FfPnNV12tYU9M4dp5Rii+Cnxc6zTWg5FPMth0etMCv3KGf
h05A1YLT2WUq6G1Q8hBt00btTxCVB1XcFnAo0kLcnzTkrNsJwAhbO2nldQpT/nrGd2inHqUa1EHL
6zAG8/XB1XE+yAr3c54xz0Rlv/eu1myFjcK5Q/evXtPNcqiO2OFesGys3rbL6pJJeBTNUJ3zgwd+
B4m5QD+dPn9DN+raQM7lfjyCFMz8dGYe6zw/Sxlx7IM3GSxzj2E97FNAgL8unAFhvayZ9e4k78hM
FRSt0kp4zPoLMIjXq9VJlWdwmI4gkk4OtCFu2uUFOCb3d+E699dhUXDNgswcwv1lFxSowNxfDK2o
C/4+TpBv0kYd+iCI5OIZnbx0RxWgK884kZSKgkIMAKr1a/KUxbu30XvjsDD3OdDZBg2bceJWajOJ
B4PPMIhOmZwASXkCMB6zB59YoQQB0Pxs2eOj6KCLOn3ppm7WGcpCc39QrwLKmoueyM8jKRBrAzmd
9QNMKRtgU9q63eCynkBReURx/+jjooo5KhAkpaYBBE3NVc72Ttp9oaEzVZtZ0IBzN2oXDDL+JJcu
kMSp64Afeo6qBY50fCL0mOjmwpxkJVEtHm2m8g/40yh6Yl0uT0jlztFgOhggItbjWD8dRDRbRoLb
EonjOgv96NAQetp6QBy/wBQVvgeiW4iHZs/eVkU7VUcXxqqSoOXMZ61nk4gBGfsRpah3Mt0gXgpm
dODCRebfLRBOuh5IGPpFoVtz81RQkEPHBuMcC0kVP/As3nkf4pALOn6KPVgFgwMJ2QDASbM3rVaO
L1Wk68d0tIwZc2Z2+wGIWF57rZktpqOJqvSoa4Ly9kLbtx7wyLkGVZdQlaxqUecoAVocNm0HCO8b
QQ9/Tmv5dBf6inWQuP0QCOHQGRIEfmsHjD1BGSBtv0+ljgSLWzeI0aCat1L2nHYkgcnezdm4Wds3
oKPnwaKsa7th61Yf1AH0cMjZC7p8FyYYkuUz2HhfEk5JWXQHGJmnxyvCancax9xgK0w3DLbGGQT2
9QZ0jm6Tvs5BHEgCbo8oDY3aeOaXPthbgNXt3LdDo0BkB8D6kR28FNCu6UbBDlBF72olOQyTggsJ
ioRtcSxGEuu9rWqZoeTsb+aZzfz//OHgq5CsDdrr66dQbNExqNLq2obQRwQiMdmwB0BNuorunih4
vxd0M1XooNwd2gnVov85bPWtCtUYGzXtIm+AIeNTCpSXm6387CTFwLbx+rkcngnAvGH2ziB2LCBj
nSJpx52d6VF7m2m5p5uIrgAzIsBY7+PD2R88kJ3aM+NBHvOczlcASjvsDzPOOsDbDujg1lrdOnxW
N9l/Qz1Uwun6c2etzxKIZ+wLp8oOcSY4E0OGLphAbhwHfpQEdEpRgLJMRXmEDoN+En/mpcHcEZ6/
RfthIAqhen3yaqUetI9gv6gEYqOKV67S+pWsI1iCFlfHHUGHT6UgNIetnjt5DQYOgF1nkKuhFs5h
/bHfM5NJvM/3+8+ZDsdRKsBdjGK1jZJ08oRGEepLA6BKN2VXw4ic/EBaRwc89sXwVaJWacshOvXC
L+jc5RLdvg/15RhrkXGYsNRVWrNurTYWJynSJNUNxgyjSoOTdDAlFivbwkyhE3KITivs+DTvYoTW
P8eIJLqmbMDKM1R1ewDHcwrgedbs1i8CGNxyGJNv933astvUPUXAhI8YlQUz0o5NWpfHKN3LATVe
sNVJziWt0Z4/o2085Tw26o7lMzNVA9MN/hGUgBu2rdFK0/mz4NOy/iex/b0g8Q8BqBq+eoWijb/H
KC8TVppFz/pF8JwWOOWb4AyYmQS6RwnGfSM2k2Bg9HHDqMrP3lAp/k7PNFTIqUVaR1Fm64pEPZo0
mSVwNR1eXX3gD1HwWQNeycL90YkxS4IvIJr7e2LMhBv1BDxv09t6LwKaw1PoI3zmhnY6TEhW+1Bw
zIS6c/06KuCxhlZ4iFEz1i34EuN0PSWvSZJfYKbiPYgdzOZxpYvOiVEifLdVY61WkWKGrpDOoad8
e3Sauc9ufJ/UHVnatSXtccLgjRQ0ew38ixFGsxwZ00rbFcHop7dm+/DX6NqZ9iex1I8+ZRQiuSBQ
KRba/zjd0tAjumKPC+g6Do1U+Bn2+2V0WOeQJkwHM8DDSavXasNmqCmT8FkemRESpGnrdcCbcYAI
upqv3FNNey+jgIxR4x+tXROnoB3gYJy+pFtgbox2D1gjfDM+Yfir2/U+eicK8OvzdCY29dFV50hC
DEasxNx8rShi/6bGKhKGNKsXzJdzbt2vd+P7NRvGOCnsQbUN+D64sg74fWEkNTZsI8mfSwHkjfbG
G72AH92Pv9OkgCMBfMzqtxW5ymZqLSAbKg4WhY6ZHzPgE7QIuhsMgGdEDxVZWKYK90Nhtt20tc+7
BxZgj60tzvXRDDu/9kujghanwt3z1IWmDZDqlUGutpDbze9M14IBNHruawYlfsVb+us8rkWXgwsV
26WSU44BBD0H/pVSdtLGbj2aqSqZtnPDtmDjoZ+lOuJGltiAojxxUFkJMAjPsVDE/BRKPwsG2QBw
GKAlqpZLvRE2fHDaRu0jmN72M5uhtwHxcI/mecigv1lrDRcNytbm95O15qAt4DCAOc5Ghgb4B+Nh
runAnLMbTpUp9jjG0Ir/LzO1ii9bIDzmmQ3gjWnBJAue9c4/UeLBeaARCzwIUCTkT4HPOhwDoSXa
C3f01p/ybm3vzNmNc7MeXB0JsFbv0zuGWnK+fc0mRrKxMSu0+Se5Wn3IBPC2BI8jzoqzAe1D2Dba
ahcF5gB4krJJhyxQpXkAFlOpsYagqIoU7NdPoPF61wCuoegNUJqLQdme571+VU1gnJjkHX+lf73V
IKSbeTfTHWOe4fEZXMKytOKDZOW9a+VYrFlWFzMLuvAV7xglrn9ff1lM5YFgyfLjzPozc5MGOGex
90g1ei1UMSvNkjbI7yBOT/Ix17bA2JgtM22wboxBPON0+hAw7funyqQCZlE5mrFIs0csUmoysbxb
ttVrHjjkBLEH/zxXu35mJmeoalM1NuBCq9chZzMLatYs69zDXGeJar+j4cve+B4Uofv0E4sT3sjB
hntgZrFNK/HrO9KLHotW36iifXo3a6v2gsg9PcN9may1pYtY3DkE43/J3jSdTmYPz+9JB984aAQj
AJE8oA/RR4/uD5lb90dV+dn7M7RFdNi8TaJxD3Px82iSFhCqheq+eI7ag3W7R++mUNWy3okBzDRA
ezY6MQM8au1BqlqI9pnDiUA/fStc7mvf0s9ecn+OOD4r2O/5h9jv1h6je8qfvfXPcrUG2c/hOBgd
65y1W+/8P7ZpP06sBXporWvm29mHG97nuQ5Q5ZkH/DS4AwbE6/E+NP5ZsTb962ytNrRzFpOGoQxD
TzBT7UZlLvNd9MSBv6T118jBVBTQpVbb88LjkRgIydGKQ6nK2WlL6lqMCmadm5lGM+7ylNAdPOCe
JkiNzN+lQwZpfl7/m3XkYkbIltLrsFukAJIXu+Kgfmaef36tmjXBFtTcCoJh8EqmoO0zIF3L81H4
TVSxdv2f0LFGX87va5fZlSracMDSc4alxRmAO6NfF4/cP37JyGaCGe3rVD+bpbitJEDhjV4SEfs1
d7AIGqOMvV5p2s9NMG0qeGZ/GD1u7C7625LHErvQkYDTJBQSV9NRg5wWkKeNjTIyN6DAj3Sim/xS
WeP/eq22m04gg+ZuWpVNu7Bl24z9Mb4B6/y51SHWk0+S8t75l8pg/7IgniM3bEbiBh34vyB/Qyln
AW/awPNMUsCivyPpZ9kPI/snHo3gMYaExXvGDzHo35YRpLvEgLHZ9u6zkgArIH6FtsAWseZtszfm
bZQB+zR2gYDS5bU7nRZeLJXPmDXg4xRo/c9s8nPC9zCMITZWBSM/AzTGHnu6H90w1xQd1C+ydlg6
mVB23u6aNb2C8Zu39XOTHDH60LznNYzZoM8tR8iiV+S9GDmRNMo4+L/T/3mPLWA0e3CGvWv0/uO9
C5tFPF0lH+YjC2OvLWNs2QB3bLWxUUsdDj7xjIX+XPGr3qWaaaMYdDbys3wdM475+FdOJNWzt/+1
/m8bzPsxbp7BLjGz5zYGFlty3sgee/QYoMM6gdGXWduilbTubVgcbLKzZGm+y/09gg9xDVXsmvf0
fyh4C3kZnAJTFTFjJsaW4bvOrdd7/4LRGGPbLSYk5GT0tDmHsw/jjGACreWCxvjTifCBRf9n3QHP
ZN7Ri4Bkl7OZ2aO0ZxfuSVTGZuTN81uX4Z0Z2bkbfb5I5A7gJaTs/IX+u40/sT2XYZAydubROjIY
FMYne91i0+J7N/ScxtdwgY4cu7MRYNy171O0w7fnvTmYNQGY8mK/yRG/KH3vnyseH9GsU4OZ4WAx
mi0UL8xetK2lZ/YhnXFBaZu0O45q+c8NdbbNbjxrd73AE9uuQwkbxFK2+RtmDRifw1ovnrAL7Naf
pmzXh1zXPIOxX5av+shG4du0QXN5457KxmFW2LRBhbCivQyc9NXeLKCdsez1PyvUpp/P70Nr+Zn9
bWyFv1L2/iv9DzsMC4jNhhomHyvWsXwEdEUUNIsfZGml8Zktyl8Te5nKv9mrS3UXm9/QKf0+awn7
bvNZzFrlmbF9zipS0Tb2JskYsz6MjrFyCsg8EKa53TCsbDasKPPKyAI6Njb9iTjFUR6hySr4SaLy
LEfKlmicMvvQOpctXjPv9o1gfF5NyPZvLZLAd5oUsG3CRU4vxtSNTO5yDqN4Pb35vOxHKH4Lvfh1
hrIWndsEdaal/4WHAU0BSAPQ9Nc7DFAIcvBelixMa6cZEfh2VM0zN4783GmTeuVbwmlwp+1waXHz
zmFbeDFDlgnEnvduDeq6edalxIvRhxfZy3xeIH1j2D1fsBicuLb5vPFhkk0I7UUrxkp+gST+wkDC
zLQifzADX7L2bEwXC4ldF2MUX/UhDLWZO2Atr/yDVz3x/PcwNB5efBb/zDiRPNfTQKHPPfNy1+Ey
b/HR1zE6z93DGDoP81nq3AahmWdcngiNw8V6NJ8X3u+rfu+FC5+WPPTsy+TCGjJG1yA1Pz5MYo61
/MSPTbBkPk+f0LYPPc3nRdcyM58+fJ7zHRf0BFNTLz1MIOFpPi/95vwXjD1YzrozPzOOvJHdEorF
AWXv9doK3/g4rBkwc55YNyYZ42k+z3+oOQAiRwdor+ztUlfFaX36DdzXwxl6hySOuwXs8q2kyRaE
ZgOLRblY+sXY61eVt/meNX7wPL39hFJA9+PwQQu3vH309M3YAjOTtHn+YUv4eVCdej1zze9RXt6v
rMCshcTeoEXafJYjv2V81zyTu/ks4zePvmr8FzjCn8EsNo6/2Y9PnPN57wgb/0o+kAHCY++YzzLu
1SQ/n+9fLDqReRb8NZfX9YsW9PkLb84EKHR3PdeAv9hHNT7wo31kEmTLkMPrfNXymdG5L9WVlu/C
iNbryu6Vbo5k3zhjas1VqnsAVknrBLRz0Sqv86bbA4BY/2Awxp5zIpMs5N5e+92ahNdL/WyTYH6B
vbeSEQZT4Vk/a47O2P7+bnV0NunhpdP6BpyXDubz88PoavvW1LJNxy11fZvUbPuQqcUX68BXsdVP
nIHzYpg9zeeZM5ukPn7kUtc0hRT249K++1MnmmfzsPmyJnHAe1iOknil9Wf/0nIl8N0mBZZ7N/bv
2yVgl4BdAnYJ2CVgl4AlATMzXXf+d/qHo9cBEK0FoXxEfYC/ejqHwPfsq52gp/vZZWWXgF0Cdgl8
HyUAinx/3WXmz3+tj06W6W6jg7y6SvV/rwtmZI/uub0/008Ajc54cQXpe/hkszApVOvakS/0m2M3
VFcDmDrjMQ4Ro/I4Hq1Q332A7NIt8K0lB76HIrDf0h+lBOxJgT/K12p/KLsE7BKwS8AugR+6BBwA
tPMGOyYpbQKQQVD+TbsyuA4untEKAcnUjr30Q3/D9vu3S+CPWQJU68G1CU1cAZAxYzimGwVgp+EJ
upwCohUXCLDpD1SJOTLbHxCWoIxsR0WlrWKUxHQVeMsPXKEg5p5+oI/1x7wY7c/2ChKwJwVeQUj2
r9glYJeAXQJ2Cdgl8IeWgCNzv0kbfqZ/ueEPfWX79ewSsEvALoE3lACA2L4waG01nzc81ffr54yE
BILttN98vl93Zr8buwTeRAL2pMCbSM/+W7sE7BKwS8AuAbsE7BKwS8AuAbsE7BKwS8AuAbsEfsAS
sCcFfsAvz37rdgnYJWCXgF0CdgnYJWCXgF0CdgnYJWCXgF0Cdgm8iQTsSYE3kZ79t3YJ2CVgl4Bd
AnYJ2CVgl4BdAnYJ2CVgl4BdAnYJ/IAlYE8K/IBfnv3W7RKwS8AuAbsE7BKwS8AuAbsE7BKwS8Au
AbsE7BJ4EwnYkwJvIj37b+0SsEvALgG7BOwSsEvALgG7BOwSsEvALgG7BOwS+AFLwJ4U+AG/PPut
2yVgl4BdAnYJ2CVgl4BdAnYJ2CVgl4BdAnYJ2CXwJhKwJwXeRHr23/6RSwAu3elR9XT0amDcSZ5B
AQry85CLwx/5Y/8QH29uTIOdveoZnIUqKEiBAR5yd7S/qB/iq1zynqdH1NfVp95hB3mFBivIx00u
diLoP5rXa38QuwQWS2BudkJj/f3q7JmQkw92N8xHnnZ1voxFMquZ8SH19fSpb9Zd3v7BCvdx1o9O
hHOTGu3vVXfvhGbd/RQS7i9PJ/345KBpTQz2q7tnVJNOXgoMC5CPm6PsJnQZW+pH8tUfRlIAAzHS
26WuviGNTc1pzmxpR3d5+GIsgnzly+K2H98DCcxNaby/G0M+oNHJGc2a9+TgJjdvfwUG+8nPw/kH
poRmpOFKnfq7L3SqxlM5H7yj93alKfyHsWu+BwviD3gLkw9V8tln+ujcuBLfeU/v7s1SkhfW/3t1
TGliqE8dnf0amWBtObvLEx3m7+8jH3enH9je+AMLdrhWl379hT676aSiv/ip3tqUqEi3P/A9/NFe
zgQQw+pjXY5PT2va01deXn4K8HHRYlU3NzWGfidBOjGl4Wk3efn4KzjITY4TBB+t3eodGdeMG8ka
Zxe5ujjLxS9QAd4k556KRGbHB9Tb26eekSk5ubjIadZZ7pzLP8hbHprUuNkjfWOamZ2WZvixs7f8
w4Is++G0jKhmbmpEg3096hiYlIOrj/wDuYY397eMc/zRvvLXfrA5zSLX4V7s/ADrYcZJbh7e8vEL
UICvu9yW84JecA9z462qPXNYf/Nxi3w27NfP/3K9Mtxf+6Z/fD+cm9B48zWd+P1X+mowXcX7f6J/
sy74if38oxDKTJfqL36lf/z4vibSt+oX/3KP8v1+jEmBYbWWHtdHv72tBp8ivfevDmh9rJdeaEKp
iYloSw4vUJhz05ocJvGEzz884yw3H3S+n7e87DHZD3Z7fe/Dm7npQfXU3tD5Uxd0ubxZgzgJc6zT
KYcIxRZu0e49q7UmzsOW+Zsb1WBXj7qpFrr4Biok0FvuznYP4A+yOpH9QP0dXT17VmdvP1TPOEGP
w6zGZ0MUnr5BOw+s1/oUf6q3f5C7+ZYuwkKb7Fbjvdu6UuIrl3XbNWYpSvvxvZPAzIDaa8p07cKw
xoq3adf09/BFzRF41V7RF1+cV0Vrn0bHnRWQtkZr9+7V9pwwBbp876T6/bmhyR61lJfqykUXee86
oLHZ78+t/fDvZEqTHeW69qsvdbaiST1+qYpdtU8/eytfKb4LibUR9VSf1/HffKHL3SPqdVutjbv3
64O94fLoqdKNj47obBW/JbnlMD2lKUeSwEVv6f2967Q+ZrHrOaPpnmpdO3ZMX1ysIcnvIi+/NBVy
rl07sxTnMKDOytP6zdfXVP6gC9EGKypzvba/u1NrUvzktQxhz400q/LSUf3qeI0GpqK0+sAB7d6R
p0TPZZzE/tWnJDCnmcEG1SDXzy/V6WHXpNxc45WUt1X7P1ytzOAnE0mvLb4pEk2NFbp+/j5VzZU6
QH7IfixHAuyzoRbV37umCz10V60cN+HdD+4wHSMmEdnTQ5LQO1CBof7yWU6uH7+0v6laty/d0eh0
mvZNWWHuj/CY0HDnfZVfu6nywECtH56maPecwyT9+omjhinreYcoNMBL5GOXPmbw+x9c0dmjJ3Wx
dk7OiVu1a/9mbc0PkOuPUMp/DI/8PU8KzGq2647uXDmpc3ea1DruIj83kxSY09TMuMbGJjRpKm4L
h8OQ2urKdKF0Wn7ZRdq1xkf25PIfaJn21ajqxgmdvlmn+mFnebKyXBwxTFModd7TBJ0DJpnzwzqI
0vyStWr/Ic3luCouK1Q+P6ikxg9L2m90tx4xyt6yVz/3HVVYQZSCXL+HL8rBWc5U0hxmZzRD1bWn
4q5q2kY0l1yk4jR7UuCF798vQYV7DujPYqXkjGA9ilXfaNHYf2yTgLGpk5rsLNf5w6d1fSBU6R3e
yliVrBhfP5sNnWzRg9LD+vu//6XOtLgoZEWkMrcZhU7SfQ47PUUigDU92E6gWF6umskIuVcEKDYq
SQUxcU8G83x/empYvfV3VVbaJYdMd4VvovnP5O9NVWp6SAN1l3XsbJccQ1bpnWQc2NexHea+ZsY0
0lGnexfLNBeYquz19qTAm616RzpBTMcGHZsm+dPXqId3W9RQE6iMXYVK+ZaSAo7eEUpYsV0f/pNs
ueUmKsyeMF3ea3PwlHdkntbs/VAzw3FKS/bRcmLp5V3su/u2A5Xo0eZqlZ2r11TmKuVHkBRYzuVc
QhRXtEXv/mWSxmIyFY0y+3GWCf0UkbFGe38eoFy3VKUFuj5/PVBg6Wu4qfMPp+SYvFM7/EkKPE/m
6OU5OrqmJjp0/9ZD3a/wlU98rtbbkwLLWaXfq+/+AZMCGJFZjDTW3bLvGH9HR1pml9yhfIcIcnaM
DGHZdd2p7pZj3tv6872btNJ3flMb54HWdHfaFW2nMOcfUmtDva5dnlSEa5LW5QTLy9dxPhjFGedi
jg6OL+iG4ZoztL3bbpDvO8ppqRs0zoZ5DvM9/m6+tzgEmcPpt87BtZb8/SstgXl5Wd07yOnRBYyj
w2f+/I5OL5sLsp1nxvYDmww42TNit56Jj/kO9+2IfB93DS26F/Osi9uJ5n83XHFd98oeajhhmz48
uEcrgxwftSY5OrrKxd1Dbo7zTuTi5+f3M1zXkqV1zaVlNsf3rPXz0vubX1Nm/fAx53MwDoz57dz8
u5p/eNt7evLfbLe28H3+0zFGK976QLkm9+TqKa9nYs35tWrk+9S9W+c368TI05LbC178gvzn5fDE
3jB/W/j3F7Vyvej0T8vPrNtH3+cezZqyluzz9qRR/vPPY20P3hNr78UG1uwnc++2FrRnnsl6J7ab
sN7TMzLi99basK1bB7M+nnjGBdmb74QoZeshxW7gRfGePJ/XkjK/d22v61l98Gjvmr3/PFnPEdTP
LOixV3i35p5NImDWTb6p2/Sn/8eNyHpazV/8T/ridqdGnWjZ5nzfjruyWM++is6bF+ji9WfpCSd0
17ML6tE+fLRvnqcnFvbhgs5//D0z/uW4sP4W1vbCvrOWilkL5l0v3ofRyt7zvlK2z8rRw0uerxQk
PLn+LL32xLpfasMY/WrTHS+0AU+tw0frfN5uvPw6r2QE/kBfcpFHTIG2/em7utTsqO5zTYp2bVRV
U7fWJPgplpLPZNt9NbV2aCiGwG8wRnv37NLBHTHyx/I5hBdp2/8+Wxume/Xw5Kc6/uVZlXtGariu
TyMPalVLUJLvvfAoTnKJKNSuXyQqLzNPX//6jEojt6owN14R1jsNVGTmWh3aeF/dIf4K2fiW/s2O
eAV4uMl1md68o18KbdP/VAkJ6frq332lZgICW0fsvK2bX2vGhr7w1E/ZqOf7Lct8XQt+hNGNT/sl
xn4Z3Wep2qds7lOXWayXl9ajS93Xor3xIl/nmXWODfCIU/qOf65/u5X7a72t4/+/06LpQ074TotK
NMsUhu3rj/WLvyKKd+vPsicZH/GQ51JlxwX5GX2y+B0aXYv8bHbjTXywFz3C6+jZeTtr7s3yY566
7/nnNz4DjiXP9NjePfYlnuc3L9KVCwm0gCytOUgylZqts4fnk+Npln80b1st27x4B5hzzevAp3Sm
eT/W/T397498nRf59Yvk+YS/Y9PLT/iVC2ZpclwjzfWqv3RL466Rit2UpohHtf55n2AJ38q2jswz
eCk0f6t+kkFikXjBk+j2VcoFT/s6z/pvi33ixT7TYpvzKj7SK2wTa73M+xuL/aUnXtmCzZo/n+Ur
2Wyo9Z5nneSbvEYHYos1OYe+93LX0iaU60wxDtBertvVk5r1Wqf8eB8Fk4mxFfXm162JIcz1nflb
9m69kxAn78Bj+uiih5wmp2361PJ55v3fl8YpryAH+1f+IBL47pMCZPqmxobU39Op9vYu9QyMasK0
gjl7yic8VvGJkYqgrPyEUaYlZbi7Vfcry1R+4bbu1vVryqVVrXUPVO1F9gol5xUUrohowGe85pf2
ZJ86GypUVl6muvoJDfi760xQg8L9nDXNBR3cfOQXEa/42AiFMGv8jGJgTKG7sUEPmzrVNzatGTAL
PANRQgkxig5yXzSLNaPx3lY133+olr5xTbt7yy+c88ZEKNiTzTfUpgc1D9UIsImjX6TiEuMUGeyx
7Faa2fE+7gdl2DqkCecwRSREKypwWiOdzapv6FQ/9zjnitMUm8AzhT6n9Xhcwx2NfL9dHf2jmkIZ
uPgAOMNvEiN8LcAV65gFC6CnSQ8fNqqVZ5rxDFJARIwS48MV6DSryb4G1dc2qGXQQc5BMYrnXiL9
MTSmtau3BXnXq/r8TZVUtKgnro33VKPabie5YpTd/bn3mEj54cU/KfM5TQ+2q+Vhg5q7BjUMVoSD
C9ntwAhFxplnXaS0uL+xrgY1NNAt0j+pOc9gBUTGcn8hCqAbYbyH+6trUNsQ1wyNV3JSsLxHu9T2
sFMDDl7ypS97dgiwmQEHeYTGKik+UJ7jHWp8UK/GfgAEwxOVnMD7W0iHTg6qr61etY3dGhhzkKuX
v4LCIxQexv097T3OgHfRVa/7DzsYmfBScFS84qK85TTGem9oVmv3kEYczBrhugmRCvV+FuxnesR8
t1FN7b0amuB9uPkyQxuluEhvOY93qqm5T8NOtNHGRys6ALks0zmWweToeMj7bVH7IP1z3gC1RSco
KSZQvo7ItvMh8mtS+6iL3MPjFB8fqXDu8/H7AvSpu0UPG1rU1jOCUSFgZI2EmnUUCWDNUtZllra9
VrP22tQ1ROuiq58Co+OoHPrLe7BN7c1tau5nJnU+K+Dk4iGP4ChFRkfNPyMWaLJXLeyzh60DmvUJ
URi/jwn1kdfCSNA067uzXjWs7+7BGRwfPwCpwhUegRO5pPqcZr02q7G+QU3szzl0gm8EzxAXrmA3
wvSBJuTQqObeGTkGRSvO7P0At0V7n/m5oXY11zepqWtI46xZuXFN3nl8LOdYsi1pVhNcs/lhk1q6
hjXuwlpgb0XHUfEI9GFue1DT39aI09yIRtqb9ACZdwxMkXZwkad/oPy8XOXh7io3/1AF+zPv9/T1
RrvV0dyoBubC+5iPcUA3e4fw/ElRgFMtriigJ7qpDNYjo74pObijU2OSWEdG/6Dnexp1/z5rfoDx
LfZhUmKo/Bi/aa1pUOvoDPvbvBRPufpFKzEtXCHIa6LroRqa29U5gj6bmqEDzE+hCfFKTAyUF2to
sK1O1Q+71DuKqL0Ceb9hvF+T9HmJfZweUAe6paG5S/2jbCp3KhgAUAbxPDPTHvINQncGcS+L9xKz
8b2t9XrYgp3ifmbmcCLRR9GJvK9gvrvUJeeG1IPdqG/soN1yUo4kpNwN1g3XmWWO3Yu5+uhA9P9y
9+wfxPwvXARHz8nVmuv3Ds5QZr6PYuPnVMc4QFNWjGIjZhjha1Vfi7OyC4s0POipSLxrzwUcDOu3
fKbb1NvjpD73jdq6L1FOpadUOlSnWw9XKiub8asFf9V83zNU8StWa21Xm6ovs2brmtWXlqYQ0W2A
7r1b56jIxDzt2prBGnxNYTg6y9WdNRMYoEBfLw2YKYbRXrVjLxqbu9U/wVr3DVVEHDY0yu9Z3W6C
j3HsSBM2t6WXdTQlZzf2T2iM4uJjFEEf8+tXX81eakIXNaoFvevmH0PyIkJhfsZOootGutReXYsf
Ma6pwGhsKO8hxOspfAaSiX3N7McmNXejW+bY4+BB+IFR4kWnlBsjlP6seX+6K584AM/ta8H2tXSo
izU7yTr3DghXZHysYkO9ll7nVA970BFmnfdYNjFEEfHYRG8wnXzZW65Obz6vPjuuUfRLPXaquW9G
LmAV+AbhP0SAH2UU+pNOoiYHW9TEHm/sA9fAN0ZJ2H0/l0F1ot9b2vs1NIU/EBiFDxeruBDPN3hX
T60/7nOkw+x5/CpwFaaoo3obTAUDbsss9ZxHsEL8eQ+LNz2jYwNtxndrV9cgPhbScnYPUHB0rBKi
uW/rHYE5g62oRYe2Dbtgo7nv6AB5TfSqs5m1AubH6Cz7Ltjo5lhF+OLPWbdmbCVjtrzTB82d6KE5
qxjl4MS6MjL0C1FIWKic0GE2fA9bwa29HtvaNqRp5sCDY7HNIewBExEA6trf1qDqhm4NzRJUR8cr
NiZY/i7GT2xUzf1WdbBmg7HHcdhzz3FwO5q4P/y4sTkPeVm2w+yPpUdJZsZY2w/wkdv7NETOx9HT
T74B/iT+wCJxwLcPC5GfAZJF//c+rNK9W3d0r75WY4E35XbCRR0k0a1nwEd3D+EeYqOUELDICaHr
ybLz+LPNvVOaw6/0DQ5TGD6c+0vnj3i3xsd+iA3FP5miUuLoDiZWRDQ+fhg+vm3Hz00MqPthvRqa
eCe02AeZNebnoNke2zvuHJ5C/wdaPlJClNmDr6nDTPw01Km21hZ88zGNzbjLH/lGx0Za/qptS+DX
4Es3NbZwzxOaIYnmG5mgmHD2/xT+Cvf5sIO4i6SIX2AoayHC1E2WTITOTgyqt4446naZaqtIAE6d
0uXxSHX7zgkoGXwDsFlC0FVJYQryRleZhBLy9fQ32Ej4glTN3F1mNDHcgnya8CnAF3PyZS0bHylM
IR6vkpJ5TVnZf/atSOA7TgqQVZzowSm8o5uXr+v6nSo1YrzGSCfPOXrKI7JQa7ft1L71aUoIAbBo
4ZEm+9VVc1HHP2dO8co93e8GkKhpSO13L1hBjKOjr8Jztmn3u7u0OTeMdiKU4kiLKq9f1sWrV1X9
YFwtIw800ICyYRhmanRcToHxSt1wSIf2EkiSFHjs4M1pEkXXWH5dF89d0/XKJnWOTmqaqp5naJIy
N27R5s3Fyo3259rmBgFZairXzS8P69idegIpd0WvOKCD7+3Qyshhtd86q1OnrulGdadGQgq0+uA7
emd7jlJITizHgZgj+Gi88aU+PnxbZZ1hii0u0sp8D822V6n01n21E2hNonTCU9dqw+at2l4cT6D+
+HXOTvWouapUty5d1IVbNWpA7pOzbGKfKCXmrNP2HWu0OjsKZ56Hmp3U0MMSXf7qmM6W1KjZjfbr
dW/rFwfWabVHjx7eOKNjp67oXjPXDF2rbW8d0ltb0xTjitPecE1nvjymU6evq7adua/6EXVWX9cJ
jJzDlKuC0zdq2zsHtGNVtGgesB0zAEA1len2tau6ePGOqlowDtNUAF29SBSlKjl/rTavL1RBCsG9
ERpGeKj+hi58dVLnb9WqzTNGQRve05/vX6EVrl2qu3ZWx05fVVkr2eCoTTr4k00qdqzWld98o2P3
nRSSH60QF4xgw5gcwjK1ek2KwmaZN715SRfKRuSetEX7/+SQ9hRxXqO8cQRb7p7UF9/cUHXrsIb6
nBWaAS7CTz/Q3nWxCl6s16Yx9vWXdfLz4zp7fULecSu0ejNghK4darpdqor6DrWN4XQlrtCGA/u1
n2vHYyytUxjj1VLB+7yGHEqYoe3AUSUYdweHISVdufE42PW3dKFyTB4Z+/QnP92jEJMUWO7Wxwns
r2Hu68hZXbhDBc43TmFbf6a/3pmjHMdWVVw+o5NnbqqSEV6HmE3a8/4+7V+doFAji9kBa//euYys
Sip5xwOsIxwfKoGx6au0fft6rS2II8Bjlnj+vuZwaNvKr+rSpavgS9SRyBnm+zh3WQXKTvaTR/ll
3Slv1AOe1YkSkAMjJjOToxpN2qptb3+ov9iYqHDzkGNmJvgr/fbTC2r3SlTuW3+tn+8pUnbg/Dqf
IpFXfU5ff3VZpQ09Gux1kl9ksbb+4qc6sDmZVsGnI7EpjTaW6vqRr/XNjfvqoTHaZf3P9KcHNmiL
f58e3Div02euqbR+UCPBK7Tx4CG9tyNL8V7mPLBQNFTq7tVLunzjru419miMjPiMW6jCEou1acsG
bV6TqqjFQbRxHh9yvSsXdPY8owKs8xGCCvfIFKVnxiqkuUoPh73kbVXl3zBqJCHQXVui6yeO69SN
Kj3AqZ7F2feNjJS/45hcXNGZm3+iQ5vylBawoIkIKnpqVVFyQ5cu3lBpbQvBOcrZkX0Yl6WcNeiV
tbnKAZDIJvEJ9MQNXf7imI7dbtSgIw7q1r/QX+xbo3We7aq4ck5nzt1UGftsKnqD9r6zUav92nTr
oy90pvq+6khkTrnnqmjzu/rLSBxVAvvRphJd+v3H+upOszrHmBn3WqU9v3hP75G485rqV0cZ+/Dw
DZW39GtswEMBsWu055/+VHvRJyHPsV4zA816UHJeZy5e05V7zLkzvuTkSxIigjWII9XUFafivVv0
zv5UhVuiwH4MNaru7k1dPH9VtytJ+JI8m54mmRKRorTVW7R1XZFWpATIY7ESx1nvqrysMyfP6fit
B2obnMTZAiwvgEDTa1INbpnK2rBH/2Jn8vcfnNQAk42MaXLGW6FJ6UoMn9Wdu9iZlWkaC57QA/R6
S3+ccgvC1XSXJP3YmEbHEN0jJ5tgvuKSrja0qi5yh97KjVWgR4WuHOvGwWxWf3rms+/LLUxxuenK
unxEd0tu6XpegnZ7k4y9cklnBwNVmJSqHP/lKrunv88s7eioxnB2ex7eVcnJYd19cEd3yxrVzcjD
bADOatY6bdsMNlEheuzR2BG6oqdeldcu6cr1W7pRaxKPY3I2iZ7oAq1cu57f5CotzHvZCX/bHU5q
uBmsmk9/q8/vTWnQb6d+/s/f1gcbIxDprKb661V19Jf65Hy57oZv1IpDP9P/cCBDMY8C/EmNtNXo
ztljOnke29FGQEYC3BOk/kCSUO548H6Fe7Rl725tjFq0aIcJWsrNOr+m2+V0fwzw3lnnXvg6aas2
a9PaYq1Mw+4uMjKzY+16WIIfcfaCLuIftcIA4u4erJjMJIIxoXc6NeSYQhD6ss6xl7xLgsCB+ms6
++VJHb/Xw4iVA4mBDK374EO9/VaBkp9IBE6TzK5QybHf6fcX0P3TqVrD+EJW4pS6bt9SGe+3g4hz
Cnufu/2ADu2i9TyUjsU3XU6zfWqrxFdiz1++U6OH/RSGHAHcDCbhGoi5JOE6l/223tm4SmvDbTp9
ZrhVD29f1ZUr13SZRFszCPAOeINO7qGKymAtbdqgNQXpSvaf1FjbXZ359HMdudkt3/gcFawtVJo7
18SXu01hpmuUjpmgPK3YyTNtz1J6sM2TnaMI0Vj6jT4/XqI7zVMAfZp3wfjmOH6YM2MEh97WT/48
XwnzS8HgDdSd+1y/++q66kioJB78a/3l7tUqDuJk01yv/Jw+/t0p3WxyUvr2P9E7v3hHWyIoDjSX
6uQnX6D/++VP0q5oTZ6SXfDxK+/oVi26dhxg6eACrdq1Twe3ZSk1aLHEsTe993Xv2jmdPImdqOvS
IBVsFxI/wQaImgKBm1O08j54WxsZTwoa71bLHXTBqcu6cr+NceFhCgR3KATZgAFmXGEZKuI6B4Kf
Sgqgi5pu6/LXX+t4KUU+dLmbV6qK9r6ntz/coCy6lpYKTee4XmvZDV29eFmXKkmwdI1odpo35QY+
WVKOijfg6xTnKCOMRPkE93blqL745IpuO5AYKcCnzg5W8ECNbtysUG3HsIZngxSfv1m7Dm5jxj5K
fssJAB6tU1gDDN7LZ7/WJ+fq1OGWpbVv/VSHSFYHeFCkm7fLo92VunL0E316HjvkFKsV7/+1/vpQ
sbz6a3T39Gf68hpFp65RkkSxSlt3UG//YoeKSbY9neieZV08KLmk82dvqqKZJIcpyN6kKOYxgw41
+5E4asU+vR0EvsMjJYHPME7ycnKYZEA/hZWrOn1iWi03b+tOTTNJT4plKWu148Be7V6Hb/fDAhZ7
U43xg/v9d54UmDFBUz8zglPeCo7LUVgKqooNPQdSfScKsu6bE7rgCmrlzkxFoj+szWqYBfwjlZie
o4HeQahERjUTlar0tDiF0gru4IBzSNU1xHtRFcuFDFYkBj4+XnVd4/JLBLwoK1DeLEAz7+jojQI2
2U7+92P324CxNKn66kVdu9WgDoUyx8Z1p5l/n6GlaQKE5Ac3dIZZ4Ln1K7QyDrRO2mZcfUMUmZal
7Gl3OV24oa7r53TOc0JdUY4a6+nWZHiyMqmitVL27W5rV2uPCQSpHi8jSWahJUclKyn5vm7dPKfP
7t7S7TXFWl0YS4Car8gZ5vnobuhquKWLvx/RxMQu7dyarhgycY5Ul1srbuj0pSo19HkoJKVQEam2
VnmD6DzRU6ZbF2nrcdmotekoF8YTXP2oiKXmKm90SDNk6u/cuagTTv3q9cFhoTo/G8nz+gH21QlY
WlMbyMMkIULJ7OJsx6fkq6CtGxABjHOwCXhMUIeUZ8CAiI5ROGnSx6ZhDLA1HOmvj+lcDdUNuiDi
shLk5mLeK1XVoUG1XvxaX3T1a+DAFm3KDGGOn/XBeohN4/5GBjXT1MD9XdBJR7LiON99/dNyjOb+
AjBm3cikkcA1nVZ/rzHVk0CpI7u6A8c8K71R1aVn9Nuq2wpL5j5jspQXc0sVDwkGr8UoKjpEa2NA
UHYmKApNVFrWtLzCB1R/7Ko6S8v0YN1WDa6KZV59UZaV0Qj3ADKn6YkqP/u1rnxcq+pmgiTa3GIj
0pXpT1a3jyo7iv2bk6FQAwXo7UJk7oxT0w4w3tGvdLKCyuRsoCIySdg4kRRgocxNdaj6xHl9c+W+
HgRs0FsbybIScL5WUdmRdjGqTXHpeRqia+cW7Xilty7o1CyGwmXc6qBwS8hRdiiVeaoRPaZbpjBe
oU4jGgDk8+y5ctV1OhEoYuxxuuhqtUDBJ7trVHYZ4Cmq0BuyooXPhVdEEunWGR3/6qpqxhzlEZ+l
fCcq78yhzk41qPzIXd0+eU99AdnK2VyE/InSqHIM15zWkY5alTYZdPP59ePsSwUjRalhN9T7oFJ1
JhM+nKcMkgKWfXVy47limTEfkWNwn5ou3lbz3Tu6X79NvWsSFbUoUWHTzDggVAajUnJY5zOqq72t
s+VXdNJ1UBP+6KPeMU2H8c78utXcSiKFinv3SLpiPehqabkLiGaJSh6OyyUsS8WRJKBMuyz6YKqv
VQ3Xz+ish6s2FyYphqSjgwmgG2/p3JdHdOHBgIYwxon8zdWNThGTLLh3Rieu31V70Cpt2oSD+FoO
w7y9oRNkovmGjp+8oqvVM/KmFbwYPSs6OlzcxtV67QaV13HVh+F8rsyeTwqYDoYHqrh0RuerBzTo
ZYx9nJJJzhmHa5Ygsec2iVIqOe77ipTCDKIzetANPRGTlqeCSSfVVd/QxbtXdMK5V8PeoyR82YeR
Gcr2JyFJJ0XXw24NFhvHN105k826daFf/XRehMXQiTSPTuwaECEasSQqxr3MfKdlJSk+AiwYo6Sd
3Kk6JSiVfege3s37vauWW6VUw/ZosPA5SYEJ2t4vHtfXX5eq0dFN/mk5imXTODO+5DLWBljhXR25
0q4JHO4d+0gKmLZMkM7rrgOQymx0q0O44gh8Y5ADRRqOCfXfB+BwZI6utLXKjp6v1tIh0Fl5Q6d+
e0kVkyQN0wsVg21ycXEC7xZk9irk0jasztAV+vnWH0BSwAQWBKOkZuUcEK3Y8AmNljxQS9ND1Xj3
qm5kUh3Y78LwaQ269lnt2U8cU71qLq1mv0wqeGWSosPp5ppJV/jQdfZkpR7uS6Ni/1SHHkGsf3S2
Nq0uVe25WsAHz8g3ukXXr/fJN2MzCYi45c0PL+l+8TzO2PnJByo5fQ/bt5rEZChFhSDFOmILSUb2
VV/UqS667/Sudhehx7BFk911JLku6/idHhKaScpZEc856I7huafH6UQsu6ALrOHZTcXKC3gdN8rY
3HBFJaIv6u7oq7sNqqzv14SVFCAQ8SDQTE5X/P0anW5/qAu1PforypYxbkZR0LHUVUnC/6w+vd7L
+0pTXjQ2g/XuRPKyn6JFxaUywDjpgFi/cz4pYKrD7aonWXYem9gwG6rovGBF4+tMocxnTccbifqr
x2fl7rFOBUkkb406H8N2XT+lzz+/rbohRwUQCEagy11d2B9jjbp3skx3b7gqqCBNMyixN1FjUETQ
WUiHHPqlmGT/cEOtqq5gdysb1bnv6aQA2AZeJN/isQ93m3T4k8/06+YHWvnWKuX6YxPy6ayjW7Cx
rUW3SGjPgFEQvTdREW+Cij5NsereOX3zNUFj/bR8Q9OUm4A+p8DlPsff6q7rGuCYPTNFKiqkC8bI
b5j9c+64vvwcuzTtgg3NUH4cjbJGvxHkDnSX6tyRfnzECb2/K0XBrIn4dDqlKgBZPPl7lRMMr1+d
rvTwJGXQIRk90K+22oe69/kZhfn7KWx3osjLWJ23vnwnNQsdxB515gIOFHsGqipVeuG+aqOaNPCn
+cYkWP6vI92IQXFxdFveUS1yvv2QSvPgHEkB/upE50NIrNITgvTw/h0111XqPhX3ddAumTWbiB+e
YO7veBX316INq9KVFpqsbCrmA9BIttY80N0vzimM6n8ooz/+1r6keoy/UHr6iOXTNBMwR+bEkFBg
f3pRuOu6T8dQOYnHRDmuZpzIJAWobPvShZuYkqiEDgeNJ1IwKk7CS5+3UfgHPol0jlmVo0WHsVP4
pdHJOcp3YAS5tkJ16Kb6O3Vqf3uD0kgKPBkMYwOYiW+4ekpHPruqO91z8p5jbD4AAE92SURBVEpM
phBI94uZlJggWTVQrRsn+vGPxvXu/iJl+Xnh25IUS6/SbWKAb35Dx8+KldpTSEEtNU/eUWMaYj22
1mBfL9GtEX5QGyKR33Jz//jmTq7e8sTGT3V2aiqhWD7EMb5OBpOFrpOeOflEBciXLroQEpSiy7ph
yFkFdGz4IVsnjyCFxZMYm6A7tKaKhO5DNd2qVPOhTcpeIing4EJnLZ2PCcl0ODPuOxNVpMxYX4W5
0r2EnnByDVM068Kf7PjjRyGwwcd0J14YbLmo6x312IdcJWHPswrp0Gh4oIYHJBXPeCkgOlTbUnwp
hCyprO3/+D2QwOtYs2XctmktCVBIQq5WBhfKL4AWYj9XG6Ugla37v/+v+uLYPd0rpwV1dYZCUUjW
ZnULUkTOLr0HMvdGAvGPrnZopOBdHTiwWllLWh3O5x2v/C27NdzjSNsYmAJb9+hffZBEteIFt0tG
tLsa437xlqomk1V4YAcVdyprCz/pKtHxz77R8bNndBEHJiKoQIm+rvJNLNJG86EFq+I//7/0j1/e
UNkNZ006rFRxwVaq3CuU5T+mjvsEiJ0uCjBB5FM+1MuE6OiHwtz8c0VnhYPxRKv70V7N+aRpBdQy
e4qiFGx25EyLqr74nT76/J7OXiJbSaLkQIav3BuYBzp6UTc7fBS9cbsOrSdZYCHkkcUeb1LtqU/1
m7Mosgk/+VBZWB/nLr/U9dppPgfX6cYXf6d/91UTwIGSRy6B+Iqt2lGUoQxvlCKKtXmc9iQHgkNH
qKJStugAn828p0/O3lNDMt0Y72wTTQ1LHrN9FTgzJ3WstE8O6Tu0d992bSPDalMSUxp6QDb9y6/0
ccl1HfegrS1wAx0YHvJP36Td5nNgjS5/9l/1775+qPKbs3LNzVNe8U5kkqYUzz4c0/tqnQ5WXLaz
fBkRWFEeoP7Uzdrzk7e0NZIs/H/4n/Tf/56KT+BKbf2LnVo9dESf/urX+iXjE9WdI8qNIingGaH4
Ve/wMfc0qsqg/1XHL7YTrJvEyvw84MLTuWBc03fqHSphYc0o7q5b6sApSV+5SzvW5SrVzNJO3KMa
+qn+3ZdNqqQcvyWTpIALGdnbOBhksocjV2nrru3aWoAhtHbkmPrrqJj813JdAdE1cc1BvfPWJq2J
p0rwsoWz1N+h9ArK2a4D5tO9Sqd//1/0/zwJ+NbNcSk3X3lr1mtlcaLiXLpVf6Ne3WS+vZyoWnRg
xA+f1bUGdwWshOljS7ZSrCqzcTi61HzuE/32WIm+OULrmG+QNiQyT9ZWohuXcZq6AbTZs1+H9jCD
bM1c8EwVJ3X47x/o1hyVgfx39NN/81d6O8M8EZ0jZ701dXlMwyTtZhaQpr2Yh9yZoDSyMMlfHNU1
fwyRme/lF5YaYHwmPI8OCj64X2r87O/09W9uaMh0OJg5Or71pA12lU/SWm0xn0OMIh3+/6r781bV
XJ+Vb162Mot2a+eKLGUFjKr1bjWjJa4KdDWUO22qIWC5eGtQU1lb9NZOkhkR81gmDiPqKzmsr46U
6ORhxlIwzsGFwfIcfqAqnOmjdKJ4ZG/X2/u2ai3G0Cqs9lfqztG/17+/hN5oGyehZxJir/Ni538z
i3NZRyfInUa1R+zTv/3LXVoXO9+NMtWi27+b05cnqtUf4k3Ca/5C0yQ+Kq7oq1M16gkv1IbdW7Q+
NUDe1hAzIzltt3T6Hz/XuWuML0WH6adrEhTpYfTEJvQEHygCSz/5f6v9SKPKr0/JNz9HqcW7tGYF
+9CnX40EHi0j3opMTVdc4Qpt6y2W//9yXuUOadq6g4QZSIHmTrwTc5XJ/t3UlaL1e/9UH+xIpQNp
/rmcghRV/I7+rNj8b+zFR3+rIx9V8t5tWBLPNEBiU3rLzukCo0wVc2na+NYebTO6zzofwU8TVafP
HHSvnWQl40zORucgu/76mzpy8o6qHRK1at9ubc1lbGpeTDP91br66WcEhyf0FSMiXn5ZyjAtY1Bd
GTaEExf7FfL+B/rFn20kGTLfWtp5R9e/dqDizb7xe7Ya8wZv+rv9qUkGmS4+l2DG1dg9qXd0iu6T
0boOKqAk9deazgrGddhr49b+WjjomOlrUkU5YxqzcdqSy/gRiUKH6DxtiL+tU+0PdK9pUOkBtJc+
vc7dScCs3qjc8q90+dTf6m/8/DU8kqgDVE6LbSADb3w4ONChgq1vZfzNNzhPWz48hK4lGWXOPFCn
ksO/p8JaQSdVkuIiGP2InVLLjSu68PVdNcds0K4dG7QhZb6tnmTZWP11XaDb6PDJSxpxIojbFy+/
ZTu57vgRVBf/PJHk8efq/dsxdMP83DB6yzUoXfkfJik2M0hdX3CPJhnwCC58ijnru7pVekcl0xv1
z94/qJ8UBNqqhtNdekDnxREqL1WR2PeFIJi90d+AP3P6lm4NR2rV2/u1IwcZzPtTk71VKvn6G524
dkJHIkJp4SbZQaKvr/amrn5zWRWjScqm0vc+DBFRlm0n6VdxSp92wjyBH9RmwJ/NbP+bvC0nbwWm
bdUB8zFJ1dJj+nz8KJ2LS4EUMxpFp+mG9wiECY5nyj7SJRM0Z67Tzs2FyqUlyJFesPqzv9W//2U9
1el6dWyh5d7ttSyo6Re3uvquHb6s67WOCt31J/pwe6Fywmwu9NwQCPdHSXyfZNzVB/wkqyjCKEMZ
3ZCHr6h8OF5Zh/brvX35SlqAzx+mFf/6MX2G7Sg/f5yEWITeX7FKB/88jqBzWv/hPx7XVd9YxTAT
v3dnAfuHa020qfzj3+i3f1urBjqamneSFDCjAl5RSl7zPp/FL2BaPecP69f9JepysrxuawkZzevs
z/3s+1BxMEL5HT6lY8hlBvwfy7Ky/2OL9uuvGUtN8fsHneim0ASo5CyjXz4J6/T2n8coy2dS/8t/
OaOSIEb6Crdr//Y8vstvxyko/ebX+t2v6aIwHVfbSQoY55dC1UMKOV9dfKBmjwKYKg5pS364bQ/i
Y/XdPaWvxmd1rsydUZT5VeQRpvh1u3VoclLOo7c0seWgtv3VZmW8bI2ZZCN7a4f58N2x0q915D8e
VZWHRZL9DPvA3Cw2HD13+fB5lbRgs3a9pZ+8vVI5wfM9/5Odarh5Qke/Jul+/YSORQTKZ0uGErb/
RBF5pJW9ZlR/fIzRq3Tlbd2ndXkRCjSPcP+oPv7oI33Zxh5p3K7iMF9R/1zmQUEnMkfrdhxS70yk
Hibv1cbNmUoeK9fl04f1+Q1HJR06pF/sydOmnSRAJkkCTK3RwZXpSjCt+h45WnWQD1edpFv03H/9
TFcZt2Ggdkn8Dyc/8EI27QV/ASDkO5OaKfrn+mfrw5T6snE9zu/AmO/UFGOAdBFF58BGsn0lhTr+
0HRBx3/39/pNfbVuNvQrlyQDTLX243sqgWUv0eU9B1kuZm5DQlgsgwTI16+o3bRbkcmjFE91kHEC
jIsDXQN0Iy5JFWJQ66dQClMTtNRRtXo+DKZlEemENxV0vs+8sRn5fdEx14djd4s2pvu0mgVRlay4
qjMNBhwD1YGidXYeZ364VUN1g3oQnqaGLVmK9oVT+dFJaZOdoXJOW+E0s7XZu/Zqbx4o4lQDRY0j
LCkfB8MMJb1uJXCC8S6ckFmqvEXrteNP9mmvQVZfcKycopS2dZ22DPeo/HIbLZFdWp/MtRqY47xa
o3bPaPm20J57uloutDrPGvRzWoknwXdofNAGzUut6lbkawXOLp1ItsPo72HaLZnRnqP6VbRjt/Zm
4yRYttRfUfkFCjOtHgbAZ5Fwp4jkJpD9JNeZMHPxS276SfXfKVFFBa2BJBL24phsIWp+nDUkk04r
9tYPp5nFP057Xpkqc5LIkifQAv34YmO0uY4NzMk1npbeHbu0CzRyc38O5MxjCgrECCz818zPMx89
48MsZkqcoozDziyrB9ndgEIPpeUlMZPHOacwdLSuOVIJn6RqQvF3PuJcuJ4ZJaHSxCO7zgPdLR2/
gYMx4q+whO1a9/47tGkzQrCwUNgDfoFU+hnpcDKz02ZdNpN9L6tSa2ixNu/Zg5PKXNqjZyQJkrxe
e9+t092pqzrK90cZgTEzzi9GxHqF3cnFx4aZ5R8kIMtYrXV7thEkB4pxPo5gJa7wl1myDs4jaiut
YKSmUi2uEXJuL1XJufu6Q7VqzgImoiIxRIW8kaD6fpXq1q+kk8ZJE3fK1dA2pcC1m7RxS56SHoEw
mMTORu3+2Zhayz9VJfOJk1TpZkhzUFvVJOc1YHsWfuhTAp6m4mFm+8x1rb8v+Zh0s6BHpumGsQAr
jZF6oTioXIwzI0kXzAxdEnnbDmhffph8LYcExyAnX6G8dAeSI+MNjKKcu6cHnVTEwqvojmjXfQuk
yawVsv+jYJF0dKnqfqVSiou1oTBIjvfLVX2ngZGIndq5e7PWkRB4hHPgn6ac/W/rUMlDjZca7I03
BRrknt08qb7TOjsAvkXVXfmMMjqFo+fmSatvbL4Kt0RoIjVSYXQxWMfAQz0oo5Ohtk+hji20+p3S
iXvsF9MCYoCbmIHt6aNLpaNNTeWMRmTHkhRYZC5wkifGkA1dOg5ZRk/s0Q5rHxqpgzqPnog08rP0
Bv8WmKZVsZfUXkGQXdaqxI0kGczpeu+orKZdtbOp2osTGvJcn9208yMn3u+zqBzzL5qKf+WZMj3s
9lcaIzA71qUo6tH5cIRiclW8bULvgR3gm0oXmXnVVBNbKm7qXGWHJoK8lVR+UWfqrJyStY6cnKaY
BX6I3TKtpQ+0Oj+FpIDZ2Lw3kiRufszb02Z+7x5BWZiP3JA5bhydaiu0A5wMT3BPfjBMCSbhiQKc
m2MtMQfrle2jjl+f0rWaSa3ef1C70sHNaGmygZLainW2w8xLN1bpZpubBqKo3IaT2OM8Do7gBoBC
7XKhWyX3WrQ5GRwNaxRn8UG3T1SmNhRfomMPlqGqZKX+yU+UQdfUQmLmFbTaC76C80uS0cElXKmb
aen++dvaj41+ZJ5glynYvVuDg9/o9yfoaLjPOEPguOpu0U13o4FOuBi6zaj63SWxgF/gAPibIzgZ
7b09ul9KEjioXm1UQ8n9vN7BPpo0jrRZbs+MEGH/sanGJj35J+7BlWou7TReHWB41FBY8YySt6ur
XB3RSwGJyli/RcFBjGUujAoxxtlWc0uXK5vV4Oyu1KpLOvPABK4GTJe9YQKjlkZLf9RXPFDRqkLl
uXWpgSLA3VovpXywXXt2Zyrq0Wy0j0JI0u95v1G1D6/optU+RtL89aSwxK/AMsKXmJoHKnuuLoeF
amQEwGmvldrJqMRbb61UJsbMZkq9FYDdNaN8rcyHT1hB72seZhyztkwXwbpwSdqoPzlEtXhRhdrB
J17pa3Zqr3ukIl1jFU12dY4u1NqSWkafgpT1M1q2D2EPF7dOe8cqZf0evTPFvPfx+7pMBX1FPAnz
cPTqJF0ZaYXauu1DvbOJPbEwGsr4WUAESbuAavVNM8JjfOLnrj18YHzhaWOoHiNVLxIAe4MxkykL
5PbpNcbrRP7GLpvuIQvkd+ElMDc0QqdYYOZK7djxM72zPkHJC73xdLgGMMse7ndfQ4YhzCT4sfVT
XbBTlVeqwT1N2VsP6ACJ18dj9uibpJVav29a3rGDsCYsQrs3M/XG/ycpMTlp4HmXe5hZeJ7DWudL
j7fMgOlUf7tKd+57KHozoHk/X6OsxbbONVRxK7bpIImq0a/o2OWdptKhkpCO/PBFR70Yjd2Qo0P7
sfWMMz9qRvEz2FwBjEdSBwDXBveSjo7l3r+RH7StYYHgJ7iqCTrYh4zx5jo/UOVVkmbHXZSbyhjn
VvBIWlrBPBpVeBJ4OWHPghhMsxYmjH43oKZG3zzvVrhRo3cm6bCeA+jx5eihBsiQcatpfI7o7dq7
cbf+8kAhnZrzF/APUnhihDwZ4+gfY028NI57DRnZf/KtSeB1lugyLs7CYjau9g7z4MxMl5Q3AILC
/DAtMaD/aRSQsB6XeGUW4EgZ9NGnzjxnFjEbegpncMos0ucGmws/xGnk+zO01s/M//ZFu3ByjMpS
I0BUDxrUDhDHWFe5SlFAFsW5iS1My/PIMLEwowqAsLgZxNVF9zg1TiA45kngv0Jx2zZoE3ND8yNe
89+iNcrM7L/2QRXRBC7ObHhagDLjHmf2F07pYO4NECLfYeb6Wgb4vjvtjcz1dHbpPvPgIxMPVU11
cMpQAlqsArizgPMNjpO0SAb0DOAUkwN5dAwNaxRP3jtnhTK3bNTKjHAyt4v+jgNhVdieOADIMZRU
xmk3CpiML5BbS1S1R9X5oBusJzclMD+akUhb1TPnYs6bFu7soCvEze0a7OhR72w835tfH9zfOLPM
PnkZKt7OrGU6LflL3p+hQ7SNTDhZNHDcsCUDZ9oOafej8mL9m0kEGKNn5iGX1JI4fjyXNfLy3PeI
tscAGkPuTAIgIJAKzROt6zbmA6d5+fMf+NHDGhkYAesCBR5Kpf0ZORBshocrLMxfTl20erP+TWf3
m/Vn2q47QYuYX2GO1u9YT5t50JNz0gS5zlbcOKLR/k7d7+rWQ9omB6YBtCJxMGWSAmZ78BCuBMz9
/QARxQI452nkR7s0LbBTA+6AJ9EaS5v/E48Fd3kg7ZM5BEojpvJAUmCERJMv2T6zz20MGc8eJhh8
pl35ma/hXBuKrAV2k5ftOfb+GAvfLaNYWRs3aX0eHUKL1xE6ytlKlIxopr+D+cJe3W/i+W4w517K
sjHt5eZ2rf2ALht2UwDUPYEAn7poHFAuRjAa55QAQnuyAWN64n7Yh744UgB1JTUPWGMzr0W5tnBO
JxwxuhH21ZDpOX9Llw7TJhwJwKA77fdeOAcmoeUTqSQztznvlM4O96q3s0GdcEAP3evTBC/XUAtZ
frOFik2rN8HzGKCAkeA+uDxlKWZGR3hKqEdzV6oA3bceuk4LpGrhMHJ5IsAPUhIt/34PwGO5BIBa
JuBpzNwO3inV/Y5+zeRvs4A1n4/HxD40ARLPsnSLMklP0y5cjqM2mqCs5BgwMZ7e0IBZpa3Th6HU
NN2o1HKvs+MD6gU0rBvu9Z7eXl3uL2d0x3YdywZYcgBjgvnfYBDw3am4WX+iQpxAu+hbza36BIac
E5+RZMEB9HJnpha5u7I4vEIiCZAZhfiOrezLlvpy/m6hi7Nr3YIARY0DeK7xI31dDvjrW8lK5/14
dZqEiUG0XpS8Yxa3mVGK0vZm9TgG68bJWTVYG5+5+Vqq3Pd6SfIScBPcxIF6/cz7cwhUDEm45Mhq
JYGfs7E4VfFQ2307h0HxR+fzvlISwWmB+vNprCtHwHNjo0IUO1qpoY5uwBIn1NHTpeqWFnmWnlfP
fdJQgBUbv8DG3mNqGtPgoYQqMpCOofkEyYuTkM95GvygCYNNspQCwNG2/JlHoxoL+hGMmoSVWrcS
gLfmK6o+00frOj6CN51kbDp3k+F1oH0+JEzgBtqOCUbBOsFL6gNcbnhI176pYDwGv8p0hpjkl3EM
GCGYdKZTAvvo64rnPtKttrYxNU4kgG8DmNvT+wl9HhqXDNgsQLUtJAAtdqBv6TBymTDJ4IXuiaXP
O0fxZxxa6lnAfP0B9Qzk2R+vL3w5K6FCocQy7q/1hoyWoMMS4NLeDlUB1BxH91MGCYEnTTYYVNFF
WhvIqBRggF6eFLpaSTh2TKvTOVXrUxhpWGKW2sEVgEdGGcOvd+pqHe3gfSNSiPF3Z5meouINSGaA
zyI7aq0Ho5/nGVxeJHAzVoYum36eDM37R8bTKP1nLS9FOK5lfvsYLMgmwlkSCfwMXwc8HHwdf2Tx
qKbEb4yvY+6P/7Mls7ArY73t6u/qk3/EGqVkRT4OnBdeK6Mgceu3K6SAE3s9phKfZZ9ZyWCCWbMX
rMLgcpo9TPIan35yyWc0F8dnABumrWNM7XMJWsV6ziQh8Iw7BrVhCOMLkSEPGbfrUXtrv8SI6rRJ
quAvOwEu608ntDXdYx3IzVzTsDnxee2lZ50LWxoQhu3211wtII13a9UZARNMTxug7d6AjFKQqG7R
LGOK461QZxd5KsQYt6eOSYRn5PDSPTov8xnkPkfQxRJ6+WE6OClauXj5KdjoHYzeIxmaaxo5MMa1
IJqXn9D+jf9WEvhO3ZVpZqlrz5zQ8esP1Ogeraxdq22tZ6ZyTktfz82vdZl5VkdT4bMU11JK+yXl
/sWSMzQrRgcx3+KIcXR+SU+uUThMiioInvC4dWSYY8nGYWAeX3E+Iw8QSjjomXHM1S52VQzVx+wM
ID1+fooMY85mOcrqld74fHbWOAXWZ6kfEdLyHI60qznToeBo2AIADnL3Z+45M0ebV4ZQBWYO8tFv
TbWD6oxnoMKiQJyN938y0cy5ZomG3EJAeycgfSIh8Nx7nr8/Sxe++H1Z1IAmoDLL4Ln5EkOkYhwv
0yZsu+ijlWHeGZlT91AA3sIIvp+7ghdkZ0tU2J7fVMJ4PpSjMXhWAGRRP/FHyylbqo17ng7Gojh6
sYNiZkRmSUaNAboyyrkfd0AYjAquZ6gRzXfMdbn/QIKIuUba2MtqSYLQjrY4cpzsAtyphNn/BxrB
0XAmUn++vF5pMdm+ZDLFLqwPg9KP5VgoHD97BtMxQ4u1d6rysvO0ehWjDa4Y5sXOK3gKbiAoh0bA
WEAV0MNxADmbTgLW23MckTnjUC9aJtYSMHKlG2MOD8KJ6NOWlHh8uLrg7JovWjRGL3nWV3lP5hSG
7stUyHgPoVQ2GHV/zmECdm7IOU4pRQlasxuATTebs/R4S5nZfRCKg0ElT4kg2JwFMNIYU3MNQy01
H2E+dQWj78zac3zZunrZI5vHcQ5VxuptcgbT437nkEYnAAU188IkXqb6SRLU0vYNvojTPi86OsA3
MfImgeWbRdvhShJsJHBM++jCM1k0qC4wsATDDhPLjOFCy+vCvZg+cwJmt1BmBsMCBI7qSw72LLPC
yaHM/F8vI8ECtgE4DmW3e9Q95K+8Alp7aY99kdtuU4PP24dmvxtqK/MEL1gnzN4GhTy+VRMYATgg
98RVWg9F3r54L5KAiyue2AD+bsADQ2NgqlhoZeDxHQJgFNmxX2/FNKkLLJNRk7g2XUVjIFIPdKuh
vF09/Q7MCa9SOoBbLxXRy0T4nf59Xq4W/R5734UEEvgQa/MSdcM7RbE5gGiyCcfo8LP2+KOkAGsM
BppKqpwDoNP3Ejx/+Q/X5vcr5wFp/H4N2fyxUpW3blBBZLge4Vw+eh5kDNZHYECSEr28qW4DQvwm
ufSn99n8Xn1epdD2dbpkWHzW6jGUlE7gBqWGau3PVirBVITnk6HWV03CkM4cH99IRcfHKfoNGrhs
NsVcG9sNHsUTawRsJTfGMIzusyiaFzanoX8jII9IWUU3WbBqQPjuo3prAqeZGaq4PR3qBdOjqn1G
o45BOlgURJcbitPY/XiwkaJX689z3KzK+XyR2JYIBLXcwxewNNZ5Sij6oM9mJ80ssUVR/Mz6s/2b
df/m/y/DVXv5Urbp10f7/YXnNrIhUAXrgbrmooPnM8GkWa9vtJ5MdtBUV/kYn8TozqUeAEwHDxIz
ti6UaSrlNrplK6nzos1v0e0uUELbzmyeftYkucfoIlhcWTX701RyTTLnFSLNF6dBbH6b1UjgSjLl
CcMLijwJTncqQCbZYxvXWjhsb93c3yQgngaV/lEmxtD1mkKLlSibv7qVHMCn4zPfULKE9LD9nj7y
eZo2yLhmZpECSGh8IOp0r3E8fs5n16jZ9Dyf2TtGFi+K360Mh22tP3aDzLkNSj8FPKtquahtw5zT
4JMZG/8ad/34JyRdvCiy+IcrHfDlybv4hYaOxyNNa+nsnKNz6cGlUvxOBmamYrXa12ceQPfJi1rP
vmA/X7Sf5umrjcPpzLp4Jb/TdnIrATSFHAwG7SOXaj6hY96jNXz6urm5N5Kh/cevKoHX2mKvdvJZ
6LGY+z5RppruUGX9i3cBXIp7PK8/N6CqiVoyqRXqBcXS0xdky6dO7OBGG6Y39FhepLt9qQ77vezK
JttN8EWLytTkHIZ7cXRB6xEgehYFCgbdk4yyizez1glk4KCoCs7apC1bUxW91CWomA1NG4dzYSbL
9iU3D5xhLwypAUsxYH0vu71l/x1ANR7JeRxwkIezulmRoZUE+mGLBDXdSoUKVNpx0EgTk5nNB+DQ
GZCiRICephhfWLlvLbNeS1yYtqDRMdqDzHzu4j/7kJ32ptI1SFDAANTTAdrSjwDOAu/IhwqDF7/3
pey9tCw8FZYaJq/yByDpVoLyna7QbFqsnlASZP5bQLKFhq/BO1zrDWDVYm5xc37DsTqCE8X94Uc9
5zDPZToAeD8eoDEbmVkOGO/RvH/WFf6WlQyYM5UEOI88aQd+9nmh6SJj7+0xAbcrFXHDqvDMFc1o
AqjUZM49+fhg3J6s/HMtH7AemI30MllwU8gBhDC1oFCpD26SODuir4a7tJKuhwDOPzcFem7zHV39
8pQulkABuB7sBFOx/BaUqQPPbckPI+uE/J6/Zn2gqWKWLDxIw/HZKtixWcWLgqlHIqC6NAat1azV
M+elMJCr3ZhBrqmsUU0O3OMACT56RTO03Zbf0JXqZtUFA2wHR52lgCyngRGCYQJZsikU9h4fM4Af
PnyoujYqGjFUxOnTXbqGCHI9a9+H9zgOTZY/M+MvFBfBhx9ycCMJ4QSd1vPrklwPY5wcHiDHsBRl
bnhL22OXOvMMeImjVNrMMIQTgDpB0B1Og8hcAwNFqpKyAhZVwTGcHbBv3AXorytEeYZKkTb/1z1m
mXlsAqejdBQKoqxt2ruJauxonwboMjKOznTjOR377LR+/Q0AmylpyiIp4O8PbVYY76edClYBv+Hl
LtWFapzSEVDA3UxCC4ku3KUTFQE/9IQb1FnGcXgl3ecOYFtapO7XAU52766iQXC+0kWgGQqyM/SY
L57LZg6Rd+btDjUghsDvGXkZxymMDiQXEmmMT92pVlY47brYlUWLifbKXnUAiOjMfgwKZk4cOqwg
wKzCvb0Un7beotJbkgGPPUkHMpWgeRkMMkpzu0LH+2KZjYUFh5b50cFB7IsBKIQasuGCfv0/n9Wd
Djclr8pRQpDfU3EB8jTdclRth0aYdTXUtn6eFubD66+E111BZg+aFmxAFKEw83Cj24GEmWtQplZ9
+Jf6V0OMdTBaQ12MeVF0GZ1GLt5mr5nrQYfV3qrq3lTQuVcoCQC/GdMqO69XnWlp31jUTCfGhBob
mHllBvfZpACnAYjXn/frY3So0c1v8ChP/hQfAmAhN6dO1d67Jd/STVpF987itTYN7WXVg1bVA7C4
KYpnDRpTBEnx1Bg3xRfv0X5wepaahpul62oUJhZjo5dO+73CQ5hgmxbp2RGCKzrsnsh5joAldB86
z64JgDZ96UKaV4yzgOneu0S7c68mM7Zp7SpQ2KFv7QXkcQqnfBJQtLtff66/oTtzyCdbm0kKBEPJ
GRgWJ04DlsFKbXwnxeqUeeagJX1gFN/JREemcEAbcgQoEjWgsd/PCjHF0ccHYLj1ZaXcR6t6AvLl
BSXf0lSwryCHp78ChoU/wY0Ptnucven9HN/PAcA8P/w4L5iLvPHFDITP4wObjC0w/qMHrBq+BLmv
d/CO8PUiQiKUOVzOrHWpbuyM0yoShE840OPQHvePMBCLrKkae0IBGx3pqjCANitgKkiPBeTS/6nd
PQYdZ3m56nuGFZgaAa4WT+A0RMLJC1+BYg90jzQePT7gkvNjrxg7N4v+Zau8/jE/izdD1mF4YL5D
duFsAKn2Akhc2zCgfk9sBrppodHBETn7WfdnaC/xZxbdn8Oi+3Pk/mxLlrFN6IZDQgPBSoJu9Fa9
tkGJDO7oomOSSa4eKKDZAbSb+/uQiDW5GKOa0DFTJLtGqeyw3Z445vDNB9CfcySwfZghdX7aSXIA
B8fIy9MATxND+C8KVq0z4UO6g10DjXSkY50aq8DjWh2jFVDbPPGmJqH2gyL9flsPIw4roE42C5Ln
90M3mM7TOUbHLN7MhYNfc13jD3uyfo3/h1p9zYNzOfkrgm6mVP+rusAI3tHWVCgWYWBLdNfowzrV
n+/WnZh02HJyFRTAmlniSr7sE19P3hvjYT7+L9irVhISf2YcfU+ew9YxuXDQQUL39Ci6ytH41Z4G
RBzbCxWqF/rbgy4LT/zlJ2yoiQtYL55gLzj5+j25nl9TIvaffXcS+A6TAraq6JzhCsZqOk9SEeqG
PBA6kUkoWmruQhly4rJuPpiSf9KgBvoG1Q/fpZ9pOwHoaoZs0yjtMT09feodGNBYX6e6OnqhlrO5
po5UD92tYG/RnJADQQOZ2hBQzoeY6S1/gAYIJShhgY/3wxUOL2vTNNyhydBsMUcdEAjIEYBGoYCM
lH35tY5yze1FkVCHcH6TkTXcr/UVqoF+bJiZ2PS8fGWEugO6QuBKNXi4s1vdfSjNQebMyM539QRa
4zcOVFBduTcPE1S/UYqQQJC2djcHeOyr6nXiGMivse7aBDiMqULPTbQzQ3tD5yuZ4U5JhkoIZUoQ
7ABHbFb6PR2uOqmPjsxBo5eqOLAQDHLyLPc+Ajd4dUkjiPdQuazJV1Yq86PmmaDumuiAh5hnGhzo
Uz/P1N5JYGFx3pq2RIIAuhGME2QdpnJrHFuqFF0o9L4B3iOztz1dXeqgndwgtzo642DCae1O4GVS
BYE5xcqGW7jqQokuHgERfHSdiuNx9g3MBLPjEwAX3Tt1DgRYR/kU5SqDdk9fqn+zk+AIjPP39g71
9eFI98/fX/cEE8zz97dwHev+TFcAlQPQ9gcGMdSGB9PM+c0wrzc8AJrsMCMUs4owWVEcfuPQD46Q
7Z32oRWR7zArNm7anuZGea+gpg8ymtHbxRoMZqyEINKV6qKRB/c9O0UQAP91Ty9t9tCS9fbgoA37
KgCF6WrAV8Z6aNsEVZ917MMsaicOQBBcvNFZG7W/fUgnbtTo3tE6lZ9DWZtZNjLvjqxzTbKGDKIs
bcumrddKxr5WxGBmB5Efxt/Ir9e8X9rH+3vbYGsw4HeGtoj9BPm77T2Zg7GG+ASAM2/q49rT+vxL
kmqbspU8PxJg0KrNnqotYaZ2CF5zOm3y0gG5yYNCCdqq6tuADQZiCDZlKREKRtAGCJSgr/z0iE6X
12tu7UaszXyLGWvLm0qs92iVqsoqdIeRlYA4MxdKyyvzqsePw2Zweww6Ot4bMh4miDYc6Q6svTHj
TNN5MkvnUXsnawL2inFk3NPWiTFm/5kqMM/lZukJ1hEZ/XFTUUIO5n0NgpY8QFsoXcM4lMjBoOia
dfRonfPfYaJYtcZD9wEfO/IZ1KnboVYM97D2tm09gdxcQVtugxQEdWhBYYyCU6EuKqzSlRMAdR1n
LThApQgHnzMVoRnm+WvPHdXxSyS/ZnAw2Df98F17M6tugs5lH1Owbtz8Qr++ijO/bkb/4iDOZ6gJ
sGxJ0qnAEAXDUx04AB3iwjgTc8dJSdA8XrmhW0cd5DG1UeuSARq0IhwSq6zn7qYa3WqgAuefrs2r
YVCBC9rMGBrdNwbbSHcv66jP7EPYSLoDTQqOxCl6AufLWkfPPIq3InKh+Gut1sVLIJpfh90hkMTY
mlzFQkHwpDHinUJVOUaiaMJUqnC1O3hf/UMDcu3pUVerF8k9M+Jhup48aJvm3UFxl7wpR4kd52GK
OK6THuCb5EP9aNaKqSQONej+PcCOqlwVs3KltmxOVDCo5JHJ2Vp57pTKznyp33ju1LasMNhBTLBm
9s2g+lqhbQQgqdWJNuA1mYCL4d2NAsR64TP9hzNBavzJIXnt5xkIlP3xxuboHnM1/OpBwRph1MmC
mHnm4L30AEB19BudKRuTe/oWqKvWWOf+thrnl7OOTBv2GDpu2Oh9L1h3COKjfNBRK/Zq/5yhSXWl
bZhEE/Z4gO/NDLI+eA/eQ6D0X4fdwjUeSrgD+icgvFt7c+HiRk88BFAV2tpfXripklhazgEY8+Y7
4OVb+3HEUCEOsx8ZZemFare7CxpXKK+CjD7CH3hu3vdlD2gCZMBTegfwPXphnrnZqZ5oAHMDttAt
gw6hg2dmGF115hyJymF5FG9UagodUf7jSs0NVvnDWzrx+yNy3AmbTLKP5ceYStg0bfUdDQ2qrRiS
UxTI/9tyFUcE8xo7F6wDdD7l0YgZqGKrSBQ2BirHsJeQDO2AKefol2d0/X4IAQH2o2sY6jYTnBkG
H2gwf3tZZRmz+ot3t2tHEoGvL4ltc38AdAax34PwfbxACbeS/q7Q3CZmqeDCCd249ol+FXVAW1nn
IZZeZJ2PEwS2gVIPN32jElW8IlcrYmBiyktWHrgCZy9d0DE6ONxWhtl0BACdfQ9gZzhyQpdu92l2
xTp0GGsDMElv/J7lqzGTJGOP4kuMM04xje4fwY72YZf76brpZIywhz3paPwQAjx30z5h2SDWjNFB
g9wD427dzFT7YJc9GJGcHuceuzkHiP0DU4yFoOSHo6EVpZKw7PtzBtQ2KUsb0mp0pOK6vvwiWI6b
05VEe6gTfu7MEDS8NVCwwVvfC23z1lX5yg2NURoAyIXVx3Xx1EkdxZeb3ZCgMN4Jg6nIvAt8HeiM
L4JZ4hSvdYC5xvhAodnLcxifo5/RMmTQ1UPxCrRqF9gyxgeRQ28fz2R0bxf+54iG2See6MJlu5rI
0sUb8E+ivpGaajBwEtUOS5cLQ/ATUP9d/uaYDl+s1mAW6PXIsHfYINobukxkbnQxWVJLF/d4sWcM
cCt+Nnutt6/fur/Rfvyl/lFFcX9egVBeZmcpqe626i8f1pGQndqQDK6LWX+w8Qy2k5i7WQ19HcH5
xm0qzppPCnBvnoG8b8B/73dAZ3gvR5ERRicQIxi7+xD62V7uKwbMGhKOfmDaGJs8aWbXaWGYwZYN
M/rXNzikfjfjm4KtgV10dyKRDSON0S/O0CUnFGSqGIrO07AyHSbQn9uepnh8ZmfT2QlFencV9Mrn
KqBRDoMZIVXZsU4UGU1Mgx/F8w6OoA8ZjxhNCMRHRmPRoTfOOJrlE/bjW1nvkcIATFzOC4nll+mv
J/5O4S0WfJrQft0/fh3gUV/t/sV2fbAWlqAOurFvsfZgGNjzU0CsSXZbh6X/bH6zwZUYZ/2b9zIw
4qXebph2XAzNOvGZJQfe34ICA7fCw9sfrKRGNcAyUQeAtH80/pih0B5oU0NVi7rHvRSeS7dfSqh8
wMQYI9ney7rsH3BWH2uibziUBAS2DLs7NTC/XqBJdsJ+dPf4Kgq+axfThbIsGdi//IeQwHeYFHCU
NxWYrG1JagKVvuTIb2iHhkKGlLuZxx2hvXWY9mQXAWR1DZRuJ1/NbF2tDYAA+buwgR/e0+VLl3Xj
DLzgtYOabiNEaK/XTdDAHU32Dzq53BV5zNnbqHNsB7ygqbTUZN7XhQaQcX9ZoytsEE82xCSB4DBo
hhNUj4rCMpRuoncXjCeI+5sKab27VKGKb36tplJoC1EaTsZAEUSNoHiHCZuCoRpJMJiBKIkx+IHv
3SzVrYpKlV+6okpA6ny5r662m6DyY3D84qHEAQQvHWCvN0LZtFW257wwtN5jmgHs7eqRIdWTRfUx
lEDwwUNtr1mQgrcBDFQESr+VIcR45e5iBvrrW9C8fKnfVkNvRBbfmSDXgLtNQIXT0+qADIsUWmTa
HwAJaQVYqQRgv1IoRaDtqoDreww+3ck4ZqWo6HoEMmu1okC56cEYhvmtDP3JUDO0ejdv6ebxs7pc
0QaSN2RsPY26RUDmBK2jj6HlWwFKL7PrFvJ0QI6KVvfBEnFUp6pwFtugzGGmnviR4BwUegKN9tY5
+WWCEL8bw8ozOWE0BuCXv1VK0Mj93Si/p8qhNtobMTw4mT5zGI5gFPWqAuWQ4ECXm5eL4aV1uvce
wDDMuYKcnQslgitvc9LMNTuHqATwk/hgKsHw3feX3dStEFBeE8lqjlEFxIEtJ/kwMj2kJiiNKu+P
kFF2UFdnvIJpu45MzlM+hj8jiNnBFnifr5wGofyCyuud1HCK6mfwXu1aSSA1RifHDVCdj55TWeWo
mpwGmRMc1+xW0G2jEpS9933AWTA4Jy7pOsF0YzsVOh8ofwoAIATAx62sSadHXWxzp68LVMN7GqyH
a/suYD+3L1jyq8ZZ9iDR1hdNoAi1pjf0SnnrCuB5JuE074W7w9Get2eDqo+Akn/rG31afxUObIOm
DngP+3d6CkeSd+Xqly3fgvk57JBCFa/p1kA7yMQ3vtJv4KwNpbrvCXPDGIA+TczlmwDDj6yWMbjW
lJnBiIBqZ0U8M6xXz+ibv69SLevOjazS7EgbzsCQBodwPi5/o09wrKb2rofXOVAuAOHdPXFN5dAo
DgMK2nb5CjJu0RQJm/7eEubaAMOKyVTe6gJlxph5ddppQZC+C4BlKUnJKj4VzDqO9AzI6Q7MAbOM
Q3glKntdofIz0EPz5W8nkJ3Td2xU4fhlXSw/q687SGjiINOMgNHFATEz571k1plJXJlmm2OVPxz1
K8nk1x2Gm/qYPmbvXgqiy8U4VVTfBwAmHGMfe/VBB3X2sH5L2e7ghixlhhhaseUdBgTKzHBODQIi
dgOU5IkalQC0YbpoZrjWMHR/PY4+ygMhuphODluFEITgrBXav6VFh6HbvPQZSNiBVObMMxtn2yTg
hvvU4RBFoieR6XDTPIuDZVDPb99TadkddMVtVeKMz5DwUokv+gWHnVbzvE1FzG6zD5d4EIewNCUl
lin4448tUNeUn+zVyuyIp7BYzP2RROJdlZxBh7EPx5yH1XyeIKi6W85Hf63eBvBVYP4IhdmmcB3I
1yRrXalTBtDxtX4tLBZfs39P/E61NwIU7GMCbXTcUB/JznH1zmUqgE4yC0wQxHN/mGT2bG/Q1KX7
un34t/BPm6oi+osk5ThjIGNDOLmzvnJJiVLhwhwWySMX1pNDF87spaP6bKBUgQS6JkCYHSWRQDDT
6pkI+NgaZQOc9WxBD6DLXhIUn/+D/vZMv/y2eit6XREc2P8tkgKMAPRAI3YWW3brrurZ0yfPkDCB
JSKOTgpb9RUdXHdPV74+resPqzV6Fdvw97UKAoOh4vplsHgyNXclVOkkvlatJSlmvXsqkI23VXIB
+ljoJMtu11kjYZ5ue7UZYFWfObrVWsrAG7oNWOldld6oUGWDqwY+khqh9Vq9tkD5OPrP4q282v4w
3O0P714ENfykzlSP0VnmKQfDqvH7VpWz97zdQfGHV7utmQ6uqHzt3GU4yI0FdVPUitVaOTKipnO3
dfGTalWGUBE1YLYkqkYIXCdJZAwPhijFPV7ZzFC/tnPrQpEiKV0bc8p0pvZr/f4/1+gaesKdtTeJ
Ha3tGATriEDg/Bf6OHBMe/asV34syWa6c+bADmopu6jTjiRRSABYHVdU+kcIRvpB8woD82Lz+lgF
WuIicIJSdvvWZk1duKe7R3+ntit0BZKENqjhkySNh6kADmELlEBHgEF25c2HZhVr1R7ak78gWQsr
UXcZ743uD0eSgxMEtTT00SFHd0Ed3POfhsjt4FaYGgBbfqXWocXvkTXYT7Hg4g26CNvV50igWF+u
O5UVGqZzodu5U2W8AO8g7PiGVcpL8JETuvMu9KOHj1/QxfoueZ6nYy3bCwYpgFV9+tR+5yzMOEd1
7kYTVKMd+oLk5wh6vDiBBOmy78+AFKer6OBatTte0oVLX+iT+vMKCqJCbMbl0BH9JmEG21aQH3g5
FmARVG45q7Vm77C6Pr6h6mO/UntdpAIJljzZG5P8pgvK7QF3oyd2al8Ofh5dHpePH9XRw5d0FzYj
x4nP5TG4S57bGOHxYXb82kkdIRFzuayad+ao/ogQja7M10aYY4CHeuowYwmmwMXSWHJEjWpxWCqF
FxhjqipU+mm7/lNVBF1YPA+dZm33u9RH90NnxWWd/SROvusA5I2h46f0pL45SqdK6ywA1l/KY2CX
vLYmKhrAkYqr2J+jJ3Wp7D7+irMGwkM0hl+2MQm677x1OkiAfvQya/13UC4D7m3hJWBvBgkkewga
3aH7DcF+PiqmkTQLSIKOfHUZvstNnfh7qGkjGC8icTEFVWA/4HUTHgYHIFZFBmSYYxrfte7GLZUA
qtlD4WDoYZnK7lSq24fA/G8mVcbe9/eH1WhFkfIzQykCYgPSi7RqL3TMH1/WrTMfQW8ZydgXvqAp
UGI3TGGozylCsYXbtKcA2lwX1teVM1BrH9HFGwB20613kURPju9m5WUGyqEeZpDj3+ibU1d1exBG
op4QnRwGLHwb7DrMKi7XxpvncmbU0TsoiOT2OKMpMwqGujIuC7Dzi64kJcAD6XaiuwkMivl2mRkw
dppL8c3pSGynEDLUUq2am/fUOBmo5l/Nqpbx4EBvEn+5yAGeTEMpbUnQHUyABHRvBPb/ztf6qv+2
yiLpQDb2ECyhEcCFnSmSrkBvpRm7SgKpBBrxk9iP22WOJLgmlZAqbVybpTioiBvPnNGpLy+qpJm1
2BqkuOFt8t6RqSS6M5a9DV9N9du/9QYS+A6TAnQHAFKVAk3gNJnjsRNXVXq9QtUucASnglS+ZQso
pAWqv3hU31wgawVqeW1KugozccadQfuFxqOC1rSyPm7Rm1n/oRbVX4UaxMAgASoTnmOwAFBmTyQF
3AG5LtKGDyc0e/yUTuH0XyubYWSU4D8SYK8s0Kez4UdPABzF2pUE/95xygBh35P24Ivnr+jGvWuq
HCXAIWHhDid3ZBKtUwW5ys3OsLi6jXM5BC95PZR5Nyrgz0VpOUc6arwbiq7zwFaTsHAKx2GCtzU9
maTAG7wcUzI2geCES5pSV7NxC2mLnqxXCVnBHtqsHUDWTyjaoi0Afa1LMcH6/MWcAEDK2ax3mAu9
ef6SLuL0Xy8bprWQbB8tgaGxyUpbjzOdn6XsBIOKPqm+Tlq0Sy/p0t1mdU0A/ETwoobbKm0huz0J
gFrMrDxiQJZefB2UxFg3/LJ3rtMmS1AEWIw3jkLDzYviZyQqXRWa5iivBFrlk0gKWDJ3Bpl7tba8
C+jcNYzrxVJV3CrXPZwQRzcfWq5RNFtJCKzPB5COQM2kv0E6Ge9qUN3ti7oEinXvFOjmLjgABLq3
mhyIYUjaxDvASplqXcdWcvRRYHgU8/DedDLQ8UFnwABzomExiVoT0Uww00l1c1DDcQCpxQJAdaeJ
oKFXIwDQjZBFfXjrmq5QNek385skHRTjh7GBWutiE8FWsJKm4NnNzlV6IEEDsqu6c189IPB6pcyw
PnBW7rerIBuuVxD6H1bcV2PXuMLjeBiAH+/fB5gpB3q/KIJEDxITRTt0KCpXa/qGLbReR3hpfaju
RsxdUT3Bo2OjmU18CZ7Bi9aZSfqQZa+5eYEAtYOqCR0ijmR3oZu68RAqqTFYE5JdFJjOewJj4pHF
cgSYDcaAt538FHfxks6VVKqkAlo+BjTnwBIIYfY0lYpSXnaOclMAWTPvCjqgcOhodnn4yvfcWSiu
7ur6nQm5QLGZUARv8EFa6XVZvWSInIwzarmrOKahhdqxZwqAtq919nqprjdhLgIAjFsJG8XPMlRw
7zw88qAEm8QQ1yso8JcDSYbG0pu6VteqTjNHbsAY4+nkGOV9XOcdT/vCOe+p4IxsjKVx9UmKQZ32
gHV++U4rDg9c5S7oh8a7KmkjQTFJx0rApDwBFEqlQwVJ2A5aq11jV8Frj5MXAN/udQKcml6Nk9yc
gRbRPxwan7R8ZbIeCrLI1Fvrz41gc7V2/MxF/lTZTlyp0O3yQdpQDdhiDgmsd/Snxbkgrl/Q2XaS
G1XNKgbZPvU1kgL05NF6ulrbZlLVNUfFkOpnVaV5PioFjEb5wJySv3ULAQFJVM5vqyihnwNTlLPr
HTkGXNcl6BFv3ysDCBYQPmaPPeGpjk3MZqacfZgFl7qFIkjVAaT92lvIr7yTTpsQnKMJzVFRvQrQ
2PQEIyeBJPRYR2kk55Y8AEALh+t8x8Yq9dWAyp2TqywC4WedJO4dTJoHN67qSguVB7BSTCujQ2KQ
ZnuqVXalDv0SRGt+gKKgk8TntD2Vc5RSNuyRBzRl5y9e0/nSEtXRbTBDIs87PEXZuau1tTAPvUdV
yRIEjrM7o1cbDmq/7w1swDXdgtv7Hs7mDCM2HoGgiSfAFsGaywLc1NBjWodbiGJy12r/xLBCvafl
2s09NVLhmzTdEnSsxbMWdm3T1rUZdBAshZVAtxHgj8nF67R6dlQeRYlU5t+gKv6i/f/Sv9G1QNK8
o2OKjhIofX2G1XKfxN6GJM0tjOGYAB5Aq5b2EblleWjCvZlOiQ6ryjcxyzpwR29Wk2y9C/BcHkkB
K/NEpRZ63Lt3AJYccaDaDeBYW6uamkmimaQA9m2it0EVN9G1AGWN0lHknzWrnjocWUPlG42dAqX8
0T586XM8+YU5Apr2BxUkQangJe/UoS2rlRnvqG7GCMpvEzCAsjcdlKjkQih3sTlrTCJrfk04g9yf
v9l0DJ3X5avcTylt44AkO8Io4QoNW3JqhlZshs41K1mRb4ApQN8t7fyF2vzzIU19c1qn713VpXJG
Jrl+btEGHczNUGLJFZ0qJWBG/6YW5istBj8gFprnLeO0LYfJB6C0Jux2Q/cQo9cklUDCT121Wdt3
rCUAJnheUGNQvCWs3ad9flT3zuKPVVaqirbx8RknfJ0wfJ1MpRdkKDuP5Ei46XVmb3iCkL/xgH4K
ZsrFcyTk7+L4M7rnBuJ6cmGuNv1ihVbn3NDlc9XqqaarsomEKiOZyw+6DUAogJXQfN64WKFWknLW
TD3VUWfHHjjkz+BTYNMZ3fLPRtfyXLMDrWqso8I9OC6XbHcCcfQeie+kFJ7BhQAPNpgaRlYcqGLH
OPfoYXmVatLzaOMnKbDMtWR9HRyHkMzNMAzwn3QzXrpdqVuV6MQZF3n7RxGgMZZRnKecDCr+1piA
kV+0ktbv1wc+QehYk1S+oxt9YwTrZmQxQjFZRdq+CR0Ay1Kc14T66htUDftD3QAdCMznONJVVcvY
aHMxmCvOdBZA61beAchrTBAdsIAA36tQFUj4q+jyeiYpYLC7LMR9g2NksH6efmg6XP0SlQfA389G
p6GrhE7xbBW1tShFZBepeD9jg7lXdO1ytRqq76kcUORAxxFV38eGDlJMMQE9gWZdVaZaV0QrzAH9
8IBxuW6Kb4yDOU9DCXmPd4Bftgo/0y2ArpMdb1P5v6iTJ/EZ8fkrSLLOkUgJiKaoQzK5mPWeTkHg
0WgLIH7ukfjtO6Y1OndC3zA7f7WWwiCjxb7hYJDQkVeURTI9DSwfq1hl1hEBO/d769xdNfLcU8aH
YwzSzWFULdfPq4NRA//IcWx6mtJMUsC8KXzmmBW79BZAkhHnL+g8933rHiDDgBE7uwUzdpevtRvX
aW0h3SGAoDqRDO+qr1MdFNMOcx7KdO3RJJ115Q3g5qSQfATEt6aiRZ10UYZSyHAnwV1dlaicVQmK
fj6A0YtXJf5YGEXMbbudFeOerzWJ2FswckIBGd5xMEq5QSu1OoYxmvn3PMtoRW99pe5i26sHKAaa
jlsoX+k7VXf5TSiinSgG5WqSrsHkHJICC1fHhwtMWKE9u6blMX1S5+8AXlxBeRK65YBIEljEUVkm
jsIWezHW0QOA6QO6LLrx4cMjZ+RGjFKOPk+jyyhiAuYPRrPaulyhZmekswsqTRhmGk1ihaSA/fj+
SeA7TAqYnQZgXQBI8hto/wkl4G/pxa3EKTbGPgsnCITW9OhYxeXRjjINYBkz8ValynKqirVpX7gy
tpoWYFN1Nmi0gHdZ/flkjEPilRjxLFq1A9z2YQUbtcUPYI58synN3Dyz4Mw0RREARodSCX2iP5Om
dgCjUtaywUIw9vW0tBKZMcUtN5IRITE4x7GAbT2in3FkbidVOTsOyLeYaqlBmuZ8c2TizP2RQ5MD
s/BRSVDMvfYM0cJC4dz+KFMPrh+eD5c4dEmezcovIBkxxD16RoCEy1hDAi1xT6wtAi5XKoE4rX7M
Q0dlQVtEwDlFG6iTJ4FeaKTi4qHNCaJ93/yOLLJnVLaKtoFaWkhUSkXFVHanTKuwYRMguPf0xeiZ
9uJHPUb8jlEF76g8rdnhr/g1BqiI6pkZAaC92KAGG9Rnz6BYxVPNf4KJCkXmE1ukNTgn4QRI9W1k
2KGcNEkBv1DWQ2oiM7iLAgUAfLxj86AfhDFhBdU56Jg8Ht0f9zkF2KN/tOKhYlkYuzRJgeCUDXrv
n8Rq1ZCn/Al2XZhTDM+CLuWvM9Q6hmFPovqDoktY/RP9VRithZ6RgFwRGLrhEO57W/60dOMGWmwF
rhicOZ7LsEHMYAT8Y5KVYDJLJIE8o4q0bne40rYZ3G7a7A0Ka1iy4kF+d3MhGbXhPf00c5ztAFWX
SX74wT0czjkNKBmBpQNJgAAq9oy0PnlQFR1q6QJoKhVMAzMv95oKhPfkm4C8dwUpZq3Bm0J+pkWQ
cZkJg0A8xXsMiFESM/t0Nj55kBAITV+pTX4kVKBIagLAapKkgCOOkT8zlrFmHdGqvniGzcE4TdnQ
2PF+w9Ia1DYAUrcv301PUbTPqOrKmlXCDJ4/822PRkWdWHsZ0ErRFRObC7/xEEE6M+KxaQSY4agp
ujIKqCB1MDcfmU4CAkk7Y8xydx+UD2t7GI/HjOy44kw6UPUy72mSdeEbkaAk2nVsoRxBXmQmAbKL
fPMer/MZg69hUJpZ5y4EiAnQ1dm6TRYfVCzi87TOh2QIwXJBez8JHEowrFkfM4YUG6OYaPiLFzte
zF77p67Ven8y70n1aqDjYcowP0CxGQ9NZrT7Gq2iI6SohXXlm6gUWkRfRyE70PEUvfptvVPA2sMJ
Gqf9tLW9W4OAps4YbmmwA5LYU0lm9OmJZ2K/op/z1lHdikhUZnOXekcNgCBJAeZhQyPN3g1T0CPU
Nzpyoo2DRhKu2NAN0p7sbICFaNU0gGTTrHsP+LLpNrESREseOEhUgzZ88NeKGGSOPhzU9CUfmnsA
6K74kJNCh3C8eXdmDMmVavwc3Q+TANpNTLlbgWMSEcjiUzgDABe/doc8Q+MVn9dKSzFJARfmOwGC
TEgERA0U/ScvyXomOZxazHwy+iq1kXEI9OsM+tIDWqlg5BAHh3jEo6wrD0Y3T9a6Q/o3eXPyYMRo
km6MVsZXBqY4Fx0MARHxSknnHfs+D9uCtk0csvW/+O/huUengd8Ra1oqX3OLv9nPSFCQIMp7608V
sYPRLCf2VwA4C0+g/VFZj4MX/k+DlUkb86TRG2CJzNCC7AqTg9EnY7SU+kXHiLzT/EF1mg6g1fvD
Fb8dXAqKA7OM74WbtmHzDZJtnpHZ2rDPU4nrJ+VixmdIRk8OGmDYUMVmkEh+XZ1nTg87QHzedv2J
72pylRE4swmK8BxTdwbPCusQOHrIHbuWRrKHQHsBqN9289i8oGQVbqb4EJOqtGYSxCNTFhWgG/s5
MorfGTYgi4LzTQ7sphuJ+iISE9iw2KImdBzvwzcaPZTEnp3TmhUrtLaqUxMkteNIJLsbm5O6SVuD
87WKcZ2ZQcYZGJfqghp51snQZEYpJgkfC7v7JGAja5Oup4RCfB2ulVrQqg5Alqaw0+4ErWadxxrW
mCeCFjrXvKOVuXGnAiNJNkBl3DUG/pMHSeukJJLIfnKhSzF//QO1gYQeuLhosCyx8Mz+sUqniOQM
8PMIvoSjqxlpoyvBsNMAaDeFXXVHLomRjDGY90uQmb3xPXlmkchknGAO59DBB/rmEN6RB4WRgl06
EEoS0NCHEhBNORBUEcgs3sbLukXzZWe6k0wCltGaqMwGNfYQoFNs8cTWRSSkKDluUXHGOjl2yiDr
r90mX4CdE2qgSsavMMCSLvx7RDwyTDLdsea7s9DOpdFZ8BPFrp2kG8SMyJFY8MNeMF7lih+Yvmqf
fh67iffMCIIBsoMVJSyeufYl9wlJOEYXW01xiQSDKbA88zV8K6+ILK0DgDY0IZ+ZeWwUhaMgAvm0
BGQ1nq+iFQ/0cICqOWwqUcFTCiJwTsgnqOb+BNaWE8n72ACSBG5RylizXz9P3AJgHwkJA9jJOgkH
w8ZGXMEz+1PVXwfAbXCychrYgwbYG31pEusJ6Twn7XlP3qMZbcQvBAh20158+5QGNfWRiGYs0AuG
lGiYt+IisNePeABNMTJKSWth46HQghuBjTajniRZYCWbZNzQ+MGuVMhjGSFebK8d3QMVkb9R28Oi
8J0b1dILnhMgBs4eQYDMJlIQAxdhnrt7zjVA4QVbtTMgV2vNu4AKdJr1FRhPkoGkgwO+wqp38S3N
7L0ZRWONuCKnaN+nn285K5B3lLFF7/2LQsbS6OIhcWcGtULz9uhnIRs16eoLOwLjCfOndPKEgaRg
g3b4JqkQezlnjQnwd7ofpky3k2G4YA1G0jEbaHCuHt0K8YNbAIXFddrjRcK3sFXtJMnZfPJlDcTE
RyuKLgMrJMLP90LORbsZCdhowKINcCVFlCDeJd2Kbh7Y3G3v6IPs3Zq0Whd5P9C8xuP//rexdcuR
94/zu6/jgy5bUs4EQekr+TzzS1d8KwwbnycPnEVa3Vbzeb3DF8e92Pq88gEVTwRBSUTGy35BoMuM
cZb5vOyrb/B3a869/yEAP8wxgY/QSJtfWRXt0HmBii5mTo3h1Ze33gD4EZujFXxeeJC8MQ54nvks
555NUgCnrpjP6xxOVI+TV/J52Y9xPL3gss43n5d999HfcQRwMlIL+Sz+DbNt2av5LP43zlsQtegf
4K7OjuDzStdyIimQo5V8ljy8CA5W8VnijzPMpLXfr1UzYxoTZo6L5IOHBTRmEjK0hp6+o0bGZrJW
RSgZR8dC4H+dAxRrHypLRebzOr8n5PdgYxSYzyv/noA8Jker+BhnZ9J0ZvQxHlBJt0UNGXV6BMbL
a2jASFYU4ErWbCEZal90wcpn9AGnICBZFffUxY1e2bqUXnneTZIUoF0y23xe+TkWf5EEJZXFTPN5
5d8TWJrRDPN55jeedJtglF/vZh6dzYBp+kQkPQb3SUxbxv3hDHiHUfU2n5c9FHzJEYxjmM/Lvvqi
v9PB5B8PuOALz0G7LsCOubv4vM61HEhmpRTzWcaPcYTCSIDBiPryAwcsKMx85r+anLnMNWWYbaBv
IqgCc/O/8YGTTFIwbQOf590JgahPdJoK+Lz6QTIyjmQun6UP8CDC07WKz3dxOBAYxrK/Yp/YXwT/
BWF0EL3iFQke4qArfe4jvOJpXvo1s16TV1ifpw+vpBUE4E/9K1TE4XxsB4HlcjYJgW1IKv7RE4bx
JXdI4jE8Yw2fJb4XgW4zn5c+5Iu+QGBF4SF5LZ9XPU9gojJW8lny++50rBGQvsT1edVLPfk9khPo
wHzzeeUTkPTHrq1ZyrY9OgeJKGxTsfkseV4obPPNZ4k/MsLWD05OG10IYwS97mDsTI/U6vo9wPMi
wuhyilUo/sPSKSySw7DWZG7k8/SpvdOUsZ7P4n9PfJ71i1RKIZ+XycQdrJI883nZFxf/HQpZ/NiV
5vPCnxF0+pCELDaf5Zx/4bsUoHivxebzgp87kCgIB1T1uesrNhN/69W9hFe7U3xakk8xfJ6QDEnK
BP9nz+BIgTQiexWfVzv7M9+iIBSQQkLyRS8U39I7kk5b81nyMiTpVvF5zVuw/+wPL4E/SFLgD/9Y
P/wrzgG81HTzuI4dPkGLGjPBzg91ePq6yq4xI5i9Xts3roVaiIz4D/9Rf7RPYAFZPgDz4Ga5Sjup
OKBgTcab6XCrCj054qHodHA2VtLm9lQ19IcktNmOu7pxgbmyOw/V2ckIUEW52mdhJvnSQwM6pPc3
ZymD53udObsfkhzs92qXgF0CdgnYJWCXwLcrAaqzEz1quXtCX5yvBIPFkc4DAxYLbpcrXWSbVmj9
ungAme2HXQJ2Cdgl8GIJ2JMC39MVYpD4x5jzmgaDIWdNEO2UBIuACBk2Bgeoz8YMQq/pXn7T7sXv
6fP/GG7LCRol/3AwDaJ71DzaQLuaYUBgNh5EWAeqJrFrAKbBoBcnMS/4A96phqFijJnlXgCzhsZh
oAD5PQQk2zEvOghwXKYM9/OP4YXbn9EuAbsE7BKwS8AugW9VAoZ9yVDDmsQ6+Esg7fc6M9bjFau0
VYzSbl2hgphvj+TzW711+8nsErBL4HslgR9wqPG9kuO3fjOOgFAlrn1HH2btgRLQBhYzBWbBBEMD
rn4AnwQzH2RPCHzrcv9DntARsL7wrDVaHwvg4/AI3K/M6DKjZSb/HBgn8KU3OQz2jPkxtj/krX2r
13IyoF3bGc8pguUD/mtnUKSdzYiEYR9hljWcIU97l8C3KnL7yewSsEvALgG7BH4sEqAlP6Zgjz6I
WaNdowYsg5l+Rpz8Q8BtCmJ+2+4r/lhWgv057RJ4IwnYkwJvJL7v7scGfM4PIEUIEOzHH6kEHKA1
c4UPNtB8/kif0TyWgzuUmNHm80f8kPZHs0vALgG7BOwSsEvgv4UEDDhsICCSfOyHXQJ2Cdgl8LoS
sCcFXldy9t/ZJWCXgF0CdgnYJWCXgF0CdgnYJWCXgF0CdgnYJfADl4A9KfADf4H227dLwC4BuwTs
ErBLwC4BuwTsErBLwC4BuwTsErBL4HUlYE8KvK7k7L+zS8AuAbsE7BKwS8AuAbsE7BKwS8AuAbsE
7BKwS+AHLgF7UuAH/gLtt2+XgF0CdgnYJWCXgF0CdgnYJWCXgF0CdgnYJWCXwOtKwJ4UeF3JPfrd
jCZ6WtXRPahRtyAFhYcq0N3Rjqb+xnK1n8AuAbsEvtcSgFZyvK9dTZ2TmnaHDzvKXz52mOvv9Sv7
zm9uZlQDnV1q65qWR2ioQkN95OH4nV/VfoHvsQTmJqCjbWtV97iL3MJjFO3nJmc7Gv73+I3Zb80u
AbsEfqwSsCcF3vjNT6j/9lEdPnZbtZHbteu9g9oU4yqPNz6v/QR2CdglYJfA91gCM4PqLjusX37e
raHYLfqzP1uj3ABn6FPtx49WAmMtqj3/jX51ol9xe9/SW3tyFG83hj/a5SDNarq/RqWf/ErHWoMU
8d4/1V+tDJOvnYP2R7wm7I9ul4BdAt9XCdiTAm/8ZqY1WHlR5z77UlcygxS7db/WxbzxSe0nsEvA
LgG7BL7fEpgdUX/dBX3zSb16CmK1/b1VygmAgvL7fdf2u/suJTDWpcbbZ/XJ79uVH71CG7bZkwLf
pbi//+ee08xgg2pOfqbPqqKVXvihflEcJnsr5ff/zdnv0C4BuwR+fBL4/wPLFEo+isiDRwAAAABJ
RU5ErkJggg==

--_004_E8355113905631478EFF04F5AA706E9830DAA925wtlexchp2sandvi_--


From nobody Tue Nov 17 19:56:41 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48DDC1A92BB for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 19:56:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Diuu_QJO52Mi for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 19:56:37 -0800 (PST)
Received: from mxb2.tigertech.net (mxb2.tigertech.net [208.80.4.164]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 236ED1A92BA for <sfc@ietf.org>; Tue, 17 Nov 2015 19:56:37 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 0A8C52E334F; Tue, 17 Nov 2015 19:56:37 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 1FEF82E3354; Tue, 17 Nov 2015 19:56:36 -0800 (PST)
To: mohamed.boucadair@orange.com, Joel Halpern <joel.halpern@ericsson.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F48D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <564BF6F2.7060904@joelhalpern.com>
Date: Tue, 17 Nov 2015 22:56:34 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9F48D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/uur2yHnkL_6iODWsBuTP5zag8PE>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 03:56:39 -0000

Let me trying phrasing this differently.
A Service Function Chain (SFC) effectively designates a (potentially 
large) collection of sequences of SFF and SF visitations, any one of 
which would satisfy the the SFC.

An Service Function Path (SFP) designates a subset of the collection 
designated by the SFC. For some SFPs, in some deployments, that will be 
a set of 1.  For other SFPs (in the same or other deployments) it may be 
a larger set.  For some SFPs in some deployments the SFP may designate 
the same set of choices as the SFC.

Formally, the SFP is a subset of the SFC, but not necessarily a proper 
subset.

By always having control provision in terms of SFPs, the data plane 
always sees the effects of the constraints that control has placed in 
selecting the SFP.  And because of the definition of SFP, this allows 
the range of deplooyments the working group has requested.

Add SFC information into the provisioning does not increase the 
capability.  It does not, in fact, add any information tha thte 
forwarding can use.

Yours,
Joel

On 11/17/15 9:27 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
> Thank you for engaging.
>
> Please see inline.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>> Envoyé : mardi 17 novembre 2015 15:06
>> À : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq)
>> Cc : sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane operates
>> on SFC IDs, SFP IDs, etc.
>>
>> What is provisioned into the SFF reflects the SFP.
>
> [Med] Which one? Given than multiple SFPs may be bound to the same SFC
>
> Excerpt from RFC7665:
>
> " Since multiple policies may apply to
>     different traffic that uses the same SFC, it also follows that there
>     may be multiple SFPs associated with a single SFC."
>
> The text talks about policies that are applied to the traffic whiteout any precision where these policies are applied.
>
>    The control system
>> decides whether that SFP indicates the same set of all possible choices
>> that the SFC does, or is a proper subset.
>
> [Med] That's indeed a valid case. The control plane accommodates that case.
>
>>
>> In order to allow for an SFP that reflects meaningful constraints, what is
>> provisioned has to be the SFP.
>
> [Med] I would call that RSP. That's more clear.
>
>> No special provision is needed for the case where the SFP is isomorphic to
>> the SFC. In such a case, you still provision the SFP.  And the result is
>> an SFP with as much flexibility as the SFC.
>
> [Med] This is confusing, Joel. SFP cannot be isomorphic to the SFC as the definition of an SFP is a "constrained version of SFC" (that is clearly mentioned in RFC7665). I'm for more consistency in the use of the notions we are manipulating.
>
>>
>> If, in contrast, you declare that the provisioning includes the SFC then
>> you are introducing extra complexity without adding any new cases that can
>> be handled.
>
> [Med] I'm not sure to see this extra complexity. I do even see benefits in having access to the SFC information allows, e.g., correlate between a service path and a chain in deployments where a path may be shared among multiple chains.
>
>>
>> Yours,
>> Joel
>>
>> -----Original Message-----
>> From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
>> Sent: Tuesday, November 17, 2015 9:03 AM
>> To: Joel Halpern; Paul Quinn (paulq)
>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane operates
>> on SFC IDs, SFP IDs, etc.
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>> Envoyé : mardi 17 novembre 2015 14:49
>>> À : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc issue
>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>> sfc@ietf.org; Joel M. Halpern
>>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
>>> operates on SFC IDs, SFP IDs, etc.
>>>
>>> Your statement that " It happens that information is no more than the
>>> service chain itself (without any constraints)." (Where "it" refers to "
>>> the exact sequence of steps to be used to realize the SFC".) Does not
>>> make sense to me.
>>
>> [Med] RFC 7665 says:
>>
>> "   Thus, the policies and logic of SFP selection or creation (depending
>>     upon the solution) produce what may be thought of as a constrained
>>     version of the original SFC. "
>>
>> in short: SFP is defined as a constrained version of the original SFC.
>>
>> What is the name to use to refer to a "non-constrained" SFC or to the
>> information that you will provision to an SFF when the path computation
>> and selection decision is "deferred to the SFF"?
>>
>> It does not make sense to call a non-constrained version of the SFC as SFP
>> given that RFC7665 explicitly defines SFP as "constrained version of the
>> original SFC"!
>>
>>   The SFC is the general description of the objective.  That
>>> is not the same as the exact sequence of places that must be visited.
>>>
>>> I stand by my earlier comments that almost all uses of SFC in the
>>> control requirements draft should be SFP.
>>>
>>
>> [Med] I noted that Joel.. that's fair but this position is IMHO not
>> aligned with RFC7665 that allows to control any variation from a non-
>> constrained SFC to a fully constrained SFC.
>>
>>> Yours,
>>> Joel
>>>
>>> -----Original Message-----
>>> From: mohamed.boucadair@orange.com
>>> [mailto:mohamed.boucadair@orange.com]
>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>> To: Paul Quinn (paulq)
>>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>> sfc@ietf.org; Joel M. Halpern
>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>> operates on SFC IDs, SFP IDs, etc.
>>>
>>> Hi Paul,
>>>
>>> Thank you for sharing your feedback.
>>>
>>> RFC7665 says the following:
>>>
>>> "
>>> This architecture does not mandate the degree of
>>>     specificity of the SFP.  Architecturally, within the same SFC-enabled
>>>     domain, some SFPs may be fully specified, selecting exactly which SFF
>>>     and which SF are to be visited by packets using that SFP, while other
>>>     SFPs may be quite vague, deferring to the SFF the decisions about the
>>>     exact sequence of steps to be used to realize the SFC.  The
>>>     specificity may be anywhere in between these extremes.
>>> "
>>>
>>> The control draft is completely aligned with that approach.
>>>
>>> The control-plane document allows in particular to provision required
>>> information when "deferring to the SFF the decisions about the
>>>     exact sequence of steps to be used to realize the SFC". It happens
>>> that information is no more than the service chain itself (without any
>>> constraints).
>>>
>>> Also, the current control-plane document allows to instruct a loose
>>> path
>>> (SFP) or a strict path (RSP), etc.
>>>
>>> I fully agree that whether a full path is specified within a domain or
>>> if it is deferred to SFFs is really deployment-specific. Nevertheless,
>>> the control plan should accommodate all these flavors.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoyé : vendredi
>>>> 16 octobre 2015 14:04 À : Joel M. Halpern Cc : BOUCADAIR Mohamed
>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>> (control-plane): Whether the control plane operates on SFC IDs, SFP
>> IDs, etc.
>>>>
>>>> Joel,
>>>>
>>>> I concur.
>>>>
>>>> The data plane deal with paths, not chains.  The relationship of
>>>> paths to chains falls squarely in the control plane (or even more
>>>> likely
>>> "policy"
>>>> plane) realm.  The specificity of the path is left to
>>>> implementation, in the architecture draft, but that's consistent
>>>> with your position and provides the requisite functionality.
>>>>
>>>> Paul
>>>>
>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>> <jmh@joelhalpern.com>
>>>> wrote:
>>>>>
>>>>> As far as I can tell, there is nothing in the Service Chaining
>>>>> work that
>>>> requires correlating service path IDs with service chain IDs within
>>>> the data plane.  Any such relationship exists entirely within the
>>>> control plane or above, and would be driven by requirements other
>>>> than the data plane.  When I look at this document, all of the
>>>> requirements that talk about service function chain IDs can be
>>>> accurately captured, in terms of data plane requirements, by service
>> function path IDs.
>>>> Thus, the requirement that the data plane has is to see such path IDs.
>>>> Yes, in some deployments those will be 1-1 with chain IDs.  They are
>>> still path IDs.
>>>>>
>>>>> Introducing a requirement for the data plane to see and work with
>>>>> chain
>>>> IDs is not grounded in the work of the group.
>>>>>
>>>>> Yours,
>>>>> Joel M. Halpern
>>>>>
>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>> Re-,
>>>>>>
>>>>>> The control draft as it stands is compliant with the data plane
>>>> architecture document.
>>>>>>
>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>> abstract
>>> SFC


From nobody Tue Nov 17 23:46:04 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F7E71B29D9 for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 23:46:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J3N6bprbaJQV for <sfc@ietfa.amsl.com>; Tue, 17 Nov 2015 23:46:00 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBF3D1B29D7 for <sfc@ietf.org>; Tue, 17 Nov 2015 23:45:59 -0800 (PST)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr21.francetelecom.fr (ESMTP service) with ESMTP id 0EFC6C0457; Wed, 18 Nov 2015 08:45:58 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.66]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id CDB171A005D; Wed, 18 Nov 2015 08:45:57 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA1.corporate.adroot.infra.ftgroup ([fe80::95e2:eb4b:3053:fabf%19]) with mapi id 14.03.0248.002; Wed, 18 Nov 2015 08:45:57 +0100
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Joel Halpern <joel.halpern@ericsson.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHRIbUiWto1LrTpi0m9FGoWf7P3kJ6hWK4A
Date: Wed, 18 Nov 2015 07:45:57 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9F8B0@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F48D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <564BF6F2.7060904@joelhalpern.com>
In-Reply-To: <564BF6F2.7060904@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/jx9Q4yR85PpCKRog-gXs16vvTjc>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 07:46:03 -0000

Hi Joel, all,

(The discussion is going in the right direction as it helps to see where is=
 the disconnect)

Please see inline.=20

Cheers,
Med=20

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Envoy=E9=A0: mercredi 18 novembre 2015 04:57
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Joel Halpern; Paul Quinn (paulq)
> Cc=A0: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> sfc@ietf.org; Joel M. Halpern
> Objet=A0: Re: [sfc] #15 (control-plane): Whether the control plane operat=
es
> on SFC IDs, SFP IDs, etc.
>=20
> Let me trying phrasing this differently.
> A Service Function Chain (SFC) effectively designates a (potentially
> large) collection of sequences of SFF and SF visitations, any one of
> which would satisfy the the SFC.
>=20

[Med] This is a new definition, Joel.=20

An SFC is no more than "an
        ordered set of abstract service functions and ordering
        constraints that must be applied to packets and/or frames and/or
        flows selected as a result of classification."=20

Instantiating an SFC may lead to a collection of sequences of SFFs/SF, but =
still those collections are INSTANTIATIONS of a SINGLE SFC. An instantiatio=
n of an SFC may or may not be known in advance. This is deployment-specific=
: some may go for a fully distributed scheme, others for centralized, other=
s for an hierarchical approach, etc. =20

> An Service Function Path (SFP) designates a subset of the collection
> designated by the SFC.=20

[Med] I acknowledge this is subtle, but still you are proposing a new defin=
ition. I prefer the one in the data arch RFC:

" The SFP provides a level of indirection between the
        fully abstract notion of service chain as a sequence of abstract
        service functions to be delivered, and the fully specified
        notion of exactly which SFF/SFs the packet will visit when it
        actually traverses the network."=20

BTW, this definition from RFC7665 is odd since it defines SFP by itself:

"The service function path is a
        constrained specification of where packets assigned to a certain
        service function path must go."


For some SFPs, in some deployments, that will be
> a set of 1.  For other SFPs (in the same or other deployments) it may be
> a larger set.  For some SFPs in some deployments the SFP may designate
> the same set of choices as the SFC.
>=20
> Formally, the SFP is a subset of the SFC, but not necessarily a proper
> subset.
>=20

[Med] Again, this is subtle but I still disagree. I would agree if you said=
 "the SFP is an SFC instantiation" to be aligned with this text from the da=
ta arch RFC:=20

"Since multiple policies may apply to
   different traffic that uses the same SFC, it also follows that there
   may be multiple SFPs associated with a single SFC."

> By always having control provision in terms of SFPs, the data plane
> always sees the effects of the constraints that control has placed in
> selecting the SFP.

[Med] still works with s/SFPs/"SFCs and/or SFPs".

  And because of the definition of SFP, this allows
> the range of deplooyments the working group has requested.

[Med] No problem with that part since SFP is vague enough.

>=20
> Add SFC information into the provisioning does not increase the
> capability.  It does not, in fact, add any information tha thte
> forwarding can use.

[Med] I does, as it allows to drive the forwarding decision-making process =
when the service path computation and selection is fully distributed, when =
policies are not enforced at a centralized point but in various points of t=
he network (e.g., hierarchical), etc. =20

>=20
> Yours,
> Joel
>=20
> On 11/17/15 9:27 AM, mohamed.boucadair@orange.com wrote:
> > Re-,
> >
> > Thank you for engaging.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
> >> Envoy=E9 : mardi 17 novembre 2015 15:06
> >> =C0 : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq)
> >> Cc : sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> >> sfc@ietf.org; Joel M. Halpern
> >> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
> operates
> >> on SFC IDs, SFP IDs, etc.
> >>
> >> What is provisioned into the SFF reflects the SFP.
> >
> > [Med] Which one? Given than multiple SFPs may be bound to the same SFC
> >
> > Excerpt from RFC7665:
> >
> > " Since multiple policies may apply to
> >     different traffic that uses the same SFC, it also follows that ther=
e
> >     may be multiple SFPs associated with a single SFC."
> >
> > The text talks about policies that are applied to the traffic whiteout
> any precision where these policies are applied.
> >
> >    The control system
> >> decides whether that SFP indicates the same set of all possible choice=
s
> >> that the SFC does, or is a proper subset.
> >
> > [Med] That's indeed a valid case. The control plane accommodates that
> case.
> >
> >>
> >> In order to allow for an SFP that reflects meaningful constraints, wha=
t
> is
> >> provisioned has to be the SFP.
> >
> > [Med] I would call that RSP. That's more clear.
> >
> >> No special provision is needed for the case where the SFP is isomorphi=
c
> to
> >> the SFC. In such a case, you still provision the SFP.  And the result
> is
> >> an SFP with as much flexibility as the SFC.
> >
> > [Med] This is confusing, Joel. SFP cannot be isomorphic to the SFC as
> the definition of an SFP is a "constrained version of SFC" (that is
> clearly mentioned in RFC7665). I'm for more consistency in the use of the
> notions we are manipulating.
> >
> >>
> >> If, in contrast, you declare that the provisioning includes the SFC
> then
> >> you are introducing extra complexity without adding any new cases that
> can
> >> be handled.
> >
> > [Med] I'm not sure to see this extra complexity. I do even see benefits
> in having access to the SFC information allows, e.g., correlate between a
> service path and a chain in deployments where a path may be shared among
> multiple chains.
> >
> >>
> >> Yours,
> >> Joel
> >>
> >> -----Original Message-----
> >> From: mohamed.boucadair@orange.com
> [mailto:mohamed.boucadair@orange.com]
> >> Sent: Tuesday, November 17, 2015 9:03 AM
> >> To: Joel Halpern; Paul Quinn (paulq)
> >> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> >> sfc@ietf.org; Joel M. Halpern
> >> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
> operates
> >> on SFC IDs, SFP IDs, etc.
> >>
> >> Hi Joel,
> >>
> >> Please see inline.
> >>
> >> Cheers,
> >> Med
> >>
> >>> -----Message d'origine-----
> >>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
> >>> Envoy=E9 : mardi 17 novembre 2015 14:49
> >>> =C0 : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc issue
> >>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> >>> sfc@ietf.org; Joel M. Halpern
> >>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
> >>> operates on SFC IDs, SFP IDs, etc.
> >>>
> >>> Your statement that " It happens that information is no more than the
> >>> service chain itself (without any constraints)." (Where "it" refers t=
o
> "
> >>> the exact sequence of steps to be used to realize the SFC".) Does not
> >>> make sense to me.
> >>
> >> [Med] RFC 7665 says:
> >>
> >> "   Thus, the policies and logic of SFP selection or creation
> (depending
> >>     upon the solution) produce what may be thought of as a constrained
> >>     version of the original SFC. "
> >>
> >> in short: SFP is defined as a constrained version of the original SFC.
> >>
> >> What is the name to use to refer to a "non-constrained" SFC or to the
> >> information that you will provision to an SFF when the path computatio=
n
> >> and selection decision is "deferred to the SFF"?
> >>
> >> It does not make sense to call a non-constrained version of the SFC as
> SFP
> >> given that RFC7665 explicitly defines SFP as "constrained version of
> the
> >> original SFC"!
> >>
> >>   The SFC is the general description of the objective.  That
> >>> is not the same as the exact sequence of places that must be visited.
> >>>
> >>> I stand by my earlier comments that almost all uses of SFC in the
> >>> control requirements draft should be SFP.
> >>>
> >>
> >> [Med] I noted that Joel.. that's fair but this position is IMHO not
> >> aligned with RFC7665 that allows to control any variation from a non-
> >> constrained SFC to a fully constrained SFC.
> >>
> >>> Yours,
> >>> Joel
> >>>
> >>> -----Original Message-----
> >>> From: mohamed.boucadair@orange.com
> >>> [mailto:mohamed.boucadair@orange.com]
> >>> Sent: Tuesday, November 17, 2015 8:34 AM
> >>> To: Paul Quinn (paulq)
> >>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
> >>> sfc@ietf.org; Joel M. Halpern
> >>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
> >>> operates on SFC IDs, SFP IDs, etc.
> >>>
> >>> Hi Paul,
> >>>
> >>> Thank you for sharing your feedback.
> >>>
> >>> RFC7665 says the following:
> >>>
> >>> "
> >>> This architecture does not mandate the degree of
> >>>     specificity of the SFP.  Architecturally, within the same SFC-
> enabled
> >>>     domain, some SFPs may be fully specified, selecting exactly which
> SFF
> >>>     and which SF are to be visited by packets using that SFP, while
> other
> >>>     SFPs may be quite vague, deferring to the SFF the decisions about
> the
> >>>     exact sequence of steps to be used to realize the SFC.  The
> >>>     specificity may be anywhere in between these extremes.
> >>> "
> >>>
> >>> The control draft is completely aligned with that approach.
> >>>
> >>> The control-plane document allows in particular to provision required
> >>> information when "deferring to the SFF the decisions about the
> >>>     exact sequence of steps to be used to realize the SFC". It happen=
s
> >>> that information is no more than the service chain itself (without an=
y
> >>> constraints).
> >>>
> >>> Also, the current control-plane document allows to instruct a loose
> >>> path
> >>> (SFP) or a strict path (RSP), etc.
> >>>
> >>> I fully agree that whether a full path is specified within a domain o=
r
> >>> if it is deferred to SFFs is really deployment-specific. Nevertheless=
,
> >>> the control plan should accommodate all these flavors.
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9 : vendredi
> >>>> 16 octobre 2015 14:04 =C0 : Joel M. Halpern Cc : BOUCADAIR Mohamed
> >>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
> >>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
> >>>> (control-plane): Whether the control plane operates on SFC IDs, SFP
> >> IDs, etc.
> >>>>
> >>>> Joel,
> >>>>
> >>>> I concur.
> >>>>
> >>>> The data plane deal with paths, not chains.  The relationship of
> >>>> paths to chains falls squarely in the control plane (or even more
> >>>> likely
> >>> "policy"
> >>>> plane) realm.  The specificity of the path is left to
> >>>> implementation, in the architecture draft, but that's consistent
> >>>> with your position and provides the requisite functionality.
> >>>>
> >>>> Paul
> >>>>
> >>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
> >>>>> <jmh@joelhalpern.com>
> >>>> wrote:
> >>>>>
> >>>>> As far as I can tell, there is nothing in the Service Chaining
> >>>>> work that
> >>>> requires correlating service path IDs with service chain IDs within
> >>>> the data plane.  Any such relationship exists entirely within the
> >>>> control plane or above, and would be driven by requirements other
> >>>> than the data plane.  When I look at this document, all of the
> >>>> requirements that talk about service function chain IDs can be
> >>>> accurately captured, in terms of data plane requirements, by service
> >> function path IDs.
> >>>> Thus, the requirement that the data plane has is to see such path
> IDs.
> >>>> Yes, in some deployments those will be 1-1 with chain IDs.  They are
> >>> still path IDs.
> >>>>>
> >>>>> Introducing a requirement for the data plane to see and work with
> >>>>> chain
> >>>> IDs is not grounded in the work of the group.
> >>>>>
> >>>>> Yours,
> >>>>> Joel M. Halpern
> >>>>>
> >>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
> >>>>>> Re-,
> >>>>>>
> >>>>>> The control draft as it stands is compliant with the data plane
> >>>> architecture document.
> >>>>>>
> >>>>>> Indeed, the arch draft acknowledges the following:
> >>>>>> (1) SFPs are "associated with a given SFC".
> >>>>>> (2) SFPs are presented as a form of constrained SFCs.
> >>>>>> (3) Some deployments may not impose any constraint on the
> >>>>>> abstract
> >>> SFC


From nobody Wed Nov 18 00:39:01 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D9871B2A24 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 00:38:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id weIbHlfKnj5F for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 00:38:57 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias244.francetelecom.com [80.12.204.244]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC32A1B2A1B for <sfc@ietf.org>; Wed, 18 Nov 2015 00:38:56 -0800 (PST)
Received: from omfeda08.si.francetelecom.fr (unknown [xx.xx.xx.201]) by omfeda12.si.francetelecom.fr (ESMTP service) with ESMTP id C745A3B42F7; Wed, 18 Nov 2015 09:38:54 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.27]) by omfeda08.si.francetelecom.fr (ESMTP service) with ESMTP id A6849384061; Wed, 18 Nov 2015 09:38:54 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7C.corporate.adroot.infra.ftgroup ([fe80::8007:17b:c3b4:d68b%19]) with mapi id 14.03.0248.002; Wed, 18 Nov 2015 09:38:54 +0100
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Linda Dunbar (linda.dunbar@huawei.com)" <linda.dunbar@huawei.com>, "Andrew G. Malis (agmalis@gmail.com)" <agmalis@gmail.com>
Thread-Topic: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
Thread-Index: AQHQ8dhspZs2K5mvM0WjD4/IjUzcZZ6hxKXQ
Date: Wed, 18 Nov 2015 08:38:53 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org>
In-Reply-To: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.18.80617
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AX9pxMZmWcQZDp2apBYomjoIEKg>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 08:38:59 -0000
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From nobody Wed Nov 18 02:51:49 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98DBE1B2C27 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 02:51:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k-6Af2_JOx2h for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 02:51:46 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 260C41B2C24 for <sfc@ietf.org>; Wed, 18 Nov 2015 02:51:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9426; q=dns/txt; s=iport; t=1447843906; x=1449053506; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=l7HbgrhawcZSNZdMiJqNAIV5/SyAOJHhcD0eXUCvRTg=; b=Y7G4MDkUEp2S9jyFMign3qG3uPaYorOKjtjla6H7PZUR5cTeM3Cf+XSy TYAxOVY1mux8COKYNiUEdqXiH4SHkG9NViCy72HyWj9nALCQWUY3M3Lsa p68Ymc8mRTiUTCSOOc+KT/TetUx52IujBM+e6p5iKm1PdpAwxdOHuCT3X 4=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CyAgBqV0xW/5hdJa1egztTbwa+Yg6BZ?= =?us-ascii?q?RcKhW4CgUI4FAEBAQEBAQGBCoQ0AQEBAwEBAQEgSwQHBQcEAgEIEQEDAQEBJwM?= =?us-ascii?q?CAicLFAMGCAIEDgUODYgLCA2tT5AuAQEBAQEBAQEBAQEBAQEBAQEBAQEBDwUEh?= =?us-ascii?q?lSCEIJuh3UvgRUFjRyJLgGCVoFgg1uFGYFbhECSOINxAR8BQ4IRHRaBQHKEBYE?= =?us-ascii?q?HAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,312,1444694400";  d="asc'?scan'208";a="209579228"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Nov 2015 10:51:44 +0000
Received: from XCH-RTP-006.cisco.com (xch-rtp-006.cisco.com [64.101.220.146]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tAIApi60008856 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 18 Nov 2015 10:51:44 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-006.cisco.com (64.101.220.146) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 05:51:43 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 05:51:43 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgA==
Date: Wed, 18 Nov 2015 10:51:43 +0000
Message-ID: <124FC034-8627-4976-846F-15136797DD48@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se>
In-Reply-To: <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.234.212]
Content-Type: multipart/signed; boundary="Apple-Mail=_D1D156CC-A6B6-4F39-80E1-BB94F544DEA5"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8DkHkhq6TXvNf2PNN84sNM21LpI>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 10:51:48 -0000

--Apple-Mail=_D1D156CC-A6B6-4F39-80E1-BB94F544DEA5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

I am a bit baffled to see this thread again =E2=80=94 it appears the =
discussion restarted to continue in circles.

Med,

I too agree with Joel and strongly believe there is no need for SFC =
identification passed down =E2=80=94 there is no provisioning of SFCs =
southbound.

(Almost) every instance of =E2=80=9CSFC=E2=80=9D in the control-plane =
requirements draft should really say =E2=80=9CSFP=E2=80=9D. There is no =
use of talking about SFCs towards the data plane. The relationship =
between chains and paths is a policy matter which belongs in the =
policy/control itself, but not out of there.

This is no different than what I said a few months ago on the same =
topic.

Thanks,

=E2=80=94 Carlos.

> On Nov 17, 2015, at 9:06 AM, Joel Halpern <joel.halpern@ericsson.com> =
wrote:
>=20
> What is provisioned into the SFF reflects the SFP.  The control system =
decides whether that SFP indicates the same set of all possible choices =
that the SFC does, or is a proper subset.
>=20
> In order to allow for an SFP that reflects meaningful constraints, =
what is provisioned has to be the SFP.
> No special provision is needed for the case where the SFP is =
isomorphic to the SFC. In such a case, you still provision the SFP.  And =
the result is an SFP with as much flexibility as the SFC.
>=20
> If, in contrast, you declare that the provisioning includes the SFC =
then you are introducing extra complexity without adding any new cases =
that can be handled.
>=20
> Yours,
> Joel
>=20
> -----Original Message-----
> From: mohamed.boucadair@orange.com =
[mailto:mohamed.boucadair@orange.com]
> Sent: Tuesday, November 17, 2015 9:03 AM
> To: Joel Halpern; Paul Quinn (paulq)
> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org; =
sfc@ietf.org; Joel M. Halpern
> Subject: RE: [sfc] #15 (control-plane): Whether the control plane =
operates on SFC IDs, SFP IDs, etc.
>=20
> Hi Joel,
>=20
> Please see inline.
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>> Envoy=C3=A9 : mardi 17 novembre 2015 14:49
>> =C3=80 : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc issue
>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
>> operates on SFC IDs, SFP IDs, etc.
>>=20
>> Your statement that " It happens that information is no more than the
>> service chain itself (without any constraints)." (Where "it" refers =
to "
>> the exact sequence of steps to be used to realize the SFC".) Does not
>> make sense to me.
>=20
> [Med] RFC 7665 says:
>=20
> "   Thus, the policies and logic of SFP selection or creation =
(depending
>   upon the solution) produce what may be thought of as a constrained
>   version of the original SFC. "
>=20
> in short: SFP is defined as a constrained version of the original SFC.
>=20
> What is the name to use to refer to a "non-constrained" SFC or to the =
information that you will provision to an SFF when the path computation =
and selection decision is "deferred to the SFF"?
>=20
> It does not make sense to call a non-constrained version of the SFC as =
SFP given that RFC7665 explicitly defines SFP as "constrained version of =
the original SFC"!
>=20
> The SFC is the general description of the objective.  That
>> is not the same as the exact sequence of places that must be visited.
>>=20
>> I stand by my earlier comments that almost all uses of SFC in the
>> control requirements draft should be SFP.
>>=20
>=20
> [Med] I noted that Joel.. that's fair but this position is IMHO not =
aligned with RFC7665 that allows to control any variation from a =
non-constrained SFC to a fully constrained SFC.
>=20
>> Yours,
>> Joel
>>=20
>> -----Original Message-----
>> From: mohamed.boucadair@orange.com
>> [mailto:mohamed.boucadair@orange.com]
>> Sent: Tuesday, November 17, 2015 8:34 AM
>> To: Paul Quinn (paulq)
>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>> operates on SFC IDs, SFP IDs, etc.
>>=20
>> Hi Paul,
>>=20
>> Thank you for sharing your feedback.
>>=20
>> RFC7665 says the following:
>>=20
>> "
>> This architecture does not mandate the degree of
>>   specificity of the SFP.  Architecturally, within the same =
SFC-enabled
>>   domain, some SFPs may be fully specified, selecting exactly which =
SFF
>>   and which SF are to be visited by packets using that SFP, while =
other
>>   SFPs may be quite vague, deferring to the SFF the decisions about =
the
>>   exact sequence of steps to be used to realize the SFC.  The
>>   specificity may be anywhere in between these extremes.
>> "
>>=20
>> The control draft is completely aligned with that approach.
>>=20
>> The control-plane document allows in particular to provision required
>> information when "deferring to the SFF the decisions about the
>>   exact sequence of steps to be used to realize the SFC". It happens
>> that information is no more than the service chain itself (without =
any
>> constraints).
>>=20
>> Also, the current control-plane document allows to instruct a loose
>> path
>> (SFP) or a strict path (RSP), etc.
>>=20
>> I fully agree that whether a full path is specified within a domain =
or
>> if it is deferred to SFFs is really deployment-specific. =
Nevertheless,
>> the control plan should accommodate all these flavors.
>>=20
>> Cheers,
>> Med
>>=20
>>> -----Message d'origine-----
>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=C3=A9 : =
vendredi
>>> 16 octobre 2015 14:04 =C3=80 : Joel M. Halpern Cc : BOUCADAIR =
Mohamed
>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>> (control-plane): Whether the control plane operates on SFC IDs, SFP =
IDs, etc.
>>>=20
>>> Joel,
>>>=20
>>> I concur.
>>>=20
>>> The data plane deal with paths, not chains.  The relationship of
>>> paths to chains falls squarely in the control plane (or even more
>>> likely
>> "policy"
>>> plane) realm.  The specificity of the path is left to
>>> implementation, in the architecture draft, but that's consistent
>>> with your position and provides the requisite functionality.
>>>=20
>>> Paul
>>>=20
>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>> <jmh@joelhalpern.com>
>>> wrote:
>>>>=20
>>>> As far as I can tell, there is nothing in the Service Chaining
>>>> work that
>>> requires correlating service path IDs with service chain IDs within
>>> the data plane.  Any such relationship exists entirely within the
>>> control plane or above, and would be driven by requirements other
>>> than the data plane.  When I look at this document, all of the
>>> requirements that talk about service function chain IDs can be
>>> accurately captured, in terms of data plane requirements, by service =
function path IDs.
>>> Thus, the requirement that the data plane has is to see such path =
IDs.
>>> Yes, in some deployments those will be 1-1 with chain IDs.  They are
>> still path IDs.
>>>>=20
>>>> Introducing a requirement for the data plane to see and work with
>>>> chain
>>> IDs is not grounded in the work of the group.
>>>>=20
>>>> Yours,
>>>> Joel M. Halpern
>>>>=20
>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>> Re-,
>>>>>=20
>>>>> The control draft as it stands is compliant with the data plane
>>> architecture document.
>>>>>=20
>>>>> Indeed, the arch draft acknowledges the following:
>>>>> (1) SFPs are "associated with a given SFC".
>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>> (3) Some deployments may not impose any constraint on the
>>>>> abstract
>> SFC
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_D1D156CC-A6B6-4F39-80E1-BB94F544DEA5
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=4vEF
-----END PGP SIGNATURE-----

--Apple-Mail=_D1D156CC-A6B6-4F39-80E1-BB94F544DEA5--


From nobody Wed Nov 18 05:08:40 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A98FB1A21AB for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 05:08:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hgOcThijZYPV for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 05:08:36 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias244.francetelecom.com [80.12.204.244]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80B421A2119 for <sfc@ietf.org>; Wed, 18 Nov 2015 05:08:35 -0800 (PST)
Received: from omfeda07.si.francetelecom.fr (unknown [xx.xx.xx.200]) by omfeda12.si.francetelecom.fr (ESMTP service) with ESMTP id 1BE833B42B8; Wed, 18 Nov 2015 14:08:33 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.31]) by omfeda07.si.francetelecom.fr (ESMTP service) with ESMTP id E071315805E; Wed, 18 Nov 2015 14:08:32 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM22.corporate.adroot.infra.ftgroup ([fe80::8c90:f4e9:be28:2a1%19]) with mapi id 14.03.0248.002; Wed, 18 Nov 2015 14:08:32 +0100
From: <mohamed.boucadair@orange.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdA
Date: Wed, 18 Nov 2015 13:08:31 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com>
In-Reply-To: <124FC034-8627-4976-846F-15136797DD48@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.18.121518
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Tpq8gdeDjgXpudmk-r166aPGPvs>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 13:08:38 -0000
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From nobody Wed Nov 18 06:03:58 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8BAA1B2DBB for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:03:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lnBHrH3EJAGn for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:03:54 -0800 (PST)
Received: from mail1.bemta3.messagelabs.com (mail1.bemta3.messagelabs.com [195.245.230.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59C4E1B2D9C for <sfc@ietf.org>; Wed, 18 Nov 2015 06:03:52 -0800 (PST)
Received: from [85.158.138.179] by server-12.bemta-3.messagelabs.com id E6/A1-14900-5458C465; Wed, 18 Nov 2015 14:03:49 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-7.tower-169.messagelabs.com!1447855428!5100135!1
X-Originating-IP: [195.232.244.136]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15520 invoked from network); 18 Nov 2015 14:03:48 -0000
Received: from mailout04.vodafone.com (HELO mailout04.vodafone.com) (195.232.244.136) by server-7.tower-169.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP;  18 Nov 2015 14:03:48 -0000
Received: from mailint01.vodafone.com (mailint01.vodafone.com [195.232.244.198]) by mailout04.vodafone.com (Postfix) with ESMTP id 3p15Tb5jTwznTZC; Wed, 18 Nov 2015 15:03:47 +0100 (CET)
Received: from mailint01.vodafone.com (localhost [127.0.0.1]) by mailint01.vodafone.com (Postfix) with ESMTP id 3p15Tb4XrfzxPtq; Wed, 18 Nov 2015 15:03:47 +0100 (CET)
Received: from VOEXC01W.internal.vodafone.com (voexc01w.dc-ratingen.de [145.230.101.21]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint01.vodafone.com (Postfix) with ESMTPS id 3p15Tb442PzxRHQ; Wed, 18 Nov 2015 15:03:47 +0100 (CET)
Received: from AVOEXH03W.internal.vodafone.com (145.230.15.141) by VOEXC01W.internal.vodafone.com (145.230.101.21) with Microsoft SMTP Server (TLS) id 14.3.224.2; Wed, 18 Nov 2015 15:03:46 +0100
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by AVOEXH03W.internal.vodafone.com ([145.230.15.141]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 15:03:45 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYkZVTjntybIUigJGvi7m2/t54/Q+uAgAE4bQCAAD5zgIAtWD4AgDJ0eYCAAAQNgIAAA+EAgAAA+ACAAVwBgIAAKfuw
Date: Wed, 18 Nov 2015 14:03:45 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com>
In-Reply-To: <124FC034-8627-4976-846F-15136797DD48@cisco.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/s7rjbkQmT_DSAKhbFUeS5I2JqDo>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 14:03:57 -0000

SEkgQ2FybG9zLCBkZWFyIGFsbCwNCg0KTWF5YmUgaXQgaXMgdGhlIG5hbWluZyBhbmQgdGhlIGV4
dHJlbWUgZ2VuZXJhbGl6YXRpb24gaW4gc29tZSBJRHMgd2hpY2ggcmVvcGVuZWQgdGhlIGRpc2N1
c3Npb24uDQoNCk15IGN1cnJlbnQgKG9idmlvdXMpIHBpY3R1cmUgaXM6DQoNCjEuKSBBIHNlcnZp
Y2UgZGVzY3JpYmVkIGJ5IHdoYXQgd2UgY2FsbCBwb2xpY2llcyBtYXkgcmVzdWx0IGluIGEgZ3Jh
cGggKFNGRykgYW5kIGJyYW5jaGluZyBjb25kaXRpb25zLg0KDQoyLikgQWxsb3dlZCBzZXJ2aWNl
IGNoYWlucyBhcmUgd2Fsa3MgdGhyb3VnaCB0aGF0IGdyYXBoIGZ1bGZpbGxpbmcgdGhlIHBvbGlj
eSBydWxlcy4gU0ZHIC0+IFNGQyA9IDE6bi4NCg0KMy4pIEEgdG9wb2xvZ2ljYWwgKGluIHRoZSBz
ZW5zZSBvZiBhYnN0cmFjdCkgU0ZDIG1heSBiZSBtYXBwZWQgb250byBhIHNldCBvZiBTRlBzLiBT
RkMgLT4gU0ZQID0gMTptLg0KDQo0LikgVGhlIFNGUHMgbWF5ICBzdGlsbCBpbmNsdWRlIHNvbWUg
ZGVncmVlcyBvZiBmcmVlZG9tIChyb3V0aW5nIHRvIGRpZmZlcmVudCBpbnN0YW5jZXMgb2YgU0Zz
IGV0YykuDQoNCjUuKSBUaGVyZWZvcmUgdGhlIG5vdGlvbiBvZiBhIHJlbmRlcmVkIHBhdGggKFIt
U0ZQIG9yIFJTUCkgd2hpY2ggaXMgdGhlIGZpbmFsIHVuaXF1ZSBwYXRoIGZvciBhIGNlcnRhaW4g
Zmxvdy4gU0ZQIC0+IFJTUCA9IDE6cg0KDQpJbiB0aGlzIHBpY3R1cmUgdGhlIFNGUCBkZWZpbml0
aW9uIGlzIHNvbWV0aGluZyBpbiBiZXR3ZWVuIGEgU0ZDIGFuZCB0aGUgZXZlbnR1YWwgcmVuZGVy
ZWQgcGF0aC4gDQoNCklmIGFib3ZlICh0cml2aWFsKSAgaW50ZXJwcmV0YXRpb24gaXMgY29ycmVj
dCBJIGNvdWxkIGFyZ3VlIHRoYXQgZnJvbSB0aGUgbG9naWNhbCBwb2ludCBvZiB2aWV3IEkgY291
bGQgdXNlIHRoZSBtYXBwaW5ncw0KDQoxLikgU0ZDIC0+IFNGUCAtPiBSU1Agb3IgDQoyLikgU0ZD
IC0+IFJTUCBkaXJlY3RseS4NCg0KVG8gbWUgdGhlIHJlYWwgdmFsdWUgb2YgdGhlIGludGVybWVk
aWF0ZSBTRlAgaXMgbm90IG9idmlvdXMgZnJvbSB0aGUgbG9naWNhbCBwb2ludCBvZiB2aWV3LiBG
b3Igc3VyZSBpdCBtYXkgaGVscCBpbiB0aGUgaW1wbGVtZW50YXRpb24gb2YgYW4gYWJzdHJhY3Rp
b24gYnJlYWtkb3duLg0KRG8gSSBtaXNzIHNvbWV0aGluZz8gVGhlIHF1ZXN0aW9uIFNGUC1JRCBv
ciAgUlNQLUlEIHNlZW1zIHRvIGJlIGFsc28gYWRkcmVzc2VkIHRvIHRoZSBXRyBhdCB0aGUgZW5k
IG9mIHRoZSBOU0ggZHJhZnQuDQoNCklmIEkgd291bGQgdXNlIFNGUCBpbnN0ZWFkIG9mIFJTUCAg
aW4gdGhlIE5TSCBhbmQgU0ZGIEZXIHRhYmxlcyB0aGVyZSBtYXkgYmUgcmVtYWluaW5nIGFtYmln
dWl0aWVzIGluIHNlbGVjdGluZyB0aGUgUlNQLg0KSW4gdGhpcyBjYXNlIEkgZXZlbiBjb3VsZCAg
dXNlIGEgU0ZDLUlEICBpbiBOU0ggYW5kIGFzc3VtZSB0aGUgU0ZGIGhhcyBhbGwgdGhlIGludGVs
bGlnZW5jZSB0byByZXNvbHZlIHRoZSBwYXRoIGFtYmlndWl0aWVzLg0KDQpGb3Igc3VyZSB5b3Ug
Y291bGQgY29uc3RydWN0IGFueXRoaW5nIGluIGJldHdlZW4uIEJ1dCB0aGlzIGlzIHByb2JhYmx5
IHRoZSBvcmlnaW4gb2YgdGhlIHJlbmV3ZWQgZGlzY3Vzc2lvbi4gSW4gdGhhdCBsaWdodCBhbmQg
YWNjZXB0aW5nIHdlIGFyZSBvcmJpdGluZyAgSSBzdXBwb3J0IE1lZCdzIGF0dGVtcHQgdG8gY2xh
cmlmeSB0aGVzZSB0b3BpY3MuDQoNCkJlc3QgcmVnYXJkcywNCldhbHRlcg0KDQoNCiANCg0KLS0t
LS1VcnNwcsO8bmdsaWNoZSBOYWNocmljaHQtLS0tLQ0KVm9uOiBzZmMgW21haWx0bzpzZmMtYm91
bmNlc0BpZXRmLm9yZ10gSW0gQXVmdHJhZyB2b24gQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEp
DQpHZXNlbmRldDogTWl0dHdvY2gsIDE4LiBOb3ZlbWJlciAyMDE1IDExOjUyDQpBbjogSm9lbCBI
YWxwZXJuDQpDYzogc2ZjIGlzc3VlIHRyYWNrZXI7IHNmY0BpZXRmLm9yZzsgUGF1bCBRdWlubiAo
cGF1bHEpOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOyBKb2Vs
IE0uIEhhbHBlcm47IE1lZCBCb3VjYWRhaXINCkJldHJlZmY6IFJlOiBbc2ZjXSAjMTUgKGNvbnRy
b2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVzIG9uIFNGQyBJRHMs
IFNGUCBJRHMsIGV0Yy4NCg0KSSBhbSBhIGJpdCBiYWZmbGVkIHRvIHNlZSB0aGlzIHRocmVhZCBh
Z2FpbiDigJQgaXQgYXBwZWFycyB0aGUgZGlzY3Vzc2lvbiByZXN0YXJ0ZWQgdG8gY29udGludWUg
aW4gY2lyY2xlcy4NCg0KTWVkLA0KDQpJIHRvbyBhZ3JlZSB3aXRoIEpvZWwgYW5kIHN0cm9uZ2x5
IGJlbGlldmUgdGhlcmUgaXMgbm8gbmVlZCBmb3IgU0ZDIGlkZW50aWZpY2F0aW9uIHBhc3NlZCBk
b3duIOKAlCB0aGVyZSBpcyBubyBwcm92aXNpb25pbmcgb2YgU0ZDcyBzb3V0aGJvdW5kLg0KDQoo
QWxtb3N0KSBldmVyeSBpbnN0YW5jZSBvZiDigJxTRkPigJ0gaW4gdGhlIGNvbnRyb2wtcGxhbmUg
cmVxdWlyZW1lbnRzIGRyYWZ0IHNob3VsZCByZWFsbHkgc2F5IOKAnFNGUOKAnS4gVGhlcmUgaXMg
bm8gdXNlIG9mIHRhbGtpbmcgYWJvdXQgU0ZDcyB0b3dhcmRzIHRoZSBkYXRhIHBsYW5lLiBUaGUg
cmVsYXRpb25zaGlwIGJldHdlZW4gY2hhaW5zIGFuZCBwYXRocyBpcyBhIHBvbGljeSBtYXR0ZXIg
d2hpY2ggYmVsb25ncyBpbiB0aGUgcG9saWN5L2NvbnRyb2wgaXRzZWxmLCBidXQgbm90IG91dCBv
ZiB0aGVyZS4NCg0KVGhpcyBpcyBubyBkaWZmZXJlbnQgdGhhbiB3aGF0IEkgc2FpZCBhIGZldyBt
b250aHMgYWdvIG9uIHRoZSBzYW1lIHRvcGljLg0KDQpUaGFua3MsDQoNCuKAlCBDYXJsb3MuDQoN
Cj4gT24gTm92IDE3LCAyMDE1LCBhdCA5OjA2IEFNLCBKb2VsIEhhbHBlcm4gPGpvZWwuaGFscGVy
bkBlcmljc3Nvbi5jb20+IHdyb3RlOg0KPiANCj4gV2hhdCBpcyBwcm92aXNpb25lZCBpbnRvIHRo
ZSBTRkYgcmVmbGVjdHMgdGhlIFNGUC4gIFRoZSBjb250cm9sIHN5c3RlbSBkZWNpZGVzIHdoZXRo
ZXIgdGhhdCBTRlAgaW5kaWNhdGVzIHRoZSBzYW1lIHNldCBvZiBhbGwgcG9zc2libGUgY2hvaWNl
cyB0aGF0IHRoZSBTRkMgZG9lcywgb3IgaXMgYSBwcm9wZXIgc3Vic2V0Lg0KPiANCj4gSW4gb3Jk
ZXIgdG8gYWxsb3cgZm9yIGFuIFNGUCB0aGF0IHJlZmxlY3RzIG1lYW5pbmdmdWwgY29uc3RyYWlu
dHMsIHdoYXQgaXMgcHJvdmlzaW9uZWQgaGFzIHRvIGJlIHRoZSBTRlAuDQo+IE5vIHNwZWNpYWwg
cHJvdmlzaW9uIGlzIG5lZWRlZCBmb3IgdGhlIGNhc2Ugd2hlcmUgdGhlIFNGUCBpcyBpc29tb3Jw
aGljIHRvIHRoZSBTRkMuIEluIHN1Y2ggYSBjYXNlLCB5b3Ugc3RpbGwgcHJvdmlzaW9uIHRoZSBT
RlAuICBBbmQgdGhlIHJlc3VsdCBpcyBhbiBTRlAgd2l0aCBhcyBtdWNoIGZsZXhpYmlsaXR5IGFz
IHRoZSBTRkMuDQo+IA0KPiBJZiwgaW4gY29udHJhc3QsIHlvdSBkZWNsYXJlIHRoYXQgdGhlIHBy
b3Zpc2lvbmluZyBpbmNsdWRlcyB0aGUgU0ZDIHRoZW4geW91IGFyZSBpbnRyb2R1Y2luZyBleHRy
YSBjb21wbGV4aXR5IHdpdGhvdXQgYWRkaW5nIGFueSBuZXcgY2FzZXMgdGhhdCBjYW4gYmUgaGFu
ZGxlZC4NCj4gDQo+IFlvdXJzLA0KPiBKb2VsDQo+IA0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2Ut
LS0tLQ0KPiBGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tIA0KPiBbbWFpbHRvOm1v
aGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb21dDQo+IFNlbnQ6IFR1ZXNkYXksIE5vdmVtYmVyIDE3
LCAyMDE1IDk6MDMgQU0NCj4gVG86IEpvZWwgSGFscGVybjsgUGF1bCBRdWlubiAocGF1bHEpDQo+
IENjOiBzZmMgaXNzdWUgdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29s
cy5pZXRmLm9yZzsgDQo+IHNmY0BpZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuDQo+IFN1YmplY3Q6
IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5l
IG9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4gDQo+IEhpIEpvZWwsDQo+IA0K
PiBQbGVhc2Ugc2VlIGlubGluZS4NCj4gDQo+IENoZWVycywNCj4gTWVkDQo+IA0KPj4gLS0tLS1N
ZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+PiBEZSA6IEpvZWwgSGFscGVybiBbbWFpbHRvOmpvZWwu
aGFscGVybkBlcmljc3Nvbi5jb21dDQo+PiBFbnZvecOpIDogbWFyZGkgMTcgbm92ZW1icmUgMjAx
NSAxNDo0OSDDgCA6IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE47IA0KPj4gUGF1bCBRdWlubiAo
cGF1bHEpIENjIDogc2ZjIGlzc3VlIHRyYWNrZXI7IA0KPj4gZHJhZnQtaWV0Zi1zZmMtY29udHJv
bC1wbGFuZUB0b29scy5pZXRmLm9yZzsNCj4+IHNmY0BpZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJu
DQo+PiBPYmpldCA6IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBj
b250cm9sIHBsYW5lIA0KPj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4g
DQo+PiBZb3VyIHN0YXRlbWVudCB0aGF0ICIgSXQgaGFwcGVucyB0aGF0IGluZm9ybWF0aW9uIGlz
IG5vIG1vcmUgdGhhbiB0aGUgDQo+PiBzZXJ2aWNlIGNoYWluIGl0c2VsZiAod2l0aG91dCBhbnkg
Y29uc3RyYWludHMpLiIgKFdoZXJlICJpdCIgcmVmZXJzIHRvICINCj4+IHRoZSBleGFjdCBzZXF1
ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJlYWxpemUgdGhlIFNGQyIuKSBEb2VzIG5vdCAN
Cj4+IG1ha2Ugc2Vuc2UgdG8gbWUuDQo+IA0KPiBbTWVkXSBSRkMgNzY2NSBzYXlzOg0KPiANCj4g
IiAgIFRodXMsIHRoZSBwb2xpY2llcyBhbmQgbG9naWMgb2YgU0ZQIHNlbGVjdGlvbiBvciBjcmVh
dGlvbiAoZGVwZW5kaW5nDQo+ICAgdXBvbiB0aGUgc29sdXRpb24pIHByb2R1Y2Ugd2hhdCBtYXkg
YmUgdGhvdWdodCBvZiBhcyBhIGNvbnN0cmFpbmVkDQo+ICAgdmVyc2lvbiBvZiB0aGUgb3JpZ2lu
YWwgU0ZDLiAiDQo+IA0KPiBpbiBzaG9ydDogU0ZQIGlzIGRlZmluZWQgYXMgYSBjb25zdHJhaW5l
ZCB2ZXJzaW9uIG9mIHRoZSBvcmlnaW5hbCBTRkMuDQo+IA0KPiBXaGF0IGlzIHRoZSBuYW1lIHRv
IHVzZSB0byByZWZlciB0byBhICJub24tY29uc3RyYWluZWQiIFNGQyBvciB0byB0aGUgaW5mb3Jt
YXRpb24gdGhhdCB5b3Ugd2lsbCBwcm92aXNpb24gdG8gYW4gU0ZGIHdoZW4gdGhlIHBhdGggY29t
cHV0YXRpb24gYW5kIHNlbGVjdGlvbiBkZWNpc2lvbiBpcyAiZGVmZXJyZWQgdG8gdGhlIFNGRiI/
DQo+IA0KPiBJdCBkb2VzIG5vdCBtYWtlIHNlbnNlIHRvIGNhbGwgYSBub24tY29uc3RyYWluZWQg
dmVyc2lvbiBvZiB0aGUgU0ZDIGFzIFNGUCBnaXZlbiB0aGF0IFJGQzc2NjUgZXhwbGljaXRseSBk
ZWZpbmVzIFNGUCBhcyAiY29uc3RyYWluZWQgdmVyc2lvbiBvZiB0aGUgb3JpZ2luYWwgU0ZDIiEN
Cj4gDQo+IFRoZSBTRkMgaXMgdGhlIGdlbmVyYWwgZGVzY3JpcHRpb24gb2YgdGhlIG9iamVjdGl2
ZS4gIFRoYXQNCj4+IGlzIG5vdCB0aGUgc2FtZSBhcyB0aGUgZXhhY3Qgc2VxdWVuY2Ugb2YgcGxh
Y2VzIHRoYXQgbXVzdCBiZSB2aXNpdGVkLg0KPj4gDQo+PiBJIHN0YW5kIGJ5IG15IGVhcmxpZXIg
Y29tbWVudHMgdGhhdCBhbG1vc3QgYWxsIHVzZXMgb2YgU0ZDIGluIHRoZSANCj4+IGNvbnRyb2wg
cmVxdWlyZW1lbnRzIGRyYWZ0IHNob3VsZCBiZSBTRlAuDQo+PiANCj4gDQo+IFtNZWRdIEkgbm90
ZWQgdGhhdCBKb2VsLi4gdGhhdCdzIGZhaXIgYnV0IHRoaXMgcG9zaXRpb24gaXMgSU1ITyBub3Qg
YWxpZ25lZCB3aXRoIFJGQzc2NjUgdGhhdCBhbGxvd3MgdG8gY29udHJvbCBhbnkgdmFyaWF0aW9u
IGZyb20gYSBub24tY29uc3RyYWluZWQgU0ZDIHRvIGEgZnVsbHkgY29uc3RyYWluZWQgU0ZDLg0K
PiANCj4+IFlvdXJzLA0KPj4gSm9lbA0KPj4gDQo+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0t
LQ0KPj4gRnJvbTogbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbQ0KPj4gW21haWx0bzptb2hh
bWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tXQ0KPj4gU2VudDogVHVlc2RheSwgTm92ZW1iZXIgMTcs
IDIwMTUgODozNCBBTQ0KPj4gVG86IFBhdWwgUXVpbm4gKHBhdWxxKQ0KPj4gQ2M6IHNmYyBpc3N1
ZSB0cmFja2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOw0K
Pj4gc2ZjQGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4+IFN1YmplY3Q6IFJFOiBbc2ZjXSAj
MTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIA0KPj4gb3BlcmF0
ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gDQo+PiBIaSBQYXVsLA0KPj4gDQo+PiBU
aGFuayB5b3UgZm9yIHNoYXJpbmcgeW91ciBmZWVkYmFjay4NCj4+IA0KPj4gUkZDNzY2NSBzYXlz
IHRoZSBmb2xsb3dpbmc6DQo+PiANCj4+ICINCj4+IFRoaXMgYXJjaGl0ZWN0dXJlIGRvZXMgbm90
IG1hbmRhdGUgdGhlIGRlZ3JlZSBvZg0KPj4gICBzcGVjaWZpY2l0eSBvZiB0aGUgU0ZQLiAgQXJj
aGl0ZWN0dXJhbGx5LCB3aXRoaW4gdGhlIHNhbWUgU0ZDLWVuYWJsZWQNCj4+ICAgZG9tYWluLCBz
b21lIFNGUHMgbWF5IGJlIGZ1bGx5IHNwZWNpZmllZCwgc2VsZWN0aW5nIGV4YWN0bHkgd2hpY2gg
U0ZGDQo+PiAgIGFuZCB3aGljaCBTRiBhcmUgdG8gYmUgdmlzaXRlZCBieSBwYWNrZXRzIHVzaW5n
IHRoYXQgU0ZQLCB3aGlsZSBvdGhlcg0KPj4gICBTRlBzIG1heSBiZSBxdWl0ZSB2YWd1ZSwgZGVm
ZXJyaW5nIHRvIHRoZSBTRkYgdGhlIGRlY2lzaW9ucyBhYm91dCB0aGUNCj4+ICAgZXhhY3Qgc2Vx
dWVuY2Ugb2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFsaXplIHRoZSBTRkMuICBUaGUNCj4+ICAg
c3BlY2lmaWNpdHkgbWF5IGJlIGFueXdoZXJlIGluIGJldHdlZW4gdGhlc2UgZXh0cmVtZXMuDQo+
PiAiDQo+PiANCj4+IFRoZSBjb250cm9sIGRyYWZ0IGlzIGNvbXBsZXRlbHkgYWxpZ25lZCB3aXRo
IHRoYXQgYXBwcm9hY2guDQo+PiANCj4+IFRoZSBjb250cm9sLXBsYW5lIGRvY3VtZW50IGFsbG93
cyBpbiBwYXJ0aWN1bGFyIHRvIHByb3Zpc2lvbiByZXF1aXJlZCANCj4+IGluZm9ybWF0aW9uIHdo
ZW4gImRlZmVycmluZyB0byB0aGUgU0ZGIHRoZSBkZWNpc2lvbnMgYWJvdXQgdGhlDQo+PiAgIGV4
YWN0IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDIi4gSXQg
aGFwcGVucyANCj4+IHRoYXQgaW5mb3JtYXRpb24gaXMgbm8gbW9yZSB0aGFuIHRoZSBzZXJ2aWNl
IGNoYWluIGl0c2VsZiAod2l0aG91dCANCj4+IGFueSBjb25zdHJhaW50cykuDQo+PiANCj4+IEFs
c28sIHRoZSBjdXJyZW50IGNvbnRyb2wtcGxhbmUgZG9jdW1lbnQgYWxsb3dzIHRvIGluc3RydWN0
IGEgbG9vc2UgDQo+PiBwYXRoDQo+PiAoU0ZQKSBvciBhIHN0cmljdCBwYXRoIChSU1ApLCBldGMu
DQo+PiANCj4+IEkgZnVsbHkgYWdyZWUgdGhhdCB3aGV0aGVyIGEgZnVsbCBwYXRoIGlzIHNwZWNp
ZmllZCB3aXRoaW4gYSBkb21haW4gDQo+PiBvciBpZiBpdCBpcyBkZWZlcnJlZCB0byBTRkZzIGlz
IHJlYWxseSBkZXBsb3ltZW50LXNwZWNpZmljLiANCj4+IE5ldmVydGhlbGVzcywgdGhlIGNvbnRy
b2wgcGxhbiBzaG91bGQgYWNjb21tb2RhdGUgYWxsIHRoZXNlIGZsYXZvcnMuDQo+PiANCj4+IENo
ZWVycywNCj4+IE1lZA0KPj4gDQo+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+Pj4g
RGUgOiBQYXVsIFF1aW5uIChwYXVscSkgW21haWx0bzpwYXVscUBjaXNjby5jb21dIEVudm95w6kg
OiB2ZW5kcmVkaQ0KPj4+IDE2IG9jdG9icmUgMjAxNSAxNDowNCDDgCA6IEpvZWwgTS4gSGFscGVy
biBDYyA6IEJPVUNBREFJUiBNb2hhbWVkIA0KPj4+IElNVC9PTE47IHNmYyBpc3N1ZSB0cmFja2Vy
OyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLSANCj4+PiBwbGFuZUB0b29scy5pZXRmLm9yZzsgc2Zj
QGlldGYub3JnIE9iamV0IDogUmU6IFtzZmNdICMxNQ0KPj4+IChjb250cm9sLXBsYW5lKTogV2hl
dGhlciB0aGUgY29udHJvbCBwbGFuZSBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMu
DQo+Pj4gDQo+Pj4gSm9lbCwNCj4+PiANCj4+PiBJIGNvbmN1ci4NCj4+PiANCj4+PiBUaGUgZGF0
YSBwbGFuZSBkZWFsIHdpdGggcGF0aHMsIG5vdCBjaGFpbnMuICBUaGUgcmVsYXRpb25zaGlwIG9m
IA0KPj4+IHBhdGhzIHRvIGNoYWlucyBmYWxscyBzcXVhcmVseSBpbiB0aGUgY29udHJvbCBwbGFu
ZSAob3IgZXZlbiBtb3JlIA0KPj4+IGxpa2VseQ0KPj4gInBvbGljeSINCj4+PiBwbGFuZSkgcmVh
bG0uICBUaGUgc3BlY2lmaWNpdHkgb2YgdGhlIHBhdGggaXMgbGVmdCB0byANCj4+PiBpbXBsZW1l
bnRhdGlvbiwgaW4gdGhlIGFyY2hpdGVjdHVyZSBkcmFmdCwgYnV0IHRoYXQncyBjb25zaXN0ZW50
IA0KPj4+IHdpdGggeW91ciBwb3NpdGlvbiBhbmQgcHJvdmlkZXMgdGhlIHJlcXVpc2l0ZSBmdW5j
dGlvbmFsaXR5Lg0KPj4+IA0KPj4+IFBhdWwNCj4+PiANCj4+Pj4gT24gU2VwIDE3LCAyMDE1LCBh
dCAxMTozNiBBTSwgSm9lbCBNLiBIYWxwZXJuIDxqbWhAam9lbGhhbHBlcm4uY29tPg0KPj4+IHdy
b3RlOg0KPj4+PiANCj4+Pj4gQXMgZmFyIGFzIEkgY2FuIHRlbGwsIHRoZXJlIGlzIG5vdGhpbmcg
aW4gdGhlIFNlcnZpY2UgQ2hhaW5pbmcgd29yayANCj4+Pj4gdGhhdA0KPj4+IHJlcXVpcmVzIGNv
cnJlbGF0aW5nIHNlcnZpY2UgcGF0aCBJRHMgd2l0aCBzZXJ2aWNlIGNoYWluIElEcyB3aXRoaW4g
DQo+Pj4gdGhlIGRhdGEgcGxhbmUuICBBbnkgc3VjaCByZWxhdGlvbnNoaXAgZXhpc3RzIGVudGly
ZWx5IHdpdGhpbiB0aGUgDQo+Pj4gY29udHJvbCBwbGFuZSBvciBhYm92ZSwgYW5kIHdvdWxkIGJl
IGRyaXZlbiBieSByZXF1aXJlbWVudHMgb3RoZXIgDQo+Pj4gdGhhbiB0aGUgZGF0YSBwbGFuZS4g
IFdoZW4gSSBsb29rIGF0IHRoaXMgZG9jdW1lbnQsIGFsbCBvZiB0aGUgDQo+Pj4gcmVxdWlyZW1l
bnRzIHRoYXQgdGFsayBhYm91dCBzZXJ2aWNlIGZ1bmN0aW9uIGNoYWluIElEcyBjYW4gYmUgDQo+
Pj4gYWNjdXJhdGVseSBjYXB0dXJlZCwgaW4gdGVybXMgb2YgZGF0YSBwbGFuZSByZXF1aXJlbWVu
dHMsIGJ5IHNlcnZpY2UgZnVuY3Rpb24gcGF0aCBJRHMuDQo+Pj4gVGh1cywgdGhlIHJlcXVpcmVt
ZW50IHRoYXQgdGhlIGRhdGEgcGxhbmUgaGFzIGlzIHRvIHNlZSBzdWNoIHBhdGggSURzLg0KPj4+
IFllcywgaW4gc29tZSBkZXBsb3ltZW50cyB0aG9zZSB3aWxsIGJlIDEtMSB3aXRoIGNoYWluIElE
cy4gIFRoZXkgYXJlDQo+PiBzdGlsbCBwYXRoIElEcy4NCj4+Pj4gDQo+Pj4+IEludHJvZHVjaW5n
IGEgcmVxdWlyZW1lbnQgZm9yIHRoZSBkYXRhIHBsYW5lIHRvIHNlZSBhbmQgd29yayB3aXRoIA0K
Pj4+PiBjaGFpbg0KPj4+IElEcyBpcyBub3QgZ3JvdW5kZWQgaW4gdGhlIHdvcmsgb2YgdGhlIGdy
b3VwLg0KPj4+PiANCj4+Pj4gWW91cnMsDQo+Pj4+IEpvZWwgTS4gSGFscGVybg0KPj4+PiANCj4+
Pj4gT24gOS8xNy8xNSA3OjUzIEFNLCBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tIHdyb3Rl
Og0KPj4+Pj4gUmUtLA0KPj4+Pj4gDQo+Pj4+PiBUaGUgY29udHJvbCBkcmFmdCBhcyBpdCBzdGFu
ZHMgaXMgY29tcGxpYW50IHdpdGggdGhlIGRhdGEgcGxhbmUNCj4+PiBhcmNoaXRlY3R1cmUgZG9j
dW1lbnQuDQo+Pj4+PiANCj4+Pj4+IEluZGVlZCwgdGhlIGFyY2ggZHJhZnQgYWNrbm93bGVkZ2Vz
IHRoZSBmb2xsb3dpbmc6DQo+Pj4+PiAoMSkgU0ZQcyBhcmUgImFzc29jaWF0ZWQgd2l0aCBhIGdp
dmVuIFNGQyIuDQo+Pj4+PiAoMikgU0ZQcyBhcmUgcHJlc2VudGVkIGFzIGEgZm9ybSBvZiBjb25z
dHJhaW5lZCBTRkNzLg0KPj4+Pj4gKDMpIFNvbWUgZGVwbG95bWVudHMgbWF5IG5vdCBpbXBvc2Ug
YW55IGNvbnN0cmFpbnQgb24gdGhlIGFic3RyYWN0DQo+PiBTRkMNCj4gDQo+IF9fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+IHNmYyBtYWlsaW5nIGxpc3QN
Cj4gc2ZjQGlldGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8v
c2ZjDQoNCg==


From nobody Wed Nov 18 06:34:48 2015
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E5011B2E62 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:34:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 66ltxDKMXA1F for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:34:43 -0800 (PST)
Received: from mail-wm0-x22b.google.com (mail-wm0-x22b.google.com [IPv6:2a00:1450:400c:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13B921B2E59 for <sfc@ietf.org>; Wed, 18 Nov 2015 06:34:43 -0800 (PST)
Received: by wmww144 with SMTP id w144so199736227wmw.1 for <sfc@ietf.org>; Wed, 18 Nov 2015 06:34:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=fPPPc9OC2cpIurJ1BU2uaHhRMLTCfKNtjLE/1eOLsj4=; b=fVLfX2Sub4fI5hSWKrdOyCD7nbh0NmJmHgbEhys8ousCw15CA1LLGSYvn9G3bAYpeG zxA3JmrXEtfNcNk3gENBAZLpNpbU6LpaiwtCVt5vDiEmwBvzSbPu57zmHyF2F5oVckXi BPJAEcw3sZFmrg5A+ilgw6AarQDxC+OvRvVPvNaTgFIrUE5pKSbL4Aj/wGgFquaZd6pj P8zL2DN3rfxpTjFfJejI4T1vWO4ARyEkz991Rw2xL34YhyEGibqgMqVNQq/laILuavuC XX9/FdOieCOVAoHlDwQFEWfdw/zV/TPE0ygkzCyop8Pi4/vemwGV7SuFKXAi5TbjZBSV S2YA==
X-Received: by 10.194.109.2 with SMTP id ho2mr2722252wjb.40.1447857281376; Wed, 18 Nov 2015 06:34:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.148.208 with HTTP; Wed, 18 Nov 2015 06:34:21 -0800 (PST)
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 18 Nov 2015 09:34:21 -0500
Message-ID: <CAA=duU0mWn0noU7rF4RFiJhnLSBY4csF15v81QxEWFQp4-pVrw@mail.gmail.com>
To: "BOUCADAIR Mohamed IMT/OLN" <mohamed.boucadair@orange.com>
Content-Type: multipart/alternative; boundary=089e010d84e8f127550524d18a68
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/iOoBZmKhBQAhqJe-mii4Wdhj9Lw>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Linda Dunbar \(linda.dunbar@huawei.com\)" <linda.dunbar@huawei.com>
Subject: Re: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 14:34:46 -0000

--089e010d84e8f127550524d18a68
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I=E2=80=99m perhaps biased :-), but I agree with Med.

Cheers,
Andy


On Wed, Nov 18, 2015 at 3:38 AM, <mohamed.boucadair@orange.com> wrote:

> Dear WG,
>
> Unless I'm mistaken, We didn't receive any feedback about this discussion
> point.
>
> IMO, RSP-related considerations are worth to be discussed in the core tex=
t.
>
> Cheers,
> Med
>
> > -----Message d'origine-----
> > De : sfc issue tracker [mailto:trac+sfc@tools.ietf.org]
> > Envoy=C3=A9 : vendredi 18 septembre 2015 08:08
> > =C3=80 : draft-ietf-sfc-control-plane@tools.ietf.org; BOUCADAIR Mohamed
> IMT/OLN
> > Cc : sfc@ietf.org
> > Objet : [sfc] #16 (control-plane): RSP-related Considerations (L.
> > Dunbar/A. Malis)
> >
> > #16: RSP-related Considerations (L.  Dunbar/A.  Malis)
> >
> >  Discuss what to do with this appendix.
> >
> >  =3D=3D
> >  Appendix A.  RSP-related Considerations
> >
> >     NOTE: This section records some contributions proposed by L.  Dunba=
r
> >     and A.  Malis, but have not been discussed yet among authors.
> >
> >  A.1.  Encoding the Exact SFF-SF-sequence in Data Packets
> >
> >     Encoding the exact RSP in every packet has the benefit and the issu=
es
> >     associated with source routing.  This approach may not be optimal
> >     when the SFP doesn't change very frequently, as in minutes or hours=
.
> >
> >     There are contexts that it might not be feasible for the head end
> >     Classifier to be notified of the changes of SFF-sequence or SFF-SF-
> >     Sequence for a given SFP because of the time taken for the
> >     notification and the limited capability of the Classifier nodes.
> >
> >  A.2.  Fully Controlled SFF-SF-Sequence for a SFP
> >
> >     This section describes the information that can be exchanged over C=
2
> >     interface (Section 3.3.2) when the SFC Control Element explicitly
> >     passes the steering policies to all SFFs for the SFF-SF-Sequence of=
 a
> >     given SFC.  In this model, each SFF doesn't need to signal other SF=
Fs
> >     for the SFP.
> >
> >     Suppose the SFC ID for this SFP is "yellow", an example of policy t=
o
> >     "sff-a" is depicted in Figure 2 (for illustration proposes)
> >
> >                Matching                     |       Action
> >     ----------------------------------------+-------------------------
> >     SFC ID =3D "yellow" & ingress =3D sffx-port | next-hop: "sf2" & VID
> >     SFC ID =3D "yellow" & ingress =3D sf2-port  | next-hop: "sf3" & VID
> >     SFC ID =3D "yellow" & ingress =3D sf3-port  | next-hop: sff-b
> >
> >          Figure 2: Example of Traffic Steering Policy to a SFF node
> >
> >     The SFF nodes may not be directly adjacent to each other.  They can
> >     be interconnected by tunnels, such as GRE, VxLAN, etc.  SFs are
> >     attached to a SFF node or SFC Proxy node via Ethernet link or other
> >     link types.  Therefore, the steering policies to a SFF node for
> >     service function chain depends on if the packet comes from previous
> >     SFF or comes from a specific SF, i.e., the SFC Forwarding Policy
> >     Table entries have to be ingress port specific.  There are multiple
> >     different steering policies for one flow within one SFF and each se=
t
> >     of steering policies is specific for an ingress port.
> >
> >     The semantics of traffic steering rules can be "Match" and "Action"=
,
> >     similar to the "route" described in [I-D.ietf-i2rs-rib-info-model].
> >     The "match" and "action" for distinct ports can be different.  The
> >     matching criteria for SFF can be more sophisticated.  For example,
> >     the matching criteria could be any fields in the data packets:
> >
> >     o  Ingress port
> >     o  Destination MAC address
> >     o  Source MAC address
> >     o  VLAN_id,
> >     o  Destination IP address
> >     o  Source IP address
> >     o  Source port number
> >     o  Destination port number
> >     o  DSCP
> >     o  Packet size, etc., or any combination thereof.
> >
> >     A SFF node may not support some of the matching criteria listed
> >     above.  It is important that SFC control plane can retrieve the
> >     supported matching criteria by SFF nodes.  The "Actions" for traffi=
c
> >     steering could be to steer traffic to the attached service function
> >     or SF instantiations via a specific port.
> >
> >     The "Actions" to SFC Proxy may include a method to map the SFC
> >     Identifier carried in the packet header to a locally significant li=
nk
> >     identifier, e.g., VLAN-ID, and a method to construct and encapsulat=
e
> >     the SFC header back to the packets when they come back from the
> >     attached SFs.
> >
> >     This approach does not require using an end-to-end signaling protoc=
ol
> >     among Classier nodes and SFF nodes.  However, there may be problems
> >     encountered if SFF nodes are not updated in the proper order or not
> >     at the same time.  For example, if the SFF "A" and SFF "C" get flow
> >     steering policies at slightly different times, some packets might n=
ot
> >     be directed to some service functions on a chain.
> >  =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> >
> > --
> >
> -------------------------------------+-----------------------------------=
-
> > -
> >  Reporter:                           |      Owner:  draft-ietf-sfc-
> > control-
> >   mohamed.boucadair@orange.com       |  plane@tools.ietf.org
> >      Type:  defect                   |     Status:  new
> >  Priority:  major                    |  Milestone:
> > Component:  control-plane            |    Version:
> >  Severity:  -                        |   Keywords:
> >
> -------------------------------------+-----------------------------------=
-
> > -
> >
> > Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/16>
> > sfc <http://tools.ietf.org/sfc/>
>
>

--089e010d84e8f127550524d18a68
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I=E2=80=99m perhaps biased :-), but I agree with Med.=C2=
=A0<div><div><br></div><div>Cheers,</div><div>Andy</div><div><br></div></di=
v></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, N=
ov 18, 2015 at 3:38 AM,  <span dir=3D"ltr">&lt;<a href=3D"mailto:mohamed.bo=
ucadair@orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;<=
/span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex">Dear WG,<br>
<br>
Unless I&#39;m mistaken, We didn&#39;t receive any feedback about this disc=
ussion point.<br>
<br>
IMO, RSP-related considerations are worth to be discussed in the core text.=
<br>
<br>
Cheers,<br>
Med<br>
<br>
&gt; -----Message d&#39;origine-----<br>
&gt; De=C2=A0: sfc issue tracker [mailto:<a href=3D"mailto:trac%2Bsfc@tools=
.ietf.org">trac+sfc@tools.ietf.org</a>]<br>
&gt; Envoy=C3=A9=C2=A0: vendredi 18 septembre 2015 08:08<br>
&gt; =C3=80=C2=A0: <a href=3D"mailto:draft-ietf-sfc-control-plane@tools.iet=
f.org">draft-ietf-sfc-control-plane@tools.ietf.org</a>; BOUCADAIR Mohamed I=
MT/OLN<br>
&gt; Cc=C2=A0: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; Objet=C2=A0: [sfc] #16 (control-plane): RSP-related Considerations (L.=
<br>
<div class=3D"HOEnZb"><div class=3D"h5">&gt; Dunbar/A. Malis)<br>
&gt;<br>
&gt; #16: RSP-related Considerations (L.=C2=A0 Dunbar/A.=C2=A0 Malis)<br>
&gt;<br>
&gt;=C2=A0 Discuss what to do with this appendix.<br>
&gt;<br>
&gt;=C2=A0 =3D=3D<br>
&gt;=C2=A0 Appendix A.=C2=A0 RSP-related Considerations<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0NOTE: This section records some contributions propo=
sed by L.=C2=A0 Dunbar<br>
&gt;=C2=A0 =C2=A0 =C2=A0and A.=C2=A0 Malis, but have not been discussed yet=
 among authors.<br>
&gt;<br>
&gt;=C2=A0 A.1.=C2=A0 Encoding the Exact SFF-SF-sequence in Data Packets<br=
>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0Encoding the exact RSP in every packet has the bene=
fit and the issues<br>
&gt;=C2=A0 =C2=A0 =C2=A0associated with source routing.=C2=A0 This approach=
 may not be optimal<br>
&gt;=C2=A0 =C2=A0 =C2=A0when the SFP doesn&#39;t change very frequently, as=
 in minutes or hours.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0There are contexts that it might not be feasible fo=
r the head end<br>
&gt;=C2=A0 =C2=A0 =C2=A0Classifier to be notified of the changes of SFF-seq=
uence or SFF-SF-<br>
&gt;=C2=A0 =C2=A0 =C2=A0Sequence for a given SFP because of the time taken =
for the<br>
&gt;=C2=A0 =C2=A0 =C2=A0notification and the limited capability of the Clas=
sifier nodes.<br>
&gt;<br>
&gt;=C2=A0 A.2.=C2=A0 Fully Controlled SFF-SF-Sequence for a SFP<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0This section describes the information that can be =
exchanged over C2<br>
&gt;=C2=A0 =C2=A0 =C2=A0interface (Section 3.3.2) when the SFC Control Elem=
ent explicitly<br>
&gt;=C2=A0 =C2=A0 =C2=A0passes the steering policies to all SFFs for the SF=
F-SF-Sequence of a<br>
&gt;=C2=A0 =C2=A0 =C2=A0given SFC.=C2=A0 In this model, each SFF doesn&#39;=
t need to signal other SFFs<br>
&gt;=C2=A0 =C2=A0 =C2=A0for the SFP.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0Suppose the SFC ID for this SFP is &quot;yellow&quo=
t;, an example of policy to<br>
&gt;=C2=A0 =C2=A0 =C2=A0&quot;sff-a&quot; is depicted in Figure 2 (for illu=
stration proposes)<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Matching=C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=
=A0 =C2=A0 =C2=A0 =C2=A0Action<br>
&gt;=C2=A0 =C2=A0 =C2=A0----------------------------------------+----------=
---------------<br>
&gt;=C2=A0 =C2=A0 =C2=A0SFC ID =3D &quot;yellow&quot; &amp; ingress =3D sff=
x-port | next-hop: &quot;sf2&quot; &amp; VID<br>
&gt;=C2=A0 =C2=A0 =C2=A0SFC ID =3D &quot;yellow&quot; &amp; ingress =3D sf2=
-port=C2=A0 | next-hop: &quot;sf3&quot; &amp; VID<br>
&gt;=C2=A0 =C2=A0 =C2=A0SFC ID =3D &quot;yellow&quot; &amp; ingress =3D sf3=
-port=C2=A0 | next-hop: sff-b<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Figure 2: Example of Traffic Steerin=
g Policy to a SFF node<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0The SFF nodes may not be directly adjacent to each =
other.=C2=A0 They can<br>
&gt;=C2=A0 =C2=A0 =C2=A0be interconnected by tunnels, such as GRE, VxLAN, e=
tc.=C2=A0 SFs are<br>
&gt;=C2=A0 =C2=A0 =C2=A0attached to a SFF node or SFC Proxy node via Ethern=
et link or other<br>
&gt;=C2=A0 =C2=A0 =C2=A0link types.=C2=A0 Therefore, the steering policies =
to a SFF node for<br>
&gt;=C2=A0 =C2=A0 =C2=A0service function chain depends on if the packet com=
es from previous<br>
&gt;=C2=A0 =C2=A0 =C2=A0SFF or comes from a specific SF, i.e., the SFC Forw=
arding Policy<br>
&gt;=C2=A0 =C2=A0 =C2=A0Table entries have to be ingress port specific.=C2=
=A0 There are multiple<br>
&gt;=C2=A0 =C2=A0 =C2=A0different steering policies for one flow within one=
 SFF and each set<br>
&gt;=C2=A0 =C2=A0 =C2=A0of steering policies is specific for an ingress por=
t.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0The semantics of traffic steering rules can be &quo=
t;Match&quot; and &quot;Action&quot;,<br>
&gt;=C2=A0 =C2=A0 =C2=A0similar to the &quot;route&quot; described in [I-D.=
ietf-i2rs-rib-info-model].<br>
&gt;=C2=A0 =C2=A0 =C2=A0The &quot;match&quot; and &quot;action&quot; for di=
stinct ports can be different.=C2=A0 The<br>
&gt;=C2=A0 =C2=A0 =C2=A0matching criteria for SFF can be more sophisticated=
.=C2=A0 For example,<br>
&gt;=C2=A0 =C2=A0 =C2=A0the matching criteria could be any fields in the da=
ta packets:<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Ingress port<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Destination MAC address<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Source MAC address<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 VLAN_id,<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Destination IP address<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Source IP address<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Source port number<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Destination port number<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 DSCP<br>
&gt;=C2=A0 =C2=A0 =C2=A0o=C2=A0 Packet size, etc., or any combination there=
of.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0A SFF node may not support some of the matching cri=
teria listed<br>
&gt;=C2=A0 =C2=A0 =C2=A0above.=C2=A0 It is important that SFC control plane=
 can retrieve the<br>
&gt;=C2=A0 =C2=A0 =C2=A0supported matching criteria by SFF nodes.=C2=A0 The=
 &quot;Actions&quot; for traffic<br>
&gt;=C2=A0 =C2=A0 =C2=A0steering could be to steer traffic to the attached =
service function<br>
&gt;=C2=A0 =C2=A0 =C2=A0or SF instantiations via a specific port.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0The &quot;Actions&quot; to SFC Proxy may include a =
method to map the SFC<br>
&gt;=C2=A0 =C2=A0 =C2=A0Identifier carried in the packet header to a locall=
y significant link<br>
&gt;=C2=A0 =C2=A0 =C2=A0identifier, e.g., VLAN-ID, and a method to construc=
t and encapsulate<br>
&gt;=C2=A0 =C2=A0 =C2=A0the SFC header back to the packets when they come b=
ack from the<br>
&gt;=C2=A0 =C2=A0 =C2=A0attached SFs.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0This approach does not require using an end-to-end =
signaling protocol<br>
&gt;=C2=A0 =C2=A0 =C2=A0among Classier nodes and SFF nodes.=C2=A0 However, =
there may be problems<br>
&gt;=C2=A0 =C2=A0 =C2=A0encountered if SFF nodes are not updated in the pro=
per order or not<br>
&gt;=C2=A0 =C2=A0 =C2=A0at the same time.=C2=A0 For example, if the SFF &qu=
ot;A&quot; and SFF &quot;C&quot; get flow<br>
&gt;=C2=A0 =C2=A0 =C2=A0steering policies at slightly different times, some=
 packets might not<br>
&gt;=C2=A0 =C2=A0 =C2=A0be directed to some service functions on a chain.<b=
r>
&gt;=C2=A0 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
&gt;<br>
&gt; --<br>
&gt; -------------------------------------+--------------------------------=
----<br>
&gt; -<br>
&gt;=C2=A0 Reporter:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 =C2=A0 =C2=A0 Owner:=C2=
=A0 draft-ietf-sfc-<br>
&gt; control-<br>
&gt;=C2=A0 =C2=A0<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.bo=
ucadair@orange.com</a>=C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 <a href=3D"mailto:=
plane@tools.ietf.org">plane@tools.ietf.org</a><br>
&gt;=C2=A0 =C2=A0 =C2=A0 Type:=C2=A0 defect=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 =C2=A0 =C2=A0Status:=C2=A0 ne=
w<br>
&gt;=C2=A0 Priority:=C2=A0 major=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 |=C2=A0 Milestone:<br>
&gt; Component:=C2=A0 control-plane=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 |=C2=A0 =C2=A0 Version:<br>
&gt;=C2=A0 Severity:=C2=A0 -=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 |=C2=A0 =C2=A0Keywords:<br>
&gt; -------------------------------------+--------------------------------=
----<br>
&gt; -<br>
&gt;<br>
&gt; Ticket URL: &lt;<a href=3D"http://trac.tools.ietf.org/wg/sfc/trac/tick=
et/16" rel=3D"noreferrer" target=3D"_blank">http://trac.tools.ietf.org/wg/s=
fc/trac/ticket/16</a>&gt;<br>
&gt; sfc &lt;<a href=3D"http://tools.ietf.org/sfc/" rel=3D"noreferrer" targ=
et=3D"_blank">http://tools.ietf.org/sfc/</a>&gt;<br>
<br>
</div></div></blockquote></div><br></div>

--089e010d84e8f127550524d18a68--


From nobody Wed Nov 18 06:35:17 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ACBB1B2E5B for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:35:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cIenmMxdtbcu for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:35:12 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60A721B2E6C for <sfc@ietf.org>; Wed, 18 Nov 2015 06:35:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11871; q=dns/txt; s=iport; t=1447857310; x=1449066910; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=81FZDB50VjzYFYuJeTDjwNZKXP6+XvtkXZb0US9DqaY=; b=daL9bNmwY7PE0J2eEZIc8DTW+tgjunYaWVczqrbF4AfqyZEvPRzxkPxl V82RSZqPNwuzID9ckhScm3SqkNIrbFOIKSKKxtBSim/trGXfes7B90XPO eCD67h9SZAtCUQ2r7rM8s1YxBVnql5LSYnlE8o4eKSpTyIkS4+cy65K3c 0=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0C5AgD4i0xW/4YNJK1egztTbwa+Tw6BZ?= =?us-ascii?q?RcKhW4CgUc4FAEBAQEBAQGBCoQ0AQEBAwEBAQEgSwQHBQcEAgEGAg4DAQMBAQE?= =?us-ascii?q?nAwICJwsUAwYIAgQOBQ4NiAsIDZB7nTWQPQEBAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?Q8FBIZUghCCbod1L4EVBY0ciS4BglaBYINbhRmBW4RAkjiDcQEfAUOCER0WgUB?= =?us-ascii?q?yhAWBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,313,1444694400";  d="asc'?scan'208";a="209481981"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 18 Nov 2015 14:35:09 +0000
Received: from XCH-RTP-008.cisco.com (xch-rtp-008.cisco.com [64.101.220.148]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id tAIEZ85n015574 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 18 Nov 2015 14:35:09 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-008.cisco.com (64.101.220.148) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 09:35:08 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 09:35:08 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4A=
Date: Wed, 18 Nov 2015 14:35:07 +0000
Message-ID: <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.115.60]
Content-Type: multipart/signed; boundary="Apple-Mail=_E8D227C4-07DE-439A-8230-B9616155595B"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/KSrEX_udahQjG-WIcSjwovuPXn0>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 14:35:15 -0000

--Apple-Mail=_E8D227C4-07DE-439A-8230-B9616155595B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Med,

> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>=20
> Carlos,
>=20
> This is an open issue for this draft, so it is normal to continue =
discussing it. I don't know how you can conclude in advance that we are =
circling.
>=20

Discussion is great, Med. But my =E2=80=98we are circling' comment (not =
in advanced, but already evident) is because I saw the same questions, =
same arguments, and same answers as before.

> "strongly believe" is not a technical argument, btw.
>=20

Well, I believe so on technical grounds! Most of which have already been =
said, so I do not want to contribute to the circular discussion.

The control-plane draft talks about =E2=80=9CSFC forwarding=E2=80=9D and =
=E2=80=9CSFC data plane=E2=80=9D, and =E2=80=9CSFC IDs=E2=80=9D. The =
architecture says that SFC are made of abstract service functions. =
There=E2=80=99s no actual forwarding in this abstract conceptual model.

The control-plane draft says =E2=80=9CSuppose the SFC ID for this SFP is =
"yellow=E2=80=9D,=E2=80=9D, and my point again is that in the data plane =
an SFP has an identifier (which identifies the SFP (SFP-ID) and is not =
the identifier of something else, it=E2=80=99s not a Topology-ID, it=E2=80=
=99s not a SKU, it=E2=80=99s not a URI, it=E2=80=99s not a Family Name, =
and not an SFC ID), and the control (and policy) plane can of course =
work with SFCs.

My $0.02.

Thanks,

=E2=80=94 Carlos.

> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>> Envoy=C3=A9 : mercredi 18 novembre 2015 11:52
>> =C3=80 : Joel Halpern
>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-sfc-
>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>> sfc@ietf.org
>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane =
operates
>> on SFC IDs, SFP IDs, etc.
>>=20
>> I am a bit baffled to see this thread again =E2=80=94 it appears the =
discussion
>> restarted to continue in circles.
>>=20
>> Med,
>>=20
>> I too agree with Joel and strongly believe there is no need for SFC
>> identification passed down =E2=80=94 there is no provisioning of SFCs =
southbound.
>>=20
>> (Almost) every instance of =E2=80=9CSFC=E2=80=9D in the control-plane =
requirements draft
>> should really say =E2=80=9CSFP=E2=80=9D. There is no use of talking =
about SFCs towards the
>> data plane. The relationship between chains and paths is a policy =
matter
>> which belongs in the policy/control itself, but not out of there.
>>=20
>> This is no different than what I said a few months ago on the same =
topic.
>>=20
>> Thanks,
>>=20
>> =E2=80=94 Carlos.
>>=20
>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern =
<joel.halpern@ericsson.com>
>> wrote:
>>>=20
>>> What is provisioned into the SFF reflects the SFP.  The control =
system
>> decides whether that SFP indicates the same set of all possible =
choices
>> that the SFC does, or is a proper subset.
>>>=20
>>> In order to allow for an SFP that reflects meaningful constraints, =
what
>> is provisioned has to be the SFP.
>>> No special provision is needed for the case where the SFP is =
isomorphic
>> to the SFC. In such a case, you still provision the SFP.  And the =
result
>> is an SFP with as much flexibility as the SFC.
>>>=20
>>> If, in contrast, you declare that the provisioning includes the SFC =
then
>> you are introducing extra complexity without adding any new cases =
that can
>> be handled.
>>>=20
>>> Yours,
>>> Joel
>>>=20
>>> -----Original Message-----
>>> From: mohamed.boucadair@orange.com =
[mailto:mohamed.boucadair@orange.com]
>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>> To: Joel Halpern; Paul Quinn (paulq)
>>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>> operates on SFC IDs, SFP IDs, etc.
>>>=20
>>> Hi Joel,
>>>=20
>>> Please see inline.
>>>=20
>>> Cheers,
>>> Med
>>>=20
>>>> -----Message d'origine-----
>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>> Envoy=C3=A9 : mardi 17 novembre 2015 14:49
>>>> =C3=80 : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc =
issue
>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>> sfc@ietf.org; Joel M. Halpern
>>>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
>>>> operates on SFC IDs, SFP IDs, etc.
>>>>=20
>>>> Your statement that " It happens that information is no more than =
the
>>>> service chain itself (without any constraints)." (Where "it" refers =
to
>> "
>>>> the exact sequence of steps to be used to realize the SFC".) Does =
not
>>>> make sense to me.
>>>=20
>>> [Med] RFC 7665 says:
>>>=20
>>> "   Thus, the policies and logic of SFP selection or creation =
(depending
>>>  upon the solution) produce what may be thought of as a constrained
>>>  version of the original SFC. "
>>>=20
>>> in short: SFP is defined as a constrained version of the original =
SFC.
>>>=20
>>> What is the name to use to refer to a "non-constrained" SFC or to =
the
>> information that you will provision to an SFF when the path =
computation
>> and selection decision is "deferred to the SFF"?
>>>=20
>>> It does not make sense to call a non-constrained version of the SFC =
as
>> SFP given that RFC7665 explicitly defines SFP as "constrained version =
of
>> the original SFC"!
>>>=20
>>> The SFC is the general description of the objective.  That
>>>> is not the same as the exact sequence of places that must be =
visited.
>>>>=20
>>>> I stand by my earlier comments that almost all uses of SFC in the
>>>> control requirements draft should be SFP.
>>>>=20
>>>=20
>>> [Med] I noted that Joel.. that's fair but this position is IMHO not
>> aligned with RFC7665 that allows to control any variation from a non-
>> constrained SFC to a fully constrained SFC.
>>>=20
>>>> Yours,
>>>> Joel
>>>>=20
>>>> -----Original Message-----
>>>> From: mohamed.boucadair@orange.com
>>>> [mailto:mohamed.boucadair@orange.com]
>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>> To: Paul Quinn (paulq)
>>>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>> sfc@ietf.org; Joel M. Halpern
>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>> operates on SFC IDs, SFP IDs, etc.
>>>>=20
>>>> Hi Paul,
>>>>=20
>>>> Thank you for sharing your feedback.
>>>>=20
>>>> RFC7665 says the following:
>>>>=20
>>>> "
>>>> This architecture does not mandate the degree of
>>>>  specificity of the SFP.  Architecturally, within the same =
SFC-enabled
>>>>  domain, some SFPs may be fully specified, selecting exactly which =
SFF
>>>>  and which SF are to be visited by packets using that SFP, while =
other
>>>>  SFPs may be quite vague, deferring to the SFF the decisions about =
the
>>>>  exact sequence of steps to be used to realize the SFC.  The
>>>>  specificity may be anywhere in between these extremes.
>>>> "
>>>>=20
>>>> The control draft is completely aligned with that approach.
>>>>=20
>>>> The control-plane document allows in particular to provision =
required
>>>> information when "deferring to the SFF the decisions about the
>>>>  exact sequence of steps to be used to realize the SFC". It happens
>>>> that information is no more than the service chain itself (without =
any
>>>> constraints).
>>>>=20
>>>> Also, the current control-plane document allows to instruct a loose
>>>> path
>>>> (SFP) or a strict path (RSP), etc.
>>>>=20
>>>> I fully agree that whether a full path is specified within a domain =
or
>>>> if it is deferred to SFFs is really deployment-specific. =
Nevertheless,
>>>> the control plan should accommodate all these flavors.
>>>>=20
>>>> Cheers,
>>>> Med
>>>>=20
>>>>> -----Message d'origine-----
>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=C3=A9 : =
vendredi
>>>>> 16 octobre 2015 14:04 =C3=80 : Joel M. Halpern Cc : BOUCADAIR =
Mohamed
>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>>> (control-plane): Whether the control plane operates on SFC IDs, =
SFP
>> IDs, etc.
>>>>>=20
>>>>> Joel,
>>>>>=20
>>>>> I concur.
>>>>>=20
>>>>> The data plane deal with paths, not chains.  The relationship of
>>>>> paths to chains falls squarely in the control plane (or even more
>>>>> likely
>>>> "policy"
>>>>> plane) realm.  The specificity of the path is left to
>>>>> implementation, in the architecture draft, but that's consistent
>>>>> with your position and provides the requisite functionality.
>>>>>=20
>>>>> Paul
>>>>>=20
>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>> <jmh@joelhalpern.com>
>>>>> wrote:
>>>>>>=20
>>>>>> As far as I can tell, there is nothing in the Service Chaining
>>>>>> work that
>>>>> requires correlating service path IDs with service chain IDs =
within
>>>>> the data plane.  Any such relationship exists entirely within the
>>>>> control plane or above, and would be driven by requirements other
>>>>> than the data plane.  When I look at this document, all of the
>>>>> requirements that talk about service function chain IDs can be
>>>>> accurately captured, in terms of data plane requirements, by =
service
>> function path IDs.
>>>>> Thus, the requirement that the data plane has is to see such path =
IDs.
>>>>> Yes, in some deployments those will be 1-1 with chain IDs.  They =
are
>>>> still path IDs.
>>>>>>=20
>>>>>> Introducing a requirement for the data plane to see and work with
>>>>>> chain
>>>>> IDs is not grounded in the work of the group.
>>>>>>=20
>>>>>> Yours,
>>>>>> Joel M. Halpern
>>>>>>=20
>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>>> Re-,
>>>>>>>=20
>>>>>>> The control draft as it stands is compliant with the data plane
>>>>> architecture document.
>>>>>>>=20
>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>>> abstract
>>>> SFC
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>=20


--Apple-Mail=_E8D227C4-07DE-439A-8230-B9616155595B
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=ZMzO
-----END PGP SIGNATURE-----

--Apple-Mail=_E8D227C4-07DE-439A-8230-B9616155595B--


From nobody Wed Nov 18 06:35:19 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E03E1B2E6B for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:35:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 75SyB1IrkGhC for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 06:35:14 -0800 (PST)
Received: from hub021-ca-7.exch021.serverdata.net (hub021-ca-7.exch021.serverdata.net [64.78.56.72]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 160BE1B2E5E for <sfc@ietf.org>; Wed, 18 Nov 2015 06:35:12 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-7.exch021.domain.local ([10.254.4.109]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 06:35:11 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAI54gIAAA+EAgAAA+ACAAVwAgIAANaeA//+BgMA=
Date: Wed, 18 Nov 2015 14:35:11 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com>
In-Reply-To: <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/zB8cK8-Z4kW6l59yHOqwL_-DUxE>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 14:35:17 -0000
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From nobody Wed Nov 18 07:04:07 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 539931B2EAE for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:04:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVV8NkPma2lm for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:04:03 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79C031B3242 for <sfc@ietf.org>; Wed, 18 Nov 2015 07:04:00 -0800 (PST)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm11.si.francetelecom.fr (ESMTP service) with ESMTP id CDA933B45A6; Wed, 18 Nov 2015 16:03:58 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.61]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id 949D14C1C5; Wed, 18 Nov 2015 16:03:58 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7E.corporate.adroot.infra.ftgroup ([fe80::b91c:ea2c:ac8a:7462%19]) with mapi id 14.03.0248.002; Wed, 18 Nov 2015 16:03:58 +0100
From: <mohamed.boucadair@orange.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsA==
Date: Wed, 18 Nov 2015 15:03:58 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com>
In-Reply-To: <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.18.142716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/O0yX-ZB451Qt8tuz9ZCVWn8jMsA>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 15:04:06 -0000
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From nobody Wed Nov 18 07:16:12 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 449091B3271 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:16:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e1IsDpDCV74k for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:16:08 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 045DC1B3267 for <sfc@ietf.org>; Wed, 18 Nov 2015 07:16:08 -0800 (PST)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id C88F92DC5AA; Wed, 18 Nov 2015 16:16:06 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.2]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 9D15435C072; Wed, 18 Nov 2015 16:16:06 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0248.002; Wed, 18 Nov 2015 16:16:06 +0100
From: <mohamed.boucadair@orange.com>
To: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYkZVTjntybIUigJGvi7m2/t54/Q+uAgAE4bQCAAD5zgIAtWD4AgDJ0eYCAAAQNgIAAA+EAgAAA+ACAAVwBgIAAKfuwgAAuzXA=
Date: Wed, 18 Nov 2015 15:16:05 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9FE73@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com>
In-Reply-To: <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.18.142716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/4vr-y9HeDuQAD3ELDRC9lG9moRg>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 15:16:11 -0000
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From nobody Wed Nov 18 07:19:07 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B2B61B327B for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:19:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4RxMQ-AXUg4Q for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:19:03 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32FF61B325D for <sfc@ietf.org>; Wed, 18 Nov 2015 07:19:03 -0800 (PST)
Received: from opfednr04.francetelecom.fr (unknown [xx.xx.xx.68]) by opfednr22.francetelecom.fr (ESMTP service) with ESMTP id 6BDA2201BF; Wed, 18 Nov 2015 16:19:01 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.41]) by opfednr04.francetelecom.fr (ESMTP service) with ESMTP id 31D2340057; Wed, 18 Nov 2015 16:19:01 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM31.corporate.adroot.infra.ftgroup ([fe80::2cc9:4bac:7b7d:229d%19]) with mapi id 14.03.0248.002; Wed, 18 Nov 2015 16:19:00 +0100
From: <mohamed.boucadair@orange.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAI54gIAAA+EAgAAA+ACAAVwAgIAANaeA//+BgMCAAA0OYA==
Date: Wed, 18 Nov 2015 15:18:59 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008C9FE88@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/oDKKnlNDdB4BeF-QLQDSL8Wrr9M>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 15:19:06 -0000
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From nobody Wed Nov 18 07:19:25 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF5741B327B for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:19:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qFLfwjOmF7S0 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:19:15 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E33A71B3112 for <sfc@ietf.org>; Wed, 18 Nov 2015 07:19:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12970; q=dns/txt; s=iport; t=1447859954; x=1449069554; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=dOdsTj7vjYD404Yf01/qqxW8u//q8E3q1CsycbFss5k=; b=VPOQqQmBdSqGIDl0m+5BquyVOIgnie46WR/QdaEt0b9sRNmERz5gj67e 0gmlsaw44657g1fSEstmPsGmlstZL7bA0poS3igiKiXSs1QRYZb4lqCHz p/fT5C+HXrVejKug8eofyKGPeTJjblUkodpay7oKaddJqKx7P6+ADBUlv g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D8AQAIlkxW/4oNJK1egztTbwa+RgENg?= =?us-ascii?q?WUXCoVuAoFJOBQBAQEBAQEBfwuENAEBAQMBAQEBawQHBQcEAgEIEQECAQEBASc?= =?us-ascii?q?HJwsUAwYIAgQOBRuICwgNvw4BAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUhH6EW?= =?us-ascii?q?YRgBY0ciS4BiBGFGYFbhECSOINxAR8BAUKCER0WgUByhAWBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,313,1444694400"; d="scan'208";a="209849241"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 18 Nov 2015 15:19:13 +0000
Received: from XCH-RTP-008.cisco.com (xch-rtp-008.cisco.com [64.101.220.148]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tAIFJDA8027603 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 18 Nov 2015 15:19:13 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-008.cisco.com (64.101.220.148) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 10:19:12 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 10:19:12 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIA
Date: Wed, 18 Nov 2015 15:19:12 +0000
Message-ID: <D272001C.2F600%cpignata@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.8.151023
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.234.212]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <CE0BDDB5BE96C14FBA3EC412B0368C1A@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/t4CeWkwTaMcH7sViOFU7WBDohTk>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 15:19:20 -0000

Hi, Med,

I also referred to other parts of the document, when I wrote:

> The control-plane draft talks about =B3SFC forwarding=B2 and =B3SFC data =
plane=B2


For example, I am not sure I understand what this means:

"   o  Populate SFC forwarding policy tables of involved SFC data plane=B2


Or at:
"   o  SFC Forwarding Policy Table: this table reflects the SFC-specific
     traffic forwarding policy enforced by SFF components for every
     relevant incoming packet that is associated to one of the existing
     SFCs."


My comment is that those should be =B3SFP"

Thanks,

=8B Carlos.

-----Original Message-----
From: Med Boucadair <mohamed.boucadair@orange.com>
Date: Wednesday, November 18, 2015 at 10:03 AM
To: Carlos Pignataro <cpignata@cisco.com>
Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
"draft-ietf-sfc-control-plane@tools.ietf.org"
<draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
<jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>,
"sfc@ietf.org" <sfc@ietf.org>, Joel Halpern <joel.halpern@ericsson.com>
Subject: RE: [sfc] #15 (control-plane): Whether the control plane operates
on SFC IDs, SFP IDs, etc.

>Carlos,=20
>
>There is not SFC ID in the core text of the control plane draft.
>
>The text you quoted is part of an appendix with a note that clearly
>states this is not discussed. A corresponding issue record has been
>recorded to seek for more feedback on that appendix.
>
>Cheers,
>Med
>
>> -----Message d'origine-----
>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>> Envoy=E9 : mercredi 18 novembre 2015 15:35
>> =C0 : BOUCADAIR Mohamed IMT/OLN
>> Cc : Paul Quinn (paulq); draft-ietf-sfc-control-plane@tools.ietf.org;
>>Joel
>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>operates
>> on SFC IDs, SFP IDs, etc.
>>=20
>> Med,
>>=20
>> > On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>> >
>> > Carlos,
>> >
>> > This is an open issue for this draft, so it is normal to continue
>> discussing it. I don't know how you can conclude in advance that we are
>> circling.
>> >
>>=20
>> Discussion is great, Med. But my =8Cwe are circling' comment (not in
>> advanced, but already evident) is because I saw the same questions, same
>> arguments, and same answers as before.
>>=20
>> > "strongly believe" is not a technical argument, btw.
>> >
>>=20
>> Well, I believe so on technical grounds! Most of which have already been
>> said, so I do not want to contribute to the circular discussion.
>>=20
>> The control-plane draft talks about =B3SFC forwarding=B2 and =B3SFC data
>>plane=B2,
>> and =B3SFC IDs=B2. The architecture says that SFC are made of abstract
>>service
>> functions. There=B9s no actual forwarding in this abstract conceptual
>>model.
>>=20
>> The control-plane draft says =B3Suppose the SFC ID for this SFP is
>> "yellow=B2,=B2, and my point again is that in the data plane an SFP has =
an
>> identifier (which identifies the SFP (SFP-ID) and is not the identifier
>>of
>> something else, it=B9s not a Topology-ID, it=B9s not a SKU, it=B9s not a=
 URI,
>> it=B9s not a Family Name, and not an SFC ID), and the control (and polic=
y)
>> plane can of course work with SFCs.
>>=20
>> My $0.02.
>>=20
>> Thanks,
>>=20
>> =8B Carlos.
>>=20
>> > Cheers,
>> > Med
>> >
>> >> -----Message d'origine-----
>> >> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>> >> Envoy=E9 : mercredi 18 novembre 2015 11:52
>> >> =C0 : Joel Halpern
>> >> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-sfc-
>> >> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>> >> sfc@ietf.org
>> >> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>> operates
>> >> on SFC IDs, SFP IDs, etc.
>> >>
>> >> I am a bit baffled to see this thread again =8B it appears the
>>discussion
>> >> restarted to continue in circles.
>> >>
>> >> Med,
>> >>
>> >> I too agree with Joel and strongly believe there is no need for SFC
>> >> identification passed down =8B there is no provisioning of SFCs
>> southbound.
>> >>
>> >> (Almost) every instance of =B3SFC=B2 in the control-plane requirement=
s
>> draft
>> >> should really say =B3SFP=B2. There is no use of talking about SFCs
>>towards
>> the
>> >> data plane. The relationship between chains and paths is a policy
>> matter
>> >> which belongs in the policy/control itself, but not out of there.
>> >>
>> >> This is no different than what I said a few months ago on the same
>> topic.
>> >>
>> >> Thanks,
>> >>
>> >> =8B Carlos.
>> >>
>> >>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>><joel.halpern@ericsson.com>
>> >> wrote:
>> >>>
>> >>> What is provisioned into the SFF reflects the SFP.  The control
>>system
>> >> decides whether that SFP indicates the same set of all possible
>>choices
>> >> that the SFC does, or is a proper subset.
>> >>>
>> >>> In order to allow for an SFP that reflects meaningful constraints,
>> what
>> >> is provisioned has to be the SFP.
>> >>> No special provision is needed for the case where the SFP is
>> isomorphic
>> >> to the SFC. In such a case, you still provision the SFP.  And the
>> result
>> >> is an SFP with as much flexibility as the SFC.
>> >>>
>> >>> If, in contrast, you declare that the provisioning includes the SFC
>> then
>> >> you are introducing extra complexity without adding any new cases
>>that
>> can
>> >> be handled.
>> >>>
>> >>> Yours,
>> >>> Joel
>> >>>
>> >>> -----Original Message-----
>> >>> From: mohamed.boucadair@orange.com
>> [mailto:mohamed.boucadair@orange.com]
>> >>> Sent: Tuesday, November 17, 2015 9:03 AM
>> >>> To: Joel Halpern; Paul Quinn (paulq)
>> >>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> >> sfc@ietf.org; Joel M. Halpern
>> >>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>> >> operates on SFC IDs, SFP IDs, etc.
>> >>>
>> >>> Hi Joel,
>> >>>
>> >>> Please see inline.
>> >>>
>> >>> Cheers,
>> >>> Med
>> >>>
>> >>>> -----Message d'origine-----
>> >>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>> >>>> Envoy=E9 : mardi 17 novembre 2015 14:49
>> >>>> =C0 : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc issue
>> >>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> >>>> sfc@ietf.org; Joel M. Halpern
>> >>>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
>> >>>> operates on SFC IDs, SFP IDs, etc.
>> >>>>
>> >>>> Your statement that " It happens that information is no more than
>>the
>> >>>> service chain itself (without any constraints)." (Where "it" refers
>> to
>> >> "
>> >>>> the exact sequence of steps to be used to realize the SFC".) Does
>>not
>> >>>> make sense to me.
>> >>>
>> >>> [Med] RFC 7665 says:
>> >>>
>> >>> "   Thus, the policies and logic of SFP selection or creation
>> (depending
>> >>>  upon the solution) produce what may be thought of as a constrained
>> >>>  version of the original SFC. "
>> >>>
>> >>> in short: SFP is defined as a constrained version of the original
>>SFC.
>> >>>
>> >>> What is the name to use to refer to a "non-constrained" SFC or to
>>the
>> >> information that you will provision to an SFF when the path
>>computation
>> >> and selection decision is "deferred to the SFF"?
>> >>>
>> >>> It does not make sense to call a non-constrained version of the SFC
>>as
>> >> SFP given that RFC7665 explicitly defines SFP as "constrained version
>> of
>> >> the original SFC"!
>> >>>
>> >>> The SFC is the general description of the objective.  That
>> >>>> is not the same as the exact sequence of places that must be
>>visited.
>> >>>>
>> >>>> I stand by my earlier comments that almost all uses of SFC in the
>> >>>> control requirements draft should be SFP.
>> >>>>
>> >>>
>> >>> [Med] I noted that Joel.. that's fair but this position is IMHO not
>> >> aligned with RFC7665 that allows to control any variation from a non-
>> >> constrained SFC to a fully constrained SFC.
>> >>>
>> >>>> Yours,
>> >>>> Joel
>> >>>>
>> >>>> -----Original Message-----
>> >>>> From: mohamed.boucadair@orange.com
>> >>>> [mailto:mohamed.boucadair@orange.com]
>> >>>> Sent: Tuesday, November 17, 2015 8:34 AM
>> >>>> To: Paul Quinn (paulq)
>> >>>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> >>>> sfc@ietf.org; Joel M. Halpern
>> >>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>> >>>> operates on SFC IDs, SFP IDs, etc.
>> >>>>
>> >>>> Hi Paul,
>> >>>>
>> >>>> Thank you for sharing your feedback.
>> >>>>
>> >>>> RFC7665 says the following:
>> >>>>
>> >>>> "
>> >>>> This architecture does not mandate the degree of
>> >>>>  specificity of the SFP.  Architecturally, within the same SFC-
>> enabled
>> >>>>  domain, some SFPs may be fully specified, selecting exactly which
>> SFF
>> >>>>  and which SF are to be visited by packets using that SFP, while
>> other
>> >>>>  SFPs may be quite vague, deferring to the SFF the decisions about
>> the
>> >>>>  exact sequence of steps to be used to realize the SFC.  The
>> >>>>  specificity may be anywhere in between these extremes.
>> >>>> "
>> >>>>
>> >>>> The control draft is completely aligned with that approach.
>> >>>>
>> >>>> The control-plane document allows in particular to provision
>>required
>> >>>> information when "deferring to the SFF the decisions about the
>> >>>>  exact sequence of steps to be used to realize the SFC". It happens
>> >>>> that information is no more than the service chain itself (without
>> any
>> >>>> constraints).
>> >>>>
>> >>>> Also, the current control-plane document allows to instruct a loose
>> >>>> path
>> >>>> (SFP) or a strict path (RSP), etc.
>> >>>>
>> >>>> I fully agree that whether a full path is specified within a domain
>> or
>> >>>> if it is deferred to SFFs is really deployment-specific.
>> Nevertheless,
>> >>>> the control plan should accommodate all these flavors.
>> >>>>
>> >>>> Cheers,
>> >>>> Med
>> >>>>
>> >>>>> -----Message d'origine-----
>> >>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9 : vendre=
di
>> >>>>> 16 octobre 2015 14:04 =C0 : Joel M. Halpern Cc : BOUCADAIR Mohamed
>> >>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>> >>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>> >>>>> (control-plane): Whether the control plane operates on SFC IDs,
>>SFP
>> >> IDs, etc.
>> >>>>>
>> >>>>> Joel,
>> >>>>>
>> >>>>> I concur.
>> >>>>>
>> >>>>> The data plane deal with paths, not chains.  The relationship of
>> >>>>> paths to chains falls squarely in the control plane (or even more
>> >>>>> likely
>> >>>> "policy"
>> >>>>> plane) realm.  The specificity of the path is left to
>> >>>>> implementation, in the architecture draft, but that's consistent
>> >>>>> with your position and provides the requisite functionality.
>> >>>>>
>> >>>>> Paul
>> >>>>>
>> >>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>> >>>>>> <jmh@joelhalpern.com>
>> >>>>> wrote:
>> >>>>>>
>> >>>>>> As far as I can tell, there is nothing in the Service Chaining
>> >>>>>> work that
>> >>>>> requires correlating service path IDs with service chain IDs
>>within
>> >>>>> the data plane.  Any such relationship exists entirely within the
>> >>>>> control plane or above, and would be driven by requirements other
>> >>>>> than the data plane.  When I look at this document, all of the
>> >>>>> requirements that talk about service function chain IDs can be
>> >>>>> accurately captured, in terms of data plane requirements, by
>>service
>> >> function path IDs.
>> >>>>> Thus, the requirement that the data plane has is to see such path
>> IDs.
>> >>>>> Yes, in some deployments those will be 1-1 with chain IDs.  They
>>are
>> >>>> still path IDs.
>> >>>>>>
>> >>>>>> Introducing a requirement for the data plane to see and work with
>> >>>>>> chain
>> >>>>> IDs is not grounded in the work of the group.
>> >>>>>>
>> >>>>>> Yours,
>> >>>>>> Joel M. Halpern
>> >>>>>>
>> >>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>> >>>>>>> Re-,
>> >>>>>>>
>> >>>>>>> The control draft as it stands is compliant with the data plane
>> >>>>> architecture document.
>> >>>>>>>
>> >>>>>>> Indeed, the arch draft acknowledges the following:
>> >>>>>>> (1) SFPs are "associated with a given SFC".
>> >>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>> >>>>>>> (3) Some deployments may not impose any constraint on the
>> >>>>>>> abstract
>> >>>> SFC
>> >>>
>> >>> _______________________________________________
>> >>> sfc mailing list
>> >>> sfc@ietf.org
>> >>> https://www.ietf.org/mailman/listinfo/sfc
>> >
>


From nobody Wed Nov 18 07:45:05 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38A8B1B3847 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:45:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qzy9Q1CrLPL8 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 07:45:00 -0800 (PST)
Received: from mail1.bemta14.messagelabs.com (mail1.bemta14.messagelabs.com [193.109.254.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8DCB1B3844 for <sfc@ietf.org>; Wed, 18 Nov 2015 07:44:57 -0800 (PST)
Received: from [193.109.255.99] by server-6.bemta-14.messagelabs.com id 5C/EF-16618-1FC9C465; Wed, 18 Nov 2015 15:44:49 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-4.tower-48.messagelabs.com!1447861488!1241514!1
X-Originating-IP: [195.232.244.134]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 8869 invoked from network); 18 Nov 2015 15:44:48 -0000
Received: from mailout02.vodafone.com (HELO mailout02.vodafone.com) (195.232.244.134) by server-4.tower-48.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 18 Nov 2015 15:44:48 -0000
Received: from mailint02.vodafone.com (mailint02.vodafone.com [195.232.244.199]) by mailout02.vodafone.com (Postfix) with ESMTP id 3p17k74rrKzbdMb; Wed, 18 Nov 2015 16:44:47 +0100 (CET)
Received: from mailint02.vodafone.com (localhost [127.0.0.1]) by mailint02.vodafone.com (Postfix) with ESMTP id 3p17k73dSwzQsNC; Wed, 18 Nov 2015 16:44:47 +0100 (CET)
Received: from VOEXC02W.internal.vodafone.com (voexc02w.dc-ratingen.de [145.230.101.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint02.vodafone.com (Postfix) with ESMTPS id 3p17k738QczQsQ3; Wed, 18 Nov 2015 16:44:47 +0100 (CET)
Received: from VOEXC22W.internal.vodafone.com (145.230.103.127) by VOEXC02W.internal.vodafone.com (145.230.101.22) with Microsoft SMTP Server (TLS) id 14.3.224.2; Wed, 18 Nov 2015 16:44:47 +0100
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by VOEXC22W.internal.vodafone.com ([145.230.103.127]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 16:44:43 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQIWPn8tRwsnj5MP8adgQRF7L4N6YgJc7TupAbUwLEMCFlaQ2gHiu4rTAYeeG0QCX7iR3gJ9wCW8AXj7CFcCBlBttwJ57NueAds4LcsCKRsi6A==
Date: Wed, 18 Nov 2015 15:44:43 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DF132D@VOEXM20W.internal.vodafone.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
exchangemailitem-processed-by-si: Success
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
SI-Deferred-For-Outbound-Conversion: False
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/SLdAdZ_DSCIpJR0sx-q3eWagiMY>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 15:45:04 -0000
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From nobody Wed Nov 18 08:17:51 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3BC51B38D6 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 08:17:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DZFA0OXS1dCh for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 08:17:47 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DAE91B38CC for <sfc@ietf.org>; Wed, 18 Nov 2015 08:17:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19394; q=dns/txt; s=iport; t=1447863466; x=1449073066; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=myzRSDXeOvAW3GpaueQapinJUATY2fQizFF9TsAasRw=; b=EQ3dZ8/k6vos13h3Uxub/KZM1pfkPLd7kzvBUIQIj7qgMvU+90U5vEvx FD3x+KEC+GV64brqeshJZhkW/EXjAjktm5xMWhuY4bG45FwRQw7B7TDL7 /7HUrDFBab4CcoHOGC2ysDs2iW1mR2VJ1QCqkiNg6ln0cq465by9jjAzN o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D8AQAqo0xW/5pdJa1egztTbwa+SwENg?= =?us-ascii?q?WUXCoVuAhyBMDgUAQEBAQEBAYEKhDQBAQEEAQEBIBE6BAcMBAIBBgIRAQIBAQE?= =?us-ascii?q?BAgIjAwICAiULFAECBggCBAENBRuIEw2RQp01kEQBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEUBIEBhVOEfoRZGIMEgUQBBI0ciS4BiBGFGYFbhECSOINxAR8BAUKCER0?= =?us-ascii?q?WgUByhAWBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,313,1444694400"; d="scan'208";a="46144009"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Nov 2015 16:17:44 +0000
Received: from XCH-ALN-018.cisco.com (xch-aln-018.cisco.com [173.36.7.28]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id tAIGHidJ013773 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 18 Nov 2015 16:17:44 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-018.cisco.com (173.36.7.28) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 10:17:44 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 10:17:44 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hAA=
Date: Wed, 18 Nov 2015 16:17:44 +0000
Message-ID: <D2720C4C.2F7CA%jguichar@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com>
In-Reply-To: <D272001C.2F600%cpignata@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.181]
Content-Type: text/plain; charset="utf-8"
Content-ID: <ABAA9FFF7FCEDA4C92EFEC9EC02697FD@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hD-cn65QlNpA7Nr9OZYkVdX9UTI>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 16:17:51 -0000
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From nobody Wed Nov 18 09:04:38 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E1521A8A51 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 09:04:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RwrZ2OcDlLZp for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 09:04:19 -0800 (PST)
Received: from hub021-ca-8.exch021.serverdata.net (hub021-ca-8.exch021.serverdata.net [64.78.56.73]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDF1A1A8965 for <sfc@ietf.org>; Wed, 18 Nov 2015 09:04:15 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-8.exch021.domain.local ([10.254.4.112]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 09:04:14 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAI54gIAAA+EAgAAA+ACAAVwAgIAANaeA//+BgMCAAJq2gP//js/w
Date: Wed, 18 Nov 2015 17:04:14 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E95DD75@MBX021-W3-CA-2.exch021.domain.local>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local> <C8C844F84E550E43865561FAE104718579DF132D@VOEXM20W.internal.vodafone.com>
In-Reply-To: <C8C844F84E550E43865561FAE104718579DF132D@VOEXM20W.internal.vodafone.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/dG83uD4cIYeUnQFuODuNuXS778o>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 17:04:27 -0000

UmVzcG9uZGluZyB0byBNZWQncyBxdWVzdGlvbiBoZXJlLCB0b28uDQoNCk15IHZpZXcgaXMgdGhh
dCB0aGUgaGllcmFyY2h5IGlzLCBpbiBnZW5lcmFsLA0KDQpTRkMtLT4oTilTRlAgLS0+KE0pUlNQ
DQoNCkNsZWFybHksIGVpdGhlciBOLCBNLCBvciBib3RoIGNvdWxkIGJlIGNvbnN0cmFpbmVkIHRv
IGVxdWFsIDEuICAgTGV0J3Mgc2F5IE0gaXMgY29uc3RyYWluZWQgdG8gdmFsdWUgMToNCg0KU0ZD
LS0+KE4pU0ZQLS0+UlNQDQoNCkZyb20gYW4gaW50dWl0aW9uIHBlcnNwZWN0aXZlLCB0aGUgU0ZQ
IGFuZCBSU1AgY291bGQgYmUgY29sbGFwc2VkLCBzaW5jZSB0aGV5IGFyZSAxOjEgaW4gdGhpcyBj
YXNlOg0KDQpTRkMtLT4oTilTRlAgb3IgU0ZDLS0+KE4pUlNQIGFyZSB0d28gZXF1aXZhbGVudCB3
YXlzIHRvIHZpZXcgdGhlIHNhbWUgZWZmZWN0aXZlIHJlbGF0aW9uc2hpcCBpbiB0aGlzIGNvbnN0
cmFpbmVkIGNhc2UuDQoNCg0KICAgUm9uDQoNCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0N
CkZyb206IEhhZWZmbmVyLCBXYWx0ZXIsIFZvZGFmb25lIERFIFttYWlsdG86d2FsdGVyLmhhZWZm
bmVyQHZvZGFmb25lLmNvbV0gDQpTZW50OiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4LCAyMDE1IDEw
OjQ1IEFNDQpUbzogUm9uIFBhcmtlciA8Um9uX1BhcmtlckBhZmZpcm1lZG5ldHdvcmtzLmNvbT47
IENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSA8Y3BpZ25hdGFAY2lzY28uY29tPjsgSm9lbCBI
YWxwZXJuIDxqb2VsLmhhbHBlcm5AZXJpY3Nzb24uY29tPg0KQ2M6IHNmYyBpc3N1ZSB0cmFja2Vy
IDx0cmFjK3NmY0B0b29scy5pZXRmLm9yZz47IHNmY0BpZXRmLm9yZzsgUGF1bCBRdWlubiAocGF1
bHEpIDxwYXVscUBjaXNjby5jb20+OyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xz
LmlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4gPGptaEBqb2VsaGFscGVybi5jb20+OyBNZWQgQm91
Y2FkYWlyIDxtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tPg0KU3ViamVjdDogQVc6IFtzZmNd
ICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUgb3BlcmF0ZXMg
b24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KDQpIaSBSb24sDQoNClRoYW5rcyBmb3IgeW91ciBx
dWljayByZXNwb25zZS4NCg0KIlNGUHMgZG8sIGluZGVlZCwgcmVwcmVzZW50IHVuaXF1ZSBSU1Bz
IiA9PT4gZ3Vlc3MgeW91IG1lYW4gMTpuIG5vdCAxOjEuDQoNClJlZ2FyZHMsDQpXYWx0ZXINCg0K
LS0tLS1VcnNwcsO8bmdsaWNoZSBOYWNocmljaHQtLS0tLQ0KVm9uOiBSb24gUGFya2VyIFttYWls
dG86Um9uX1BhcmtlckBhZmZpcm1lZG5ldHdvcmtzLmNvbV0NCkdlc2VuZGV0OiBNaXR0d29jaCwg
MTguIE5vdmVtYmVyIDIwMTUgMTU6MzUNCkFuOiBIYWVmZm5lciwgV2FsdGVyLCBWb2RhZm9uZSBE
RTsgQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpOyBKb2VsIEhhbHBlcm4NCkNjOiBzZmMgaXNz
dWUgdHJhY2tlcjsgc2ZjQGlldGYub3JnOyBQYXVsIFF1aW5uIChwYXVscSk7IGRyYWZ0LWlldGYt
c2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybjsgTWVkIEJv
dWNhZGFpcg0KQmV0cmVmZjogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIg
dGhlIGNvbnRyb2wgcGxhbmUgb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KDQpI
aSwgV2FsdGVyLg0KDQpPbmUgcmF0aW9uYWxlIGJlaGluZCB0aGUgMTpOIFNGUC10by1SU1AgcmVs
YXRpb25zaGlwIHdhcyB0byBlbmFibGUgImxhdGUgYmluZGluZyIgYnkgdGhlIFNGRi4gICAgVGh1
cywgdGhlcmUgY291bGQgYmUgYSBkZWxlZ2F0aW9uIG9mIHJlc3BvbnNpYmlsaXR5IHN1Y2ggdGhh
dCBjb250cm9sIHBsYW5lIGNob3NlIFNGUCAoZS5nLiwgSFRUUC1vcHRpbWl6ZXItc2lsdmVyLWlu
c3RhbmNlcyAtLT4gRmlyZXdhbGwtc2lsdmVyLWluc3RhbmNlcykgYW5kIHRoZW4gYWxsb3cgY2xh
c3NpZmllciBhbmQgU0ZGJ3MgdG8gYXV0b25vbW91c2x5IGZpbmFsaXplIHRoZSB1bmlxdWUgUlNQ
LiAgIFVwb24gZmFpbHVyZSBvZiBvbmUgb2YgdGhlIGVsZW1lbnRzIGluIHRoZSBSU1AsIHRoZSBj
bGFzc2lmaWVyIGFuZCBTRkYncyBjb3VsZCBwZXJmb3JtIGxvY2FsIHJlcGFpciBieSBtb3Zpbmcg
dG8gYSBkaWZmZXJlbnQgUlNQIHRoYXQgcmVzcGVjdHMgdGhlIG9yaWdpbmFsIFNGUC4NCg0KVGhh
dCBiZWluZyBzYWlkLCBhIDE6TiBjYW4gYWx3YXlzIGRlZ2VuZXJhdGUgdG8gMToxIC0tIHRoYXQg
aXMgaW4gc29tZSBkZXBsb3ltZW50IHNjZW5hcmlvcywgU0ZQcyBkbywgaW5kZWVkLCByZXByZXNl
bnQgdW5pcXVlIFJTUHMuICAgVGhpcywgb2YgY291cnNlLCByZXF1aXJlcyBhbGwgYXNwZWN0cyBv
ZiBmYWlsdXJlIHJlY292ZXJ5IHRvIGJlIGhhbmRsZWQgaW4gdGhlIGNvbnRyb2wgcGxhbmUuDQoN
CkkgdGhpbmsgYm90aCBkZXBsb3ltZW50IHNjZW5hcmlvcyBhcmUgZW50aXJlbHkgdmFsaWQgYW5k
IHdlIHdhbnRlZCB0byBrZWVwIHRoZSBhcmNoaXRlY3R1cmUgb3BlbiBlbm91Z2ggdG8gc3VwcG9y
dCBib3RoLg0KDQogICBSb24NCg0KDQotLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTog
c2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBIYWVmZm5lciwg
V2FsdGVyLCBWb2RhZm9uZSBERQ0KU2VudDogV2VkbmVzZGF5LCBOb3ZlbWJlciAxOCwgMjAxNSA5
OjA0IEFNDQpUbzogQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpIDxjcGlnbmF0YUBjaXNjby5j
b20+OyBKb2VsIEhhbHBlcm4gPGpvZWwuaGFscGVybkBlcmljc3Nvbi5jb20+DQpDYzogc2ZjIGlz
c3VlIHRyYWNrZXIgPHRyYWMrc2ZjQHRvb2xzLmlldGYub3JnPjsgc2ZjQGlldGYub3JnOyBQYXVs
IFF1aW5uIChwYXVscSkgPHBhdWxxQGNpc2NvLmNvbT47IGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wt
cGxhbmVAdG9vbHMuaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybiA8am1oQGpvZWxoYWxwZXJuLmNv
bT47IE1lZCBCb3VjYWRhaXIgPG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20+DQpTdWJqZWN0
OiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFu
ZSBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQoNCkhJIENhcmxvcywgZGVhciBh
bGwsDQoNCk1heWJlIGl0IGlzIHRoZSBuYW1pbmcgYW5kIHRoZSBleHRyZW1lIGdlbmVyYWxpemF0
aW9uIGluIHNvbWUgSURzIHdoaWNoIHJlb3BlbmVkIHRoZSBkaXNjdXNzaW9uLg0KDQpNeSBjdXJy
ZW50IChvYnZpb3VzKSBwaWN0dXJlIGlzOg0KDQoxLikgQSBzZXJ2aWNlIGRlc2NyaWJlZCBieSB3
aGF0IHdlIGNhbGwgcG9saWNpZXMgbWF5IHJlc3VsdCBpbiBhIGdyYXBoIChTRkcpIGFuZCBicmFu
Y2hpbmcgY29uZGl0aW9ucy4NCg0KMi4pIEFsbG93ZWQgc2VydmljZSBjaGFpbnMgYXJlIHdhbGtz
IHRocm91Z2ggdGhhdCBncmFwaCBmdWxmaWxsaW5nIHRoZSBwb2xpY3kgcnVsZXMuIFNGRyAtPiBT
RkMgPSAxOm4uDQoNCjMuKSBBIHRvcG9sb2dpY2FsIChpbiB0aGUgc2Vuc2Ugb2YgYWJzdHJhY3Qp
IFNGQyBtYXkgYmUgbWFwcGVkIG9udG8gYSBzZXQgb2YgU0ZQcy4gU0ZDIC0+IFNGUCA9IDE6bS4N
Cg0KNC4pIFRoZSBTRlBzIG1heSAgc3RpbGwgaW5jbHVkZSBzb21lIGRlZ3JlZXMgb2YgZnJlZWRv
bSAocm91dGluZyB0byBkaWZmZXJlbnQgaW5zdGFuY2VzIG9mIFNGcyBldGMpLg0KDQo1LikgVGhl
cmVmb3JlIHRoZSBub3Rpb24gb2YgYSByZW5kZXJlZCBwYXRoIChSLVNGUCBvciBSU1ApIHdoaWNo
IGlzIHRoZSBmaW5hbCB1bmlxdWUgcGF0aCBmb3IgYSBjZXJ0YWluIGZsb3cuIFNGUCAtPiBSU1Ag
PSAxOnINCg0KSW4gdGhpcyBwaWN0dXJlIHRoZSBTRlAgZGVmaW5pdGlvbiBpcyBzb21ldGhpbmcg
aW4gYmV0d2VlbiBhIFNGQyBhbmQgdGhlIGV2ZW50dWFsIHJlbmRlcmVkIHBhdGguDQoNCklmIGFi
b3ZlICh0cml2aWFsKSAgaW50ZXJwcmV0YXRpb24gaXMgY29ycmVjdCBJIGNvdWxkIGFyZ3VlIHRo
YXQgZnJvbSB0aGUgbG9naWNhbCBwb2ludCBvZiB2aWV3IEkgY291bGQgdXNlIHRoZSBtYXBwaW5n
cw0KDQoxLikgU0ZDIC0+IFNGUCAtPiBSU1Agb3INCjIuKSBTRkMgLT4gUlNQIGRpcmVjdGx5Lg0K
DQpUbyBtZSB0aGUgcmVhbCB2YWx1ZSBvZiB0aGUgaW50ZXJtZWRpYXRlIFNGUCBpcyBub3Qgb2J2
aW91cyBmcm9tIHRoZSBsb2dpY2FsIHBvaW50IG9mIHZpZXcuIEZvciBzdXJlIGl0IG1heSBoZWxw
IGluIHRoZSBpbXBsZW1lbnRhdGlvbiBvZiBhbiBhYnN0cmFjdGlvbiBicmVha2Rvd24uDQpEbyBJ
IG1pc3Mgc29tZXRoaW5nPyBUaGUgcXVlc3Rpb24gU0ZQLUlEIG9yICBSU1AtSUQgc2VlbXMgdG8g
YmUgYWxzbyBhZGRyZXNzZWQgdG8gdGhlIFdHIGF0IHRoZSBlbmQgb2YgdGhlIE5TSCBkcmFmdC4N
Cg0KSWYgSSB3b3VsZCB1c2UgU0ZQIGluc3RlYWQgb2YgUlNQICBpbiB0aGUgTlNIIGFuZCBTRkYg
RlcgdGFibGVzIHRoZXJlIG1heSBiZSByZW1haW5pbmcgYW1iaWd1aXRpZXMgaW4gc2VsZWN0aW5n
IHRoZSBSU1AuDQpJbiB0aGlzIGNhc2UgSSBldmVuIGNvdWxkICB1c2UgYSBTRkMtSUQgIGluIE5T
SCBhbmQgYXNzdW1lIHRoZSBTRkYgaGFzIGFsbCB0aGUgaW50ZWxsaWdlbmNlIHRvIHJlc29sdmUg
dGhlIHBhdGggYW1iaWd1aXRpZXMuDQoNCkZvciBzdXJlIHlvdSBjb3VsZCBjb25zdHJ1Y3QgYW55
dGhpbmcgaW4gYmV0d2Vlbi4gQnV0IHRoaXMgaXMgcHJvYmFibHkgdGhlIG9yaWdpbiBvZiB0aGUg
cmVuZXdlZCBkaXNjdXNzaW9uLiBJbiB0aGF0IGxpZ2h0IGFuZCBhY2NlcHRpbmcgd2UgYXJlIG9y
Yml0aW5nICBJIHN1cHBvcnQgTWVkJ3MgYXR0ZW1wdCB0byBjbGFyaWZ5IHRoZXNlIHRvcGljcy4N
Cg0KQmVzdCByZWdhcmRzLA0KV2FsdGVyDQoNCg0KDQoNCi0tLS0tVXJzcHLDvG5nbGljaGUgTmFj
aHJpY2h0LS0tLS0NClZvbjogc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIEltIEF1
ZnRyYWcgdm9uIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKQ0KR2VzZW5kZXQ6IE1pdHR3b2No
LCAxOC4gTm92ZW1iZXIgMjAxNSAxMTo1Mg0KQW46IEpvZWwgSGFscGVybg0KQ2M6IHNmYyBpc3N1
ZSB0cmFja2VyOyBzZmNAaWV0Zi5vcmc7IFBhdWwgUXVpbm4gKHBhdWxxKTsgZHJhZnQtaWV0Zi1z
ZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuOyBNZWQgQm91
Y2FkYWlyDQpCZXRyZWZmOiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0
aGUgY29udHJvbCBwbGFuZSBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQoNCkkg
YW0gYSBiaXQgYmFmZmxlZCB0byBzZWUgdGhpcyB0aHJlYWQgYWdhaW4g4oCUIGl0IGFwcGVhcnMg
dGhlIGRpc2N1c3Npb24gcmVzdGFydGVkIHRvIGNvbnRpbnVlIGluIGNpcmNsZXMuDQoNCk1lZCwN
Cg0KSSB0b28gYWdyZWUgd2l0aCBKb2VsIGFuZCBzdHJvbmdseSBiZWxpZXZlIHRoZXJlIGlzIG5v
IG5lZWQgZm9yIFNGQyBpZGVudGlmaWNhdGlvbiBwYXNzZWQgZG93biDigJQgdGhlcmUgaXMgbm8g
cHJvdmlzaW9uaW5nIG9mIFNGQ3Mgc291dGhib3VuZC4NCg0KKEFsbW9zdCkgZXZlcnkgaW5zdGFu
Y2Ugb2Yg4oCcU0ZD4oCdIGluIHRoZSBjb250cm9sLXBsYW5lIHJlcXVpcmVtZW50cyBkcmFmdCBz
aG91bGQgcmVhbGx5IHNheSDigJxTRlDigJ0uIFRoZXJlIGlzIG5vIHVzZSBvZiB0YWxraW5nIGFi
b3V0IFNGQ3MgdG93YXJkcyB0aGUgZGF0YSBwbGFuZS4gVGhlIHJlbGF0aW9uc2hpcCBiZXR3ZWVu
IGNoYWlucyBhbmQgcGF0aHMgaXMgYSBwb2xpY3kgbWF0dGVyIHdoaWNoIGJlbG9uZ3MgaW4gdGhl
IHBvbGljeS9jb250cm9sIGl0c2VsZiwgYnV0IG5vdCBvdXQgb2YgdGhlcmUuDQoNClRoaXMgaXMg
bm8gZGlmZmVyZW50IHRoYW4gd2hhdCBJIHNhaWQgYSBmZXcgbW9udGhzIGFnbyBvbiB0aGUgc2Ft
ZSB0b3BpYy4NCg0KVGhhbmtzLA0KDQrigJQgQ2FybG9zLg0KDQo+IE9uIE5vdiAxNywgMjAxNSwg
YXQgOTowNiBBTSwgSm9lbCBIYWxwZXJuIDxqb2VsLmhhbHBlcm5AZXJpY3Nzb24uY29tPiB3cm90
ZToNCj4NCj4gV2hhdCBpcyBwcm92aXNpb25lZCBpbnRvIHRoZSBTRkYgcmVmbGVjdHMgdGhlIFNG
UC4gIFRoZSBjb250cm9sIHN5c3RlbSBkZWNpZGVzIHdoZXRoZXIgdGhhdCBTRlAgaW5kaWNhdGVz
IHRoZSBzYW1lIHNldCBvZiBhbGwgcG9zc2libGUgY2hvaWNlcyB0aGF0IHRoZSBTRkMgZG9lcywg
b3IgaXMgYSBwcm9wZXIgc3Vic2V0Lg0KPg0KPiBJbiBvcmRlciB0byBhbGxvdyBmb3IgYW4gU0ZQ
IHRoYXQgcmVmbGVjdHMgbWVhbmluZ2Z1bCBjb25zdHJhaW50cywgd2hhdCBpcyBwcm92aXNpb25l
ZCBoYXMgdG8gYmUgdGhlIFNGUC4NCj4gTm8gc3BlY2lhbCBwcm92aXNpb24gaXMgbmVlZGVkIGZv
ciB0aGUgY2FzZSB3aGVyZSB0aGUgU0ZQIGlzIGlzb21vcnBoaWMgdG8gdGhlIFNGQy4gSW4gc3Vj
aCBhIGNhc2UsIHlvdSBzdGlsbCBwcm92aXNpb24gdGhlIFNGUC4gIEFuZCB0aGUgcmVzdWx0IGlz
IGFuIFNGUCB3aXRoIGFzIG11Y2ggZmxleGliaWxpdHkgYXMgdGhlIFNGQy4NCj4NCj4gSWYsIGlu
IGNvbnRyYXN0LCB5b3UgZGVjbGFyZSB0aGF0IHRoZSBwcm92aXNpb25pbmcgaW5jbHVkZXMgdGhl
IFNGQyB0aGVuIHlvdSBhcmUgaW50cm9kdWNpbmcgZXh0cmEgY29tcGxleGl0eSB3aXRob3V0IGFk
ZGluZyBhbnkgbmV3IGNhc2VzIHRoYXQgY2FuIGJlIGhhbmRsZWQuDQo+DQo+IFlvdXJzLA0KPiBK
b2VsDQo+DQo+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+IEZyb206IG1vaGFtZWQuYm91
Y2FkYWlyQG9yYW5nZS5jb20NCj4gW21haWx0bzptb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29t
XQ0KPiBTZW50OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA5OjAzIEFNDQo+IFRvOiBKb2Vs
IEhhbHBlcm47IFBhdWwgUXVpbm4gKHBhdWxxKQ0KPiBDYzogc2ZjIGlzc3VlIHRyYWNrZXI7IGRy
YWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7DQo+IHNmY0BpZXRmLm9y
ZzsgSm9lbCBNLiBIYWxwZXJuDQo+IFN1YmplY3Q6IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxh
bmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJ
RHMsIGV0Yy4NCj4NCj4gSGkgSm9lbCwNCj4NCj4gUGxlYXNlIHNlZSBpbmxpbmUuDQo+DQo+IENo
ZWVycywNCj4gTWVkDQo+DQo+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+IERlIDog
Sm9lbCBIYWxwZXJuIFttYWlsdG86am9lbC5oYWxwZXJuQGVyaWNzc29uLmNvbV0NCj4+IEVudm95
w6kgOiBtYXJkaSAxNyBub3ZlbWJyZSAyMDE1IDE0OjQ5IMOAIDogQk9VQ0FEQUlSIE1vaGFtZWQg
SU1UL09MTjsgDQo+PiBQYXVsIFF1aW5uIChwYXVscSkgQ2MgOiBzZmMgaXNzdWUgdHJhY2tlcjsg
DQo+PiBkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOw0KPj4gc2Zj
QGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4+IE9iamV0IDogUkU6IFtzZmNdICMxNSAoY29u
dHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUgDQo+PiBvcGVyYXRlcyBvbiBT
RkMgSURzLCBTRlAgSURzLCBldGMuDQo+Pg0KPj4gWW91ciBzdGF0ZW1lbnQgdGhhdCAiIEl0IGhh
cHBlbnMgdGhhdCBpbmZvcm1hdGlvbiBpcyBubyBtb3JlIHRoYW4gdGhlIA0KPj4gc2VydmljZSBj
aGFpbiBpdHNlbGYgKHdpdGhvdXQgYW55IGNvbnN0cmFpbnRzKS4iIChXaGVyZSAiaXQiIHJlZmVy
cyB0byAiDQo+PiB0aGUgZXhhY3Qgc2VxdWVuY2Ugb2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFs
aXplIHRoZSBTRkMiLikgRG9lcyBub3QgDQo+PiBtYWtlIHNlbnNlIHRvIG1lLg0KPg0KPiBbTWVk
XSBSRkMgNzY2NSBzYXlzOg0KPg0KPiAiICAgVGh1cywgdGhlIHBvbGljaWVzIGFuZCBsb2dpYyBv
ZiBTRlAgc2VsZWN0aW9uIG9yIGNyZWF0aW9uIChkZXBlbmRpbmcNCj4gICB1cG9uIHRoZSBzb2x1
dGlvbikgcHJvZHVjZSB3aGF0IG1heSBiZSB0aG91Z2h0IG9mIGFzIGEgY29uc3RyYWluZWQNCj4g
ICB2ZXJzaW9uIG9mIHRoZSBvcmlnaW5hbCBTRkMuICINCj4NCj4gaW4gc2hvcnQ6IFNGUCBpcyBk
ZWZpbmVkIGFzIGEgY29uc3RyYWluZWQgdmVyc2lvbiBvZiB0aGUgb3JpZ2luYWwgU0ZDLg0KPg0K
PiBXaGF0IGlzIHRoZSBuYW1lIHRvIHVzZSB0byByZWZlciB0byBhICJub24tY29uc3RyYWluZWQi
IFNGQyBvciB0byB0aGUgaW5mb3JtYXRpb24gdGhhdCB5b3Ugd2lsbCBwcm92aXNpb24gdG8gYW4g
U0ZGIHdoZW4gdGhlIHBhdGggY29tcHV0YXRpb24gYW5kIHNlbGVjdGlvbiBkZWNpc2lvbiBpcyAi
ZGVmZXJyZWQgdG8gdGhlIFNGRiI/DQo+DQo+IEl0IGRvZXMgbm90IG1ha2Ugc2Vuc2UgdG8gY2Fs
bCBhIG5vbi1jb25zdHJhaW5lZCB2ZXJzaW9uIG9mIHRoZSBTRkMgYXMgU0ZQIGdpdmVuIHRoYXQg
UkZDNzY2NSBleHBsaWNpdGx5IGRlZmluZXMgU0ZQIGFzICJjb25zdHJhaW5lZCB2ZXJzaW9uIG9m
IHRoZSBvcmlnaW5hbCBTRkMiIQ0KPg0KPiBUaGUgU0ZDIGlzIHRoZSBnZW5lcmFsIGRlc2NyaXB0
aW9uIG9mIHRoZSBvYmplY3RpdmUuICBUaGF0DQo+PiBpcyBub3QgdGhlIHNhbWUgYXMgdGhlIGV4
YWN0IHNlcXVlbmNlIG9mIHBsYWNlcyB0aGF0IG11c3QgYmUgdmlzaXRlZC4NCj4+DQo+PiBJIHN0
YW5kIGJ5IG15IGVhcmxpZXIgY29tbWVudHMgdGhhdCBhbG1vc3QgYWxsIHVzZXMgb2YgU0ZDIGlu
IHRoZSANCj4+IGNvbnRyb2wgcmVxdWlyZW1lbnRzIGRyYWZ0IHNob3VsZCBiZSBTRlAuDQo+Pg0K
Pg0KPiBbTWVkXSBJIG5vdGVkIHRoYXQgSm9lbC4uIHRoYXQncyBmYWlyIGJ1dCB0aGlzIHBvc2l0
aW9uIGlzIElNSE8gbm90IGFsaWduZWQgd2l0aCBSRkM3NjY1IHRoYXQgYWxsb3dzIHRvIGNvbnRy
b2wgYW55IHZhcmlhdGlvbiBmcm9tIGEgbm9uLWNvbnN0cmFpbmVkIFNGQyB0byBhIGZ1bGx5IGNv
bnN0cmFpbmVkIFNGQy4NCj4NCj4+IFlvdXJzLA0KPj4gSm9lbA0KPj4NCj4+IC0tLS0tT3JpZ2lu
YWwgTWVzc2FnZS0tLS0tDQo+PiBGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+
PiBbbWFpbHRvOm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb21dDQo+PiBTZW50OiBUdWVzZGF5
LCBOb3ZlbWJlciAxNywgMjAxNSA4OjM0IEFNDQo+PiBUbzogUGF1bCBRdWlubiAocGF1bHEpDQo+
PiBDYzogc2ZjIGlzc3VlIHRyYWNrZXI7IGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9v
bHMuaWV0Zi5vcmc7DQo+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPj4gU3ViamVj
dDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxh
bmUgDQo+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+Pg0KPj4gSGkgUGF1
bCwNCj4+DQo+PiBUaGFuayB5b3UgZm9yIHNoYXJpbmcgeW91ciBmZWVkYmFjay4NCj4+DQo+PiBS
RkM3NjY1IHNheXMgdGhlIGZvbGxvd2luZzoNCj4+DQo+PiAiDQo+PiBUaGlzIGFyY2hpdGVjdHVy
ZSBkb2VzIG5vdCBtYW5kYXRlIHRoZSBkZWdyZWUgb2YNCj4+ICAgc3BlY2lmaWNpdHkgb2YgdGhl
IFNGUC4gIEFyY2hpdGVjdHVyYWxseSwgd2l0aGluIHRoZSBzYW1lIFNGQy1lbmFibGVkDQo+PiAg
IGRvbWFpbiwgc29tZSBTRlBzIG1heSBiZSBmdWxseSBzcGVjaWZpZWQsIHNlbGVjdGluZyBleGFj
dGx5IHdoaWNoIFNGRg0KPj4gICBhbmQgd2hpY2ggU0YgYXJlIHRvIGJlIHZpc2l0ZWQgYnkgcGFj
a2V0cyB1c2luZyB0aGF0IFNGUCwgd2hpbGUgb3RoZXINCj4+ICAgU0ZQcyBtYXkgYmUgcXVpdGUg
dmFndWUsIGRlZmVycmluZyB0byB0aGUgU0ZGIHRoZSBkZWNpc2lvbnMgYWJvdXQgdGhlDQo+PiAg
IGV4YWN0IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDLiAg
VGhlDQo+PiAgIHNwZWNpZmljaXR5IG1heSBiZSBhbnl3aGVyZSBpbiBiZXR3ZWVuIHRoZXNlIGV4
dHJlbWVzLg0KPj4gIg0KPj4NCj4+IFRoZSBjb250cm9sIGRyYWZ0IGlzIGNvbXBsZXRlbHkgYWxp
Z25lZCB3aXRoIHRoYXQgYXBwcm9hY2guDQo+Pg0KPj4gVGhlIGNvbnRyb2wtcGxhbmUgZG9jdW1l
bnQgYWxsb3dzIGluIHBhcnRpY3VsYXIgdG8gcHJvdmlzaW9uIHJlcXVpcmVkIA0KPj4gaW5mb3Jt
YXRpb24gd2hlbiAiZGVmZXJyaW5nIHRvIHRoZSBTRkYgdGhlIGRlY2lzaW9ucyBhYm91dCB0aGUN
Cj4+ICAgZXhhY3Qgc2VxdWVuY2Ugb2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFsaXplIHRoZSBT
RkMiLiBJdCBoYXBwZW5zIA0KPj4gdGhhdCBpbmZvcm1hdGlvbiBpcyBubyBtb3JlIHRoYW4gdGhl
IHNlcnZpY2UgY2hhaW4gaXRzZWxmICh3aXRob3V0IA0KPj4gYW55IGNvbnN0cmFpbnRzKS4NCj4+
DQo+PiBBbHNvLCB0aGUgY3VycmVudCBjb250cm9sLXBsYW5lIGRvY3VtZW50IGFsbG93cyB0byBp
bnN0cnVjdCBhIGxvb3NlIA0KPj4gcGF0aA0KPj4gKFNGUCkgb3IgYSBzdHJpY3QgcGF0aCAoUlNQ
KSwgZXRjLg0KPj4NCj4+IEkgZnVsbHkgYWdyZWUgdGhhdCB3aGV0aGVyIGEgZnVsbCBwYXRoIGlz
IHNwZWNpZmllZCB3aXRoaW4gYSBkb21haW4gDQo+PiBvciBpZiBpdCBpcyBkZWZlcnJlZCB0byBT
RkZzIGlzIHJlYWxseSBkZXBsb3ltZW50LXNwZWNpZmljLg0KPj4gTmV2ZXJ0aGVsZXNzLCB0aGUg
Y29udHJvbCBwbGFuIHNob3VsZCBhY2NvbW1vZGF0ZSBhbGwgdGhlc2UgZmxhdm9ycy4NCj4+DQo+
PiBDaGVlcnMsDQo+PiBNZWQNCj4+DQo+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+
Pj4gRGUgOiBQYXVsIFF1aW5uIChwYXVscSkgW21haWx0bzpwYXVscUBjaXNjby5jb21dIEVudm95
w6kgOiB2ZW5kcmVkaQ0KPj4+IDE2IG9jdG9icmUgMjAxNSAxNDowNCDDgCA6IEpvZWwgTS4gSGFs
cGVybiBDYyA6IEJPVUNBREFJUiBNb2hhbWVkIA0KPj4+IElNVC9PTE47IHNmYyBpc3N1ZSB0cmFj
a2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLSANCj4+PiBwbGFuZUB0b29scy5pZXRmLm9yZzsg
c2ZjQGlldGYub3JnIE9iamV0IDogUmU6IFtzZmNdICMxNQ0KPj4+IChjb250cm9sLXBsYW5lKTog
V2hldGhlciB0aGUgY29udHJvbCBwbGFuZSBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBl
dGMuDQo+Pj4NCj4+PiBKb2VsLA0KPj4+DQo+Pj4gSSBjb25jdXIuDQo+Pj4NCj4+PiBUaGUgZGF0
YSBwbGFuZSBkZWFsIHdpdGggcGF0aHMsIG5vdCBjaGFpbnMuICBUaGUgcmVsYXRpb25zaGlwIG9m
IA0KPj4+IHBhdGhzIHRvIGNoYWlucyBmYWxscyBzcXVhcmVseSBpbiB0aGUgY29udHJvbCBwbGFu
ZSAob3IgZXZlbiBtb3JlIA0KPj4+IGxpa2VseQ0KPj4gInBvbGljeSINCj4+PiBwbGFuZSkgcmVh
bG0uICBUaGUgc3BlY2lmaWNpdHkgb2YgdGhlIHBhdGggaXMgbGVmdCB0byANCj4+PiBpbXBsZW1l
bnRhdGlvbiwgaW4gdGhlIGFyY2hpdGVjdHVyZSBkcmFmdCwgYnV0IHRoYXQncyBjb25zaXN0ZW50
IA0KPj4+IHdpdGggeW91ciBwb3NpdGlvbiBhbmQgcHJvdmlkZXMgdGhlIHJlcXVpc2l0ZSBmdW5j
dGlvbmFsaXR5Lg0KPj4+DQo+Pj4gUGF1bA0KPj4+DQo+Pj4+IE9uIFNlcCAxNywgMjAxNSwgYXQg
MTE6MzYgQU0sIEpvZWwgTS4gSGFscGVybiA8am1oQGpvZWxoYWxwZXJuLmNvbT4NCj4+PiB3cm90
ZToNCj4+Pj4NCj4+Pj4gQXMgZmFyIGFzIEkgY2FuIHRlbGwsIHRoZXJlIGlzIG5vdGhpbmcgaW4g
dGhlIFNlcnZpY2UgQ2hhaW5pbmcgd29yayANCj4+Pj4gdGhhdA0KPj4+IHJlcXVpcmVzIGNvcnJl
bGF0aW5nIHNlcnZpY2UgcGF0aCBJRHMgd2l0aCBzZXJ2aWNlIGNoYWluIElEcyB3aXRoaW4gDQo+
Pj4gdGhlIGRhdGEgcGxhbmUuICBBbnkgc3VjaCByZWxhdGlvbnNoaXAgZXhpc3RzIGVudGlyZWx5
IHdpdGhpbiB0aGUgDQo+Pj4gY29udHJvbCBwbGFuZSBvciBhYm92ZSwgYW5kIHdvdWxkIGJlIGRy
aXZlbiBieSByZXF1aXJlbWVudHMgb3RoZXIgDQo+Pj4gdGhhbiB0aGUgZGF0YSBwbGFuZS4gIFdo
ZW4gSSBsb29rIGF0IHRoaXMgZG9jdW1lbnQsIGFsbCBvZiB0aGUgDQo+Pj4gcmVxdWlyZW1lbnRz
IHRoYXQgdGFsayBhYm91dCBzZXJ2aWNlIGZ1bmN0aW9uIGNoYWluIElEcyBjYW4gYmUgDQo+Pj4g
YWNjdXJhdGVseSBjYXB0dXJlZCwgaW4gdGVybXMgb2YgZGF0YSBwbGFuZSByZXF1aXJlbWVudHMs
IGJ5IHNlcnZpY2UgZnVuY3Rpb24gcGF0aCBJRHMuDQo+Pj4gVGh1cywgdGhlIHJlcXVpcmVtZW50
IHRoYXQgdGhlIGRhdGEgcGxhbmUgaGFzIGlzIHRvIHNlZSBzdWNoIHBhdGggSURzLg0KPj4+IFll
cywgaW4gc29tZSBkZXBsb3ltZW50cyB0aG9zZSB3aWxsIGJlIDEtMSB3aXRoIGNoYWluIElEcy4g
IFRoZXkgYXJlDQo+PiBzdGlsbCBwYXRoIElEcy4NCj4+Pj4NCj4+Pj4gSW50cm9kdWNpbmcgYSBy
ZXF1aXJlbWVudCBmb3IgdGhlIGRhdGEgcGxhbmUgdG8gc2VlIGFuZCB3b3JrIHdpdGggDQo+Pj4+
IGNoYWluDQo+Pj4gSURzIGlzIG5vdCBncm91bmRlZCBpbiB0aGUgd29yayBvZiB0aGUgZ3JvdXAu
DQo+Pj4+DQo+Pj4+IFlvdXJzLA0KPj4+PiBKb2VsIE0uIEhhbHBlcm4NCj4+Pj4NCj4+Pj4gT24g
OS8xNy8xNSA3OjUzIEFNLCBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tIHdyb3RlOg0KPj4+
Pj4gUmUtLA0KPj4+Pj4NCj4+Pj4+IFRoZSBjb250cm9sIGRyYWZ0IGFzIGl0IHN0YW5kcyBpcyBj
b21wbGlhbnQgd2l0aCB0aGUgZGF0YSBwbGFuZQ0KPj4+IGFyY2hpdGVjdHVyZSBkb2N1bWVudC4N
Cj4+Pj4+DQo+Pj4+PiBJbmRlZWQsIHRoZSBhcmNoIGRyYWZ0IGFja25vd2xlZGdlcyB0aGUgZm9s
bG93aW5nOg0KPj4+Pj4gKDEpIFNGUHMgYXJlICJhc3NvY2lhdGVkIHdpdGggYSBnaXZlbiBTRkMi
Lg0KPj4+Pj4gKDIpIFNGUHMgYXJlIHByZXNlbnRlZCBhcyBhIGZvcm0gb2YgY29uc3RyYWluZWQg
U0ZDcy4NCj4+Pj4+ICgzKSBTb21lIGRlcGxveW1lbnRzIG1heSBub3QgaW1wb3NlIGFueSBjb25z
dHJhaW50IG9uIHRoZSBhYnN0cmFjdA0KPj4gU0ZDDQo+DQo+IF9fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+IHNmYyBtYWlsaW5nIGxpc3QNCj4gc2ZjQGll
dGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQoNCl9f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpzZmMgbWFpbGlu
ZyBsaXN0DQpzZmNAaWV0Zi5vcmcNCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGlu
Zm8vc2ZjDQo=


From nobody Wed Nov 18 09:28:12 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 026831A8ADF for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 09:28:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LM8VG7cr8rSC for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 09:28:07 -0800 (PST)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 178BA1A8A80 for <sfc@ietf.org>; Wed, 18 Nov 2015 09:28:06 -0800 (PST)
Received: from [85.158.136.83] by server-4.bemta-5.messagelabs.com id C7/8E-24856-325BC465; Wed, 18 Nov 2015 17:28:03 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-12.tower-36.messagelabs.com!1447867682!3125194!1
X-Originating-IP: [195.232.244.135]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1071 invoked from network); 18 Nov 2015 17:28:02 -0000
Received: from mailout03.vodafone.com (HELO mailout03.vodafone.com) (195.232.244.135) by server-12.tower-36.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP;  18 Nov 2015 17:28:02 -0000
Received: from mailint03.vodafone.com (mailint03.vodafone.com [195.232.244.200]) by mailout03.vodafone.com (Postfix) with ESMTP id 3p1B1G34fRz17HNQ; Wed, 18 Nov 2015 18:28:02 +0100 (CET)
Received: from mailint03.vodafone.com (localhost [127.0.0.1]) by mailint03.vodafone.com (Postfix) with ESMTP id 3p1B1G1lMHz16Lyx; Wed, 18 Nov 2015 18:28:02 +0100 (CET)
Received: from VOEXC05W.internal.vodafone.com (voexc05w.dc-ratingen.de [145.230.101.25]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint03.vodafone.com (Postfix) with ESMTPS id 3p1B1G1XvDz16MTx; Wed, 18 Nov 2015 18:28:02 +0100 (CET)
Received: from VOEXC24W.internal.vodafone.com (145.230.103.196) by VOEXC05W.internal.vodafone.com (145.230.101.25) with Microsoft SMTP Server (TLS) id 14.3.224.2; Wed, 18 Nov 2015 18:28:01 +0100
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by voexc24w ([145.230.103.196]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 18:28:01 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Joel Halpern <joel.halpern@ericsson.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYkZVTjntybIUigJGvi7m2/t54/Q+uAgAE4bQCAAD5zgIAtWD4AgDJ0eYCAAAQNgIAAA+EAgAAA+ACAAVwBgIAAKfuwgAAUdICAABGOUIAAGBcAgAAW6IA=
Date: Wed, 18 Nov 2015 17:28:01 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DFD98D@VOEXM20W.internal.vodafone.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local> <C8C844F84E550E43865561FAE104718579DF132D@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DD75@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E95DD75@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/oGeLQgWfyaftavksCm9dUhWEq1Y>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Med Boucadair <mohamed.boucadair@orange.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 17:28:11 -0000
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From nobody Wed Nov 18 09:50:19 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA07E1A01A5 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 09:50:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.783
X-Spam-Level: 
X-Spam-Status: No, score=-4.783 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_IMAGE_ONLY_32=0.001, HTML_IMAGE_RATIO_06=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aUwjNW5s2wya for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 09:50:15 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 002CF1A01A3 for <sfc@ietf.org>; Wed, 18 Nov 2015 09:50:14 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAN18644; Wed, 18 Nov 2015 17:50:12 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 17:50:11 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 09:50:08 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: question on the wording in draft-ietf-sfc-nsf-01
Thread-Index: AdEiKY+hv3Hb7xn6Qkqm/lQOpgx+sA==
Date: Wed, 18 Nov 2015 17:50:07 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA316C@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: multipart/related; boundary="_004_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.564CBA54.02CF, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 85728bc0c05e518f376058ec61893383
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1ARz2bWBH29xcoFUzTqtea72DJA>
Subject: [sfc] question on the wording in draft-ietf-sfc-nsf-01
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 17:50:17 -0000

--_004_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_
Content-Type: multipart/alternative;
	boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_"

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Paul and Uri,

The Section 3.2 of  draft-ietf-sfc-nsf-01 says:


[cid:image001.png@01D121F7.4505ECF0]


If an implementation supports MD-Type =3D 0x2, then it is not supporting MD=
-Type =3D 0x1. So what does it mean by saying "Must Support"?

Can you clarify?

Thanks, Linda

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"2050" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Paul and Uri, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The Section 3.2 of &nbsp;draft-ietf-sfc-nsf-01 says:=
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><img width=3D"758" height=3D"58" id=3D"Picture_x0020=
_1" src=3D"cid:image001.png@01D121F7.4505ECF0"><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">If an implementation supports MD-Type =3D 0x2, then =
it is not supporting MD-Type =3D 0x1. So what does it mean by saying &quot;=
Must Support&quot;?<o:p></o:p></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt"><o:p>&nbsp;</o:p=
></span></b></p>
<p class=3D"MsoNormal">Can you clarify? <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks, Linda <o:p></o:p></p>
</div>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_--

--_004_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=14919;
	creation-date="Wed, 18 Nov 2015 17:50:07 GMT";
	modification-date="Wed, 18 Nov 2015 17:50:07 GMT"
Content-ID: <image001.png@01D121F7.4505ECF0>
Content-Transfer-Encoding: base64
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--_004_4A95BA014132FF49AE685FAB4B9F17F657DA316Cdfweml701chm_--


From nobody Wed Nov 18 10:11:57 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92A381A1AE6 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 10:11:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OZ5WxvoZcZdh for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 10:11:53 -0800 (PST)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B9A71A1A99 for <sfc@ietf.org>; Wed, 18 Nov 2015 10:11:52 -0800 (PST)
Received: from [85.158.139.163] by server-6.bemta-5.messagelabs.com id EE/A9-22089-76FBC465; Wed, 18 Nov 2015 18:11:51 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-12.tower-188.messagelabs.com!1447870310!1950307!1
X-Originating-IP: [195.232.244.136]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32664 invoked from network); 18 Nov 2015 18:11:50 -0000
Received: from mailout04.vodafone.com (HELO mailout04.vodafone.com) (195.232.244.136) by server-12.tower-188.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP;  18 Nov 2015 18:11:50 -0000
Received: from mailint02.vodafone.com (mailint02.vodafone.com [195.232.244.199]) by mailout04.vodafone.com (Postfix) with ESMTP id 3p1Bzp2jZ8znTYS; Wed, 18 Nov 2015 19:11:50 +0100 (CET)
Received: from mailint02.vodafone.com (localhost [127.0.0.1]) by mailint02.vodafone.com (Postfix) with ESMTP id 3p1Bzp1ZVxzQqdZ; Wed, 18 Nov 2015 19:11:50 +0100 (CET)
Received: from VOEXC01W.internal.vodafone.com (voexc01w.dc-ratingen.de [145.230.101.21]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint02.vodafone.com (Postfix) with ESMTPS id 3p1Bzp18S3zQn2V; Wed, 18 Nov 2015 19:11:50 +0100 (CET)
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by VOEXC01W.internal.vodafone.com ([145.230.101.21]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 19:11:49 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: "Andrew G. Malis" <agmalis@gmail.com>, BOUCADAIR Mohamed IMT/OLN <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
Thread-Index: AQHQ8dhuVcsfbuHPCUyXPiqk0Lu9RJ6hxKeAgABjUYCAAE1mUA==
Date: Wed, 18 Nov 2015 18:11:49 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DFDA77@VOEXM20W.internal.vodafone.com>
References: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <CAA=duU0mWn0noU7rF4RFiJhnLSBY4csF15v81QxEWFQp4-pVrw@mail.gmail.com>
In-Reply-To: <CAA=duU0mWn0noU7rF4RFiJhnLSBY4csF15v81QxEWFQp4-pVrw@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_C8C844F84E550E43865561FAE104718579DFDA77VOEXM20Winterna_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/3fy9X1VmGN6V6GIT_QMDXrXwVkY>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Linda Dunbar \(linda.dunbar@huawei.com\)" <linda.dunbar@huawei.com>
Subject: Re: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 18:11:56 -0000

--_000_C8C844F84E550E43865561FAE104718579DFDA77VOEXM20Winterna_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C8C844F84E550E43865561FAE104718579DFDA77VOEXM20Winterna_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C8C844F84E550E43865561FAE104718579DFDA77VOEXM20Winterna_--


From nobody Wed Nov 18 10:24:18 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 858491A1BC9 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 10:24:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oNihgqqJskvZ for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 10:24:10 -0800 (PST)
Received: from mail1.bemta14.messagelabs.com (mail1.bemta14.messagelabs.com [193.109.254.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA27E1A1BC8 for <sfc@ietf.org>; Wed, 18 Nov 2015 10:24:09 -0800 (PST)
Received: from [193.109.255.99] by server-7.bemta-14.messagelabs.com id DA/C8-28221-742CC465; Wed, 18 Nov 2015 18:24:07 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-14.tower-48.messagelabs.com!1447871045!9086453!1
X-Originating-IP: [195.232.244.135]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13403 invoked from network); 18 Nov 2015 18:24:05 -0000
Received: from mailout03.vodafone.com (HELO mailout03.vodafone.com) (195.232.244.135) by server-14.tower-48.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP;  18 Nov 2015 18:24:05 -0000
Received: from mailint02.vodafone.com (mailint02.vodafone.com [195.232.244.199]) by mailout03.vodafone.com (Postfix) with ESMTP id 3p1CFx26FNz17HLl; Wed, 18 Nov 2015 19:24:05 +0100 (CET)
Received: from mailint02.vodafone.com (localhost [127.0.0.1]) by mailint02.vodafone.com (Postfix) with ESMTP id 3p1CFx12r9zQrcT; Wed, 18 Nov 2015 19:24:05 +0100 (CET)
Received: from VOEXC03W.internal.vodafone.com (voexc03w.dc-ratingen.de [145.230.101.23]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint02.vodafone.com (Postfix) with ESMTPS id 3p1CFx0b75zQs0t; Wed, 18 Nov 2015 19:24:05 +0100 (CET)
Received: from VOEXC07W.internal.vodafone.com (145.230.101.27) by VOEXC03W.internal.vodafone.com (145.230.101.23) with Microsoft SMTP Server (TLS) id 14.3.224.2; Wed, 18 Nov 2015 19:24:04 +0100
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by VOEXC07W.internal.vodafone.com ([145.230.101.27]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 19:24:04 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Joel Halpern <joel.halpern@ericsson.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYkZVTjntybIUigJGvi7m2/t54/Q+uAgAE4bQCAAD5zgIAtWD4AgDJ0eYCAAAQNgIAAA+EAgAAA+ACAAAYXAIAA4ewAgAEAEBA=
Date: Wed, 18 Nov 2015 18:24:03 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DFDAB0@VOEXM20W.internal.vodafone.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F48D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <564BF6F2.7060904@joelhalpern.com>
In-Reply-To: <564BF6F2.7060904@joelhalpern.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qWmMMGDICZEBHS2T8UWVTcKL_fc>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 18:24:16 -0000

Hi Joel,

You say " A Service Function Chain (SFC) effectively designates a (potentia=
lly large) collection of sequences of SFF and SF visitations, any one of wh=
ich would satisfy the the SFC".

Shouldn't we say <<<< A Service Function Chain (SFC) effectively designates=
 a (potentially large) collection of sequences of SFF and SF visitations, a=
ny one of which MUST satisfy the POLICIES DESCRIBING THE SERVICE >>>>.=20

At the moment your statement reads to me more like (if you allow a dramatic=
 simplification) a SFC is defined by a SFC. I am sure that's not what you h=
ad in mind.

Cheers,
Walter


-----Urspr=FCngliche Nachricht-----
Von: sfc [mailto:sfc-bounces@ietf.org] Im Auftrag von Joel M. Halpern
Gesendet: Mittwoch, 18. November 2015 04:57
An: mohamed.boucadair@orange.com; Joel Halpern; Paul Quinn (paulq)
Cc: draft-ietf-sfc-control-plane@tools.ietf.org; Joel M. Halpern; sfc issue=
 tracker; sfc@ietf.org
Betreff: Re: [sfc] #15 (control-plane): Whether the control plane operates =
on SFC IDs, SFP IDs, etc.

Let me trying phrasing this differently.
A Service Function Chain (SFC) effectively designates a (potentially
large) collection of sequences of SFF and SF visitations, any one of which =
would satisfy the the SFC.

An Service Function Path (SFP) designates a subset of the collection design=
ated by the SFC. For some SFPs, in some deployments, that will be a set of =
1.  For other SFPs (in the same or other deployments) it may be a larger se=
t.  For some SFPs in some deployments the SFP may designate the same set of=
 choices as the SFC.

Formally, the SFP is a subset of the SFC, but not necessarily a proper subs=
et.

By always having control provision in terms of SFPs, the data plane always =
sees the effects of the constraints that control has placed in selecting th=
e SFP.  And because of the definition of SFP, this allows the range of depl=
ooyments the working group has requested.

Add SFC information into the provisioning does not increase the capability.=
  It does not, in fact, add any information tha thte forwarding can use.

Yours,
Joel

On 11/17/15 9:27 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
> Thank you for engaging.
>
> Please see inline.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>> Envoy=E9 : mardi 17 novembre 2015 15:06 =C0 : BOUCADAIR Mohamed IMT/OLN;=
=20
>> Paul Quinn (paulq) Cc : sfc issue tracker;=20
>> draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane=20
>> operates on SFC IDs, SFP IDs, etc.
>>
>> What is provisioned into the SFF reflects the SFP.
>
> [Med] Which one? Given than multiple SFPs may be bound to the same SFC
>
> Excerpt from RFC7665:
>
> " Since multiple policies may apply to
>     different traffic that uses the same SFC, it also follows that there
>     may be multiple SFPs associated with a single SFC."
>
> The text talks about policies that are applied to the traffic whiteout an=
y precision where these policies are applied.
>
>    The control system
>> decides whether that SFP indicates the same set of all possible=20
>> choices that the SFC does, or is a proper subset.
>
> [Med] That's indeed a valid case. The control plane accommodates that cas=
e.
>
>>
>> In order to allow for an SFP that reflects meaningful constraints,=20
>> what is provisioned has to be the SFP.
>
> [Med] I would call that RSP. That's more clear.
>
>> No special provision is needed for the case where the SFP is=20
>> isomorphic to the SFC. In such a case, you still provision the SFP. =20
>> And the result is an SFP with as much flexibility as the SFC.
>
> [Med] This is confusing, Joel. SFP cannot be isomorphic to the SFC as the=
 definition of an SFP is a "constrained version of SFC" (that is clearly me=
ntioned in RFC7665). I'm for more consistency in the use of the notions we =
are manipulating.
>
>>
>> If, in contrast, you declare that the provisioning includes the SFC=20
>> then you are introducing extra complexity without adding any new=20
>> cases that can be handled.
>
> [Med] I'm not sure to see this extra complexity. I do even see benefits i=
n having access to the SFC information allows, e.g., correlate between a se=
rvice path and a chain in deployments where a path may be shared among mult=
iple chains.
>
>>
>> Yours,
>> Joel
>>
>> -----Original Message-----
>> From: mohamed.boucadair@orange.com=20
>> [mailto:mohamed.boucadair@orange.com]
>> Sent: Tuesday, November 17, 2015 9:03 AM
>> To: Joel Halpern; Paul Quinn (paulq)
>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>> sfc@ietf.org; Joel M. Halpern
>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane=20
>> operates on SFC IDs, SFP IDs, etc.
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>> Envoy=E9 : mardi 17 novembre 2015 14:49 =C0 : BOUCADAIR Mohamed IMT/OLN=
;=20
>>> Paul Quinn (paulq) Cc : sfc issue tracker;=20
>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>> sfc@ietf.org; Joel M. Halpern
>>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane=20
>>> operates on SFC IDs, SFP IDs, etc.
>>>
>>> Your statement that " It happens that information is no more than=20
>>> the service chain itself (without any constraints)." (Where "it" refers=
 to "
>>> the exact sequence of steps to be used to realize the SFC".) Does=20
>>> not make sense to me.
>>
>> [Med] RFC 7665 says:
>>
>> "   Thus, the policies and logic of SFP selection or creation (depending
>>     upon the solution) produce what may be thought of as a constrained
>>     version of the original SFC. "
>>
>> in short: SFP is defined as a constrained version of the original SFC.
>>
>> What is the name to use to refer to a "non-constrained" SFC or to the=20
>> information that you will provision to an SFF when the path=20
>> computation and selection decision is "deferred to the SFF"?
>>
>> It does not make sense to call a non-constrained version of the SFC=20
>> as SFP given that RFC7665 explicitly defines SFP as "constrained=20
>> version of the original SFC"!
>>
>>   The SFC is the general description of the objective.  That
>>> is not the same as the exact sequence of places that must be visited.
>>>
>>> I stand by my earlier comments that almost all uses of SFC in the=20
>>> control requirements draft should be SFP.
>>>
>>
>> [Med] I noted that Joel.. that's fair but this position is IMHO not=20
>> aligned with RFC7665 that allows to control any variation from a non-=20
>> constrained SFC to a fully constrained SFC.
>>
>>> Yours,
>>> Joel
>>>
>>> -----Original Message-----
>>> From: mohamed.boucadair@orange.com
>>> [mailto:mohamed.boucadair@orange.com]
>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>> To: Paul Quinn (paulq)
>>> Cc: sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>> sfc@ietf.org; Joel M. Halpern
>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane=20
>>> operates on SFC IDs, SFP IDs, etc.
>>>
>>> Hi Paul,
>>>
>>> Thank you for sharing your feedback.
>>>
>>> RFC7665 says the following:
>>>
>>> "
>>> This architecture does not mandate the degree of
>>>     specificity of the SFP.  Architecturally, within the same SFC-enabl=
ed
>>>     domain, some SFPs may be fully specified, selecting exactly which S=
FF
>>>     and which SF are to be visited by packets using that SFP, while oth=
er
>>>     SFPs may be quite vague, deferring to the SFF the decisions about t=
he
>>>     exact sequence of steps to be used to realize the SFC.  The
>>>     specificity may be anywhere in between these extremes.
>>> "
>>>
>>> The control draft is completely aligned with that approach.
>>>
>>> The control-plane document allows in particular to provision=20
>>> required information when "deferring to the SFF the decisions about the
>>>     exact sequence of steps to be used to realize the SFC". It=20
>>> happens that information is no more than the service chain itself=20
>>> (without any constraints).
>>>
>>> Also, the current control-plane document allows to instruct a loose=20
>>> path
>>> (SFP) or a strict path (RSP), etc.
>>>
>>> I fully agree that whether a full path is specified within a domain=20
>>> or if it is deferred to SFFs is really deployment-specific.=20
>>> Nevertheless, the control plan should accommodate all these flavors.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9 : vendredi
>>>> 16 octobre 2015 14:04 =C0 : Joel M. Halpern Cc : BOUCADAIR Mohamed=20
>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-=20
>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>> (control-plane): Whether the control plane operates on SFC IDs, SFP
>> IDs, etc.
>>>>
>>>> Joel,
>>>>
>>>> I concur.
>>>>
>>>> The data plane deal with paths, not chains.  The relationship of=20
>>>> paths to chains falls squarely in the control plane (or even more=20
>>>> likely
>>> "policy"
>>>> plane) realm.  The specificity of the path is left to=20
>>>> implementation, in the architecture draft, but that's consistent=20
>>>> with your position and provides the requisite functionality.
>>>>
>>>> Paul
>>>>
>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern=20
>>>>> <jmh@joelhalpern.com>
>>>> wrote:
>>>>>
>>>>> As far as I can tell, there is nothing in the Service Chaining=20
>>>>> work that
>>>> requires correlating service path IDs with service chain IDs within=20
>>>> the data plane.  Any such relationship exists entirely within the=20
>>>> control plane or above, and would be driven by requirements other=20
>>>> than the data plane.  When I look at this document, all of the=20
>>>> requirements that talk about service function chain IDs can be=20
>>>> accurately captured, in terms of data plane requirements, by=20
>>>> service
>> function path IDs.
>>>> Thus, the requirement that the data plane has is to see such path IDs.
>>>> Yes, in some deployments those will be 1-1 with chain IDs.  They=20
>>>> are
>>> still path IDs.
>>>>>
>>>>> Introducing a requirement for the data plane to see and work with=20
>>>>> chain
>>>> IDs is not grounded in the work of the group.
>>>>>
>>>>> Yours,
>>>>> Joel M. Halpern
>>>>>
>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>> Re-,
>>>>>>
>>>>>> The control draft as it stands is compliant with the data plane
>>>> architecture document.
>>>>>>
>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>> (3) Some deployments may not impose any constraint on the=20
>>>>>> abstract
>>> SFC

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Nov 18 10:40:25 2015
Return-Path: <repenno@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 853651A6EF2 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 10:40:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ceLsbx8OC2lc for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 10:40:11 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30D651A1EF4 for <sfc@ietf.org>; Wed, 18 Nov 2015 10:40:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22990; q=dns/txt; s=iport; t=1447872011; x=1449081611; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=c88vgaQjkvnVoFWfJO1Yk0JY+XcAePqjDCA1KF+uaeE=; b=GyOj6pzbbd5ZQrqtJs/qBaOC4e+uiBoI6K2jBsMbpMNa34IhedM78tf7 2g8eBvWW6uGPHN/tLAbo3mLR6EiVTstjQS6MbzQ1YeXEDcoeuo51c9wlh 3ZH2Cy4BuPMizS1OCbWdhOmmnjknm3xT/VMrxnqRhn63FPVIboiYNioD9 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AoAgCYxUxW/4cNJK1egztTbwa+XAENg?= =?us-ascii?q?WUXCoVuAhyBNDgUAQEBAQEBAX8LhDQBAQEEAQEBIAQNOgQTBAIBCBEBAwEBAQI?= =?us-ascii?q?CIwMCAgIlCxQBAgYIAgQTG4gTDa8YkEcBAQEBAQEBAQEBAQEBAQEBAQEBAQEUB?= =?us-ascii?q?IEBhVOEfoRhECICgmCBRAWNHIkuAYgRhRmBW4RAkjiDcQEfAQFCghEdFoFAcoQ?= =?us-ascii?q?FgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,314,1444694400"; d="scan'208";a="209729676"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 18 Nov 2015 18:40:09 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by alln-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id tAIIe93o026821 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Wed, 18 Nov 2015 18:40:09 GMT
Received: from xch-rcd-009.cisco.com (173.37.102.19) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 12:40:08 -0600
Received: from xch-rcd-009.cisco.com ([173.37.102.19]) by XCH-RCD-009.cisco.com ([173.37.102.19]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 12:40:08 -0600
From: "Reinaldo Penno (repenno)" <repenno@cisco.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAI54gIAAA+EAgAAA+ACAAVwAgIAANaeA//+BgMCAAJq2gP//js/wgABsh4D//41HgAAAGD2A
Date: Wed, 18 Nov 2015 18:40:08 +0000
Message-ID: <D27205DB.1E03D%repenno@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <C8C844F84E550E43865561FAE104718579DF1117@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DB8B@MBX021-W3-CA-2.exch021.domain.local> <C8C844F84E550E43865561FAE104718579DF132D@VOEXM20W.internal.vodafone.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E95DD75@MBX021-W3-CA-2.exch021.domain.local> <C8C844F84E550E43865561FAE104718579DFD98D@VOEXM20W.internal.vodafone.com> <D2720259.1E01B%repenno@cisco.com>
In-Reply-To: <D2720259.1E01B%repenno@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.113.151]
Content-Type: text/plain; charset="utf-8"
Content-ID: <8969D076302F504FB4B14DB00E3C9D7E@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/K82L8RoZboJ-P_x8AL7k-2POq5c>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 18:40:17 -0000
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From nobody Wed Nov 18 11:34:20 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6625B1A9077 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 11:34:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.185
X-Spam-Level: 
X-Spam-Status: No, score=-3.185 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hBF2flL1hOCe for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 11:34:15 -0800 (PST)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 293E31A9075 for <sfc@ietf.org>; Wed, 18 Nov 2015 11:34:14 -0800 (PST)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-2.sandvine.com (192.168.194.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 18 Nov 2015 14:34:16 -0500
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Wed, 18 Nov 2015 14:34:15 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YA==
Date: Wed, 18 Nov 2015 19:34:15 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com>
In-Reply-To: <D2720C4C.2F7CA%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Tk-j_77Y6_UAWTYRTjdIFg59PCU>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 19:34:18 -0000
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From nobody Wed Nov 18 12:10:51 2015
Return-Path: <repenno@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE3CC1ACCFB for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:10:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rXoBxj6yCf9O for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:10:45 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 912701AC82C for <sfc@ietf.org>; Wed, 18 Nov 2015 12:10:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=23076; q=dns/txt; s=iport; t=1447877445; x=1449087045; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=+bmR6F2k1O86cY2vzEOb+mf4/k8C9e/QowXFAfpiN14=; b=Z//SmxBtArcHb9UV2wGGJh93dTWakP0DkopWadOQtZLyn6hfWOf3F9aY DvfELgKVoh3WppDIKydI255bwqvxNq6LYIYhAxuMewQe+dgPvhj/6tZy9 GJAIx+s2DYAA23T2G6rwaKD+Z2Yk9AdvNDN1h/nMpJDJcMi1RzK9eYCCD s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AoAgB92kxW/49dJa1egztTbwa+XgENg?= =?us-ascii?q?WUXCoVuAhyBNDgUAQEBAQEBAYEKhDQBAQEEAQEBIAQNOgQHDAQCAQYCDgMBAgE?= =?us-ascii?q?BAQECAiMDAgICJQsUAQIGCAIEAQ0FG4gTDZF/nTWQQQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBARQEgQGFU4R+hCkwGIMEgUQBBI0ciS4BiBGFGYFbhECSOINxAR8BAUK?= =?us-ascii?q?CER0WgUByhAWBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,314,1444694400"; d="scan'208";a="45987223"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Nov 2015 20:10:43 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id tAIKAhsk032507 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 18 Nov 2015 20:10:44 GMT
Received: from xch-rcd-009.cisco.com (173.37.102.19) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 14:10:42 -0600
Received: from xch-rcd-009.cisco.com ([173.37.102.19]) by XCH-RCD-009.cisco.com ([173.37.102.19]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 14:10:42 -0600
From: "Reinaldo Penno (repenno)" <repenno@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YP//7D0A
Date: Wed, 18 Nov 2015 20:10:42 +0000
Message-ID: <D2721ABA.1E057%repenno@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.70.239]
Content-Type: text/plain; charset="utf-8"
Content-ID: <3F96E36D17637E49995473871C260546@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/K59dU1BPmy6vuPe7e4-H9dhb7ow>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:10:50 -0000
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==


From nobody Wed Nov 18 12:15:48 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3FBD1ACE8C for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:15:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mjwZLpJ5HaaV for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:15:44 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 490841ACEC9 for <sfc@ietf.org>; Wed, 18 Nov 2015 12:15:44 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 3979A24D4D4; Wed, 18 Nov 2015 12:15:44 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 89D372404CF; Wed, 18 Nov 2015 12:15:43 -0800 (PST)
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>, Dave Dolson <ddolson@sandvine.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <D2721ABA.1E057%repenno@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <564CDC6E.5070606@joelhalpern.com>
Date: Wed, 18 Nov 2015 15:15:42 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <D2721ABA.1E057%repenno@cisco.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/_BVxmkQFWdXuFpyxbzDSbuuppJo>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:15:47 -0000

What the working group asked was that the archtiecture and protocol 
support this option.

There are multiple ways that an SFF supporting multiple RSP per SFP 
could be implemented.  My current understanding is that we do not plan 
to mandate a technique.  All the approaches I know of require that the 
SFF look at some additional information beyond the SFP-ID and SFP-Index.

Yours,
Joel

On 11/18/15 3:10 PM, Reinaldo Penno (repenno) wrote:
> "- although two packets have the same SPI, they may traverse different
> RSPs.â€
>
> hummmâ€¦I do not see how this can be achieved today.
>
> I know you can classify on 5-tuple or others, but what is the solution to
> achieve what you say above within the confines of NSH? Where is the ID
> that will allow you to demux between two packets that have the same SP but
> traverse different RSPs.
>
> On 11/18/15, 11:34 AM, "sfc on behalf of Dave Dolson"
> <sfc-bounces@ietf.org on behalf of ddolson@sandvine.com> wrote:
>
>> [reduced distribution to Jim & sfc list]
>>
>> Jim,
>> I think your description is helpful. Can we find a place for this in the
>> docs?
>>
>> I don't think I can understand it without referring to the concrete NSH,
>> however.
>>
>>
>> If I understand correctly, the following are true:
>> - if the NSH SPI in two packets are the same, they are on the same SFP.
>> - if the NSH SPI in two packets are different, they are on different SFPs.
>> - although two packets have the same SPI, they may traverse different
>> RSPs.
>>
>> - when thinking of the data-plane and south-bound interfaces C1 thru C4,
>> the SFC concept doesn't exist.
>>    (SFC is just a north-interface concept like, "chain A provides a
>> firewall and a NAT")
>>
>> Have I got it right?
>>
>>
>> I also think the following *analogy* with routing can be drawn:
>> SFC <--> destination host name
>> SFP <--> destination IP address
>> RSP <--> sequence of routers and links to deliver the IP packet
>>
>>
>> -Dave
>>
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard
>> (jguichar)
>> Sent: Wednesday, November 18, 2015 11:18 AM
>> To: Carlos Pignataro (cpignata); mohamed.boucadair@orange.com
>> Cc: sfc issue tracker; sfc@ietf.org; Paul Quinn (paulq);
>> draft-ietf-sfc-control-plane@tools.ietf.org; Joel Halpern; Joel M. Halpern
>> Subject: Re: [sfc] #15 (control-plane): Whether the control plane
>> operates on SFC IDs, SFP IDs, etc.
>>
>> [Chair hat off â€¦]
>>
>> I have to say I am struggling to see the â€œissueâ€ in this thread that needs
>> to be addressed other than confusion over SFC vs SFP definition; from a
>> data plane perspective it is *very* clear that SFP/SI identifiers are used
>> as the lookup key into a forwarding construct that may contain 1:n number
>> of next-hops (SFFs, SFs). In some cases that lookup will point to a single
>> next-hop, in others multiple next-hops. In *all* cases this has absolutely
>> nothing to do with the SFC as each representation of that SFC is uniquely
>> identified by an SFP-id.
>>
>> Jim
>>
>> On 11/18/15, 10:19 AM, "sfc on behalf of Carlos Pignataro (cpignata)"
>> <sfc-bounces@ietf.org on behalf of cpignata@cisco.com> wrote:
>>
>>> Hi, Med,
>>>
>>> I also referred to other parts of the document, when I wrote:
>>>
>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>> planeÂ²
>>>
>>>
>>> For example, I am not sure I understand what this means:
>>>
>>> "   o  Populate SFC forwarding policy tables of involved SFC data planeÂ²
>>>
>>>
>>> Or at:
>>> "   o  SFC Forwarding Policy Table: this table reflects the SFC-specific
>>>      traffic forwarding policy enforced by SFF components for every
>>>      relevant incoming packet that is associated to one of the existing
>>>      SFCs."
>>>
>>>
>>> My comment is that those should be Â³SFP"
>>>
>>> Thanks,
>>>
>>> â€¹ Carlos.
>>>
>>> -----Original Message-----
>>> From: Med Boucadair <mohamed.boucadair@orange.com>
>>> Date: Wednesday, November 18, 2015 at 10:03 AM
>>> To: Carlos Pignataro <cpignata@cisco.com>
>>> Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
>>> "draft-ietf-sfc-control-plane@tools.ietf.org"
>>> <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
>>> <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>,
>>> "sfc@ietf.org" <sfc@ietf.org>, Joel Halpern <joel.halpern@ericsson.com>
>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>> operates
>>> on SFC IDs, SFP IDs, etc.
>>>
>>>> Carlos,
>>>>
>>>> There is not SFC ID in the core text of the control plane draft.
>>>>
>>>> The text you quoted is part of an appendix with a note that clearly
>>>> states this is not discussed. A corresponding issue record has been
>>>> recorded to seek for more feedback on that appendix.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>> EnvoyÃ© : mercredi 18 novembre 2015 15:35
>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>>> Cc : Paul Quinn (paulq); draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>> Joel
>>>>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>> on SFC IDs, SFP IDs, etc.
>>>>>
>>>>> Med,
>>>>>
>>>>>> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>>>>>>
>>>>>> Carlos,
>>>>>>
>>>>>> This is an open issue for this draft, so it is normal to continue
>>>>> discussing it. I don't know how you can conclude in advance that we
>>>>> are
>>>>> circling.
>>>>>>
>>>>>
>>>>> Discussion is great, Med. But my Å’we are circling' comment (not in
>>>>> advanced, but already evident) is because I saw the same questions,
>>>>> same
>>>>> arguments, and same answers as before.
>>>>>
>>>>>> "strongly believe" is not a technical argument, btw.
>>>>>>
>>>>>
>>>>> Well, I believe so on technical grounds! Most of which have already
>>>>> been
>>>>> said, so I do not want to contribute to the circular discussion.
>>>>>
>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>> planeÂ²,
>>>>> and Â³SFC IDsÂ². The architecture says that SFC are made of abstract
>>>>> service
>>>>> functions. ThereÂ¹s no actual forwarding in this abstract conceptual
>>>>> model.
>>>>>
>>>>> The control-plane draft says Â³Suppose the SFC ID for this SFP is
>>>>> "yellowÂ²,Â², and my point again is that in the data plane an SFP has an
>>>>> identifier (which identifies the SFP (SFP-ID) and is not the
>>>>> identifier
>>>>> of
>>>>> something else, itÂ¹s not a Topology-ID, itÂ¹s not a SKU, itÂ¹s not a
>>>>> URI,
>>>>> itÂ¹s not a Family Name, and not an SFC ID), and the control (and
>>>>> policy)
>>>>> plane can of course work with SFCs.
>>>>>
>>>>> My $0.02.
>>>>>
>>>>> Thanks,
>>>>>
>>>>> â€¹ Carlos.
>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 11:52
>>>>>>> Ã€ : Joel Halpern
>>>>>>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-sfc-
>>>>>>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>>>>>>> sfc@ietf.org
>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>
>>>>>>> I am a bit baffled to see this thread again â€¹ it appears the
>>>>> discussion
>>>>>>> restarted to continue in circles.
>>>>>>>
>>>>>>> Med,
>>>>>>>
>>>>>>> I too agree with Joel and strongly believe there is no need for SFC
>>>>>>> identification passed down â€¹ there is no provisioning of SFCs
>>>>> southbound.
>>>>>>>
>>>>>>> (Almost) every instance of Â³SFCÂ² in the control-plane requirements
>>>>> draft
>>>>>>> should really say Â³SFPÂ². There is no use of talking about SFCs
>>>>> towards
>>>>> the
>>>>>>> data plane. The relationship between chains and paths is a policy
>>>>> matter
>>>>>>> which belongs in the policy/control itself, but not out of there.
>>>>>>>
>>>>>>> This is no different than what I said a few months ago on the same
>>>>> topic.
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>> â€¹ Carlos.
>>>>>>>
>>>>>>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>>>>> <joel.halpern@ericsson.com>
>>>>>>> wrote:
>>>>>>>>
>>>>>>>> What is provisioned into the SFF reflects the SFP.  The control
>>>>> system
>>>>>>> decides whether that SFP indicates the same set of all possible
>>>>> choices
>>>>>>> that the SFC does, or is a proper subset.
>>>>>>>>
>>>>>>>> In order to allow for an SFP that reflects meaningful constraints,
>>>>> what
>>>>>>> is provisioned has to be the SFP.
>>>>>>>> No special provision is needed for the case where the SFP is
>>>>> isomorphic
>>>>>>> to the SFC. In such a case, you still provision the SFP.  And the
>>>>> result
>>>>>>> is an SFP with as much flexibility as the SFC.
>>>>>>>>
>>>>>>>> If, in contrast, you declare that the provisioning includes the
>>>>> SFC
>>>>> then
>>>>>>> you are introducing extra complexity without adding any new cases
>>>>> that
>>>>> can
>>>>>>> be handled.
>>>>>>>>
>>>>>>>> Yours,
>>>>>>>> Joel
>>>>>>>>
>>>>>>>> -----Original Message-----
>>>>>>>> From: mohamed.boucadair@orange.com
>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>>>>>>> To: Joel Halpern; Paul Quinn (paulq)
>>>>>>>> Cc: sfc issue tracker;
>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>
>>>>>>>> Hi Joel,
>>>>>>>>
>>>>>>>> Please see inline.
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>>>>>>> EnvoyÃ© : mardi 17 novembre 2015 14:49
>>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc issue
>>>>>>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>> Objet : RE: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>
>>>>>>>>> Your statement that " It happens that information is no more than
>>>>> the
>>>>>>>>> service chain itself (without any constraints)." (Where "it"
>>>>> refers
>>>>> to
>>>>>>> "
>>>>>>>>> the exact sequence of steps to be used to realize the SFC".) Does
>>>>> not
>>>>>>>>> make sense to me.
>>>>>>>>
>>>>>>>> [Med] RFC 7665 says:
>>>>>>>>
>>>>>>>> "   Thus, the policies and logic of SFP selection or creation
>>>>> (depending
>>>>>>>>   upon the solution) produce what may be thought of as a
>>>>> constrained
>>>>>>>>   version of the original SFC. "
>>>>>>>>
>>>>>>>> in short: SFP is defined as a constrained version of the original
>>>>> SFC.
>>>>>>>>
>>>>>>>> What is the name to use to refer to a "non-constrained" SFC or to
>>>>> the
>>>>>>> information that you will provision to an SFF when the path
>>>>> computation
>>>>>>> and selection decision is "deferred to the SFF"?
>>>>>>>>
>>>>>>>> It does not make sense to call a non-constrained version of the
>>>>> SFC
>>>>> as
>>>>>>> SFP given that RFC7665 explicitly defines SFP as "constrained
>>>>> version
>>>>> of
>>>>>>> the original SFC"!
>>>>>>>>
>>>>>>>> The SFC is the general description of the objective.  That
>>>>>>>>> is not the same as the exact sequence of places that must be
>>>>> visited.
>>>>>>>>>
>>>>>>>>> I stand by my earlier comments that almost all uses of SFC in the
>>>>>>>>> control requirements draft should be SFP.
>>>>>>>>>
>>>>>>>>
>>>>>>>> [Med] I noted that Joel.. that's fair but this position is IMHO
>>>>> not
>>>>>>> aligned with RFC7665 that allows to control any variation from a
>>>>> non-
>>>>>>> constrained SFC to a fully constrained SFC.
>>>>>>>>
>>>>>>>>> Yours,
>>>>>>>>> Joel
>>>>>>>>>
>>>>>>>>> -----Original Message-----
>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>>>>>>> To: Paul Quinn (paulq)
>>>>>>>>> Cc: sfc issue tracker;
>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>
>>>>>>>>> Hi Paul,
>>>>>>>>>
>>>>>>>>> Thank you for sharing your feedback.
>>>>>>>>>
>>>>>>>>> RFC7665 says the following:
>>>>>>>>>
>>>>>>>>> "
>>>>>>>>> This architecture does not mandate the degree of
>>>>>>>>>   specificity of the SFP.  Architecturally, within the same SFC-
>>>>> enabled
>>>>>>>>>   domain, some SFPs may be fully specified, selecting exactly
>>>>> which
>>>>> SFF
>>>>>>>>>   and which SF are to be visited by packets using that SFP, while
>>>>> other
>>>>>>>>>   SFPs may be quite vague, deferring to the SFF the decisions
>>>>> about
>>>>> the
>>>>>>>>>   exact sequence of steps to be used to realize the SFC.  The
>>>>>>>>>   specificity may be anywhere in between these extremes.
>>>>>>>>> "
>>>>>>>>>
>>>>>>>>> The control draft is completely aligned with that approach.
>>>>>>>>>
>>>>>>>>> The control-plane document allows in particular to provision
>>>>> required
>>>>>>>>> information when "deferring to the SFF the decisions about the
>>>>>>>>>   exact sequence of steps to be used to realize the SFC". It
>>>>> happens
>>>>>>>>> that information is no more than the service chain itself
>>>>> (without
>>>>> any
>>>>>>>>> constraints).
>>>>>>>>>
>>>>>>>>> Also, the current control-plane document allows to instruct a
>>>>> loose
>>>>>>>>> path
>>>>>>>>> (SFP) or a strict path (RSP), etc.
>>>>>>>>>
>>>>>>>>> I fully agree that whether a full path is specified within a
>>>>> domain
>>>>> or
>>>>>>>>> if it is deferred to SFFs is really deployment-specific.
>>>>> Nevertheless,
>>>>>>>>> the control plan should accommodate all these flavors.
>>>>>>>>>
>>>>>>>>> Cheers,
>>>>>>>>> Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] EnvoyÃ© :
>>>>> vendredi
>>>>>>>>>> 16 octobre 2015 14:04 Ã€ : Joel M. Halpern Cc : BOUCADAIR Mohamed
>>>>>>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>>>>>>>> (control-plane): Whether the control plane operates on SFC IDs,
>>>>> SFP
>>>>>>> IDs, etc.
>>>>>>>>>>
>>>>>>>>>> Joel,
>>>>>>>>>>
>>>>>>>>>> I concur.
>>>>>>>>>>
>>>>>>>>>> The data plane deal with paths, not chains.  The relationship of
>>>>>>>>>> paths to chains falls squarely in the control plane (or even
>>>>> more
>>>>>>>>>> likely
>>>>>>>>> "policy"
>>>>>>>>>> plane) realm.  The specificity of the path is left to
>>>>>>>>>> implementation, in the architecture draft, but that's consistent
>>>>>>>>>> with your position and provides the requisite functionality.
>>>>>>>>>>
>>>>>>>>>> Paul
>>>>>>>>>>
>>>>>>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>>>>>>> <jmh@joelhalpern.com>
>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>> As far as I can tell, there is nothing in the Service Chaining
>>>>>>>>>>> work that
>>>>>>>>>> requires correlating service path IDs with service chain IDs
>>>>> within
>>>>>>>>>> the data plane.  Any such relationship exists entirely within
>>>>> the
>>>>>>>>>> control plane or above, and would be driven by requirements
>>>>> other
>>>>>>>>>> than the data plane.  When I look at this document, all of the
>>>>>>>>>> requirements that talk about service function chain IDs can be
>>>>>>>>>> accurately captured, in terms of data plane requirements, by
>>>>> service
>>>>>>> function path IDs.
>>>>>>>>>> Thus, the requirement that the data plane has is to see such
>>>>> path
>>>>> IDs.
>>>>>>>>>> Yes, in some deployments those will be 1-1 with chain IDs.  They
>>>>> are
>>>>>>>>> still path IDs.
>>>>>>>>>>>
>>>>>>>>>>> Introducing a requirement for the data plane to see and work
>>>>> with
>>>>>>>>>>> chain
>>>>>>>>>> IDs is not grounded in the work of the group.
>>>>>>>>>>>
>>>>>>>>>>> Yours,
>>>>>>>>>>> Joel M. Halpern
>>>>>>>>>>>
>>>>>>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>>>> Re-,
>>>>>>>>>>>>
>>>>>>>>>>>> The control draft as it stands is compliant with the data
>>>>> plane
>>>>>>>>>> architecture document.
>>>>>>>>>>>>
>>>>>>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>>>>>>>> abstract
>>>>>>>>> SFC
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Nov 18 12:20:38 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A44701AD06E for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:20:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.785
X-Spam-Level: 
X-Spam-Status: No, score=-4.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JFgZ4yaKlwhY for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:20:27 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E21871AD0C2 for <sfc@ietf.org>; Wed, 18 Nov 2015 12:20:26 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEH53436; Wed, 18 Nov 2015 20:20:23 +0000 (GMT)
Received: from DFWEML702-CHM.china.huawei.com (10.193.5.72) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 20:20:23 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml702-chm ([10.193.5.72]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 12:20:16 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Andrew G. Malis" <agmalis@gmail.com>, BOUCADAIR Mohamed IMT/OLN <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
Thread-Index: AQHQ8dhspZs2K5mvM0WjD4/IjUzcZZ6hxKXQgAD6M4D//9pgoA==
Date: Wed, 18 Nov 2015 20:20:16 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA32C3@dfweml701-chm>
References: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <CAA=duU0mWn0noU7rF4RFiJhnLSBY4csF15v81QxEWFQp4-pVrw@mail.gmail.com>
In-Reply-To: <CAA=duU0mWn0noU7rF4RFiJhnLSBY4csF15v81QxEWFQp4-pVrw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657DA32C3dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090204.564CDD88.00E0, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 4bd7adaae00518e9af29f532b52a0e77
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/k7w0Ztligpxo4uhh5OIK1f2jQVY>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:20:31 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA32C3dfweml701chm_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4A95BA014132FF49AE685FAB4B9F17F657DA32C3dfweml701chm_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4A95BA014132FF49AE685FAB4B9F17F657DA32C3dfweml701chm_--


From nobody Wed Nov 18 12:21:42 2015
Return-Path: <repenno@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2B501AD16B for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:21:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SALZF7d9jn9B for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:21:38 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 12AA51AD0C2 for <sfc@ietf.org>; Wed, 18 Nov 2015 12:21:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26122; q=dns/txt; s=iport; t=1447878098; x=1449087698; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=7MuwtU+EiE2xTzUVon3O81zMYykBoErzIjOOAU+XApQ=; b=HiBmOjlQpyG9rgn5h4BbdEnVEiJCY2KJX6JI/xK9b/CIV+TGWFoVXwQz omo7jLGdknqXNO9flTbM2RwB06kfdt59HBwngZoMRYnf/hofiDTCxCMMM A/2lqiNPqNvkMMDL9MYtljRg8CWkwfFf5tSPv4/wtfzpVwwr6B/y/KCkn E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AoAgBE3UxW/49dJa1egztTbwa+YgENg?= =?us-ascii?q?WUXCoVuAhyBNDgUAQEBAQEBAYEKhDQBAQEEAQEBIAQNOgQHDAQCAQYCEQECAQE?= =?us-ascii?q?BAQICIwMCAgIlCxQBAgYIAgQBDQUbiBMNkgGdNZBCAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBFASBAYVThH6EKUiDBIFEAQSHR4VViS4BiBGFGYFbhECSOINxAR8BAUK?= =?us-ascii?q?CER0WgUByhAWBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,314,1444694400"; d="scan'208";a="209607760"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Nov 2015 20:21:36 +0000
Received: from XCH-ALN-008.cisco.com (xch-aln-008.cisco.com [173.36.7.18]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id tAIKLamd008201 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 18 Nov 2015 20:21:36 GMT
Received: from xch-rcd-009.cisco.com (173.37.102.19) by XCH-ALN-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 18 Nov 2015 14:21:35 -0600
Received: from xch-rcd-009.cisco.com ([173.37.102.19]) by XCH-RCD-009.cisco.com ([173.37.102.19]) with mapi id 15.00.1104.000; Wed, 18 Nov 2015 14:21:35 -0600
From: "Reinaldo Penno (repenno)" <repenno@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Dave Dolson <ddolson@sandvine.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YP//7D0AgACHhAD//3uFAA==
Date: Wed, 18 Nov 2015 20:21:35 +0000
Message-ID: <D2721CB2.1E06E%repenno@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <D2721ABA.1E057%repenno@cisco.com> <564CDC6E.5070606@joelhalpern.com>
In-Reply-To: <564CDC6E.5070606@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.70.239]
Content-Type: text/plain; charset="utf-8"
Content-ID: <202A20324550D54EAE15F09C94F69CEA@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1RMQfAA1-ssnAzNk3k0GNLMpoIo>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:21:42 -0000
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From nobody Wed Nov 18 12:26:05 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E122A1B29C1 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:26:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.185
X-Spam-Level: 
X-Spam-Status: No, score=-3.185 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 997lvbNjH0WN for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:26:00 -0800 (PST)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 29B7A1B29A5 for <sfc@ietf.org>; Wed, 18 Nov 2015 12:26:00 -0800 (PST)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-2.sandvine.com (192.168.194.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 18 Nov 2015 15:26:02 -0500
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Wed, 18 Nov 2015 15:26:01 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YP//7D0A///bIQA=
Date: Wed, 18 Nov 2015 20:26:01 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830DAD90F@wtl-exchp-2.sandvine.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <D2721ABA.1E057%repenno@cisco.com>
In-Reply-To: <D2721ABA.1E057%repenno@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/YoCgQtubyvIDt85KlmqQb5TMX40>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:26:04 -0000

SSdtIHRoaW5raW5nIG9mIGEgbG9hZC1iYWxhbmNpbmcgb3IgZmFpbC1vdmVyIHNvbHV0aW9uLCBp
biB3aGljaCBhbiBTRkYgY2FuIGNob29zZSBmcm9tIG9uZSBvciBtb3JlIFNGIGluc3RhbmNlcyBm
b3IgdGhlIHNhbWUgU1BJLg0KDQpJdCBkb2Vzbid0IG5lZWQgdG8gYmUgdmlzaWJsZSB0byB0aGUg
U0ZDIGNvbnRyb2xsZXIgYmVjYXVzZSB0aGUgb3V0Y29tZSBvZiBwcm9jZXNzaW5nIHdvdWxkIGJl
IGlkZW50aWNhbC4NCg0KSWYgdGhlc2UgYXJlbid0IGRpZmZlcmVudCBSU1BzIGZvciB0aGUgc2Ft
ZSBTRlAsIHRoZW4gd2hhdCBhcmU/DQoNCg0KDQotLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0K
RnJvbTogUmVpbmFsZG8gUGVubm8gKHJlcGVubm8pIFttYWlsdG86cmVwZW5ub0BjaXNjby5jb21d
IA0KU2VudDogV2VkbmVzZGF5LCBOb3ZlbWJlciAxOCwgMjAxNSAzOjExIFBNDQpUbzogRGF2ZSBE
b2xzb247IEppbSBHdWljaGFyZCAoamd1aWNoYXIpDQpDYzogc2ZjQGlldGYub3JnDQpTdWJqZWN0
OiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFu
ZSBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQoNCiItIGFsdGhvdWdoIHR3byBw
YWNrZXRzIGhhdmUgdGhlIHNhbWUgU1BJLCB0aGV5IG1heSB0cmF2ZXJzZSBkaWZmZXJlbnQNClJT
UHMu4oCdDQoNCmh1bW1t4oCmSSBkbyBub3Qgc2VlIGhvdyB0aGlzIGNhbiBiZSBhY2hpZXZlZCB0
b2RheS4NCg0KSSBrbm93IHlvdSBjYW4gY2xhc3NpZnkgb24gNS10dXBsZSBvciBvdGhlcnMsIGJ1
dCB3aGF0IGlzIHRoZSBzb2x1dGlvbiB0bw0KYWNoaWV2ZSB3aGF0IHlvdSBzYXkgYWJvdmUgd2l0
aGluIHRoZSBjb25maW5lcyBvZiBOU0g/IFdoZXJlIGlzIHRoZSBJRA0KdGhhdCB3aWxsIGFsbG93
IHlvdSB0byBkZW11eCBiZXR3ZWVuIHR3byBwYWNrZXRzIHRoYXQgaGF2ZSB0aGUgc2FtZSBTUCBi
dXQNCnRyYXZlcnNlIGRpZmZlcmVudCBSU1BzLg0KDQpPbiAxMS8xOC8xNSwgMTE6MzQgQU0sICJz
ZmMgb24gYmVoYWxmIG9mIERhdmUgRG9sc29uIg0KPHNmYy1ib3VuY2VzQGlldGYub3JnIG9uIGJl
aGFsZiBvZiBkZG9sc29uQHNhbmR2aW5lLmNvbT4gd3JvdGU6DQoNCj5bcmVkdWNlZCBkaXN0cmli
dXRpb24gdG8gSmltICYgc2ZjIGxpc3RdDQo+DQo+SmltLA0KPkkgdGhpbmsgeW91ciBkZXNjcmlw
dGlvbiBpcyBoZWxwZnVsLiBDYW4gd2UgZmluZCBhIHBsYWNlIGZvciB0aGlzIGluIHRoZQ0KPmRv
Y3M/DQo+DQo+SSBkb24ndCB0aGluayBJIGNhbiB1bmRlcnN0YW5kIGl0IHdpdGhvdXQgcmVmZXJy
aW5nIHRvIHRoZSBjb25jcmV0ZSBOU0gsDQo+aG93ZXZlci4NCj4NCj4NCj5JZiBJIHVuZGVyc3Rh
bmQgY29ycmVjdGx5LCB0aGUgZm9sbG93aW5nIGFyZSB0cnVlOg0KPi0gaWYgdGhlIE5TSCBTUEkg
aW4gdHdvIHBhY2tldHMgYXJlIHRoZSBzYW1lLCB0aGV5IGFyZSBvbiB0aGUgc2FtZSBTRlAuDQo+
LSBpZiB0aGUgTlNIIFNQSSBpbiB0d28gcGFja2V0cyBhcmUgZGlmZmVyZW50LCB0aGV5IGFyZSBv
biBkaWZmZXJlbnQgU0ZQcy4NCj4tIGFsdGhvdWdoIHR3byBwYWNrZXRzIGhhdmUgdGhlIHNhbWUg
U1BJLCB0aGV5IG1heSB0cmF2ZXJzZSBkaWZmZXJlbnQNCj5SU1BzLg0KPg0KPi0gd2hlbiB0aGlu
a2luZyBvZiB0aGUgZGF0YS1wbGFuZSBhbmQgc291dGgtYm91bmQgaW50ZXJmYWNlcyBDMSB0aHJ1
IEM0LA0KPnRoZSBTRkMgY29uY2VwdCBkb2Vzbid0IGV4aXN0Lg0KPiAgIChTRkMgaXMganVzdCBh
IG5vcnRoLWludGVyZmFjZSBjb25jZXB0IGxpa2UsICJjaGFpbiBBIHByb3ZpZGVzIGENCj5maXJl
d2FsbCBhbmQgYSBOQVQiKQ0KPg0KPkhhdmUgSSBnb3QgaXQgcmlnaHQ/DQo+DQo+DQo+SSBhbHNv
IHRoaW5rIHRoZSBmb2xsb3dpbmcgKmFuYWxvZ3kqIHdpdGggcm91dGluZyBjYW4gYmUgZHJhd246
DQo+U0ZDIDwtLT4gZGVzdGluYXRpb24gaG9zdCBuYW1lDQo+U0ZQIDwtLT4gZGVzdGluYXRpb24g
SVAgYWRkcmVzcw0KPlJTUCA8LS0+IHNlcXVlbmNlIG9mIHJvdXRlcnMgYW5kIGxpbmtzIHRvIGRl
bGl2ZXIgdGhlIElQIHBhY2tldA0KPg0KPg0KPi1EYXZlDQo+DQo+DQo+DQo+LS0tLS1PcmlnaW5h
bCBNZXNzYWdlLS0tLS0NCj5Gcm9tOiBzZmMgW21haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10g
T24gQmVoYWxmIE9mIEppbSBHdWljaGFyZA0KPihqZ3VpY2hhcikNCj5TZW50OiBXZWRuZXNkYXks
IE5vdmVtYmVyIDE4LCAyMDE1IDExOjE4IEFNDQo+VG86IENhcmxvcyBQaWduYXRhcm8gKGNwaWdu
YXRhKTsgbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbQ0KPkNjOiBzZmMgaXNzdWUgdHJhY2tl
cjsgc2ZjQGlldGYub3JnOyBQYXVsIFF1aW5uIChwYXVscSk7DQo+ZHJhZnQtaWV0Zi1zZmMtY29u
dHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgSm9lbCBIYWxwZXJuOyBKb2VsIE0uIEhhbHBlcm4N
Cj5TdWJqZWN0OiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29u
dHJvbCBwbGFuZQ0KPm9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4NCj5bQ2hh
aXIgaGF0IG9mZiDigKZdDQo+DQo+SSBoYXZlIHRvIHNheSBJIGFtIHN0cnVnZ2xpbmcgdG8gc2Vl
IHRoZSDigJxpc3N1ZeKAnSBpbiB0aGlzIHRocmVhZCB0aGF0IG5lZWRzDQo+dG8gYmUgYWRkcmVz
c2VkIG90aGVyIHRoYW4gY29uZnVzaW9uIG92ZXIgU0ZDIHZzIFNGUCBkZWZpbml0aW9uOyBmcm9t
IGENCj5kYXRhIHBsYW5lIHBlcnNwZWN0aXZlIGl0IGlzICp2ZXJ5KiBjbGVhciB0aGF0IFNGUC9T
SSBpZGVudGlmaWVycyBhcmUgdXNlZA0KPmFzIHRoZSBsb29rdXAga2V5IGludG8gYSBmb3J3YXJk
aW5nIGNvbnN0cnVjdCB0aGF0IG1heSBjb250YWluIDE6biBudW1iZXINCj5vZiBuZXh0LWhvcHMg
KFNGRnMsIFNGcykuIEluIHNvbWUgY2FzZXMgdGhhdCBsb29rdXAgd2lsbCBwb2ludCB0byBhIHNp
bmdsZQ0KPm5leHQtaG9wLCBpbiBvdGhlcnMgbXVsdGlwbGUgbmV4dC1ob3BzLiBJbiAqYWxsKiBj
YXNlcyB0aGlzIGhhcyBhYnNvbHV0ZWx5DQo+bm90aGluZyB0byBkbyB3aXRoIHRoZSBTRkMgYXMg
ZWFjaCByZXByZXNlbnRhdGlvbiBvZiB0aGF0IFNGQyBpcyB1bmlxdWVseQ0KPmlkZW50aWZpZWQg
YnkgYW4gU0ZQLWlkLg0KPg0KPkppbSANCj4NCj5PbiAxMS8xOC8xNSwgMTA6MTkgQU0sICJzZmMg
b24gYmVoYWxmIG9mIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSINCj48c2ZjLWJvdW5jZXNA
aWV0Zi5vcmcgb24gYmVoYWxmIG9mIGNwaWduYXRhQGNpc2NvLmNvbT4gd3JvdGU6DQo+DQo+Pkhp
LCBNZWQsDQo+Pg0KPj5JIGFsc28gcmVmZXJyZWQgdG8gb3RoZXIgcGFydHMgb2YgdGhlIGRvY3Vt
ZW50LCB3aGVuIEkgd3JvdGU6DQo+Pg0KPj4+IFRoZSBjb250cm9sLXBsYW5lIGRyYWZ0IHRhbGtz
IGFib3V0IMKzU0ZDIGZvcndhcmRpbmfCsiBhbmQgwrNTRkMgZGF0YQ0KPj4+cGxhbmXCsg0KPj4N
Cj4+DQo+PkZvciBleGFtcGxlLCBJIGFtIG5vdCBzdXJlIEkgdW5kZXJzdGFuZCB3aGF0IHRoaXMg
bWVhbnM6DQo+Pg0KPj4iICAgbyAgUG9wdWxhdGUgU0ZDIGZvcndhcmRpbmcgcG9saWN5IHRhYmxl
cyBvZiBpbnZvbHZlZCBTRkMgZGF0YSBwbGFuZcKyDQo+Pg0KPj4NCj4+T3IgYXQ6DQo+PiIgICBv
ICBTRkMgRm9yd2FyZGluZyBQb2xpY3kgVGFibGU6IHRoaXMgdGFibGUgcmVmbGVjdHMgdGhlIFNG
Qy1zcGVjaWZpYw0KPj4gICAgIHRyYWZmaWMgZm9yd2FyZGluZyBwb2xpY3kgZW5mb3JjZWQgYnkg
U0ZGIGNvbXBvbmVudHMgZm9yIGV2ZXJ5DQo+PiAgICAgcmVsZXZhbnQgaW5jb21pbmcgcGFja2V0
IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBvbmUgb2YgdGhlIGV4aXN0aW5nDQo+PiAgICAgU0ZDcy4i
DQo+Pg0KPj4NCj4+TXkgY29tbWVudCBpcyB0aGF0IHRob3NlIHNob3VsZCBiZSDCs1NGUCINCj4+
DQo+PlRoYW5rcywNCj4+DQo+PuKAuSBDYXJsb3MuDQo+Pg0KPj4tLS0tLU9yaWdpbmFsIE1lc3Nh
Z2UtLS0tLQ0KPj5Gcm9tOiBNZWQgQm91Y2FkYWlyIDxtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2Uu
Y29tPg0KPj5EYXRlOiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4LCAyMDE1IGF0IDEwOjAzIEFNDQo+
PlRvOiBDYXJsb3MgUGlnbmF0YXJvIDxjcGlnbmF0YUBjaXNjby5jb20+DQo+PkNjOiAiUGF1bCBR
dWlubiAocGF1bHEpIiA8cGF1bHFAY2lzY28uY29tPiwNCj4+ImRyYWZ0LWlldGYtc2ZjLWNvbnRy
b2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmciDQo+PjxkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5l
QHRvb2xzLmlldGYub3JnPiwgSm9lbCBIYWxwZXJuDQo+PjxqbWhAam9lbGhhbHBlcm4uY29tPiwg
c2ZjIGlzc3VlIHRyYWNrZXIgPHRyYWMrc2ZjQHRvb2xzLmlldGYub3JnPiwNCj4+InNmY0BpZXRm
Lm9yZyIgPHNmY0BpZXRmLm9yZz4sIEpvZWwgSGFscGVybiA8am9lbC5oYWxwZXJuQGVyaWNzc29u
LmNvbT4NCj4+U3ViamVjdDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIg
dGhlIGNvbnRyb2wgcGxhbmUNCj4+b3BlcmF0ZXMNCj4+b24gU0ZDIElEcywgU0ZQIElEcywgZXRj
Lg0KPj4NCj4+PkNhcmxvcywgDQo+Pj4NCj4+PlRoZXJlIGlzIG5vdCBTRkMgSUQgaW4gdGhlIGNv
cmUgdGV4dCBvZiB0aGUgY29udHJvbCBwbGFuZSBkcmFmdC4NCj4+Pg0KPj4+VGhlIHRleHQgeW91
IHF1b3RlZCBpcyBwYXJ0IG9mIGFuIGFwcGVuZGl4IHdpdGggYSBub3RlIHRoYXQgY2xlYXJseQ0K
Pj4+c3RhdGVzIHRoaXMgaXMgbm90IGRpc2N1c3NlZC4gQSBjb3JyZXNwb25kaW5nIGlzc3VlIHJl
Y29yZCBoYXMgYmVlbg0KPj4+cmVjb3JkZWQgdG8gc2VlayBmb3IgbW9yZSBmZWVkYmFjayBvbiB0
aGF0IGFwcGVuZGl4Lg0KPj4+DQo+Pj5DaGVlcnMsDQo+Pj5NZWQNCj4+Pg0KPj4+PiAtLS0tLU1l
c3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+Pj4gRGUgOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0
YSkgW21haWx0bzpjcGlnbmF0YUBjaXNjby5jb21dDQo+Pj4+IEVudm95w6kgOiBtZXJjcmVkaSAx
OCBub3ZlbWJyZSAyMDE1IDE1OjM1DQo+Pj4+IMOAIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09M
Tg0KPj4+PiBDYyA6IFBhdWwgUXVpbm4gKHBhdWxxKTsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1w
bGFuZUB0b29scy5pZXRmLm9yZzsNCj4+Pj5Kb2VsDQo+Pj4+IE0uIEhhbHBlcm47IHNmYyBpc3N1
ZSB0cmFja2VyOyBzZmNAaWV0Zi5vcmc7IEpvZWwgSGFscGVybg0KPj4+PiBPYmpldCA6IFJlOiBb
c2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lDQo+Pj4+
b3BlcmF0ZXMNCj4+Pj4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4+PiANCj4+Pj4gTWVk
LA0KPj4+PiANCj4+Pj4gPiBPbiBOb3YgMTgsIDIwMTUsIGF0IDg6MDggQU0sIG1vaGFtZWQuYm91
Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6DQo+Pj4+ID4NCj4+Pj4gPiBDYXJsb3MsDQo+Pj4+ID4N
Cj4+Pj4gPiBUaGlzIGlzIGFuIG9wZW4gaXNzdWUgZm9yIHRoaXMgZHJhZnQsIHNvIGl0IGlzIG5v
cm1hbCB0byBjb250aW51ZQ0KPj4+PiBkaXNjdXNzaW5nIGl0LiBJIGRvbid0IGtub3cgaG93IHlv
dSBjYW4gY29uY2x1ZGUgaW4gYWR2YW5jZSB0aGF0IHdlDQo+Pj4+YXJlDQo+Pj4+IGNpcmNsaW5n
Lg0KPj4+PiA+DQo+Pj4+IA0KPj4+PiBEaXNjdXNzaW9uIGlzIGdyZWF0LCBNZWQuIEJ1dCBteSDF
kndlIGFyZSBjaXJjbGluZycgY29tbWVudCAobm90IGluDQo+Pj4+IGFkdmFuY2VkLCBidXQgYWxy
ZWFkeSBldmlkZW50KSBpcyBiZWNhdXNlIEkgc2F3IHRoZSBzYW1lIHF1ZXN0aW9ucywNCj4+Pj5z
YW1lDQo+Pj4+IGFyZ3VtZW50cywgYW5kIHNhbWUgYW5zd2VycyBhcyBiZWZvcmUuDQo+Pj4+IA0K
Pj4+PiA+ICJzdHJvbmdseSBiZWxpZXZlIiBpcyBub3QgYSB0ZWNobmljYWwgYXJndW1lbnQsIGJ0
dy4NCj4+Pj4gPg0KPj4+PiANCj4+Pj4gV2VsbCwgSSBiZWxpZXZlIHNvIG9uIHRlY2huaWNhbCBn
cm91bmRzISBNb3N0IG9mIHdoaWNoIGhhdmUgYWxyZWFkeQ0KPj4+PmJlZW4NCj4+Pj4gc2FpZCwg
c28gSSBkbyBub3Qgd2FudCB0byBjb250cmlidXRlIHRvIHRoZSBjaXJjdWxhciBkaXNjdXNzaW9u
Lg0KPj4+PiANCj4+Pj4gVGhlIGNvbnRyb2wtcGxhbmUgZHJhZnQgdGFsa3MgYWJvdXQgwrNTRkMg
Zm9yd2FyZGluZ8KyIGFuZCDCs1NGQyBkYXRhDQo+Pj4+cGxhbmXCsiwNCj4+Pj4gYW5kIMKzU0ZD
IElEc8KyLiBUaGUgYXJjaGl0ZWN0dXJlIHNheXMgdGhhdCBTRkMgYXJlIG1hZGUgb2YgYWJzdHJh
Y3QNCj4+Pj5zZXJ2aWNlDQo+Pj4+IGZ1bmN0aW9ucy4gVGhlcmXCuXMgbm8gYWN0dWFsIGZvcndh
cmRpbmcgaW4gdGhpcyBhYnN0cmFjdCBjb25jZXB0dWFsDQo+Pj4+bW9kZWwuDQo+Pj4+IA0KPj4+
PiBUaGUgY29udHJvbC1wbGFuZSBkcmFmdCBzYXlzIMKzU3VwcG9zZSB0aGUgU0ZDIElEIGZvciB0
aGlzIFNGUCBpcw0KPj4+PiAieWVsbG93wrIswrIsIGFuZCBteSBwb2ludCBhZ2FpbiBpcyB0aGF0
IGluIHRoZSBkYXRhIHBsYW5lIGFuIFNGUCBoYXMgYW4NCj4+Pj4gaWRlbnRpZmllciAod2hpY2gg
aWRlbnRpZmllcyB0aGUgU0ZQIChTRlAtSUQpIGFuZCBpcyBub3QgdGhlDQo+Pj4+aWRlbnRpZmll
cg0KPj4+Pm9mDQo+Pj4+IHNvbWV0aGluZyBlbHNlLCBpdMK5cyBub3QgYSBUb3BvbG9neS1JRCwg
aXTCuXMgbm90IGEgU0tVLCBpdMK5cyBub3QgYQ0KPj4+PlVSSSwNCj4+Pj4gaXTCuXMgbm90IGEg
RmFtaWx5IE5hbWUsIGFuZCBub3QgYW4gU0ZDIElEKSwgYW5kIHRoZSBjb250cm9sIChhbmQNCj4+
Pj5wb2xpY3kpDQo+Pj4+IHBsYW5lIGNhbiBvZiBjb3Vyc2Ugd29yayB3aXRoIFNGQ3MuDQo+Pj4+
IA0KPj4+PiBNeSAkMC4wMi4NCj4+Pj4gDQo+Pj4+IFRoYW5rcywNCj4+Pj4gDQo+Pj4+IOKAuSBD
YXJsb3MuDQo+Pj4+IA0KPj4+PiA+IENoZWVycywNCj4+Pj4gPiBNZWQNCj4+Pj4gPg0KPj4+PiA+
PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+Pj4gPj4gRGUgOiBDYXJsb3MgUGlnbmF0
YXJvIChjcGlnbmF0YSkgW21haWx0bzpjcGlnbmF0YUBjaXNjby5jb21dDQo+Pj4+ID4+IEVudm95
w6kgOiBtZXJjcmVkaSAxOCBub3ZlbWJyZSAyMDE1IDExOjUyDQo+Pj4+ID4+IMOAIDogSm9lbCBI
YWxwZXJuDQo+Pj4+ID4+IENjIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlu
biAocGF1bHEpOyBkcmFmdC1pZXRmLXNmYy0NCj4+Pj4gPj4gY29udHJvbC1wbGFuZUB0b29scy5p
ZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuOyBzZmMgaXNzdWUgdHJhY2tlcjsNCj4+Pj4gPj4gc2Zj
QGlldGYub3JnDQo+Pj4+ID4+IE9iamV0IDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6
IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4+Pj4gb3BlcmF0ZXMNCj4+Pj4gPj4gb24gU0ZD
IElEcywgU0ZQIElEcywgZXRjLg0KPj4+PiA+Pg0KPj4+PiA+PiBJIGFtIGEgYml0IGJhZmZsZWQg
dG8gc2VlIHRoaXMgdGhyZWFkIGFnYWluIOKAuSBpdCBhcHBlYXJzIHRoZQ0KPj4+PmRpc2N1c3Np
b24NCj4+Pj4gPj4gcmVzdGFydGVkIHRvIGNvbnRpbnVlIGluIGNpcmNsZXMuDQo+Pj4+ID4+DQo+
Pj4+ID4+IE1lZCwNCj4+Pj4gPj4NCj4+Pj4gPj4gSSB0b28gYWdyZWUgd2l0aCBKb2VsIGFuZCBz
dHJvbmdseSBiZWxpZXZlIHRoZXJlIGlzIG5vIG5lZWQgZm9yIFNGQw0KPj4+PiA+PiBpZGVudGlm
aWNhdGlvbiBwYXNzZWQgZG93biDigLkgdGhlcmUgaXMgbm8gcHJvdmlzaW9uaW5nIG9mIFNGQ3MN
Cj4+Pj4gc291dGhib3VuZC4NCj4+Pj4gPj4NCj4+Pj4gPj4gKEFsbW9zdCkgZXZlcnkgaW5zdGFu
Y2Ugb2YgwrNTRkPCsiBpbiB0aGUgY29udHJvbC1wbGFuZSByZXF1aXJlbWVudHMNCj4+Pj4gZHJh
ZnQNCj4+Pj4gPj4gc2hvdWxkIHJlYWxseSBzYXkgwrNTRlDCsi4gVGhlcmUgaXMgbm8gdXNlIG9m
IHRhbGtpbmcgYWJvdXQgU0ZDcw0KPj4+PnRvd2FyZHMNCj4+Pj4gdGhlDQo+Pj4+ID4+IGRhdGEg
cGxhbmUuIFRoZSByZWxhdGlvbnNoaXAgYmV0d2VlbiBjaGFpbnMgYW5kIHBhdGhzIGlzIGEgcG9s
aWN5DQo+Pj4+IG1hdHRlcg0KPj4+PiA+PiB3aGljaCBiZWxvbmdzIGluIHRoZSBwb2xpY3kvY29u
dHJvbCBpdHNlbGYsIGJ1dCBub3Qgb3V0IG9mIHRoZXJlLg0KPj4+PiA+Pg0KPj4+PiA+PiBUaGlz
IGlzIG5vIGRpZmZlcmVudCB0aGFuIHdoYXQgSSBzYWlkIGEgZmV3IG1vbnRocyBhZ28gb24gdGhl
IHNhbWUNCj4+Pj4gdG9waWMuDQo+Pj4+ID4+DQo+Pj4+ID4+IFRoYW5rcywNCj4+Pj4gPj4NCj4+
Pj4gPj4g4oC5IENhcmxvcy4NCj4+Pj4gPj4NCj4+Pj4gPj4+IE9uIE5vdiAxNywgMjAxNSwgYXQg
OTowNiBBTSwgSm9lbCBIYWxwZXJuDQo+Pj4+PGpvZWwuaGFscGVybkBlcmljc3Nvbi5jb20+DQo+
Pj4+ID4+IHdyb3RlOg0KPj4+PiA+Pj4NCj4+Pj4gPj4+IFdoYXQgaXMgcHJvdmlzaW9uZWQgaW50
byB0aGUgU0ZGIHJlZmxlY3RzIHRoZSBTRlAuICBUaGUgY29udHJvbA0KPj4+PnN5c3RlbQ0KPj4+
PiA+PiBkZWNpZGVzIHdoZXRoZXIgdGhhdCBTRlAgaW5kaWNhdGVzIHRoZSBzYW1lIHNldCBvZiBh
bGwgcG9zc2libGUNCj4+Pj5jaG9pY2VzDQo+Pj4+ID4+IHRoYXQgdGhlIFNGQyBkb2VzLCBvciBp
cyBhIHByb3BlciBzdWJzZXQuDQo+Pj4+ID4+Pg0KPj4+PiA+Pj4gSW4gb3JkZXIgdG8gYWxsb3cg
Zm9yIGFuIFNGUCB0aGF0IHJlZmxlY3RzIG1lYW5pbmdmdWwgY29uc3RyYWludHMsDQo+Pj4+IHdo
YXQNCj4+Pj4gPj4gaXMgcHJvdmlzaW9uZWQgaGFzIHRvIGJlIHRoZSBTRlAuDQo+Pj4+ID4+PiBO
byBzcGVjaWFsIHByb3Zpc2lvbiBpcyBuZWVkZWQgZm9yIHRoZSBjYXNlIHdoZXJlIHRoZSBTRlAg
aXMNCj4+Pj4gaXNvbW9ycGhpYw0KPj4+PiA+PiB0byB0aGUgU0ZDLiBJbiBzdWNoIGEgY2FzZSwg
eW91IHN0aWxsIHByb3Zpc2lvbiB0aGUgU0ZQLiAgQW5kIHRoZQ0KPj4+PiByZXN1bHQNCj4+Pj4g
Pj4gaXMgYW4gU0ZQIHdpdGggYXMgbXVjaCBmbGV4aWJpbGl0eSBhcyB0aGUgU0ZDLg0KPj4+PiA+
Pj4NCj4+Pj4gPj4+IElmLCBpbiBjb250cmFzdCwgeW91IGRlY2xhcmUgdGhhdCB0aGUgcHJvdmlz
aW9uaW5nIGluY2x1ZGVzIHRoZQ0KPj4+PlNGQw0KPj4+PiB0aGVuDQo+Pj4+ID4+IHlvdSBhcmUg
aW50cm9kdWNpbmcgZXh0cmEgY29tcGxleGl0eSB3aXRob3V0IGFkZGluZyBhbnkgbmV3IGNhc2Vz
DQo+Pj4+dGhhdA0KPj4+PiBjYW4NCj4+Pj4gPj4gYmUgaGFuZGxlZC4NCj4+Pj4gPj4+DQo+Pj4+
ID4+PiBZb3VycywNCj4+Pj4gPj4+IEpvZWwNCj4+Pj4gPj4+DQo+Pj4+ID4+PiAtLS0tLU9yaWdp
bmFsIE1lc3NhZ2UtLS0tLQ0KPj4+PiA+Pj4gRnJvbTogbW9oYW1lZC5ib3VjYWRhaXJAb3Jhbmdl
LmNvbQ0KPj4+PiBbbWFpbHRvOm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb21dDQo+Pj4+ID4+
PiBTZW50OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA5OjAzIEFNDQo+Pj4+ID4+PiBUbzog
Sm9lbCBIYWxwZXJuOyBQYXVsIFF1aW5uIChwYXVscSkNCj4+Pj4gPj4+IENjOiBzZmMgaXNzdWUg
dHJhY2tlcjsNCj4+Pj5kcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3Jn
Ow0KPj4+PiA+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPj4+PiA+Pj4gU3ViamVj
dDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxh
bmUNCj4+Pj4gPj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4+PiA+Pj4N
Cj4+Pj4gPj4+IEhpIEpvZWwsDQo+Pj4+ID4+Pg0KPj4+PiA+Pj4gUGxlYXNlIHNlZSBpbmxpbmUu
DQo+Pj4+ID4+Pg0KPj4+PiA+Pj4gQ2hlZXJzLA0KPj4+PiA+Pj4gTWVkDQo+Pj4+ID4+Pg0KPj4+
PiA+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPj4+PiA+Pj4+IERlIDogSm9lbCBI
YWxwZXJuIFttYWlsdG86am9lbC5oYWxwZXJuQGVyaWNzc29uLmNvbV0NCj4+Pj4gPj4+PiBFbnZv
ecOpIDogbWFyZGkgMTcgbm92ZW1icmUgMjAxNSAxNDo0OQ0KPj4+PiA+Pj4+IMOAIDogQk9VQ0FE
QUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlubiAocGF1bHEpIENjIDogc2ZjIGlzc3VlDQo+
Pj4+ID4+Pj4gdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRm
Lm9yZzsNCj4+Pj4gPj4+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPj4+PiA+Pj4+
IE9iamV0IDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRy
b2wgcGxhbmUNCj4+Pj4gPj4+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+
Pj4+ID4+Pj4NCj4+Pj4gPj4+PiBZb3VyIHN0YXRlbWVudCB0aGF0ICIgSXQgaGFwcGVucyB0aGF0
IGluZm9ybWF0aW9uIGlzIG5vIG1vcmUgdGhhbg0KPj4+PnRoZQ0KPj4+PiA+Pj4+IHNlcnZpY2Ug
Y2hhaW4gaXRzZWxmICh3aXRob3V0IGFueSBjb25zdHJhaW50cykuIiAoV2hlcmUgIml0Ig0KPj4+
PnJlZmVycw0KPj4+PiB0bw0KPj4+PiA+PiAiDQo+Pj4+ID4+Pj4gdGhlIGV4YWN0IHNlcXVlbmNl
IG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDIi4pIERvZXMNCj4+Pj5ub3QN
Cj4+Pj4gPj4+PiBtYWtlIHNlbnNlIHRvIG1lLg0KPj4+PiA+Pj4NCj4+Pj4gPj4+IFtNZWRdIFJG
QyA3NjY1IHNheXM6DQo+Pj4+ID4+Pg0KPj4+PiA+Pj4gIiAgIFRodXMsIHRoZSBwb2xpY2llcyBh
bmQgbG9naWMgb2YgU0ZQIHNlbGVjdGlvbiBvciBjcmVhdGlvbg0KPj4+PiAoZGVwZW5kaW5nDQo+
Pj4+ID4+PiAgdXBvbiB0aGUgc29sdXRpb24pIHByb2R1Y2Ugd2hhdCBtYXkgYmUgdGhvdWdodCBv
ZiBhcyBhDQo+Pj4+Y29uc3RyYWluZWQNCj4+Pj4gPj4+ICB2ZXJzaW9uIG9mIHRoZSBvcmlnaW5h
bCBTRkMuICINCj4+Pj4gPj4+DQo+Pj4+ID4+PiBpbiBzaG9ydDogU0ZQIGlzIGRlZmluZWQgYXMg
YSBjb25zdHJhaW5lZCB2ZXJzaW9uIG9mIHRoZSBvcmlnaW5hbA0KPj4+PlNGQy4NCj4+Pj4gPj4+
DQo+Pj4+ID4+PiBXaGF0IGlzIHRoZSBuYW1lIHRvIHVzZSB0byByZWZlciB0byBhICJub24tY29u
c3RyYWluZWQiIFNGQyBvciB0bw0KPj4+PnRoZQ0KPj4+PiA+PiBpbmZvcm1hdGlvbiB0aGF0IHlv
dSB3aWxsIHByb3Zpc2lvbiB0byBhbiBTRkYgd2hlbiB0aGUgcGF0aA0KPj4+PmNvbXB1dGF0aW9u
DQo+Pj4+ID4+IGFuZCBzZWxlY3Rpb24gZGVjaXNpb24gaXMgImRlZmVycmVkIHRvIHRoZSBTRkYi
Pw0KPj4+PiA+Pj4NCj4+Pj4gPj4+IEl0IGRvZXMgbm90IG1ha2Ugc2Vuc2UgdG8gY2FsbCBhIG5v
bi1jb25zdHJhaW5lZCB2ZXJzaW9uIG9mIHRoZQ0KPj4+PlNGQw0KPj4+PmFzDQo+Pj4+ID4+IFNG
UCBnaXZlbiB0aGF0IFJGQzc2NjUgZXhwbGljaXRseSBkZWZpbmVzIFNGUCBhcyAiY29uc3RyYWlu
ZWQNCj4+Pj52ZXJzaW9uDQo+Pj4+IG9mDQo+Pj4+ID4+IHRoZSBvcmlnaW5hbCBTRkMiIQ0KPj4+
PiA+Pj4NCj4+Pj4gPj4+IFRoZSBTRkMgaXMgdGhlIGdlbmVyYWwgZGVzY3JpcHRpb24gb2YgdGhl
IG9iamVjdGl2ZS4gIFRoYXQNCj4+Pj4gPj4+PiBpcyBub3QgdGhlIHNhbWUgYXMgdGhlIGV4YWN0
IHNlcXVlbmNlIG9mIHBsYWNlcyB0aGF0IG11c3QgYmUNCj4+Pj52aXNpdGVkLg0KPj4+PiA+Pj4+
DQo+Pj4+ID4+Pj4gSSBzdGFuZCBieSBteSBlYXJsaWVyIGNvbW1lbnRzIHRoYXQgYWxtb3N0IGFs
bCB1c2VzIG9mIFNGQyBpbiB0aGUNCj4+Pj4gPj4+PiBjb250cm9sIHJlcXVpcmVtZW50cyBkcmFm
dCBzaG91bGQgYmUgU0ZQLg0KPj4+PiA+Pj4+DQo+Pj4+ID4+Pg0KPj4+PiA+Pj4gW01lZF0gSSBu
b3RlZCB0aGF0IEpvZWwuLiB0aGF0J3MgZmFpciBidXQgdGhpcyBwb3NpdGlvbiBpcyBJTUhPDQo+
Pj4+bm90DQo+Pj4+ID4+IGFsaWduZWQgd2l0aCBSRkM3NjY1IHRoYXQgYWxsb3dzIHRvIGNvbnRy
b2wgYW55IHZhcmlhdGlvbiBmcm9tIGENCj4+Pj5ub24tDQo+Pj4+ID4+IGNvbnN0cmFpbmVkIFNG
QyB0byBhIGZ1bGx5IGNvbnN0cmFpbmVkIFNGQy4NCj4+Pj4gPj4+DQo+Pj4+ID4+Pj4gWW91cnMs
DQo+Pj4+ID4+Pj4gSm9lbA0KPj4+PiA+Pj4+DQo+Pj4+ID4+Pj4gLS0tLS1PcmlnaW5hbCBNZXNz
YWdlLS0tLS0NCj4+Pj4gPj4+PiBGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+
Pj4+ID4+Pj4gW21haWx0bzptb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tXQ0KPj4+PiA+Pj4+
IFNlbnQ6IFR1ZXNkYXksIE5vdmVtYmVyIDE3LCAyMDE1IDg6MzQgQU0NCj4+Pj4gPj4+PiBUbzog
UGF1bCBRdWlubiAocGF1bHEpDQo+Pj4+ID4+Pj4gQ2M6IHNmYyBpc3N1ZSB0cmFja2VyOw0KPj4+
PmRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7DQo+Pj4+ID4+Pj4g
c2ZjQGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4+Pj4gPj4+PiBTdWJqZWN0OiBSRTogW3Nm
Y10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZQ0KPj4+PiA+
Pj4+IG9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4+Pj4gPj4+Pg0KPj4+PiA+
Pj4+IEhpIFBhdWwsDQo+Pj4+ID4+Pj4NCj4+Pj4gPj4+PiBUaGFuayB5b3UgZm9yIHNoYXJpbmcg
eW91ciBmZWVkYmFjay4NCj4+Pj4gPj4+Pg0KPj4+PiA+Pj4+IFJGQzc2NjUgc2F5cyB0aGUgZm9s
bG93aW5nOg0KPj4+PiA+Pj4+DQo+Pj4+ID4+Pj4gIg0KPj4+PiA+Pj4+IFRoaXMgYXJjaGl0ZWN0
dXJlIGRvZXMgbm90IG1hbmRhdGUgdGhlIGRlZ3JlZSBvZg0KPj4+PiA+Pj4+ICBzcGVjaWZpY2l0
eSBvZiB0aGUgU0ZQLiAgQXJjaGl0ZWN0dXJhbGx5LCB3aXRoaW4gdGhlIHNhbWUgU0ZDLQ0KPj4+
PiBlbmFibGVkDQo+Pj4+ID4+Pj4gIGRvbWFpbiwgc29tZSBTRlBzIG1heSBiZSBmdWxseSBzcGVj
aWZpZWQsIHNlbGVjdGluZyBleGFjdGx5DQo+Pj4+d2hpY2gNCj4+Pj4gU0ZGDQo+Pj4+ID4+Pj4g
IGFuZCB3aGljaCBTRiBhcmUgdG8gYmUgdmlzaXRlZCBieSBwYWNrZXRzIHVzaW5nIHRoYXQgU0ZQ
LCB3aGlsZQ0KPj4+PiBvdGhlcg0KPj4+PiA+Pj4+ICBTRlBzIG1heSBiZSBxdWl0ZSB2YWd1ZSwg
ZGVmZXJyaW5nIHRvIHRoZSBTRkYgdGhlIGRlY2lzaW9ucw0KPj4+PmFib3V0DQo+Pj4+IHRoZQ0K
Pj4+PiA+Pj4+ICBleGFjdCBzZXF1ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJlYWxpemUg
dGhlIFNGQy4gIFRoZQ0KPj4+PiA+Pj4+ICBzcGVjaWZpY2l0eSBtYXkgYmUgYW55d2hlcmUgaW4g
YmV0d2VlbiB0aGVzZSBleHRyZW1lcy4NCj4+Pj4gPj4+PiAiDQo+Pj4+ID4+Pj4NCj4+Pj4gPj4+
PiBUaGUgY29udHJvbCBkcmFmdCBpcyBjb21wbGV0ZWx5IGFsaWduZWQgd2l0aCB0aGF0IGFwcHJv
YWNoLg0KPj4+PiA+Pj4+DQo+Pj4+ID4+Pj4gVGhlIGNvbnRyb2wtcGxhbmUgZG9jdW1lbnQgYWxs
b3dzIGluIHBhcnRpY3VsYXIgdG8gcHJvdmlzaW9uDQo+Pj4+cmVxdWlyZWQNCj4+Pj4gPj4+PiBp
bmZvcm1hdGlvbiB3aGVuICJkZWZlcnJpbmcgdG8gdGhlIFNGRiB0aGUgZGVjaXNpb25zIGFib3V0
IHRoZQ0KPj4+PiA+Pj4+ICBleGFjdCBzZXF1ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJl
YWxpemUgdGhlIFNGQyIuIEl0DQo+Pj4+aGFwcGVucw0KPj4+PiA+Pj4+IHRoYXQgaW5mb3JtYXRp
b24gaXMgbm8gbW9yZSB0aGFuIHRoZSBzZXJ2aWNlIGNoYWluIGl0c2VsZg0KPj4+Pih3aXRob3V0
DQo+Pj4+IGFueQ0KPj4+PiA+Pj4+IGNvbnN0cmFpbnRzKS4NCj4+Pj4gPj4+Pg0KPj4+PiA+Pj4+
IEFsc28sIHRoZSBjdXJyZW50IGNvbnRyb2wtcGxhbmUgZG9jdW1lbnQgYWxsb3dzIHRvIGluc3Ry
dWN0IGENCj4+Pj5sb29zZQ0KPj4+PiA+Pj4+IHBhdGgNCj4+Pj4gPj4+PiAoU0ZQKSBvciBhIHN0
cmljdCBwYXRoIChSU1ApLCBldGMuDQo+Pj4+ID4+Pj4NCj4+Pj4gPj4+PiBJIGZ1bGx5IGFncmVl
IHRoYXQgd2hldGhlciBhIGZ1bGwgcGF0aCBpcyBzcGVjaWZpZWQgd2l0aGluIGENCj4+Pj5kb21h
aW4NCj4+Pj4gb3INCj4+Pj4gPj4+PiBpZiBpdCBpcyBkZWZlcnJlZCB0byBTRkZzIGlzIHJlYWxs
eSBkZXBsb3ltZW50LXNwZWNpZmljLg0KPj4+PiBOZXZlcnRoZWxlc3MsDQo+Pj4+ID4+Pj4gdGhl
IGNvbnRyb2wgcGxhbiBzaG91bGQgYWNjb21tb2RhdGUgYWxsIHRoZXNlIGZsYXZvcnMuDQo+Pj4+
ID4+Pj4NCj4+Pj4gPj4+PiBDaGVlcnMsDQo+Pj4+ID4+Pj4gTWVkDQo+Pj4+ID4+Pj4NCj4+Pj4g
Pj4+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+Pj4+ID4+Pj4+IERlIDogUGF1bCBR
dWlubiAocGF1bHEpIFttYWlsdG86cGF1bHFAY2lzY28uY29tXSBFbnZvecOpIDoNCj4+Pj52ZW5k
cmVkaQ0KPj4+PiA+Pj4+PiAxNiBvY3RvYnJlIDIwMTUgMTQ6MDQgw4AgOiBKb2VsIE0uIEhhbHBl
cm4gQ2MgOiBCT1VDQURBSVIgTW9oYW1lZA0KPj4+PiA+Pj4+PiBJTVQvT0xOOyBzZmMgaXNzdWUg
dHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC0NCj4+Pj4gPj4+Pj4gcGxhbmVAdG9vbHMu
aWV0Zi5vcmc7IHNmY0BpZXRmLm9yZyBPYmpldCA6IFJlOiBbc2ZjXSAjMTUNCj4+Pj4gPj4+Pj4g
KGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVzIG9uIFNG
QyBJRHMsDQo+Pj4+U0ZQDQo+Pj4+ID4+IElEcywgZXRjLg0KPj4+PiA+Pj4+Pg0KPj4+PiA+Pj4+
PiBKb2VsLA0KPj4+PiA+Pj4+Pg0KPj4+PiA+Pj4+PiBJIGNvbmN1ci4NCj4+Pj4gPj4+Pj4NCj4+
Pj4gPj4+Pj4gVGhlIGRhdGEgcGxhbmUgZGVhbCB3aXRoIHBhdGhzLCBub3QgY2hhaW5zLiAgVGhl
IHJlbGF0aW9uc2hpcCBvZg0KPj4+PiA+Pj4+PiBwYXRocyB0byBjaGFpbnMgZmFsbHMgc3F1YXJl
bHkgaW4gdGhlIGNvbnRyb2wgcGxhbmUgKG9yIGV2ZW4NCj4+Pj5tb3JlDQo+Pj4+ID4+Pj4+IGxp
a2VseQ0KPj4+PiA+Pj4+ICJwb2xpY3kiDQo+Pj4+ID4+Pj4+IHBsYW5lKSByZWFsbS4gIFRoZSBz
cGVjaWZpY2l0eSBvZiB0aGUgcGF0aCBpcyBsZWZ0IHRvDQo+Pj4+ID4+Pj4+IGltcGxlbWVudGF0
aW9uLCBpbiB0aGUgYXJjaGl0ZWN0dXJlIGRyYWZ0LCBidXQgdGhhdCdzIGNvbnNpc3RlbnQNCj4+
Pj4gPj4+Pj4gd2l0aCB5b3VyIHBvc2l0aW9uIGFuZCBwcm92aWRlcyB0aGUgcmVxdWlzaXRlIGZ1
bmN0aW9uYWxpdHkuDQo+Pj4+ID4+Pj4+DQo+Pj4+ID4+Pj4+IFBhdWwNCj4+Pj4gPj4+Pj4NCj4+
Pj4gPj4+Pj4+IE9uIFNlcCAxNywgMjAxNSwgYXQgMTE6MzYgQU0sIEpvZWwgTS4gSGFscGVybg0K
Pj4+PiA+Pj4+Pj4gPGptaEBqb2VsaGFscGVybi5jb20+DQo+Pj4+ID4+Pj4+IHdyb3RlOg0KPj4+
PiA+Pj4+Pj4NCj4+Pj4gPj4+Pj4+IEFzIGZhciBhcyBJIGNhbiB0ZWxsLCB0aGVyZSBpcyBub3Ro
aW5nIGluIHRoZSBTZXJ2aWNlIENoYWluaW5nDQo+Pj4+ID4+Pj4+PiB3b3JrIHRoYXQNCj4+Pj4g
Pj4+Pj4gcmVxdWlyZXMgY29ycmVsYXRpbmcgc2VydmljZSBwYXRoIElEcyB3aXRoIHNlcnZpY2Ug
Y2hhaW4gSURzDQo+Pj4+d2l0aGluDQo+Pj4+ID4+Pj4+IHRoZSBkYXRhIHBsYW5lLiAgQW55IHN1
Y2ggcmVsYXRpb25zaGlwIGV4aXN0cyBlbnRpcmVseSB3aXRoaW4NCj4+Pj50aGUNCj4+Pj4gPj4+
Pj4gY29udHJvbCBwbGFuZSBvciBhYm92ZSwgYW5kIHdvdWxkIGJlIGRyaXZlbiBieSByZXF1aXJl
bWVudHMNCj4+Pj5vdGhlcg0KPj4+PiA+Pj4+PiB0aGFuIHRoZSBkYXRhIHBsYW5lLiAgV2hlbiBJ
IGxvb2sgYXQgdGhpcyBkb2N1bWVudCwgYWxsIG9mIHRoZQ0KPj4+PiA+Pj4+PiByZXF1aXJlbWVu
dHMgdGhhdCB0YWxrIGFib3V0IHNlcnZpY2UgZnVuY3Rpb24gY2hhaW4gSURzIGNhbiBiZQ0KPj4+
PiA+Pj4+PiBhY2N1cmF0ZWx5IGNhcHR1cmVkLCBpbiB0ZXJtcyBvZiBkYXRhIHBsYW5lIHJlcXVp
cmVtZW50cywgYnkNCj4+Pj5zZXJ2aWNlDQo+Pj4+ID4+IGZ1bmN0aW9uIHBhdGggSURzLg0KPj4+
PiA+Pj4+PiBUaHVzLCB0aGUgcmVxdWlyZW1lbnQgdGhhdCB0aGUgZGF0YSBwbGFuZSBoYXMgaXMg
dG8gc2VlIHN1Y2gNCj4+Pj5wYXRoDQo+Pj4+IElEcy4NCj4+Pj4gPj4+Pj4gWWVzLCBpbiBzb21l
IGRlcGxveW1lbnRzIHRob3NlIHdpbGwgYmUgMS0xIHdpdGggY2hhaW4gSURzLiAgVGhleQ0KPj4+
PmFyZQ0KPj4+PiA+Pj4+IHN0aWxsIHBhdGggSURzLg0KPj4+PiA+Pj4+Pj4NCj4+Pj4gPj4+Pj4+
IEludHJvZHVjaW5nIGEgcmVxdWlyZW1lbnQgZm9yIHRoZSBkYXRhIHBsYW5lIHRvIHNlZSBhbmQg
d29yaw0KPj4+PndpdGgNCj4+Pj4gPj4+Pj4+IGNoYWluDQo+Pj4+ID4+Pj4+IElEcyBpcyBub3Qg
Z3JvdW5kZWQgaW4gdGhlIHdvcmsgb2YgdGhlIGdyb3VwLg0KPj4+PiA+Pj4+Pj4NCj4+Pj4gPj4+
Pj4+IFlvdXJzLA0KPj4+PiA+Pj4+Pj4gSm9lbCBNLiBIYWxwZXJuDQo+Pj4+ID4+Pj4+Pg0KPj4+
PiA+Pj4+Pj4gT24gOS8xNy8xNSA3OjUzIEFNLCBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29t
IHdyb3RlOg0KPj4+PiA+Pj4+Pj4+IFJlLSwNCj4+Pj4gPj4+Pj4+Pg0KPj4+PiA+Pj4+Pj4+IFRo
ZSBjb250cm9sIGRyYWZ0IGFzIGl0IHN0YW5kcyBpcyBjb21wbGlhbnQgd2l0aCB0aGUgZGF0YQ0K
Pj4+PnBsYW5lDQo+Pj4+ID4+Pj4+IGFyY2hpdGVjdHVyZSBkb2N1bWVudC4NCj4+Pj4gPj4+Pj4+
Pg0KPj4+PiA+Pj4+Pj4+IEluZGVlZCwgdGhlIGFyY2ggZHJhZnQgYWNrbm93bGVkZ2VzIHRoZSBm
b2xsb3dpbmc6DQo+Pj4+ID4+Pj4+Pj4gKDEpIFNGUHMgYXJlICJhc3NvY2lhdGVkIHdpdGggYSBn
aXZlbiBTRkMiLg0KPj4+PiA+Pj4+Pj4+ICgyKSBTRlBzIGFyZSBwcmVzZW50ZWQgYXMgYSBmb3Jt
IG9mIGNvbnN0cmFpbmVkIFNGQ3MuDQo+Pj4+ID4+Pj4+Pj4gKDMpIFNvbWUgZGVwbG95bWVudHMg
bWF5IG5vdCBpbXBvc2UgYW55IGNvbnN0cmFpbnQgb24gdGhlDQo+Pj4+ID4+Pj4+Pj4gYWJzdHJh
Y3QNCj4+Pj4gPj4+PiBTRkMNCj4+Pj4gPj4+DQo+Pj4+ID4+PiBfX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPj4+PiA+Pj4gc2ZjIG1haWxpbmcgbGlzdA0K
Pj4+PiA+Pj4gc2ZjQGlldGYub3JnDQo+Pj4+ID4+PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWls
bWFuL2xpc3RpbmZvL3NmYw0KPj4+PiA+DQo+Pj4NCj4+DQo+Pl9fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+PnNmYyBtYWlsaW5nIGxpc3QNCj4+c2ZjQGll
dGYub3JnDQo+Pmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo+DQo+
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj5zZmMgbWFp
bGluZyBsaXN0DQo+c2ZjQGlldGYub3JnDQo+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9s
aXN0aW5mby9zZmMNCj5fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fXw0KPnNmYyBtYWlsaW5nIGxpc3QNCj5zZmNAaWV0Zi5vcmcNCj5odHRwczovL3d3dy5pZXRm
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KDQo=


From nobody Wed Nov 18 12:29:56 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 125B41B2A59 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:29:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jsq5_u-J8bbG for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:29:51 -0800 (PST)
Received: from hub021-ca-4.exch021.serverdata.net (hub021-ca-4.exch021.serverdata.net [64.78.22.171]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95E781B2A4C for <sfc@ietf.org>; Wed, 18 Nov 2015 12:29:51 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-4.exch021.domain.local ([10.254.4.39]) with mapi id 14.03.0224.002;  Wed, 18 Nov 2015 12:29:51 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Dave Dolson <ddolson@sandvine.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAI54gIAAA+EAgAAA+ACAAVwAgIAAJjmAgAAYMoCAAAgQAIAABEEAgAAQWwCAADbogP//iUMQ
Date: Wed, 18 Nov 2015 20:29:50 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E95E083@MBX021-W3-CA-2.exch021.domain.local>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/kJIUIfd5prORqREiQyfsRwi54Dw>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:29:55 -0000
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==


From nobody Wed Nov 18 12:38:18 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC2151B2BE4 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:38:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O51eFmZ-Wcug for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:38:04 -0800 (PST)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F10661B2BDC for <sfc@ietf.org>; Wed, 18 Nov 2015 12:37:56 -0800 (PST)
Received: from [85.158.136.83] by server-4.bemta-5.messagelabs.com id E7/3E-24856-3A1EC465; Wed, 18 Nov 2015 20:37:55 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-9.tower-36.messagelabs.com!1447879074!3148682!1
X-Originating-IP: [195.232.244.133]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30849 invoked from network); 18 Nov 2015 20:37:54 -0000
Received: from mailout01.vodafone.com (HELO mailout01.vodafone.com) (195.232.244.133) by server-9.tower-36.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 18 Nov 2015 20:37:54 -0000
Received: from mailint01.vodafone.com (mailint01.vodafone.com [195.232.244.198]) by mailout01.vodafone.com (Postfix) with ESMTP id 3p1GDL1Ph2z1yFw; Wed, 18 Nov 2015 21:37:54 +0100 (CET)
Received: from mailint01.vodafone.com (localhost [127.0.0.1]) by mailint01.vodafone.com (Postfix) with ESMTP id 3p1GDL0TBHzxQDd; Wed, 18 Nov 2015 21:37:54 +0100 (CET)
Received: from VOEXC01W.internal.vodafone.com (voexc01w.dc-ratingen.de [145.230.101.21]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint01.vodafone.com (Postfix) with ESMTPS id 3p1GDL0690zxQ6V; Wed, 18 Nov 2015 21:37:54 +0100 (CET)
Received: from VOEXC15W.internal.vodafone.com (145.230.101.17) by VOEXC01W.internal.vodafone.com (145.230.101.21) with Microsoft SMTP Server (TLS) id 14.3.224.2; Wed, 18 Nov 2015 21:37:53 +0100
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by voexc15w.internal.vodafone.com ([145.230.101.17]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 21:37:52 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYkZVTjntybIUigJGvi7m2/t54/Q+uAgAE4bQCAAD5zgIAtWD4AgDJ0eYCAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjiAgAAYM4CAAAgPAIAABEIAgAAQWgCAADbogIAACi8AgAABZgCAAAGlgIAAFBYA
Date: Wed, 18 Nov 2015 20:37:51 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DFDD4A@VOEXM20W.internal.vodafone.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <D2721ABA.1E057%repenno@cisco.com> <564CDC6E.5070606@joelhalpern.com> <D2721CB2.1E06E%repenno@cisco.com>
In-Reply-To: <D2721CB2.1E06E%repenno@cisco.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/WfcDIFY5wpGiQYwD-JXLoLEuE48>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:38:10 -0000
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==


From nobody Wed Nov 18 12:50:27 2015
Return-Path: <walter.haeffner@vodafone.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1E5B1B2EAC for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:50:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MGDeG9x5LMUA for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 12:50:23 -0800 (PST)
Received: from mail1.bemta14.messagelabs.com (mail1.bemta14.messagelabs.com [193.109.254.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 94E7A1B2EA6 for <sfc@ietf.org>; Wed, 18 Nov 2015 12:50:22 -0800 (PST)
Received: from [193.109.254.3] by server-14.bemta-14.messagelabs.com id CC/20-04752-C84EC465; Wed, 18 Nov 2015 20:50:20 +0000
X-Env-Sender: walter.haeffner@vodafone.com
X-Msg-Ref: server-6.tower-184.messagelabs.com!1447879819!5536026!1
X-Originating-IP: [195.232.244.133]
X-StarScan-Received: 
X-StarScan-Version: 7.19.2; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27597 invoked from network); 18 Nov 2015 20:50:19 -0000
Received: from mailout01.vodafone.com (HELO mailout01.vodafone.com) (195.232.244.133) by server-6.tower-184.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP;  18 Nov 2015 20:50:19 -0000
Received: from mailint02.vodafone.com (mailint02.vodafone.com [195.232.244.199]) by mailout01.vodafone.com (Postfix) with ESMTP id 3p1GVg4mf1z1yBS; Wed, 18 Nov 2015 21:50:19 +0100 (CET)
Received: from mailint02.vodafone.com (localhost [127.0.0.1]) by mailint02.vodafone.com (Postfix) with ESMTP id 3p1GVg0lxNzQppn; Wed, 18 Nov 2015 21:50:19 +0100 (CET)
Received: from VOEXC04W.internal.vodafone.com (voexc04w.dc-ratingen.de [145.230.101.24]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint02.vodafone.com (Postfix) with ESMTPS id 3p1GVg0NFSzQnHd; Wed, 18 Nov 2015 21:50:19 +0100 (CET)
Received: from VOEXM20W.internal.vodafone.com ([169.254.4.47]) by VOEXC04W.internal.vodafone.com ([145.230.101.24]) with mapi id 14.03.0224.002; Wed, 18 Nov 2015 21:50:18 +0100
From: "Haeffner, Walter, Vodafone DE" <walter.haeffner@vodafone.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8IYkZVTjntybIUigJGvi7m2/t54/Q+uAgAE4bQCAAD5zgIAtWD4AgDJ0eYCAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjiAgAAYM4CAAAgPAIAABEIAgAAQWgCAADbogIAACi8AgAAESICAABQ8MA==
Date: Wed, 18 Nov 2015 20:50:17 +0000
Message-ID: <C8C844F84E550E43865561FAE104718579DFDD83@VOEXM20W.internal.vodafone.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <D2721ABA.1E057%repenno@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD90F@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DAD90F@wtl-exchp-2.sandvine.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/rQet1F5JpiqxcOOj7LgICmX3Vy4>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 20:50:27 -0000
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From nobody Wed Nov 18 13:48:35 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03B571B2FD5 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 13:48:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.785
X-Spam-Level: 
X-Spam-Status: No, score=-4.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vcR7pIxC_Yo1 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 13:48:30 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E84A21B2FD3 for <sfc@ietf.org>; Wed, 18 Nov 2015 13:48:29 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAN31379; Wed, 18 Nov 2015 21:48:24 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 21:48:23 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 13:48:19 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: more questions to draft-ietf-sfc-nsf-01: what is the "Service Policy Section"? 
Thread-Index: AdEiStXbhsToukVSRwCtvCpWbIkhhw==
Date: Wed, 18 Nov 2015 21:48:18 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA3340@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657DA3340dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.564CF228.0070, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 60e244a3a64a39be5efbc4bc1eaec31d
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/K4tONOiPqstH_qILUctBggPnrYY>
Subject: [sfc] more questions to draft-ietf-sfc-nsf-01: what is the "Service Policy Section"?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 21:48:33 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3340dfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Paul and Uri,

A few more questions for draft-ietf-sfc-nsf-01:


-        What does "Location" mean in the Service Path Header definition?



-        Section 4 (NSH Actions) Bullet 4  has "Service Policy Section" des=
cribed as  "Service Function instances derive policy selection" . Then, I i=
nterpret it as for selecting which instantiation for the SF. But then it go=
es on to describe "Deny", "permit", seems to describe the internal policy f=
or the SF . Internal policies to SF is much more than "deny" or "permit".  =
You have WAN Optimization SF, the Caching SF, the LB SFs, etc. It is beyond=
 the scope of SFC to define policies to SFs.





-        Are the NH (Next Hop? ) in Figure 9~12 carried by NSH?  Or are the=
y installed by out-of-band control messages?





-        Figure 8 shows that SFF can remove NSH but not Insert. Is it inten=
ded? If yes, why SFF only removes NSH but not insert?


Thanks, Linda

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3340dfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1127316459;
	mso-list-type:hybrid;
	mso-list-template-ids:-1618287422 -1562853034 67698691 67698693 67698689 6=
7698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:8;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:SimSun;
	mso-bidi-font-family:"Times New Roman";}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Paul and Uri, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A few more questions for draft-ietf-sfc-nsf-01:<o:p>=
</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>What does &#8220;Location&#8221; mean in the Servic=
e Path Header definition?
<o:p></o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>Section 4 (NSH Actions) Bullet 4 &nbsp;has &#8220;S=
ervice Policy Section&#8221; described as &nbsp;&#8220;Service Function ins=
tances derive policy selection&#8221; . Then, I interpret it as for selecti=
ng which instantiation for the SF. But then it goes on to describe
 &#8220;Deny&#8221;, &#8220;permit&#8221;, seems to describe the internal p=
olicy for the SF . Internal policies to SF is much more than &#8220;deny&#8=
221; or &#8220;permit&#8221;. &nbsp;You have WAN Optimization SF, the Cachi=
ng SF, the LB SFs, etc. It is beyond the scope of SFC to define policies to=
 SFs.
<o:p></o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>Are the NH (Next Hop? ) in Figure 9~12 carried by N=
SH? &nbsp;Or are they installed by out-of-band control messages?
<o:p></o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>Figure 8 shows that SFF can remove NSH but not Inse=
rt. Is it intended? If yes, why SFF only removes NSH but not insert?
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt"><o:p>&nbsp;</o:p=
></span></b></p>
<p class=3D"MsoNormal">Thanks, Linda<o:p></o:p></p>
</div>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3340dfweml701chm_--


From nobody Wed Nov 18 13:53:51 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C6EA1B2F86 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 13:53:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.786
X-Spam-Level: 
X-Spam-Status: No, score=-4.786 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NycJcAHAU3Ye for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 13:53:49 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85B871B2EF1 for <sfc@ietf.org>; Wed, 18 Nov 2015 13:53:49 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEH58350; Wed, 18 Nov 2015 21:53:45 +0000 (GMT)
Received: from DFWEML702-CHM.china.huawei.com (10.193.5.72) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 21:53:44 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml702-chm ([10.193.5.72]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 13:53:35 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: more questions to draft-ietf-sfc-nsf-01: what is the "Service Policy Section"? 
Thread-Index: AdEiS5LrhsToukVSRwCtvCpWbIkhhw==
X-CallingTelephoneNumber: IPM.Note
X-VoiceMessageDuration: 1
X-FaxNumberOfPages: 0
Date: Wed, 18 Nov 2015 21:53:35 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA3352@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090204.564CF36A.0039, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 840480bd34cb72789f98f1a38937660f
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/RudYGZEdW-UheurDohMh12tnOOw>
Subject: [sfc] Recall: more questions to draft-ietf-sfc-nsf-01: what is the "Service Policy Section"?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 21:53:50 -0000

Linda Dunbar would like to recall the message, "more questions to draft-iet=
f-sfc-nsf-01: what is the "Service Policy Section"? ".=


From nobody Wed Nov 18 13:54:22 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 484591B2FE8 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 13:54:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.785
X-Spam-Level: 
X-Spam-Status: No, score=-4.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DgiK6fB4YAmx for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 13:54:19 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1999B1B2EF1 for <sfc@ietf.org>; Wed, 18 Nov 2015 13:54:18 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml406-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEH58381; Wed, 18 Nov 2015 21:54:15 +0000 (GMT)
Received: from DFWEML702-CHM.china.huawei.com (10.193.5.72) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 21:54:15 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml702-chm ([10.193.5.72]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 13:54:05 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: more questions to draft-ietf-sfc-nsf-01: what is the "Service Policy Selection"? 
Thread-Index: AdEiStXbhsToukVSRwCtvCpWbIkhhw==
Date: Wed, 18 Nov 2015 21:54:04 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA3357@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657DA3357dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090204.564CF388.0014, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 80f1351b32c23198cccfb8a27a3b1b55
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2fVnr8yPT6kzL8JASJOqzLT7KUQ>
Subject: [sfc] more questions to draft-ietf-sfc-nsf-01: what is the "Service Policy Selection"?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 21:54:21 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3357dfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Paul and Uri,

A few more questions for draft-ietf-sfc-nsf-01:


-        What does "Location" mean in the Service Path Header definition?



-        Section 4 (NSH Actions) Bullet 4  has "Service Policy Selection" d=
escribed as  "Service Function instances derive policy selection" . Then, I=
 interpret it as for selecting which instantiation for the SF. But then it =
goes on to describe "Deny", "permit", seems to describe the internal policy=
 for the SF . Internal policies to SF is much more than "deny" or "permit".=
  You have WAN Optimization SF, the Caching SF, the LB SFs, etc. It is beyo=
nd the scope of SFC to define policies to SFs.





-        Are the NH (Next Hop? ) in Figure 9~12 carried by NSH?  Or are the=
y installed by out-of-band control messages?





-        Figure 8 shows that SFF can remove NSH but not Insert. Is it inten=
ded? If yes, why SFF only removes NSH but not insert?


Thanks, Linda

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3357dfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle18
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1127316459;
	mso-list-type:hybrid;
	mso-list-template-ids:-1618287422 -1562853034 67698691 67698693 67698689 6=
7698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:8;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:SimSun;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Paul and Uri, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A few more questions for draft-ietf-sfc-nsf-01:<o:p>=
</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>What does &#8220;Location&#8221; mean in the Servic=
e Path Header definition?
<o:p></o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>Section 4 (NSH Actions) Bullet 4 &nbsp;has &#8220;S=
ervice Policy Selection&#8221; described as &nbsp;&#8220;Service Function i=
nstances derive policy selection&#8221; . Then, I interpret it as for selec=
ting which instantiation for the SF. But then it goes on to describe
 &#8220;Deny&#8221;, &#8220;permit&#8221;, seems to describe the internal p=
olicy for the SF . Internal policies to SF is much more than &#8220;deny&#8=
221; or &#8220;permit&#8221;. &nbsp;You have WAN Optimization SF, the Cachi=
ng SF, the LB SFs, etc. It is beyond the scope of SFC to define policies to=
 SFs.
<o:p></o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>Are the NH (Next Hop? ) in Figure 9~12 carried by N=
SH? &nbsp;Or are they installed by out-of-band control messages?
<o:p></o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span><![endif]>Figure 8 shows that SFF can remove NSH but not Inse=
rt. Is it intended? If yes, why SFF only removes NSH but not insert?
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt"><o:p>&nbsp;</o:p=
></span></b></p>
<p class=3D"MsoNormal">Thanks, Linda<o:p></o:p></p>
</div>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3357dfweml701chm_--


From nobody Wed Nov 18 15:42:34 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62DE41B3900 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 15:42:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.785
X-Spam-Level: 
X-Spam-Status: No, score=-4.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y1K9KVgFJXdA for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 15:42:30 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41E4A1B38FD for <sfc@ietf.org>; Wed, 18 Nov 2015 15:42:29 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEH64161; Wed, 18 Nov 2015 23:42:24 +0000 (GMT)
Received: from DFWEML706-CHM.china.huawei.com (10.193.5.225) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 23:42:24 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml706-chm ([10.193.5.225]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 15:42:20 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: draft-ietf-sfc-nsf-01:  It makes more sense to state "MD-type = 0x2" (zero or more Variable) as "MUST" and MD-type=0x1" as " SHOULD"  
Thread-Index: AdEiKY+hv3Hb7xn6Qkqm/lQOpgx+sAALiW6Q
Date: Wed, 18 Nov 2015 23:42:19 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA3413@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: multipart/related; boundary="_004_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.564D0CE1.00F9, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 4268c6a91b5ac3b42003c3221933bc8b
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/KZPbAciMNdcahkBHQG6nkGCaoM8>
Subject: [sfc] draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type = 0x2" (zero or more Variable) as "MUST" and MD-type=0x1" as " SHOULD"
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 23:42:32 -0000

--_004_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_
Content-Type: multipart/alternative;
	boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_"

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable



Paul and Uri,



The Section 3.2 of  draft-ietf-sfc-nsf-01 says:

[cid:image001.png@01D12226.FDF81290]





As both MD-type 1 and MD-type 2 are specified by the draft, a more reasonab=
le approach is having the minimum common part (i.e. the first 8 bytes) as t=
he MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes cont=
ext header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a "SH=
OULD" support.



Let's face it, the majority of SFC deployment probably won't need the all 1=
6 bytes "context header" (which has higher chance of packet fragmentation).




Linda

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Paul and Uri, <o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">The Section 3.2 of &nbsp;draft-ietf-sfc-nsf-01 sa=
ys:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><img width=3D"758" height=3D"58" id=3D"Picture_x0020=
_1" src=3D"cid:image001.png@01D12226.FDF81290"><o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoPlainText">As both MD-type 1 and MD-type 2 are specified by =
the draft, a more reasonable approach is having the minimum common part (i.=
e. the first 8 bytes) as the MUST. As the MD-TYPE 2 allows minimum 0 contex=
t header (or 16 bytes context header),
 the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a &#8220;SHOULD&#=
8221; support. <o:p>
</o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Let&#8217;s face it, the majority of SFC deployme=
nt probably won&#8217;t need the all 16 bytes &quot;context header&quot; (w=
hich has higher chance of packet fragmentation).
<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoPlainText">Linda<o:p></o:p></p>
</div>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_--

--_004_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=14919;
	creation-date="Wed, 18 Nov 2015 23:42:19 GMT";
	modification-date="Wed, 18 Nov 2015 23:42:19 GMT"
Content-ID: <image001.png@01D12226.FDF81290>
Content-Transfer-Encoding: base64
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--_004_4A95BA014132FF49AE685FAB4B9F17F657DA3413dfweml701chm_--


From nobody Wed Nov 18 15:58:54 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1AD11B396C for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 15:58:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.786
X-Spam-Level: 
X-Spam-Status: No, score=-4.786 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vrESDsGKfaob for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 15:58:47 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B7591B3969 for <sfc@ietf.org>; Wed, 18 Nov 2015 15:58:47 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEH64900; Wed, 18 Nov 2015 23:58:45 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 18 Nov 2015 23:58:44 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Wed, 18 Nov 2015 15:58:34 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc issue tracker" <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Andrew G. Malis (agmalis@gmail.com)" <agmalis@gmail.com>
Thread-Topic: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
Thread-Index: AQHQ8dhspZs2K5mvM0WjD4/IjUzcZZ6hxKXQgACXBtA=
Date: Wed, 18 Nov 2015 23:58:34 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657DA34A6@dfweml701-chm>
References: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008C9F8F3@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.213]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.564D10B5.00EA, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 4bd7adaae00518e9af29f532b52a0e77
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0e-EJL_UGm064hqQdOR5b6yuhXs>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2015 23:58:51 -0000

TXkgc3VnZ2VzdGlvbnMgYXJlIGluc2VydGVkIGJlbG93Og0KDQoNCi0tLS0tT3JpZ2luYWwgTWVz
c2FnZS0tLS0tDQpGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tIFttYWlsdG86bW9o
YW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbV0gDQpTZW50OiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4
LCAyMDE1IDI6MzkgQU0NClRvOiBzZmMgaXNzdWUgdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29u
dHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgTGluZGEgRHVuYmFyOyBBbmRyZXcgRy4gTWFsaXMg
KGFnbWFsaXNAZ21haWwuY29tKQ0KQ2M6IHNmY0BpZXRmLm9yZw0KU3ViamVjdDogUkU6IFtzZmNd
ICMxNiAoY29udHJvbC1wbGFuZSk6IFJTUC1yZWxhdGVkIENvbnNpZGVyYXRpb25zIChMLiBEdW5i
YXIvQS4gTWFsaXMpDQoNCkRlYXIgV0csDQoNClVubGVzcyBJJ20gbWlzdGFrZW4sIFdlIGRpZG4n
dCByZWNlaXZlIGFueSBmZWVkYmFjayBhYm91dCB0aGlzIGRpc2N1c3Npb24gcG9pbnQuIA0KDQpJ
TU8sIFJTUC1yZWxhdGVkIGNvbnNpZGVyYXRpb25zIGFyZSB3b3J0aCB0byBiZSBkaXNjdXNzZWQg
aW4gdGhlIGNvcmUgdGV4dC4gDQoNCkNoZWVycywNCk1lZA0KDQo+IC0tLS0tTWVzc2FnZSBkJ29y
aWdpbmUtLS0tLQ0KPiBEZcKgOiBzZmMgaXNzdWUgdHJhY2tlciBbbWFpbHRvOnRyYWMrc2ZjQHRv
b2xzLmlldGYub3JnXSBFbnZvecOpwqA6IA0KPiB2ZW5kcmVkaSAxOCBzZXB0ZW1icmUgMjAxNSAw
ODowOCDDgMKgOiANCj4gZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9y
ZzsgQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTiANCj4gQ2PCoDogc2ZjQGlldGYub3JnIE9iamV0
wqA6IFtzZmNdICMxNiAoY29udHJvbC1wbGFuZSk6IFJTUC1yZWxhdGVkIA0KPiBDb25zaWRlcmF0
aW9ucyAoTC4NCj4gRHVuYmFyL0EuIE1hbGlzKQ0KPiANCj4gIzE2OiBSU1AtcmVsYXRlZCBDb25z
aWRlcmF0aW9ucyAoTC4gIER1bmJhci9BLiAgTWFsaXMpDQo+IA0KPiAgRGlzY3VzcyB3aGF0IHRv
IGRvIHdpdGggdGhpcyBhcHBlbmRpeC4NCj4gDQo+ICA9PQ0KPiAgQXBwZW5kaXggQS4gIFJTUC1y
ZWxhdGVkIENvbnNpZGVyYXRpb25zDQo+IA0KPiAgICAgTk9URTogVGhpcyBzZWN0aW9uIHJlY29y
ZHMgc29tZSBjb250cmlidXRpb25zIHByb3Bvc2VkIGJ5IEwuICBEdW5iYXINCj4gICAgIGFuZCBB
LiAgTWFsaXMsIGJ1dCBoYXZlIG5vdCBiZWVuIGRpc2N1c3NlZCB5ZXQgYW1vbmcgYXV0aG9ycy4N
Cj4gDQo+ICBBLjEuICBFbmNvZGluZyB0aGUgRXhhY3QgU0ZGLVNGLXNlcXVlbmNlIGluIERhdGEg
UGFja2V0cw0KPiANCj4gICAgIEVuY29kaW5nIHRoZSBleGFjdCBSU1AgaW4gZXZlcnkgcGFja2V0
IGhhcyB0aGUgYmVuZWZpdCBhbmQgdGhlIGlzc3Vlcw0KPiAgICAgYXNzb2NpYXRlZCB3aXRoIHNv
dXJjZSByb3V0aW5nLiAgVGhpcyBhcHByb2FjaCBtYXkgbm90IGJlIG9wdGltYWwNCj4gICAgIHdo
ZW4gdGhlIFNGUCBkb2Vzbid0IGNoYW5nZSB2ZXJ5IGZyZXF1ZW50bHksIGFzIGluIG1pbnV0ZXMg
b3IgaG91cnMuDQo+IA0KPiAgICAgVGhlcmUgYXJlIGNvbnRleHRzIHRoYXQgaXQgbWlnaHQgbm90
IGJlIGZlYXNpYmxlIGZvciB0aGUgaGVhZCBlbmQNCj4gICAgIENsYXNzaWZpZXIgdG8gYmUgbm90
aWZpZWQgb2YgdGhlIGNoYW5nZXMgb2YgU0ZGLXNlcXVlbmNlIG9yIFNGRi1TRi0NCj4gICAgIFNl
cXVlbmNlIGZvciBhIGdpdmVuIFNGUCBiZWNhdXNlIG9mIHRoZSB0aW1lIHRha2VuIGZvciB0aGUN
Cj4gICAgIG5vdGlmaWNhdGlvbiBhbmQgdGhlIGxpbWl0ZWQgY2FwYWJpbGl0eSBvZiB0aGUgQ2xh
c3NpZmllciBub2Rlcy4NCg0KW0xpbmRhXSBJIHRoaW5rIHRoaXMgc2VjdGlvbiBzaG91bGQgYmUg
YWRkZWQgdG8gU2VjdGlvbiA0LCB3aXRoIHRpdGxlIGNoYW5nZWQgdG8gIkVuY29kaW5nIHRoZSBl
eGFjdCBTRkYtU0Ygc2VxdWVuY2UgaW4gTlNIIiANCg0KPiANCj4gIEEuMi4gIEZ1bGx5IENvbnRy
b2xsZWQgU0ZGLVNGLVNlcXVlbmNlIGZvciBhIFNGUA0KPiANCj4gICAgIFRoaXMgc2VjdGlvbiBk
ZXNjcmliZXMgdGhlIGluZm9ybWF0aW9uIHRoYXQgY2FuIGJlIGV4Y2hhbmdlZCBvdmVyIEMyDQo+
ICAgICBpbnRlcmZhY2UgKFNlY3Rpb24gMy4zLjIpIHdoZW4gdGhlIFNGQyBDb250cm9sIEVsZW1l
bnQgZXhwbGljaXRseQ0KPiAgICAgcGFzc2VzIHRoZSBzdGVlcmluZyBwb2xpY2llcyB0byBhbGwg
U0ZGcyBmb3IgdGhlIFNGRi1TRi1TZXF1ZW5jZSBvZiBhDQo+ICAgICBnaXZlbiBTRkMuICBJbiB0
aGlzIG1vZGVsLCBlYWNoIFNGRiBkb2Vzbid0IG5lZWQgdG8gc2lnbmFsIG90aGVyIFNGRnMNCj4g
ICAgIGZvciB0aGUgU0ZQLg0KPiANCj4gICAgIFN1cHBvc2UgdGhlIFNGQyBJRCBmb3IgdGhpcyBT
RlAgaXMgInllbGxvdyIsIGFuIGV4YW1wbGUgb2YgcG9saWN5IHRvDQo+ICAgICAic2ZmLWEiIGlz
IGRlcGljdGVkIGluIEZpZ3VyZSAyIChmb3IgaWxsdXN0cmF0aW9uIHByb3Bvc2VzKQ0KPiANCj4g
ICAgICAgICAgICAgICAgTWF0Y2hpbmcgICAgICAgICAgICAgICAgICAgICB8ICAgICAgIEFjdGlv
bg0KPiAgICAgLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLSstLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tDQo+ICAgICBTRkMgSUQgPSAieWVsbG93IiAmIGluZ3Jlc3MgPSBz
ZmZ4LXBvcnQgfCBuZXh0LWhvcDogInNmMiIgJiBWSUQNCj4gICAgIFNGQyBJRCA9ICJ5ZWxsb3ci
ICYgaW5ncmVzcyA9IHNmMi1wb3J0ICB8IG5leHQtaG9wOiAic2YzIiAmIFZJRA0KPiAgICAgU0ZD
IElEID0gInllbGxvdyIgJiBpbmdyZXNzID0gc2YzLXBvcnQgIHwgbmV4dC1ob3A6IHNmZi1iDQo+
IA0KPiAgICAgICAgICBGaWd1cmUgMjogRXhhbXBsZSBvZiBUcmFmZmljIFN0ZWVyaW5nIFBvbGlj
eSB0byBhIFNGRiBub2RlDQo+IA0KPiAgICAgVGhlIFNGRiBub2RlcyBtYXkgbm90IGJlIGRpcmVj
dGx5IGFkamFjZW50IHRvIGVhY2ggb3RoZXIuICBUaGV5IGNhbg0KPiAgICAgYmUgaW50ZXJjb25u
ZWN0ZWQgYnkgdHVubmVscywgc3VjaCBhcyBHUkUsIFZ4TEFOLCBldGMuICBTRnMgYXJlDQo+ICAg
ICBhdHRhY2hlZCB0byBhIFNGRiBub2RlIG9yIFNGQyBQcm94eSBub2RlIHZpYSBFdGhlcm5ldCBs
aW5rIG9yIG90aGVyDQo+ICAgICBsaW5rIHR5cGVzLiAgVGhlcmVmb3JlLCB0aGUgc3RlZXJpbmcg
cG9saWNpZXMgdG8gYSBTRkYgbm9kZSBmb3INCj4gICAgIHNlcnZpY2UgZnVuY3Rpb24gY2hhaW4g
ZGVwZW5kcyBvbiBpZiB0aGUgcGFja2V0IGNvbWVzIGZyb20gcHJldmlvdXMNCj4gICAgIFNGRiBv
ciBjb21lcyBmcm9tIGEgc3BlY2lmaWMgU0YsIGkuZS4sIHRoZSBTRkMgRm9yd2FyZGluZyBQb2xp
Y3kNCj4gICAgIFRhYmxlIGVudHJpZXMgaGF2ZSB0byBiZSBpbmdyZXNzIHBvcnQgc3BlY2lmaWMu
ICBUaGVyZSBhcmUgbXVsdGlwbGUNCj4gICAgIGRpZmZlcmVudCBzdGVlcmluZyBwb2xpY2llcyBm
b3Igb25lIGZsb3cgd2l0aGluIG9uZSBTRkYgYW5kIGVhY2ggc2V0DQo+ICAgICBvZiBzdGVlcmlu
ZyBwb2xpY2llcyBpcyBzcGVjaWZpYyBmb3IgYW4gaW5ncmVzcyBwb3J0Lg0KPiANCj4gICAgIFRo
ZSBzZW1hbnRpY3Mgb2YgdHJhZmZpYyBzdGVlcmluZyBydWxlcyBjYW4gYmUgIk1hdGNoIiBhbmQg
IkFjdGlvbiIsDQo+ICAgICBzaW1pbGFyIHRvIHRoZSAicm91dGUiIGRlc2NyaWJlZCBpbiBbSS1E
LmlldGYtaTJycy1yaWItaW5mby1tb2RlbF0uDQo+ICAgICBUaGUgIm1hdGNoIiBhbmQgImFjdGlv
biIgZm9yIGRpc3RpbmN0IHBvcnRzIGNhbiBiZSBkaWZmZXJlbnQuICBUaGUNCj4gICAgIG1hdGNo
aW5nIGNyaXRlcmlhIGZvciBTRkYgY2FuIGJlIG1vcmUgc29waGlzdGljYXRlZC4gIEZvciBleGFt
cGxlLA0KPiAgICAgdGhlIG1hdGNoaW5nIGNyaXRlcmlhIGNvdWxkIGJlIGFueSBmaWVsZHMgaW4g
dGhlIGRhdGEgcGFja2V0czoNCj4gDQo+ICAgICBvICBJbmdyZXNzIHBvcnQNCj4gICAgIG8gIERl
c3RpbmF0aW9uIE1BQyBhZGRyZXNzDQo+ICAgICBvICBTb3VyY2UgTUFDIGFkZHJlc3MNCj4gICAg
IG8gIFZMQU5faWQsDQo+ICAgICBvICBEZXN0aW5hdGlvbiBJUCBhZGRyZXNzDQo+ICAgICBvICBT
b3VyY2UgSVAgYWRkcmVzcw0KPiAgICAgbyAgU291cmNlIHBvcnQgbnVtYmVyDQo+ICAgICBvICBE
ZXN0aW5hdGlvbiBwb3J0IG51bWJlcg0KPiAgICAgbyAgRFNDUA0KPiAgICAgbyAgUGFja2V0IHNp
emUsIGV0Yy4sIG9yIGFueSBjb21iaW5hdGlvbiB0aGVyZW9mLg0KPiANCj4gICAgIEEgU0ZGIG5v
ZGUgbWF5IG5vdCBzdXBwb3J0IHNvbWUgb2YgdGhlIG1hdGNoaW5nIGNyaXRlcmlhIGxpc3RlZA0K
PiAgICAgYWJvdmUuICBJdCBpcyBpbXBvcnRhbnQgdGhhdCBTRkMgY29udHJvbCBwbGFuZSBjYW4g
cmV0cmlldmUgdGhlDQo+ICAgICBzdXBwb3J0ZWQgbWF0Y2hpbmcgY3JpdGVyaWEgYnkgU0ZGIG5v
ZGVzLiAgVGhlICJBY3Rpb25zIiBmb3IgdHJhZmZpYw0KPiAgICAgc3RlZXJpbmcgY291bGQgYmUg
dG8gc3RlZXIgdHJhZmZpYyB0byB0aGUgYXR0YWNoZWQgc2VydmljZSBmdW5jdGlvbg0KPiAgICAg
b3IgU0YgaW5zdGFudGlhdGlvbnMgdmlhIGEgc3BlY2lmaWMgcG9ydC4NCj4gDQo+ICAgICBUaGUg
IkFjdGlvbnMiIHRvIFNGQyBQcm94eSBtYXkgaW5jbHVkZSBhIG1ldGhvZCB0byBtYXAgdGhlIFNG
Qw0KPiAgICAgSWRlbnRpZmllciBjYXJyaWVkIGluIHRoZSBwYWNrZXQgaGVhZGVyIHRvIGEgbG9j
YWxseSBzaWduaWZpY2FudCBsaW5rDQo+ICAgICBpZGVudGlmaWVyLCBlLmcuLCBWTEFOLUlELCBh
bmQgYSBtZXRob2QgdG8gY29uc3RydWN0IGFuZCBlbmNhcHN1bGF0ZQ0KPiAgICAgdGhlIFNGQyBo
ZWFkZXIgYmFjayB0byB0aGUgcGFja2V0cyB3aGVuIHRoZXkgY29tZSBiYWNrIGZyb20gdGhlDQo+
ICAgICBhdHRhY2hlZCBTRnMuDQo+IA0KPiAgICAgVGhpcyBhcHByb2FjaCBkb2VzIG5vdCByZXF1
aXJlIHVzaW5nIGFuIGVuZC10by1lbmQgc2lnbmFsaW5nIHByb3RvY29sDQo+ICAgICBhbW9uZyBD
bGFzc2llciBub2RlcyBhbmQgU0ZGIG5vZGVzLiAgSG93ZXZlciwgdGhlcmUgbWF5IGJlIHByb2Js
ZW1zDQo+ICAgICBlbmNvdW50ZXJlZCBpZiBTRkYgbm9kZXMgYXJlIG5vdCB1cGRhdGVkIGluIHRo
ZSBwcm9wZXIgb3JkZXIgb3Igbm90DQo+ICAgICBhdCB0aGUgc2FtZSB0aW1lLiAgRm9yIGV4YW1w
bGUsIGlmIHRoZSBTRkYgIkEiIGFuZCBTRkYgIkMiIGdldCBmbG93DQo+ICAgICBzdGVlcmluZyBw
b2xpY2llcyBhdCBzbGlnaHRseSBkaWZmZXJlbnQgdGltZXMsIHNvbWUgcGFja2V0cyBtaWdodCBu
b3QNCj4gICAgIGJlIGRpcmVjdGVkIHRvIHNvbWUgc2VydmljZSBmdW5jdGlvbnMgb24gYSBjaGFp
bi4NCj4gID09PT09PT09PT0NCj4gDQpbTGluZGFdIFRoaXMgc2VjdGlvbiBzaG91bGQgYmUgYWRk
ZWQgdG8gU2VjdGlvbiA0IGFzIHdlbGwuIA0KDQpUaGFua3MsIExpbmRhIA0KPiAtLQ0KPiAtLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tKy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0rLS0tLQ0K
PiAtDQo+ICBSZXBvcnRlcjogICAgICAgICAgICAgICAgICAgICAgICAgICB8ICAgICAgT3duZXI6
ICBkcmFmdC1pZXRmLXNmYy0NCj4gY29udHJvbC0NCj4gICBtb2hhbWVkLmJvdWNhZGFpckBvcmFu
Z2UuY29tICAgICAgIHwgIHBsYW5lQHRvb2xzLmlldGYub3JnDQo+ICAgICAgVHlwZTogIGRlZmVj
dCAgICAgICAgICAgICAgICAgICB8ICAgICBTdGF0dXM6ICBuZXcNCj4gIFByaW9yaXR5OiAgbWFq
b3IgICAgICAgICAgICAgICAgICAgIHwgIE1pbGVzdG9uZToNCj4gQ29tcG9uZW50OiAgY29udHJv
bC1wbGFuZSAgICAgICAgICAgIHwgICAgVmVyc2lvbjoNCj4gIFNldmVyaXR5OiAgLSAgICAgICAg
ICAgICAgICAgICAgICAgIHwgICBLZXl3b3JkczoNCj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLSstLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiAtLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tKy0tLS0NCj4gLQ0KPiANCj4gVGlja2V0IFVS
TDogPGh0dHA6Ly90cmFjLnRvb2xzLmlldGYub3JnL3dnL3NmYy90cmFjL3RpY2tldC8xNj4NCj4g
c2ZjIDxodHRwOi8vdG9vbHMuaWV0Zi5vcmcvc2ZjLz4NCg0K


From nobody Wed Nov 18 19:07:53 2015
Return-Path: <bill.wu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75F711B3C11 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 19:07:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.785
X-Spam-Level: 
X-Spam-Status: No, score=-4.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RRJyZ3QrjiwW for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 19:07:48 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5AE21B3C0E for <sfc@ietf.org>; Wed, 18 Nov 2015 19:07:47 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAN47976; Thu, 19 Nov 2015 03:07:42 +0000 (GMT)
Received: from NKGEML402-HUB.china.huawei.com (10.98.56.33) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 19 Nov 2015 03:07:40 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.12]) by nkgeml402-hub.china.huawei.com ([10.98.56.33]) with mapi id 14.03.0235.001; Thu, 19 Nov 2015 11:07:27 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>, "paulq@cisco.com" <paulq@cisco.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>
Thread-Topic: Please voice your vote in SFC WG to make the zero or more Variable SFC header as the MUST and cisco's 16 bytes context header as "SHOULD" or optional
Thread-Index: AdEiKY+hv3Hb7xn6Qkqm/lQOpgx+sAALiW6QAADeZIAAABxNIAAGxhkA
Date: Thu, 19 Nov 2015 03:07:27 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA848BF0C5@nkgeml501-mbs.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.136.79.38]
Content-Type: multipart/related; boundary="_004_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.564D3CFF.00EF, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.2.12, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f4424f5f17253c62ccd040b3ce627942
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/gUoFSSgp-mGukBA261UdKKUhXOA>
Cc: Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Please voice your vote in SFC WG to make the zero or more Variable SFC header as the MUST and cisco's 16 bytes context header as "SHOULD" or optional
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 03:07:51 -0000

--_004_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_
Content-Type: multipart/alternative;
	boundary="_000_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_"

--_000_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

+1, it is not clear to me why 4 context headers MUST be required for MD-TYP=
E 1,
It looks more flexible to have variable length context header for MD-TYPE 2=
.

-Qin
From: Linda Dunbar
Sent: Wednesday, November 18, 2015 5:42 PM
To: 'sfc@ietf.org'; 'Paul Quinn (paulq)'; 'Elzur, Uri'
Subject: draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type =3D 0=
x2" (zero or more Variable) as "MUST" and MD-type=3D0x1" as " SHOULD"




Paul and Uri,



The Section 3.2 of  draft-ietf-sfc-nsf-01 says:

[cid:image001.png@01D12226.FDF81290]





As both MD-type 1 and MD-type 2 are specified by the draft, a more reasonab=
le approach is having the minimum common part (i.e. the first 8 bytes) as t=
he MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes cont=
ext header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a "SH=
OULD" support.



Let's face it, the majority of SFC deployment probably won't need the all 1=
6 bytes "context header" (which has higher chance of packet fragmentation).




Linda

--_000_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"\7EAF\6587\672C Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"\6279\6CE8\6846\6587\672C Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.Char
	{mso-style-name:"\7EAF\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\7EAF\6587\672C;
	font-family:SimSun;}
span.Char0
	{mso-style-name:"\6279\6CE8\6846\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\6279\6CE8\6846\6587\672C;
	font-family:"Calibri","sans-serif";}
p.PlainText, li.PlainText, div.PlainText
	{mso-style-name:"Plain Text";
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle29
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&#43;1,=
 it is not clear to me why 4 context headers MUST be required for MD-TYPE 1=
,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">It looks more flexible to have variable length context header for=
 MD-TYPE 2.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">-Qin<o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;"> Linda Dunbar
<br>
<b>Sent:</b> Wednesday, November 18, 2015 5:42 PM<br>
<b>To:</b> 'sfc@ietf.org'; 'Paul Quinn (paulq)'; 'Elzur, Uri'<br>
<b>Subject:</b> draft-ietf-sfc-nsf-01: It makes more sense to state &quot;M=
D-type =3D 0x2&quot; (zero or more Variable) as &quot;MUST&quot; and MD-typ=
e=3D0x1&quot; as &quot; SHOULD&quot;
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Paul and Uri, <o:p></o:p></s=
pan></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">The Section 3.2 of &nbsp;dra=
ft-ietf-sfc-nsf-01 says:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><img width=3D"758" height=3D"58=
" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D12226.FDF81290"><o:p></=
o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">As both MD-type 1 and MD-typ=
e 2 are specified by the draft, a more reasonable approach is having the mi=
nimum common part (i.e. the first 8 bytes) as the MUST. As the MD-TYPE 2 al=
lows minimum 0 context header (or 16
 bytes context header), the MD-TYPE 2 should be a MUST support. And MD-TYPE=
 1 is a &#8220;SHOULD&#8221; support.
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Let&#8217;s face it, the maj=
ority of SFC deployment probably won&#8217;t need the all 16 bytes &quot;co=
ntext header&quot; (which has higher chance of packet fragmentation).
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Linda<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_--

--_004_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=14919;
	creation-date="Wed, 18 Nov 2015 23:48:53 GMT";
	modification-date="Wed, 18 Nov 2015 23:48:53 GMT"
Content-ID: <image001.png@01D12226.FDF81290>
Content-Transfer-Encoding: base64
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--_004_B8F9A780D330094D99AF023C5877DABA848BF0C5nkgeml501mbschi_--


From nobody Thu Nov 19 03:03:17 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A3211A9068 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:21:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yqoiaeCzvBng for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:21:22 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A60C1A9067 for <sfc@ietf.org>; Wed, 18 Nov 2015 23:21:22 -0800 (PST)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr22.francetelecom.fr (ESMTP service) with ESMTP id 660B720214; Thu, 19 Nov 2015 08:21:20 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.31]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id 2F3FF120063; Thu, 19 Nov 2015 08:21:20 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM22.corporate.adroot.infra.ftgroup ([fe80::8c90:f4e9:be28:2a1%19]) with mapi id 14.03.0248.002; Thu, 19 Nov 2015 08:21:19 +0100
From: <mohamed.boucadair@orange.com>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAABVmgIAACi8AgAABZgCAAAGkgIAAyHag
Date: Thu, 19 Nov 2015 07:21:19 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA04AA@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <D2721ABA.1E057%repenno@cisco.com> <564CDC6E.5070606@joelhalpern.com> <D2721CB2.1E06E%repenno@cisco.com>
In-Reply-To: <D2721CB2.1E06E%repenno@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/j1bIoFC3-m-q0F-R3Vy_WymrHFQ>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 07:21:26 -0000
X-List-Received-Date: Thu, 19 Nov 2015 07:21:26 -0000
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From nobody Thu Nov 19 03:03:20 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38CA81A9103 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:32:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 38S7KwgWlGX7 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:32:12 -0800 (PST)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 7B3AC1A910A for <sfc@ietf.org>; Wed, 18 Nov 2015 23:32:12 -0800 (PST)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-3.sandvine.com (192.168.196.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 19 Nov 2015 02:32:14 -0500
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Thu, 19 Nov 2015 02:32:11 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YAAjTacA//+xwxo=
Date: Thu, 19 Nov 2015 07:32:12 +0000
Message-ID: <20151119073209.594948115.75564.49932@sandvine.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>, <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/oIdEmgy6Rj-1xooFlVzFRyeynwc>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 07:32:18 -0000
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From nobody Thu Nov 19 03:03:22 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FDEA1A9245 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:41:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BoQZnq6ZQ_FR for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:41:22 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C2DE1A9240 for <sfc@ietf.org>; Wed, 18 Nov 2015 23:41:21 -0800 (PST)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id E507122C321; Thu, 19 Nov 2015 08:41:19 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.18]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id C258D238073; Thu, 19 Nov 2015 08:41:19 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0248.002; Thu, 19 Nov 2015 08:41:19 +0100
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YAAjTacA//+xwxr///5oYA==
Date: Thu, 19 Nov 2015 07:41:18 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>, <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <20151119073209.594948115.75564.49932@sandvine.com>
In-Reply-To: <20151119073209.594948115.75564.49932@sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.10.16.122716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/j-OGd5QYJjY8D53dsMfeIvxVlUw>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 07:41:26 -0000
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From nobody Thu Nov 19 03:03:25 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 363601A92DD for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:45:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jFhCcyPLcU86 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:45:29 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor34.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BA011A92E5 for <sfc@ietf.org>; Wed, 18 Nov 2015 23:45:29 -0800 (PST)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) by opfednr21.francetelecom.fr (ESMTP service) with ESMTP id 905A2C0282; Thu, 19 Nov 2015 08:45:27 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.18]) by opfednr03.francetelecom.fr (ESMTP service) with ESMTP id 454DB1A0062; Thu, 19 Nov 2015 08:45:27 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0248.002; Thu, 19 Nov 2015 08:45:27 +0100
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcA==
Date: Thu, 19 Nov 2015 07:45:26 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com>
In-Reply-To: <D2720C4C.2F7CA%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-1LVNno0Iq3C_CLCZ-pxuizVSjk>
Cc: Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 07:45:34 -0000

SGkgSmltLA0KDQpMZXQncyBtZSByZXBocmFzZSB0aGUgaXNzdWUuDQoNCldoYXQgd2UgYXJlIGRp
c2N1c3NpbmcgaXMgcmVsYXRlZCB0byB0aGlzIHBhcnQgb2YgdGhlIGRyYWZ0IChhbmQgc29tZSBv
dGhlciBvY2N1cnJlbmNlcyk6IA0KDQo9PT09PT0NCiAgIG8gIFNGQyBGb3J3YXJkaW5nIFBvbGlj
eSBUYWJsZTogdGhpcyB0YWJsZSByZWZsZWN0cyB0aGUgU0ZDLXNwZWNpZmljDQogICAgICB0cmFm
ZmljIGZvcndhcmRpbmcgcG9saWN5IGVuZm9yY2VkIGJ5IFNGRiBjb21wb25lbnRzIGZvciBldmVy
eQ0KICAgICAgcmVsZXZhbnQgaW5jb21pbmcgcGFja2V0IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBv
bmUgb2YgdGhlIGV4aXN0aW5nDQogICAgICBTRkNzLg0KDQogICAgICAgICBbW05vdGU6IFRoZSBx
dWVzdGlvbiBvZiB3aGV0aGVyIHRoZSBkYXRhIHBsYW5lIG9wZXJhdGVzIGp1c3QgaW4NCiAgICAg
ICAgIHRlcm1zIG9mIFNGUCBJRHMgb3IgbmVlZHMgU0ZDIElEcywgYXMgZGVzY3JpYmVkIGluIHRo
aXMgdmVyc2lvbg0KICAgICAgICAgb2YgdGhlIGRyYWZ0LCBpcyBzdGlsbCB1bmRlciBkaXNjdXNz
aW9uIGFtb25nIHRoZSBhdXRob3JzLl1dDQo9PT09PT09DQoNClRoZSBjdXJyZW50IGRyYWZ0IGlz
IGdlbmVyaWMgYXMgaXQgYWxsb3dzIHRvIGluc3RydWN0IHZpYSB0aGUgY3AgaW50ZXJmYWNlcyB0
aGUgdW5kZXJseWluZyBkcCBlbGVtZW50cyB3aXRoIFNGQywgU0ZQLCBSU1AsIGFuZCBvdGhlciBw
b2xpY2llcy4gV2hlbiBwcmVwYXJpbmcgdGhlIGRyYWZ0LCBJIGhhZCBhIGRpc2N1c3Npb24gd2l0
aCBKb2VsIGFib3V0IHRoaXMgZGVzaWduLiBXZSBib3RoIGFncmVlZCB0aGF0IHRoaXMgaXMgd29y
dGggdG8gYmUgZGlzY3Vzc2VkLiAJDQoNCkkgZXhwbGFpbmVkLCBhbmQgb3RoZXIgaGF2ZSBkb25l
IHRoYXQgdG9vLCB0aGF0IGJvdGggbW9kZWxzIHNob3VsZCBiZSBhZGRyZXNzZWQuIA0KDQpUaGUg
ZGlzY3Vzc2lvbiByZXZlYWxlZCB0aGUgZGVmaW5pdGlvbiBpbiB0aGUgZHAgUkZDIGFyZSB0b28g
dmFndWUuIFdlIG5lZWQgdG8gcmVzb2x2ZSB0aGF0IGFzIFdHLg0KDQpDaGVlcnMsDQpNZWQNCg0K
PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gRGXCoDogSmltIEd1aWNoYXJkIChqZ3Vp
Y2hhcikgW21haWx0bzpqZ3VpY2hhckBjaXNjby5jb21dDQo+IEVudm95w6nCoDogbWVyY3JlZGkg
MTggbm92ZW1icmUgMjAxNSAxNzoxOA0KPiDDgMKgOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0
YSk7IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE4NCj4gQ2PCoDogc2ZjIGlzc3VlIHRyYWNrZXI7
IHNmY0BpZXRmLm9yZzsgUGF1bCBRdWlubiAocGF1bHEpOyBkcmFmdC1pZXRmLXNmYy0NCj4gY29u
dHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgSm9lbCBIYWxwZXJuOyBKb2VsIE0uIEhhbHBlcm4N
Cj4gT2JqZXTCoDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNv
bnRyb2wgcGxhbmUgb3BlcmF0ZXMNCj4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPiANCj4g
W0NoYWlyIGhhdCBvZmYg4oCmXQ0KPiANCj4gSSBoYXZlIHRvIHNheSBJIGFtIHN0cnVnZ2xpbmcg
dG8gc2VlIHRoZSDigJxpc3N1ZeKAnSBpbiB0aGlzIHRocmVhZCB0aGF0IG5lZWRzDQo+IHRvIGJl
IGFkZHJlc3NlZCBvdGhlciB0aGFuIGNvbmZ1c2lvbiBvdmVyIFNGQyB2cyBTRlAgZGVmaW5pdGlv
bjsgZnJvbSBhDQo+IGRhdGEgcGxhbmUgcGVyc3BlY3RpdmUgaXQgaXMgKnZlcnkqIGNsZWFyIHRo
YXQgU0ZQL1NJIGlkZW50aWZpZXJzIGFyZSB1c2VkDQo+IGFzIHRoZSBsb29rdXAga2V5IGludG8g
YSBmb3J3YXJkaW5nIGNvbnN0cnVjdCB0aGF0IG1heSBjb250YWluIDE6biBudW1iZXINCj4gb2Yg
bmV4dC1ob3BzIChTRkZzLCBTRnMpLiBJbiBzb21lIGNhc2VzIHRoYXQgbG9va3VwIHdpbGwgcG9p
bnQgdG8gYSBzaW5nbGUNCj4gbmV4dC1ob3AsIGluIG90aGVycyBtdWx0aXBsZSBuZXh0LWhvcHMu
IEluICphbGwqIGNhc2VzIHRoaXMgaGFzIGFic29sdXRlbHkNCj4gbm90aGluZyB0byBkbyB3aXRo
IHRoZSBTRkMgYXMgZWFjaCByZXByZXNlbnRhdGlvbiBvZiB0aGF0IFNGQyBpcyB1bmlxdWVseQ0K
PiBpZGVudGlmaWVkIGJ5IGFuIFNGUC1pZC4NCj4gDQo+IEppbQ0KPiANCj4gT24gMTEvMTgvMTUs
IDEwOjE5IEFNLCAic2ZjIG9uIGJlaGFsZiBvZiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSki
DQo+IDxzZmMtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgY3BpZ25hdGFAY2lzY28uY29t
PiB3cm90ZToNCj4gDQo+ID5IaSwgTWVkLA0KPiA+DQo+ID5JIGFsc28gcmVmZXJyZWQgdG8gb3Ro
ZXIgcGFydHMgb2YgdGhlIGRvY3VtZW50LCB3aGVuIEkgd3JvdGU6DQo+ID4NCj4gPj4gVGhlIGNv
bnRyb2wtcGxhbmUgZHJhZnQgdGFsa3MgYWJvdXQgwrNTRkMgZm9yd2FyZGluZ8KyIGFuZCDCs1NG
QyBkYXRhDQo+ID4+cGxhbmXCsg0KPiA+DQo+ID4NCj4gPkZvciBleGFtcGxlLCBJIGFtIG5vdCBz
dXJlIEkgdW5kZXJzdGFuZCB3aGF0IHRoaXMgbWVhbnM6DQo+ID4NCj4gPiIgICBvICBQb3B1bGF0
ZSBTRkMgZm9yd2FyZGluZyBwb2xpY3kgdGFibGVzIG9mIGludm9sdmVkIFNGQyBkYXRhIHBsYW5l
wrINCj4gPg0KPiA+DQo+ID5PciBhdDoNCj4gPiIgICBvICBTRkMgRm9yd2FyZGluZyBQb2xpY3kg
VGFibGU6IHRoaXMgdGFibGUgcmVmbGVjdHMgdGhlIFNGQy1zcGVjaWZpYw0KPiA+ICAgICB0cmFm
ZmljIGZvcndhcmRpbmcgcG9saWN5IGVuZm9yY2VkIGJ5IFNGRiBjb21wb25lbnRzIGZvciBldmVy
eQ0KPiA+ICAgICByZWxldmFudCBpbmNvbWluZyBwYWNrZXQgdGhhdCBpcyBhc3NvY2lhdGVkIHRv
IG9uZSBvZiB0aGUgZXhpc3RpbmcNCj4gPiAgICAgU0ZDcy4iDQo+ID4NCj4gPg0KPiA+TXkgY29t
bWVudCBpcyB0aGF0IHRob3NlIHNob3VsZCBiZSDCs1NGUCINCj4gPg0KPiA+VGhhbmtzLA0KPiA+
DQo+ID7igLkgQ2FybG9zLg0KPiA+DQo+ID4tLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiA+
RnJvbTogTWVkIEJvdWNhZGFpciA8bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbT4NCj4gPkRh
dGU6IFdlZG5lc2RheSwgTm92ZW1iZXIgMTgsIDIwMTUgYXQgMTA6MDMgQU0NCj4gPlRvOiBDYXJs
b3MgUGlnbmF0YXJvIDxjcGlnbmF0YUBjaXNjby5jb20+DQo+ID5DYzogIlBhdWwgUXVpbm4gKHBh
dWxxKSIgPHBhdWxxQGNpc2NvLmNvbT4sDQo+ID4iZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFu
ZUB0b29scy5pZXRmLm9yZyINCj4gPjxkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xz
LmlldGYub3JnPiwgSm9lbCBIYWxwZXJuDQo+ID48am1oQGpvZWxoYWxwZXJuLmNvbT4sIHNmYyBp
c3N1ZSB0cmFja2VyIDx0cmFjK3NmY0B0b29scy5pZXRmLm9yZz4sDQo+ID4ic2ZjQGlldGYub3Jn
IiA8c2ZjQGlldGYub3JnPiwgSm9lbCBIYWxwZXJuIDxqb2VsLmhhbHBlcm5AZXJpY3Nzb24uY29t
Pg0KPiA+U3ViamVjdDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhl
IGNvbnRyb2wgcGxhbmUNCj4gb3BlcmF0ZXMNCj4gPm9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4N
Cj4gPg0KPiA+PkNhcmxvcywNCj4gPj4NCj4gPj5UaGVyZSBpcyBub3QgU0ZDIElEIGluIHRoZSBj
b3JlIHRleHQgb2YgdGhlIGNvbnRyb2wgcGxhbmUgZHJhZnQuDQo+ID4+DQo+ID4+VGhlIHRleHQg
eW91IHF1b3RlZCBpcyBwYXJ0IG9mIGFuIGFwcGVuZGl4IHdpdGggYSBub3RlIHRoYXQgY2xlYXJs
eQ0KPiA+PnN0YXRlcyB0aGlzIGlzIG5vdCBkaXNjdXNzZWQuIEEgY29ycmVzcG9uZGluZyBpc3N1
ZSByZWNvcmQgaGFzIGJlZW4NCj4gPj5yZWNvcmRlZCB0byBzZWVrIGZvciBtb3JlIGZlZWRiYWNr
IG9uIHRoYXQgYXBwZW5kaXguDQo+ID4+DQo+ID4+Q2hlZXJzLA0KPiA+Pk1lZA0KPiA+Pg0KPiA+
Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+ID4+PiBEZSA6IENhcmxvcyBQaWduYXRh
cm8gKGNwaWduYXRhKSBbbWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbV0NCj4gPj4+IEVudm95w6kg
OiBtZXJjcmVkaSAxOCBub3ZlbWJyZSAyMDE1IDE1OjM1DQo+ID4+PiDDgCA6IEJPVUNBREFJUiBN
b2hhbWVkIElNVC9PTE4NCj4gPj4+IENjIDogUGF1bCBRdWlubiAocGF1bHEpOyBkcmFmdC1pZXRm
LXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOw0KPiA+Pj5Kb2VsDQo+ID4+PiBNLiBI
YWxwZXJuOyBzZmMgaXNzdWUgdHJhY2tlcjsgc2ZjQGlldGYub3JnOyBKb2VsIEhhbHBlcm4NCj4g
Pj4+IE9iamV0IDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNv
bnRyb2wgcGxhbmUNCj4gPj4+b3BlcmF0ZXMNCj4gPj4+IG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0
Yy4NCj4gPj4+DQo+ID4+PiBNZWQsDQo+ID4+Pg0KPiA+Pj4gPiBPbiBOb3YgMTgsIDIwMTUsIGF0
IDg6MDggQU0sIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6DQo+ID4+PiA+DQo+
ID4+PiA+IENhcmxvcywNCj4gPj4+ID4NCj4gPj4+ID4gVGhpcyBpcyBhbiBvcGVuIGlzc3VlIGZv
ciB0aGlzIGRyYWZ0LCBzbyBpdCBpcyBub3JtYWwgdG8gY29udGludWUNCj4gPj4+IGRpc2N1c3Np
bmcgaXQuIEkgZG9uJ3Qga25vdyBob3cgeW91IGNhbiBjb25jbHVkZSBpbiBhZHZhbmNlIHRoYXQg
d2UNCj4gYXJlDQo+ID4+PiBjaXJjbGluZy4NCj4gPj4+ID4NCj4gPj4+DQo+ID4+PiBEaXNjdXNz
aW9uIGlzIGdyZWF0LCBNZWQuIEJ1dCBteSDFkndlIGFyZSBjaXJjbGluZycgY29tbWVudCAobm90
IGluDQo+ID4+PiBhZHZhbmNlZCwgYnV0IGFscmVhZHkgZXZpZGVudCkgaXMgYmVjYXVzZSBJIHNh
dyB0aGUgc2FtZSBxdWVzdGlvbnMsDQo+ID4+PnNhbWUNCj4gPj4+IGFyZ3VtZW50cywgYW5kIHNh
bWUgYW5zd2VycyBhcyBiZWZvcmUuDQo+ID4+Pg0KPiA+Pj4gPiAic3Ryb25nbHkgYmVsaWV2ZSIg
aXMgbm90IGEgdGVjaG5pY2FsIGFyZ3VtZW50LCBidHcuDQo+ID4+PiA+DQo+ID4+Pg0KPiA+Pj4g
V2VsbCwgSSBiZWxpZXZlIHNvIG9uIHRlY2huaWNhbCBncm91bmRzISBNb3N0IG9mIHdoaWNoIGhh
dmUgYWxyZWFkeQ0KPiA+Pj5iZWVuDQo+ID4+PiBzYWlkLCBzbyBJIGRvIG5vdCB3YW50IHRvIGNv
bnRyaWJ1dGUgdG8gdGhlIGNpcmN1bGFyIGRpc2N1c3Npb24uDQo+ID4+Pg0KPiA+Pj4gVGhlIGNv
bnRyb2wtcGxhbmUgZHJhZnQgdGFsa3MgYWJvdXQgwrNTRkMgZm9yd2FyZGluZ8KyIGFuZCDCs1NG
QyBkYXRhDQo+ID4+PnBsYW5lwrIsDQo+ID4+PiBhbmQgwrNTRkMgSURzwrIuIFRoZSBhcmNoaXRl
Y3R1cmUgc2F5cyB0aGF0IFNGQyBhcmUgbWFkZSBvZiBhYnN0cmFjdA0KPiA+Pj5zZXJ2aWNlDQo+
ID4+PiBmdW5jdGlvbnMuIFRoZXJlwrlzIG5vIGFjdHVhbCBmb3J3YXJkaW5nIGluIHRoaXMgYWJz
dHJhY3QgY29uY2VwdHVhbA0KPiA+Pj5tb2RlbC4NCj4gPj4+DQo+ID4+PiBUaGUgY29udHJvbC1w
bGFuZSBkcmFmdCBzYXlzIMKzU3VwcG9zZSB0aGUgU0ZDIElEIGZvciB0aGlzIFNGUCBpcw0KPiA+
Pj4gInllbGxvd8KyLMKyLCBhbmQgbXkgcG9pbnQgYWdhaW4gaXMgdGhhdCBpbiB0aGUgZGF0YSBw
bGFuZSBhbiBTRlAgaGFzIGFuDQo+ID4+PiBpZGVudGlmaWVyICh3aGljaCBpZGVudGlmaWVzIHRo
ZSBTRlAgKFNGUC1JRCkgYW5kIGlzIG5vdCB0aGUNCj4gaWRlbnRpZmllcg0KPiA+Pj5vZg0KPiA+
Pj4gc29tZXRoaW5nIGVsc2UsIGl0wrlzIG5vdCBhIFRvcG9sb2d5LUlELCBpdMK5cyBub3QgYSBT
S1UsIGl0wrlzIG5vdCBhDQo+IFVSSSwNCj4gPj4+IGl0wrlzIG5vdCBhIEZhbWlseSBOYW1lLCBh
bmQgbm90IGFuIFNGQyBJRCksIGFuZCB0aGUgY29udHJvbCAoYW5kDQo+ID4+PnBvbGljeSkNCj4g
Pj4+IHBsYW5lIGNhbiBvZiBjb3Vyc2Ugd29yayB3aXRoIFNGQ3MuDQo+ID4+Pg0KPiA+Pj4gTXkg
JDAuMDIuDQo+ID4+Pg0KPiA+Pj4gVGhhbmtzLA0KPiA+Pj4NCj4gPj4+IOKAuSBDYXJsb3MuDQo+
ID4+Pg0KPiA+Pj4gPiBDaGVlcnMsDQo+ID4+PiA+IE1lZA0KPiA+Pj4gPg0KPiA+Pj4gPj4gLS0t
LS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+ID4+PiA+PiBEZSA6IENhcmxvcyBQaWduYXRhcm8g
KGNwaWduYXRhKSBbbWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbV0NCj4gPj4+ID4+IEVudm95w6kg
OiBtZXJjcmVkaSAxOCBub3ZlbWJyZSAyMDE1IDExOjUyDQo+ID4+PiA+PiDDgCA6IEpvZWwgSGFs
cGVybg0KPiA+Pj4gPj4gQ2MgOiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xOOyBQYXVsIFF1aW5u
IChwYXVscSk7IGRyYWZ0LWlldGYtc2ZjLQ0KPiA+Pj4gPj4gY29udHJvbC1wbGFuZUB0b29scy5p
ZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuOyBzZmMgaXNzdWUgdHJhY2tlcjsNCj4gPj4+ID4+IHNm
Y0BpZXRmLm9yZw0KPiA+Pj4gPj4gT2JqZXQgOiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5l
KTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZQ0KPiA+Pj4gb3BlcmF0ZXMNCj4gPj4+ID4+IG9u
IFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4gPj4+ID4+DQo+ID4+PiA+PiBJIGFtIGEgYml0IGJh
ZmZsZWQgdG8gc2VlIHRoaXMgdGhyZWFkIGFnYWluIOKAuSBpdCBhcHBlYXJzIHRoZQ0KPiA+Pj5k
aXNjdXNzaW9uDQo+ID4+PiA+PiByZXN0YXJ0ZWQgdG8gY29udGludWUgaW4gY2lyY2xlcy4NCj4g
Pj4+ID4+DQo+ID4+PiA+PiBNZWQsDQo+ID4+PiA+Pg0KPiA+Pj4gPj4gSSB0b28gYWdyZWUgd2l0
aCBKb2VsIGFuZCBzdHJvbmdseSBiZWxpZXZlIHRoZXJlIGlzIG5vIG5lZWQgZm9yIFNGQw0KPiA+
Pj4gPj4gaWRlbnRpZmljYXRpb24gcGFzc2VkIGRvd24g4oC5IHRoZXJlIGlzIG5vIHByb3Zpc2lv
bmluZyBvZiBTRkNzDQo+ID4+PiBzb3V0aGJvdW5kLg0KPiA+Pj4gPj4NCj4gPj4+ID4+IChBbG1v
c3QpIGV2ZXJ5IGluc3RhbmNlIG9mIMKzU0ZDwrIgaW4gdGhlIGNvbnRyb2wtcGxhbmUgcmVxdWly
ZW1lbnRzDQo+ID4+PiBkcmFmdA0KPiA+Pj4gPj4gc2hvdWxkIHJlYWxseSBzYXkgwrNTRlDCsi4g
VGhlcmUgaXMgbm8gdXNlIG9mIHRhbGtpbmcgYWJvdXQgU0ZDcw0KPiA+Pj50b3dhcmRzDQo+ID4+
PiB0aGUNCj4gPj4+ID4+IGRhdGEgcGxhbmUuIFRoZSByZWxhdGlvbnNoaXAgYmV0d2VlbiBjaGFp
bnMgYW5kIHBhdGhzIGlzIGEgcG9saWN5DQo+ID4+PiBtYXR0ZXINCj4gPj4+ID4+IHdoaWNoIGJl
bG9uZ3MgaW4gdGhlIHBvbGljeS9jb250cm9sIGl0c2VsZiwgYnV0IG5vdCBvdXQgb2YgdGhlcmUu
DQo+ID4+PiA+Pg0KPiA+Pj4gPj4gVGhpcyBpcyBubyBkaWZmZXJlbnQgdGhhbiB3aGF0IEkgc2Fp
ZCBhIGZldyBtb250aHMgYWdvIG9uIHRoZSBzYW1lDQo+ID4+PiB0b3BpYy4NCj4gPj4+ID4+DQo+
ID4+PiA+PiBUaGFua3MsDQo+ID4+PiA+Pg0KPiA+Pj4gPj4g4oC5IENhcmxvcy4NCj4gPj4+ID4+
DQo+ID4+PiA+Pj4gT24gTm92IDE3LCAyMDE1LCBhdCA5OjA2IEFNLCBKb2VsIEhhbHBlcm4NCj4g
Pj4+PGpvZWwuaGFscGVybkBlcmljc3Nvbi5jb20+DQo+ID4+PiA+PiB3cm90ZToNCj4gPj4+ID4+
Pg0KPiA+Pj4gPj4+IFdoYXQgaXMgcHJvdmlzaW9uZWQgaW50byB0aGUgU0ZGIHJlZmxlY3RzIHRo
ZSBTRlAuICBUaGUgY29udHJvbA0KPiA+Pj5zeXN0ZW0NCj4gPj4+ID4+IGRlY2lkZXMgd2hldGhl
ciB0aGF0IFNGUCBpbmRpY2F0ZXMgdGhlIHNhbWUgc2V0IG9mIGFsbCBwb3NzaWJsZQ0KPiA+Pj5j
aG9pY2VzDQo+ID4+PiA+PiB0aGF0IHRoZSBTRkMgZG9lcywgb3IgaXMgYSBwcm9wZXIgc3Vic2V0
Lg0KPiA+Pj4gPj4+DQo+ID4+PiA+Pj4gSW4gb3JkZXIgdG8gYWxsb3cgZm9yIGFuIFNGUCB0aGF0
IHJlZmxlY3RzIG1lYW5pbmdmdWwgY29uc3RyYWludHMsDQo+ID4+PiB3aGF0DQo+ID4+PiA+PiBp
cyBwcm92aXNpb25lZCBoYXMgdG8gYmUgdGhlIFNGUC4NCj4gPj4+ID4+PiBObyBzcGVjaWFsIHBy
b3Zpc2lvbiBpcyBuZWVkZWQgZm9yIHRoZSBjYXNlIHdoZXJlIHRoZSBTRlAgaXMNCj4gPj4+IGlz
b21vcnBoaWMNCj4gPj4+ID4+IHRvIHRoZSBTRkMuIEluIHN1Y2ggYSBjYXNlLCB5b3Ugc3RpbGwg
cHJvdmlzaW9uIHRoZSBTRlAuICBBbmQgdGhlDQo+ID4+PiByZXN1bHQNCj4gPj4+ID4+IGlzIGFu
IFNGUCB3aXRoIGFzIG11Y2ggZmxleGliaWxpdHkgYXMgdGhlIFNGQy4NCj4gPj4+ID4+Pg0KPiA+
Pj4gPj4+IElmLCBpbiBjb250cmFzdCwgeW91IGRlY2xhcmUgdGhhdCB0aGUgcHJvdmlzaW9uaW5n
IGluY2x1ZGVzIHRoZQ0KPiBTRkMNCj4gPj4+IHRoZW4NCj4gPj4+ID4+IHlvdSBhcmUgaW50cm9k
dWNpbmcgZXh0cmEgY29tcGxleGl0eSB3aXRob3V0IGFkZGluZyBhbnkgbmV3IGNhc2VzDQo+ID4+
PnRoYXQNCj4gPj4+IGNhbg0KPiA+Pj4gPj4gYmUgaGFuZGxlZC4NCj4gPj4+ID4+Pg0KPiA+Pj4g
Pj4+IFlvdXJzLA0KPiA+Pj4gPj4+IEpvZWwNCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+IC0tLS0tT3Jp
Z2luYWwgTWVzc2FnZS0tLS0tDQo+ID4+PiA+Pj4gRnJvbTogbW9oYW1lZC5ib3VjYWRhaXJAb3Jh
bmdlLmNvbQ0KPiA+Pj4gW21haWx0bzptb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tXQ0KPiA+
Pj4gPj4+IFNlbnQ6IFR1ZXNkYXksIE5vdmVtYmVyIDE3LCAyMDE1IDk6MDMgQU0NCj4gPj4+ID4+
PiBUbzogSm9lbCBIYWxwZXJuOyBQYXVsIFF1aW5uIChwYXVscSkNCj4gPj4+ID4+PiBDYzogc2Zj
IGlzc3VlIHRyYWNrZXI7IGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtDQo+IHBsYW5lQHRvb2xzLmll
dGYub3JnOw0KPiA+Pj4gPj4gc2ZjQGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4gPj4+ID4+
PiBTdWJqZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29u
dHJvbCBwbGFuZQ0KPiA+Pj4gPj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0K
PiA+Pj4gPj4+DQo+ID4+PiA+Pj4gSGkgSm9lbCwNCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+IFBsZWFz
ZSBzZWUgaW5saW5lLg0KPiA+Pj4gPj4+DQo+ID4+PiA+Pj4gQ2hlZXJzLA0KPiA+Pj4gPj4+IE1l
ZA0KPiA+Pj4gPj4+DQo+ID4+PiA+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPiA+
Pj4gPj4+PiBEZSA6IEpvZWwgSGFscGVybiBbbWFpbHRvOmpvZWwuaGFscGVybkBlcmljc3Nvbi5j
b21dDQo+ID4+PiA+Pj4+IEVudm95w6kgOiBtYXJkaSAxNyBub3ZlbWJyZSAyMDE1IDE0OjQ5DQo+
ID4+PiA+Pj4+IMOAIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlubiAocGF1
bHEpIENjIDogc2ZjIGlzc3VlDQo+ID4+PiA+Pj4+IHRyYWNrZXI7IGRyYWZ0LWlldGYtc2ZjLWNv
bnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7DQo+ID4+PiA+Pj4+IHNmY0BpZXRmLm9yZzsgSm9l
bCBNLiBIYWxwZXJuDQo+ID4+PiA+Pj4+IE9iamV0IDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1w
bGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4gPj4+ID4+Pj4gb3BlcmF0ZXMgb24g
U0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPiA+Pj4gPj4+Pg0KPiA+Pj4gPj4+PiBZb3VyIHN0YXRl
bWVudCB0aGF0ICIgSXQgaGFwcGVucyB0aGF0IGluZm9ybWF0aW9uIGlzIG5vIG1vcmUgdGhhbg0K
PiA+Pj50aGUNCj4gPj4+ID4+Pj4gc2VydmljZSBjaGFpbiBpdHNlbGYgKHdpdGhvdXQgYW55IGNv
bnN0cmFpbnRzKS4iIChXaGVyZSAiaXQiDQo+ID4+PnJlZmVycw0KPiA+Pj4gdG8NCj4gPj4+ID4+
ICINCj4gPj4+ID4+Pj4gdGhlIGV4YWN0IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8g
cmVhbGl6ZSB0aGUgU0ZDIi4pIERvZXMNCj4gPj4+bm90DQo+ID4+PiA+Pj4+IG1ha2Ugc2Vuc2Ug
dG8gbWUuDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBbTWVkXSBSRkMgNzY2NSBzYXlzOg0KPiA+Pj4g
Pj4+DQo+ID4+PiA+Pj4gIiAgIFRodXMsIHRoZSBwb2xpY2llcyBhbmQgbG9naWMgb2YgU0ZQIHNl
bGVjdGlvbiBvciBjcmVhdGlvbg0KPiA+Pj4gKGRlcGVuZGluZw0KPiA+Pj4gPj4+ICB1cG9uIHRo
ZSBzb2x1dGlvbikgcHJvZHVjZSB3aGF0IG1heSBiZSB0aG91Z2h0IG9mIGFzIGENCj4gY29uc3Ry
YWluZWQNCj4gPj4+ID4+PiAgdmVyc2lvbiBvZiB0aGUgb3JpZ2luYWwgU0ZDLiAiDQo+ID4+PiA+
Pj4NCj4gPj4+ID4+PiBpbiBzaG9ydDogU0ZQIGlzIGRlZmluZWQgYXMgYSBjb25zdHJhaW5lZCB2
ZXJzaW9uIG9mIHRoZSBvcmlnaW5hbA0KPiA+Pj5TRkMuDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBX
aGF0IGlzIHRoZSBuYW1lIHRvIHVzZSB0byByZWZlciB0byBhICJub24tY29uc3RyYWluZWQiIFNG
QyBvciB0bw0KPiA+Pj50aGUNCj4gPj4+ID4+IGluZm9ybWF0aW9uIHRoYXQgeW91IHdpbGwgcHJv
dmlzaW9uIHRvIGFuIFNGRiB3aGVuIHRoZSBwYXRoDQo+ID4+PmNvbXB1dGF0aW9uDQo+ID4+PiA+
PiBhbmQgc2VsZWN0aW9uIGRlY2lzaW9uIGlzICJkZWZlcnJlZCB0byB0aGUgU0ZGIj8NCj4gPj4+
ID4+Pg0KPiA+Pj4gPj4+IEl0IGRvZXMgbm90IG1ha2Ugc2Vuc2UgdG8gY2FsbCBhIG5vbi1jb25z
dHJhaW5lZCB2ZXJzaW9uIG9mIHRoZQ0KPiBTRkMNCj4gPj4+YXMNCj4gPj4+ID4+IFNGUCBnaXZl
biB0aGF0IFJGQzc2NjUgZXhwbGljaXRseSBkZWZpbmVzIFNGUCBhcyAiY29uc3RyYWluZWQNCj4g
Pj4+dmVyc2lvbg0KPiA+Pj4gb2YNCj4gPj4+ID4+IHRoZSBvcmlnaW5hbCBTRkMiIQ0KPiA+Pj4g
Pj4+DQo+ID4+PiA+Pj4gVGhlIFNGQyBpcyB0aGUgZ2VuZXJhbCBkZXNjcmlwdGlvbiBvZiB0aGUg
b2JqZWN0aXZlLiAgVGhhdA0KPiA+Pj4gPj4+PiBpcyBub3QgdGhlIHNhbWUgYXMgdGhlIGV4YWN0
IHNlcXVlbmNlIG9mIHBsYWNlcyB0aGF0IG11c3QgYmUNCj4gPj4+dmlzaXRlZC4NCj4gPj4+ID4+
Pj4NCj4gPj4+ID4+Pj4gSSBzdGFuZCBieSBteSBlYXJsaWVyIGNvbW1lbnRzIHRoYXQgYWxtb3N0
IGFsbCB1c2VzIG9mIFNGQyBpbiB0aGUNCj4gPj4+ID4+Pj4gY29udHJvbCByZXF1aXJlbWVudHMg
ZHJhZnQgc2hvdWxkIGJlIFNGUC4NCj4gPj4+ID4+Pj4NCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+IFtN
ZWRdIEkgbm90ZWQgdGhhdCBKb2VsLi4gdGhhdCdzIGZhaXIgYnV0IHRoaXMgcG9zaXRpb24gaXMg
SU1ITw0KPiBub3QNCj4gPj4+ID4+IGFsaWduZWQgd2l0aCBSRkM3NjY1IHRoYXQgYWxsb3dzIHRv
IGNvbnRyb2wgYW55IHZhcmlhdGlvbiBmcm9tIGENCj4gPj4+bm9uLQ0KPiA+Pj4gPj4gY29uc3Ry
YWluZWQgU0ZDIHRvIGEgZnVsbHkgY29uc3RyYWluZWQgU0ZDLg0KPiA+Pj4gPj4+DQo+ID4+PiA+
Pj4+IFlvdXJzLA0KPiA+Pj4gPj4+PiBKb2VsDQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+IC0tLS0t
T3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+ID4+PiA+Pj4+IEZyb206IG1vaGFtZWQuYm91Y2FkYWly
QG9yYW5nZS5jb20NCj4gPj4+ID4+Pj4gW21haWx0bzptb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2Uu
Y29tXQ0KPiA+Pj4gPj4+PiBTZW50OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA4OjM0IEFN
DQo+ID4+PiA+Pj4+IFRvOiBQYXVsIFF1aW5uIChwYXVscSkNCj4gPj4+ID4+Pj4gQ2M6IHNmYyBp
c3N1ZSB0cmFja2VyOw0KPiA+Pj5kcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmll
dGYub3JnOw0KPiA+Pj4gPj4+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPiA+Pj4g
Pj4+PiBTdWJqZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUg
Y29udHJvbCBwbGFuZQ0KPiA+Pj4gPj4+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBl
dGMuDQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+IEhpIFBhdWwsDQo+ID4+PiA+Pj4+DQo+ID4+PiA+
Pj4+IFRoYW5rIHlvdSBmb3Igc2hhcmluZyB5b3VyIGZlZWRiYWNrLg0KPiA+Pj4gPj4+Pg0KPiA+
Pj4gPj4+PiBSRkM3NjY1IHNheXMgdGhlIGZvbGxvd2luZzoNCj4gPj4+ID4+Pj4NCj4gPj4+ID4+
Pj4gIg0KPiA+Pj4gPj4+PiBUaGlzIGFyY2hpdGVjdHVyZSBkb2VzIG5vdCBtYW5kYXRlIHRoZSBk
ZWdyZWUgb2YNCj4gPj4+ID4+Pj4gIHNwZWNpZmljaXR5IG9mIHRoZSBTRlAuICBBcmNoaXRlY3R1
cmFsbHksIHdpdGhpbiB0aGUgc2FtZSBTRkMtDQo+ID4+PiBlbmFibGVkDQo+ID4+PiA+Pj4+ICBk
b21haW4sIHNvbWUgU0ZQcyBtYXkgYmUgZnVsbHkgc3BlY2lmaWVkLCBzZWxlY3RpbmcgZXhhY3Rs
eQ0KPiB3aGljaA0KPiA+Pj4gU0ZGDQo+ID4+PiA+Pj4+ICBhbmQgd2hpY2ggU0YgYXJlIHRvIGJl
IHZpc2l0ZWQgYnkgcGFja2V0cyB1c2luZyB0aGF0IFNGUCwgd2hpbGUNCj4gPj4+IG90aGVyDQo+
ID4+PiA+Pj4+ICBTRlBzIG1heSBiZSBxdWl0ZSB2YWd1ZSwgZGVmZXJyaW5nIHRvIHRoZSBTRkYg
dGhlIGRlY2lzaW9ucw0KPiBhYm91dA0KPiA+Pj4gdGhlDQo+ID4+PiA+Pj4+ICBleGFjdCBzZXF1
ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJlYWxpemUgdGhlIFNGQy4gIFRoZQ0KPiA+Pj4g
Pj4+PiAgc3BlY2lmaWNpdHkgbWF5IGJlIGFueXdoZXJlIGluIGJldHdlZW4gdGhlc2UgZXh0cmVt
ZXMuDQo+ID4+PiA+Pj4+ICINCj4gPj4+ID4+Pj4NCj4gPj4+ID4+Pj4gVGhlIGNvbnRyb2wgZHJh
ZnQgaXMgY29tcGxldGVseSBhbGlnbmVkIHdpdGggdGhhdCBhcHByb2FjaC4NCj4gPj4+ID4+Pj4N
Cj4gPj4+ID4+Pj4gVGhlIGNvbnRyb2wtcGxhbmUgZG9jdW1lbnQgYWxsb3dzIGluIHBhcnRpY3Vs
YXIgdG8gcHJvdmlzaW9uDQo+ID4+PnJlcXVpcmVkDQo+ID4+PiA+Pj4+IGluZm9ybWF0aW9uIHdo
ZW4gImRlZmVycmluZyB0byB0aGUgU0ZGIHRoZSBkZWNpc2lvbnMgYWJvdXQgdGhlDQo+ID4+PiA+
Pj4+ICBleGFjdCBzZXF1ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJlYWxpemUgdGhlIFNG
QyIuIEl0DQo+ID4+PmhhcHBlbnMNCj4gPj4+ID4+Pj4gdGhhdCBpbmZvcm1hdGlvbiBpcyBubyBt
b3JlIHRoYW4gdGhlIHNlcnZpY2UgY2hhaW4gaXRzZWxmDQo+ICh3aXRob3V0DQo+ID4+PiBhbnkN
Cj4gPj4+ID4+Pj4gY29uc3RyYWludHMpLg0KPiA+Pj4gPj4+Pg0KPiA+Pj4gPj4+PiBBbHNvLCB0
aGUgY3VycmVudCBjb250cm9sLXBsYW5lIGRvY3VtZW50IGFsbG93cyB0byBpbnN0cnVjdCBhDQo+
ID4+Pmxvb3NlDQo+ID4+PiA+Pj4+IHBhdGgNCj4gPj4+ID4+Pj4gKFNGUCkgb3IgYSBzdHJpY3Qg
cGF0aCAoUlNQKSwgZXRjLg0KPiA+Pj4gPj4+Pg0KPiA+Pj4gPj4+PiBJIGZ1bGx5IGFncmVlIHRo
YXQgd2hldGhlciBhIGZ1bGwgcGF0aCBpcyBzcGVjaWZpZWQgd2l0aGluIGENCj4gPj4+ZG9tYWlu
DQo+ID4+PiBvcg0KPiA+Pj4gPj4+PiBpZiBpdCBpcyBkZWZlcnJlZCB0byBTRkZzIGlzIHJlYWxs
eSBkZXBsb3ltZW50LXNwZWNpZmljLg0KPiA+Pj4gTmV2ZXJ0aGVsZXNzLA0KPiA+Pj4gPj4+PiB0
aGUgY29udHJvbCBwbGFuIHNob3VsZCBhY2NvbW1vZGF0ZSBhbGwgdGhlc2UgZmxhdm9ycy4NCj4g
Pj4+ID4+Pj4NCj4gPj4+ID4+Pj4gQ2hlZXJzLA0KPiA+Pj4gPj4+PiBNZWQNCj4gPj4+ID4+Pj4N
Cj4gPj4+ID4+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPiA+Pj4gPj4+Pj4gRGUg
OiBQYXVsIFF1aW5uIChwYXVscSkgW21haWx0bzpwYXVscUBjaXNjby5jb21dIEVudm95w6kgOg0K
PiA+Pj52ZW5kcmVkaQ0KPiA+Pj4gPj4+Pj4gMTYgb2N0b2JyZSAyMDE1IDE0OjA0IMOAIDogSm9l
bCBNLiBIYWxwZXJuIENjIDogQk9VQ0FEQUlSIE1vaGFtZWQNCj4gPj4+ID4+Pj4+IElNVC9PTE47
IHNmYyBpc3N1ZSB0cmFja2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLQ0KPiA+Pj4gPj4+Pj4g
cGxhbmVAdG9vbHMuaWV0Zi5vcmc7IHNmY0BpZXRmLm9yZyBPYmpldCA6IFJlOiBbc2ZjXSAjMTUN
Cj4gPj4+ID4+Pj4+IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZSBv
cGVyYXRlcyBvbiBTRkMgSURzLA0KPiA+Pj5TRlANCj4gPj4+ID4+IElEcywgZXRjLg0KPiA+Pj4g
Pj4+Pj4NCj4gPj4+ID4+Pj4+IEpvZWwsDQo+ID4+PiA+Pj4+Pg0KPiA+Pj4gPj4+Pj4gSSBjb25j
dXIuDQo+ID4+PiA+Pj4+Pg0KPiA+Pj4gPj4+Pj4gVGhlIGRhdGEgcGxhbmUgZGVhbCB3aXRoIHBh
dGhzLCBub3QgY2hhaW5zLiAgVGhlIHJlbGF0aW9uc2hpcCBvZg0KPiA+Pj4gPj4+Pj4gcGF0aHMg
dG8gY2hhaW5zIGZhbGxzIHNxdWFyZWx5IGluIHRoZSBjb250cm9sIHBsYW5lIChvciBldmVuDQo+
IG1vcmUNCj4gPj4+ID4+Pj4+IGxpa2VseQ0KPiA+Pj4gPj4+PiAicG9saWN5Ig0KPiA+Pj4gPj4+
Pj4gcGxhbmUpIHJlYWxtLiAgVGhlIHNwZWNpZmljaXR5IG9mIHRoZSBwYXRoIGlzIGxlZnQgdG8N
Cj4gPj4+ID4+Pj4+IGltcGxlbWVudGF0aW9uLCBpbiB0aGUgYXJjaGl0ZWN0dXJlIGRyYWZ0LCBi
dXQgdGhhdCdzIGNvbnNpc3RlbnQNCj4gPj4+ID4+Pj4+IHdpdGggeW91ciBwb3NpdGlvbiBhbmQg
cHJvdmlkZXMgdGhlIHJlcXVpc2l0ZSBmdW5jdGlvbmFsaXR5Lg0KPiA+Pj4gPj4+Pj4NCj4gPj4+
ID4+Pj4+IFBhdWwNCj4gPj4+ID4+Pj4+DQo+ID4+PiA+Pj4+Pj4gT24gU2VwIDE3LCAyMDE1LCBh
dCAxMTozNiBBTSwgSm9lbCBNLiBIYWxwZXJuDQo+ID4+PiA+Pj4+Pj4gPGptaEBqb2VsaGFscGVy
bi5jb20+DQo+ID4+PiA+Pj4+PiB3cm90ZToNCj4gPj4+ID4+Pj4+Pg0KPiA+Pj4gPj4+Pj4+IEFz
IGZhciBhcyBJIGNhbiB0ZWxsLCB0aGVyZSBpcyBub3RoaW5nIGluIHRoZSBTZXJ2aWNlIENoYWlu
aW5nDQo+ID4+PiA+Pj4+Pj4gd29yayB0aGF0DQo+ID4+PiA+Pj4+PiByZXF1aXJlcyBjb3JyZWxh
dGluZyBzZXJ2aWNlIHBhdGggSURzIHdpdGggc2VydmljZSBjaGFpbiBJRHMNCj4gPj4+d2l0aGlu
DQo+ID4+PiA+Pj4+PiB0aGUgZGF0YSBwbGFuZS4gIEFueSBzdWNoIHJlbGF0aW9uc2hpcCBleGlz
dHMgZW50aXJlbHkgd2l0aGluDQo+IHRoZQ0KPiA+Pj4gPj4+Pj4gY29udHJvbCBwbGFuZSBvciBh
Ym92ZSwgYW5kIHdvdWxkIGJlIGRyaXZlbiBieSByZXF1aXJlbWVudHMNCj4gb3RoZXINCj4gPj4+
ID4+Pj4+IHRoYW4gdGhlIGRhdGEgcGxhbmUuICBXaGVuIEkgbG9vayBhdCB0aGlzIGRvY3VtZW50
LCBhbGwgb2YgdGhlDQo+ID4+PiA+Pj4+PiByZXF1aXJlbWVudHMgdGhhdCB0YWxrIGFib3V0IHNl
cnZpY2UgZnVuY3Rpb24gY2hhaW4gSURzIGNhbiBiZQ0KPiA+Pj4gPj4+Pj4gYWNjdXJhdGVseSBj
YXB0dXJlZCwgaW4gdGVybXMgb2YgZGF0YSBwbGFuZSByZXF1aXJlbWVudHMsIGJ5DQo+ID4+PnNl
cnZpY2UNCj4gPj4+ID4+IGZ1bmN0aW9uIHBhdGggSURzLg0KPiA+Pj4gPj4+Pj4gVGh1cywgdGhl
IHJlcXVpcmVtZW50IHRoYXQgdGhlIGRhdGEgcGxhbmUgaGFzIGlzIHRvIHNlZSBzdWNoDQo+IHBh
dGgNCj4gPj4+IElEcy4NCj4gPj4+ID4+Pj4+IFllcywgaW4gc29tZSBkZXBsb3ltZW50cyB0aG9z
ZSB3aWxsIGJlIDEtMSB3aXRoIGNoYWluIElEcy4gIFRoZXkNCj4gPj4+YXJlDQo+ID4+PiA+Pj4+
IHN0aWxsIHBhdGggSURzLg0KPiA+Pj4gPj4+Pj4+DQo+ID4+PiA+Pj4+Pj4gSW50cm9kdWNpbmcg
YSByZXF1aXJlbWVudCBmb3IgdGhlIGRhdGEgcGxhbmUgdG8gc2VlIGFuZCB3b3JrDQo+ID4+Pndp
dGgNCj4gPj4+ID4+Pj4+PiBjaGFpbg0KPiA+Pj4gPj4+Pj4gSURzIGlzIG5vdCBncm91bmRlZCBp
biB0aGUgd29yayBvZiB0aGUgZ3JvdXAuDQo+ID4+PiA+Pj4+Pj4NCj4gPj4+ID4+Pj4+PiBZb3Vy
cywNCj4gPj4+ID4+Pj4+PiBKb2VsIE0uIEhhbHBlcm4NCj4gPj4+ID4+Pj4+Pg0KPiA+Pj4gPj4+
Pj4+IE9uIDkvMTcvMTUgNzo1MyBBTSwgbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbSB3cm90
ZToNCj4gPj4+ID4+Pj4+Pj4gUmUtLA0KPiA+Pj4gPj4+Pj4+Pg0KPiA+Pj4gPj4+Pj4+PiBUaGUg
Y29udHJvbCBkcmFmdCBhcyBpdCBzdGFuZHMgaXMgY29tcGxpYW50IHdpdGggdGhlIGRhdGENCj4g
cGxhbmUNCj4gPj4+ID4+Pj4+IGFyY2hpdGVjdHVyZSBkb2N1bWVudC4NCj4gPj4+ID4+Pj4+Pj4N
Cj4gPj4+ID4+Pj4+Pj4gSW5kZWVkLCB0aGUgYXJjaCBkcmFmdCBhY2tub3dsZWRnZXMgdGhlIGZv
bGxvd2luZzoNCj4gPj4+ID4+Pj4+Pj4gKDEpIFNGUHMgYXJlICJhc3NvY2lhdGVkIHdpdGggYSBn
aXZlbiBTRkMiLg0KPiA+Pj4gPj4+Pj4+PiAoMikgU0ZQcyBhcmUgcHJlc2VudGVkIGFzIGEgZm9y
bSBvZiBjb25zdHJhaW5lZCBTRkNzLg0KPiA+Pj4gPj4+Pj4+PiAoMykgU29tZSBkZXBsb3ltZW50
cyBtYXkgbm90IGltcG9zZSBhbnkgY29uc3RyYWludCBvbiB0aGUNCj4gPj4+ID4+Pj4+Pj4gYWJz
dHJhY3QNCj4gPj4+ID4+Pj4gU0ZDDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBfX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+Pj4gPj4+IHNmYyBtYWlsaW5n
IGxpc3QNCj4gPj4+ID4+PiBzZmNAaWV0Zi5vcmcNCj4gPj4+ID4+PiBodHRwczovL3d3dy5pZXRm
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KPiA+Pj4gPg0KPiA+Pg0KPiA+DQo+ID5fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+c2ZjIG1haWxpbmcg
bGlzdA0KPiA+c2ZjQGlldGYub3JnDQo+ID5odHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xp
c3RpbmZvL3NmYw0KDQo=


From nobody Thu Nov 19 03:03:52 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A24801A8F4E for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:12:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C4k0C7MMkVMr for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 23:12:17 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 426121A8F46 for <sfc@ietf.org>; Wed, 18 Nov 2015 23:12:16 -0800 (PST)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id D6DF018C280; Thu, 19 Nov 2015 08:12:14 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.58]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id B0DC7238048; Thu, 19 Nov 2015 08:12:14 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM33.corporate.adroot.infra.ftgroup ([fe80::3881:fc15:b4b2:9017%19]) with mapi id 14.03.0248.002; Thu, 19 Nov 2015 08:12:14 +0100
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAABVmgIAA0liQ
Date: Thu, 19 Nov 2015 07:12:14 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.10.16.122716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Kdn6aLccOVPnSrHZtakd9qKEym8>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 07:12:23 -0000

SGkgRGF2ZSwNCg0KSSBmdWxseSBhZ3JlZSB3aXRoIHRoaXMgYW5hbG9neTogDQoNCj09DQpTRkMg
PC0tPiBkZXN0aW5hdGlvbiBob3N0IG5hbWUNClNGUCA8LS0+IGRlc3RpbmF0aW9uIElQIGFkZHJl
c3MNClJTUCA8LS0+IHNlcXVlbmNlIG9mIHJvdXRlcnMgYW5kIGxpbmtzIHRvIGRlbGl2ZXIgdGhl
IElQIHBhY2tldA0KPT0NCg0KSGVuY2UgdGhlIG5lZWQgZm9yIHRoZSBjb250cm9sIHBsYW5lIHRv
IGluc3RydWN0IHRoZSB1bmRlcmx5aW5nIGRhdGEgcGxhbmUgZWxlbWVudHMgd2l0aCByZXF1aXJl
ZCBpbmZvcm1hdGlvbiBhdCBlYWNoIG9mIHRoZXNlIHRocmVlIGxldmVscy4gDQoNCkNoZWVycywN
Ck1lZA0KDQo+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPiBEZcKgOiBzZmMgW21haWx0
bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10gRGUgbGEgcGFydCBkZSBEYXZlIERvbHNvbg0KPiBFbnZv
ecOpwqA6IG1lcmNyZWRpIDE4IG5vdmVtYnJlIDIwMTUgMjA6MzQNCj4gw4DCoDogSmltIEd1aWNo
YXJkIChqZ3VpY2hhcikNCj4gQ2PCoDogc2ZjQGlldGYub3JnDQo+IE9iamV0wqA6IFJlOiBbc2Zj
XSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVz
DQo+IG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4gDQo+IFtyZWR1Y2VkIGRpc3RyaWJ1dGlv
biB0byBKaW0gJiBzZmMgbGlzdF0NCj4gDQo+IEppbSwNCj4gSSB0aGluayB5b3VyIGRlc2NyaXB0
aW9uIGlzIGhlbHBmdWwuIENhbiB3ZSBmaW5kIGEgcGxhY2UgZm9yIHRoaXMgaW4gdGhlDQo+IGRv
Y3M/DQo+IA0KPiBJIGRvbid0IHRoaW5rIEkgY2FuIHVuZGVyc3RhbmQgaXQgd2l0aG91dCByZWZl
cnJpbmcgdG8gdGhlIGNvbmNyZXRlIE5TSCwNCj4gaG93ZXZlci4NCj4gDQo+IA0KPiBJZiBJIHVu
ZGVyc3RhbmQgY29ycmVjdGx5LCB0aGUgZm9sbG93aW5nIGFyZSB0cnVlOg0KPiAtIGlmIHRoZSBO
U0ggU1BJIGluIHR3byBwYWNrZXRzIGFyZSB0aGUgc2FtZSwgdGhleSBhcmUgb24gdGhlIHNhbWUg
U0ZQLg0KPiAtIGlmIHRoZSBOU0ggU1BJIGluIHR3byBwYWNrZXRzIGFyZSBkaWZmZXJlbnQsIHRo
ZXkgYXJlIG9uIGRpZmZlcmVudCBTRlBzLg0KPiAtIGFsdGhvdWdoIHR3byBwYWNrZXRzIGhhdmUg
dGhlIHNhbWUgU1BJLCB0aGV5IG1heSB0cmF2ZXJzZSBkaWZmZXJlbnQNCj4gUlNQcy4NCj4gDQo+
IC0gd2hlbiB0aGlua2luZyBvZiB0aGUgZGF0YS1wbGFuZSBhbmQgc291dGgtYm91bmQgaW50ZXJm
YWNlcyBDMSB0aHJ1IEM0LA0KPiB0aGUgU0ZDIGNvbmNlcHQgZG9lc24ndCBleGlzdC4NCj4gICAg
KFNGQyBpcyBqdXN0IGEgbm9ydGgtaW50ZXJmYWNlIGNvbmNlcHQgbGlrZSwgImNoYWluIEEgcHJv
dmlkZXMgYQ0KPiBmaXJld2FsbCBhbmQgYSBOQVQiKQ0KPiANCj4gSGF2ZSBJIGdvdCBpdCByaWdo
dD8NCj4gDQo+IA0KPiBJIGFsc28gdGhpbmsgdGhlIGZvbGxvd2luZyAqYW5hbG9neSogd2l0aCBy
b3V0aW5nIGNhbiBiZSBkcmF3bjoNCj4gU0ZDIDwtLT4gZGVzdGluYXRpb24gaG9zdCBuYW1lDQo+
IFNGUCA8LS0+IGRlc3RpbmF0aW9uIElQIGFkZHJlc3MNCj4gUlNQIDwtLT4gc2VxdWVuY2Ugb2Yg
cm91dGVycyBhbmQgbGlua3MgdG8gZGVsaXZlciB0aGUgSVAgcGFja2V0DQo+IA0KPiANCj4gLURh
dmUNCj4gDQo+IA0KPiANCj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gRnJvbTogc2Zj
IFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBKaW0gR3VpY2hhcmQN
Cj4gKGpndWljaGFyKQ0KPiBTZW50OiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4LCAyMDE1IDExOjE4
IEFNDQo+IFRvOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSk7IG1vaGFtZWQuYm91Y2FkYWly
QG9yYW5nZS5jb20NCj4gQ2M6IHNmYyBpc3N1ZSB0cmFja2VyOyBzZmNAaWV0Zi5vcmc7IFBhdWwg
UXVpbm4gKHBhdWxxKTsgZHJhZnQtaWV0Zi1zZmMtDQo+IGNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0
Zi5vcmc7IEpvZWwgSGFscGVybjsgSm9lbCBNLiBIYWxwZXJuDQo+IFN1YmplY3Q6IFJlOiBbc2Zj
XSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVz
DQo+IG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4gDQo+IFtDaGFpciBoYXQgb2ZmIOKApl0N
Cj4gDQo+IEkgaGF2ZSB0byBzYXkgSSBhbSBzdHJ1Z2dsaW5nIHRvIHNlZSB0aGUg4oCcaXNzdWXi
gJ0gaW4gdGhpcyB0aHJlYWQgdGhhdCBuZWVkcw0KPiB0byBiZSBhZGRyZXNzZWQgb3RoZXIgdGhh
biBjb25mdXNpb24gb3ZlciBTRkMgdnMgU0ZQIGRlZmluaXRpb247IGZyb20gYQ0KPiBkYXRhIHBs
YW5lIHBlcnNwZWN0aXZlIGl0IGlzICp2ZXJ5KiBjbGVhciB0aGF0IFNGUC9TSSBpZGVudGlmaWVy
cyBhcmUgdXNlZA0KPiBhcyB0aGUgbG9va3VwIGtleSBpbnRvIGEgZm9yd2FyZGluZyBjb25zdHJ1
Y3QgdGhhdCBtYXkgY29udGFpbiAxOm4gbnVtYmVyDQo+IG9mIG5leHQtaG9wcyAoU0ZGcywgU0Zz
KS4gSW4gc29tZSBjYXNlcyB0aGF0IGxvb2t1cCB3aWxsIHBvaW50IHRvIGEgc2luZ2xlDQo+IG5l
eHQtaG9wLCBpbiBvdGhlcnMgbXVsdGlwbGUgbmV4dC1ob3BzLiBJbiAqYWxsKiBjYXNlcyB0aGlz
IGhhcyBhYnNvbHV0ZWx5DQo+IG5vdGhpbmcgdG8gZG8gd2l0aCB0aGUgU0ZDIGFzIGVhY2ggcmVw
cmVzZW50YXRpb24gb2YgdGhhdCBTRkMgaXMgdW5pcXVlbHkNCj4gaWRlbnRpZmllZCBieSBhbiBT
RlAtaWQuDQo+IA0KPiBKaW0NCj4gDQo+IE9uIDExLzE4LzE1LCAxMDoxOSBBTSwgInNmYyBvbiBi
ZWhhbGYgb2YgQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpIg0KPiA8c2ZjLWJvdW5jZXNAaWV0
Zi5vcmcgb24gYmVoYWxmIG9mIGNwaWduYXRhQGNpc2NvLmNvbT4gd3JvdGU6DQo+IA0KPiA+SGks
IE1lZCwNCj4gPg0KPiA+SSBhbHNvIHJlZmVycmVkIHRvIG90aGVyIHBhcnRzIG9mIHRoZSBkb2N1
bWVudCwgd2hlbiBJIHdyb3RlOg0KPiA+DQo+ID4+IFRoZSBjb250cm9sLXBsYW5lIGRyYWZ0IHRh
bGtzIGFib3V0IMKzU0ZDIGZvcndhcmRpbmfCsiBhbmQgwrNTRkMgZGF0YQ0KPiA+PnBsYW5lwrIN
Cj4gPg0KPiA+DQo+ID5Gb3IgZXhhbXBsZSwgSSBhbSBub3Qgc3VyZSBJIHVuZGVyc3RhbmQgd2hh
dCB0aGlzIG1lYW5zOg0KPiA+DQo+ID4iICAgbyAgUG9wdWxhdGUgU0ZDIGZvcndhcmRpbmcgcG9s
aWN5IHRhYmxlcyBvZiBpbnZvbHZlZCBTRkMgZGF0YSBwbGFuZcKyDQo+ID4NCj4gPg0KPiA+T3Ig
YXQ6DQo+ID4iICAgbyAgU0ZDIEZvcndhcmRpbmcgUG9saWN5IFRhYmxlOiB0aGlzIHRhYmxlIHJl
ZmxlY3RzIHRoZSBTRkMtc3BlY2lmaWMNCj4gPiAgICAgdHJhZmZpYyBmb3J3YXJkaW5nIHBvbGlj
eSBlbmZvcmNlZCBieSBTRkYgY29tcG9uZW50cyBmb3IgZXZlcnkNCj4gPiAgICAgcmVsZXZhbnQg
aW5jb21pbmcgcGFja2V0IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBvbmUgb2YgdGhlIGV4aXN0aW5n
DQo+ID4gICAgIFNGQ3MuIg0KPiA+DQo+ID4NCj4gPk15IGNvbW1lbnQgaXMgdGhhdCB0aG9zZSBz
aG91bGQgYmUgwrNTRlAiDQo+ID4NCj4gPlRoYW5rcywNCj4gPg0KPiA+4oC5IENhcmxvcy4NCj4g
Pg0KPiA+LS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gPkZyb206IE1lZCBCb3VjYWRhaXIg
PG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20+DQo+ID5EYXRlOiBXZWRuZXNkYXksIE5vdmVt
YmVyIDE4LCAyMDE1IGF0IDEwOjAzIEFNDQo+ID5UbzogQ2FybG9zIFBpZ25hdGFybyA8Y3BpZ25h
dGFAY2lzY28uY29tPg0KPiA+Q2M6ICJQYXVsIFF1aW5uIChwYXVscSkiIDxwYXVscUBjaXNjby5j
b20+LA0KPiA+ImRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmciDQo+
ID48ZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZz4sIEpvZWwgSGFs
cGVybg0KPiA+PGptaEBqb2VsaGFscGVybi5jb20+LCBzZmMgaXNzdWUgdHJhY2tlciA8dHJhYytz
ZmNAdG9vbHMuaWV0Zi5vcmc+LA0KPiA+InNmY0BpZXRmLm9yZyIgPHNmY0BpZXRmLm9yZz4sIEpv
ZWwgSGFscGVybiA8am9lbC5oYWxwZXJuQGVyaWNzc29uLmNvbT4NCj4gPlN1YmplY3Q6IFJFOiBb
c2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lDQo+IG9w
ZXJhdGVzDQo+ID5vbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+ID4NCj4gPj5DYXJsb3MsDQo+
ID4+DQo+ID4+VGhlcmUgaXMgbm90IFNGQyBJRCBpbiB0aGUgY29yZSB0ZXh0IG9mIHRoZSBjb250
cm9sIHBsYW5lIGRyYWZ0Lg0KPiA+Pg0KPiA+PlRoZSB0ZXh0IHlvdSBxdW90ZWQgaXMgcGFydCBv
ZiBhbiBhcHBlbmRpeCB3aXRoIGEgbm90ZSB0aGF0IGNsZWFybHkNCj4gPj5zdGF0ZXMgdGhpcyBp
cyBub3QgZGlzY3Vzc2VkLiBBIGNvcnJlc3BvbmRpbmcgaXNzdWUgcmVjb3JkIGhhcyBiZWVuDQo+
ID4+cmVjb3JkZWQgdG8gc2VlayBmb3IgbW9yZSBmZWVkYmFjayBvbiB0aGF0IGFwcGVuZGl4Lg0K
PiA+Pg0KPiA+PkNoZWVycywNCj4gPj5NZWQNCj4gPj4NCj4gPj4+IC0tLS0tTWVzc2FnZSBkJ29y
aWdpbmUtLS0tLQ0KPiA+Pj4gRGUgOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgW21haWx0
bzpjcGlnbmF0YUBjaXNjby5jb21dDQo+ID4+PiBFbnZvecOpIDogbWVyY3JlZGkgMTggbm92ZW1i
cmUgMjAxNSAxNTozNQ0KPiA+Pj4gw4AgOiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xODQo+ID4+
PiBDYyA6IFBhdWwgUXVpbm4gKHBhdWxxKTsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0
b29scy5pZXRmLm9yZzsNCj4gPj4+Sm9lbA0KPiA+Pj4gTS4gSGFscGVybjsgc2ZjIGlzc3VlIHRy
YWNrZXI7IHNmY0BpZXRmLm9yZzsgSm9lbCBIYWxwZXJuDQo+ID4+PiBPYmpldCA6IFJlOiBbc2Zj
XSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lDQo+ID4+Pm9w
ZXJhdGVzDQo+ID4+PiBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+ID4+Pg0KPiA+Pj4gTWVk
LA0KPiA+Pj4NCj4gPj4+ID4gT24gTm92IDE4LCAyMDE1LCBhdCA4OjA4IEFNLCBtb2hhbWVkLmJv
dWNhZGFpckBvcmFuZ2UuY29tIHdyb3RlOg0KPiA+Pj4gPg0KPiA+Pj4gPiBDYXJsb3MsDQo+ID4+
PiA+DQo+ID4+PiA+IFRoaXMgaXMgYW4gb3BlbiBpc3N1ZSBmb3IgdGhpcyBkcmFmdCwgc28gaXQg
aXMgbm9ybWFsIHRvIGNvbnRpbnVlDQo+ID4+PiBkaXNjdXNzaW5nIGl0LiBJIGRvbid0IGtub3cg
aG93IHlvdSBjYW4gY29uY2x1ZGUgaW4gYWR2YW5jZSB0aGF0IHdlDQo+IGFyZQ0KPiA+Pj4gY2ly
Y2xpbmcuDQo+ID4+PiA+DQo+ID4+Pg0KPiA+Pj4gRGlzY3Vzc2lvbiBpcyBncmVhdCwgTWVkLiBC
dXQgbXkgxZJ3ZSBhcmUgY2lyY2xpbmcnIGNvbW1lbnQgKG5vdCBpbg0KPiA+Pj4gYWR2YW5jZWQs
IGJ1dCBhbHJlYWR5IGV2aWRlbnQpIGlzIGJlY2F1c2UgSSBzYXcgdGhlIHNhbWUgcXVlc3Rpb25z
LA0KPiA+Pj5zYW1lDQo+ID4+PiBhcmd1bWVudHMsIGFuZCBzYW1lIGFuc3dlcnMgYXMgYmVmb3Jl
Lg0KPiA+Pj4NCj4gPj4+ID4gInN0cm9uZ2x5IGJlbGlldmUiIGlzIG5vdCBhIHRlY2huaWNhbCBh
cmd1bWVudCwgYnR3Lg0KPiA+Pj4gPg0KPiA+Pj4NCj4gPj4+IFdlbGwsIEkgYmVsaWV2ZSBzbyBv
biB0ZWNobmljYWwgZ3JvdW5kcyEgTW9zdCBvZiB3aGljaCBoYXZlIGFscmVhZHkNCj4gPj4+YmVl
bg0KPiA+Pj4gc2FpZCwgc28gSSBkbyBub3Qgd2FudCB0byBjb250cmlidXRlIHRvIHRoZSBjaXJj
dWxhciBkaXNjdXNzaW9uLg0KPiA+Pj4NCj4gPj4+IFRoZSBjb250cm9sLXBsYW5lIGRyYWZ0IHRh
bGtzIGFib3V0IMKzU0ZDIGZvcndhcmRpbmfCsiBhbmQgwrNTRkMgZGF0YQ0KPiA+Pj5wbGFuZcKy
LA0KPiA+Pj4gYW5kIMKzU0ZDIElEc8KyLiBUaGUgYXJjaGl0ZWN0dXJlIHNheXMgdGhhdCBTRkMg
YXJlIG1hZGUgb2YgYWJzdHJhY3QNCj4gPj4+c2VydmljZQ0KPiA+Pj4gZnVuY3Rpb25zLiBUaGVy
ZcK5cyBubyBhY3R1YWwgZm9yd2FyZGluZyBpbiB0aGlzIGFic3RyYWN0IGNvbmNlcHR1YWwNCj4g
Pj4+bW9kZWwuDQo+ID4+Pg0KPiA+Pj4gVGhlIGNvbnRyb2wtcGxhbmUgZHJhZnQgc2F5cyDCs1N1
cHBvc2UgdGhlIFNGQyBJRCBmb3IgdGhpcyBTRlAgaXMNCj4gPj4+ICJ5ZWxsb3fCsizCsiwgYW5k
IG15IHBvaW50IGFnYWluIGlzIHRoYXQgaW4gdGhlIGRhdGEgcGxhbmUgYW4gU0ZQIGhhcyBhbg0K
PiA+Pj4gaWRlbnRpZmllciAod2hpY2ggaWRlbnRpZmllcyB0aGUgU0ZQIChTRlAtSUQpIGFuZCBp
cyBub3QgdGhlDQo+IGlkZW50aWZpZXINCj4gPj4+b2YNCj4gPj4+IHNvbWV0aGluZyBlbHNlLCBp
dMK5cyBub3QgYSBUb3BvbG9neS1JRCwgaXTCuXMgbm90IGEgU0tVLCBpdMK5cyBub3QgYQ0KPiBV
UkksDQo+ID4+PiBpdMK5cyBub3QgYSBGYW1pbHkgTmFtZSwgYW5kIG5vdCBhbiBTRkMgSUQpLCBh
bmQgdGhlIGNvbnRyb2wgKGFuZA0KPiA+Pj5wb2xpY3kpDQo+ID4+PiBwbGFuZSBjYW4gb2YgY291
cnNlIHdvcmsgd2l0aCBTRkNzLg0KPiA+Pj4NCj4gPj4+IE15ICQwLjAyLg0KPiA+Pj4NCj4gPj4+
IFRoYW5rcywNCj4gPj4+DQo+ID4+PiDigLkgQ2FybG9zLg0KPiA+Pj4NCj4gPj4+ID4gQ2hlZXJz
LA0KPiA+Pj4gPiBNZWQNCj4gPj4+ID4NCj4gPj4+ID4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUt
LS0tLQ0KPiA+Pj4gPj4gRGUgOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgW21haWx0bzpj
cGlnbmF0YUBjaXNjby5jb21dDQo+ID4+PiA+PiBFbnZvecOpIDogbWVyY3JlZGkgMTggbm92ZW1i
cmUgMjAxNSAxMTo1Mg0KPiA+Pj4gPj4gw4AgOiBKb2VsIEhhbHBlcm4NCj4gPj4+ID4+IENjIDog
Qk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlubiAocGF1bHEpOyBkcmFmdC1pZXRm
LXNmYy0NCj4gPj4+ID4+IGNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7IEpvZWwgTS4gSGFs
cGVybjsgc2ZjIGlzc3VlIHRyYWNrZXI7DQo+ID4+PiA+PiBzZmNAaWV0Zi5vcmcNCj4gPj4+ID4+
IE9iamV0IDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRy
b2wgcGxhbmUNCj4gPj4+IG9wZXJhdGVzDQo+ID4+PiA+PiBvbiBTRkMgSURzLCBTRlAgSURzLCBl
dGMuDQo+ID4+PiA+Pg0KPiA+Pj4gPj4gSSBhbSBhIGJpdCBiYWZmbGVkIHRvIHNlZSB0aGlzIHRo
cmVhZCBhZ2FpbiDigLkgaXQgYXBwZWFycyB0aGUNCj4gPj4+ZGlzY3Vzc2lvbg0KPiA+Pj4gPj4g
cmVzdGFydGVkIHRvIGNvbnRpbnVlIGluIGNpcmNsZXMuDQo+ID4+PiA+Pg0KPiA+Pj4gPj4gTWVk
LA0KPiA+Pj4gPj4NCj4gPj4+ID4+IEkgdG9vIGFncmVlIHdpdGggSm9lbCBhbmQgc3Ryb25nbHkg
YmVsaWV2ZSB0aGVyZSBpcyBubyBuZWVkIGZvciBTRkMNCj4gPj4+ID4+IGlkZW50aWZpY2F0aW9u
IHBhc3NlZCBkb3duIOKAuSB0aGVyZSBpcyBubyBwcm92aXNpb25pbmcgb2YgU0ZDcw0KPiA+Pj4g
c291dGhib3VuZC4NCj4gPj4+ID4+DQo+ID4+PiA+PiAoQWxtb3N0KSBldmVyeSBpbnN0YW5jZSBv
ZiDCs1NGQ8KyIGluIHRoZSBjb250cm9sLXBsYW5lIHJlcXVpcmVtZW50cw0KPiA+Pj4gZHJhZnQN
Cj4gPj4+ID4+IHNob3VsZCByZWFsbHkgc2F5IMKzU0ZQwrIuIFRoZXJlIGlzIG5vIHVzZSBvZiB0
YWxraW5nIGFib3V0IFNGQ3MNCj4gPj4+dG93YXJkcw0KPiA+Pj4gdGhlDQo+ID4+PiA+PiBkYXRh
IHBsYW5lLiBUaGUgcmVsYXRpb25zaGlwIGJldHdlZW4gY2hhaW5zIGFuZCBwYXRocyBpcyBhIHBv
bGljeQ0KPiA+Pj4gbWF0dGVyDQo+ID4+PiA+PiB3aGljaCBiZWxvbmdzIGluIHRoZSBwb2xpY3kv
Y29udHJvbCBpdHNlbGYsIGJ1dCBub3Qgb3V0IG9mIHRoZXJlLg0KPiA+Pj4gPj4NCj4gPj4+ID4+
IFRoaXMgaXMgbm8gZGlmZmVyZW50IHRoYW4gd2hhdCBJIHNhaWQgYSBmZXcgbW9udGhzIGFnbyBv
biB0aGUgc2FtZQ0KPiA+Pj4gdG9waWMuDQo+ID4+PiA+Pg0KPiA+Pj4gPj4gVGhhbmtzLA0KPiA+
Pj4gPj4NCj4gPj4+ID4+IOKAuSBDYXJsb3MuDQo+ID4+PiA+Pg0KPiA+Pj4gPj4+IE9uIE5vdiAx
NywgMjAxNSwgYXQgOTowNiBBTSwgSm9lbCBIYWxwZXJuDQo+ID4+Pjxqb2VsLmhhbHBlcm5AZXJp
Y3Nzb24uY29tPg0KPiA+Pj4gPj4gd3JvdGU6DQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBXaGF0IGlz
IHByb3Zpc2lvbmVkIGludG8gdGhlIFNGRiByZWZsZWN0cyB0aGUgU0ZQLiAgVGhlIGNvbnRyb2wN
Cj4gPj4+c3lzdGVtDQo+ID4+PiA+PiBkZWNpZGVzIHdoZXRoZXIgdGhhdCBTRlAgaW5kaWNhdGVz
IHRoZSBzYW1lIHNldCBvZiBhbGwgcG9zc2libGUNCj4gPj4+Y2hvaWNlcw0KPiA+Pj4gPj4gdGhh
dCB0aGUgU0ZDIGRvZXMsIG9yIGlzIGEgcHJvcGVyIHN1YnNldC4NCj4gPj4+ID4+Pg0KPiA+Pj4g
Pj4+IEluIG9yZGVyIHRvIGFsbG93IGZvciBhbiBTRlAgdGhhdCByZWZsZWN0cyBtZWFuaW5nZnVs
IGNvbnN0cmFpbnRzLA0KPiA+Pj4gd2hhdA0KPiA+Pj4gPj4gaXMgcHJvdmlzaW9uZWQgaGFzIHRv
IGJlIHRoZSBTRlAuDQo+ID4+PiA+Pj4gTm8gc3BlY2lhbCBwcm92aXNpb24gaXMgbmVlZGVkIGZv
ciB0aGUgY2FzZSB3aGVyZSB0aGUgU0ZQIGlzDQo+ID4+PiBpc29tb3JwaGljDQo+ID4+PiA+PiB0
byB0aGUgU0ZDLiBJbiBzdWNoIGEgY2FzZSwgeW91IHN0aWxsIHByb3Zpc2lvbiB0aGUgU0ZQLiAg
QW5kIHRoZQ0KPiA+Pj4gcmVzdWx0DQo+ID4+PiA+PiBpcyBhbiBTRlAgd2l0aCBhcyBtdWNoIGZs
ZXhpYmlsaXR5IGFzIHRoZSBTRkMuDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBJZiwgaW4gY29udHJh
c3QsIHlvdSBkZWNsYXJlIHRoYXQgdGhlIHByb3Zpc2lvbmluZyBpbmNsdWRlcyB0aGUNCj4gU0ZD
DQo+ID4+PiB0aGVuDQo+ID4+PiA+PiB5b3UgYXJlIGludHJvZHVjaW5nIGV4dHJhIGNvbXBsZXhp
dHkgd2l0aG91dCBhZGRpbmcgYW55IG5ldyBjYXNlcw0KPiA+Pj50aGF0DQo+ID4+PiBjYW4NCj4g
Pj4+ID4+IGJlIGhhbmRsZWQuDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBZb3VycywNCj4gPj4+ID4+
PiBKb2VsDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0K
PiA+Pj4gPj4+IEZyb206IG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20NCj4gPj4+IFttYWls
dG86bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbV0NCj4gPj4+ID4+PiBTZW50OiBUdWVzZGF5
LCBOb3ZlbWJlciAxNywgMjAxNSA5OjAzIEFNDQo+ID4+PiA+Pj4gVG86IEpvZWwgSGFscGVybjsg
UGF1bCBRdWlubiAocGF1bHEpDQo+ID4+PiA+Pj4gQ2M6IHNmYyBpc3N1ZSB0cmFja2VyOyBkcmFm
dC1pZXRmLXNmYy1jb250cm9sLQ0KPiBwbGFuZUB0b29scy5pZXRmLm9yZzsNCj4gPj4+ID4+IHNm
Y0BpZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuDQo+ID4+PiA+Pj4gU3ViamVjdDogUkU6IFtzZmNd
ICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4gPj4+ID4+
IG9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+
IEhpIEpvZWwsDQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBQbGVhc2Ugc2VlIGlubGluZS4NCj4gPj4+
ID4+Pg0KPiA+Pj4gPj4+IENoZWVycywNCj4gPj4+ID4+PiBNZWQNCj4gPj4+ID4+Pg0KPiA+Pj4g
Pj4+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gPj4+ID4+Pj4gRGUgOiBKb2VsIEhh
bHBlcm4gW21haWx0bzpqb2VsLmhhbHBlcm5AZXJpY3Nzb24uY29tXQ0KPiA+Pj4gPj4+PiBFbnZv
ecOpIDogbWFyZGkgMTcgbm92ZW1icmUgMjAxNSAxNDo0OQ0KPiA+Pj4gPj4+PiDDgCA6IEJPVUNB
REFJUiBNb2hhbWVkIElNVC9PTE47IFBhdWwgUXVpbm4gKHBhdWxxKSBDYyA6IHNmYyBpc3N1ZQ0K
PiA+Pj4gPj4+PiB0cmFja2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmll
dGYub3JnOw0KPiA+Pj4gPj4+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPiA+Pj4g
Pj4+PiBPYmpldCA6IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBj
b250cm9sIHBsYW5lDQo+ID4+PiA+Pj4+IG9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0
Yy4NCj4gPj4+ID4+Pj4NCj4gPj4+ID4+Pj4gWW91ciBzdGF0ZW1lbnQgdGhhdCAiIEl0IGhhcHBl
bnMgdGhhdCBpbmZvcm1hdGlvbiBpcyBubyBtb3JlIHRoYW4NCj4gPj4+dGhlDQo+ID4+PiA+Pj4+
IHNlcnZpY2UgY2hhaW4gaXRzZWxmICh3aXRob3V0IGFueSBjb25zdHJhaW50cykuIiAoV2hlcmUg
Iml0Ig0KPiA+Pj5yZWZlcnMNCj4gPj4+IHRvDQo+ID4+PiA+PiAiDQo+ID4+PiA+Pj4+IHRoZSBl
eGFjdCBzZXF1ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJlYWxpemUgdGhlIFNGQyIuKSBE
b2VzDQo+ID4+Pm5vdA0KPiA+Pj4gPj4+PiBtYWtlIHNlbnNlIHRvIG1lLg0KPiA+Pj4gPj4+DQo+
ID4+PiA+Pj4gW01lZF0gUkZDIDc2NjUgc2F5czoNCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+ICIgICBU
aHVzLCB0aGUgcG9saWNpZXMgYW5kIGxvZ2ljIG9mIFNGUCBzZWxlY3Rpb24gb3IgY3JlYXRpb24N
Cj4gPj4+IChkZXBlbmRpbmcNCj4gPj4+ID4+PiAgdXBvbiB0aGUgc29sdXRpb24pIHByb2R1Y2Ug
d2hhdCBtYXkgYmUgdGhvdWdodCBvZiBhcyBhDQo+IGNvbnN0cmFpbmVkDQo+ID4+PiA+Pj4gIHZl
cnNpb24gb2YgdGhlIG9yaWdpbmFsIFNGQy4gIg0KPiA+Pj4gPj4+DQo+ID4+PiA+Pj4gaW4gc2hv
cnQ6IFNGUCBpcyBkZWZpbmVkIGFzIGEgY29uc3RyYWluZWQgdmVyc2lvbiBvZiB0aGUgb3JpZ2lu
YWwNCj4gPj4+U0ZDLg0KPiA+Pj4gPj4+DQo+ID4+PiA+Pj4gV2hhdCBpcyB0aGUgbmFtZSB0byB1
c2UgdG8gcmVmZXIgdG8gYSAibm9uLWNvbnN0cmFpbmVkIiBTRkMgb3IgdG8NCj4gPj4+dGhlDQo+
ID4+PiA+PiBpbmZvcm1hdGlvbiB0aGF0IHlvdSB3aWxsIHByb3Zpc2lvbiB0byBhbiBTRkYgd2hl
biB0aGUgcGF0aA0KPiA+Pj5jb21wdXRhdGlvbg0KPiA+Pj4gPj4gYW5kIHNlbGVjdGlvbiBkZWNp
c2lvbiBpcyAiZGVmZXJyZWQgdG8gdGhlIFNGRiI/DQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBJdCBk
b2VzIG5vdCBtYWtlIHNlbnNlIHRvIGNhbGwgYSBub24tY29uc3RyYWluZWQgdmVyc2lvbiBvZiB0
aGUNCj4gU0ZDDQo+ID4+PmFzDQo+ID4+PiA+PiBTRlAgZ2l2ZW4gdGhhdCBSRkM3NjY1IGV4cGxp
Y2l0bHkgZGVmaW5lcyBTRlAgYXMgImNvbnN0cmFpbmVkDQo+ID4+PnZlcnNpb24NCj4gPj4+IG9m
DQo+ID4+PiA+PiB0aGUgb3JpZ2luYWwgU0ZDIiENCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+IFRoZSBT
RkMgaXMgdGhlIGdlbmVyYWwgZGVzY3JpcHRpb24gb2YgdGhlIG9iamVjdGl2ZS4gIFRoYXQNCj4g
Pj4+ID4+Pj4gaXMgbm90IHRoZSBzYW1lIGFzIHRoZSBleGFjdCBzZXF1ZW5jZSBvZiBwbGFjZXMg
dGhhdCBtdXN0IGJlDQo+ID4+PnZpc2l0ZWQuDQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+IEkgc3Rh
bmQgYnkgbXkgZWFybGllciBjb21tZW50cyB0aGF0IGFsbW9zdCBhbGwgdXNlcyBvZiBTRkMgaW4g
dGhlDQo+ID4+PiA+Pj4+IGNvbnRyb2wgcmVxdWlyZW1lbnRzIGRyYWZ0IHNob3VsZCBiZSBTRlAu
DQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4NCj4gPj4+ID4+PiBbTWVkXSBJIG5vdGVkIHRoYXQgSm9l
bC4uIHRoYXQncyBmYWlyIGJ1dCB0aGlzIHBvc2l0aW9uIGlzIElNSE8NCj4gbm90DQo+ID4+PiA+
PiBhbGlnbmVkIHdpdGggUkZDNzY2NSB0aGF0IGFsbG93cyB0byBjb250cm9sIGFueSB2YXJpYXRp
b24gZnJvbSBhDQo+ID4+Pm5vbi0NCj4gPj4+ID4+IGNvbnN0cmFpbmVkIFNGQyB0byBhIGZ1bGx5
IGNvbnN0cmFpbmVkIFNGQy4NCj4gPj4+ID4+Pg0KPiA+Pj4gPj4+PiBZb3VycywNCj4gPj4+ID4+
Pj4gSm9lbA0KPiA+Pj4gPj4+Pg0KPiA+Pj4gPj4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0t
LQ0KPiA+Pj4gPj4+PiBGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+ID4+PiA+
Pj4+IFttYWlsdG86bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbV0NCj4gPj4+ID4+Pj4gU2Vu
dDogVHVlc2RheSwgTm92ZW1iZXIgMTcsIDIwMTUgODozNCBBTQ0KPiA+Pj4gPj4+PiBUbzogUGF1
bCBRdWlubiAocGF1bHEpDQo+ID4+PiA+Pj4+IENjOiBzZmMgaXNzdWUgdHJhY2tlcjsNCj4gPj4+
ZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsNCj4gPj4+ID4+Pj4g
c2ZjQGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4gPj4+ID4+Pj4gU3ViamVjdDogUkU6IFtz
ZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4gPj4+
ID4+Pj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPiA+Pj4gPj4+Pg0KPiA+
Pj4gPj4+PiBIaSBQYXVsLA0KPiA+Pj4gPj4+Pg0KPiA+Pj4gPj4+PiBUaGFuayB5b3UgZm9yIHNo
YXJpbmcgeW91ciBmZWVkYmFjay4NCj4gPj4+ID4+Pj4NCj4gPj4+ID4+Pj4gUkZDNzY2NSBzYXlz
IHRoZSBmb2xsb3dpbmc6DQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+ICINCj4gPj4+ID4+Pj4gVGhp
cyBhcmNoaXRlY3R1cmUgZG9lcyBub3QgbWFuZGF0ZSB0aGUgZGVncmVlIG9mDQo+ID4+PiA+Pj4+
ICBzcGVjaWZpY2l0eSBvZiB0aGUgU0ZQLiAgQXJjaGl0ZWN0dXJhbGx5LCB3aXRoaW4gdGhlIHNh
bWUgU0ZDLQ0KPiA+Pj4gZW5hYmxlZA0KPiA+Pj4gPj4+PiAgZG9tYWluLCBzb21lIFNGUHMgbWF5
IGJlIGZ1bGx5IHNwZWNpZmllZCwgc2VsZWN0aW5nIGV4YWN0bHkNCj4gd2hpY2gNCj4gPj4+IFNG
Rg0KPiA+Pj4gPj4+PiAgYW5kIHdoaWNoIFNGIGFyZSB0byBiZSB2aXNpdGVkIGJ5IHBhY2tldHMg
dXNpbmcgdGhhdCBTRlAsIHdoaWxlDQo+ID4+PiBvdGhlcg0KPiA+Pj4gPj4+PiAgU0ZQcyBtYXkg
YmUgcXVpdGUgdmFndWUsIGRlZmVycmluZyB0byB0aGUgU0ZGIHRoZSBkZWNpc2lvbnMNCj4gYWJv
dXQNCj4gPj4+IHRoZQ0KPiA+Pj4gPj4+PiAgZXhhY3Qgc2VxdWVuY2Ugb2Ygc3RlcHMgdG8gYmUg
dXNlZCB0byByZWFsaXplIHRoZSBTRkMuICBUaGUNCj4gPj4+ID4+Pj4gIHNwZWNpZmljaXR5IG1h
eSBiZSBhbnl3aGVyZSBpbiBiZXR3ZWVuIHRoZXNlIGV4dHJlbWVzLg0KPiA+Pj4gPj4+PiAiDQo+
ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+IFRoZSBjb250cm9sIGRyYWZ0IGlzIGNvbXBsZXRlbHkgYWxp
Z25lZCB3aXRoIHRoYXQgYXBwcm9hY2guDQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+IFRoZSBjb250
cm9sLXBsYW5lIGRvY3VtZW50IGFsbG93cyBpbiBwYXJ0aWN1bGFyIHRvIHByb3Zpc2lvbg0KPiA+
Pj5yZXF1aXJlZA0KPiA+Pj4gPj4+PiBpbmZvcm1hdGlvbiB3aGVuICJkZWZlcnJpbmcgdG8gdGhl
IFNGRiB0aGUgZGVjaXNpb25zIGFib3V0IHRoZQ0KPiA+Pj4gPj4+PiAgZXhhY3Qgc2VxdWVuY2Ug
b2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFsaXplIHRoZSBTRkMiLiBJdA0KPiA+Pj5oYXBwZW5z
DQo+ID4+PiA+Pj4+IHRoYXQgaW5mb3JtYXRpb24gaXMgbm8gbW9yZSB0aGFuIHRoZSBzZXJ2aWNl
IGNoYWluIGl0c2VsZg0KPiAod2l0aG91dA0KPiA+Pj4gYW55DQo+ID4+PiA+Pj4+IGNvbnN0cmFp
bnRzKS4NCj4gPj4+ID4+Pj4NCj4gPj4+ID4+Pj4gQWxzbywgdGhlIGN1cnJlbnQgY29udHJvbC1w
bGFuZSBkb2N1bWVudCBhbGxvd3MgdG8gaW5zdHJ1Y3QgYQ0KPiA+Pj5sb29zZQ0KPiA+Pj4gPj4+
PiBwYXRoDQo+ID4+PiA+Pj4+IChTRlApIG9yIGEgc3RyaWN0IHBhdGggKFJTUCksIGV0Yy4NCj4g
Pj4+ID4+Pj4NCj4gPj4+ID4+Pj4gSSBmdWxseSBhZ3JlZSB0aGF0IHdoZXRoZXIgYSBmdWxsIHBh
dGggaXMgc3BlY2lmaWVkIHdpdGhpbiBhDQo+ID4+PmRvbWFpbg0KPiA+Pj4gb3INCj4gPj4+ID4+
Pj4gaWYgaXQgaXMgZGVmZXJyZWQgdG8gU0ZGcyBpcyByZWFsbHkgZGVwbG95bWVudC1zcGVjaWZp
Yy4NCj4gPj4+IE5ldmVydGhlbGVzcywNCj4gPj4+ID4+Pj4gdGhlIGNvbnRyb2wgcGxhbiBzaG91
bGQgYWNjb21tb2RhdGUgYWxsIHRoZXNlIGZsYXZvcnMuDQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+
IENoZWVycywNCj4gPj4+ID4+Pj4gTWVkDQo+ID4+PiA+Pj4+DQo+ID4+PiA+Pj4+PiAtLS0tLU1l
c3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gPj4+ID4+Pj4+IERlIDogUGF1bCBRdWlubiAocGF1bHEp
IFttYWlsdG86cGF1bHFAY2lzY28uY29tXSBFbnZvecOpIDoNCj4gPj4+dmVuZHJlZGkNCj4gPj4+
ID4+Pj4+IDE2IG9jdG9icmUgMjAxNSAxNDowNCDDgCA6IEpvZWwgTS4gSGFscGVybiBDYyA6IEJP
VUNBREFJUiBNb2hhbWVkDQo+ID4+PiA+Pj4+PiBJTVQvT0xOOyBzZmMgaXNzdWUgdHJhY2tlcjsg
ZHJhZnQtaWV0Zi1zZmMtY29udHJvbC0NCj4gPj4+ID4+Pj4+IHBsYW5lQHRvb2xzLmlldGYub3Jn
OyBzZmNAaWV0Zi5vcmcgT2JqZXQgOiBSZTogW3NmY10gIzE1DQo+ID4+PiA+Pj4+PiAoY29udHJv
bC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUgb3BlcmF0ZXMgb24gU0ZDIElEcywN
Cj4gPj4+U0ZQDQo+ID4+PiA+PiBJRHMsIGV0Yy4NCj4gPj4+ID4+Pj4+DQo+ID4+PiA+Pj4+PiBK
b2VsLA0KPiA+Pj4gPj4+Pj4NCj4gPj4+ID4+Pj4+IEkgY29uY3VyLg0KPiA+Pj4gPj4+Pj4NCj4g
Pj4+ID4+Pj4+IFRoZSBkYXRhIHBsYW5lIGRlYWwgd2l0aCBwYXRocywgbm90IGNoYWlucy4gIFRo
ZSByZWxhdGlvbnNoaXAgb2YNCj4gPj4+ID4+Pj4+IHBhdGhzIHRvIGNoYWlucyBmYWxscyBzcXVh
cmVseSBpbiB0aGUgY29udHJvbCBwbGFuZSAob3IgZXZlbg0KPiBtb3JlDQo+ID4+PiA+Pj4+PiBs
aWtlbHkNCj4gPj4+ID4+Pj4gInBvbGljeSINCj4gPj4+ID4+Pj4+IHBsYW5lKSByZWFsbS4gIFRo
ZSBzcGVjaWZpY2l0eSBvZiB0aGUgcGF0aCBpcyBsZWZ0IHRvDQo+ID4+PiA+Pj4+PiBpbXBsZW1l
bnRhdGlvbiwgaW4gdGhlIGFyY2hpdGVjdHVyZSBkcmFmdCwgYnV0IHRoYXQncyBjb25zaXN0ZW50
DQo+ID4+PiA+Pj4+PiB3aXRoIHlvdXIgcG9zaXRpb24gYW5kIHByb3ZpZGVzIHRoZSByZXF1aXNp
dGUgZnVuY3Rpb25hbGl0eS4NCj4gPj4+ID4+Pj4+DQo+ID4+PiA+Pj4+PiBQYXVsDQo+ID4+PiA+
Pj4+Pg0KPiA+Pj4gPj4+Pj4+IE9uIFNlcCAxNywgMjAxNSwgYXQgMTE6MzYgQU0sIEpvZWwgTS4g
SGFscGVybg0KPiA+Pj4gPj4+Pj4+IDxqbWhAam9lbGhhbHBlcm4uY29tPg0KPiA+Pj4gPj4+Pj4g
d3JvdGU6DQo+ID4+PiA+Pj4+Pj4NCj4gPj4+ID4+Pj4+PiBBcyBmYXIgYXMgSSBjYW4gdGVsbCwg
dGhlcmUgaXMgbm90aGluZyBpbiB0aGUgU2VydmljZSBDaGFpbmluZw0KPiA+Pj4gPj4+Pj4+IHdv
cmsgdGhhdA0KPiA+Pj4gPj4+Pj4gcmVxdWlyZXMgY29ycmVsYXRpbmcgc2VydmljZSBwYXRoIElE
cyB3aXRoIHNlcnZpY2UgY2hhaW4gSURzDQo+ID4+PndpdGhpbg0KPiA+Pj4gPj4+Pj4gdGhlIGRh
dGEgcGxhbmUuICBBbnkgc3VjaCByZWxhdGlvbnNoaXAgZXhpc3RzIGVudGlyZWx5IHdpdGhpbg0K
PiB0aGUNCj4gPj4+ID4+Pj4+IGNvbnRyb2wgcGxhbmUgb3IgYWJvdmUsIGFuZCB3b3VsZCBiZSBk
cml2ZW4gYnkgcmVxdWlyZW1lbnRzDQo+IG90aGVyDQo+ID4+PiA+Pj4+PiB0aGFuIHRoZSBkYXRh
IHBsYW5lLiAgV2hlbiBJIGxvb2sgYXQgdGhpcyBkb2N1bWVudCwgYWxsIG9mIHRoZQ0KPiA+Pj4g
Pj4+Pj4gcmVxdWlyZW1lbnRzIHRoYXQgdGFsayBhYm91dCBzZXJ2aWNlIGZ1bmN0aW9uIGNoYWlu
IElEcyBjYW4gYmUNCj4gPj4+ID4+Pj4+IGFjY3VyYXRlbHkgY2FwdHVyZWQsIGluIHRlcm1zIG9m
IGRhdGEgcGxhbmUgcmVxdWlyZW1lbnRzLCBieQ0KPiA+Pj5zZXJ2aWNlDQo+ID4+PiA+PiBmdW5j
dGlvbiBwYXRoIElEcy4NCj4gPj4+ID4+Pj4+IFRodXMsIHRoZSByZXF1aXJlbWVudCB0aGF0IHRo
ZSBkYXRhIHBsYW5lIGhhcyBpcyB0byBzZWUgc3VjaA0KPiBwYXRoDQo+ID4+PiBJRHMuDQo+ID4+
PiA+Pj4+PiBZZXMsIGluIHNvbWUgZGVwbG95bWVudHMgdGhvc2Ugd2lsbCBiZSAxLTEgd2l0aCBj
aGFpbiBJRHMuICBUaGV5DQo+ID4+PmFyZQ0KPiA+Pj4gPj4+PiBzdGlsbCBwYXRoIElEcy4NCj4g
Pj4+ID4+Pj4+Pg0KPiA+Pj4gPj4+Pj4+IEludHJvZHVjaW5nIGEgcmVxdWlyZW1lbnQgZm9yIHRo
ZSBkYXRhIHBsYW5lIHRvIHNlZSBhbmQgd29yaw0KPiA+Pj53aXRoDQo+ID4+PiA+Pj4+Pj4gY2hh
aW4NCj4gPj4+ID4+Pj4+IElEcyBpcyBub3QgZ3JvdW5kZWQgaW4gdGhlIHdvcmsgb2YgdGhlIGdy
b3VwLg0KPiA+Pj4gPj4+Pj4+DQo+ID4+PiA+Pj4+Pj4gWW91cnMsDQo+ID4+PiA+Pj4+Pj4gSm9l
bCBNLiBIYWxwZXJuDQo+ID4+PiA+Pj4+Pj4NCj4gPj4+ID4+Pj4+PiBPbiA5LzE3LzE1IDc6NTMg
QU0sIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6DQo+ID4+PiA+Pj4+Pj4+IFJl
LSwNCj4gPj4+ID4+Pj4+Pj4NCj4gPj4+ID4+Pj4+Pj4gVGhlIGNvbnRyb2wgZHJhZnQgYXMgaXQg
c3RhbmRzIGlzIGNvbXBsaWFudCB3aXRoIHRoZSBkYXRhDQo+IHBsYW5lDQo+ID4+PiA+Pj4+PiBh
cmNoaXRlY3R1cmUgZG9jdW1lbnQuDQo+ID4+PiA+Pj4+Pj4+DQo+ID4+PiA+Pj4+Pj4+IEluZGVl
ZCwgdGhlIGFyY2ggZHJhZnQgYWNrbm93bGVkZ2VzIHRoZSBmb2xsb3dpbmc6DQo+ID4+PiA+Pj4+
Pj4+ICgxKSBTRlBzIGFyZSAiYXNzb2NpYXRlZCB3aXRoIGEgZ2l2ZW4gU0ZDIi4NCj4gPj4+ID4+
Pj4+Pj4gKDIpIFNGUHMgYXJlIHByZXNlbnRlZCBhcyBhIGZvcm0gb2YgY29uc3RyYWluZWQgU0ZD
cy4NCj4gPj4+ID4+Pj4+Pj4gKDMpIFNvbWUgZGVwbG95bWVudHMgbWF5IG5vdCBpbXBvc2UgYW55
IGNvbnN0cmFpbnQgb24gdGhlDQo+ID4+PiA+Pj4+Pj4+IGFic3RyYWN0DQo+ID4+PiA+Pj4+IFNG
Qw0KPiA+Pj4gPj4+DQo+ID4+PiA+Pj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX18NCj4gPj4+ID4+PiBzZmMgbWFpbGluZyBsaXN0DQo+ID4+PiA+Pj4gc2Zj
QGlldGYub3JnDQo+ID4+PiA+Pj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5m
by9zZmMNCj4gPj4+ID4NCj4gPj4NCj4gPg0KPiA+X19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX18NCj4gPnNmYyBtYWlsaW5nIGxpc3QNCj4gPnNmY0BpZXRmLm9y
Zw0KPiA+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4gDQo+IF9f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+IHNmYyBtYWls
aW5nIGxpc3QNCj4gc2ZjQGlldGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4v
bGlzdGluZm8vc2ZjDQo+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fDQo+IHNmYyBtYWlsaW5nIGxpc3QNCj4gc2ZjQGlldGYub3JnDQo+IGh0dHBzOi8vd3d3
LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo=


From nobody Thu Nov 19 03:04:10 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 138E41A8987 for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 22:25:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EypkdXeZjW6c for <sfc@ietfa.amsl.com>; Wed, 18 Nov 2015 22:25:22 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90D8E1A898A for <sfc@ietf.org>; Wed, 18 Nov 2015 22:25:20 -0800 (PST)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm10.si.francetelecom.fr (ESMTP service) with ESMTP id CEC4E264683; Thu, 19 Nov 2015 07:25:18 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.61]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id AB8CB4C070; Thu, 19 Nov 2015 07:25:18 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7E.corporate.adroot.infra.ftgroup ([fe80::b91c:ea2c:ac8a:7462%19]) with mapi id 14.03.0248.002; Thu, 19 Nov 2015 07:25:18 +0100
From: <mohamed.boucadair@orange.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: [sfc] draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type = 0x2" (zero or more Variable) as "MUST" and MD-type=0x1" as " SHOULD"
Thread-Index: AQHRIlrPAQnu07B6yk2a46lr+lOuMp6i4AHQ
Date: Thu, 19 Nov 2015 06:25:17 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA03EA@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <4A95BA014132FF49AE685FAB4B9F17F657DA3413@dfweml701-chm>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657DA3413@dfweml701-chm>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: multipart/related; boundary="_004_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_"; type="multipart/alternative"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.16.111515
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/gyFsYVT2Tr9FUmnzzvUNqJqOqik>
Subject: Re: [sfc] draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type = 0x2" (zero or more Variable) as "MUST" and MD-type=0x1" as " SHOULD"
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 06:25:26 -0000

--_004_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_
Content-Type: multipart/alternative;
	boundary="_000_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_"

--_000_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Linda, all,

Thank you for raising this point.

I agree with you "MD-type =3D 0x2" to be "MUST".

As for the MD-type=3D=3D01, we have an issue related to this point that is =
on the tracker since 7 months...: http://trac.tools.ietf.org/wg/sfc/trac/ti=
cket/2. I'm reproducing it here, fwiw in the hope to have some discussion a=
bout this point.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
What is the rationale for defining two MD Types? Why MD Type#1 is mandatory=
 to support? Wouldn't the format in Section 3.5 enough for the SFC use case=
s?
What is the rationale for defining these mandatory contexts headers? What i=
s the motivation for defining mandatory context header?

The current text does not explain those aspects.

For the sake of interoperability (mainly to avoid multiple implementations =
with distinct behaviors) and given no technical motivation is provided (e.g=
. why MD-type 1 is mandatory why not the other way around, etc. ), one head=
er format should be specified.

My personal point of view is that we need to choose. I'm personally for a m=
inimalist header. Leaving both induces more complexity.

I suggest to remove the "MD type" field and MD-type 1 from the specificatio=
n.

Moreover, I don't understand from the draft what is the rationale for class=
ifying the context into these four categories. What is meant by "platform-s=
pecific metadata" or "service platform specific"?

    0 1 2 3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Network Platform Context |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Network Shared Context |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Service Platform Context |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Service Shared Context |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Cheers,
Med


De : sfc [mailto:sfc-bounces@ietf.org] De la part de Linda Dunbar
Envoy=E9 : jeudi 19 novembre 2015 00:42
=C0 : sfc@ietf.org; Paul Quinn (paulq); Elzur, Uri
Objet : [sfc] draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type =
=3D 0x2" (zero or more Variable) as "MUST" and MD-type=3D0x1" as " SHOULD"




Paul and Uri,



The Section 3.2 of  draft-ietf-sfc-nsf-01 says:

[cid:image001.png@01D1229B.4AC05910]





As both MD-type 1 and MD-type 2 are specified by the draft, a more reasonab=
le approach is having the minimum common part (i.e. the first 8 bytes) as t=
he MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes cont=
ext header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a "SH=
OULD" support.



Let's face it, the majority of SFC deployment probably won't need the all 1=
6 bytes "context header" (which has higher chance of packet fragmentation).




Linda

--_000_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Texte brut Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.TextebrutCar
	{mso-style-name:"Texte brut Car";
	mso-style-priority:99;
	mso-style-link:"Texte brut";
	font-family:Consolas;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
p.PlainText, li.PlainText, div.PlainText
	{mso-style-name:"Plain Text";
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
span.EmailStyle27
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Hi Linda, all,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Thank you for raising this poin=
t.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">I agree with you &quot;MD-type =
=3D 0x2&quot; to be &quot;MUST&quot;.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">As for the MD-type=3D=3D01, we =
have an issue related to this point that is on the tracker since 7 months&#=
8230;:
<a href=3D"http://trac.tools.ietf.org/wg/sfc/trac/ticket/2">http://trac.too=
ls.ietf.org/wg/sfc/trac/ticket/2</a>. I&#8217;m reproducing it here, fwiw i=
n the hope to have some discussion about this point.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">What is the rationale for defin=
ing two MD Types? Why MD Type#1 is mandatory to support? Wouldn&#8217;t the=
 format in Section 3.5 enough for the SFC use cases?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">What is the rationale for defin=
ing these mandatory contexts headers? What is the motivation for defining m=
andatory context header?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">The current text does not expla=
in those aspects.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">For the sake of interoperabilit=
y (mainly to avoid multiple implementations with distinct behaviors) and gi=
ven no technical motivation is provided (e.g. why
 MD-type 1 is mandatory why not the other way around, etc. ), one header fo=
rmat should be specified.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">My personal point of view is th=
at we need to choose. I&#8217;m personally for a minimalist header. Leaving=
 both induces more complexity.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">I suggest to remove the &quot;M=
D type&quot; field and MD-type 1 from the specification.<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Moreover, I don&#8217;t underst=
and from the draft what is the rationale for classifying the context into t=
hese four categories. What is meant by &#8220;platform-specific
 metadata&#8221; or &#8220;service platform specific&#8221;?<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; 0 1 2 3<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; 0 1 2 3 4 5 =
6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; &#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#4=
3;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; | Network Pl=
atform Context |<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; &#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#4=
3;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; | Network Sh=
ared Context |<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; &#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#4=
3;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; | Service Pl=
atform Context |<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; &#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#4=
3;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; | Service Sh=
ared Context |<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp; &#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#4=
3;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-&#43;-=
&#43;-&#43;-&#43;-&#43;-&#43;-&#43;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc =
[mailto:sfc-bounces@ietf.org]
<b>De la part de</b> Linda Dunbar<br>
<b>Envoy=E9&nbsp;:</b> jeudi 19 novembre 2015 00:42<br>
<b>=C0&nbsp;:</b> sfc@ietf.org; Paul Quinn (paulq); Elzur, Uri<br>
<b>Objet&nbsp;:</b> [sfc] draft-ietf-sfc-nsf-01: It makes more sense to sta=
te &quot;MD-type =3D 0x2&quot; (zero or more Variable) as &quot;MUST&quot; =
and MD-type=3D0x1&quot; as &quot; SHOULD&quot;<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Paul and Uri, <o:p></o:p></s=
pan></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">The Section 3.2 of &nbsp;dra=
ft-ietf-sfc-nsf-01 says:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><img border=3D"0" width=3D"758"=
 height=3D"58" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D1229B.4AC0=
5910"><o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">As both MD-type 1 and MD-typ=
e 2 are specified by the draft, a more reasonable approach is having the mi=
nimum common part (i.e. the first 8 bytes) as the MUST. As the MD-TYPE 2 al=
lows minimum 0 context header (or 16
 bytes context header), the MD-TYPE 2 should be a MUST support. And MD-TYPE=
 1 is a &#8220;SHOULD&#8221; support.
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Let&#8217;s face it, the maj=
ority of SFC deployment probably won&#8217;t need the all 16 bytes &quot;co=
ntext header&quot; (which has higher chance of packet fragmentation).
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Linda<o:p></o:p></span></p>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_--

--_004_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=14919;
	creation-date="Thu, 19 Nov 2015 06:25:17 GMT";
	modification-date="Thu, 19 Nov 2015 06:25:17 GMT"
Content-ID: <image001.png@01D1229B.4AC05910>
Content-Transfer-Encoding: base64
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--_004_787AE7BB302AE849A7480A190F8B933008CA03EAOPEXCLILMA3corp_--


From nobody Thu Nov 19 06:22:13 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83F391B2A55 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 06:22:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LHsizMUbezxK for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 06:22:07 -0800 (PST)
Received: from mxb2.tigertech.net (mxb2.tigertech.net [208.80.4.164]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD05F1B2A52 for <sfc@ietf.org>; Thu, 19 Nov 2015 06:22:07 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id A71C91C0142; Thu, 19 Nov 2015 06:22:07 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 055557A0048; Thu, 19 Nov 2015 06:22:06 -0800 (PST)
To: mohamed.boucadair@orange.com, Dave Dolson <ddolson@sandvine.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <20151119073209.594948115.75564.49932@sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <564DDB0C.7030001@joelhalpern.com>
Date: Thu, 19 Nov 2015 09:22:04 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/W0lU7PjxFBsw2ZiOnlTdg82B7bU>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 14:22:11 -0000

Can you please describe some situation where there is increased value in 
having SFC information in the data plane.  Having the coordination 
within the control components is understandable and usually necessary. 
But that is out of scope for this document and this working group.
In what circumstance does the increased flexibility, which introduces 
additional complexity in the data plane, add value?

Yours,
Joel

On 11/19/15 2:41 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
> Yes, but still there is a record somewhere to link the name to one or a list of IP addresses. That record can be maintained in a central entity or be local (an SFF can decide which exact SF instance it can solicited (LB cases, redundancy group, etc.).
>
> What I'm asking for is more freedom in the cp architecture to make the resolution when it is appropriate: either centralized, distributed, or a mix (hierarchical context).
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Dave Dolson [mailto:ddolson@sandvine.com]
>> EnvoyÃ© : jeudi 19 novembre 2015 08:32
>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>> Cc : sfc@ietf.org
>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane operates
>> on SFC IDs, SFP IDs, etc.
>>
>> Med,
>> I would say that the SFC has no representation in the data plane (like
>> host name has no representation in IP routing.)
>> â€ŽBoth are abstractions.
>>
>> -Dave
>>
>>    Original Message
>> From: mohamed.boucadair@orange.com
>> Sent: Thursday, November 19, 2015 2:12 AM
>> To: Dave Dolson
>> Cc: sfc@ietf.org
>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane operates
>> on SFC IDs, SFP IDs, etc.
>>
>>
>> Hi Dave,
>>
>> I fully agree with this analogy:
>>
>> ==
>> SFC <--> destination host name
>> SFP <--> destination IP address
>> RSP <--> sequence of routers and links to deliver the IP packet
>> ==
>>
>> Hence the need for the control plane to instruct the underlying data plane
>> elements with required information at each of these three levels.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
>>> EnvoyÃ© : mercredi 18 novembre 2015 20:34
>>> Ã€ : Jim Guichard (jguichar)
>>> Cc : sfc@ietf.org
>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>> operates
>>> on SFC IDs, SFP IDs, etc.
>>>
>>> [reduced distribution to Jim & sfc list]
>>>
>>> Jim,
>>> I think your description is helpful. Can we find a place for this in the
>>> docs?
>>>
>>> I don't think I can understand it without referring to the concrete NSH,
>>> however.
>>>
>>>
>>> If I understand correctly, the following are true:
>>> - if the NSH SPI in two packets are the same, they are on the same SFP.
>>> - if the NSH SPI in two packets are different, they are on different
>> SFPs.
>>> - although two packets have the same SPI, they may traverse different
>>> RSPs.
>>>
>>> - when thinking of the data-plane and south-bound interfaces C1 thru C4,
>>> the SFC concept doesn't exist.
>>>     (SFC is just a north-interface concept like, "chain A provides a
>>> firewall and a NAT")
>>>
>>> Have I got it right?
>>>
>>>
>>> I also think the following *analogy* with routing can be drawn:
>>> SFC <--> destination host name
>>> SFP <--> destination IP address
>>> RSP <--> sequence of routers and links to deliver the IP packet
>>>
>>>
>>> -Dave
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard
>>> (jguichar)
>>> Sent: Wednesday, November 18, 2015 11:18 AM
>>> To: Carlos Pignataro (cpignata); mohamed.boucadair@orange.com
>>> Cc: sfc issue tracker; sfc@ietf.org; Paul Quinn (paulq); draft-ietf-sfc-
>>> control-plane@tools.ietf.org; Joel Halpern; Joel M. Halpern
>>> Subject: Re: [sfc] #15 (control-plane): Whether the control plane
>> operates
>>> on SFC IDs, SFP IDs, etc.
>>>
>>> [Chair hat off â€¦]
>>>
>>> I have to say I am struggling to see the â€œissueâ€ in this thread that
>> needs
>>> to be addressed other than confusion over SFC vs SFP definition; from a
>>> data plane perspective it is *very* clear that SFP/SI identifiers are
>> used
>>> as the lookup key into a forwarding construct that may contain 1:n
>> number
>>> of next-hops (SFFs, SFs). In some cases that lookup will point to a
>> single
>>> next-hop, in others multiple next-hops. In *all* cases this has
>> absolutely
>>> nothing to do with the SFC as each representation of that SFC is
>> uniquely
>>> identified by an SFP-id.
>>>
>>> Jim
>>>
>>> On 11/18/15, 10:19 AM, "sfc on behalf of Carlos Pignataro (cpignata)"
>>> <sfc-bounces@ietf.org on behalf of cpignata@cisco.com> wrote:
>>>
>>>> Hi, Med,
>>>>
>>>> I also referred to other parts of the document, when I wrote:
>>>>
>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>> planeÂ²
>>>>
>>>>
>>>> For example, I am not sure I understand what this means:
>>>>
>>>> "   o  Populate SFC forwarding policy tables of involved SFC data
>> planeÂ²
>>>>
>>>>
>>>> Or at:
>>>> "   o  SFC Forwarding Policy Table: this table reflects the SFC-
>> specific
>>>>      traffic forwarding policy enforced by SFF components for every
>>>>      relevant incoming packet that is associated to one of the existing
>>>>      SFCs."
>>>>
>>>>
>>>> My comment is that those should be Â³SFP"
>>>>
>>>> Thanks,
>>>>
>>>> â€¹ Carlos.
>>>>
>>>> -----Original Message-----
>>>> From: Med Boucadair <mohamed.boucadair@orange.com>
>>>> Date: Wednesday, November 18, 2015 at 10:03 AM
>>>> To: Carlos Pignataro <cpignata@cisco.com>
>>>> Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
>>>> "draft-ietf-sfc-control-plane@tools.ietf.org"
>>>> <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
>>>> <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>,
>>>> "sfc@ietf.org" <sfc@ietf.org>, Joel Halpern <joel.halpern@ericsson.com>
>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>> operates
>>>> on SFC IDs, SFP IDs, etc.
>>>>
>>>>> Carlos,
>>>>>
>>>>> There is not SFC ID in the core text of the control plane draft.
>>>>>
>>>>> The text you quoted is part of an appendix with a note that clearly
>>>>> states this is not discussed. A corresponding issue record has been
>>>>> recorded to seek for more feedback on that appendix.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 15:35
>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>>>> Cc : Paul Quinn (paulq); draft-ietf-sfc-control-
>> plane@tools.ietf.org;
>>>>>> Joel
>>>>>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>> operates
>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>
>>>>>> Med,
>>>>>>
>>>>>>> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>
>>>>>>> Carlos,
>>>>>>>
>>>>>>> This is an open issue for this draft, so it is normal to continue
>>>>>> discussing it. I don't know how you can conclude in advance that we
>>> are
>>>>>> circling.
>>>>>>>
>>>>>>
>>>>>> Discussion is great, Med. But my Å’we are circling' comment (not in
>>>>>> advanced, but already evident) is because I saw the same questions,
>>>>>> same
>>>>>> arguments, and same answers as before.
>>>>>>
>>>>>>> "strongly believe" is not a technical argument, btw.
>>>>>>>
>>>>>>
>>>>>> Well, I believe so on technical grounds! Most of which have already
>>>>>> been
>>>>>> said, so I do not want to contribute to the circular discussion.
>>>>>>
>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>> planeÂ²,
>>>>>> and Â³SFC IDsÂ². The architecture says that SFC are made of abstract
>>>>>> service
>>>>>> functions. ThereÂ¹s no actual forwarding in this abstract conceptual
>>>>>> model.
>>>>>>
>>>>>> The control-plane draft says Â³Suppose the SFC ID for this SFP is
>>>>>> "yellowÂ²,Â², and my point again is that in the data plane an SFP has
>> an
>>>>>> identifier (which identifies the SFP (SFP-ID) and is not the
>>> identifier
>>>>>> of
>>>>>> something else, itÂ¹s not a Topology-ID, itÂ¹s not a SKU, itÂ¹s not a
>>> URI,
>>>>>> itÂ¹s not a Family Name, and not an SFC ID), and the control (and
>>>>>> policy)
>>>>>> plane can of course work with SFCs.
>>>>>>
>>>>>> My $0.02.
>>>>>>
>>>>>> Thanks,
>>>>>>
>>>>>> â€¹ Carlos.
>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 11:52
>>>>>>>> Ã€ : Joel Halpern
>>>>>>>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-
>> sfc-
>>>>>>>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>>>>>>>> sfc@ietf.org
>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>> operates
>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>
>>>>>>>> I am a bit baffled to see this thread again â€¹ it appears the
>>>>>> discussion
>>>>>>>> restarted to continue in circles.
>>>>>>>>
>>>>>>>> Med,
>>>>>>>>
>>>>>>>> I too agree with Joel and strongly believe there is no need for
>> SFC
>>>>>>>> identification passed down â€¹ there is no provisioning of SFCs
>>>>>> southbound.
>>>>>>>>
>>>>>>>> (Almost) every instance of Â³SFCÂ² in the control-plane
>> requirements
>>>>>> draft
>>>>>>>> should really say Â³SFPÂ². There is no use of talking about SFCs
>>>>>> towards
>>>>>> the
>>>>>>>> data plane. The relationship between chains and paths is a policy
>>>>>> matter
>>>>>>>> which belongs in the policy/control itself, but not out of there.
>>>>>>>>
>>>>>>>> This is no different than what I said a few months ago on the
>> same
>>>>>> topic.
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>>
>>>>>>>> â€¹ Carlos.
>>>>>>>>
>>>>>>>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>>>>>> <joel.halpern@ericsson.com>
>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>> What is provisioned into the SFF reflects the SFP.  The control
>>>>>> system
>>>>>>>> decides whether that SFP indicates the same set of all possible
>>>>>> choices
>>>>>>>> that the SFC does, or is a proper subset.
>>>>>>>>>
>>>>>>>>> In order to allow for an SFP that reflects meaningful
>> constraints,
>>>>>> what
>>>>>>>> is provisioned has to be the SFP.
>>>>>>>>> No special provision is needed for the case where the SFP is
>>>>>> isomorphic
>>>>>>>> to the SFC. In such a case, you still provision the SFP.  And the
>>>>>> result
>>>>>>>> is an SFP with as much flexibility as the SFC.
>>>>>>>>>
>>>>>>>>> If, in contrast, you declare that the provisioning includes the
>>> SFC
>>>>>> then
>>>>>>>> you are introducing extra complexity without adding any new cases
>>>>>> that
>>>>>> can
>>>>>>>> be handled.
>>>>>>>>>
>>>>>>>>> Yours,
>>>>>>>>> Joel
>>>>>>>>>
>>>>>>>>> -----Original Message-----
>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>>>>>>>> To: Joel Halpern; Paul Quinn (paulq)
>>>>>>>>> Cc: sfc issue tracker; draft-ietf-sfc-control-
>>> plane@tools.ietf.org;
>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>> plane
>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>
>>>>>>>>> Hi Joel,
>>>>>>>>>
>>>>>>>>> Please see inline.
>>>>>>>>>
>>>>>>>>> Cheers,
>>>>>>>>> Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>>>>>>>> EnvoyÃ© : mardi 17 novembre 2015 14:49
>>>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc
>> issue
>>>>>>>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>> Objet : RE: [sfc] #15 (control-plane): Whether the control
>> plane
>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>
>>>>>>>>>> Your statement that " It happens that information is no more
>> than
>>>>>> the
>>>>>>>>>> service chain itself (without any constraints)." (Where "it"
>>>>>> refers
>>>>>> to
>>>>>>>> "
>>>>>>>>>> the exact sequence of steps to be used to realize the SFC".)
>> Does
>>>>>> not
>>>>>>>>>> make sense to me.
>>>>>>>>>
>>>>>>>>> [Med] RFC 7665 says:
>>>>>>>>>
>>>>>>>>> "   Thus, the policies and logic of SFP selection or creation
>>>>>> (depending
>>>>>>>>>   upon the solution) produce what may be thought of as a
>>> constrained
>>>>>>>>>   version of the original SFC. "
>>>>>>>>>
>>>>>>>>> in short: SFP is defined as a constrained version of the
>> original
>>>>>> SFC.
>>>>>>>>>
>>>>>>>>> What is the name to use to refer to a "non-constrained" SFC or
>> to
>>>>>> the
>>>>>>>> information that you will provision to an SFF when the path
>>>>>> computation
>>>>>>>> and selection decision is "deferred to the SFF"?
>>>>>>>>>
>>>>>>>>> It does not make sense to call a non-constrained version of the
>>> SFC
>>>>>> as
>>>>>>>> SFP given that RFC7665 explicitly defines SFP as "constrained
>>>>>> version
>>>>>> of
>>>>>>>> the original SFC"!
>>>>>>>>>
>>>>>>>>> The SFC is the general description of the objective.  That
>>>>>>>>>> is not the same as the exact sequence of places that must be
>>>>>> visited.
>>>>>>>>>>
>>>>>>>>>> I stand by my earlier comments that almost all uses of SFC in
>> the
>>>>>>>>>> control requirements draft should be SFP.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> [Med] I noted that Joel.. that's fair but this position is IMHO
>>> not
>>>>>>>> aligned with RFC7665 that allows to control any variation from a
>>>>>> non-
>>>>>>>> constrained SFC to a fully constrained SFC.
>>>>>>>>>
>>>>>>>>>> Yours,
>>>>>>>>>> Joel
>>>>>>>>>>
>>>>>>>>>> -----Original Message-----
>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>>>>>>>> To: Paul Quinn (paulq)
>>>>>>>>>> Cc: sfc issue tracker;
>>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>> plane
>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>
>>>>>>>>>> Hi Paul,
>>>>>>>>>>
>>>>>>>>>> Thank you for sharing your feedback.
>>>>>>>>>>
>>>>>>>>>> RFC7665 says the following:
>>>>>>>>>>
>>>>>>>>>> "
>>>>>>>>>> This architecture does not mandate the degree of
>>>>>>>>>>   specificity of the SFP.  Architecturally, within the same SFC-
>>>>>> enabled
>>>>>>>>>>   domain, some SFPs may be fully specified, selecting exactly
>>> which
>>>>>> SFF
>>>>>>>>>>   and which SF are to be visited by packets using that SFP,
>> while
>>>>>> other
>>>>>>>>>>   SFPs may be quite vague, deferring to the SFF the decisions
>>> about
>>>>>> the
>>>>>>>>>>   exact sequence of steps to be used to realize the SFC.  The
>>>>>>>>>>   specificity may be anywhere in between these extremes.
>>>>>>>>>> "
>>>>>>>>>>
>>>>>>>>>> The control draft is completely aligned with that approach.
>>>>>>>>>>
>>>>>>>>>> The control-plane document allows in particular to provision
>>>>>> required
>>>>>>>>>> information when "deferring to the SFF the decisions about the
>>>>>>>>>>   exact sequence of steps to be used to realize the SFC". It
>>>>>> happens
>>>>>>>>>> that information is no more than the service chain itself
>>> (without
>>>>>> any
>>>>>>>>>> constraints).
>>>>>>>>>>
>>>>>>>>>> Also, the current control-plane document allows to instruct a
>>>>>> loose
>>>>>>>>>> path
>>>>>>>>>> (SFP) or a strict path (RSP), etc.
>>>>>>>>>>
>>>>>>>>>> I fully agree that whether a full path is specified within a
>>>>>> domain
>>>>>> or
>>>>>>>>>> if it is deferred to SFFs is really deployment-specific.
>>>>>> Nevertheless,
>>>>>>>>>> the control plan should accommodate all these flavors.
>>>>>>>>>>
>>>>>>>>>> Cheers,
>>>>>>>>>> Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] EnvoyÃ© :
>>>>>> vendredi
>>>>>>>>>>> 16 octobre 2015 14:04 Ã€ : Joel M. Halpern Cc : BOUCADAIR
>> Mohamed
>>>>>>>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>>>>>>>>> (control-plane): Whether the control plane operates on SFC
>> IDs,
>>>>>> SFP
>>>>>>>> IDs, etc.
>>>>>>>>>>>
>>>>>>>>>>> Joel,
>>>>>>>>>>>
>>>>>>>>>>> I concur.
>>>>>>>>>>>
>>>>>>>>>>> The data plane deal with paths, not chains.  The relationship
>> of
>>>>>>>>>>> paths to chains falls squarely in the control plane (or even
>>> more
>>>>>>>>>>> likely
>>>>>>>>>> "policy"
>>>>>>>>>>> plane) realm.  The specificity of the path is left to
>>>>>>>>>>> implementation, in the architecture draft, but that's
>> consistent
>>>>>>>>>>> with your position and provides the requisite functionality.
>>>>>>>>>>>
>>>>>>>>>>> Paul
>>>>>>>>>>>
>>>>>>>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>>>>>>>> <jmh@joelhalpern.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> As far as I can tell, there is nothing in the Service
>> Chaining
>>>>>>>>>>>> work that
>>>>>>>>>>> requires correlating service path IDs with service chain IDs
>>>>>> within
>>>>>>>>>>> the data plane.  Any such relationship exists entirely within
>>> the
>>>>>>>>>>> control plane or above, and would be driven by requirements
>>> other
>>>>>>>>>>> than the data plane.  When I look at this document, all of the
>>>>>>>>>>> requirements that talk about service function chain IDs can be
>>>>>>>>>>> accurately captured, in terms of data plane requirements, by
>>>>>> service
>>>>>>>> function path IDs.
>>>>>>>>>>> Thus, the requirement that the data plane has is to see such
>>> path
>>>>>> IDs.
>>>>>>>>>>> Yes, in some deployments those will be 1-1 with chain IDs.
>> They
>>>>>> are
>>>>>>>>>> still path IDs.
>>>>>>>>>>>>
>>>>>>>>>>>> Introducing a requirement for the data plane to see and work
>>>>>> with
>>>>>>>>>>>> chain
>>>>>>>>>>> IDs is not grounded in the work of the group.
>>>>>>>>>>>>
>>>>>>>>>>>> Yours,
>>>>>>>>>>>> Joel M. Halpern
>>>>>>>>>>>>
>>>>>>>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>>>>> Re-,
>>>>>>>>>>>>>
>>>>>>>>>>>>> The control draft as it stands is compliant with the data
>>> plane
>>>>>>>>>>> architecture document.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>>>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>>>>>>>>> abstract
>>>>>>>>>> SFC
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> sfc mailing list
>>>>>>>>> sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Nov 19 06:30:42 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2026C1B2A7C for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 06:30:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qDNef6Gdsdi1 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 06:30:37 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBB781B2A81 for <sfc@ietf.org>; Thu, 19 Nov 2015 06:30:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28980; q=dns/txt; s=iport; t=1447943436; x=1449153036; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=yDK+Lsu7xxn5uxnj+ImL46/1hWDrzJdTxZO+yxLIbls=; b=mZ1Xh+EZRtGy/rci11ko30cjed9vZe4dH1ePoVNE9nQAOQC7InBv3DSP uA4PbAYI9i1ypcqCcupMpSFiyaBe8mDr5VfaODU/q9+eCGA3X8nHPF8le s4enqn4hHXSNTgXVb2qaES98hh7fMf+GQF8Vs7pSsmvoCH2dDlfgvKNX0 M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0APAgDX201W/49dJa1egztTbwa+awENg?= =?us-ascii?q?WUXCoVuAhyBLDgUAQEBAQEBAYEKhDQBAQEDAQEBARcJBA06BAcMBAIBBgIRAQI?= =?us-ascii?q?BAQEBAgIjAwICAiULFAECBggCBAENBRuICwgNkXmdNZA1AQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBFASBAYVThH6EKTAYgwSBRAEEjR2JLwGIFIUZgVuEQJI6g3EBHwE?= =?us-ascii?q?BQoIRHRaBQHKEGYEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,318,1444694400"; d="scan'208";a="209492738"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Nov 2015 14:30:35 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id tAJEUZgE023190 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Nov 2015 14:30:35 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 19 Nov 2015 08:30:34 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 19 Nov 2015 08:30:34 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YAAjTacA//+xwxr///5oYIAAhz2A
Date: Thu, 19 Nov 2015 14:30:34 +0000
Message-ID: <D273454C.30C43%jguichar@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <20151119073209.594948115.75564.49932@sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.38.147]
Content-Type: text/plain; charset="utf-8"
Content-ID: <782C23734E93CC4F8E7C79B53551DA4B@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0H-H4BhyN0Nuroev_0hd5CMKOYM>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 14:30:41 -0000

SGkgTWVkLA0KDQpPbiAxMS8xOS8xNSwgMjo0MSBBTSwgInNmYyBvbiBiZWhhbGYgb2YgbW9oYW1l
ZC5ib3VjYWRhaXJAb3JhbmdlLmNvbSINCjxzZmMtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYg
b2YgbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbT4gd3JvdGU6DQoNCj5SZS0sDQo+DQo+WWVz
LCBidXQgc3RpbGwgdGhlcmUgaXMgYSByZWNvcmQgc29tZXdoZXJlIHRvIGxpbmsgdGhlIG5hbWUg
dG8gb25lIG9yIGENCj5saXN0IG9mIElQIGFkZHJlc3Nlcy4gVGhhdCByZWNvcmQgY2FuIGJlIG1h
aW50YWluZWQgaW4gYSBjZW50cmFsIGVudGl0eQ0KPm9yIGJlIGxvY2FsIChhbiBTRkYgY2FuIGRl
Y2lkZSB3aGljaCBleGFjdCBTRiBpbnN0YW5jZSBpdCBjYW4gc29saWNpdGVkDQo+KExCIGNhc2Vz
LCByZWR1bmRhbmN5IGdyb3VwLCBldGMuKS4NCg0KSmltPiBhY3R1YWxseSBmcm9tIHRoZSBTRkMg
cGVyc3BlY3RpdmUgdGhlcmUgaXMgbm90LiBUaGUgU0ZDIGlzIGp1c3QgYW4NCm9yZGVyZWQgbGlz
dCBvZiBhYnN0cmFjdCBTRiB0eXBlczsgZnJvbSB0aGUgU0ZDIDEgb3IgbW9yZSBTRlDigJlzIGNh
biBiZQ0KZ2VuZXJhdGVkIGFuZCBpbiBzb21lIGNhc2VzIHRoZSBTRlAgcmVjb3JkIHdpbGwgcG9p
bnQgdG8gc3BlY2lmaWMgU0ZGL1NGDQpsb2NhdG9ycyBidXQgaW4gb3RoZXJzIGl0IG1pZ2h0IGp1
c3QgcmVmaW5lIHRoZSBTRkMgdG8gc3BlY2lmeSBzb21ldGhpbmcNCmxpa2Ug4oCcdGhlIEZXIGZy
b20gdGhlIFNGQyBvcmRlcmVkIGxpc3QgbXVzdCBiZSBzZWxlY3RlZCBmcm9tIERDICMx4oCdLiBG
cm9tDQp0aGUgU0ZQIG9uZSBvciBtb3JlIFJTUHMgbWF5IGJlIGdlbmVyYXRlZCBhbmQgdGhlc2Ug
YXJlIHRoZSBlbnRpdGllcyB0aGF0DQpzcGVjaWZ5IHRoZSBleGFjdCBTRkYvU0YgbG9jYXRvcnMu
DQoNClNlY3Rpb24gMi4zLjEgb2YgUkZDNzY2NSBpcyB2ZXJ5IGNsZWFyIG9uIHRoaXMuDQoNCkpp
bSANCiANCj4gDQo+DQo+V2hhdCBJJ20gYXNraW5nIGZvciBpcyBtb3JlIGZyZWVkb20gaW4gdGhl
IGNwIGFyY2hpdGVjdHVyZSB0byBtYWtlIHRoZQ0KPnJlc29sdXRpb24gd2hlbiBpdCBpcyBhcHBy
b3ByaWF0ZTogZWl0aGVyIGNlbnRyYWxpemVkLCBkaXN0cmlidXRlZCwgb3IgYQ0KPm1peCAoaGll
cmFyY2hpY2FsIGNvbnRleHQpLg0KPg0KPkNoZWVycywNCj5NZWQNCj4NCj4+IC0tLS0tTWVzc2Fn
ZSBkJ29yaWdpbmUtLS0tLQ0KPj4gRGUgOiBEYXZlIERvbHNvbiBbbWFpbHRvOmRkb2xzb25Ac2Fu
ZHZpbmUuY29tXQ0KPj4gRW52b3nDqSA6IGpldWRpIDE5IG5vdmVtYnJlIDIwMTUgMDg6MzINCj4+
IMOAIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTg0KPj4gQ2MgOiBzZmNAaWV0Zi5vcmcNCj4+
IE9iamV0IDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRy
b2wgcGxhbmUNCj4+b3BlcmF0ZXMNCj4+IG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4+IA0K
Pj4gTWVkLA0KPj4gSSB3b3VsZCBzYXkgdGhhdCB0aGUgU0ZDIGhhcyBubyByZXByZXNlbnRhdGlv
biBpbiB0aGUgZGF0YSBwbGFuZSAobGlrZQ0KPj4gaG9zdCBuYW1lIGhhcyBubyByZXByZXNlbnRh
dGlvbiBpbiBJUCByb3V0aW5nLikNCj4+IOKAjkJvdGggYXJlIGFic3RyYWN0aW9ucy4NCj4+IA0K
Pj4gLURhdmUNCj4+IA0KPj4gICBPcmlnaW5hbCBNZXNzYWdlDQo+PiBGcm9tOiBtb2hhbWVkLmJv
dWNhZGFpckBvcmFuZ2UuY29tDQo+PiBTZW50OiBUaHVyc2RheSwgTm92ZW1iZXIgMTksIDIwMTUg
MjoxMiBBTQ0KPj4gVG86IERhdmUgRG9sc29uDQo+PiBDYzogc2ZjQGlldGYub3JnDQo+PiBTdWJq
ZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBw
bGFuZQ0KPj5vcGVyYXRlcw0KPj4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gDQo+PiAN
Cj4+IEhpIERhdmUsDQo+PiANCj4+IEkgZnVsbHkgYWdyZWUgd2l0aCB0aGlzIGFuYWxvZ3k6DQo+
PiANCj4+ID09DQo+PiBTRkMgPC0tPiBkZXN0aW5hdGlvbiBob3N0IG5hbWUNCj4+IFNGUCA8LS0+
IGRlc3RpbmF0aW9uIElQIGFkZHJlc3MNCj4+IFJTUCA8LS0+IHNlcXVlbmNlIG9mIHJvdXRlcnMg
YW5kIGxpbmtzIHRvIGRlbGl2ZXIgdGhlIElQIHBhY2tldA0KPj4gPT0NCj4+IA0KPj4gSGVuY2Ug
dGhlIG5lZWQgZm9yIHRoZSBjb250cm9sIHBsYW5lIHRvIGluc3RydWN0IHRoZSB1bmRlcmx5aW5n
IGRhdGENCj4+cGxhbmUNCj4+IGVsZW1lbnRzIHdpdGggcmVxdWlyZWQgaW5mb3JtYXRpb24gYXQg
ZWFjaCBvZiB0aGVzZSB0aHJlZSBsZXZlbHMuDQo+PiANCj4+IENoZWVycywNCj4+IE1lZA0KPj4g
DQo+PiA+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPj4gPiBEZSA6IHNmYyBbbWFpbHRv
OnNmYy1ib3VuY2VzQGlldGYub3JnXSBEZSBsYSBwYXJ0IGRlIERhdmUgRG9sc29uDQo+PiA+IEVu
dm95w6kgOiBtZXJjcmVkaSAxOCBub3ZlbWJyZSAyMDE1IDIwOjM0DQo+PiA+IMOAIDogSmltIEd1
aWNoYXJkIChqZ3VpY2hhcikNCj4+ID4gQ2MgOiBzZmNAaWV0Zi5vcmcNCj4+ID4gT2JqZXQgOiBS
ZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZQ0K
Pj4gb3BlcmF0ZXMNCj4+ID4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gPg0KPj4gPiBb
cmVkdWNlZCBkaXN0cmlidXRpb24gdG8gSmltICYgc2ZjIGxpc3RdDQo+PiA+DQo+PiA+IEppbSwN
Cj4+ID4gSSB0aGluayB5b3VyIGRlc2NyaXB0aW9uIGlzIGhlbHBmdWwuIENhbiB3ZSBmaW5kIGEg
cGxhY2UgZm9yIHRoaXMgaW4NCj4+dGhlDQo+PiA+IGRvY3M/DQo+PiA+DQo+PiA+IEkgZG9uJ3Qg
dGhpbmsgSSBjYW4gdW5kZXJzdGFuZCBpdCB3aXRob3V0IHJlZmVycmluZyB0byB0aGUgY29uY3Jl
dGUNCj4+TlNILA0KPj4gPiBob3dldmVyLg0KPj4gPg0KPj4gPg0KPj4gPiBJZiBJIHVuZGVyc3Rh
bmQgY29ycmVjdGx5LCB0aGUgZm9sbG93aW5nIGFyZSB0cnVlOg0KPj4gPiAtIGlmIHRoZSBOU0gg
U1BJIGluIHR3byBwYWNrZXRzIGFyZSB0aGUgc2FtZSwgdGhleSBhcmUgb24gdGhlIHNhbWUNCj4+
U0ZQLg0KPj4gPiAtIGlmIHRoZSBOU0ggU1BJIGluIHR3byBwYWNrZXRzIGFyZSBkaWZmZXJlbnQs
IHRoZXkgYXJlIG9uIGRpZmZlcmVudA0KPj4gU0ZQcy4NCj4+ID4gLSBhbHRob3VnaCB0d28gcGFj
a2V0cyBoYXZlIHRoZSBzYW1lIFNQSSwgdGhleSBtYXkgdHJhdmVyc2UgZGlmZmVyZW50DQo+PiA+
IFJTUHMuDQo+PiA+DQo+PiA+IC0gd2hlbiB0aGlua2luZyBvZiB0aGUgZGF0YS1wbGFuZSBhbmQg
c291dGgtYm91bmQgaW50ZXJmYWNlcyBDMSB0aHJ1DQo+PkM0LA0KPj4gPiB0aGUgU0ZDIGNvbmNl
cHQgZG9lc24ndCBleGlzdC4NCj4+ID4gICAgKFNGQyBpcyBqdXN0IGEgbm9ydGgtaW50ZXJmYWNl
IGNvbmNlcHQgbGlrZSwgImNoYWluIEEgcHJvdmlkZXMgYQ0KPj4gPiBmaXJld2FsbCBhbmQgYSBO
QVQiKQ0KPj4gPg0KPj4gPiBIYXZlIEkgZ290IGl0IHJpZ2h0Pw0KPj4gPg0KPj4gPg0KPj4gPiBJ
IGFsc28gdGhpbmsgdGhlIGZvbGxvd2luZyAqYW5hbG9neSogd2l0aCByb3V0aW5nIGNhbiBiZSBk
cmF3bjoNCj4+ID4gU0ZDIDwtLT4gZGVzdGluYXRpb24gaG9zdCBuYW1lDQo+PiA+IFNGUCA8LS0+
IGRlc3RpbmF0aW9uIElQIGFkZHJlc3MNCj4+ID4gUlNQIDwtLT4gc2VxdWVuY2Ugb2Ygcm91dGVy
cyBhbmQgbGlua3MgdG8gZGVsaXZlciB0aGUgSVAgcGFja2V0DQo+PiA+DQo+PiA+DQo+PiA+IC1E
YXZlDQo+PiA+DQo+PiA+DQo+PiA+DQo+PiA+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+
PiA+IEZyb206IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2Yg
SmltIEd1aWNoYXJkDQo+PiA+IChqZ3VpY2hhcikNCj4+ID4gU2VudDogV2VkbmVzZGF5LCBOb3Zl
bWJlciAxOCwgMjAxNSAxMToxOCBBTQ0KPj4gPiBUbzogQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25h
dGEpOyBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+PiA+IENjOiBzZmMgaXNzdWUgdHJh
Y2tlcjsgc2ZjQGlldGYub3JnOyBQYXVsIFF1aW5uIChwYXVscSk7DQo+PmRyYWZ0LWlldGYtc2Zj
LQ0KPj4gPiBjb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOyBKb2VsIEhhbHBlcm47IEpvZWwg
TS4gSGFscGVybg0KPj4gPiBTdWJqZWN0OiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTog
V2hldGhlciB0aGUgY29udHJvbCBwbGFuZQ0KPj4gb3BlcmF0ZXMNCj4+ID4gb24gU0ZDIElEcywg
U0ZQIElEcywgZXRjLg0KPj4gPg0KPj4gPiBbQ2hhaXIgaGF0IG9mZiDigKZdDQo+PiA+DQo+PiA+
IEkgaGF2ZSB0byBzYXkgSSBhbSBzdHJ1Z2dsaW5nIHRvIHNlZSB0aGUg4oCcaXNzdWXigJ0gaW4g
dGhpcyB0aHJlYWQgdGhhdA0KPj4gbmVlZHMNCj4+ID4gdG8gYmUgYWRkcmVzc2VkIG90aGVyIHRo
YW4gY29uZnVzaW9uIG92ZXIgU0ZDIHZzIFNGUCBkZWZpbml0aW9uOyBmcm9tDQo+PmENCj4+ID4g
ZGF0YSBwbGFuZSBwZXJzcGVjdGl2ZSBpdCBpcyAqdmVyeSogY2xlYXIgdGhhdCBTRlAvU0kgaWRl
bnRpZmllcnMgYXJlDQo+PiB1c2VkDQo+PiA+IGFzIHRoZSBsb29rdXAga2V5IGludG8gYSBmb3J3
YXJkaW5nIGNvbnN0cnVjdCB0aGF0IG1heSBjb250YWluIDE6bg0KPj4gbnVtYmVyDQo+PiA+IG9m
IG5leHQtaG9wcyAoU0ZGcywgU0ZzKS4gSW4gc29tZSBjYXNlcyB0aGF0IGxvb2t1cCB3aWxsIHBv
aW50IHRvIGENCj4+IHNpbmdsZQ0KPj4gPiBuZXh0LWhvcCwgaW4gb3RoZXJzIG11bHRpcGxlIG5l
eHQtaG9wcy4gSW4gKmFsbCogY2FzZXMgdGhpcyBoYXMNCj4+IGFic29sdXRlbHkNCj4+ID4gbm90
aGluZyB0byBkbyB3aXRoIHRoZSBTRkMgYXMgZWFjaCByZXByZXNlbnRhdGlvbiBvZiB0aGF0IFNG
QyBpcw0KPj4gdW5pcXVlbHkNCj4+ID4gaWRlbnRpZmllZCBieSBhbiBTRlAtaWQuDQo+PiA+DQo+
PiA+IEppbQ0KPj4gPg0KPj4gPiBPbiAxMS8xOC8xNSwgMTA6MTkgQU0sICJzZmMgb24gYmVoYWxm
IG9mIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSINCj4+ID4gPHNmYy1ib3VuY2VzQGlldGYu
b3JnIG9uIGJlaGFsZiBvZiBjcGlnbmF0YUBjaXNjby5jb20+IHdyb3RlOg0KPj4gPg0KPj4gPiA+
SGksIE1lZCwNCj4+ID4gPg0KPj4gPiA+SSBhbHNvIHJlZmVycmVkIHRvIG90aGVyIHBhcnRzIG9m
IHRoZSBkb2N1bWVudCwgd2hlbiBJIHdyb3RlOg0KPj4gPiA+DQo+PiA+ID4+IFRoZSBjb250cm9s
LXBsYW5lIGRyYWZ0IHRhbGtzIGFib3V0IMKzU0ZDIGZvcndhcmRpbmfCsiBhbmQgwrNTRkMgZGF0
YQ0KPj4gPiA+PnBsYW5lwrINCj4+ID4gPg0KPj4gPiA+DQo+PiA+ID5Gb3IgZXhhbXBsZSwgSSBh
bSBub3Qgc3VyZSBJIHVuZGVyc3RhbmQgd2hhdCB0aGlzIG1lYW5zOg0KPj4gPiA+DQo+PiA+ID4i
ICAgbyAgUG9wdWxhdGUgU0ZDIGZvcndhcmRpbmcgcG9saWN5IHRhYmxlcyBvZiBpbnZvbHZlZCBT
RkMgZGF0YQ0KPj4gcGxhbmXCsg0KPj4gPiA+DQo+PiA+ID4NCj4+ID4gPk9yIGF0Og0KPj4gPiA+
IiAgIG8gIFNGQyBGb3J3YXJkaW5nIFBvbGljeSBUYWJsZTogdGhpcyB0YWJsZSByZWZsZWN0cyB0
aGUgU0ZDLQ0KPj4gc3BlY2lmaWMNCj4+ID4gPiAgICAgdHJhZmZpYyBmb3J3YXJkaW5nIHBvbGlj
eSBlbmZvcmNlZCBieSBTRkYgY29tcG9uZW50cyBmb3IgZXZlcnkNCj4+ID4gPiAgICAgcmVsZXZh
bnQgaW5jb21pbmcgcGFja2V0IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBvbmUgb2YgdGhlDQo+PmV4
aXN0aW5nDQo+PiA+ID4gICAgIFNGQ3MuIg0KPj4gPiA+DQo+PiA+ID4NCj4+ID4gPk15IGNvbW1l
bnQgaXMgdGhhdCB0aG9zZSBzaG91bGQgYmUgwrNTRlAiDQo+PiA+ID4NCj4+ID4gPlRoYW5rcywN
Cj4+ID4gPg0KPj4gPiA+4oC5IENhcmxvcy4NCj4+ID4gPg0KPj4gPiA+LS0tLS1PcmlnaW5hbCBN
ZXNzYWdlLS0tLS0NCj4+ID4gPkZyb206IE1lZCBCb3VjYWRhaXIgPG1vaGFtZWQuYm91Y2FkYWly
QG9yYW5nZS5jb20+DQo+PiA+ID5EYXRlOiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4LCAyMDE1IGF0
IDEwOjAzIEFNDQo+PiA+ID5UbzogQ2FybG9zIFBpZ25hdGFybyA8Y3BpZ25hdGFAY2lzY28uY29t
Pg0KPj4gPiA+Q2M6ICJQYXVsIFF1aW5uIChwYXVscSkiIDxwYXVscUBjaXNjby5jb20+LA0KPj4g
PiA+ImRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmciDQo+PiA+ID48
ZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZz4sIEpvZWwgSGFscGVy
bg0KPj4gPiA+PGptaEBqb2VsaGFscGVybi5jb20+LCBzZmMgaXNzdWUgdHJhY2tlciA8dHJhYytz
ZmNAdG9vbHMuaWV0Zi5vcmc+LA0KPj4gPiA+InNmY0BpZXRmLm9yZyIgPHNmY0BpZXRmLm9yZz4s
IEpvZWwgSGFscGVybg0KPj48am9lbC5oYWxwZXJuQGVyaWNzc29uLmNvbT4NCj4+ID4gPlN1Ympl
Y3Q6IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBs
YW5lDQo+PiA+IG9wZXJhdGVzDQo+PiA+ID5vbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+PiA+
ID4NCj4+ID4gPj5DYXJsb3MsDQo+PiA+ID4+DQo+PiA+ID4+VGhlcmUgaXMgbm90IFNGQyBJRCBp
biB0aGUgY29yZSB0ZXh0IG9mIHRoZSBjb250cm9sIHBsYW5lIGRyYWZ0Lg0KPj4gPiA+Pg0KPj4g
PiA+PlRoZSB0ZXh0IHlvdSBxdW90ZWQgaXMgcGFydCBvZiBhbiBhcHBlbmRpeCB3aXRoIGEgbm90
ZSB0aGF0IGNsZWFybHkNCj4+ID4gPj5zdGF0ZXMgdGhpcyBpcyBub3QgZGlzY3Vzc2VkLiBBIGNv
cnJlc3BvbmRpbmcgaXNzdWUgcmVjb3JkIGhhcyBiZWVuDQo+PiA+ID4+cmVjb3JkZWQgdG8gc2Vl
ayBmb3IgbW9yZSBmZWVkYmFjayBvbiB0aGF0IGFwcGVuZGl4Lg0KPj4gPiA+Pg0KPj4gPiA+PkNo
ZWVycywNCj4+ID4gPj5NZWQNCj4+ID4gPj4NCj4+ID4gPj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdp
bmUtLS0tLQ0KPj4gPiA+Pj4gRGUgOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgW21haWx0
bzpjcGlnbmF0YUBjaXNjby5jb21dDQo+PiA+ID4+PiBFbnZvecOpIDogbWVyY3JlZGkgMTggbm92
ZW1icmUgMjAxNSAxNTozNQ0KPj4gPiA+Pj4gw4AgOiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xO
DQo+PiA+ID4+PiBDYyA6IFBhdWwgUXVpbm4gKHBhdWxxKTsgZHJhZnQtaWV0Zi1zZmMtY29udHJv
bC0NCj4+IHBsYW5lQHRvb2xzLmlldGYub3JnOw0KPj4gPiA+Pj5Kb2VsDQo+PiA+ID4+PiBNLiBI
YWxwZXJuOyBzZmMgaXNzdWUgdHJhY2tlcjsgc2ZjQGlldGYub3JnOyBKb2VsIEhhbHBlcm4NCj4+
ID4gPj4+IE9iamV0IDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhl
IGNvbnRyb2wgcGxhbmUNCj4+ID4gPj4+b3BlcmF0ZXMNCj4+ID4gPj4+IG9uIFNGQyBJRHMsIFNG
UCBJRHMsIGV0Yy4NCj4+ID4gPj4+DQo+PiA+ID4+PiBNZWQsDQo+PiA+ID4+Pg0KPj4gPiA+Pj4g
PiBPbiBOb3YgMTgsIDIwMTUsIGF0IDg6MDggQU0sIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5j
b20gd3JvdGU6DQo+PiA+ID4+PiA+DQo+PiA+ID4+PiA+IENhcmxvcywNCj4+ID4gPj4+ID4NCj4+
ID4gPj4+ID4gVGhpcyBpcyBhbiBvcGVuIGlzc3VlIGZvciB0aGlzIGRyYWZ0LCBzbyBpdCBpcyBu
b3JtYWwgdG8NCj4+Y29udGludWUNCj4+ID4gPj4+IGRpc2N1c3NpbmcgaXQuIEkgZG9uJ3Qga25v
dyBob3cgeW91IGNhbiBjb25jbHVkZSBpbiBhZHZhbmNlIHRoYXQNCj4+d2UNCj4+ID4gYXJlDQo+
PiA+ID4+PiBjaXJjbGluZy4NCj4+ID4gPj4+ID4NCj4+ID4gPj4+DQo+PiA+ID4+PiBEaXNjdXNz
aW9uIGlzIGdyZWF0LCBNZWQuIEJ1dCBteSDFkndlIGFyZSBjaXJjbGluZycgY29tbWVudCAobm90
IGluDQo+PiA+ID4+PiBhZHZhbmNlZCwgYnV0IGFscmVhZHkgZXZpZGVudCkgaXMgYmVjYXVzZSBJ
IHNhdyB0aGUgc2FtZQ0KPj5xdWVzdGlvbnMsDQo+PiA+ID4+PnNhbWUNCj4+ID4gPj4+IGFyZ3Vt
ZW50cywgYW5kIHNhbWUgYW5zd2VycyBhcyBiZWZvcmUuDQo+PiA+ID4+Pg0KPj4gPiA+Pj4gPiAi
c3Ryb25nbHkgYmVsaWV2ZSIgaXMgbm90IGEgdGVjaG5pY2FsIGFyZ3VtZW50LCBidHcuDQo+PiA+
ID4+PiA+DQo+PiA+ID4+Pg0KPj4gPiA+Pj4gV2VsbCwgSSBiZWxpZXZlIHNvIG9uIHRlY2huaWNh
bCBncm91bmRzISBNb3N0IG9mIHdoaWNoIGhhdmUNCj4+YWxyZWFkeQ0KPj4gPiA+Pj5iZWVuDQo+
PiA+ID4+PiBzYWlkLCBzbyBJIGRvIG5vdCB3YW50IHRvIGNvbnRyaWJ1dGUgdG8gdGhlIGNpcmN1
bGFyIGRpc2N1c3Npb24uDQo+PiA+ID4+Pg0KPj4gPiA+Pj4gVGhlIGNvbnRyb2wtcGxhbmUgZHJh
ZnQgdGFsa3MgYWJvdXQgwrNTRkMgZm9yd2FyZGluZ8KyIGFuZCDCs1NGQyBkYXRhDQo+PiA+ID4+
PnBsYW5lwrIsDQo+PiA+ID4+PiBhbmQgwrNTRkMgSURzwrIuIFRoZSBhcmNoaXRlY3R1cmUgc2F5
cyB0aGF0IFNGQyBhcmUgbWFkZSBvZiBhYnN0cmFjdA0KPj4gPiA+Pj5zZXJ2aWNlDQo+PiA+ID4+
PiBmdW5jdGlvbnMuIFRoZXJlwrlzIG5vIGFjdHVhbCBmb3J3YXJkaW5nIGluIHRoaXMgYWJzdHJh
Y3QNCj4+Y29uY2VwdHVhbA0KPj4gPiA+Pj5tb2RlbC4NCj4+ID4gPj4+DQo+PiA+ID4+PiBUaGUg
Y29udHJvbC1wbGFuZSBkcmFmdCBzYXlzIMKzU3VwcG9zZSB0aGUgU0ZDIElEIGZvciB0aGlzIFNG
UCBpcw0KPj4gPiA+Pj4gInllbGxvd8KyLMKyLCBhbmQgbXkgcG9pbnQgYWdhaW4gaXMgdGhhdCBp
biB0aGUgZGF0YSBwbGFuZSBhbiBTRlANCj4+aGFzDQo+PiBhbg0KPj4gPiA+Pj4gaWRlbnRpZmll
ciAod2hpY2ggaWRlbnRpZmllcyB0aGUgU0ZQIChTRlAtSUQpIGFuZCBpcyBub3QgdGhlDQo+PiA+
IGlkZW50aWZpZXINCj4+ID4gPj4+b2YNCj4+ID4gPj4+IHNvbWV0aGluZyBlbHNlLCBpdMK5cyBu
b3QgYSBUb3BvbG9neS1JRCwgaXTCuXMgbm90IGEgU0tVLCBpdMK5cyBub3QgYQ0KPj4gPiBVUkks
DQo+PiA+ID4+PiBpdMK5cyBub3QgYSBGYW1pbHkgTmFtZSwgYW5kIG5vdCBhbiBTRkMgSUQpLCBh
bmQgdGhlIGNvbnRyb2wgKGFuZA0KPj4gPiA+Pj5wb2xpY3kpDQo+PiA+ID4+PiBwbGFuZSBjYW4g
b2YgY291cnNlIHdvcmsgd2l0aCBTRkNzLg0KPj4gPiA+Pj4NCj4+ID4gPj4+IE15ICQwLjAyLg0K
Pj4gPiA+Pj4NCj4+ID4gPj4+IFRoYW5rcywNCj4+ID4gPj4+DQo+PiA+ID4+PiDigLkgQ2FybG9z
Lg0KPj4gPiA+Pj4NCj4+ID4gPj4+ID4gQ2hlZXJzLA0KPj4gPiA+Pj4gPiBNZWQNCj4+ID4gPj4+
ID4NCj4+ID4gPj4+ID4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPj4gPiA+Pj4gPj4g
RGUgOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgW21haWx0bzpjcGlnbmF0YUBjaXNjby5j
b21dDQo+PiA+ID4+PiA+PiBFbnZvecOpIDogbWVyY3JlZGkgMTggbm92ZW1icmUgMjAxNSAxMTo1
Mg0KPj4gPiA+Pj4gPj4gw4AgOiBKb2VsIEhhbHBlcm4NCj4+ID4gPj4+ID4+IENjIDogQk9VQ0FE
QUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlubiAocGF1bHEpOyBkcmFmdC1pZXRmLQ0KPj4g
c2ZjLQ0KPj4gPiA+Pj4gPj4gY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgSm9lbCBNLiBI
YWxwZXJuOyBzZmMgaXNzdWUNCj4+dHJhY2tlcjsNCj4+ID4gPj4+ID4+IHNmY0BpZXRmLm9yZw0K
Pj4gPiA+Pj4gPj4gT2JqZXQgOiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhl
ciB0aGUgY29udHJvbA0KPj5wbGFuZQ0KPj4gPiA+Pj4gb3BlcmF0ZXMNCj4+ID4gPj4+ID4+IG9u
IFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4+ID4gPj4+ID4+DQo+PiA+ID4+PiA+PiBJIGFtIGEg
Yml0IGJhZmZsZWQgdG8gc2VlIHRoaXMgdGhyZWFkIGFnYWluIOKAuSBpdCBhcHBlYXJzIHRoZQ0K
Pj4gPiA+Pj5kaXNjdXNzaW9uDQo+PiA+ID4+PiA+PiByZXN0YXJ0ZWQgdG8gY29udGludWUgaW4g
Y2lyY2xlcy4NCj4+ID4gPj4+ID4+DQo+PiA+ID4+PiA+PiBNZWQsDQo+PiA+ID4+PiA+Pg0KPj4g
PiA+Pj4gPj4gSSB0b28gYWdyZWUgd2l0aCBKb2VsIGFuZCBzdHJvbmdseSBiZWxpZXZlIHRoZXJl
IGlzIG5vIG5lZWQgZm9yDQo+PiBTRkMNCj4+ID4gPj4+ID4+IGlkZW50aWZpY2F0aW9uIHBhc3Nl
ZCBkb3duIOKAuSB0aGVyZSBpcyBubyBwcm92aXNpb25pbmcgb2YgU0ZDcw0KPj4gPiA+Pj4gc291
dGhib3VuZC4NCj4+ID4gPj4+ID4+DQo+PiA+ID4+PiA+PiAoQWxtb3N0KSBldmVyeSBpbnN0YW5j
ZSBvZiDCs1NGQ8KyIGluIHRoZSBjb250cm9sLXBsYW5lDQo+PiByZXF1aXJlbWVudHMNCj4+ID4g
Pj4+IGRyYWZ0DQo+PiA+ID4+PiA+PiBzaG91bGQgcmVhbGx5IHNheSDCs1NGUMKyLiBUaGVyZSBp
cyBubyB1c2Ugb2YgdGFsa2luZyBhYm91dCBTRkNzDQo+PiA+ID4+PnRvd2FyZHMNCj4+ID4gPj4+
IHRoZQ0KPj4gPiA+Pj4gPj4gZGF0YSBwbGFuZS4gVGhlIHJlbGF0aW9uc2hpcCBiZXR3ZWVuIGNo
YWlucyBhbmQgcGF0aHMgaXMgYQ0KPj5wb2xpY3kNCj4+ID4gPj4+IG1hdHRlcg0KPj4gPiA+Pj4g
Pj4gd2hpY2ggYmVsb25ncyBpbiB0aGUgcG9saWN5L2NvbnRyb2wgaXRzZWxmLCBidXQgbm90IG91
dCBvZg0KPj50aGVyZS4NCj4+ID4gPj4+ID4+DQo+PiA+ID4+PiA+PiBUaGlzIGlzIG5vIGRpZmZl
cmVudCB0aGFuIHdoYXQgSSBzYWlkIGEgZmV3IG1vbnRocyBhZ28gb24gdGhlDQo+PiBzYW1lDQo+
PiA+ID4+PiB0b3BpYy4NCj4+ID4gPj4+ID4+DQo+PiA+ID4+PiA+PiBUaGFua3MsDQo+PiA+ID4+
PiA+Pg0KPj4gPiA+Pj4gPj4g4oC5IENhcmxvcy4NCj4+ID4gPj4+ID4+DQo+PiA+ID4+PiA+Pj4g
T24gTm92IDE3LCAyMDE1LCBhdCA5OjA2IEFNLCBKb2VsIEhhbHBlcm4NCj4+ID4gPj4+PGpvZWwu
aGFscGVybkBlcmljc3Nvbi5jb20+DQo+PiA+ID4+PiA+PiB3cm90ZToNCj4+ID4gPj4+ID4+Pg0K
Pj4gPiA+Pj4gPj4+IFdoYXQgaXMgcHJvdmlzaW9uZWQgaW50byB0aGUgU0ZGIHJlZmxlY3RzIHRo
ZSBTRlAuICBUaGUNCj4+Y29udHJvbA0KPj4gPiA+Pj5zeXN0ZW0NCj4+ID4gPj4+ID4+IGRlY2lk
ZXMgd2hldGhlciB0aGF0IFNGUCBpbmRpY2F0ZXMgdGhlIHNhbWUgc2V0IG9mIGFsbCBwb3NzaWJs
ZQ0KPj4gPiA+Pj5jaG9pY2VzDQo+PiA+ID4+PiA+PiB0aGF0IHRoZSBTRkMgZG9lcywgb3IgaXMg
YSBwcm9wZXIgc3Vic2V0Lg0KPj4gPiA+Pj4gPj4+DQo+PiA+ID4+PiA+Pj4gSW4gb3JkZXIgdG8g
YWxsb3cgZm9yIGFuIFNGUCB0aGF0IHJlZmxlY3RzIG1lYW5pbmdmdWwNCj4+IGNvbnN0cmFpbnRz
LA0KPj4gPiA+Pj4gd2hhdA0KPj4gPiA+Pj4gPj4gaXMgcHJvdmlzaW9uZWQgaGFzIHRvIGJlIHRo
ZSBTRlAuDQo+PiA+ID4+PiA+Pj4gTm8gc3BlY2lhbCBwcm92aXNpb24gaXMgbmVlZGVkIGZvciB0
aGUgY2FzZSB3aGVyZSB0aGUgU0ZQIGlzDQo+PiA+ID4+PiBpc29tb3JwaGljDQo+PiA+ID4+PiA+
PiB0byB0aGUgU0ZDLiBJbiBzdWNoIGEgY2FzZSwgeW91IHN0aWxsIHByb3Zpc2lvbiB0aGUgU0ZQ
LiAgQW5kDQo+PnRoZQ0KPj4gPiA+Pj4gcmVzdWx0DQo+PiA+ID4+PiA+PiBpcyBhbiBTRlAgd2l0
aCBhcyBtdWNoIGZsZXhpYmlsaXR5IGFzIHRoZSBTRkMuDQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+
ID4+PiBJZiwgaW4gY29udHJhc3QsIHlvdSBkZWNsYXJlIHRoYXQgdGhlIHByb3Zpc2lvbmluZyBp
bmNsdWRlcw0KPj50aGUNCj4+ID4gU0ZDDQo+PiA+ID4+PiB0aGVuDQo+PiA+ID4+PiA+PiB5b3Ug
YXJlIGludHJvZHVjaW5nIGV4dHJhIGNvbXBsZXhpdHkgd2l0aG91dCBhZGRpbmcgYW55IG5ldw0K
Pj5jYXNlcw0KPj4gPiA+Pj50aGF0DQo+PiA+ID4+PiBjYW4NCj4+ID4gPj4+ID4+IGJlIGhhbmRs
ZWQuDQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+ID4+PiBZb3VycywNCj4+ID4gPj4+ID4+PiBKb2Vs
DQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+ID4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0K
Pj4gPiA+Pj4gPj4+IEZyb206IG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20NCj4+ID4gPj4+
IFttYWlsdG86bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbV0NCj4+ID4gPj4+ID4+PiBTZW50
OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA5OjAzIEFNDQo+PiA+ID4+PiA+Pj4gVG86IEpv
ZWwgSGFscGVybjsgUGF1bCBRdWlubiAocGF1bHEpDQo+PiA+ID4+PiA+Pj4gQ2M6IHNmYyBpc3N1
ZSB0cmFja2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLQ0KPj4gPiBwbGFuZUB0b29scy5pZXRm
Lm9yZzsNCj4+ID4gPj4+ID4+IHNmY0BpZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuDQo+PiA+ID4+
PiA+Pj4gU3ViamVjdDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhl
IGNvbnRyb2wNCj4+IHBsYW5lDQo+PiA+ID4+PiA+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAg
SURzLCBldGMuDQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+ID4+PiBIaSBKb2VsLA0KPj4gPiA+Pj4g
Pj4+DQo+PiA+ID4+PiA+Pj4gUGxlYXNlIHNlZSBpbmxpbmUuDQo+PiA+ID4+PiA+Pj4NCj4+ID4g
Pj4+ID4+PiBDaGVlcnMsDQo+PiA+ID4+PiA+Pj4gTWVkDQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+
ID4+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+PiA+ID4+PiA+Pj4+IERlIDogSm9l
bCBIYWxwZXJuIFttYWlsdG86am9lbC5oYWxwZXJuQGVyaWNzc29uLmNvbV0NCj4+ID4gPj4+ID4+
Pj4gRW52b3nDqSA6IG1hcmRpIDE3IG5vdmVtYnJlIDIwMTUgMTQ6NDkNCj4+ID4gPj4+ID4+Pj4g
w4AgOiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xOOyBQYXVsIFF1aW5uIChwYXVscSkgQ2MgOiBz
ZmMNCj4+IGlzc3VlDQo+PiA+ID4+PiA+Pj4+IHRyYWNrZXI7IGRyYWZ0LWlldGYtc2ZjLWNvbnRy
b2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7DQo+PiA+ID4+PiA+Pj4+IHNmY0BpZXRmLm9yZzsgSm9l
bCBNLiBIYWxwZXJuDQo+PiA+ID4+PiA+Pj4+IE9iamV0IDogUkU6IFtzZmNdICMxNSAoY29udHJv
bC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wNCj4+IHBsYW5lDQo+PiA+ID4+PiA+Pj4+IG9w
ZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4+ID4gPj4+ID4+Pj4NCj4+ID4gPj4+
ID4+Pj4gWW91ciBzdGF0ZW1lbnQgdGhhdCAiIEl0IGhhcHBlbnMgdGhhdCBpbmZvcm1hdGlvbiBp
cyBubyBtb3JlDQo+PiB0aGFuDQo+PiA+ID4+PnRoZQ0KPj4gPiA+Pj4gPj4+PiBzZXJ2aWNlIGNo
YWluIGl0c2VsZiAod2l0aG91dCBhbnkgY29uc3RyYWludHMpLiIgKFdoZXJlICJpdCINCj4+ID4g
Pj4+cmVmZXJzDQo+PiA+ID4+PiB0bw0KPj4gPiA+Pj4gPj4gIg0KPj4gPiA+Pj4gPj4+PiB0aGUg
ZXhhY3Qgc2VxdWVuY2Ugb2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFsaXplIHRoZSBTRkMiLikN
Cj4+IERvZXMNCj4+ID4gPj4+bm90DQo+PiA+ID4+PiA+Pj4+IG1ha2Ugc2Vuc2UgdG8gbWUuDQo+
PiA+ID4+PiA+Pj4NCj4+ID4gPj4+ID4+PiBbTWVkXSBSRkMgNzY2NSBzYXlzOg0KPj4gPiA+Pj4g
Pj4+DQo+PiA+ID4+PiA+Pj4gIiAgIFRodXMsIHRoZSBwb2xpY2llcyBhbmQgbG9naWMgb2YgU0ZQ
IHNlbGVjdGlvbiBvciBjcmVhdGlvbg0KPj4gPiA+Pj4gKGRlcGVuZGluZw0KPj4gPiA+Pj4gPj4+
ICB1cG9uIHRoZSBzb2x1dGlvbikgcHJvZHVjZSB3aGF0IG1heSBiZSB0aG91Z2h0IG9mIGFzIGEN
Cj4+ID4gY29uc3RyYWluZWQNCj4+ID4gPj4+ID4+PiAgdmVyc2lvbiBvZiB0aGUgb3JpZ2luYWwg
U0ZDLiAiDQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+ID4+PiBpbiBzaG9ydDogU0ZQIGlzIGRlZmlu
ZWQgYXMgYSBjb25zdHJhaW5lZCB2ZXJzaW9uIG9mIHRoZQ0KPj4gb3JpZ2luYWwNCj4+ID4gPj4+
U0ZDLg0KPj4gPiA+Pj4gPj4+DQo+PiA+ID4+PiA+Pj4gV2hhdCBpcyB0aGUgbmFtZSB0byB1c2Ug
dG8gcmVmZXIgdG8gYSAibm9uLWNvbnN0cmFpbmVkIiBTRkMgb3INCj4+IHRvDQo+PiA+ID4+PnRo
ZQ0KPj4gPiA+Pj4gPj4gaW5mb3JtYXRpb24gdGhhdCB5b3Ugd2lsbCBwcm92aXNpb24gdG8gYW4g
U0ZGIHdoZW4gdGhlIHBhdGgNCj4+ID4gPj4+Y29tcHV0YXRpb24NCj4+ID4gPj4+ID4+IGFuZCBz
ZWxlY3Rpb24gZGVjaXNpb24gaXMgImRlZmVycmVkIHRvIHRoZSBTRkYiPw0KPj4gPiA+Pj4gPj4+
DQo+PiA+ID4+PiA+Pj4gSXQgZG9lcyBub3QgbWFrZSBzZW5zZSB0byBjYWxsIGEgbm9uLWNvbnN0
cmFpbmVkIHZlcnNpb24gb2YNCj4+dGhlDQo+PiA+IFNGQw0KPj4gPiA+Pj5hcw0KPj4gPiA+Pj4g
Pj4gU0ZQIGdpdmVuIHRoYXQgUkZDNzY2NSBleHBsaWNpdGx5IGRlZmluZXMgU0ZQIGFzICJjb25z
dHJhaW5lZA0KPj4gPiA+Pj52ZXJzaW9uDQo+PiA+ID4+PiBvZg0KPj4gPiA+Pj4gPj4gdGhlIG9y
aWdpbmFsIFNGQyIhDQo+PiA+ID4+PiA+Pj4NCj4+ID4gPj4+ID4+PiBUaGUgU0ZDIGlzIHRoZSBn
ZW5lcmFsIGRlc2NyaXB0aW9uIG9mIHRoZSBvYmplY3RpdmUuICBUaGF0DQo+PiA+ID4+PiA+Pj4+
IGlzIG5vdCB0aGUgc2FtZSBhcyB0aGUgZXhhY3Qgc2VxdWVuY2Ugb2YgcGxhY2VzIHRoYXQgbXVz
dCBiZQ0KPj4gPiA+Pj52aXNpdGVkLg0KPj4gPiA+Pj4gPj4+Pg0KPj4gPiA+Pj4gPj4+PiBJIHN0
YW5kIGJ5IG15IGVhcmxpZXIgY29tbWVudHMgdGhhdCBhbG1vc3QgYWxsIHVzZXMgb2YgU0ZDIGlu
DQo+PiB0aGUNCj4+ID4gPj4+ID4+Pj4gY29udHJvbCByZXF1aXJlbWVudHMgZHJhZnQgc2hvdWxk
IGJlIFNGUC4NCj4+ID4gPj4+ID4+Pj4NCj4+ID4gPj4+ID4+Pg0KPj4gPiA+Pj4gPj4+IFtNZWRd
IEkgbm90ZWQgdGhhdCBKb2VsLi4gdGhhdCdzIGZhaXIgYnV0IHRoaXMgcG9zaXRpb24gaXMNCj4+
SU1ITw0KPj4gPiBub3QNCj4+ID4gPj4+ID4+IGFsaWduZWQgd2l0aCBSRkM3NjY1IHRoYXQgYWxs
b3dzIHRvIGNvbnRyb2wgYW55IHZhcmlhdGlvbiBmcm9tDQo+PmENCj4+ID4gPj4+bm9uLQ0KPj4g
PiA+Pj4gPj4gY29uc3RyYWluZWQgU0ZDIHRvIGEgZnVsbHkgY29uc3RyYWluZWQgU0ZDLg0KPj4g
PiA+Pj4gPj4+DQo+PiA+ID4+PiA+Pj4+IFlvdXJzLA0KPj4gPiA+Pj4gPj4+PiBKb2VsDQo+PiA+
ID4+PiA+Pj4+DQo+PiA+ID4+PiA+Pj4+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+PiA+
ID4+PiA+Pj4+IEZyb206IG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20NCj4+ID4gPj4+ID4+
Pj4gW21haWx0bzptb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tXQ0KPj4gPiA+Pj4gPj4+PiBT
ZW50OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA4OjM0IEFNDQo+PiA+ID4+PiA+Pj4+IFRv
OiBQYXVsIFF1aW5uIChwYXVscSkNCj4+ID4gPj4+ID4+Pj4gQ2M6IHNmYyBpc3N1ZSB0cmFja2Vy
Ow0KPj4gPiA+Pj5kcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOw0K
Pj4gPiA+Pj4gPj4+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPj4gPiA+Pj4gPj4+
PiBTdWJqZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29u
dHJvbA0KPj4gcGxhbmUNCj4+ID4gPj4+ID4+Pj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElE
cywgZXRjLg0KPj4gPiA+Pj4gPj4+Pg0KPj4gPiA+Pj4gPj4+PiBIaSBQYXVsLA0KPj4gPiA+Pj4g
Pj4+Pg0KPj4gPiA+Pj4gPj4+PiBUaGFuayB5b3UgZm9yIHNoYXJpbmcgeW91ciBmZWVkYmFjay4N
Cj4+ID4gPj4+ID4+Pj4NCj4+ID4gPj4+ID4+Pj4gUkZDNzY2NSBzYXlzIHRoZSBmb2xsb3dpbmc6
DQo+PiA+ID4+PiA+Pj4+DQo+PiA+ID4+PiA+Pj4+ICINCj4+ID4gPj4+ID4+Pj4gVGhpcyBhcmNo
aXRlY3R1cmUgZG9lcyBub3QgbWFuZGF0ZSB0aGUgZGVncmVlIG9mDQo+PiA+ID4+PiA+Pj4+ICBz
cGVjaWZpY2l0eSBvZiB0aGUgU0ZQLiAgQXJjaGl0ZWN0dXJhbGx5LCB3aXRoaW4gdGhlIHNhbWUN
Cj4+U0ZDLQ0KPj4gPiA+Pj4gZW5hYmxlZA0KPj4gPiA+Pj4gPj4+PiAgZG9tYWluLCBzb21lIFNG
UHMgbWF5IGJlIGZ1bGx5IHNwZWNpZmllZCwgc2VsZWN0aW5nIGV4YWN0bHkNCj4+ID4gd2hpY2gN
Cj4+ID4gPj4+IFNGRg0KPj4gPiA+Pj4gPj4+PiAgYW5kIHdoaWNoIFNGIGFyZSB0byBiZSB2aXNp
dGVkIGJ5IHBhY2tldHMgdXNpbmcgdGhhdCBTRlAsDQo+PiB3aGlsZQ0KPj4gPiA+Pj4gb3RoZXIN
Cj4+ID4gPj4+ID4+Pj4gIFNGUHMgbWF5IGJlIHF1aXRlIHZhZ3VlLCBkZWZlcnJpbmcgdG8gdGhl
IFNGRiB0aGUgZGVjaXNpb25zDQo+PiA+IGFib3V0DQo+PiA+ID4+PiB0aGUNCj4+ID4gPj4+ID4+
Pj4gIGV4YWN0IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZD
LiAgVGhlDQo+PiA+ID4+PiA+Pj4+ICBzcGVjaWZpY2l0eSBtYXkgYmUgYW55d2hlcmUgaW4gYmV0
d2VlbiB0aGVzZSBleHRyZW1lcy4NCj4+ID4gPj4+ID4+Pj4gIg0KPj4gPiA+Pj4gPj4+Pg0KPj4g
PiA+Pj4gPj4+PiBUaGUgY29udHJvbCBkcmFmdCBpcyBjb21wbGV0ZWx5IGFsaWduZWQgd2l0aCB0
aGF0IGFwcHJvYWNoLg0KPj4gPiA+Pj4gPj4+Pg0KPj4gPiA+Pj4gPj4+PiBUaGUgY29udHJvbC1w
bGFuZSBkb2N1bWVudCBhbGxvd3MgaW4gcGFydGljdWxhciB0byBwcm92aXNpb24NCj4+ID4gPj4+
cmVxdWlyZWQNCj4+ID4gPj4+ID4+Pj4gaW5mb3JtYXRpb24gd2hlbiAiZGVmZXJyaW5nIHRvIHRo
ZSBTRkYgdGhlIGRlY2lzaW9ucyBhYm91dA0KPj50aGUNCj4+ID4gPj4+ID4+Pj4gIGV4YWN0IHNl
cXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDIi4gSXQNCj4+ID4g
Pj4+aGFwcGVucw0KPj4gPiA+Pj4gPj4+PiB0aGF0IGluZm9ybWF0aW9uIGlzIG5vIG1vcmUgdGhh
biB0aGUgc2VydmljZSBjaGFpbiBpdHNlbGYNCj4+ID4gKHdpdGhvdXQNCj4+ID4gPj4+IGFueQ0K
Pj4gPiA+Pj4gPj4+PiBjb25zdHJhaW50cykuDQo+PiA+ID4+PiA+Pj4+DQo+PiA+ID4+PiA+Pj4+
IEFsc28sIHRoZSBjdXJyZW50IGNvbnRyb2wtcGxhbmUgZG9jdW1lbnQgYWxsb3dzIHRvIGluc3Ry
dWN0IGENCj4+ID4gPj4+bG9vc2UNCj4+ID4gPj4+ID4+Pj4gcGF0aA0KPj4gPiA+Pj4gPj4+PiAo
U0ZQKSBvciBhIHN0cmljdCBwYXRoIChSU1ApLCBldGMuDQo+PiA+ID4+PiA+Pj4+DQo+PiA+ID4+
PiA+Pj4+IEkgZnVsbHkgYWdyZWUgdGhhdCB3aGV0aGVyIGEgZnVsbCBwYXRoIGlzIHNwZWNpZmll
ZCB3aXRoaW4gYQ0KPj4gPiA+Pj5kb21haW4NCj4+ID4gPj4+IG9yDQo+PiA+ID4+PiA+Pj4+IGlm
IGl0IGlzIGRlZmVycmVkIHRvIFNGRnMgaXMgcmVhbGx5IGRlcGxveW1lbnQtc3BlY2lmaWMuDQo+
PiA+ID4+PiBOZXZlcnRoZWxlc3MsDQo+PiA+ID4+PiA+Pj4+IHRoZSBjb250cm9sIHBsYW4gc2hv
dWxkIGFjY29tbW9kYXRlIGFsbCB0aGVzZSBmbGF2b3JzLg0KPj4gPiA+Pj4gPj4+Pg0KPj4gPiA+
Pj4gPj4+PiBDaGVlcnMsDQo+PiA+ID4+PiA+Pj4+IE1lZA0KPj4gPiA+Pj4gPj4+Pg0KPj4gPiA+
Pj4gPj4+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tDQo+PiA+ID4+PiA+Pj4+PiBEZSA6
IFBhdWwgUXVpbm4gKHBhdWxxKSBbbWFpbHRvOnBhdWxxQGNpc2NvLmNvbV0gRW52b3nDqSA6DQo+
PiA+ID4+PnZlbmRyZWRpDQo+PiA+ID4+PiA+Pj4+PiAxNiBvY3RvYnJlIDIwMTUgMTQ6MDQgw4Ag
OiBKb2VsIE0uIEhhbHBlcm4gQ2MgOiBCT1VDQURBSVINCj4+IE1vaGFtZWQNCj4+ID4gPj4+ID4+
Pj4+IElNVC9PTE47IHNmYyBpc3N1ZSB0cmFja2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLQ0K
Pj4gPiA+Pj4gPj4+Pj4gcGxhbmVAdG9vbHMuaWV0Zi5vcmc7IHNmY0BpZXRmLm9yZyBPYmpldCA6
IFJlOiBbc2ZjXSAjMTUNCj4+ID4gPj4+ID4+Pj4+IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0
aGUgY29udHJvbCBwbGFuZSBvcGVyYXRlcyBvbiBTRkMNCj4+IElEcywNCj4+ID4gPj4+U0ZQDQo+
PiA+ID4+PiA+PiBJRHMsIGV0Yy4NCj4+ID4gPj4+ID4+Pj4+DQo+PiA+ID4+PiA+Pj4+PiBKb2Vs
LA0KPj4gPiA+Pj4gPj4+Pj4NCj4+ID4gPj4+ID4+Pj4+IEkgY29uY3VyLg0KPj4gPiA+Pj4gPj4+
Pj4NCj4+ID4gPj4+ID4+Pj4+IFRoZSBkYXRhIHBsYW5lIGRlYWwgd2l0aCBwYXRocywgbm90IGNo
YWlucy4gIFRoZQ0KPj5yZWxhdGlvbnNoaXANCj4+IG9mDQo+PiA+ID4+PiA+Pj4+PiBwYXRocyB0
byBjaGFpbnMgZmFsbHMgc3F1YXJlbHkgaW4gdGhlIGNvbnRyb2wgcGxhbmUgKG9yIGV2ZW4NCj4+
ID4gbW9yZQ0KPj4gPiA+Pj4gPj4+Pj4gbGlrZWx5DQo+PiA+ID4+PiA+Pj4+ICJwb2xpY3kiDQo+
PiA+ID4+PiA+Pj4+PiBwbGFuZSkgcmVhbG0uICBUaGUgc3BlY2lmaWNpdHkgb2YgdGhlIHBhdGgg
aXMgbGVmdCB0bw0KPj4gPiA+Pj4gPj4+Pj4gaW1wbGVtZW50YXRpb24sIGluIHRoZSBhcmNoaXRl
Y3R1cmUgZHJhZnQsIGJ1dCB0aGF0J3MNCj4+IGNvbnNpc3RlbnQNCj4+ID4gPj4+ID4+Pj4+IHdp
dGggeW91ciBwb3NpdGlvbiBhbmQgcHJvdmlkZXMgdGhlIHJlcXVpc2l0ZSBmdW5jdGlvbmFsaXR5
Lg0KPj4gPiA+Pj4gPj4+Pj4NCj4+ID4gPj4+ID4+Pj4+IFBhdWwNCj4+ID4gPj4+ID4+Pj4+DQo+
PiA+ID4+PiA+Pj4+Pj4gT24gU2VwIDE3LCAyMDE1LCBhdCAxMTozNiBBTSwgSm9lbCBNLiBIYWxw
ZXJuDQo+PiA+ID4+PiA+Pj4+Pj4gPGptaEBqb2VsaGFscGVybi5jb20+DQo+PiA+ID4+PiA+Pj4+
PiB3cm90ZToNCj4+ID4gPj4+ID4+Pj4+Pg0KPj4gPiA+Pj4gPj4+Pj4+IEFzIGZhciBhcyBJIGNh
biB0ZWxsLCB0aGVyZSBpcyBub3RoaW5nIGluIHRoZSBTZXJ2aWNlDQo+PiBDaGFpbmluZw0KPj4g
PiA+Pj4gPj4+Pj4+IHdvcmsgdGhhdA0KPj4gPiA+Pj4gPj4+Pj4gcmVxdWlyZXMgY29ycmVsYXRp
bmcgc2VydmljZSBwYXRoIElEcyB3aXRoIHNlcnZpY2UgY2hhaW4gSURzDQo+PiA+ID4+PndpdGhp
bg0KPj4gPiA+Pj4gPj4+Pj4gdGhlIGRhdGEgcGxhbmUuICBBbnkgc3VjaCByZWxhdGlvbnNoaXAg
ZXhpc3RzIGVudGlyZWx5DQo+PndpdGhpbg0KPj4gPiB0aGUNCj4+ID4gPj4+ID4+Pj4+IGNvbnRy
b2wgcGxhbmUgb3IgYWJvdmUsIGFuZCB3b3VsZCBiZSBkcml2ZW4gYnkgcmVxdWlyZW1lbnRzDQo+
PiA+IG90aGVyDQo+PiA+ID4+PiA+Pj4+PiB0aGFuIHRoZSBkYXRhIHBsYW5lLiAgV2hlbiBJIGxv
b2sgYXQgdGhpcyBkb2N1bWVudCwgYWxsIG9mDQo+PnRoZQ0KPj4gPiA+Pj4gPj4+Pj4gcmVxdWly
ZW1lbnRzIHRoYXQgdGFsayBhYm91dCBzZXJ2aWNlIGZ1bmN0aW9uIGNoYWluIElEcyBjYW4NCj4+
YmUNCj4+ID4gPj4+ID4+Pj4+IGFjY3VyYXRlbHkgY2FwdHVyZWQsIGluIHRlcm1zIG9mIGRhdGEg
cGxhbmUgcmVxdWlyZW1lbnRzLCBieQ0KPj4gPiA+Pj5zZXJ2aWNlDQo+PiA+ID4+PiA+PiBmdW5j
dGlvbiBwYXRoIElEcy4NCj4+ID4gPj4+ID4+Pj4+IFRodXMsIHRoZSByZXF1aXJlbWVudCB0aGF0
IHRoZSBkYXRhIHBsYW5lIGhhcyBpcyB0byBzZWUgc3VjaA0KPj4gPiBwYXRoDQo+PiA+ID4+PiBJ
RHMuDQo+PiA+ID4+PiA+Pj4+PiBZZXMsIGluIHNvbWUgZGVwbG95bWVudHMgdGhvc2Ugd2lsbCBi
ZSAxLTEgd2l0aCBjaGFpbiBJRHMuDQo+PiBUaGV5DQo+PiA+ID4+PmFyZQ0KPj4gPiA+Pj4gPj4+
PiBzdGlsbCBwYXRoIElEcy4NCj4+ID4gPj4+ID4+Pj4+Pg0KPj4gPiA+Pj4gPj4+Pj4+IEludHJv
ZHVjaW5nIGEgcmVxdWlyZW1lbnQgZm9yIHRoZSBkYXRhIHBsYW5lIHRvIHNlZSBhbmQNCj4+d29y
aw0KPj4gPiA+Pj53aXRoDQo+PiA+ID4+PiA+Pj4+Pj4gY2hhaW4NCj4+ID4gPj4+ID4+Pj4+IElE
cyBpcyBub3QgZ3JvdW5kZWQgaW4gdGhlIHdvcmsgb2YgdGhlIGdyb3VwLg0KPj4gPiA+Pj4gPj4+
Pj4+DQo+PiA+ID4+PiA+Pj4+Pj4gWW91cnMsDQo+PiA+ID4+PiA+Pj4+Pj4gSm9lbCBNLiBIYWxw
ZXJuDQo+PiA+ID4+PiA+Pj4+Pj4NCj4+ID4gPj4+ID4+Pj4+PiBPbiA5LzE3LzE1IDc6NTMgQU0s
IG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6DQo+PiA+ID4+PiA+Pj4+Pj4+IFJl
LSwNCj4+ID4gPj4+ID4+Pj4+Pj4NCj4+ID4gPj4+ID4+Pj4+Pj4gVGhlIGNvbnRyb2wgZHJhZnQg
YXMgaXQgc3RhbmRzIGlzIGNvbXBsaWFudCB3aXRoIHRoZSBkYXRhDQo+PiA+IHBsYW5lDQo+PiA+
ID4+PiA+Pj4+PiBhcmNoaXRlY3R1cmUgZG9jdW1lbnQuDQo+PiA+ID4+PiA+Pj4+Pj4+DQo+PiA+
ID4+PiA+Pj4+Pj4+IEluZGVlZCwgdGhlIGFyY2ggZHJhZnQgYWNrbm93bGVkZ2VzIHRoZSBmb2xs
b3dpbmc6DQo+PiA+ID4+PiA+Pj4+Pj4+ICgxKSBTRlBzIGFyZSAiYXNzb2NpYXRlZCB3aXRoIGEg
Z2l2ZW4gU0ZDIi4NCj4+ID4gPj4+ID4+Pj4+Pj4gKDIpIFNGUHMgYXJlIHByZXNlbnRlZCBhcyBh
IGZvcm0gb2YgY29uc3RyYWluZWQgU0ZDcy4NCj4+ID4gPj4+ID4+Pj4+Pj4gKDMpIFNvbWUgZGVw
bG95bWVudHMgbWF5IG5vdCBpbXBvc2UgYW55IGNvbnN0cmFpbnQgb24gdGhlDQo+PiA+ID4+PiA+
Pj4+Pj4+IGFic3RyYWN0DQo+PiA+ID4+PiA+Pj4+IFNGQw0KPj4gPiA+Pj4gPj4+DQo+PiA+ID4+
PiA+Pj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+
ID4gPj4+ID4+PiBzZmMgbWFpbGluZyBsaXN0DQo+PiA+ID4+PiA+Pj4gc2ZjQGlldGYub3JnDQo+
PiA+ID4+PiA+Pj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4+
ID4gPj4+ID4NCj4+ID4gPj4NCj4+ID4gPg0KPj4gPiA+X19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX18NCj4+ID4gPnNmYyBtYWlsaW5nIGxpc3QNCj4+ID4gPnNm
Y0BpZXRmLm9yZw0KPj4gPiA+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9z
ZmMNCj4+ID4NCj4+ID4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX18NCj4+ID4gc2ZjIG1haWxpbmcgbGlzdA0KPj4gPiBzZmNAaWV0Zi5vcmcNCj4+ID4gaHR0
cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4+ID4gX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+ID4gc2ZjIG1haWxpbmcgbGlz
dA0KPj4gPiBzZmNAaWV0Zi5vcmcNCj4+ID4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9s
aXN0aW5mby9zZmMNCj5fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fXw0KPnNmYyBtYWlsaW5nIGxpc3QNCj5zZmNAaWV0Zi5vcmcNCj5odHRwczovL3d3dy5pZXRm
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KDQo=


From nobody Thu Nov 19 06:42:43 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A47961B2AAA for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 06:42:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id byvPGMtcXQI6 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 06:42:38 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCB961B2AA8 for <sfc@ietf.org>; Thu, 19 Nov 2015 06:42:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=24960; q=dns/txt; s=iport; t=1447944157; x=1449153757; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=VVlB1PKGPwXeB6GsYCrR+jA8ha9MEw1HWuodvVNVuGA=; b=fQWmc4uUuxAz0d1rmwC1bjVA42okoV+edlApoZ9ECxQh5LcA+HGq60nG H0ceW9A/k6+mVRt66oncKOY0/VKj8AwfD5bl1uJVRo5VWE7yGRwqwlIMD Pog+On9Ocm70LdPqeKtwM40V8PV3hwnQnDL/6buI34wlQkmkhuTpd9F7L o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0APAgBH301W/4MNJK1egztTbwa+awENg?= =?us-ascii?q?WUXCoVuAhyBLDgUAQEBAQEBAX8LhDQBAQEEAQEBIBE6BAcMBAIBBgIRAQIBAQE?= =?us-ascii?q?BAgIjAwICAiULFAECBggCBA4FG4gTDZFrnTWQNAEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBARQEgQGFU4R+hFkYgwSBRAEEjR2JLwGIFIUZgVuEQJI6g3EBHwEBQoIRHRa?= =?us-ascii?q?BQHKEGYEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,318,1444694400"; d="scan'208";a="209899244"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 19 Nov 2015 14:42:36 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tAJEgajo010282 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Nov 2015 14:42:36 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 19 Nov 2015 08:42:35 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 19 Nov 2015 08:42:35 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwA
Date: Thu, 19 Nov 2015 14:42:35 +0000
Message-ID: <D27348EC.30C98%jguichar@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.38.147]
Content-Type: text/plain; charset="utf-8"
Content-ID: <62197E18278C634E824192281E1718EA@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/VvPqJLfnChylNC-HMyJynNwblE4>
Cc: Joel Halpern <joel.halpern@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 14:42:41 -0000

SGkgTWVkLA0KDQpPbiAxMS8xOS8xNSwgMjo0NSBBTSwgIm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5n
ZS5jb20iDQo8bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbT4gd3JvdGU6DQoNCj5IaSBKaW0s
DQo+DQo+TGV0J3MgbWUgcmVwaHJhc2UgdGhlIGlzc3VlLg0KPg0KPldoYXQgd2UgYXJlIGRpc2N1
c3NpbmcgaXMgcmVsYXRlZCB0byB0aGlzIHBhcnQgb2YgdGhlIGRyYWZ0IChhbmQgc29tZQ0KPm90
aGVyIG9jY3VycmVuY2VzKToNCj4NCj49PT09PT0NCj4gICBvICBTRkMgRm9yd2FyZGluZyBQb2xp
Y3kgVGFibGU6IHRoaXMgdGFibGUgcmVmbGVjdHMgdGhlIFNGQy1zcGVjaWZpYw0KPiAgICAgIHRy
YWZmaWMgZm9yd2FyZGluZyBwb2xpY3kgZW5mb3JjZWQgYnkgU0ZGIGNvbXBvbmVudHMgZm9yIGV2
ZXJ5DQo+ICAgICAgcmVsZXZhbnQgaW5jb21pbmcgcGFja2V0IHRoYXQgaXMgYXNzb2NpYXRlZCB0
byBvbmUgb2YgdGhlIGV4aXN0aW5nDQo+ICAgICAgU0ZDcy4NCj4NCj4gICAgICAgICBbW05vdGU6
IFRoZSBxdWVzdGlvbiBvZiB3aGV0aGVyIHRoZSBkYXRhIHBsYW5lIG9wZXJhdGVzIGp1c3QgaW4N
Cj4gICAgICAgICB0ZXJtcyBvZiBTRlAgSURzIG9yIG5lZWRzIFNGQyBJRHMsIGFzIGRlc2NyaWJl
ZCBpbiB0aGlzIHZlcnNpb24NCj4gICAgICAgICBvZiB0aGUgZHJhZnQsIGlzIHN0aWxsIHVuZGVy
IGRpc2N1c3Npb24gYW1vbmcgdGhlIGF1dGhvcnMuXV0NCj49PT09PT09DQo+DQo+VGhlIGN1cnJl
bnQgZHJhZnQgaXMgZ2VuZXJpYyBhcyBpdCBhbGxvd3MgdG8gaW5zdHJ1Y3QgdmlhIHRoZSBjcA0K
PmludGVyZmFjZXMgdGhlIHVuZGVybHlpbmcgZHAgZWxlbWVudHMgd2l0aCBTRkMsIFNGUCwgUlNQ
LCBhbmQgb3RoZXINCj5wb2xpY2llcy4gV2hlbiBwcmVwYXJpbmcgdGhlIGRyYWZ0LCBJIGhhZCBh
IGRpc2N1c3Npb24gd2l0aCBKb2VsIGFib3V0DQo+dGhpcyBkZXNpZ24uIFdlIGJvdGggYWdyZWVk
IHRoYXQgdGhpcyBpcyB3b3J0aCB0byBiZSBkaXNjdXNzZWQuIAkNCj4NCj5JIGV4cGxhaW5lZCwg
YW5kIG90aGVyIGhhdmUgZG9uZSB0aGF0IHRvbywgdGhhdCBib3RoIG1vZGVscyBzaG91bGQgYmUN
Cj5hZGRyZXNzZWQuIA0KPg0KPlRoZSBkaXNjdXNzaW9uIHJldmVhbGVkIHRoZSBkZWZpbml0aW9u
IGluIHRoZSBkcCBSRkMgYXJlIHRvbyB2YWd1ZS4gV2UNCj5uZWVkIHRvIHJlc29sdmUgdGhhdCBh
cyBXRy4NCg0KSmltPiB3aGljaCBkb2N1bWVudCBhbmQgd2hhdCBleGFjdGx5IGlzIHRvbyB2YWd1
ZT8gRm9yIGV4YW1wbGUgaWYgd2UgcmVmZXINCnRvIHNlY3Rpb24gMi4zLjEgb2YgUkZDNzY2NSBp
dCBzdGF0ZXM6DQoNCiJBcyBhbiBleGFtcGxlIG9mIHRoaXMgcHJvZ3Jlc3NpdmUgcmVmaW5lbWVu
dCwgY29uc2lkZXIgYSBTZXJ2aWNlDQogICBGdW5jdGlvbiBDaGFpbiAoU0ZDKSB0aGF0IHN0YXRl
cyB0aGF0IHBhY2tldHMgdXNpbmcgdGhpcyBjaGFpbiBzaG91bGQNCiAgIGJlIGRlbGl2ZXJlZCB0
byBhIGZpcmV3YWxsIGFuZCBhIGNhY2hpbmcgZW5naW5lLg0KDQogICBBIFNlcnZpY2UgRnVuY3Rp
b24gUGF0aCAoU0ZQKSBjb3VsZCByZWZpbmUgdGhpcywgY29uc2lkZXJpbmcgdGhhdA0KICAgdGhp
cyBhcmNoaXRlY3R1cmUgZG9lcyBub3QgbWFuZGF0ZSB0aGUgZGVncmVlIG9mIHNwZWNpZmljaXR5
IGFuIFNGUA0KICAgaGFzIHRvIGhhdmUuICBJdCBtaWdodCBzcGVjaWZ5IHRoYXQgdGhlIGZpcmV3
YWxsIGFuZCBjYWNoaW5nIGVuZ2luZQ0KICAgYXJlIGJvdGggdG8gYmUgaW4gYSBzcGVjaWZpYyBk
YXRhIGNlbnRlciAoZS5nLiwgaW4gREMxKSwgb3IgaXQgbWlnaHQNCiAgIHNwZWNpZnkgZXhhY3Rs
eSB3aGljaCBpbnN0YW5jZSBvZiBlYWNoIGZpcmV3YWxsIGFuZCBjYWNoaW5nIGVuZ2luZSBpcw0K
ICAgdG8gYmUgdXNlZC4NCg0KDQpUaGUgUmVuZGVyZWQgU2VydmljZSBQYXRoIChSU1ApIGlzIHRo
ZSBhY3R1YWwgc2VxdWVuY2Ugb2YgU0ZGcyBhbmQNCiAgIFNGcyB0aGF0IHRoZSBwYWNrZXRzIHdp
bGwgYWN0dWFsbHkgdmlzaXQuICBTbyBpZiB0aGUgU0ZQIHBpY2tlZCB0aGUNCiAgIERDLCB0aGUg
UlNQIHdvdWxkIGJlIG1vcmUgc3BlY2lmaWMu4oCdDQoNCg0KV2hhdCBleGFjdGx5IGlzIHZhZ3Vl
IGFib3V0IHRoaXM/IFNlZW1zIHByZXR0eSBjbGVhciwgYXQgbGVhc3QgdG8gbWUsIGhvdw0KcHJv
Z3Jlc3NpdmUgcmVmaW5lbWVudCBmcm9tIFNGQyB0byBldmVudHVhbCBSU1AgaXMgYWNoaWV2ZWQu
DQoNCkppbQ0KDQo+DQo+Q2hlZXJzLA0KPk1lZA0KPg0KPj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2lu
ZS0tLS0tDQo+PiBEZSA6IEppbSBHdWljaGFyZCAoamd1aWNoYXIpIFttYWlsdG86amd1aWNoYXJA
Y2lzY28uY29tXQ0KPj4gRW52b3nDqSA6IG1lcmNyZWRpIDE4IG5vdmVtYnJlIDIwMTUgMTc6MTgN
Cj4+IMOAIDogQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpOyBCT1VDQURBSVIgTW9oYW1lZCBJ
TVQvT0xODQo+PiBDYyA6IHNmYyBpc3N1ZSB0cmFja2VyOyBzZmNAaWV0Zi5vcmc7IFBhdWwgUXVp
bm4gKHBhdWxxKTsNCj4+ZHJhZnQtaWV0Zi1zZmMtDQo+PiBjb250cm9sLXBsYW5lQHRvb2xzLmll
dGYub3JnOyBKb2VsIEhhbHBlcm47IEpvZWwgTS4gSGFscGVybg0KPj4gT2JqZXQgOiBSZTogW3Nm
Y10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZQ0KPj5vcGVy
YXRlcw0KPj4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gDQo+PiBbQ2hhaXIgaGF0IG9m
ZiDigKZdDQo+PiANCj4+IEkgaGF2ZSB0byBzYXkgSSBhbSBzdHJ1Z2dsaW5nIHRvIHNlZSB0aGUg
4oCcaXNzdWXigJ0gaW4gdGhpcyB0aHJlYWQgdGhhdA0KPj5uZWVkcw0KPj4gdG8gYmUgYWRkcmVz
c2VkIG90aGVyIHRoYW4gY29uZnVzaW9uIG92ZXIgU0ZDIHZzIFNGUCBkZWZpbml0aW9uOyBmcm9t
IGENCj4+IGRhdGEgcGxhbmUgcGVyc3BlY3RpdmUgaXQgaXMgKnZlcnkqIGNsZWFyIHRoYXQgU0ZQ
L1NJIGlkZW50aWZpZXJzIGFyZQ0KPj51c2VkDQo+PiBhcyB0aGUgbG9va3VwIGtleSBpbnRvIGEg
Zm9yd2FyZGluZyBjb25zdHJ1Y3QgdGhhdCBtYXkgY29udGFpbiAxOm4NCj4+bnVtYmVyDQo+PiBv
ZiBuZXh0LWhvcHMgKFNGRnMsIFNGcykuIEluIHNvbWUgY2FzZXMgdGhhdCBsb29rdXAgd2lsbCBw
b2ludCB0byBhDQo+PnNpbmdsZQ0KPj4gbmV4dC1ob3AsIGluIG90aGVycyBtdWx0aXBsZSBuZXh0
LWhvcHMuIEluICphbGwqIGNhc2VzIHRoaXMgaGFzDQo+PmFic29sdXRlbHkNCj4+IG5vdGhpbmcg
dG8gZG8gd2l0aCB0aGUgU0ZDIGFzIGVhY2ggcmVwcmVzZW50YXRpb24gb2YgdGhhdCBTRkMgaXMN
Cj4+dW5pcXVlbHkNCj4+IGlkZW50aWZpZWQgYnkgYW4gU0ZQLWlkLg0KPj4gDQo+PiBKaW0NCj4+
IA0KPj4gT24gMTEvMTgvMTUsIDEwOjE5IEFNLCAic2ZjIG9uIGJlaGFsZiBvZiBDYXJsb3MgUGln
bmF0YXJvIChjcGlnbmF0YSkiDQo+PiA8c2ZjLWJvdW5jZXNAaWV0Zi5vcmcgb24gYmVoYWxmIG9m
IGNwaWduYXRhQGNpc2NvLmNvbT4gd3JvdGU6DQo+PiANCj4+ID5IaSwgTWVkLA0KPj4gPg0KPj4g
PkkgYWxzbyByZWZlcnJlZCB0byBvdGhlciBwYXJ0cyBvZiB0aGUgZG9jdW1lbnQsIHdoZW4gSSB3
cm90ZToNCj4+ID4NCj4+ID4+IFRoZSBjb250cm9sLXBsYW5lIGRyYWZ0IHRhbGtzIGFib3V0IMKz
U0ZDIGZvcndhcmRpbmfCsiBhbmQgwrNTRkMgZGF0YQ0KPj4gPj5wbGFuZcKyDQo+PiA+DQo+PiA+
DQo+PiA+Rm9yIGV4YW1wbGUsIEkgYW0gbm90IHN1cmUgSSB1bmRlcnN0YW5kIHdoYXQgdGhpcyBt
ZWFuczoNCj4+ID4NCj4+ID4iICAgbyAgUG9wdWxhdGUgU0ZDIGZvcndhcmRpbmcgcG9saWN5IHRh
YmxlcyBvZiBpbnZvbHZlZCBTRkMgZGF0YQ0KPj5wbGFuZcKyDQo+PiA+DQo+PiA+DQo+PiA+T3Ig
YXQ6DQo+PiA+IiAgIG8gIFNGQyBGb3J3YXJkaW5nIFBvbGljeSBUYWJsZTogdGhpcyB0YWJsZSBy
ZWZsZWN0cyB0aGUNCj4+U0ZDLXNwZWNpZmljDQo+PiA+ICAgICB0cmFmZmljIGZvcndhcmRpbmcg
cG9saWN5IGVuZm9yY2VkIGJ5IFNGRiBjb21wb25lbnRzIGZvciBldmVyeQ0KPj4gPiAgICAgcmVs
ZXZhbnQgaW5jb21pbmcgcGFja2V0IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBvbmUgb2YgdGhlIGV4
aXN0aW5nDQo+PiA+ICAgICBTRkNzLiINCj4+ID4NCj4+ID4NCj4+ID5NeSBjb21tZW50IGlzIHRo
YXQgdGhvc2Ugc2hvdWxkIGJlIMKzU0ZQIg0KPj4gPg0KPj4gPlRoYW5rcywNCj4+ID4NCj4+ID7i
gLkgQ2FybG9zLg0KPj4gPg0KPj4gPi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+PiA+RnJv
bTogTWVkIEJvdWNhZGFpciA8bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbT4NCj4+ID5EYXRl
OiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4LCAyMDE1IGF0IDEwOjAzIEFNDQo+PiA+VG86IENhcmxv
cyBQaWduYXRhcm8gPGNwaWduYXRhQGNpc2NvLmNvbT4NCj4+ID5DYzogIlBhdWwgUXVpbm4gKHBh
dWxxKSIgPHBhdWxxQGNpc2NvLmNvbT4sDQo+PiA+ImRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxh
bmVAdG9vbHMuaWV0Zi5vcmciDQo+PiA+PGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9v
bHMuaWV0Zi5vcmc+LCBKb2VsIEhhbHBlcm4NCj4+ID48am1oQGpvZWxoYWxwZXJuLmNvbT4sIHNm
YyBpc3N1ZSB0cmFja2VyIDx0cmFjK3NmY0B0b29scy5pZXRmLm9yZz4sDQo+PiA+InNmY0BpZXRm
Lm9yZyIgPHNmY0BpZXRmLm9yZz4sIEpvZWwgSGFscGVybiA8am9lbC5oYWxwZXJuQGVyaWNzc29u
LmNvbT4NCj4+ID5TdWJqZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhl
ciB0aGUgY29udHJvbCBwbGFuZQ0KPj4gb3BlcmF0ZXMNCj4+ID5vbiBTRkMgSURzLCBTRlAgSURz
LCBldGMuDQo+PiA+DQo+PiA+PkNhcmxvcywNCj4+ID4+DQo+PiA+PlRoZXJlIGlzIG5vdCBTRkMg
SUQgaW4gdGhlIGNvcmUgdGV4dCBvZiB0aGUgY29udHJvbCBwbGFuZSBkcmFmdC4NCj4+ID4+DQo+
PiA+PlRoZSB0ZXh0IHlvdSBxdW90ZWQgaXMgcGFydCBvZiBhbiBhcHBlbmRpeCB3aXRoIGEgbm90
ZSB0aGF0IGNsZWFybHkNCj4+ID4+c3RhdGVzIHRoaXMgaXMgbm90IGRpc2N1c3NlZC4gQSBjb3Jy
ZXNwb25kaW5nIGlzc3VlIHJlY29yZCBoYXMgYmVlbg0KPj4gPj5yZWNvcmRlZCB0byBzZWVrIGZv
ciBtb3JlIGZlZWRiYWNrIG9uIHRoYXQgYXBwZW5kaXguDQo+PiA+Pg0KPj4gPj5DaGVlcnMsDQo+
PiA+Pk1lZA0KPj4gPj4NCj4+ID4+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+ID4+
PiBEZSA6IENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSBbbWFpbHRvOmNwaWduYXRhQGNpc2Nv
LmNvbV0NCj4+ID4+PiBFbnZvecOpIDogbWVyY3JlZGkgMTggbm92ZW1icmUgMjAxNSAxNTozNQ0K
Pj4gPj4+IMOAIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTg0KPj4gPj4+IENjIDogUGF1bCBR
dWlubiAocGF1bHEpOw0KPj5kcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYu
b3JnOw0KPj4gPj4+Sm9lbA0KPj4gPj4+IE0uIEhhbHBlcm47IHNmYyBpc3N1ZSB0cmFja2VyOyBz
ZmNAaWV0Zi5vcmc7IEpvZWwgSGFscGVybg0KPj4gPj4+IE9iamV0IDogUmU6IFtzZmNdICMxNSAo
Y29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4+ID4+Pm9wZXJhdGVz
DQo+PiA+Pj4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gPj4+DQo+PiA+Pj4gTWVkLA0K
Pj4gPj4+DQo+PiA+Pj4gPiBPbiBOb3YgMTgsIDIwMTUsIGF0IDg6MDggQU0sIG1vaGFtZWQuYm91
Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6DQo+PiA+Pj4gPg0KPj4gPj4+ID4gQ2FybG9zLA0KPj4g
Pj4+ID4NCj4+ID4+PiA+IFRoaXMgaXMgYW4gb3BlbiBpc3N1ZSBmb3IgdGhpcyBkcmFmdCwgc28g
aXQgaXMgbm9ybWFsIHRvIGNvbnRpbnVlDQo+PiA+Pj4gZGlzY3Vzc2luZyBpdC4gSSBkb24ndCBr
bm93IGhvdyB5b3UgY2FuIGNvbmNsdWRlIGluIGFkdmFuY2UgdGhhdCB3ZQ0KPj4gYXJlDQo+PiA+
Pj4gY2lyY2xpbmcuDQo+PiA+Pj4gPg0KPj4gPj4+DQo+PiA+Pj4gRGlzY3Vzc2lvbiBpcyBncmVh
dCwgTWVkLiBCdXQgbXkgxZJ3ZSBhcmUgY2lyY2xpbmcnIGNvbW1lbnQgKG5vdCBpbg0KPj4gPj4+
IGFkdmFuY2VkLCBidXQgYWxyZWFkeSBldmlkZW50KSBpcyBiZWNhdXNlIEkgc2F3IHRoZSBzYW1l
IHF1ZXN0aW9ucywNCj4+ID4+PnNhbWUNCj4+ID4+PiBhcmd1bWVudHMsIGFuZCBzYW1lIGFuc3dl
cnMgYXMgYmVmb3JlLg0KPj4gPj4+DQo+PiA+Pj4gPiAic3Ryb25nbHkgYmVsaWV2ZSIgaXMgbm90
IGEgdGVjaG5pY2FsIGFyZ3VtZW50LCBidHcuDQo+PiA+Pj4gPg0KPj4gPj4+DQo+PiA+Pj4gV2Vs
bCwgSSBiZWxpZXZlIHNvIG9uIHRlY2huaWNhbCBncm91bmRzISBNb3N0IG9mIHdoaWNoIGhhdmUg
YWxyZWFkeQ0KPj4gPj4+YmVlbg0KPj4gPj4+IHNhaWQsIHNvIEkgZG8gbm90IHdhbnQgdG8gY29u
dHJpYnV0ZSB0byB0aGUgY2lyY3VsYXIgZGlzY3Vzc2lvbi4NCj4+ID4+Pg0KPj4gPj4+IFRoZSBj
b250cm9sLXBsYW5lIGRyYWZ0IHRhbGtzIGFib3V0IMKzU0ZDIGZvcndhcmRpbmfCsiBhbmQgwrNT
RkMgZGF0YQ0KPj4gPj4+cGxhbmXCsiwNCj4+ID4+PiBhbmQgwrNTRkMgSURzwrIuIFRoZSBhcmNo
aXRlY3R1cmUgc2F5cyB0aGF0IFNGQyBhcmUgbWFkZSBvZiBhYnN0cmFjdA0KPj4gPj4+c2Vydmlj
ZQ0KPj4gPj4+IGZ1bmN0aW9ucy4gVGhlcmXCuXMgbm8gYWN0dWFsIGZvcndhcmRpbmcgaW4gdGhp
cyBhYnN0cmFjdCBjb25jZXB0dWFsDQo+PiA+Pj5tb2RlbC4NCj4+ID4+Pg0KPj4gPj4+IFRoZSBj
b250cm9sLXBsYW5lIGRyYWZ0IHNheXMgwrNTdXBwb3NlIHRoZSBTRkMgSUQgZm9yIHRoaXMgU0ZQ
IGlzDQo+PiA+Pj4gInllbGxvd8KyLMKyLCBhbmQgbXkgcG9pbnQgYWdhaW4gaXMgdGhhdCBpbiB0
aGUgZGF0YSBwbGFuZSBhbiBTRlAgaGFzDQo+PmFuDQo+PiA+Pj4gaWRlbnRpZmllciAod2hpY2gg
aWRlbnRpZmllcyB0aGUgU0ZQIChTRlAtSUQpIGFuZCBpcyBub3QgdGhlDQo+PiBpZGVudGlmaWVy
DQo+PiA+Pj5vZg0KPj4gPj4+IHNvbWV0aGluZyBlbHNlLCBpdMK5cyBub3QgYSBUb3BvbG9neS1J
RCwgaXTCuXMgbm90IGEgU0tVLCBpdMK5cyBub3QgYQ0KPj4gVVJJLA0KPj4gPj4+IGl0wrlzIG5v
dCBhIEZhbWlseSBOYW1lLCBhbmQgbm90IGFuIFNGQyBJRCksIGFuZCB0aGUgY29udHJvbCAoYW5k
DQo+PiA+Pj5wb2xpY3kpDQo+PiA+Pj4gcGxhbmUgY2FuIG9mIGNvdXJzZSB3b3JrIHdpdGggU0ZD
cy4NCj4+ID4+Pg0KPj4gPj4+IE15ICQwLjAyLg0KPj4gPj4+DQo+PiA+Pj4gVGhhbmtzLA0KPj4g
Pj4+DQo+PiA+Pj4g4oC5IENhcmxvcy4NCj4+ID4+Pg0KPj4gPj4+ID4gQ2hlZXJzLA0KPj4gPj4+
ID4gTWVkDQo+PiA+Pj4gPg0KPj4gPj4+ID4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0K
Pj4gPj4+ID4+IERlIDogQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpIFttYWlsdG86Y3BpZ25h
dGFAY2lzY28uY29tXQ0KPj4gPj4+ID4+IEVudm95w6kgOiBtZXJjcmVkaSAxOCBub3ZlbWJyZSAy
MDE1IDExOjUyDQo+PiA+Pj4gPj4gw4AgOiBKb2VsIEhhbHBlcm4NCj4+ID4+PiA+PiBDYyA6IEJP
VUNBREFJUiBNb2hhbWVkIElNVC9PTE47IFBhdWwgUXVpbm4gKHBhdWxxKTsNCj4+ZHJhZnQtaWV0
Zi1zZmMtDQo+PiA+Pj4gPj4gY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgSm9lbCBNLiBI
YWxwZXJuOyBzZmMgaXNzdWUgdHJhY2tlcjsNCj4+ID4+PiA+PiBzZmNAaWV0Zi5vcmcNCj4+ID4+
PiA+PiBPYmpldCA6IFJlOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBj
b250cm9sIHBsYW5lDQo+PiA+Pj4gb3BlcmF0ZXMNCj4+ID4+PiA+PiBvbiBTRkMgSURzLCBTRlAg
SURzLCBldGMuDQo+PiA+Pj4gPj4NCj4+ID4+PiA+PiBJIGFtIGEgYml0IGJhZmZsZWQgdG8gc2Vl
IHRoaXMgdGhyZWFkIGFnYWluIOKAuSBpdCBhcHBlYXJzIHRoZQ0KPj4gPj4+ZGlzY3Vzc2lvbg0K
Pj4gPj4+ID4+IHJlc3RhcnRlZCB0byBjb250aW51ZSBpbiBjaXJjbGVzLg0KPj4gPj4+ID4+DQo+
PiA+Pj4gPj4gTWVkLA0KPj4gPj4+ID4+DQo+PiA+Pj4gPj4gSSB0b28gYWdyZWUgd2l0aCBKb2Vs
IGFuZCBzdHJvbmdseSBiZWxpZXZlIHRoZXJlIGlzIG5vIG5lZWQgZm9yDQo+PlNGQw0KPj4gPj4+
ID4+IGlkZW50aWZpY2F0aW9uIHBhc3NlZCBkb3duIOKAuSB0aGVyZSBpcyBubyBwcm92aXNpb25p
bmcgb2YgU0ZDcw0KPj4gPj4+IHNvdXRoYm91bmQuDQo+PiA+Pj4gPj4NCj4+ID4+PiA+PiAoQWxt
b3N0KSBldmVyeSBpbnN0YW5jZSBvZiDCs1NGQ8KyIGluIHRoZSBjb250cm9sLXBsYW5lDQo+PnJl
cXVpcmVtZW50cw0KPj4gPj4+IGRyYWZ0DQo+PiA+Pj4gPj4gc2hvdWxkIHJlYWxseSBzYXkgwrNT
RlDCsi4gVGhlcmUgaXMgbm8gdXNlIG9mIHRhbGtpbmcgYWJvdXQgU0ZDcw0KPj4gPj4+dG93YXJk
cw0KPj4gPj4+IHRoZQ0KPj4gPj4+ID4+IGRhdGEgcGxhbmUuIFRoZSByZWxhdGlvbnNoaXAgYmV0
d2VlbiBjaGFpbnMgYW5kIHBhdGhzIGlzIGEgcG9saWN5DQo+PiA+Pj4gbWF0dGVyDQo+PiA+Pj4g
Pj4gd2hpY2ggYmVsb25ncyBpbiB0aGUgcG9saWN5L2NvbnRyb2wgaXRzZWxmLCBidXQgbm90IG91
dCBvZiB0aGVyZS4NCj4+ID4+PiA+Pg0KPj4gPj4+ID4+IFRoaXMgaXMgbm8gZGlmZmVyZW50IHRo
YW4gd2hhdCBJIHNhaWQgYSBmZXcgbW9udGhzIGFnbyBvbiB0aGUNCj4+c2FtZQ0KPj4gPj4+IHRv
cGljLg0KPj4gPj4+ID4+DQo+PiA+Pj4gPj4gVGhhbmtzLA0KPj4gPj4+ID4+DQo+PiA+Pj4gPj4g
4oC5IENhcmxvcy4NCj4+ID4+PiA+Pg0KPj4gPj4+ID4+PiBPbiBOb3YgMTcsIDIwMTUsIGF0IDk6
MDYgQU0sIEpvZWwgSGFscGVybg0KPj4gPj4+PGpvZWwuaGFscGVybkBlcmljc3Nvbi5jb20+DQo+
PiA+Pj4gPj4gd3JvdGU6DQo+PiA+Pj4gPj4+DQo+PiA+Pj4gPj4+IFdoYXQgaXMgcHJvdmlzaW9u
ZWQgaW50byB0aGUgU0ZGIHJlZmxlY3RzIHRoZSBTRlAuICBUaGUgY29udHJvbA0KPj4gPj4+c3lz
dGVtDQo+PiA+Pj4gPj4gZGVjaWRlcyB3aGV0aGVyIHRoYXQgU0ZQIGluZGljYXRlcyB0aGUgc2Ft
ZSBzZXQgb2YgYWxsIHBvc3NpYmxlDQo+PiA+Pj5jaG9pY2VzDQo+PiA+Pj4gPj4gdGhhdCB0aGUg
U0ZDIGRvZXMsIG9yIGlzIGEgcHJvcGVyIHN1YnNldC4NCj4+ID4+PiA+Pj4NCj4+ID4+PiA+Pj4g
SW4gb3JkZXIgdG8gYWxsb3cgZm9yIGFuIFNGUCB0aGF0IHJlZmxlY3RzIG1lYW5pbmdmdWwNCj4+
Y29uc3RyYWludHMsDQo+PiA+Pj4gd2hhdA0KPj4gPj4+ID4+IGlzIHByb3Zpc2lvbmVkIGhhcyB0
byBiZSB0aGUgU0ZQLg0KPj4gPj4+ID4+PiBObyBzcGVjaWFsIHByb3Zpc2lvbiBpcyBuZWVkZWQg
Zm9yIHRoZSBjYXNlIHdoZXJlIHRoZSBTRlAgaXMNCj4+ID4+PiBpc29tb3JwaGljDQo+PiA+Pj4g
Pj4gdG8gdGhlIFNGQy4gSW4gc3VjaCBhIGNhc2UsIHlvdSBzdGlsbCBwcm92aXNpb24gdGhlIFNG
UC4gIEFuZCB0aGUNCj4+ID4+PiByZXN1bHQNCj4+ID4+PiA+PiBpcyBhbiBTRlAgd2l0aCBhcyBt
dWNoIGZsZXhpYmlsaXR5IGFzIHRoZSBTRkMuDQo+PiA+Pj4gPj4+DQo+PiA+Pj4gPj4+IElmLCBp
biBjb250cmFzdCwgeW91IGRlY2xhcmUgdGhhdCB0aGUgcHJvdmlzaW9uaW5nIGluY2x1ZGVzIHRo
ZQ0KPj4gU0ZDDQo+PiA+Pj4gdGhlbg0KPj4gPj4+ID4+IHlvdSBhcmUgaW50cm9kdWNpbmcgZXh0
cmEgY29tcGxleGl0eSB3aXRob3V0IGFkZGluZyBhbnkgbmV3IGNhc2VzDQo+PiA+Pj50aGF0DQo+
PiA+Pj4gY2FuDQo+PiA+Pj4gPj4gYmUgaGFuZGxlZC4NCj4+ID4+PiA+Pj4NCj4+ID4+PiA+Pj4g
WW91cnMsDQo+PiA+Pj4gPj4+IEpvZWwNCj4+ID4+PiA+Pj4NCj4+ID4+PiA+Pj4gLS0tLS1Pcmln
aW5hbCBNZXNzYWdlLS0tLS0NCj4+ID4+PiA+Pj4gRnJvbTogbW9oYW1lZC5ib3VjYWRhaXJAb3Jh
bmdlLmNvbQ0KPj4gPj4+IFttYWlsdG86bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbV0NCj4+
ID4+PiA+Pj4gU2VudDogVHVlc2RheSwgTm92ZW1iZXIgMTcsIDIwMTUgOTowMyBBTQ0KPj4gPj4+
ID4+PiBUbzogSm9lbCBIYWxwZXJuOyBQYXVsIFF1aW5uIChwYXVscSkNCj4+ID4+PiA+Pj4gQ2M6
IHNmYyBpc3N1ZSB0cmFja2VyOyBkcmFmdC1pZXRmLXNmYy1jb250cm9sLQ0KPj4gcGxhbmVAdG9v
bHMuaWV0Zi5vcmc7DQo+PiA+Pj4gPj4gc2ZjQGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4+
ID4+PiA+Pj4gU3ViamVjdDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIg
dGhlIGNvbnRyb2wNCj4+cGxhbmUNCj4+ID4+PiA+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAg
SURzLCBldGMuDQo+PiA+Pj4gPj4+DQo+PiA+Pj4gPj4+IEhpIEpvZWwsDQo+PiA+Pj4gPj4+DQo+
PiA+Pj4gPj4+IFBsZWFzZSBzZWUgaW5saW5lLg0KPj4gPj4+ID4+Pg0KPj4gPj4+ID4+PiBDaGVl
cnMsDQo+PiA+Pj4gPj4+IE1lZA0KPj4gPj4+ID4+Pg0KPj4gPj4+ID4+Pj4gLS0tLS1NZXNzYWdl
IGQnb3JpZ2luZS0tLS0tDQo+PiA+Pj4gPj4+PiBEZSA6IEpvZWwgSGFscGVybiBbbWFpbHRvOmpv
ZWwuaGFscGVybkBlcmljc3Nvbi5jb21dDQo+PiA+Pj4gPj4+PiBFbnZvecOpIDogbWFyZGkgMTcg
bm92ZW1icmUgMjAxNSAxNDo0OQ0KPj4gPj4+ID4+Pj4gw4AgOiBCT1VDQURBSVIgTW9oYW1lZCBJ
TVQvT0xOOyBQYXVsIFF1aW5uIChwYXVscSkgQ2MgOiBzZmMNCj4+aXNzdWUNCj4+ID4+PiA+Pj4+
IHRyYWNrZXI7IGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7DQo+
PiA+Pj4gPj4+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPj4gPj4+ID4+Pj4gT2Jq
ZXQgOiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbA0K
Pj5wbGFuZQ0KPj4gPj4+ID4+Pj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0K
Pj4gPj4+ID4+Pj4NCj4+ID4+PiA+Pj4+IFlvdXIgc3RhdGVtZW50IHRoYXQgIiBJdCBoYXBwZW5z
IHRoYXQgaW5mb3JtYXRpb24gaXMgbm8gbW9yZQ0KPj50aGFuDQo+PiA+Pj50aGUNCj4+ID4+PiA+
Pj4+IHNlcnZpY2UgY2hhaW4gaXRzZWxmICh3aXRob3V0IGFueSBjb25zdHJhaW50cykuIiAoV2hl
cmUgIml0Ig0KPj4gPj4+cmVmZXJzDQo+PiA+Pj4gdG8NCj4+ID4+PiA+PiAiDQo+PiA+Pj4gPj4+
PiB0aGUgZXhhY3Qgc2VxdWVuY2Ugb2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFsaXplIHRoZSBT
RkMiLikNCj4+RG9lcw0KPj4gPj4+bm90DQo+PiA+Pj4gPj4+PiBtYWtlIHNlbnNlIHRvIG1lLg0K
Pj4gPj4+ID4+Pg0KPj4gPj4+ID4+PiBbTWVkXSBSRkMgNzY2NSBzYXlzOg0KPj4gPj4+ID4+Pg0K
Pj4gPj4+ID4+PiAiICAgVGh1cywgdGhlIHBvbGljaWVzIGFuZCBsb2dpYyBvZiBTRlAgc2VsZWN0
aW9uIG9yIGNyZWF0aW9uDQo+PiA+Pj4gKGRlcGVuZGluZw0KPj4gPj4+ID4+PiAgdXBvbiB0aGUg
c29sdXRpb24pIHByb2R1Y2Ugd2hhdCBtYXkgYmUgdGhvdWdodCBvZiBhcyBhDQo+PiBjb25zdHJh
aW5lZA0KPj4gPj4+ID4+PiAgdmVyc2lvbiBvZiB0aGUgb3JpZ2luYWwgU0ZDLiAiDQo+PiA+Pj4g
Pj4+DQo+PiA+Pj4gPj4+IGluIHNob3J0OiBTRlAgaXMgZGVmaW5lZCBhcyBhIGNvbnN0cmFpbmVk
IHZlcnNpb24gb2YgdGhlDQo+Pm9yaWdpbmFsDQo+PiA+Pj5TRkMuDQo+PiA+Pj4gPj4+DQo+PiA+
Pj4gPj4+IFdoYXQgaXMgdGhlIG5hbWUgdG8gdXNlIHRvIHJlZmVyIHRvIGEgIm5vbi1jb25zdHJh
aW5lZCIgU0ZDIG9yDQo+PnRvDQo+PiA+Pj50aGUNCj4+ID4+PiA+PiBpbmZvcm1hdGlvbiB0aGF0
IHlvdSB3aWxsIHByb3Zpc2lvbiB0byBhbiBTRkYgd2hlbiB0aGUgcGF0aA0KPj4gPj4+Y29tcHV0
YXRpb24NCj4+ID4+PiA+PiBhbmQgc2VsZWN0aW9uIGRlY2lzaW9uIGlzICJkZWZlcnJlZCB0byB0
aGUgU0ZGIj8NCj4+ID4+PiA+Pj4NCj4+ID4+PiA+Pj4gSXQgZG9lcyBub3QgbWFrZSBzZW5zZSB0
byBjYWxsIGEgbm9uLWNvbnN0cmFpbmVkIHZlcnNpb24gb2YgdGhlDQo+PiBTRkMNCj4+ID4+PmFz
DQo+PiA+Pj4gPj4gU0ZQIGdpdmVuIHRoYXQgUkZDNzY2NSBleHBsaWNpdGx5IGRlZmluZXMgU0ZQ
IGFzICJjb25zdHJhaW5lZA0KPj4gPj4+dmVyc2lvbg0KPj4gPj4+IG9mDQo+PiA+Pj4gPj4gdGhl
IG9yaWdpbmFsIFNGQyIhDQo+PiA+Pj4gPj4+DQo+PiA+Pj4gPj4+IFRoZSBTRkMgaXMgdGhlIGdl
bmVyYWwgZGVzY3JpcHRpb24gb2YgdGhlIG9iamVjdGl2ZS4gIFRoYXQNCj4+ID4+PiA+Pj4+IGlz
IG5vdCB0aGUgc2FtZSBhcyB0aGUgZXhhY3Qgc2VxdWVuY2Ugb2YgcGxhY2VzIHRoYXQgbXVzdCBi
ZQ0KPj4gPj4+dmlzaXRlZC4NCj4+ID4+PiA+Pj4+DQo+PiA+Pj4gPj4+PiBJIHN0YW5kIGJ5IG15
IGVhcmxpZXIgY29tbWVudHMgdGhhdCBhbG1vc3QgYWxsIHVzZXMgb2YgU0ZDIGluDQo+PnRoZQ0K
Pj4gPj4+ID4+Pj4gY29udHJvbCByZXF1aXJlbWVudHMgZHJhZnQgc2hvdWxkIGJlIFNGUC4NCj4+
ID4+PiA+Pj4+DQo+PiA+Pj4gPj4+DQo+PiA+Pj4gPj4+IFtNZWRdIEkgbm90ZWQgdGhhdCBKb2Vs
Li4gdGhhdCdzIGZhaXIgYnV0IHRoaXMgcG9zaXRpb24gaXMgSU1ITw0KPj4gbm90DQo+PiA+Pj4g
Pj4gYWxpZ25lZCB3aXRoIFJGQzc2NjUgdGhhdCBhbGxvd3MgdG8gY29udHJvbCBhbnkgdmFyaWF0
aW9uIGZyb20gYQ0KPj4gPj4+bm9uLQ0KPj4gPj4+ID4+IGNvbnN0cmFpbmVkIFNGQyB0byBhIGZ1
bGx5IGNvbnN0cmFpbmVkIFNGQy4NCj4+ID4+PiA+Pj4NCj4+ID4+PiA+Pj4+IFlvdXJzLA0KPj4g
Pj4+ID4+Pj4gSm9lbA0KPj4gPj4+ID4+Pj4NCj4+ID4+PiA+Pj4+IC0tLS0tT3JpZ2luYWwgTWVz
c2FnZS0tLS0tDQo+PiA+Pj4gPj4+PiBGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29t
DQo+PiA+Pj4gPj4+PiBbbWFpbHRvOm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb21dDQo+PiA+
Pj4gPj4+PiBTZW50OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA4OjM0IEFNDQo+PiA+Pj4g
Pj4+PiBUbzogUGF1bCBRdWlubiAocGF1bHEpDQo+PiA+Pj4gPj4+PiBDYzogc2ZjIGlzc3VlIHRy
YWNrZXI7DQo+PiA+Pj5kcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3Jn
Ow0KPj4gPj4+ID4+Pj4gc2ZjQGlldGYub3JnOyBKb2VsIE0uIEhhbHBlcm4NCj4+ID4+PiA+Pj4+
IFN1YmplY3Q6IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250
cm9sDQo+PnBsYW5lDQo+PiA+Pj4gPj4+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBl
dGMuDQo+PiA+Pj4gPj4+Pg0KPj4gPj4+ID4+Pj4gSGkgUGF1bCwNCj4+ID4+PiA+Pj4+DQo+PiA+
Pj4gPj4+PiBUaGFuayB5b3UgZm9yIHNoYXJpbmcgeW91ciBmZWVkYmFjay4NCj4+ID4+PiA+Pj4+
DQo+PiA+Pj4gPj4+PiBSRkM3NjY1IHNheXMgdGhlIGZvbGxvd2luZzoNCj4+ID4+PiA+Pj4+DQo+
PiA+Pj4gPj4+PiAiDQo+PiA+Pj4gPj4+PiBUaGlzIGFyY2hpdGVjdHVyZSBkb2VzIG5vdCBtYW5k
YXRlIHRoZSBkZWdyZWUgb2YNCj4+ID4+PiA+Pj4+ICBzcGVjaWZpY2l0eSBvZiB0aGUgU0ZQLiAg
QXJjaGl0ZWN0dXJhbGx5LCB3aXRoaW4gdGhlIHNhbWUgU0ZDLQ0KPj4gPj4+IGVuYWJsZWQNCj4+
ID4+PiA+Pj4+ICBkb21haW4sIHNvbWUgU0ZQcyBtYXkgYmUgZnVsbHkgc3BlY2lmaWVkLCBzZWxl
Y3RpbmcgZXhhY3RseQ0KPj4gd2hpY2gNCj4+ID4+PiBTRkYNCj4+ID4+PiA+Pj4+ICBhbmQgd2hp
Y2ggU0YgYXJlIHRvIGJlIHZpc2l0ZWQgYnkgcGFja2V0cyB1c2luZyB0aGF0IFNGUCwNCj4+d2hp
bGUNCj4+ID4+PiBvdGhlcg0KPj4gPj4+ID4+Pj4gIFNGUHMgbWF5IGJlIHF1aXRlIHZhZ3VlLCBk
ZWZlcnJpbmcgdG8gdGhlIFNGRiB0aGUgZGVjaXNpb25zDQo+PiBhYm91dA0KPj4gPj4+IHRoZQ0K
Pj4gPj4+ID4+Pj4gIGV4YWN0IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6
ZSB0aGUgU0ZDLiAgVGhlDQo+PiA+Pj4gPj4+PiAgc3BlY2lmaWNpdHkgbWF5IGJlIGFueXdoZXJl
IGluIGJldHdlZW4gdGhlc2UgZXh0cmVtZXMuDQo+PiA+Pj4gPj4+PiAiDQo+PiA+Pj4gPj4+Pg0K
Pj4gPj4+ID4+Pj4gVGhlIGNvbnRyb2wgZHJhZnQgaXMgY29tcGxldGVseSBhbGlnbmVkIHdpdGgg
dGhhdCBhcHByb2FjaC4NCj4+ID4+PiA+Pj4+DQo+PiA+Pj4gPj4+PiBUaGUgY29udHJvbC1wbGFu
ZSBkb2N1bWVudCBhbGxvd3MgaW4gcGFydGljdWxhciB0byBwcm92aXNpb24NCj4+ID4+PnJlcXVp
cmVkDQo+PiA+Pj4gPj4+PiBpbmZvcm1hdGlvbiB3aGVuICJkZWZlcnJpbmcgdG8gdGhlIFNGRiB0
aGUgZGVjaXNpb25zIGFib3V0IHRoZQ0KPj4gPj4+ID4+Pj4gIGV4YWN0IHNlcXVlbmNlIG9mIHN0
ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDIi4gSXQNCj4+ID4+PmhhcHBlbnMNCj4+
ID4+PiA+Pj4+IHRoYXQgaW5mb3JtYXRpb24gaXMgbm8gbW9yZSB0aGFuIHRoZSBzZXJ2aWNlIGNo
YWluIGl0c2VsZg0KPj4gKHdpdGhvdXQNCj4+ID4+PiBhbnkNCj4+ID4+PiA+Pj4+IGNvbnN0cmFp
bnRzKS4NCj4+ID4+PiA+Pj4+DQo+PiA+Pj4gPj4+PiBBbHNvLCB0aGUgY3VycmVudCBjb250cm9s
LXBsYW5lIGRvY3VtZW50IGFsbG93cyB0byBpbnN0cnVjdCBhDQo+PiA+Pj5sb29zZQ0KPj4gPj4+
ID4+Pj4gcGF0aA0KPj4gPj4+ID4+Pj4gKFNGUCkgb3IgYSBzdHJpY3QgcGF0aCAoUlNQKSwgZXRj
Lg0KPj4gPj4+ID4+Pj4NCj4+ID4+PiA+Pj4+IEkgZnVsbHkgYWdyZWUgdGhhdCB3aGV0aGVyIGEg
ZnVsbCBwYXRoIGlzIHNwZWNpZmllZCB3aXRoaW4gYQ0KPj4gPj4+ZG9tYWluDQo+PiA+Pj4gb3IN
Cj4+ID4+PiA+Pj4+IGlmIGl0IGlzIGRlZmVycmVkIHRvIFNGRnMgaXMgcmVhbGx5IGRlcGxveW1l
bnQtc3BlY2lmaWMuDQo+PiA+Pj4gTmV2ZXJ0aGVsZXNzLA0KPj4gPj4+ID4+Pj4gdGhlIGNvbnRy
b2wgcGxhbiBzaG91bGQgYWNjb21tb2RhdGUgYWxsIHRoZXNlIGZsYXZvcnMuDQo+PiA+Pj4gPj4+
Pg0KPj4gPj4+ID4+Pj4gQ2hlZXJzLA0KPj4gPj4+ID4+Pj4gTWVkDQo+PiA+Pj4gPj4+Pg0KPj4g
Pj4+ID4+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPj4gPj4+ID4+Pj4+IERlIDog
UGF1bCBRdWlubiAocGF1bHEpIFttYWlsdG86cGF1bHFAY2lzY28uY29tXSBFbnZvecOpIDoNCj4+
ID4+PnZlbmRyZWRpDQo+PiA+Pj4gPj4+Pj4gMTYgb2N0b2JyZSAyMDE1IDE0OjA0IMOAIDogSm9l
bCBNLiBIYWxwZXJuIENjIDogQk9VQ0FEQUlSDQo+Pk1vaGFtZWQNCj4+ID4+PiA+Pj4+PiBJTVQv
T0xOOyBzZmMgaXNzdWUgdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC0NCj4+ID4+PiA+
Pj4+PiBwbGFuZUB0b29scy5pZXRmLm9yZzsgc2ZjQGlldGYub3JnIE9iamV0IDogUmU6IFtzZmNd
ICMxNQ0KPj4gPj4+ID4+Pj4+IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBw
bGFuZSBvcGVyYXRlcyBvbiBTRkMNCj4+SURzLA0KPj4gPj4+U0ZQDQo+PiA+Pj4gPj4gSURzLCBl
dGMuDQo+PiA+Pj4gPj4+Pj4NCj4+ID4+PiA+Pj4+PiBKb2VsLA0KPj4gPj4+ID4+Pj4+DQo+PiA+
Pj4gPj4+Pj4gSSBjb25jdXIuDQo+PiA+Pj4gPj4+Pj4NCj4+ID4+PiA+Pj4+PiBUaGUgZGF0YSBw
bGFuZSBkZWFsIHdpdGggcGF0aHMsIG5vdCBjaGFpbnMuICBUaGUgcmVsYXRpb25zaGlwDQo+Pm9m
DQo+PiA+Pj4gPj4+Pj4gcGF0aHMgdG8gY2hhaW5zIGZhbGxzIHNxdWFyZWx5IGluIHRoZSBjb250
cm9sIHBsYW5lIChvciBldmVuDQo+PiBtb3JlDQo+PiA+Pj4gPj4+Pj4gbGlrZWx5DQo+PiA+Pj4g
Pj4+PiAicG9saWN5Ig0KPj4gPj4+ID4+Pj4+IHBsYW5lKSByZWFsbS4gIFRoZSBzcGVjaWZpY2l0
eSBvZiB0aGUgcGF0aCBpcyBsZWZ0IHRvDQo+PiA+Pj4gPj4+Pj4gaW1wbGVtZW50YXRpb24sIGlu
IHRoZSBhcmNoaXRlY3R1cmUgZHJhZnQsIGJ1dCB0aGF0J3MNCj4+Y29uc2lzdGVudA0KPj4gPj4+
ID4+Pj4+IHdpdGggeW91ciBwb3NpdGlvbiBhbmQgcHJvdmlkZXMgdGhlIHJlcXVpc2l0ZSBmdW5j
dGlvbmFsaXR5Lg0KPj4gPj4+ID4+Pj4+DQo+PiA+Pj4gPj4+Pj4gUGF1bA0KPj4gPj4+ID4+Pj4+
DQo+PiA+Pj4gPj4+Pj4+IE9uIFNlcCAxNywgMjAxNSwgYXQgMTE6MzYgQU0sIEpvZWwgTS4gSGFs
cGVybg0KPj4gPj4+ID4+Pj4+PiA8am1oQGpvZWxoYWxwZXJuLmNvbT4NCj4+ID4+PiA+Pj4+PiB3
cm90ZToNCj4+ID4+PiA+Pj4+Pj4NCj4+ID4+PiA+Pj4+Pj4gQXMgZmFyIGFzIEkgY2FuIHRlbGws
IHRoZXJlIGlzIG5vdGhpbmcgaW4gdGhlIFNlcnZpY2UNCj4+Q2hhaW5pbmcNCj4+ID4+PiA+Pj4+
Pj4gd29yayB0aGF0DQo+PiA+Pj4gPj4+Pj4gcmVxdWlyZXMgY29ycmVsYXRpbmcgc2VydmljZSBw
YXRoIElEcyB3aXRoIHNlcnZpY2UgY2hhaW4gSURzDQo+PiA+Pj53aXRoaW4NCj4+ID4+PiA+Pj4+
PiB0aGUgZGF0YSBwbGFuZS4gIEFueSBzdWNoIHJlbGF0aW9uc2hpcCBleGlzdHMgZW50aXJlbHkg
d2l0aGluDQo+PiB0aGUNCj4+ID4+PiA+Pj4+PiBjb250cm9sIHBsYW5lIG9yIGFib3ZlLCBhbmQg
d291bGQgYmUgZHJpdmVuIGJ5IHJlcXVpcmVtZW50cw0KPj4gb3RoZXINCj4+ID4+PiA+Pj4+PiB0
aGFuIHRoZSBkYXRhIHBsYW5lLiAgV2hlbiBJIGxvb2sgYXQgdGhpcyBkb2N1bWVudCwgYWxsIG9m
IHRoZQ0KPj4gPj4+ID4+Pj4+IHJlcXVpcmVtZW50cyB0aGF0IHRhbGsgYWJvdXQgc2VydmljZSBm
dW5jdGlvbiBjaGFpbiBJRHMgY2FuIGJlDQo+PiA+Pj4gPj4+Pj4gYWNjdXJhdGVseSBjYXB0dXJl
ZCwgaW4gdGVybXMgb2YgZGF0YSBwbGFuZSByZXF1aXJlbWVudHMsIGJ5DQo+PiA+Pj5zZXJ2aWNl
DQo+PiA+Pj4gPj4gZnVuY3Rpb24gcGF0aCBJRHMuDQo+PiA+Pj4gPj4+Pj4gVGh1cywgdGhlIHJl
cXVpcmVtZW50IHRoYXQgdGhlIGRhdGEgcGxhbmUgaGFzIGlzIHRvIHNlZSBzdWNoDQo+PiBwYXRo
DQo+PiA+Pj4gSURzLg0KPj4gPj4+ID4+Pj4+IFllcywgaW4gc29tZSBkZXBsb3ltZW50cyB0aG9z
ZSB3aWxsIGJlIDEtMSB3aXRoIGNoYWluIElEcy4NCj4+VGhleQ0KPj4gPj4+YXJlDQo+PiA+Pj4g
Pj4+PiBzdGlsbCBwYXRoIElEcy4NCj4+ID4+PiA+Pj4+Pj4NCj4+ID4+PiA+Pj4+Pj4gSW50cm9k
dWNpbmcgYSByZXF1aXJlbWVudCBmb3IgdGhlIGRhdGEgcGxhbmUgdG8gc2VlIGFuZCB3b3JrDQo+
PiA+Pj53aXRoDQo+PiA+Pj4gPj4+Pj4+IGNoYWluDQo+PiA+Pj4gPj4+Pj4gSURzIGlzIG5vdCBn
cm91bmRlZCBpbiB0aGUgd29yayBvZiB0aGUgZ3JvdXAuDQo+PiA+Pj4gPj4+Pj4+DQo+PiA+Pj4g
Pj4+Pj4+IFlvdXJzLA0KPj4gPj4+ID4+Pj4+PiBKb2VsIE0uIEhhbHBlcm4NCj4+ID4+PiA+Pj4+
Pj4NCj4+ID4+PiA+Pj4+Pj4gT24gOS8xNy8xNSA3OjUzIEFNLCBtb2hhbWVkLmJvdWNhZGFpckBv
cmFuZ2UuY29tIHdyb3RlOg0KPj4gPj4+ID4+Pj4+Pj4gUmUtLA0KPj4gPj4+ID4+Pj4+Pj4NCj4+
ID4+PiA+Pj4+Pj4+IFRoZSBjb250cm9sIGRyYWZ0IGFzIGl0IHN0YW5kcyBpcyBjb21wbGlhbnQg
d2l0aCB0aGUgZGF0YQ0KPj4gcGxhbmUNCj4+ID4+PiA+Pj4+PiBhcmNoaXRlY3R1cmUgZG9jdW1l
bnQuDQo+PiA+Pj4gPj4+Pj4+Pg0KPj4gPj4+ID4+Pj4+Pj4gSW5kZWVkLCB0aGUgYXJjaCBkcmFm
dCBhY2tub3dsZWRnZXMgdGhlIGZvbGxvd2luZzoNCj4+ID4+PiA+Pj4+Pj4+ICgxKSBTRlBzIGFy
ZSAiYXNzb2NpYXRlZCB3aXRoIGEgZ2l2ZW4gU0ZDIi4NCj4+ID4+PiA+Pj4+Pj4+ICgyKSBTRlBz
IGFyZSBwcmVzZW50ZWQgYXMgYSBmb3JtIG9mIGNvbnN0cmFpbmVkIFNGQ3MuDQo+PiA+Pj4gPj4+
Pj4+PiAoMykgU29tZSBkZXBsb3ltZW50cyBtYXkgbm90IGltcG9zZSBhbnkgY29uc3RyYWludCBv
biB0aGUNCj4+ID4+PiA+Pj4+Pj4+IGFic3RyYWN0DQo+PiA+Pj4gPj4+PiBTRkMNCj4+ID4+PiA+
Pj4NCj4+ID4+PiA+Pj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX18NCj4+ID4+PiA+Pj4gc2ZjIG1haWxpbmcgbGlzdA0KPj4gPj4+ID4+PiBzZmNAaWV0Zi5v
cmcNCj4+ID4+PiA+Pj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMN
Cj4+ID4+PiA+DQo+PiA+Pg0KPj4gPg0KPj4gPl9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fDQo+PiA+c2ZjIG1haWxpbmcgbGlzdA0KPj4gPnNmY0BpZXRmLm9y
Zw0KPj4gPmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo+DQoNCg==


From nobody Thu Nov 19 07:38:10 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E44811B2BB2 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 07:38:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZL6VtJqhfv84 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 07:38:06 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 025C11B2BB1 for <sfc@ietf.org>; Thu, 19 Nov 2015 07:38:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16725; q=dns/txt; s=iport; t=1447947486; x=1449157086; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=0L7dxIkPkrCP2TYKn1ApJdyP3pEHqKsQF+OpSWULUxw=; b=ZBIIQ9RRG422EogoES36RJAba8jFzNa5kFfO7RSckYaXqn2fs0NWLNVx LhOXu/Uv+wPwNEoyQ4JtIj1VUgGv/2ZJeNsI6p/uutTDdTMVk0Pf2TstB K4ej6qhCUWN18/T9+0qkaReedWCpGS7HbBVnuluWMyUJVkY1lAc4vH2cH s=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CxAwD8601W/5NdJa1egm5NU28GvmsOg?= =?us-ascii?q?WUXAQmEXoEQAoFMOBQBAQEBAQEBgQqENAEBAQMBAQEBIEsLBQsCAQgOAwQBAQE?= =?us-ascii?q?jBAMCAicLFAkIAQEEDgUOEYgHCA2vRJArAQEBAQEBAQEBAQEBAQEBAQEBAQEBD?= =?us-ascii?q?wUEhlSCEIJuhCoRAUwJgmQvgRUFlkwBgleBYYh1gVuEQJI6g3EBHwFDgg4gFoF?= =?us-ascii?q?AcoNfOoEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,318,1444694400";  d="asc'?scan'208,217";a="209291753"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Nov 2015 15:38:04 +0000
Received: from XCH-RTP-007.cisco.com (xch-rtp-007.cisco.com [64.101.220.147]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id tAJFc49U011947 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Nov 2015 15:38:04 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-007.cisco.com (64.101.220.147) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 19 Nov 2015 10:38:03 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Thu, 19 Nov 2015 10:38:03 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Qin Wu <bill.wu@huawei.com>
Thread-Topic: [sfc] Please voice your vote in SFC WG to make the zero or more Variable SFC header as the MUST and cisco's 16 bytes context header as "SHOULD" or optional
Thread-Index: AdEiKY+hv3Hb7xn6Qkqm/lQOpgx+sAALiW6QAADeZIAAABxNIAAGxhkAACTd1oA=
Date: Thu, 19 Nov 2015 15:38:03 +0000
Message-ID: <5E0943CD-91DE-4E9C-BFF7-D0A3BDFC63AF@cisco.com>
References: <B8F9A780D330094D99AF023C5877DABA848BF0C5@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA848BF0C5@nkgeml501-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.150.53.159]
Content-Type: multipart/signed; boundary="Apple-Mail=_B8A29FB1-267F-4554-8570-6378C39F68B3"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/o9QiubgCU8OIZxHpp23MhG31POw>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Please voice your vote in SFC WG to make the zero or more Variable SFC header as the MUST and cisco's 16 bytes context header as "SHOULD" or optional
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 15:38:09 -0000

--Apple-Mail=_B8A29FB1-267F-4554-8570-6378C39F68B3
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_0D5B58A1-D559-486A-8A0B-1C637BCAF0E8"


--Apple-Mail=_0D5B58A1-D559-486A-8A0B-1C637BCAF0E8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Qin,

I=E2=80=99m trying to understand the Subject header on this email.

I=E2=80=99ll let the chairs jump in, but there=E2=80=99s no =E2=80=9Cvote=E2=
=80=9D I believe in the SFC WG. There=E2=80=99s also not =E2=80=9Ccisco=E2=
=80=99s context header=E2=80=9D. Care to explain?

Linda,

You asked before:

> If an implementation supports MD-Type =3D 0x2, then it is not =
supporting MD-Type =3D 0x1. So what does it mean by saying "Must =
Support"?


An implementation is able to support both. It is not that if an =
implementation supports MD-Type 2, it is not supporting MD-Type 1. Only =
one would be used for a given SFP, but that=E2=80=99s a different =
question.

Please see inline, my additional $0.02.

> On Nov 18, 2015, at 10:07 PM, Qin Wu <bill.wu@huawei.com> wrote:
>=20
> +1, it is not clear to me why 4 context headers MUST be required for =
MD-TYPE 1,
> It looks more flexible to have variable length context header for =
MD-TYPE 2.
>=20
> -Qin
> From: Linda Dunbar
> Sent: Wednesday, November 18, 2015 5:42 PM
> To: 'sfc@ietf.org <mailto:sfc@ietf.org>'; 'Paul Quinn (paulq)'; =
'Elzur, Uri'
> Subject: draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type =
=3D 0x2" (zero or more Variable) as "MUST" and MD-type=3D0x1" as " =
SHOULD"
>=20
>=20
> Paul and Uri,
>=20
> The Section 3.2 of  draft-ietf-sfc-nsf-01 says:
>=20
> <image001.png>
>=20
>=20
> As both MD-type 1 and MD-type 2 are specified by the draft, a more =
reasonable approach is having the minimum common part (i.e. the first 8 =
bytes) as the MUST. As the MD-TYPE 2 allows minimum 0 context header (or =
16 bytes context header), the MD-TYPE 2 should be a MUST support. And =
MD-TYPE 1 is a =E2=80=9CSHOULD=E2=80=9D support.
>=20

The different MD-Types are optimizing different things: MD-Type 1 for =
performance and HW, MD-Type 2 for flexibility. The idea is that the more =
we can use fixed headers the better, as getting too creative with the =
amount of metadata can be a bug more than a feature.

> Let=E2=80=99s face it, the majority of SFC deployment probably won=E2=80=
=99t need the all 16 bytes "context header" (which has higher chance of =
packet fragmentation).

This logic seems to argue for MD-Type 1. Prioritizing smaller context =
metadata, in a performance-friendly way.

Thanks,

=E2=80=94 Carlos.


>=20
>=20
> Linda
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>

--Apple-Mail=_0D5B58A1-D559-486A-8A0B-1C637BCAF0E8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Qin,<div class=3D""><br class=3D""></div><div class=3D"">I=E2=80=
=99m trying to understand the Subject header on this email.</div><div =
class=3D""><br class=3D""></div><div class=3D"">I=E2=80=99ll let the =
chairs jump in, but there=E2=80=99s no =E2=80=9Cvote=E2=80=9D I believe =
in the SFC WG. There=E2=80=99s also not =E2=80=9Ccisco=E2=80=99s context =
header=E2=80=9D. Care to explain?</div><div class=3D""><br =
class=3D""></div><div class=3D"">Linda,</div><div class=3D""><br =
class=3D""></div><div class=3D"">You asked before:</div><div =
class=3D""><br class=3D""></div><div class=3D""><blockquote type=3D"cite" =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">If an implementation =
supports MD-Type =3D 0x2, then it is not supporting MD-Type =3D 0x1. So =
what does it mean by saying "Must Support"?</div></blockquote></div><div =
class=3D""><br class=3D""></div><div class=3D"">An implementation is =
able to support both. It is not that if an implementation supports =
MD-Type 2, it is not supporting MD-Type 1. Only one would be used for a =
given SFP, but that=E2=80=99s a different question.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Please see inline, my =
additional $0.02.</div><div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Nov 18, 2015, at 10:07 PM, =
Qin Wu &lt;<a href=3D"mailto:bill.wu@huawei.com" =
class=3D"">bill.wu@huawei.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" class=3D"">+1, it is not clear to me why 4 context =
headers MUST be required for MD-TYPE 1,<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10.5pt; color: rgb(31, 73, 125);" =
class=3D"">It looks more flexible to have variable length context header =
for MD-TYPE 2.<o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; color: =
rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; color: =
rgb(31, 73, 125);" class=3D"">-Qin<o:p class=3D""></o:p></span></div><div =
class=3D""><div style=3D"border-style: solid none none; =
border-top-color: rgb(181, 196, 223); border-top-width: 1pt; padding: =
3pt 0cm 0cm;" class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><b =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
Tahoma, sans-serif;" class=3D"">From:</span></b><span lang=3D"EN-US" =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif;" =
class=3D""><span class=3D"Apple-converted-space">&nbsp;</span>Linda =
Dunbar<span class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><b=
 class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Wednesday, November 18, =
2015 5:42 PM<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>'<a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">sfc@ietf.org</a>'; 'Paul Quinn (paulq)'; 'Elzur, =
Uri'<br class=3D""><b class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>draft-ietf-sfc-nsf-01: It =
makes more sense to state "MD-type =3D 0x2" (zero or more Variable) as =
"MUST" and MD-type=3D0x1" as " SHOULD"<o:p =
class=3D""></o:p></span></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 10.5pt; font-family: Consolas;" class=3D""><span =
lang=3D"EN-US" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 10.5pt; font-family: =
Consolas;" class=3D""><span lang=3D"EN-US" class=3D"">Paul and Uri,<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 10.5pt; font-family: Consolas;" class=3D""><span lang=3D"EN-US"=
 class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 10.5pt; font-family: Consolas;" =
class=3D""><span lang=3D"EN-US" class=3D"">The Section 3.2 of =
&nbsp;draft-ietf-sfc-nsf-01 says:<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" class=3D""><span =
id=3D"cid:image001.png@01D12226.FDF81290">&lt;image001.png&gt;</span><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 10.5pt; font-family: Consolas;" class=3D""><span lang=3D"EN-US"=
 class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 10.5pt; font-family: Consolas;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 10.5pt; font-family: Consolas;" class=3D""><span =
lang=3D"EN-US" class=3D"">As both MD-type 1 and MD-type 2 are specified =
by the draft, a more reasonable approach is having the minimum common =
part (i.e. the first 8 bytes) as the MUST. As the MD-TYPE 2 allows =
minimum 0 context header (or 16 bytes context header), the MD-TYPE 2 =
should be a MUST support. And MD-TYPE 1 is a =E2=80=9CSHOULD=E2=80=9D =
support.<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 10.5pt; font-family: Consolas;" class=3D""><span =
lang=3D"EN-US" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div></div></div></blockquote><div><br =
class=3D""></div><div>The different MD-Types are optimizing different =
things: MD-Type 1 for performance and HW, MD-Type 2 for flexibility. The =
idea is that the more we can use fixed headers the better, as getting =
too creative with the amount of metadata can be a bug more than a =
feature.</div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 10.5pt; font-family: Consolas;" class=3D""><span lang=3D"EN-US"=
 class=3D"">Let=E2=80=99s face it, the majority of SFC deployment =
probably won=E2=80=99t need the all 16 bytes "context header" (which has =
higher chance of packet =
fragmentation).</span></div></div></div></blockquote><div><br =
class=3D""></div><div>This logic seems to argue for MD-Type 1. =
Prioritizing smaller context metadata, in a performance-friendly =
way.</div><div><br class=3D""></div><div>Thanks,</div><div><br =
class=3D""></div><div>=E2=80=94 Carlos.</div><div><br class=3D""></div><br=
 class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 10.5pt; font-family: =
Consolas;" class=3D""><span lang=3D"EN-US" class=3D""><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 10.5pt; font-family: Consolas;" class=3D""><span lang=3D"EN-US"=
 class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 10.5pt; font-family: Consolas;" =
class=3D""><span lang=3D"EN-US" class=3D"">Linda<o:p =
class=3D""></o:p></span></div></div><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" =
class=3D"">_______________________________________________</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">sfc mailing list</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline; font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D"">sfc@ietf.org</a><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" style=3D"color: =
purple; text-decoration: underline; font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a></div></blockquote=
></div><br class=3D""></div></body></html>=

--Apple-Mail=_0D5B58A1-D559-486A-8A0B-1C637BCAF0E8--

--Apple-Mail=_B8A29FB1-267F-4554-8570-6378C39F68B3
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=bMuj
-----END PGP SIGNATURE-----

--Apple-Mail=_B8A29FB1-267F-4554-8570-6378C39F68B3--


From nobody Thu Nov 19 14:01:18 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 931A51B361B for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 14:01:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CjmhUjENfUJz for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 14:01:16 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE5251B3536 for <sfc@ietf.org>; Thu, 19 Nov 2015 14:01:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16464; q=dns/txt; s=iport; t=1447970475; x=1449180075; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=FJ8FDiQQsw3hqQmmKpnu7J2tbN/gUhRHgG/IwsByFn8=; b=L6rCenSd+624WrCQyW4vAS2vhYN7DdH44Ve7zoBmC0Qgn9zZoiyvMmQ9 dtEugvypzuoIymuPEOMCYC79N4T/TYSDnJAJDlLGFhnUyB327dkdCw27f JU/O42fw8bI6WQ5WxeluercVn5JLDKvxrY2BB7Ty7SA1nIW/s1MZjj+Nh I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ANAgCARk5W/4oNJK1egm5NgUIGvngBD?= =?us-ascii?q?YFlhg8CHIE5OBQBAQEBAQEBgQqENAEBAQQjCkwQAgEWAwQBASgDAgICMBQJCAI?= =?us-ascii?q?EDgUbBIgPsAWQOQEBAQEBAQEBAQEBAQEBAQEBAQEBARiGVIIQh3+CZC+BFQWWT?= =?us-ascii?q?AGNLYFbhECDJZMGAR8BAUKCDiCBVnKEGYEHAQEB?=
X-IronPort-AV: E=Sophos; i="5.20,319,1444694400"; d="scan'208,217"; a="46621087"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 19 Nov 2015 22:01:07 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tAJM17ew009675 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Nov 2015 22:01:07 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 19 Nov 2015 16:01:06 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 19 Nov 2015 16:01:06 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Qin Wu <bill.wu@huawei.com>
Thread-Topic: NSH context headers: fixed/tlv
Thread-Index: AQHRIxXKxooPxrUbyUe8yxXoCdSnDw==
Date: Thu, 19 Nov 2015 22:01:06 +0000
Message-ID: <919C0224-785B-463E-8FBC-F00336970EAF@cisco.com>
References: <B8F9A780D330094D99AF023C5877DABA848BF0C5@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA848BF0C5@nkgeml501-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.231]
Content-Type: multipart/alternative; boundary="_000_919C0224785B463E8FBCF00336970EAFciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tIPzcQwO-F7vuR7B578eyAROvuo>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 22:01:17 -0000

--_000_919C0224785B463E8FBCF00336970EAFciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_919C0224785B463E8FBCF00336970EAFciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <3ED23E3F7625D945B0E513204AF09C78@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_919C0224785B463E8FBCF00336970EAFciscocom_--


From nobody Thu Nov 19 14:21:22 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F7BE1B3668 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 14:21:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d_0EJA3i0rTs for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 14:21:20 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A323C1B3667 for <sfc@ietf.org>; Thu, 19 Nov 2015 14:21:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1765; q=dns/txt; s=iport; t=1447971679; x=1449181279; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=Ye4uC+DWkAlhs5Yk+Jk4PvG3jwN1j/zjRRhFj/NeaA0=; b=eA+g6WzWKX7a5s0QmJoVZ6dCvMEOpLvttv5tF0nNI5jI6x/eZMhST6Ka y0lKqECyPjJcyJ24cOnGKtmNZaAP7lxvIuRFOGuu4IDQKeGH7BkAY7Amy i6kgEdHVqfn6R3xYhNR2x5uBe/rI474H/fQpseAh/W5nIUiX0weiv43BZ o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BHBQBvSk5W/4MNJK1egzuBQga/BoFlh?= =?us-ascii?q?g8CgVU6EgEBAQEBAQGBCoQ0AQEBAwEnUgULAgEIEgYuMhcOAgQOBYgmCMA5AQE?= =?us-ascii?q?BAQEBAQEBAQEBAQEBAQEBARqGVIIQgm6EWYNLgRUBBIdIjwQBjS2cRgEoAjmCR?= =?us-ascii?q?IFAcoQZgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,319,1444694400"; d="scan'208";a="51336593"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 19 Nov 2015 22:21:18 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tAJMLIZh026124 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Nov 2015 22:21:18 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 19 Nov 2015 16:21:18 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 19 Nov 2015 16:21:18 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAGzwgIAAA+EAgAAA+ACAAAYYAIAA4esAgALG/YA=
Date: Thu, 19 Nov 2015 22:21:18 +0000
Message-ID: <F687F649-77ED-4623-8573-ECF7F79AA2A1@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F48D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <564BF6F2.7060904@joelhalpern.com>
In-Reply-To: <564BF6F2.7060904@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.231]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <999BDC509722044A98784E04865F97FC@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6C-gABRuSt6MOBDhZ3u7q_QBtag>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 22:21:21 -0000

Joel,



> On Nov 17, 2015, at 10:56 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote=
:
>=20
> Let me trying phrasing this differently.
> A Service Function Chain (SFC) effectively designates a (potentially larg=
e) collection of sequences of SFF and SF visitations, any one of which woul=
d satisfy the the SFC.
>=20

I would even lift that "higher": an SFC connotes policy, not realization.  =
That puts is squarely in the control/policy space.


> An Service Function Path (SFP) designates a subset of the collection desi=
gnated by the SFC. For some SFPs, in some deployments, that will be a set o=
f 1.  For other SFPs (in the same or other deployments) it may be a larger =
set.  For some SFPs in some deployments the SFP may designate the same set =
of choices as the SFC.

We are on the same page: this where the rubber meets the road, or the packe=
ts meet the wire.  The abstract policy from the SFC is mapped to tangible r=
esources for instantiation.


>=20
> Formally, the SFP is a subset of the SFC, but not necessarily a proper su=
bset.
>=20
> By always having control provision in terms of SFPs, the data plane alway=
s sees the effects of the constraints that control has placed in selecting =
the SFP.  And because of the definition of SFP, this allows the range of de=
plooyments the working group has requested.
>=20
> Add SFC information into the provisioning does not increase the capabilit=
y.  It does not, in fact, add any information tha thte forwarding can use.

Exactly what I was trying to convey above: policy --> SFC, instantiation --=
> SFP.  Using that distinction, the architecture has a clear line between t=
he two domains, and a way to cross them.



>=20
> Yours,
> Joel
>=20


From nobody Thu Nov 19 14:24:46 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2EE41B3665 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 14:24:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mk1HCYAblVhE for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 14:24:44 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C84AA1B3671 for <sfc@ietf.org>; Thu, 19 Nov 2015 14:24:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1016; q=dns/txt; s=iport; t=1447971884; x=1449181484; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=E9lznZNUSa5/TkX64ERPvE1EnESJvZVIVDecf8iUOlU=; b=m6x23fn59M/9GjGrObZu3PjTD6FMBTkzmTov/fisMU6HVTFfpXrtcYHK NqsrBJv84yBDR1SWRklJstBe17s+xdTU9agvX1GLwsF0l7IcvorrPHUy7 OPD7HIxEhtCrL6oIYZHfgNsRjA5MW9479LWTBxKOp6w7s3WWKVkfxMhcR Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AMAgAkS05W/5xdJa1egzuBQga+eAENg?= =?us-ascii?q?WWGDwKBVTgUAQEBAQEBAYEKhDQBAQEDATo/BQsCAQgOCh4QMiUCBA4FiCYIwDI?= =?us-ascii?q?BAQEBAQEBAQEBAQEBAQEBAQEBAQEYhlSCEIJuhFmDS4EVAQSWTAGNLYFblnqDc?= =?us-ascii?q?QEfAQFCgkSBQHKEGYEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,319,1444694400"; d="scan'208";a="209671741"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Nov 2015 22:24:44 +0000
Received: from XCH-ALN-008.cisco.com (xch-aln-008.cisco.com [173.36.7.18]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tAJMOiHM024603 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Nov 2015 22:24:44 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 19 Nov 2015 16:24:43 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Thu, 19 Nov 2015 16:24:43 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAGzwgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIAgAAQWwCAADbogIABwfOA
Date: Thu, 19 Nov 2015 22:24:43 +0000
Message-ID: <9FC83029-32A8-461D-8FEC-1B14598498CB@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.231]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <FA4EE40109503545B5B0CD5F33609E43@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Xs-7qkjYlUnxxhn3qmOEOcMVkyc>
Cc: "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 22:24:46 -0000

> On Nov 18, 2015, at 2:34 PM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> [reduced distribution to Jim & sfc list]
>=20
> Jim,
> I think your description is helpful. Can we find a place for this in the =
docs?
>=20
> I don't think I can understand it without referring to the concrete NSH, =
however.
>=20
>=20
> If I understand correctly, the following are true:
> - if the NSH SPI in two packets are the same, they are on the same SFP.
> - if the NSH SPI in two packets are different, they are on different SFPs=
.
> - although two packets have the same SPI, they may traverse different RSP=
s.
>=20
> - when thinking of the data-plane and south-bound interfaces C1 thru C4, =
the SFC concept doesn't exist.
>   (SFC is just a north-interface concept like, "chain A provides a firewa=
ll and a NAT")
>=20
> Have I got it right?

Yes, that's exactly the intent.  A chain tell you what you want, or as you =
say: a firewall and a nat.  That means nothing in the service plane.=20




From nobody Thu Nov 19 16:57:13 2015
Return-Path: <andrew.dolganow@alcatel-lucent.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BE871A022C for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 16:57:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.485
X-Spam-Level: 
X-Spam-Status: No, score=-7.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bus4QzGozWOD for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 16:57:10 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpgre-esg-01.alcatel-lucent.com [135.245.210.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB9581A0218 for <sfc@ietf.org>; Thu, 19 Nov 2015 16:57:09 -0800 (PST)
Received: from us70tusmtp1.zam.alcatel-lucent.com (unknown [135.5.2.63]) by Websense Email Security Gateway with ESMTPS id D76DB874E1DF8; Fri, 20 Nov 2015 00:57:02 +0000 (GMT)
Received: from US70TWXCHHUB04.zam.alcatel-lucent.com (us70twxchhub04.zam.alcatel-lucent.com [135.5.2.36]) by us70tusmtp1.zam.alcatel-lucent.com (GMO) with ESMTP id tAK0v5no011169 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 20 Nov 2015 00:57:05 GMT
Received: from US70UWXCHMBA03.zam.alcatel-lucent.com ([169.254.9.242]) by US70TWXCHHUB04.zam.alcatel-lucent.com ([135.5.2.36]) with mapi id 14.03.0195.001; Thu, 19 Nov 2015 19:57:05 -0500
From: "Dolganow, Andrew (Andrew)" <andrew.dolganow@alcatel-lucent.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Qin Wu <bill.wu@huawei.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Q==
Date: Fri, 20 Nov 2015 00:57:03 +0000
Message-ID: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-originating-ip: [135.5.27.18]
Content-Type: multipart/alternative; boundary="_000_D273AF56849AAandrewdolganowalcatellucentcom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/d35bfpiJQsCyh4J_R7kbjUwXs-Y>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 00:57:12 -0000

--_000_D273AF56849AAandrewdolganowalcatellucentcom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Agree with Paul.  There were lengthy discussions in the past that led to th=
e current version of the draft. I see no reason to re-open the decisions ma=
de before.

Andrew

On 2015-11-19, 2:01 PM, "sfc on behalf of Paul Quinn (paulq)" wrote:

Qin,

I've updated to the subject line to reflect the topic more accurately.  Ref=
erring to "cisco" context headers is misleading, and frankly indicates a la=
ck of understanding of how a document is adopted.

Further, and I'm sure the chairs will weigh in, but as an IETF participants=
, you should know that IETF procedure is _not_ vote based.  The NSH draft w=
as adopted based on working group consensus, and as such received significa=
nt review.  Similarly, consensus is required for updates.   Please read RFC=
2418, section 3.3 in particular.


On Nov 18, 2015, at 10:07 PM, Qin Wu <bill.wu@huawei.com<mailto:bill.wu@hua=
wei.com>> wrote:

+1, it is not clear to me why 4 context headers MUST be required for MD-TYP=
E 1,

This was discussed on list, prior to adoption, please feel free to review t=
he archives.  In summary, parsing TLVs is a complex operation, particularly=
 in hardware, and as such, a simple fixed header provided an easy to implem=
ent metadata solution.  The TLV option is there as well but since the simpl=
est case is needed as a minimum, that is the mandatory piece.  Adding TLV s=
upport (i.e. a flexible parser) means you can probably support type-1 as we=
ll so the MUST/SHOULD does not create an added burden.


It looks more flexible to have variable length context header for MD-TYPE 2=
.



-Qin
From: Linda Dunbar
Sent: Wednesday, November 18, 2015 5:42 PM
To: 'sfc@ietf.org<mailto:sfc@ietf.org>'; 'Paul Quinn (paulq)'; 'Elzur, Uri'
Subject: draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type =3D 0=
x2" (zero or more Variable) as "MUST" and MD-type=3D0x1" as " SHOULD"




Paul and Uri,



The Section 3.2 of  draft-ietf-sfc-nsf-01 says:

<image001.png>





As both MD-type 1 and MD-type 2 are specified by the draft, a more reasonab=
le approach is having the minimum common part (i.e. the first 8 bytes) as t=
he MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes cont=
ext header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a =93=
SHOULD=94 support.



Let=92s face it, the majority of SFC deployment probably won=92t need the a=
ll 16 bytes "context header" (which has higher chance of packet fragmentati=
on).




Linda


--_000_D273AF56849AAandrewdolganowalcatellucentcom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <AEB9A91DCF97824FBD04BC9BF5F408BF@exchange.lucent.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Agree with Paul. &nbsp;There were lengthy discussions in the past that=
 led to the current version of the draft. I see no reason to re-open the de=
cisions made before.</div>
<div><br>
</div>
<div>Andrew&nbsp;</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div>
<div>On 2015-11-19, 2:01 PM, &quot;sfc on behalf of Paul Quinn (paulq)&quot=
; wrote:</div>
</div>
<div><br>
</div>
<blockquote id=3D"MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE" style=3D"BORDER-LEFT:=
 #b5c4df 5 solid; PADDING:0 0 0 5; MARGIN:0 0 0 5;">
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space;" class=3D"">
<div class=3D"">Qin,</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I've updated to the subject line to reflect the topic more =
accurately. &nbsp;Referring to &quot;cisco&quot; context headers is mislead=
ing, and frankly indicates a lack of understanding of how a document is ado=
pted. &nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Further, and I'm sure the chairs will weigh in, but as an I=
ETF participants, you should know that IETF procedure is _not_ vote based. =
&nbsp;The NSH draft was adopted based on working group consensus, and as su=
ch received significant review. &nbsp;Similarly,
 consensus is required for updates. &nbsp; Please read RFC2418, section 3.3=
 in particular. &nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
</div>
<div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Nov 18, 2015, at 10:07 PM, Qin Wu &lt;<a href=3D"mailto:=
bill.wu@huawei.com" class=3D"">bill.wu@huawei.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)" cl=
ass=3D"">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style class=3D""><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"\7EAF\6587\672C Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"\6279\6CE8\6846\6587\672C Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.Char
	{mso-style-name:"\7EAF\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\7EAF\6587\672C;
	font-family:SimSun;}
span.Char0
	{mso-style-name:"\6279\6CE8\6846\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\6279\6CE8\6846\6587\672C;
	font-family:"Calibri","sans-serif";}
p.PlainText, li.PlainText, div.PlainText
	{mso-style-name:"Plain Text";
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle29
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" class=3D"">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D" class=
=3D"">&#43;1, it is not clear to me why 4 context headers MUST be required =
for MD-TYPE 1,</span></p>
</div>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<div>This was discussed on list, prior to adoption, please feel free to rev=
iew the archives. &nbsp;In summary, parsing TLVs is a complex operation, pa=
rticularly in hardware, and as such, a simple fixed header provided an easy=
 to implement metadata solution. &nbsp;The
 TLV option is there as well but since the simplest case is needed as a min=
imum, that is the mandatory piece. &nbsp;Adding TLV support (i.e. a flexibl=
e parser) means you can probably support type-1 as well so the MUST/SHOULD =
does not create an added burden.</div>
<div><br class=3D"">
</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" class=3D"">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D" class=
=3D""><o:p class=3D""></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D" class=3D"">It looks more flexible to have variable length context=
 header for MD-TYPE 2.<o:p class=3D""></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D" class=3D""><o:p class=3D"">&nbsp;</o:p></span></p>
</div>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" class=3D"">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D" class=3D"">-Qin<o:p class=3D""></o:p></span></p>
<div class=3D"">
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm" class=3D"">
<p class=3D"MsoNormal"><b class=3D""><span lang=3D"EN-US" style=3D"font-siz=
e: 10pt; font-family: Tahoma, sans-serif;" class=3D"">From:</span></b><span=
 lang=3D"EN-US" style=3D"font-size: 10pt; font-family: Tahoma, sans-serif;"=
 class=3D""> Linda Dunbar
<br class=3D"">
<b class=3D"">Sent:</b> Wednesday, November 18, 2015 5:42 PM<br class=3D"">
<b class=3D"">To:</b> '<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.=
org</a>'; 'Paul Quinn (paulq)'; 'Elzur, Uri'<br class=3D"">
<b class=3D"">Subject:</b> draft-ietf-sfc-nsf-01: It makes more sense to st=
ate &quot;MD-type =3D 0x2&quot; (zero or more Variable) as &quot;MUST&quot;=
 and MD-type=3D0x1&quot; as &quot; SHOULD&quot;
<o:p class=3D""></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&nbs=
p;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&=
nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D"">Paul and Uri, <o:=
p class=3D""></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&=
nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D"">The Section 3.2 o=
f &nbsp;draft-ietf-sfc-nsf-01 says:<o:p class=3D""></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" class=3D""><span id=3D"cid:imag=
e001.png@01D12226.FDF81290">&lt;image001.png&gt;</span><o:p class=3D""></o:=
p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&=
nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"font-size: 11pt; fo=
nt-family: Calibri, sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p c=
lass=3D"">&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D"">As both MD-type 1=
 and MD-type 2 are specified by the draft, a more reasonable approach is ha=
ving the minimum common part (i.e. the first 8 bytes) as the MUST. As the M=
D-TYPE 2 allows minimum 0 context header
 (or 16 bytes context header), the MD-TYPE 2 should be a MUST support. And =
MD-TYPE 1 is a =93SHOULD=94 support.
<o:p class=3D""></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&=
nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D"">Let=92s face it, =
the majority of SFC deployment probably won=92t need the all 16 bytes &quot=
;context header&quot; (which has higher chance of packet fragmentation).
<o:p class=3D""></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D""><o:p class=3D"">&=
nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D" class=
=3D""><o:p class=3D"">&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" class=3D"">Linda<o:p class=
=3D""></o:p></span></p>
</div>
</div>
</div>
</blockquote>
</div>
<br class=3D"">
</div>
</div>
</blockquote>
</span>
</body>
</html>

--_000_D273AF56849AAandrewdolganowalcatellucentcom_--


From nobody Thu Nov 19 17:16:56 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 049371A03A5 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:16:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DHZkagzatgjO for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:16:51 -0800 (PST)
Received: from g2t2354.austin.hp.com (g2t2354.austin.hp.com [15.217.128.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C53231A03A3 for <sfc@ietf.org>; Thu, 19 Nov 2015 17:16:51 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g2t2354.austin.hp.com (Postfix) with ESMTPS id 0E7C754; Fri, 20 Nov 2015 01:16:51 +0000 (UTC)
Received: from G1W5782.americas.hpqcorp.net (16.193.26.0) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Fri, 20 Nov 2015 01:14:32 +0000
Received: from G1W3656.americas.hpqcorp.net ([169.254.3.159]) by G1W5782.americas.hpqcorp.net ([16.193.26.0]) with mapi id 14.03.0169.001; Fri, 20 Nov 2015 01:14:32 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: "Dolganow, Andrew (Andrew)" <andrew.dolganow@alcatel-lucent.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, Qin Wu <bill.wu@huawei.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Z6kGlQw
Date: Fri, 20 Nov 2015 01:14:31 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254ABD88@G1W3656.americas.hpqcorp.net>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com>
In-Reply-To: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.193.232.30]
Content-Type: multipart/alternative; boundary="_000_94DA9C7F532AD946852C9C5527195239254ABD88G1W3656americas_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/uUf2PqtBPsMGHbG1JQfTIFisAWc>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 01:16:55 -0000

--_000_94DA9C7F532AD946852C9C5527195239254ABD88G1W3656americas_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Andrew:

I think the point here is that there may be a lot of applications which don=
't need either the fixed or TLV meta-data and therefore we should not force=
 implementation to support the fixed headers.

Cheers,

Paul

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dolganow, Andrew (Andr=
ew)
Sent: Thursday, November 19, 2015 4:57 PM
To: Paul Quinn (paulq); Qin Wu
Cc: uri.elzur@intel.com; sfc@ietf.org; Linda Dunbar
Subject: Re: [sfc] NSH context headers: fixed/tlv

Agree with Paul.  There were lengthy discussions in the past that led to th=
e current version of the draft. I see no reason to re-open the decisions ma=
de before.

Andrew

On 2015-11-19, 2:01 PM, "sfc on behalf of Paul Quinn (paulq)" wrote:

Qin,

I've updated to the subject line to reflect the topic more accurately.  Ref=
erring to "cisco" context headers is misleading, and frankly indicates a la=
ck of understanding of how a document is adopted.

Further, and I'm sure the chairs will weigh in, but as an IETF participants=
, you should know that IETF procedure is _not_ vote based.  The NSH draft w=
as adopted based on working group consensus, and as such received significa=
nt review.  Similarly, consensus is required for updates.   Please read RFC=
2418, section 3.3 in particular.


On Nov 18, 2015, at 10:07 PM, Qin Wu <bill.wu@huawei.com<mailto:bill.wu@hua=
wei.com>> wrote:

+1, it is not clear to me why 4 context headers MUST be required for MD-TYP=
E 1,

This was discussed on list, prior to adoption, please feel free to review t=
he archives.  In summary, parsing TLVs is a complex operation, particularly=
 in hardware, and as such, a simple fixed header provided an easy to implem=
ent metadata solution.  The TLV option is there as well but since the simpl=
est case is needed as a minimum, that is the mandatory piece.  Adding TLV s=
upport (i.e. a flexible parser) means you can probably support type-1 as we=
ll so the MUST/SHOULD does not create an added burden.



It looks more flexible to have variable length context header for MD-TYPE 2=
.




-Qin
From: Linda Dunbar
Sent: Wednesday, November 18, 2015 5:42 PM
To: 'sfc@ietf.org<mailto:sfc@ietf.org>'; 'Paul Quinn (paulq)'; 'Elzur, Uri'
Subject: draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type =3D 0=
x2" (zero or more Variable) as "MUST" and MD-type=3D0x1" as " SHOULD"




Paul and Uri,



The Section 3.2 of  draft-ietf-sfc-nsf-01 says:

<image001.png>





As both MD-type 1 and MD-type 2 are specified by the draft, a more reasonab=
le approach is having the minimum common part (i.e. the first 8 bytes) as t=
he MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes cont=
ext header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a "SH=
OULD" support.



Let's face it, the majority of SFC deployment probably won't need the all 1=
6 bytes "context header" (which has higher chance of packet fragmentation).




Linda


--_000_94DA9C7F532AD946852C9C5527195239254ABD88G1W3656americas_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
p.a, li.a, div.a
	{mso-style-name:\7EAF\6587\672C;
	mso-style-link:"\7EAF\6587\672C Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.Char
	{mso-style-name:"\7EAF\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\7EAF\6587\672C;
	font-family:SimSun;}
p.a0, li.a0, div.a0
	{mso-style-name:\6279\6CE8\6846\6587\672C;
	mso-style-link:"\6279\6CE8\6846\6587\672C Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.Char0
	{mso-style-name:"\6279\6CE8\6846\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\6279\6CE8\6846\6587\672C;
	font-family:"Calibri",sans-serif;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle29
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle30
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Andrew:<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the point here=
 is that there may be a lot of applications which don&#8217;t need either t=
he fixed or TLV meta-data and therefore we should not force implementation =
to support the fixed headers.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Cheers,<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Paul<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:sfc-bounces@ietf.org] <b>On=
 Behalf Of
</b>Dolganow, Andrew (Andrew)<br>
<b>Sent:</b> Thursday, November 19, 2015 4:57 PM<br>
<b>To:</b> Paul Quinn (paulq); Qin Wu<br>
<b>Cc:</b> uri.elzur@intel.com; sfc@ietf.org; Linda Dunbar<br>
<b>Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Agree w=
ith Paul. &nbsp;There were lengthy discussions in the past that led to the =
current version of the draft. I see no reason to re-open the decisions made=
 before.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Andrew&=
nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">On 2015=
-11-19, 2:01 PM, &quot;sfc on behalf of Paul Quinn (paulq)&quot; wrote:<o:p=
></o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0i=
n 0in 0in 4.0pt;margin-left:3.75pt;margin-right:0in" id=3D"MAC_OUTLOOK_ATTR=
IBUTION_BLOCKQUOTE">
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Qin,<o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I've up=
dated to the subject line to reflect the topic more accurately. &nbsp;Refer=
ring to &quot;cisco&quot; context headers is misleading, and frankly indica=
tes a lack of understanding of how a document is adopted.
 &nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Further=
, and I'm sure the chairs will weigh in, but as an IETF participants, you s=
hould know that IETF procedure is _not_ vote based. &nbsp;The NSH draft was=
 adopted based on working group consensus,
 and as such received significant review. &nbsp;Similarly, consensus is req=
uired for updates. &nbsp; Please read RFC2418, section 3.3 in particular. &=
nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">On Nov =
18, 2015, at 10:07 PM, Qin Wu &lt;<a href=3D"mailto:bill.wu@huawei.com">bil=
l.wu@huawei.com</a>&gt; wrote:<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D;mso-fareast-language:ZH=
-CN">&#43;1, it is not clear to me why 4 context headers MUST be required f=
or MD-TYPE 1,</span><span style=3D"color:black;mso-fareast-language:ZH-CN">=
<o:p></o:p></span></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">This wa=
s discussed on list, prior to adoption, please feel free to review the arch=
ives. &nbsp;In summary, parsing TLVs is a complex operation, particularly i=
n hardware, and as such, a simple fixed header
 provided an easy to implement metadata solution. &nbsp;The TLV option is t=
here as well but since the simplest case is needed as a minimum, that is th=
e mandatory piece. &nbsp;Adding TLV support (i.e. a flexible parser) means =
you can probably support type-1 as well so
 the MUST/SHOULD does not create an added burden.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><br>
<br>
<o:p></o:p></span></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1F497D;mso-fa=
reast-language:ZH-CN">It looks more flexible to have variable length contex=
t header for MD-TYPE 2.</span><span style=3D"color:black;mso-fareast-langua=
ge:ZH-CN"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1F497D;mso-fa=
reast-language:ZH-CN">&nbsp;</span><span style=3D"color:black;mso-fareast-l=
anguage:ZH-CN"><o:p></o:p></span></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><br>
<br>
<o:p></o:p></span></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1F497D;mso-fa=
reast-language:ZH-CN">-Qin</span><span style=3D"color:black;mso-fareast-lan=
guage:ZH-CN"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif;color:black;mso-fareast-language:ZH-CN">From:</spa=
n></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,sans-s=
erif;color:black;mso-fareast-language:ZH-CN"> Linda Dunbar
<br>
<b>Sent:</b> Wednesday, November 18, 2015 5:42 PM<br>
<b>To:</b> '<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>'; 'Paul Quinn =
(paulq)'; 'Elzur, Uri'<br>
<b>Subject:</b> draft-ietf-sfc-nsf-01: It makes more sense to state &quot;M=
D-type =3D 0x2&quot; (zero or more Variable) as &quot;MUST&quot; and MD-typ=
e=3D0x1&quot; as &quot; SHOULD&quot;
</span><span style=3D"color:black;mso-fareast-language:ZH-CN"><o:p></o:p></=
span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black;mso-fareast-language:ZH-C=
N">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">Paul and Uri,
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">The Section 3.2 of &nbsp;draft-=
ietf-sfc-nsf-01 says:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black;mso-fareast-language:ZH-C=
N">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black;mso-fareast-language:ZH-C=
N">&lt;image001.png&gt;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#1F497D;mso-fareast-language=
:ZH-CN">&nbsp;</span><span style=3D"font-size:10.5pt;font-family:Consolas;c=
olor:black;mso-fareast-language:ZH-CN"><o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">As both MD-type 1 and MD-type 2=
 are specified by the draft, a more reasonable approach is having the minim=
um common part (i.e. the first 8 bytes)
 as the MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes=
 context header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is =
a &#8220;SHOULD&#8221; support.
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">Let&#8217;s face it, the majori=
ty of SFC deployment probably won&#8217;t need the all 16 bytes &quot;conte=
xt header&quot; (which has higher chance of packet fragmentation).
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D;mso-fareast-language:ZH=
-CN">&nbsp;</span><span style=3D"color:black;mso-fareast-language:ZH-CN"><o=
:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"font-size:10.5pt;font-family:Conso=
las;color:black;mso-fareast-language:ZH-CN">Linda<o:p></o:p></span></p>
</div>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
</div>
</blockquote>
</div>
</body>
</html>

--_000_94DA9C7F532AD946852C9C5527195239254ABD88G1W3656americas_--


From nobody Thu Nov 19 17:19:52 2015
Return-Path: <cathy.zhou@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2069F1A03FF for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:19:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.786
X-Spam-Level: 
X-Spam-Status: No, score=-4.786 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jf3AEReqUGnF for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:19:48 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 861F11A03F9 for <sfc@ietf.org>; Thu, 19 Nov 2015 17:19:47 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAO58748; Fri, 20 Nov 2015 01:19:45 +0000 (GMT)
Received: from SZXEMA414-HUB.china.huawei.com (10.82.72.73) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 20 Nov 2015 01:19:44 +0000
Received: from SZXEMA512-MBX.china.huawei.com ([169.254.7.84]) by SZXEMA414-HUB.china.huawei.com ([10.82.72.73]) with mapi id 14.03.0235.001; Fri, 20 Nov 2015 09:19:41 +0800
From: "Zhouqian (Cathy)" <cathy.zhou@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Re: [sfc] draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type = 0x2" (zero or more Variable) as "MUST" and MD-type=0x1" as " SHOULD"
Thread-Index: AdEjMYeSPRPImGYQTIyHiL4/esmt1A==
Date: Fri, 20 Nov 2015 01:19:40 +0000
Message-ID: <A6A061BEE5DDC94A9692D9D81AF776DF40A6A9F8@SZXEMA512-MBX.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.66.77.95]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090201.564E7531.008C, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.7.84, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: b2f95d7f82b29f4bb7cb52f919c7a234
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/A64ttDZqb1V-CuUjYDGaGYd8r3A>
Subject: Re: [sfc] draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type = 0x2" (zero or more Variable) as "MUST" and MD-type=0x1" as " SHOULD"
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 01:19:50 -0000

I support Linda's opinion.

Cathy

From: Linda Dunbar=20
Sent: Wednesday, November 18, 2015 5:42 PM
To: 'sfc@ietf.org'; 'Paul Quinn (paulq)'; 'Elzur, Uri'
Subject: draft-ietf-sfc-nsf-01: It makes more sense to state "MD-type =3D 0=
x2" (zero or more Variable) as "MUST" and MD-type=3D0x1" as " SHOULD"=20


Paul and Uri,=20

The Section 3.2 of  draft-ietf-sfc-nsf-01 says:

=20


As both MD-type 1 and MD-type 2 are specified by the draft, a more reasonab=
le approach is having the minimum common part (i.e. the first 8 bytes) as t=
he MUST. As the MD-TYPE 2 allows minimum 0 context header (or 16 bytes cont=
ext header), the MD-TYPE 2 should be a MUST support. And MD-TYPE 1 is a "SH=
OULD" support.=20

Let's face it, the majority of SFC deployment probably won't need the all 1=
6 bytes "context header" (which has higher chance of packet fragmentation).=
=20


Linda


From nobody Thu Nov 19 17:30:29 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AD9A1A1A19 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:30:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nDUNU0Hmks80 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:30:26 -0800 (PST)
Received: from mxb2.tigertech.net (mxb2.tigertech.net [208.80.4.164]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1CDE1A1A14 for <sfc@ietf.org>; Thu, 19 Nov 2015 17:30:25 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id D99307A0048; Thu, 19 Nov 2015 17:30:25 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 3D3751C071F; Thu, 19 Nov 2015 17:30:25 -0800 (PST)
To: Qin Wu <bill.wu@huawei.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <94DA9C7F532AD946852C9C5527195239254ABD88@G1W3656.americas.hpqcorp.net>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <564E77AF.9090905@joelhalpern.com>
Date: Thu, 19 Nov 2015 20:30:23 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <94DA9C7F532AD946852C9C5527195239254ABD88@G1W3656.americas.hpqcorp.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8Yuz8irRaO55GI_pJer2bRHPsA4>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 01:30:28 -0000

 From where I sit, it seems likely that metadata will be needed in many, 
possibly almost all, situations.

What is unclear to me is whether most of those cases can be dealt with 
reasonably well by 4 fixed length fields, or are significantly better 
dealt with by TLV structured metadata.

the reason I include the reasonably / significant caveat is that there 
are clearly processing advantages if we can keep the header small and fixed.

Yours,
Joel

On 11/19/15 8:14 PM, Bottorff, Paul wrote:
> Andrew:
>
> I think the point here is that there may be a lot of applications which
> don’t need either the fixed or TLV meta-data and therefore we should not
> force implementation to support the fixed headers.
>
> Cheers,
>
> Paul
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Dolganow,
> Andrew (Andrew)
> *Sent:* Thursday, November 19, 2015 4:57 PM
> *To:* Paul Quinn (paulq); Qin Wu
> *Cc:* uri.elzur@intel.com; sfc@ietf.org; Linda Dunbar
> *Subject:* Re: [sfc] NSH context headers: fixed/tlv
>
> Agree with Paul.  There were lengthy discussions in the past that led to
> the current version of the draft. I see no reason to re-open the
> decisions made before.
>
> Andrew
>
> On 2015-11-19, 2:01 PM, "sfc on behalf of Paul Quinn (paulq)" wrote:
>
>     Qin,
>
>     I've updated to the subject line to reflect the topic more
>     accurately.  Referring to "cisco" context headers is misleading, and
>     frankly indicates a lack of understanding of how a document is adopted.
>
>     Further, and I'm sure the chairs will weigh in, but as an IETF
>     participants, you should know that IETF procedure is _not_ vote
>     based.  The NSH draft was adopted based on working group consensus,
>     and as such received significant review.  Similarly, consensus is
>     required for updates.   Please read RFC2418, section 3.3 in particular.
>
>         On Nov 18, 2015, at 10:07 PM, Qin Wu <bill.wu@huawei.com
>         <mailto:bill.wu@huawei.com>> wrote:
>
>         +1, it is not clear to me why 4 context headers MUST be required
>         for MD-TYPE 1,
>
>     This was discussed on list, prior to adoption, please feel free to
>     review the archives.  In summary, parsing TLVs is a complex
>     operation, particularly in hardware, and as such, a simple fixed
>     header provided an easy to implement metadata solution.  The TLV
>     option is there as well but since the simplest case is needed as a
>     minimum, that is the mandatory piece.  Adding TLV support (i.e. a
>     flexible parser) means you can probably support type-1 as well so
>     the MUST/SHOULD does not create an added burden.
>
>
>
>         It looks more flexible to have variable length context header
>         for MD-TYPE 2.
>
>
>
>         -Qin
>
>         *From:*Linda Dunbar
>         *Sent:* Wednesday, November 18, 2015 5:42 PM
>         *To:* 'sfc@ietf.org <mailto:sfc@ietf.org>'; 'Paul Quinn
>         (paulq)'; 'Elzur, Uri'
>         *Subject:* draft-ietf-sfc-nsf-01: It makes more sense to state
>         "MD-type = 0x2" (zero or more Variable) as "MUST" and
>         MD-type=0x1" as " SHOULD"
>
>         Paul and Uri,
>
>         The Section 3.2 of  draft-ietf-sfc-nsf-01 says:
>
>         <image001.png>
>
>         As both MD-type 1 and MD-type 2 are specified by the draft, a
>         more reasonable approach is having the minimum common part (i.e.
>         the first 8 bytes) as the MUST. As the MD-TYPE 2 allows minimum
>         0 context header (or 16 bytes context header), the MD-TYPE 2
>         should be a MUST support. And MD-TYPE 1 is a “SHOULD” support.
>
>         Let’s face it, the majority of SFC deployment probably won’t
>         need the all 16 bytes "context header" (which has higher chance
>         of packet fragmentation).
>
>         Linda
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Nov 19 17:37:37 2015
Return-Path: <bill.wu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0C241A1A57 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:37:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.785
X-Spam-Level: 
X-Spam-Status: No, score=-4.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6uw7Wx26CZ6c for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:37:32 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 373C21A1A50 for <sfc@ietf.org>; Thu, 19 Nov 2015 17:37:31 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAO59796; Fri, 20 Nov 2015 01:37:27 +0000 (GMT)
Received: from NKGEML401-HUB.china.huawei.com (10.98.56.32) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 20 Nov 2015 01:37:26 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.12]) by nkgeml401-hub.china.huawei.com ([10.98.56.32]) with mapi id 14.03.0235.001; Fri, 20 Nov 2015 09:37:15 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: NSH context headers: fixed/tlv
Thread-Index: AQHRIzP8hJOUKGZbgUWwwbKO26FiBA==
Date: Fri, 20 Nov 2015 01:37:15 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA848C0509@nkgeml501-mbs.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA848BF0C5@nkgeml501-mbs.china.huawei.com> <5E0943CD-91DE-4E9C-BFF7-D0A3BDFC63AF@cisco.com>
In-Reply-To: <5E0943CD-91DE-4E9C-BFF7-D0A3BDFC63AF@cisco.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.136.79.38]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABA848C0509nkgeml501mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090201.564E7957.0055, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.2.12, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: dc5ee88e81485647550609988ae36b79
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/g7hvZ-tXfaRsVjREnPPGACbvSLw>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 01:37:35 -0000

--_000_B8F9A780D330094D99AF023C5877DABA848C0509nkgeml501mbschi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABA848C0509nkgeml501mbschi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTIgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
SGVsdmV0aWNhOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30NCkBmb250LWZhY2UN
Cgl7Zm9udC1mYW1pbHk65a6L5L2TOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0K
QGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQg
NSAzIDUgNCA2IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglw
YW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5
OiJcQOWui+S9kyI7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQpAZm9udC1mYWNl
DQoJe2ZvbnQtZmFtaWx5OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9
DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNvbnNvbGFzOw0KCXBhbm9zZS0xOjIgMTEgNiA5
IDIgMiA0IDMgMiA0O30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGku
TXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowY207DQoJbWFyZ2luLWJvdHRvbTou
MDAwMXB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk65a6L5L2TO30NCmE6bGlu
aywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9yOmJs
dWU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQphOnZpc2l0ZWQsIHNwYW4uTXNvSHlw
ZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9yOnB1cnBsZTsN
Cgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCnAuTXNvQWNldGF0ZSwgbGkuTXNvQWNldGF0
ZSwgZGl2Lk1zb0FjZXRhdGUNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1s
aW5rOiLmibnms6jmoYbmlofmnKwgQ2hhciI7DQoJbWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9t
Oi4wMDAxcHQ7DQoJZm9udC1zaXplOjkuMHB0Ow0KCWZvbnQtZmFtaWx5OuWui+S9kzt9DQpzcGFu
LmFwcGxlLWNvbnZlcnRlZC1zcGFjZQ0KCXttc28tc3R5bGUtbmFtZTphcHBsZS1jb252ZXJ0ZWQt
c3BhY2U7fQ0Kc3Bhbi5DaGFyDQoJe21zby1zdHlsZS1uYW1lOiLmibnms6jmoYbmlofmnKwgQ2hh
ciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOuaJueazqOahhuaW
h+acrDsNCglmb250LWZhbWlseTrlrovkvZM7fQ0Kc3Bhbi5FbWFpbFN0eWxlMjANCgl7bXNvLXN0
eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNl
cmlmIjsNCgljb2xvcjojMUY0OTdEO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBl
OmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJ
e3NpemU6NjEyLjBwdCA3OTIuMHB0Ow0KCW1hcmdpbjo3Mi4wcHQgOTAuMHB0IDcyLjBwdCA5MC4w
cHQ7fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxl
PjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIg
c3BpZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48
eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQi
IGRhdGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+
DQo8Ym9keSBsYW5nPSJaSC1DTiIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSI+DQo8ZGl2IGNs
YXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4t
VVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv
dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5IaSwmbmJzcDsgQ2FybG9z
OjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp
JnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+U29ycnkgZm9yIHRo
ZSBjb25mdXNpbmcgdGl0bGUsIHRoYW5rcyBmb3IgY2xhcmlmaWNhdGlvbiwgSSBoYXZlIGZpeGVk
IHRoZSB0aXRsZS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkkg
aGF2ZW7igJl0IGZvbGxvd2luZyB0aGUgaGlzdG9yeSBkaXNjdXNzaW9uIHJlZ2FyZGluZyBOU0gg
aW4gdGhlIE1MLCBzbyBpZiBteSBxdWVzdGlvbiBoYXMgYmVlbiBkaXNjdXNzZWQgYmVmb3JlLDxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+U29ycnkgYWJvdXQgcmVw
ZWF0aW5nIHRoaXMgcXVlc3Rpb24uIEkgYWdyZWUgZml4ZWQgaGVhZGVyIGlzIGEgZ29vZCBjaG9p
Y2UgZnJvbSBwZXJmb3JtYW5jZSBwZXJzcGVjdGl2ZSwgYnV0IHdoeSA0IGNvbnRleHQgaGVhZGVy
PzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp
JnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8
L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4tUWluPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MC4wcHQiPuWPkeS7tuS6ujxzcGFuIGxhbmc9IkVOLVVTIj46PC9zcGFuPjwvc3Bhbj48L2I+PHNw
YW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0Ij4gQ2FybG9zIFBpZ25hdGFy
byAoY3BpZ25hdGEpIFttYWlsdG86Y3BpZ25hdGFAY2lzY28uY29tXQ0KPGJyPg0KPC9zcGFuPjxi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0Ij7lj5HpgIHml7bpl7Q8c3BhbiBsYW5nPSJF
Ti1VUyI+Ojwvc3Bhbj48L3NwYW4+PC9iPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1z
aXplOjEwLjBwdCI+IDIwMTU8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQiPuW5
tDxzcGFuIGxhbmc9IkVOLVVTIj4xMTwvc3Bhbj7mnIg8c3BhbiBsYW5nPSJFTi1VUyI+MTk8L3Nw
YW4+5pelPHNwYW4gbGFuZz0iRU4tVVMiPiAyMzozODxicj4NCjwvc3Bhbj48Yj7mlLbku7bkuro8
c3BhbiBsYW5nPSJFTi1VUyI+Ojwvc3Bhbj48L2I+PHNwYW4gbGFuZz0iRU4tVVMiPiBRaW4gV3U8
YnI+DQo8L3NwYW4+PGI+5oqE6YCBPHNwYW4gbGFuZz0iRU4tVVMiPjo8L3NwYW4+PC9iPjxzcGFu
IGxhbmc9IkVOLVVTIj4gc2ZjQGlldGYub3JnOyBQYXVsIFF1aW5uIChwYXVscSk7IHVyaS5lbHp1
ckBpbnRlbC5jb207IExpbmRhIER1bmJhcjxicj4NCjwvc3Bhbj48Yj7kuLvpopg8c3BhbiBsYW5n
PSJFTi1VUyI+Ojwvc3Bhbj48L2I+PHNwYW4gbGFuZz0iRU4tVVMiPiBSZTogW3NmY10gTlNIIGNv
bnRleHQgaGVhZGVyczogZml4ZWQvdGx2PC9zcGFuPjwvc3Bhbj48c3BhbiBsYW5nPSJFTi1VUyI+
PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i
RU4tVVMiPlFpbiw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj5J4oCZ
bSB0cnlpbmcgdG8gdW5kZXJzdGFuZCB0aGUgU3ViamVjdCBoZWFkZXIgb24gdGhpcyBlbWFpbC48
bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPknigJlsbCBs
ZXQgdGhlIGNoYWlycyBqdW1wIGluLCBidXQgdGhlcmXigJlzIG5vIOKAnHZvdGXigJ0gSSBiZWxp
ZXZlIGluIHRoZSBTRkMgV0cuIFRoZXJl4oCZcyBhbHNvIG5vdCDigJxjaXNjb+KAmXMgY29udGV4
dCBoZWFkZXLigJ0uIENhcmUgdG8gZXhwbGFpbj88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4m
bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gbGFuZz0iRU4tVVMiPkxpbmRhLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj48bzpwPiZu
YnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBsYW5nPSJFTi1VUyI+WW91IGFza2VkIGJlZm9yZTo8bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1V
UyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPGJsb2NrcXVv
dGUgc3R5bGU9Im1hcmdpbi10b3A6NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx
dW90OyI+SWYgYW4gaW1wbGVtZW50YXRpb24gc3VwcG9ydHMgTUQtVHlwZSA9IDB4MiwgdGhlbiBp
dCBpcyBub3Qgc3VwcG9ydGluZyBNRC1UeXBlID0gMHgxLiBTbyB3aGF0IGRvZXMgaXQgbWVhbiBi
eSBzYXlpbmcgJnF1b3Q7TXVzdCBTdXBwb3J0JnF1b3Q7PzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj5BbiBpbXBs
ZW1lbnRhdGlvbiBpcyBhYmxlIHRvIHN1cHBvcnQgYm90aC4gSXQgaXMgbm90IHRoYXQgaWYgYW4g
aW1wbGVtZW50YXRpb24gc3VwcG9ydHMgTUQtVHlwZSAyLCBpdCBpcyBub3Qgc3VwcG9ydGluZyBN
RC1UeXBlIDEuIE9ubHkgb25lIHdvdWxkIGJlIHVzZWQgZm9yIGEgZ2l2ZW4gU0ZQLCBidXQgdGhh
dOKAmXMgYSBkaWZmZXJlbnQgcXVlc3Rpb24uPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5i
c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIGxhbmc9IkVOLVVTIj5QbGVhc2Ugc2VlIGlubGluZSwgbXkgYWRkaXRpb25hbCAkMC4w
Mi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRp
dj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206NS4w
cHQiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj5PbiBO
b3YgMTgsIDIwMTUsIGF0IDEwOjA3IFBNLCBRaW4gV3UgJmx0OzxhIGhyZWY9Im1haWx0bzpiaWxs
Lnd1QGh1YXdlaS5jb20iPmJpbGwud3VAaHVhd2VpLmNvbTwvYT4mZ3Q7IHdyb3RlOjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i
RU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztj
b2xvcjojMUY0OTdEIj4mIzQzOzEsIGl0IGlzIG5vdCBjbGVhciB0byBtZSB3aHkgNCBjb250ZXh0
IGhlYWRlcnMgTVVTVCBiZSByZXF1aXJlZCBmb3IgTUQtVFlQRSAxLDwvc3Bhbj48c3BhbiBsYW5n
PSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5
bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkl0IGxvb2tzIG1vcmUgZmxleGlibGUg
dG8gaGF2ZSB2YXJpYWJsZSBsZW5ndGggY29udGV4dCBoZWFkZXIgZm9yIE1ELVRZUEUgMi48L3Nw
YW4+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFu
Zz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3Nw
YW4+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFu
Zz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4tUWluPC9zcGFu
PjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10
b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0IDBjbSAwY20gMGNtIj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
c2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDsiPkZyb206PC9zcGFuPjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNw
YWNlIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPiZuYnNwOzwvc3Bh
bj48L3NwYW4+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5MaW5kYQ0K
IER1bmJhcjxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48
YnI+DQo8Yj5TZW50OjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJz
cDs8L3NwYW4+V2VkbmVzZGF5LCBOb3ZlbWJlciAxOCwgMjAxNSA1OjQyIFBNPGJyPg0KPGI+VG86
PC9iPjxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj4nPGEg
aHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9yZyI+PHNwYW4gc3R5bGU9ImNvbG9yOnB1cnBsZSI+c2Zj
QGlldGYub3JnPC9zcGFuPjwvYT4nOyAnUGF1bCBRdWlubiAocGF1bHEpJzsgJ0VsenVyLCBVcmkn
PGJyPg0KPGI+U3ViamVjdDo8L2I+PHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+
Jm5ic3A7PC9zcGFuPmRyYWZ0LWlldGYtc2ZjLW5zZi0wMTogSXQgbWFrZXMgbW9yZSBzZW5zZSB0
byBzdGF0ZSAmcXVvdDtNRC10eXBlID0gMHgyJnF1b3Q7ICh6ZXJvIG9yIG1vcmUgVmFyaWFibGUp
IGFzICZxdW90O01VU1QmcXVvdDsgYW5kIE1ELXR5cGU9MHgxJnF1b3Q7IGFzICZxdW90OyBTSE9V
TEQmcXVvdDs8L3NwYW4+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+
PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVv
dDsiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtm
b250LWZhbWlseTpDb25zb2xhcyI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJm
b250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj5QYXVsIGFuZCBVcmksPHNwYW4g
Y2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jm5i
c3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFt
aWx5OkNvbnNvbGFzIj5UaGUgU2VjdGlvbiAzLjIgb2YgJm5ic3A7ZHJhZnQtaWV0Zi1zZmMtbnNm
LTAxIHNheXM6PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+Jm5i
c3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+Jmx0O2ltYWdl
MDAxLnBuZyZndDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7
Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0i
Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3Nh
bnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIGxhbmc9IkVO
LVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+PG86cD48
L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNv
bGFzIj5BcyBib3RoIE1ELXR5cGUgMSBhbmQgTUQtdHlwZSAyIGFyZSBzcGVjaWZpZWQgYnkgdGhl
IGRyYWZ0LCBhIG1vcmUgcmVhc29uYWJsZSBhcHByb2FjaCBpcyBoYXZpbmcgdGhlIG1pbmltdW0g
Y29tbW9uIHBhcnQgKGkuZS4gdGhlIGZpcnN0IDggYnl0ZXMpIGFzIHRoZSBNVVNULiBBcyB0aGUg
TUQtVFlQRQ0KIDIgYWxsb3dzIG1pbmltdW0gMCBjb250ZXh0IGhlYWRlciAob3IgMTYgYnl0ZXMg
Y29udGV4dCBoZWFkZXIpLCB0aGUgTUQtVFlQRSAyIHNob3VsZCBiZSBhIE1VU1Qgc3VwcG9ydC4g
QW5kIE1ELVRZUEUgMSBpcyBhIOKAnFNIT1VMROKAnSBzdXBwb3J0LjxvOnA+PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jm5ic3A7
PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8
L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gbGFuZz0iRU4tVVMiPlRoZSBkaWZmZXJlbnQgTUQtVHlwZXMgYXJlIG9wdGltaXppbmcgZGlm
ZmVyZW50IHRoaW5nczogTUQtVHlwZSAxIGZvciBwZXJmb3JtYW5jZSBhbmQgSFcsIE1ELVR5cGUg
MiBmb3IgZmxleGliaWxpdHkuIFRoZSBpZGVhIGlzIHRoYXQgdGhlIG1vcmUgd2UgY2FuIHVzZSBm
aXhlZCBoZWFkZXJzIHRoZSBiZXR0ZXIsIGFzIGdldHRpbmcgdG9vIGNyZWF0aXZlIHdpdGggdGhl
IGFtb3VudA0KIG9mIG1ldGFkYXRhIGNhbiBiZSBhIGJ1ZyBtb3JlIHRoYW4gYSBmZWF0dXJlLjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
bGFuZz0iRU4tVVMiPjxicj4NCjxicj4NCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxkaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250
LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj5MZXTigJlzIGZhY2UgaXQsIHRoZSBt
YWpvcml0eSBvZiBTRkMgZGVwbG95bWVudCBwcm9iYWJseSB3b27igJl0IG5lZWQgdGhlIGFsbCAx
NiBieXRlcyAmcXVvdDtjb250ZXh0IGhlYWRlciZxdW90OyAod2hpY2ggaGFzIGhpZ2hlciBjaGFu
Y2Ugb2YgcGFja2V0IGZyYWdtZW50YXRpb24pLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj5UaGlzIGxvZ2ljIHNlZW1zIHRvIGFyZ3VlIGZv
ciBNRC1UeXBlIDEuIFByaW9yaXRpemluZyBzbWFsbGVyIGNvbnRleHQgbWV0YWRhdGEsIGluIGEg
cGVyZm9ybWFuY2UtZnJpZW5kbHkgd2F5LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj48bzpwPiZuYnNw
OzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBsYW5nPSJFTi1VUyI+VGhhbmtzLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj48bzpwPiZuYnNw
OzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBsYW5nPSJFTi1VUyI+4oCUIENhcmxvcy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4m
bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBsYW5nPSJFTi1VUyI+PGJyPg0KPGJyPg0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZv
bnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZuYnNwOzxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp
JnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFu
PjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+TGlu
ZGE8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjkuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCnNmYyBtYWlsaW5nIGxpc3Q8YnI+
DQo8L3NwYW4+PHNwYW4gbGFuZz0iRU4tVVMiPjxhIGhyZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmci
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6OS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNh
JnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6cHVycGxlIj5zZmNAaWV0Zi5vcmc8
L3NwYW4+PC9hPjwvc3Bhbj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZTo5LjBw
dDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
OyI+PGJyPg0KPC9zcGFuPjxzcGFuIGxhbmc9IkVOLVVTIj48YSBocmVmPSJodHRwczovL3d3dy5p
ZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYyI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo5LjBw
dDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
Oztjb2xvcjpwdXJwbGUiPmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2Zj
PC9zcGFuPjwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_B8F9A780D330094D99AF023C5877DABA848C0509nkgeml501mbschi_--


From nobody Thu Nov 19 17:48:10 2015
Return-Path: <andrew.dolganow@alcatel-lucent.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 281C81A1A80 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:48:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.486
X-Spam-Level: 
X-Spam-Status: No, score=-7.486 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tWQoq_uSioww for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 17:48:08 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpgre-esg-01.alcatel-lucent.com [135.245.210.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F22D01A1A8C for <sfc@ietf.org>; Thu, 19 Nov 2015 17:48:07 -0800 (PST)
Received: from us70tusmtp1.zam.alcatel-lucent.com (unknown [135.5.2.63]) by Websense Email Security Gateway with ESMTPS id 9ED55B1FDB438; Fri, 20 Nov 2015 01:48:04 +0000 (GMT)
Received: from US70TWXCHHUB03.zam.alcatel-lucent.com (us70twxchhub03.zam.alcatel-lucent.com [135.5.2.35]) by us70tusmtp1.zam.alcatel-lucent.com (GMO) with ESMTP id tAK1m1NQ004768 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 20 Nov 2015 01:48:03 GMT
Received: from US70UWXCHMBA03.zam.alcatel-lucent.com ([169.254.9.242]) by US70TWXCHHUB03.zam.alcatel-lucent.com ([135.5.2.35]) with mapi id 14.03.0195.001; Thu, 19 Nov 2015 20:48:02 -0500
From: "Dolganow, Andrew (Andrew)" <andrew.dolganow@alcatel-lucent.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Z6kGlQwgABZLYD//7EdGg==
Date: Fri, 20 Nov 2015 01:48:01 +0000
Message-ID: <1221A079-FE93-41CE-BF9A-4284CCC6F780@alcatel-lucent.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <94DA9C7F532AD946852C9C5527195239254ABD88@G1W3656.americas.hpqcorp.net>, <564E77AF.9090905@joelhalpern.com>
In-Reply-To: <564E77AF.9090905@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-SG
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/MxRGxkxoLzxgrOa0kakjtO3VwqM>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, Qin Wu <bill.wu@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 01:48:10 -0000

I see both cases of Type 1 and Type 2 being present/used. I think fixed hea=
der offers many advantages thus natural tendency will be to try to solve re=
quirements with the metadata fixed header before considering TLVs.=20

Andrew

Sent from my iPhone

> On 19 Nov 2015, at 5:30 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>=20
> From where I sit, it seems likely that metadata will be needed in many, p=
ossibly almost all, situations.
>=20
> What is unclear to me is whether most of those cases can be dealt with re=
asonably well by 4 fixed length fields, or are significantly better dealt w=
ith by TLV structured metadata.
>=20
> the reason I include the reasonably / significant caveat is that there ar=
e clearly processing advantages if we can keep the header small and fixed.
>=20
> Yours,
> Joel
>=20
>> On 11/19/15 8:14 PM, Bottorff, Paul wrote:
>> Andrew:
>>=20
>> I think the point here is that there may be a lot of applications which
>> don=92t need either the fixed or TLV meta-data and therefore we should n=
ot
>> force implementation to support the fixed headers.
>>=20
>> Cheers,
>>=20
>> Paul
>>=20
>> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Dolganow,
>> Andrew (Andrew)
>> *Sent:* Thursday, November 19, 2015 4:57 PM
>> *To:* Paul Quinn (paulq); Qin Wu
>> *Cc:* uri.elzur@intel.com; sfc@ietf.org; Linda Dunbar
>> *Subject:* Re: [sfc] NSH context headers: fixed/tlv
>>=20
>> Agree with Paul.  There were lengthy discussions in the past that led to
>> the current version of the draft. I see no reason to re-open the
>> decisions made before.
>>=20
>> Andrew
>>=20
>> On 2015-11-19, 2:01 PM, "sfc on behalf of Paul Quinn (paulq)" wrote:
>>=20
>>    Qin,
>>=20
>>    I've updated to the subject line to reflect the topic more
>>    accurately.  Referring to "cisco" context headers is misleading, and
>>    frankly indicates a lack of understanding of how a document is adopte=
d.
>>=20
>>    Further, and I'm sure the chairs will weigh in, but as an IETF
>>    participants, you should know that IETF procedure is _not_ vote
>>    based.  The NSH draft was adopted based on working group consensus,
>>    and as such received significant review.  Similarly, consensus is
>>    required for updates.   Please read RFC2418, section 3.3 in particula=
r.
>>=20
>>        On Nov 18, 2015, at 10:07 PM, Qin Wu <bill.wu@huawei.com
>>        <mailto:bill.wu@huawei.com>> wrote:
>>=20
>>        +1, it is not clear to me why 4 context headers MUST be required
>>        for MD-TYPE 1,
>>=20
>>    This was discussed on list, prior to adoption, please feel free to
>>    review the archives.  In summary, parsing TLVs is a complex
>>    operation, particularly in hardware, and as such, a simple fixed
>>    header provided an easy to implement metadata solution.  The TLV
>>    option is there as well but since the simplest case is needed as a
>>    minimum, that is the mandatory piece.  Adding TLV support (i.e. a
>>    flexible parser) means you can probably support type-1 as well so
>>    the MUST/SHOULD does not create an added burden.
>>=20
>>=20
>>=20
>>        It looks more flexible to have variable length context header
>>        for MD-TYPE 2.
>>=20
>>=20
>>=20
>>        -Qin
>>=20
>>        *From:*Linda Dunbar
>>        *Sent:* Wednesday, November 18, 2015 5:42 PM
>>        *To:* 'sfc@ietf.org <mailto:sfc@ietf.org>'; 'Paul Quinn
>>        (paulq)'; 'Elzur, Uri'
>>        *Subject:* draft-ietf-sfc-nsf-01: It makes more sense to state
>>        "MD-type =3D 0x2" (zero or more Variable) as "MUST" and
>>        MD-type=3D0x1" as " SHOULD"
>>=20
>>        Paul and Uri,
>>=20
>>        The Section 3.2 of  draft-ietf-sfc-nsf-01 says:
>>=20
>>        <image001.png>
>>=20
>>        As both MD-type 1 and MD-type 2 are specified by the draft, a
>>        more reasonable approach is having the minimum common part (i.e.
>>        the first 8 bytes) as the MUST. As the MD-TYPE 2 allows minimum
>>        0 context header (or 16 bytes context header), the MD-TYPE 2
>>        should be a MUST support. And MD-TYPE 1 is a =93SHOULD=94 support=
.
>>=20
>>        Let=92s face it, the majority of SFC deployment probably won=92t
>>        need the all 16 bytes "context header" (which has higher chance
>>        of packet fragmentation).
>>=20
>>        Linda
>>=20
>>=20
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 19 18:28:59 2015
Return-Path: <bill.wu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFDEA1A1BE3 for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 18:28:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.335
X-Spam-Level: 
X-Spam-Status: No, score=-2.335 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ry1iGuPrKRRj for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 18:28:56 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 089961A1BDE for <sfc@ietf.org>; Thu, 19 Nov 2015 18:28:54 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEI99749; Fri, 20 Nov 2015 02:28:52 +0000 (GMT)
Received: from NKGEML408-HUB.china.huawei.com (10.98.56.39) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 20 Nov 2015 02:28:50 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.12]) by nkgeml408-hub.china.huawei.com ([10.98.56.39]) with mapi id 14.03.0235.001; Fri, 20 Nov 2015 10:28:38 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Dolganow, Andrew (Andrew)" <andrew.dolganow@alcatel-lucent.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Z6kIicg
Date: Fri, 20 Nov 2015 02:28:38 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com>
In-Reply-To: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.136.79.38]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABA848C056Dnkgeml501mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0202.564E8565.0033, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.2.12, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: fa7feb271532237e817e07baeae5b362
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2mKbR1Q57tX6cx20_DECffKUgMc>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 02:28:58 -0000

--_000_B8F9A780D330094D99AF023C5877DABA848C056Dnkgeml501mbschi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABA848C056Dnkgeml501mbschi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=CB=CE=CC=E5";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"=B4=BF=CE=C4=B1=BE Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"=C5=FA=D7=A2=BF=F2=CE=C4=B1=BE Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.Char
	{mso-style-name:"=B4=BF=CE=C4=B1=BE Char";
	mso-style-priority:99;
	mso-style-link:=B4=BF=CE=C4=B1=BE;
	font-family:=CB=CE=CC=E5;}
span.Char0
	{mso-style-name:"=C5=FA=D7=A2=BF=F2=CE=C4=B1=BE Char";
	mso-style-priority:99;
	mso-style-link:=C5=FA=D7=A2=BF=F2=CE=C4=B1=BE;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
p.PlainText, li.PlainText, div.PlainText
	{mso-style-name:"Plain Text";
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle29
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle30
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">Hi, Andrew and Paul:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">It looks I missed a lot of discussion regarding NSH context heade=
r in the past, thanks Paul to point me the archive.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">Generally speaking, there is tradeoff between performance and fle=
xibility.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">-Qin<o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:=CB=
=CE=CC=E5">=B7=A2=BC=FE=C8=CB<span lang=3D"EN-US">:</span></span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5"> Dolgano=
w, Andrew (Andrew) [mailto:andrew.dolganow@alcatel-lucent.com]
<br>
</span><b><span style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5">=B7=A2=
=CB=CD=CA=B1=BC=E4<span lang=3D"EN-US">:</span></span></b><span lang=3D"EN-=
US" style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5"> 2015</span><span s=
tyle=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5">=C4=EA<span lang=3D"EN-U=
S">11</span>=D4=C2<span lang=3D"EN-US">20</span>=C8=D5<span lang=3D"EN-US">
 8:57<br>
</span><b>=CA=D5=BC=FE=C8=CB<span lang=3D"EN-US">:</span></b><span lang=3D"=
EN-US"> Paul Quinn (paulq); Qin Wu<br>
</span><b>=B3=AD=CB=CD<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> uri.elzur@intel.com; sfc@ietf.org; Linda Dunbar<br>
</span><b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> Re: [sfc] NSH context headers: fixed/tlv<o:p></o:p></span></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">Agree with Paul. &nbsp;There were lengthy discussions in the past t=
hat led to the current version of the draft. I see no reason to re-open the=
 decisions made before.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">Andrew&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">On 2015-11-19, 2:01 PM, &quot;sfc on behalf of Paul Quinn (paulq)&q=
uot; wrote:<o:p></o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0c=
m 0cm 0cm 4.0pt;margin-left:3.75pt;margin-right:0cm" id=3D"MAC_OUTLOOK_ATTR=
IBUTION_BLOCKQUOTE">
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">Qin,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">I've updated to the subject line to reflect the topic more accurate=
ly. &nbsp;Referring to &quot;cisco&quot; context headers is misleading, and=
 frankly indicates a lack of understanding of how a document
 is adopted. &nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">Further, and I'm sure the chairs will weigh in, but as an IETF part=
icipants, you should know that IETF procedure is _not_ vote based. &nbsp;Th=
e NSH draft was adopted based on working group
 consensus, and as such received significant review. &nbsp;Similarly, conse=
nsus is required for updates. &nbsp; Please read RFC2418, section 3.3 in pa=
rticular. &nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">On Nov 18, 2015, at 10:07 PM, Qin Wu &lt;<a href=3D"mailto:bill.wu@=
huawei.com">bill.wu@huawei.com</a>&gt; wrote:<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&#43;1,=
 it is not clear to me why 4 context headers MUST be required for MD-TYPE 1=
,</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black">This was discussed on list, prior to adoption, please feel free to =
review the archives. &nbsp;In summary, parsing TLVs is a complex operation,=
 particularly in hardware, and as such, a simple
 fixed header provided an easy to implement metadata solution. &nbsp;The TL=
V option is there as well but since the simplest case is needed as a minimu=
m, that is the mandatory piece. &nbsp;Adding TLV support (i.e. a flexible p=
arser) means you can probably support type-1
 as well so the MUST/SHOULD does not create an added burden.<o:p></o:p></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><br>
<br>
<o:p></o:p></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">It looks more flexible to have variable length context header for=
 MD-TYPE 2.</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">&nbsp;</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:=
p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><br>
<br>
<o:p></o:p></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D">-Qin</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p>=
</span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:black">From:</spa=
n></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Taho=
ma&quot;,&quot;sans-serif&quot;;color:black"> Linda Dunbar
<br>
<b>Sent:</b> Wednesday, November 18, 2015 5:42 PM<br>
<b>To:</b> '<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>'; 'Paul Quinn =
(paulq)'; 'Elzur, Uri'<br>
<b>Subject:</b> draft-ietf-sfc-nsf-01: It makes more sense to state &quot;M=
D-type =3D 0x2&quot; (zero or more Variable) as &quot;MUST&quot; and MD-typ=
e=3D0x1&quot; as &quot; SHOULD&quot;
</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">&nbsp;<o:=
p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">&nbsp;=
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">Paul a=
nd Uri, <o:p>
</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">&nbsp;=
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">The Se=
ction 3.2 of &nbsp;draft-ietf-sfc-nsf-01 says:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">&nbsp;<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">&lt;image=
001.png&gt;<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">&nbsp;=
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;<=
/span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">As bot=
h MD-type 1 and MD-type 2 are specified by the draft, a more reasonable app=
roach is having the minimum common part (i.e. the first 8 bytes) as the MUS=
T. As the MD-TYPE 2 allows minimum 0 context
 header (or 16 bytes context header), the MD-TYPE 2 should be a MUST suppor=
t. And MD-TYPE 1 is a =A1=B0SHOULD=A1=B1 support.
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">&nbsp;=
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">Let=A1=
=AFs face it, the majority of SFC deployment probably won=A1=AFt need the a=
ll 16 bytes &quot;context header&quot; (which has higher chance of packet f=
ragmentation).
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">&nbsp;=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&nbsp;<=
/span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US" style=3D"color:black">Linda<=
o:p></o:p></span></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</blockquote>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABA848C056Dnkgeml501mbschi_--


From nobody Thu Nov 19 18:47:35 2015
Return-Path: <bill.wu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFFDB1A21AE for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 18:47:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CN_BODY_35=0.339, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QM7wjQWfbV3X for <sfc@ietfa.amsl.com>; Thu, 19 Nov 2015 18:47:30 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 392081A21A8 for <sfc@ietf.org>; Thu, 19 Nov 2015 18:47:29 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml406-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEJ00888; Fri, 20 Nov 2015 02:47:27 +0000 (GMT)
Received: from NKGEML408-HUB.china.huawei.com (10.98.56.39) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 20 Nov 2015 02:47:26 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.12]) by nkgeml408-hub.china.huawei.com ([10.98.56.39]) with mapi id 14.03.0235.001; Fri, 20 Nov 2015 10:47:16 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Z6kGlQw//9/QICAAJZ14A==
Date: Fri, 20 Nov 2015 02:47:15 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA848C0581@nkgeml501-mbs.china.huawei.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <94DA9C7F532AD946852C9C5527195239254ABD88@G1W3656.americas.hpqcorp.net> <564E77AF.9090905@joelhalpern.com>
In-Reply-To: <564E77AF.9090905@joelhalpern.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.136.79.38]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0206.564E89BF.010F, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.2.12, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: fa7feb271532237e817e07baeae5b362
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/y7acxfRoJqQnqC7zyAr1ETHdzyM>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 02:47:33 -0000
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From nobody Fri Nov 20 06:26:36 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87CB21B29A9 for <sfc@ietfa.amsl.com>; Fri, 20 Nov 2015 06:26:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VOa4YI6v3nrY for <sfc@ietfa.amsl.com>; Fri, 20 Nov 2015 06:26:33 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 042A41B29AA for <sfc@ietf.org>; Fri, 20 Nov 2015 06:26:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8628; q=dns/txt; s=iport; t=1448029591; x=1449239191; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ayoFlKRRgYtpiJVpFClmGBG95zlTa62UjCCkXnvgIJU=; b=LHu5CaHfp9d5GWBkH2clPIwWkXjr0ie7T48jLOaUqf8lXjzw4O3NC1GG e/RUV9Zjxefhtin/4lDJfv1QQG6O4I3z6wzvmYlXG3SCXAvw38qtU3oXk 30LHGyaN3F6kOBmWT7hzmqGiW8j/cGxcUSQgl3krUWhvz4FPXijUEHXPl M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D1AQAZLU9W/5ldJa1egm5NgUIGvwkBD?= =?us-ascii?q?YFlhg8CHIEqOBQBAQEBAQEBgQqENQEBBA4VCjgUEAIBCA4xAwICAjAUEQIEDgW?= =?us-ascii?q?ILq9+kEABAQEBAQEBAQEBAQEBAQEBAQEBAQEYhlSCEIJuh3UvgRUFlkwBjS6cS?= =?us-ascii?q?wEfAQFChARyhCaBBwEBAQ?=
X-IronPort-AV: E=Sophos; i="5.20,323,1444694400"; d="scan'208,217"; a="48737407"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Nov 2015 14:26:31 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id tAKEQV4J019894 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 20 Nov 2015 14:26:31 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 20 Nov 2015 08:26:30 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Fri, 20 Nov 2015 08:26:30 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Qin Wu <bill.wu@huawei.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5ejy7hwshPJkSenz9F/5cNK56klIsAgADIkYA=
Date: Fri, 20 Nov 2015 14:26:30 +0000
Message-ID: <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.231]
Content-Type: multipart/alternative; boundary="_000_36EF1E54A0D846CEAF4FEEDE873123E3ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/pKyJs5JklbTUs_xSn4olDV9xa7I>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 14:26:34 -0000

--_000_36EF1E54A0D846CEAF4FEEDE873123E3ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_36EF1E54A0D846CEAF4FEEDE873123E3ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <3BF15391E094704CB8308A6F15487473@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_36EF1E54A0D846CEAF4FEEDE873123E3ciscocom_--


From nobody Fri Nov 20 09:21:43 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E50E91B397D for <sfc@ietfa.amsl.com>; Fri, 20 Nov 2015 09:21:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IiXWLCwysKHV for <sfc@ietfa.amsl.com>; Fri, 20 Nov 2015 09:21:39 -0800 (PST)
Received: from g1t5425.austin.hp.com (g1t5425.austin.hp.com [15.216.225.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B4221B3966 for <sfc@ietf.org>; Fri, 20 Nov 2015 09:21:38 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g1t5425.austin.hp.com (Postfix) with ESMTPS id F09B760; Fri, 20 Nov 2015 17:21:37 +0000 (UTC)
Received: from G2W4312.americas.hpqcorp.net (16.197.24.214) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Fri, 20 Nov 2015 17:20:10 +0000
Received: from G1W3656.americas.hpqcorp.net ([169.254.3.159]) by G2W4312.americas.hpqcorp.net ([16.197.24.214]) with mapi id 14.03.0169.001; Fri, 20 Nov 2015 17:20:09 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Qin Wu <bill.wu@huawei.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Z6kIicggADWYQCAACTaIA==
Date: Fri, 20 Nov 2015 17:20:09 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com>
In-Reply-To: <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.193.232.31]
Content-Type: multipart/alternative; boundary="_000_94DA9C7F532AD946852C9C5527195239254ABE3AG1W3656americas_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Gj-b_uMWFi24IgISTExL14FJDuo>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 17:21:41 -0000

--_000_94DA9C7F532AD946852C9C5527195239254ABE3AG1W3656americas_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_94DA9C7F532AD946852C9C5527195239254ABE3AG1W3656americas_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_94DA9C7F532AD946852C9C5527195239254ABE3AG1W3656americas_--


From nobody Sat Nov 21 14:25:24 2015
Return-Path: <kegray@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CF5B1B2E0B for <sfc@ietfa.amsl.com>; Sat, 21 Nov 2015 14:25:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 19816K0hqlFR for <sfc@ietfa.amsl.com>; Sat, 21 Nov 2015 14:25:20 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D2F11B2E0A for <sfc@ietf.org>; Sat, 21 Nov 2015 14:25:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11859; q=dns/txt; s=iport; t=1448144720; x=1449354320; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=xMjrzDUo4FMDSp5QJQkaKMytxEbwers6gJ70ysiVmfo=; b=Rfxisrq3nqblUkObp7hl5J0RHfNuoiAyW9haYPqgequKrRxRQbA52Oxu XVgtc24o4lbSSXRX2OSekT3ChHIgPHyOMfCKD9eye6Ju/yDpkD5/Mis9Y yNQeU6DiVNoTroyNgFe57qG76ipDaqWyhmrpd5JytSIWX7dNbCYVDbWzJ U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AsAgAc7lBW/4UNJK1egztTbwaEI7pnA?= =?us-ascii?q?Q2BZRcKhW4CgTA4FAEBAQEBAQGBCoQ1AQEEAQEBYgkEBxACAQgSBicHJwsUAw4?= =?us-ascii?q?CBAENBRuIEw2/FQEBAQEBAQEBAQEBAQEBAQEBAQEBARiGVIR+hCkfEYRgBY1Xi?= =?us-ascii?q?HkBhSOCcoUbgVtJg3eDJYgXinMBHwEBQoIRHRaBQHIBhCOBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,329,1444694400"; d="scan'208";a="210686781"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Nov 2015 22:25:18 +0000
Received: from XCH-ALN-017.cisco.com (xch-aln-017.cisco.com [173.36.7.27]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id tALMPIat012294 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 21 Nov 2015 22:25:18 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-ALN-017.cisco.com (173.36.7.27) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sat, 21 Nov 2015 16:25:17 -0600
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1104.000; Sat, 21 Nov 2015 16:25:18 -0600
From: "Ken Gray (kegray)" <kegray@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9T1lmHHc0DUEGZ5S7afLAxI54/uTKAgAE4bQCAAD5zgIAA8u2AgALxP4CAAbuzgIBgtq8A
Date: Sat, 21 Nov 2015 22:25:17 +0000
Message-ID: <D274F007.EA128%kegray@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <787AE7BB302AE849A7480A190F8B93300539567F@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <70ABF9A1-38A5-4A41-B533-BDF607E186C2@cisco.com> <787AE7BB302AE849A7480A190F8B933005396026@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933005396026@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.86.246.22]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <9B10DBB48C76234FB984878A6985036D@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/nvl9pAN7HWE9ZaZjYpJyxA4-SGo>
Cc: "draft-ietf-sfc-control-plane@tools.ietf.org" <draft-ietf-sfc-control-plane@tools.ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Nov 2015 22:25:23 -0000

I have to say the argument here is bit confusing, I'm trying to parse it.

The SFP results from parsing the constraints of the SFC.  There was some
architectural relaxation in the SFP definition.  The original idea of the
unconstrained hop was not that it was a blind draw, but rather it had a
local heuristic for selecting which of many functions (probably the SAME
functions) it supported (for HA, load balancing or other practical reasons
where we didn't want to maintain the knowledge in a central repository of
the state of those functions).

An SFP with no constraints DOESN'T exist ...a PATH is a constraint.

To contrive a service chain that doesn't care about order and arbitrarily
selects the path has to assume that every junction in the path could
support all the functions required in the chain - which is a constraint
itself BTW, otherwise you have a blind pinball machine.  In that
contrivance, if you do have all the functions at every hop, you
essentially have a huge load-balancer and not really a service chain.

Perhaps the argument is for the capability of the SFCID has to be passed
in the data plane to enable some sort of finer clue in a derived path at
what otherwise was (by intent, for a number of different use cases) a
loose hop in the resolution.  In order to have selected the loose hop SFF
in the first place, I'd argue you probably needed to know that it had the
capability of fulfilling the request - otherwise, again, we're shooting
blindly in the dark.  In this case the SCID then provides some further
granularity in function selection that couldn't be expressed as an
externally addressable entity in policy by the SFF/policy point (a "low
latency" function or "normal latency" mixed together with a local
heuristic for knowing which is which) - otherwise, we would have resolved
it instead of paying the tax.  Possible, but a HUGE stretch, because it
assumes a highly connected and cognizant SFF (it knows the policy meaning
and provides enough information to the general policy store so that it can
be selected for the loose hop in the first place) that can't create
logically addressable associations for finer discrimination of it's
resources.  It seems that that sort of "broken implementation" isn't worth
a permanent tax on everyone.


If the SFF is THAT hooked into the entire policy schema that it can act
that independently, why not make it re-classify (it should see the same
classifier mappings to SCIDs as other nodes of it's class), associate with
an SCID and get on with whatever local resolution is appropriate (in it's
highly independent mind).

Again, looking for a deployment angle that is non-rhetorical and not
broken that would merit such a tax.




>Hi Carlos,
>
>As I mentioned in my previous message to Joel, the control plane draft
>DOES NOT mandate any IDs. It lists a set of information that is needed to
>be instructed via control plane interfaces. I'm arguing that not only
>SFPs are needed to be communicated to the control points, but also
>service chains.=20
>
>Please refer to the excerpt from the data plane arch I included in one of
>my messages.=20
>
>FWIW, there is a ticket for the NSH specification draft since almost 5
>months: http://trac.tools.ietf.org/wg/sfc/trac/ticket/1
>
>Cheers,
>Med
>
>> -----Message d'origine-----
>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>> Envoy=E9 : dimanche 20 septembre 2015 05:02
>> =C0 : BOUCADAIR Mohamed IMT/OLN
>> Cc : Joel M. Halpern; sfc issue tracker; draft-ietf-sfc-control-
>> plane@tools.ietf.org; sfc@ietf.org
>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>operates
>> on SFC IDs, SFP IDs, etc.
>>=20
>> Med,
>>=20
>> It seems to me you are reading what you want to read from the
>>architecture
>> and data plane documents, and not what it's actually there.
>>=20
>> Where are service chain IDs within the data plane?
>>=20
>> Thanks,
>>=20
>> Thumb typed by Carlos Pignataro.
>> Excuze typofraphicak errows
>>=20
>> > On Sep 18, 2015, at 02:06, "mohamed.boucadair@orange.com"
>> <mohamed.boucadair@orange.com> wrote:
>> >
>> > Hi Joel,
>> >
>> > The excerpt I provided from the arch draft clearly shows that extreme
>> cases are allowed: non-constrained SFCs, fully constrained SFCs, and any
>> variation in between. The control plane should be able to accommodate
>>all
>> those cases.
>> >
>> > The data plane draft is also explicit there is a binding between the
>> service chain and its SFPs. The control plane relies on that ground for
>> the requirements it derives for the interfaces that are in scope. It
>>does
>> not mandate that correlation should be transported in packets, but it
>> identifies this is a piece of information that is needed to be
>> communicated via control interfaces.
>> >
>> > The document DOES NOT mandate any IDs.
>> >
>> > Cheers,
>> > Med
>> >
>> >> -----Message d'origine-----
>> >> De : Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> >> Envoy=E9 : jeudi 17 septembre 2015 17:37
>> >> =C0 : BOUCADAIR Mohamed IMT/OLN; sfc issue tracker; draft-ietf-sfc-
>> control-
>> >> plane@tools.ietf.org
>> >> Cc : sfc@ietf.org
>> >> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>> operates
>> >> on SFC IDs, SFP IDs, etc.
>> >>
>> >> As far as I can tell, there is nothing in the Service Chaining work
>> that
>> >> requires correlating service path IDs with service chain IDs within
>>the
>> >> data plane.  Any such relationship exists entirely within the control
>> >> plane or above, and would be driven by requirements other than the
>>data
>> >> plane.  When I look at this document, all of the requirements that
>>talk
>> >> about service function chain IDs can be accurately captured, in terms
>> of
>> >> data plane requirements, by service function path IDs.  Thus, the
>> >> requirement that the data plane has is to see such path IDs.  Yes, in
>> >> some deployments those will be 1-1 with chain IDs.  They are still
>>path
>> >> IDs.
>> >>
>> >> Introducing a requirement for the data plane to see and work with
>>chain
>> >> IDs is not grounded in the work of the group.
>> >>
>> >> Yours,
>> >> Joel M. Halpern
>> >>
>> >>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>> >>> Re-,
>> >>>
>> >>> The control draft as it stands is compliant with the data plane
>> >> architecture document.
>> >>>
>> >>> Indeed, the arch draft acknowledges the following:
>> >>> (1) SFPs are "associated with a given SFC".
>> >>> (2) SFPs are presented as a form of constrained SFCs.
>> >>> (3) Some deployments may not impose any constraint on the abstract
>> SFC.
>> >>> (4) Some others may impose either loose or strict routes.
>> >>>
>> >>> Requiring SFP IDs for deployments that do not impose any constraint
>>on
>> >> the SFC is an oxymoron because according to the data plane
>> architecture,
>> >> an SFP is a "constrained version of the original SFC".
>> >>>
>> >>> For deployments that do not impose any constraint on the abstract
>>SFC,
>> >> but adopt a fully distributed SFC forwarding strategy, a chain
>> identifier
>> >> is sufficient.
>> >>>
>> >>> Because an SFP may be associated with several SFCs, the identifier
>>of
>> >> the SFC may be required to associate an SFP with its SFC.
>> >>>
>> >>> Below an excerpt from the arch draft, fwiw:
>> >>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>> >>>    A service function path (SFP) is a mechanism used by service
>> >> chaining
>> >>>    to express the result of applying more granular policy and
>> >>>    operational constraints to the abstract requirements of a service
>> >>>    chain (SFC).  This architecture does not mandate the degree of
>> >>>    specificity of the SFP.  Architecturally, within the same SFC-
>> >> enabled
>> >>>    domain, some SFPs may be fully specified, selecting exactly which
>> >> SFF
>> >>>    and which SF are to be visited by packets using that SFP, while
>> >> other
>> >>>    SFPs may be quite vague, deferring to the SFF the decisions about
>> >> the
>> >>>    exact sequence of steps to be used to realize the SFC.  The
>> >>>    specificity may be anywhere in between these extremes.
>> >>>
>> >>>    As an example of such an intermediate specificity, there may be
>>two
>> >>>    SFPs associated with a given SFC, where one SFP specifies that
>>any
>> >>>    order of SFF and SF may be used as long as it is within data
>>center
>> >>>    1, and where the second SFP allows the same latitude, but only
>> >> within
>> >>>    data center 2.
>> >>>
>> >>>    Thus, the policies and logic of SFP selection or creation
>> (depending
>> >>>    upon the solution) produce what may be thought of as a
>>constrained
>> >>>    version of the original SFC.  Since multiple policies may apply
>>to
>> >>>    different traffic that uses the same SFC, it also follows that
>> there
>> >>>    may be multiple SFPs may be associated with a single SFC.
>> >>> =3D=3D=3D=3D=3D=3D=3D
>> >>>
>> >>> Cheers,
>> >>> Med
>> >>>
>> >>>> -----Message d'origine-----
>> >>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> >>>> Envoy=E9 : mercredi 16 septembre 2015 19:15
>> >>>> =C0 : sfc issue tracker; draft-ietf-sfc-control-plane@tools.ietf.or=
g;
>> >>>> BOUCADAIR Mohamed IMT/OLN
>> >>>> Cc : sfc@ietf.org
>> >>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>> >> operates
>> >>>> on SFC IDs, SFP IDs, etc.
>> >>>>
>> >>>> Given that we have an adopted architecture that specifies that the
>> >>>> system should function in terms of service function paths, I would
>> >>>> prefer that the control requirements draft align with the
>> architecture
>> >>>> in that regard.  We are, as far as I know, specifying the
>> requirements
>> >>>> for control mechanisms in support of the architecture and data
>>plane
>> we
>> >>>> standardize.
>> >>>>
>> >>>> Yours,
>> >>>> Joel
>> >>>>
>> >>>>> On 9/16/15 9:46 AM, sfc issue tracker wrote:
>> >>>>> #15: Whether the control plane operates on SFC IDs, SFP IDs, etc.
>> >>>>>
>> >>>>>   The draft includes this note:
>> >>>>>
>> >>>>>            [[Note: The question of whether the data plane operates
>> >> just
>> >>>> in
>> >>>>>            terms of SFP IDs or needs SFC IDs, as described in this
>> >>>> version
>> >>>>>            of the draft, is still under discussion among the
>> >> authors.]]
>> >>>>>
>> >>>>>   The current version of the draft is more generic as it does not
>> >>>> preclude
>> >>>>>   manipulating service chains based on an identifier of the chain.
>> >> Also,
>> >>>> it
>> >>>>>   does not assume that the SFP indirection level is mandatory (SFP
>> >> IDs).
>> >>>>>
>> >>>>>   Note the current version accommodates various deployment
>>contexts:
>> >>>> e.g.,
>> >>>>>   rely solely on a chain ID, rely on a chain ID and a SFP, supply
>>a
>> >>>> strict
>> >>>>>   path, supply a loose path, etc. The purpose is to not dictate
>> >>>> deployment
>> >>>>>   choices on how forwarding is actually achieved within an SFC-
>> >> enabled
>> >>>>>   domain.
>> >>>>>
>> >>>>>   An identifier of the chain is the minimum information that is
>> >> needed,
>> >>>> but
>> >>>>>   other information may be supplied as well.
>> >>>>>
>> >>>>>   Feedback from the WG about which information to supply is
>>needed.
>> >>>>>
>> >>>>>   FWIW, there is a ticket issue for this issue for the nsh spec.
>> >
>> > _______________________________________________
>> > sfc mailing list
>> > sfc@ietf.org
>> > https://www.ietf.org/mailman/listinfo/sfc
>
>_______________________________________________
>sfc mailing list
>sfc@ietf.org
>https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Nov 22 02:04:39 2015
Return-Path: <homma.shunsuke@lab.ntt.co.jp>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9D811B2CE7 for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 02:04:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.678
X-Spam-Level: 
X-Spam-Status: No, score=-0.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.585, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XNQ_Xf1DtbxZ for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 02:04:34 -0800 (PST)
Received: from tama50.ecl.ntt.co.jp (tama50.ecl.ntt.co.jp [129.60.39.147]) by ietfa.amsl.com (Postfix) with ESMTP id 4D5291B2CDE for <sfc@ietf.org>; Sun, 22 Nov 2015 02:04:33 -0800 (PST)
Received: from vc1.ecl.ntt.co.jp (vc1.ecl.ntt.co.jp [129.60.86.153]) by tama50.ecl.ntt.co.jp (8.13.8/8.13.8) with ESMTP id tAMA4WPj032689; Sun, 22 Nov 2015 19:04:32 +0900
Received: from vc1.ecl.ntt.co.jp (localhost [127.0.0.1]) by vc1.ecl.ntt.co.jp (Postfix) with ESMTP id 8F0715F623; Sun, 22 Nov 2015 19:04:32 +0900 (JST)
Received: from imail3.m.ecl.ntt.co.jp (imail3.m.ecl.ntt.co.jp [129.60.5.248]) by vc1.ecl.ntt.co.jp (Postfix) with ESMTP id 772BE5F611; Sun, 22 Nov 2015 19:04:32 +0900 (JST)
Received: from [IPv6:::1] ([129.60.13.28]) by imail3.m.ecl.ntt.co.jp (8.13.8/8.13.8) with ESMTP id tAMA4L3e024804; Sun, 22 Nov 2015 19:04:32 +0900
From: Shunsuke Homma <homma.shunsuke@lab.ntt.co.jp>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <20151119073209.594948115.75564.49932@sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <564DDB0C.7030001@joelhalpern.com>
Message-ID: <56519338.7020008@lab.ntt.co.jp>
Date: Sun, 22 Nov 2015 19:04:40 +0900
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <564DDB0C.7030001@joelhalpern.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
To: "Joel M. Halpern" <jmh@joelhalpern.com>, mohamed.boucadair@orange.com, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
X-TM-AS-MML: disable
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/o-Zt3lHXYwaHbqfkadU_zvQAe1U>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Nov 2015 10:04:39 -0000

Hi,

I and authors had analyzed a pattern in which two packets having the 
same SPI traverse different RSPs, and the result is described in section 
"Service Paths Selection Patterns" of 
"draft-homma-sfc-forwarding-analysis-04."
https://datatracker.ietf.org/doc/draft-homma-sfc-forwarding-methods-analysis/

We assume that dynamic paths selection will be useful for large-scale 
networks because it enables operators to separate control and management 
for each DC or domain. In other words, it enables to avoid using a 
"super controller" in large-scaled networks such as carrier grade networks.

IMHO, there are surely situations in which conveying SPI as abstract 
information in data-plane is beneficial, and some SFFs should be 
available to select the next hops dynamically.

Thanks,
Shunsuke

On 2015/11/19 23:22, Joel M. Halpern wrote:
> Can you please describe some situation where there is increased value in
> having SFC information in the data plane.  Having the coordination
> within the control components is understandable and usually necessary.
> But that is out of scope for this document and this working group.
> In what circumstance does the increased flexibility, which introduces
> additional complexity in the data plane, add value?
>
> Yours,
> Joel
>
> On 11/19/15 2:41 AM, mohamed.boucadair@orange.com wrote:
>> Re-,
>>
>> Yes, but still there is a record somewhere to link the name to one or
>> a list of IP addresses. That record can be maintained in a central
>> entity or be local (an SFF can decide which exact SF instance it can
>> solicited (LB cases, redundancy group, etc.).
>>
>> What I'm asking for is more freedom in the cp architecture to make the
>> resolution when it is appropriate: either centralized, distributed, or
>> a mix (hierarchical context).
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Dave Dolson [mailto:ddolson@sandvine.com]
>>> EnvoyÃ© : jeudi 19 novembre 2015 08:32
>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>> Cc : sfc@ietf.org
>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>> operates
>>> on SFC IDs, SFP IDs, etc.
>>>
>>> Med,
>>> I would say that the SFC has no representation in the data plane (like
>>> host name has no representation in IP routing.)
>>> â€ŽBoth are abstractions.
>>>
>>> -Dave
>>>
>>>    Original Message
>>> From: mohamed.boucadair@orange.com
>>> Sent: Thursday, November 19, 2015 2:12 AM
>>> To: Dave Dolson
>>> Cc: sfc@ietf.org
>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>> operates
>>> on SFC IDs, SFP IDs, etc.
>>>
>>>
>>> Hi Dave,
>>>
>>> I fully agree with this analogy:
>>>
>>> ==
>>> SFC <--> destination host name
>>> SFP <--> destination IP address
>>> RSP <--> sequence of routers and links to deliver the IP packet
>>> ==
>>>
>>> Hence the need for the control plane to instruct the underlying data
>>> plane
>>> elements with required information at each of these three levels.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
>>>> EnvoyÃ© : mercredi 18 novembre 2015 20:34
>>>> Ã€ : Jim Guichard (jguichar)
>>>> Cc : sfc@ietf.org
>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>> operates
>>>> on SFC IDs, SFP IDs, etc.
>>>>
>>>> [reduced distribution to Jim & sfc list]
>>>>
>>>> Jim,
>>>> I think your description is helpful. Can we find a place for this in
>>>> the
>>>> docs?
>>>>
>>>> I don't think I can understand it without referring to the concrete
>>>> NSH,
>>>> however.
>>>>
>>>>
>>>> If I understand correctly, the following are true:
>>>> - if the NSH SPI in two packets are the same, they are on the same SFP.
>>>> - if the NSH SPI in two packets are different, they are on different
>>> SFPs.
>>>> - although two packets have the same SPI, they may traverse different
>>>> RSPs.
>>>>
>>>> - when thinking of the data-plane and south-bound interfaces C1 thru
>>>> C4,
>>>> the SFC concept doesn't exist.
>>>>     (SFC is just a north-interface concept like, "chain A provides a
>>>> firewall and a NAT")
>>>>
>>>> Have I got it right?
>>>>
>>>>
>>>> I also think the following *analogy* with routing can be drawn:
>>>> SFC <--> destination host name
>>>> SFP <--> destination IP address
>>>> RSP <--> sequence of routers and links to deliver the IP packet
>>>>
>>>>
>>>> -Dave
>>>>
>>>>
>>>>
>>>> -----Original Message-----
>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard
>>>> (jguichar)
>>>> Sent: Wednesday, November 18, 2015 11:18 AM
>>>> To: Carlos Pignataro (cpignata); mohamed.boucadair@orange.com
>>>> Cc: sfc issue tracker; sfc@ietf.org; Paul Quinn (paulq);
>>>> draft-ietf-sfc-
>>>> control-plane@tools.ietf.org; Joel Halpern; Joel M. Halpern
>>>> Subject: Re: [sfc] #15 (control-plane): Whether the control plane
>>> operates
>>>> on SFC IDs, SFP IDs, etc.
>>>>
>>>> [Chair hat off â€¦]
>>>>
>>>> I have to say I am struggling to see the â€œissueâ€ in this thread that
>>> needs
>>>> to be addressed other than confusion over SFC vs SFP definition; from a
>>>> data plane perspective it is *very* clear that SFP/SI identifiers are
>>> used
>>>> as the lookup key into a forwarding construct that may contain 1:n
>>> number
>>>> of next-hops (SFFs, SFs). In some cases that lookup will point to a
>>> single
>>>> next-hop, in others multiple next-hops. In *all* cases this has
>>> absolutely
>>>> nothing to do with the SFC as each representation of that SFC is
>>> uniquely
>>>> identified by an SFP-id.
>>>>
>>>> Jim
>>>>
>>>> On 11/18/15, 10:19 AM, "sfc on behalf of Carlos Pignataro (cpignata)"
>>>> <sfc-bounces@ietf.org on behalf of cpignata@cisco.com> wrote:
>>>>
>>>>> Hi, Med,
>>>>>
>>>>> I also referred to other parts of the document, when I wrote:
>>>>>
>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>> planeÂ²
>>>>>
>>>>>
>>>>> For example, I am not sure I understand what this means:
>>>>>
>>>>> "   o  Populate SFC forwarding policy tables of involved SFC data
>>> planeÂ²
>>>>>
>>>>>
>>>>> Or at:
>>>>> "   o  SFC Forwarding Policy Table: this table reflects the SFC-
>>> specific
>>>>>      traffic forwarding policy enforced by SFF components for every
>>>>>      relevant incoming packet that is associated to one of the
>>>>> existing
>>>>>      SFCs."
>>>>>
>>>>>
>>>>> My comment is that those should be Â³SFP"
>>>>>
>>>>> Thanks,
>>>>>
>>>>> â€¹ Carlos.
>>>>>
>>>>> -----Original Message-----
>>>>> From: Med Boucadair <mohamed.boucadair@orange.com>
>>>>> Date: Wednesday, November 18, 2015 at 10:03 AM
>>>>> To: Carlos Pignataro <cpignata@cisco.com>
>>>>> Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
>>>>> "draft-ietf-sfc-control-plane@tools.ietf.org"
>>>>> <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
>>>>> <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>,
>>>>> "sfc@ietf.org" <sfc@ietf.org>, Joel Halpern
>>>>> <joel.halpern@ericsson.com>
>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>> operates
>>>>> on SFC IDs, SFP IDs, etc.
>>>>>
>>>>>> Carlos,
>>>>>>
>>>>>> There is not SFC ID in the core text of the control plane draft.
>>>>>>
>>>>>> The text you quoted is part of an appendix with a note that clearly
>>>>>> states this is not discussed. A corresponding issue record has been
>>>>>> recorded to seek for more feedback on that appendix.
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 15:35
>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>>>>> Cc : Paul Quinn (paulq); draft-ietf-sfc-control-
>>> plane@tools.ietf.org;
>>>>>>> Joel
>>>>>>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>> operates
>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>
>>>>>>> Med,
>>>>>>>
>>>>>>>> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>
>>>>>>>> Carlos,
>>>>>>>>
>>>>>>>> This is an open issue for this draft, so it is normal to continue
>>>>>>> discussing it. I don't know how you can conclude in advance that we
>>>> are
>>>>>>> circling.
>>>>>>>>
>>>>>>>
>>>>>>> Discussion is great, Med. But my Å’we are circling' comment (not in
>>>>>>> advanced, but already evident) is because I saw the same questions,
>>>>>>> same
>>>>>>> arguments, and same answers as before.
>>>>>>>
>>>>>>>> "strongly believe" is not a technical argument, btw.
>>>>>>>>
>>>>>>>
>>>>>>> Well, I believe so on technical grounds! Most of which have already
>>>>>>> been
>>>>>>> said, so I do not want to contribute to the circular discussion.
>>>>>>>
>>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>>> planeÂ²,
>>>>>>> and Â³SFC IDsÂ². The architecture says that SFC are made of abstract
>>>>>>> service
>>>>>>> functions. ThereÂ¹s no actual forwarding in this abstract conceptual
>>>>>>> model.
>>>>>>>
>>>>>>> The control-plane draft says Â³Suppose the SFC ID for this SFP is
>>>>>>> "yellowÂ²,Â², and my point again is that in the data plane an SFP has
>>> an
>>>>>>> identifier (which identifies the SFP (SFP-ID) and is not the
>>>> identifier
>>>>>>> of
>>>>>>> something else, itÂ¹s not a Topology-ID, itÂ¹s not a SKU, itÂ¹s not a
>>>> URI,
>>>>>>> itÂ¹s not a Family Name, and not an SFC ID), and the control (and
>>>>>>> policy)
>>>>>>> plane can of course work with SFCs.
>>>>>>>
>>>>>>> My $0.02.
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>> â€¹ Carlos.
>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 11:52
>>>>>>>>> Ã€ : Joel Halpern
>>>>>>>>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-
>>> sfc-
>>>>>>>>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>>>>>>>>> sfc@ietf.org
>>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>> operates
>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>
>>>>>>>>> I am a bit baffled to see this thread again â€¹ it appears the
>>>>>>> discussion
>>>>>>>>> restarted to continue in circles.
>>>>>>>>>
>>>>>>>>> Med,
>>>>>>>>>
>>>>>>>>> I too agree with Joel and strongly believe there is no need for
>>> SFC
>>>>>>>>> identification passed down â€¹ there is no provisioning of SFCs
>>>>>>> southbound.
>>>>>>>>>
>>>>>>>>> (Almost) every instance of Â³SFCÂ² in the control-plane
>>> requirements
>>>>>>> draft
>>>>>>>>> should really say Â³SFPÂ². There is no use of talking about SFCs
>>>>>>> towards
>>>>>>> the
>>>>>>>>> data plane. The relationship between chains and paths is a policy
>>>>>>> matter
>>>>>>>>> which belongs in the policy/control itself, but not out of there.
>>>>>>>>>
>>>>>>>>> This is no different than what I said a few months ago on the
>>> same
>>>>>>> topic.
>>>>>>>>>
>>>>>>>>> Thanks,
>>>>>>>>>
>>>>>>>>> â€¹ Carlos.
>>>>>>>>>
>>>>>>>>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>>>>>>> <joel.halpern@ericsson.com>
>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>> What is provisioned into the SFF reflects the SFP.  The control
>>>>>>> system
>>>>>>>>> decides whether that SFP indicates the same set of all possible
>>>>>>> choices
>>>>>>>>> that the SFC does, or is a proper subset.
>>>>>>>>>>
>>>>>>>>>> In order to allow for an SFP that reflects meaningful
>>> constraints,
>>>>>>> what
>>>>>>>>> is provisioned has to be the SFP.
>>>>>>>>>> No special provision is needed for the case where the SFP is
>>>>>>> isomorphic
>>>>>>>>> to the SFC. In such a case, you still provision the SFP.  And the
>>>>>>> result
>>>>>>>>> is an SFP with as much flexibility as the SFC.
>>>>>>>>>>
>>>>>>>>>> If, in contrast, you declare that the provisioning includes the
>>>> SFC
>>>>>>> then
>>>>>>>>> you are introducing extra complexity without adding any new cases
>>>>>>> that
>>>>>>> can
>>>>>>>>> be handled.
>>>>>>>>>>
>>>>>>>>>> Yours,
>>>>>>>>>> Joel
>>>>>>>>>>
>>>>>>>>>> -----Original Message-----
>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>>>>>>>>> To: Joel Halpern; Paul Quinn (paulq)
>>>>>>>>>> Cc: sfc issue tracker; draft-ietf-sfc-control-
>>>> plane@tools.ietf.org;
>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>>> plane
>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>
>>>>>>>>>> Hi Joel,
>>>>>>>>>>
>>>>>>>>>> Please see inline.
>>>>>>>>>>
>>>>>>>>>> Cheers,
>>>>>>>>>> Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>>>>>>>>> EnvoyÃ© : mardi 17 novembre 2015 14:49
>>>>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc
>>> issue
>>>>>>>>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>> Objet : RE: [sfc] #15 (control-plane): Whether the control
>>> plane
>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>
>>>>>>>>>>> Your statement that " It happens that information is no more
>>> than
>>>>>>> the
>>>>>>>>>>> service chain itself (without any constraints)." (Where "it"
>>>>>>> refers
>>>>>>> to
>>>>>>>>> "
>>>>>>>>>>> the exact sequence of steps to be used to realize the SFC".)
>>> Does
>>>>>>> not
>>>>>>>>>>> make sense to me.
>>>>>>>>>>
>>>>>>>>>> [Med] RFC 7665 says:
>>>>>>>>>>
>>>>>>>>>> "   Thus, the policies and logic of SFP selection or creation
>>>>>>> (depending
>>>>>>>>>>   upon the solution) produce what may be thought of as a
>>>> constrained
>>>>>>>>>>   version of the original SFC. "
>>>>>>>>>>
>>>>>>>>>> in short: SFP is defined as a constrained version of the
>>> original
>>>>>>> SFC.
>>>>>>>>>>
>>>>>>>>>> What is the name to use to refer to a "non-constrained" SFC or
>>> to
>>>>>>> the
>>>>>>>>> information that you will provision to an SFF when the path
>>>>>>> computation
>>>>>>>>> and selection decision is "deferred to the SFF"?
>>>>>>>>>>
>>>>>>>>>> It does not make sense to call a non-constrained version of the
>>>> SFC
>>>>>>> as
>>>>>>>>> SFP given that RFC7665 explicitly defines SFP as "constrained
>>>>>>> version
>>>>>>> of
>>>>>>>>> the original SFC"!
>>>>>>>>>>
>>>>>>>>>> The SFC is the general description of the objective.  That
>>>>>>>>>>> is not the same as the exact sequence of places that must be
>>>>>>> visited.
>>>>>>>>>>>
>>>>>>>>>>> I stand by my earlier comments that almost all uses of SFC in
>>> the
>>>>>>>>>>> control requirements draft should be SFP.
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> [Med] I noted that Joel.. that's fair but this position is IMHO
>>>> not
>>>>>>>>> aligned with RFC7665 that allows to control any variation from a
>>>>>>> non-
>>>>>>>>> constrained SFC to a fully constrained SFC.
>>>>>>>>>>
>>>>>>>>>>> Yours,
>>>>>>>>>>> Joel
>>>>>>>>>>>
>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>>>>>>>>> To: Paul Quinn (paulq)
>>>>>>>>>>> Cc: sfc issue tracker;
>>>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>>> plane
>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>
>>>>>>>>>>> Hi Paul,
>>>>>>>>>>>
>>>>>>>>>>> Thank you for sharing your feedback.
>>>>>>>>>>>
>>>>>>>>>>> RFC7665 says the following:
>>>>>>>>>>>
>>>>>>>>>>> "
>>>>>>>>>>> This architecture does not mandate the degree of
>>>>>>>>>>>   specificity of the SFP.  Architecturally, within the same SFC-
>>>>>>> enabled
>>>>>>>>>>>   domain, some SFPs may be fully specified, selecting exactly
>>>> which
>>>>>>> SFF
>>>>>>>>>>>   and which SF are to be visited by packets using that SFP,
>>> while
>>>>>>> other
>>>>>>>>>>>   SFPs may be quite vague, deferring to the SFF the decisions
>>>> about
>>>>>>> the
>>>>>>>>>>>   exact sequence of steps to be used to realize the SFC.  The
>>>>>>>>>>>   specificity may be anywhere in between these extremes.
>>>>>>>>>>> "
>>>>>>>>>>>
>>>>>>>>>>> The control draft is completely aligned with that approach.
>>>>>>>>>>>
>>>>>>>>>>> The control-plane document allows in particular to provision
>>>>>>> required
>>>>>>>>>>> information when "deferring to the SFF the decisions about the
>>>>>>>>>>>   exact sequence of steps to be used to realize the SFC". It
>>>>>>> happens
>>>>>>>>>>> that information is no more than the service chain itself
>>>> (without
>>>>>>> any
>>>>>>>>>>> constraints).
>>>>>>>>>>>
>>>>>>>>>>> Also, the current control-plane document allows to instruct a
>>>>>>> loose
>>>>>>>>>>> path
>>>>>>>>>>> (SFP) or a strict path (RSP), etc.
>>>>>>>>>>>
>>>>>>>>>>> I fully agree that whether a full path is specified within a
>>>>>>> domain
>>>>>>> or
>>>>>>>>>>> if it is deferred to SFFs is really deployment-specific.
>>>>>>> Nevertheless,
>>>>>>>>>>> the control plan should accommodate all these flavors.
>>>>>>>>>>>
>>>>>>>>>>> Cheers,
>>>>>>>>>>> Med
>>>>>>>>>>>
>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] EnvoyÃ© :
>>>>>>> vendredi
>>>>>>>>>>>> 16 octobre 2015 14:04 Ã€ : Joel M. Halpern Cc : BOUCADAIR
>>> Mohamed
>>>>>>>>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>>>>>>>>>> (control-plane): Whether the control plane operates on SFC
>>> IDs,
>>>>>>> SFP
>>>>>>>>> IDs, etc.
>>>>>>>>>>>>
>>>>>>>>>>>> Joel,
>>>>>>>>>>>>
>>>>>>>>>>>> I concur.
>>>>>>>>>>>>
>>>>>>>>>>>> The data plane deal with paths, not chains.  The relationship
>>> of
>>>>>>>>>>>> paths to chains falls squarely in the control plane (or even
>>>> more
>>>>>>>>>>>> likely
>>>>>>>>>>> "policy"
>>>>>>>>>>>> plane) realm.  The specificity of the path is left to
>>>>>>>>>>>> implementation, in the architecture draft, but that's
>>> consistent
>>>>>>>>>>>> with your position and provides the requisite functionality.
>>>>>>>>>>>>
>>>>>>>>>>>> Paul
>>>>>>>>>>>>
>>>>>>>>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>>>>>>>>> <jmh@joelhalpern.com>
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>> As far as I can tell, there is nothing in the Service
>>> Chaining
>>>>>>>>>>>>> work that
>>>>>>>>>>>> requires correlating service path IDs with service chain IDs
>>>>>>> within
>>>>>>>>>>>> the data plane.  Any such relationship exists entirely within
>>>> the
>>>>>>>>>>>> control plane or above, and would be driven by requirements
>>>> other
>>>>>>>>>>>> than the data plane.  When I look at this document, all of the
>>>>>>>>>>>> requirements that talk about service function chain IDs can be
>>>>>>>>>>>> accurately captured, in terms of data plane requirements, by
>>>>>>> service
>>>>>>>>> function path IDs.
>>>>>>>>>>>> Thus, the requirement that the data plane has is to see such
>>>> path
>>>>>>> IDs.
>>>>>>>>>>>> Yes, in some deployments those will be 1-1 with chain IDs.
>>> They
>>>>>>> are
>>>>>>>>>>> still path IDs.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Introducing a requirement for the data plane to see and work
>>>>>>> with
>>>>>>>>>>>>> chain
>>>>>>>>>>>> IDs is not grounded in the work of the group.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>> Joel M. Halpern
>>>>>>>>>>>>>
>>>>>>>>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>>>>>> Re-,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> The control draft as it stands is compliant with the data
>>>> plane
>>>>>>>>>>>> architecture document.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>>>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>>>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>>>>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>>>>>>>>>> abstract
>>>>>>>>>>> SFC
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> sfc mailing list
>>>>>>>>>> sfc@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>


-- 
----------------------------------
Shunsuke Homma
<homma.shunsuke@lab.ntt.co.jp>
TEL: +81 422 59 3486
FAX: +81 422 60 7460

NTT Network Service System Labs.
Musashino city, Tokyo, Japan
----------------------------------



From nobody Sun Nov 22 07:09:48 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121CD1A8A9A for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 07:09:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qkaaEXYaQnJV for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 07:09:45 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C5791A8A99 for <sfc@ietf.org>; Sun, 22 Nov 2015 07:09:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1867; q=dns/txt; s=iport; t=1448204985; x=1449414585; h=from:to:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=dKenrvQKLSdCpngU9xWfO22SjUFzCVna+vRiaNc2R1M=; b=bO/jzgwd8kUtOH6H6u//WIzXI9AbRkl7JKG3sAtmmpQx0gwYeb8Dd3xX ZYZdj8fgmvx+34gPVbVAcAcpjYcajE8qfHOLusglILbMSaq0xvjOmdad+ 4I1TYdsg8NOzq/2ABFN6BL6kGlPx2k737TXRBUpd1DR7Al/tlni3tWqoW 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CvAgBB2VFW/4ENJK1UCoM7U3AFvwsBD?= =?us-ascii?q?YFlIYcSOBQBAQEBAQEBfwuEOzpRAT5CJwQuiBMNnmSfOAEBAQEGAQEBAQEBARy?= =?us-ascii?q?GVIIQhx6DdIEVBZZQAYUjiA2BW0mDd4hMhQ+IVAEfAQFCghEdgVaFFoEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,332,1444694400"; d="scan'208";a="49172830"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Nov 2015 15:09:44 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by alln-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id tAMF9iSA001576 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Sun, 22 Nov 2015 15:09:44 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 22 Nov 2015 09:09:44 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Sun, 22 Nov 2015 09:09:37 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: RSP open item
Thread-Index: AQHRJTfNwS9raGPDEUqKf86XkpwNZA==
Date: Sun, 22 Nov 2015 15:09:37 +0000
Message-ID: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.230]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <6D72EEE3EB531B46A953334AC82F2338@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/3wMh7jstM0l_qTFTDovEXQ5vlgM>
Subject: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Nov 2015 15:09:47 -0000

SFCers,

We need resolve the concept of the RSPID that's been discussed on list, and=
 listed in the NSH draft as an "open item".  Currently, NSH specifies a ser=
vice path ID which is used to i) identify the service path, ii) select the =
required overlay encap + next hops.  The arch and the NSH drafts do not spe=
cify the granularity of the path ID: it can represent as specific a path as=
 the control plane wants to assign.  In the current open source implementat=
ion, we've been using it as an explicit indication of which SFF and SFs are=
 composed to create a path.

Having said that, I know some folks have presented a case where further gra=
nularity might be required: an explicit indication of specific instances wi=
thin the scope of a SFP.  I think we have a  solution for each NSH MD Type,=
 although we might have slightly different terminology, the desired functio=
nality will be equivalent:

MD-type 1: As you know the metadata in type 1 is opaque, so in theory an im=
plementation could assign any additional identifiers to the metadata.  Ther=
e are also a couple of drafts that provide allocation guidelines, the data =
center one specifically allows for an additional identifier -- a flow ID of=
 sorts -- that can be used for dataplane granularity.

MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.or=
g/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.  =
This can be used, as needed, within the dataplane to further identify a flo=
w, and therefore be used for specific instance selection, load balancing an=
d such.

So, given these two options, I think we can, with the existing drafts, prov=
ide the needed functionality for the RSPID use cases.  If we get consensus,=
 we can update NSH accordingly so please weigh in, on list, as needed.

Thanks
Paul=


From nobody Sun Nov 22 08:53:20 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1F6D1AC446 for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 08:53:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uyGwZ7G0OtCN for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 08:53:16 -0800 (PST)
Received: from hub021-ca-6.exch021.serverdata.net (hub021-ca-6.exch021.serverdata.net [64.78.56.71]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4D371AC445 for <sfc@ietf.org>; Sun, 22 Nov 2015 08:53:16 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-6.exch021.domain.local ([10.254.4.92]) with mapi id 14.03.0224.002;  Sun, 22 Nov 2015 08:53:16 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH: RSP open item
Thread-Index: AQHRJUZHJepkeKscxU+YywTFucRfPQ==
Date: Sun, 22 Nov 2015 16:53:15 +0000
Message-ID: <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com>
References: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com>
In-Reply-To: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/4pqmicZxV1WXR05AuHBhyziUwvE>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Nov 2015 16:53:18 -0000

I'm in agreement with this approach.  However some of the terminology aroun=
d SFPID is confusing, especially where part of the SFPID's role is to "sele=
ct the next hops", as stated below.  The phrase is certainly truthful, but =
perhaps inadequate.   When considering a loosely specified approach with al=
lowed late binding, the phrase would be more evocative as "select the eligi=
ble next hops (I.e., one or more service function instances for each abstra=
ct service function specified in the chain)".  This would allow for another=
 explanatory sentence that makes it explicit that in some deployments, ther=
e may be exactly one eligible service function instance in each position of=
 the chain to satisfy the SFP (i.e. Strictly specified).=20

   Ron

> On Nov 22, 2015, at 10:09 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> SFCers,
>=20
> We need resolve the concept of the RSPID that's been discussed on list, a=
nd listed in the NSH draft as an "open item".  Currently, NSH specifies a s=
ervice path ID which is used to i) identify the service path, ii) select th=
e required overlay encap + next hops.  The arch and the NSH drafts do not s=
pecify the granularity of the path ID: it can represent as specific a path =
as the control plane wants to assign.  In the current open source implement=
ation, we've been using it as an explicit indication of which SFF and SFs a=
re composed to create a path.
>=20
> Having said that, I know some folks have presented a case where further g=
ranularity might be required: an explicit indication of specific instances =
within the scope of a SFP.  I think we have a  solution for each NSH MD Typ=
e, although we might have slightly different terminology, the desired funct=
ionality will be equivalent:
>=20
> MD-type 1: As you know the metadata in type 1 is opaque, so in theory an =
implementation could assign any additional identifiers to the metadata.  Th=
ere are also a couple of drafts that provide allocation guidelines, the dat=
a center one specifically allows for an additional identifier -- a flow ID =
of sorts -- that can be used for dataplane granularity.
>=20
> MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.=
org/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.=
  This can be used, as needed, within the dataplane to further identify a f=
low, and therefore be used for specific instance selection, load balancing =
and such.
>=20
> So, given these two options, I think we can, with the existing drafts, pr=
ovide the needed functionality for the RSPID use cases.  If we get consensu=
s, we can update NSH accordingly so please weigh in, on list, as needed.
>=20
> Thanks
> Paul
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Nov 22 09:50:28 2015
Return-Path: <kegray@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36CA81ACDA5 for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 09:50:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y2EPPq785duH for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 09:50:23 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C28A71ACDAA for <sfc@ietf.org>; Sun, 22 Nov 2015 09:50:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=31894; q=dns/txt; s=iport; t=1448214622; x=1449424222; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=S/DlL5bxr09wAV77y7xzBrMy7/+Qa9W3i8EcsCAlDrI=; b=Lh61UfwcWAkf9gWVwAYVVTne7udhQoQPWcScNntyER9KPfLGnwafy7AR sdwr30JsoMgECwy8ubHVTD5mPPXQjuC5gXZSSaisbjwf0Eloj9V1ozwCt 6Nnxha+P+BmK5fs3hhYcj4j0G5rG7h0SG8ZUHPEadKYVmASZbrCq7OW4u A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ACAgBm/1FW/5xdJa1egztTb78RAQ2BY?= =?us-ascii?q?gMXDIVsAhyBBjgUAQEBAQEBAYEKhDQBAQEDAQEBARcJBA0zBwQHBQcEAgEGAhE?= =?us-ascii?q?BAgEBAQECAiMDAgICJQsUAQIGCAIEDgUbiAsIDZEGnTWPRgEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBARQEgQGFU4IQgm6EKUiDBC+BFQEEh0eFV4kyAYUjgnKFG4FbhEC?= =?us-ascii?q?SPoNxAR8BAUKCER0WgUByAYUqAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,333,1444694400"; d="scan'208";a="52669930"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Nov 2015 17:50:20 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id tAMHoKqh011063 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 22 Nov 2015 17:50:20 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 22 Nov 2015 11:50:19 -0600
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1104.000; Sun, 22 Nov 2015 11:50:19 -0600
From: "Ken Gray (kegray)" <kegray@cisco.com>
To: Shunsuke Homma <homma.shunsuke@lab.ntt.co.jp>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9T1lmHHc0DUEGZ5S7afLAxI54/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAFwtgIAAA+EAgAAA+ACAAVwBgP//0VdAgABtE4D//7OLsIAABPIAgABkLwD//99/YAAjTacA//+xwxqAAGcfAIAAb/kAgARvFACAAB2F/Q==
Date: Sun, 22 Nov 2015 17:50:19 +0000
Message-ID: <AE50BC7B-F9B7-4CDE-B1DD-8AA5EB48B9CC@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <20151119073209.594948115.75564.49932@sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <564DDB0C.7030001@joelhalpern.com>,<56519338.7020008@lab.ntt.co.jp>
In-Reply-To: <56519338.7020008@lab.ntt.co.jp>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/xhso8D_7M52UntZKry5IodBJpk0>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Nov 2015 17:50:27 -0000
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From nobody Sun Nov 22 19:42:21 2015
Return-Path: <homma.shunsuke@lab.ntt.co.jp>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1C6D1B2F80 for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 19:42:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.678
X-Spam-Level: 
X-Spam-Status: No, score=-0.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.585, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YwMM92JAlBvj for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 19:42:15 -0800 (PST)
Received: from tama50.ecl.ntt.co.jp (tama50.ecl.ntt.co.jp [129.60.39.147]) by ietfa.amsl.com (Postfix) with ESMTP id 2EF001B2F7F for <sfc@ietf.org>; Sun, 22 Nov 2015 19:42:15 -0800 (PST)
Received: from vc2.ecl.ntt.co.jp (vc2.ecl.ntt.co.jp [129.60.86.154]) by tama50.ecl.ntt.co.jp (8.13.8/8.13.8) with ESMTP id tAN3gBN3011349; Mon, 23 Nov 2015 12:42:11 +0900
Received: from vc2.ecl.ntt.co.jp (localhost [127.0.0.1]) by vc2.ecl.ntt.co.jp (Postfix) with ESMTP id 886105F594; Mon, 23 Nov 2015 12:42:11 +0900 (JST)
Received: from imail3.m.ecl.ntt.co.jp (imail3.m.ecl.ntt.co.jp [129.60.5.248]) by vc2.ecl.ntt.co.jp (Postfix) with ESMTP id 772235F58E; Mon, 23 Nov 2015 12:42:11 +0900 (JST)
Received: from [IPv6:::1] ([129.60.13.28]) by imail3.m.ecl.ntt.co.jp (8.13.8/8.13.8) with ESMTP id tAN3g3o2015018; Mon, 23 Nov 2015 12:42:11 +0900
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830DAD5E9@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA0493@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <20151119073209.594948115.75564.49932@sandvine.com> <787AE7BB302AE849A7480A190F8B933008CA04C4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <564DDB0C.7030001@joelhalpern.com> <56519338.7020008@lab.ntt.co.jp> <AE50BC7B-F9B7-4CDE-B1DD-8AA5EB48B9CC@cisco.com>
From: Shunsuke Homma <homma.shunsuke@lab.ntt.co.jp>
Message-ID: <56528B1E.7040103@lab.ntt.co.jp>
Date: Mon, 23 Nov 2015 12:42:22 +0900
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <AE50BC7B-F9B7-4CDE-B1DD-8AA5EB48B9CC@cisco.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
To: "Ken Gray (kegray)" <kegray@cisco.com>
X-TM-AS-MML: disable
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ygyO8bzipXijTGr9LqWJ6UsemgI>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 03:42:20 -0000

Hi Ken,

Of course, I don't think every SFF decides the next hop dynamically. It 
will cause significant complexity of the control. I think that use of 
"dynamic SFF" should be restrictive rather than every SFF should be 
dynamic SFF.

What I want to say is that dynamic paths selection should not be 
excluded in standard if there are some situations in which it is 
beneficial. I'm worrying that it will be difficult to manage end-to-end 
paths across multiple domains completely in large-scale network, and I 
think that distribution of control and management will be required for 
more scalable and flexible service chaining mechanism.
(I also assume that NSH may be over-spec in small network from viewpoint 
of just transport.)

Shunsuke


On 2015/11/23 2:50, Ken Gray (kegray) wrote:
> See my earlier response.  For the
> SFC ID to have any meaning, the interpreting node would be hooked to the same policy system - otherwise it's a random variable.  I just find it a stretch to have the capabilities required for maintaining THAT functionality but being selectively incapable of maintaining the classification table that mapped to the SFC ID (the distribution of which, like the SFC ID, is amenable to distributed control) - which was apparently the capability of a similarly "gifted" policy node somewhere upstream in the chain - is  a dysfunctional arrangement (of capabilities for a node) that shouldn't be encouraged by a general tax.
>
> Sent from my iPhone
>
>> On Nov 22, 2015, at 5:04 AM, Shunsuke Homma <homma.shunsuke@lab.ntt.co.jp> wrote:
>>
>> Hi,
>>
>> I and authors had analyzed a pattern in which two packets having the same SPI traverse different RSPs, and the result is described in section "Service Paths Selection Patterns" of "draft-homma-sfc-forwarding-analysis-04."
>> https://datatracker.ietf.org/doc/draft-homma-sfc-forwarding-methods-analysis/
>>
>> We assume that dynamic paths selection will be useful for large-scale networks because it enables operators to separate control and management for each DC or domain. In other words, it enables to avoid using a "super controller" in large-scaled networks such as carrier grade networks.
>>
>> IMHO, there are surely situations in which conveying SPI as abstract information in data-plane is beneficial, and some SFFs should be available to select the next hops dynamically.
>>
>> Thanks,
>> Shunsuke
>>
>>> On 2015/11/19 23:22, Joel M. Halpern wrote:
>>> Can you please describe some situation where there is increased value in
>>> having SFC information in the data plane.  Having the coordination
>>> within the control components is understandable and usually necessary.
>>> But that is out of scope for this document and this working group.
>>> In what circumstance does the increased flexibility, which introduces
>>> additional complexity in the data plane, add value?
>>>
>>> Yours,
>>> Joel
>>>
>>>> On 11/19/15 2:41 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> Yes, but still there is a record somewhere to link the name to one or
>>>> a list of IP addresses. That record can be maintained in a central
>>>> entity or be local (an SFF can decide which exact SF instance it can
>>>> solicited (LB cases, redundancy group, etc.).
>>>>
>>>> What I'm asking for is more freedom in the cp architecture to make the
>>>> resolution when it is appropriate: either centralized, distributed, or
>>>> a mix (hierarchical context).
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Dave Dolson [mailto:ddolson@sandvine.com]
>>>>> EnvoyÃ© : jeudi 19 novembre 2015 08:32
>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>>> Cc : sfc@ietf.org
>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>> on SFC IDs, SFP IDs, etc.
>>>>>
>>>>> Med,
>>>>> I would say that the SFC has no representation in the data plane (like
>>>>> host name has no representation in IP routing.)
>>>>> â€ŽBoth are abstractions.
>>>>>
>>>>> -Dave
>>>>>
>>>>>    Original Message
>>>>> From: mohamed.boucadair@orange.com
>>>>> Sent: Thursday, November 19, 2015 2:12 AM
>>>>> To: Dave Dolson
>>>>> Cc: sfc@ietf.org
>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>> on SFC IDs, SFP IDs, etc.
>>>>>
>>>>>
>>>>> Hi Dave,
>>>>>
>>>>> I fully agree with this analogy:
>>>>>
>>>>> ==
>>>>> SFC <--> destination host name
>>>>> SFP <--> destination IP address
>>>>> RSP <--> sequence of routers and links to deliver the IP packet
>>>>> ==
>>>>>
>>>>> Hence the need for the control plane to instruct the underlying data
>>>>> plane
>>>>> elements with required information at each of these three levels.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 20:34
>>>>>> Ã€ : Jim Guichard (jguichar)
>>>>>> Cc : sfc@ietf.org
>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>
>>>>>> [reduced distribution to Jim & sfc list]
>>>>>>
>>>>>> Jim,
>>>>>> I think your description is helpful. Can we find a place for this in
>>>>>> the
>>>>>> docs?
>>>>>>
>>>>>> I don't think I can understand it without referring to the concrete
>>>>>> NSH,
>>>>>> however.
>>>>>>
>>>>>>
>>>>>> If I understand correctly, the following are true:
>>>>>> - if the NSH SPI in two packets are the same, they are on the same SFP.
>>>>>> - if the NSH SPI in two packets are different, they are on different
>>>>> SFPs.
>>>>>> - although two packets have the same SPI, they may traverse different
>>>>>> RSPs.
>>>>>>
>>>>>> - when thinking of the data-plane and south-bound interfaces C1 thru
>>>>>> C4,
>>>>>> the SFC concept doesn't exist.
>>>>>>     (SFC is just a north-interface concept like, "chain A provides a
>>>>>> firewall and a NAT")
>>>>>>
>>>>>> Have I got it right?
>>>>>>
>>>>>>
>>>>>> I also think the following *analogy* with routing can be drawn:
>>>>>> SFC <--> destination host name
>>>>>> SFP <--> destination IP address
>>>>>> RSP <--> sequence of routers and links to deliver the IP packet
>>>>>>
>>>>>>
>>>>>> -Dave
>>>>>>
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard
>>>>>> (jguichar)
>>>>>> Sent: Wednesday, November 18, 2015 11:18 AM
>>>>>> To: Carlos Pignataro (cpignata); mohamed.boucadair@orange.com
>>>>>> Cc: sfc issue tracker; sfc@ietf.org; Paul Quinn (paulq);
>>>>>> draft-ietf-sfc-
>>>>>> control-plane@tools.ietf.org; Joel Halpern; Joel M. Halpern
>>>>>> Subject: Re: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>
>>>>>> [Chair hat off â€¦]
>>>>>>
>>>>>> I have to say I am struggling to see the â€œissueâ€ in this thread that
>>>>> needs
>>>>>> to be addressed other than confusion over SFC vs SFP definition; from a
>>>>>> data plane perspective it is *very* clear that SFP/SI identifiers are
>>>>> used
>>>>>> as the lookup key into a forwarding construct that may contain 1:n
>>>>> number
>>>>>> of next-hops (SFFs, SFs). In some cases that lookup will point to a
>>>>> single
>>>>>> next-hop, in others multiple next-hops. In *all* cases this has
>>>>> absolutely
>>>>>> nothing to do with the SFC as each representation of that SFC is
>>>>> uniquely
>>>>>> identified by an SFP-id.
>>>>>>
>>>>>> Jim
>>>>>>
>>>>>> On 11/18/15, 10:19 AM, "sfc on behalf of Carlos Pignataro (cpignata)"
>>>>>> <sfc-bounces@ietf.org on behalf of cpignata@cisco.com> wrote:
>>>>>>
>>>>>>> Hi, Med,
>>>>>>>
>>>>>>> I also referred to other parts of the document, when I wrote:
>>>>>>>
>>>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>>>> planeÂ²
>>>>>>>
>>>>>>>
>>>>>>> For example, I am not sure I understand what this means:
>>>>>>>
>>>>>>> "   o  Populate SFC forwarding policy tables of involved SFC data
>>>>> planeÂ²
>>>>>>>
>>>>>>>
>>>>>>> Or at:
>>>>>>> "   o  SFC Forwarding Policy Table: this table reflects the SFC-
>>>>> specific
>>>>>>>      traffic forwarding policy enforced by SFF components for every
>>>>>>>      relevant incoming packet that is associated to one of the
>>>>>>> existing
>>>>>>>      SFCs."
>>>>>>>
>>>>>>>
>>>>>>> My comment is that those should be Â³SFP"
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>> â€¹ Carlos.
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: Med Boucadair <mohamed.boucadair@orange.com>
>>>>>>> Date: Wednesday, November 18, 2015 at 10:03 AM
>>>>>>> To: Carlos Pignataro <cpignata@cisco.com>
>>>>>>> Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
>>>>>>> "draft-ietf-sfc-control-plane@tools.ietf.org"
>>>>>>> <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
>>>>>>> <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>,
>>>>>>> "sfc@ietf.org" <sfc@ietf.org>, Joel Halpern
>>>>>>> <joel.halpern@ericsson.com>
>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>>>> operates
>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>
>>>>>>>> Carlos,
>>>>>>>>
>>>>>>>> There is not SFC ID in the core text of the control plane draft.
>>>>>>>>
>>>>>>>> The text you quoted is part of an appendix with a note that clearly
>>>>>>>> states this is not discussed. A corresponding issue record has been
>>>>>>>> recorded to seek for more feedback on that appendix.
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 15:35
>>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>>>>>>> Cc : Paul Quinn (paulq); draft-ietf-sfc-control-
>>>>> plane@tools.ietf.org;
>>>>>>>>> Joel
>>>>>>>>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>>> operates
>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>
>>>>>>>>> Med,
>>>>>>>>>
>>>>>>>>>> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>>
>>>>>>>>>> Carlos,
>>>>>>>>>>
>>>>>>>>>> This is an open issue for this draft, so it is normal to continue
>>>>>>>>> discussing it. I don't know how you can conclude in advance that we
>>>>>> are
>>>>>>>>> circling.
>>>>>>>>>
>>>>>>>>> Discussion is great, Med. But my Å’we are circling' comment (not in
>>>>>>>>> advanced, but already evident) is because I saw the same questions,
>>>>>>>>> same
>>>>>>>>> arguments, and same answers as before.
>>>>>>>>>
>>>>>>>>>> "strongly believe" is not a technical argument, btw.
>>>>>>>>>
>>>>>>>>> Well, I believe so on technical grounds! Most of which have already
>>>>>>>>> been
>>>>>>>>> said, so I do not want to contribute to the circular discussion.
>>>>>>>>>
>>>>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>>>>> planeÂ²,
>>>>>>>>> and Â³SFC IDsÂ². The architecture says that SFC are made of abstract
>>>>>>>>> service
>>>>>>>>> functions. ThereÂ¹s no actual forwarding in this abstract conceptual
>>>>>>>>> model.
>>>>>>>>>
>>>>>>>>> The control-plane draft says Â³Suppose the SFC ID for this SFP is
>>>>>>>>> "yellowÂ²,Â², and my point again is that in the data plane an SFP has
>>>>> an
>>>>>>>>> identifier (which identifies the SFP (SFP-ID) and is not the
>>>>>> identifier
>>>>>>>>> of
>>>>>>>>> something else, itÂ¹s not a Topology-ID, itÂ¹s not a SKU, itÂ¹s not a
>>>>>> URI,
>>>>>>>>> itÂ¹s not a Family Name, and not an SFC ID), and the control (and
>>>>>>>>> policy)
>>>>>>>>> plane can of course work with SFCs.
>>>>>>>>>
>>>>>>>>> My $0.02.
>>>>>>>>>
>>>>>>>>> Thanks,
>>>>>>>>>
>>>>>>>>> â€¹ Carlos.
>>>>>>>>>
>>>>>>>>>> Cheers,
>>>>>>>>>> Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 11:52
>>>>>>>>>>> Ã€ : Joel Halpern
>>>>>>>>>>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-
>>>>> sfc-
>>>>>>>>>>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>>>>>>>>>>> sfc@ietf.org
>>>>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>>> operates
>>>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>
>>>>>>>>>>> I am a bit baffled to see this thread again â€¹ it appears the
>>>>>>>>> discussion
>>>>>>>>>>> restarted to continue in circles.
>>>>>>>>>>>
>>>>>>>>>>> Med,
>>>>>>>>>>>
>>>>>>>>>>> I too agree with Joel and strongly believe there is no need for
>>>>> SFC
>>>>>>>>>>> identification passed down â€¹ there is no provisioning of SFCs
>>>>>>>>> southbound.
>>>>>>>>>>>
>>>>>>>>>>> (Almost) every instance of Â³SFCÂ² in the control-plane
>>>>> requirements
>>>>>>>>> draft
>>>>>>>>>>> should really say Â³SFPÂ². There is no use of talking about SFCs
>>>>>>>>> towards
>>>>>>>>> the
>>>>>>>>>>> data plane. The relationship between chains and paths is a policy
>>>>>>>>> matter
>>>>>>>>>>> which belongs in the policy/control itself, but not out of there.
>>>>>>>>>>>
>>>>>>>>>>> This is no different than what I said a few months ago on the
>>>>> same
>>>>>>>>> topic.
>>>>>>>>>>>
>>>>>>>>>>> Thanks,
>>>>>>>>>>>
>>>>>>>>>>> â€¹ Carlos.
>>>>>>>>>>>
>>>>>>>>>>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>>>>>>>>> <joel.halpern@ericsson.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> What is provisioned into the SFF reflects the SFP.  The control
>>>>>>>>> system
>>>>>>>>>>> decides whether that SFP indicates the same set of all possible
>>>>>>>>> choices
>>>>>>>>>>> that the SFC does, or is a proper subset.
>>>>>>>>>>>>
>>>>>>>>>>>> In order to allow for an SFP that reflects meaningful
>>>>> constraints,
>>>>>>>>> what
>>>>>>>>>>> is provisioned has to be the SFP.
>>>>>>>>>>>> No special provision is needed for the case where the SFP is
>>>>>>>>> isomorphic
>>>>>>>>>>> to the SFC. In such a case, you still provision the SFP.  And the
>>>>>>>>> result
>>>>>>>>>>> is an SFP with as much flexibility as the SFC.
>>>>>>>>>>>>
>>>>>>>>>>>> If, in contrast, you declare that the provisioning includes the
>>>>>> SFC
>>>>>>>>> then
>>>>>>>>>>> you are introducing extra complexity without adding any new cases
>>>>>>>>> that
>>>>>>>>> can
>>>>>>>>>>> be handled.
>>>>>>>>>>>>
>>>>>>>>>>>> Yours,
>>>>>>>>>>>> Joel
>>>>>>>>>>>>
>>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>>>>>>>>>>> To: Joel Halpern; Paul Quinn (paulq)
>>>>>>>>>>>> Cc: sfc issue tracker; draft-ietf-sfc-control-
>>>>>> plane@tools.ietf.org;
>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>>>>> plane
>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>
>>>>>>>>>>>> Hi Joel,
>>>>>>>>>>>>
>>>>>>>>>>>> Please see inline.
>>>>>>>>>>>>
>>>>>>>>>>>> Cheers,
>>>>>>>>>>>> Med
>>>>>>>>>>>>
>>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>>>>>>>>>>> EnvoyÃ© : mardi 17 novembre 2015 14:49
>>>>>>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc
>>>>> issue
>>>>>>>>>>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>>> Objet : RE: [sfc] #15 (control-plane): Whether the control
>>>>> plane
>>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Your statement that " It happens that information is no more
>>>>> than
>>>>>>>>> the
>>>>>>>>>>>>> service chain itself (without any constraints)." (Where "it"
>>>>>>>>> refers
>>>>>>>>> to
>>>>>>>>>>> "
>>>>>>>>>>>>> the exact sequence of steps to be used to realize the SFC".)
>>>>> Does
>>>>>>>>> not
>>>>>>>>>>>>> make sense to me.
>>>>>>>>>>>>
>>>>>>>>>>>> [Med] RFC 7665 says:
>>>>>>>>>>>>
>>>>>>>>>>>> "   Thus, the policies and logic of SFP selection or creation
>>>>>>>>> (depending
>>>>>>>>>>>>   upon the solution) produce what may be thought of as a
>>>>>> constrained
>>>>>>>>>>>>   version of the original SFC. "
>>>>>>>>>>>>
>>>>>>>>>>>> in short: SFP is defined as a constrained version of the
>>>>> original
>>>>>>>>> SFC.
>>>>>>>>>>>>
>>>>>>>>>>>> What is the name to use to refer to a "non-constrained" SFC or
>>>>> to
>>>>>>>>> the
>>>>>>>>>>> information that you will provision to an SFF when the path
>>>>>>>>> computation
>>>>>>>>>>> and selection decision is "deferred to the SFF"?
>>>>>>>>>>>>
>>>>>>>>>>>> It does not make sense to call a non-constrained version of the
>>>>>> SFC
>>>>>>>>> as
>>>>>>>>>>> SFP given that RFC7665 explicitly defines SFP as "constrained
>>>>>>>>> version
>>>>>>>>> of
>>>>>>>>>>> the original SFC"!
>>>>>>>>>>>>
>>>>>>>>>>>> The SFC is the general description of the objective.  That
>>>>>>>>>>>>> is not the same as the exact sequence of places that must be
>>>>>>>>> visited.
>>>>>>>>>>>>>
>>>>>>>>>>>>> I stand by my earlier comments that almost all uses of SFC in
>>>>> the
>>>>>>>>>>>>> control requirements draft should be SFP.
>>>>>>>>>>>>
>>>>>>>>>>>> [Med] I noted that Joel.. that's fair but this position is IMHO
>>>>>> not
>>>>>>>>>>> aligned with RFC7665 that allows to control any variation from a
>>>>>>>>> non-
>>>>>>>>>>> constrained SFC to a fully constrained SFC.
>>>>>>>>>>>>
>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>> Joel
>>>>>>>>>>>>>
>>>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>>>>>>>>>>> To: Paul Quinn (paulq)
>>>>>>>>>>>>> Cc: sfc issue tracker;
>>>>>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>>>>> plane
>>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Hi Paul,
>>>>>>>>>>>>>
>>>>>>>>>>>>> Thank you for sharing your feedback.
>>>>>>>>>>>>>
>>>>>>>>>>>>> RFC7665 says the following:
>>>>>>>>>>>>>
>>>>>>>>>>>>> "
>>>>>>>>>>>>> This architecture does not mandate the degree of
>>>>>>>>>>>>>   specificity of the SFP.  Architecturally, within the same SFC-
>>>>>>>>> enabled
>>>>>>>>>>>>>   domain, some SFPs may be fully specified, selecting exactly
>>>>>> which
>>>>>>>>> SFF
>>>>>>>>>>>>>   and which SF are to be visited by packets using that SFP,
>>>>> while
>>>>>>>>> other
>>>>>>>>>>>>>   SFPs may be quite vague, deferring to the SFF the decisions
>>>>>> about
>>>>>>>>> the
>>>>>>>>>>>>>   exact sequence of steps to be used to realize the SFC.  The
>>>>>>>>>>>>>   specificity may be anywhere in between these extremes.
>>>>>>>>>>>>> "
>>>>>>>>>>>>>
>>>>>>>>>>>>> The control draft is completely aligned with that approach.
>>>>>>>>>>>>>
>>>>>>>>>>>>> The control-plane document allows in particular to provision
>>>>>>>>> required
>>>>>>>>>>>>> information when "deferring to the SFF the decisions about the
>>>>>>>>>>>>>   exact sequence of steps to be used to realize the SFC". It
>>>>>>>>> happens
>>>>>>>>>>>>> that information is no more than the service chain itself
>>>>>> (without
>>>>>>>>> any
>>>>>>>>>>>>> constraints).
>>>>>>>>>>>>>
>>>>>>>>>>>>> Also, the current control-plane document allows to instruct a
>>>>>>>>> loose
>>>>>>>>>>>>> path
>>>>>>>>>>>>> (SFP) or a strict path (RSP), etc.
>>>>>>>>>>>>>
>>>>>>>>>>>>> I fully agree that whether a full path is specified within a
>>>>>>>>> domain
>>>>>>>>> or
>>>>>>>>>>>>> if it is deferred to SFFs is really deployment-specific.
>>>>>>>>> Nevertheless,
>>>>>>>>>>>>> the control plan should accommodate all these flavors.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>> Med
>>>>>>>>>>>>>
>>>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] EnvoyÃ© :
>>>>>>>>> vendredi
>>>>>>>>>>>>>> 16 octobre 2015 14:04 Ã€ : Joel M. Halpern Cc : BOUCADAIR
>>>>> Mohamed
>>>>>>>>>>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>>>>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>>>>>>>>>>>> (control-plane): Whether the control plane operates on SFC
>>>>> IDs,
>>>>>>>>> SFP
>>>>>>>>>>> IDs, etc.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Joel,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> I concur.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> The data plane deal with paths, not chains.  The relationship
>>>>> of
>>>>>>>>>>>>>> paths to chains falls squarely in the control plane (or even
>>>>>> more
>>>>>>>>>>>>>> likely
>>>>>>>>>>>>> "policy"
>>>>>>>>>>>>>> plane) realm.  The specificity of the path is left to
>>>>>>>>>>>>>> implementation, in the architecture draft, but that's
>>>>> consistent
>>>>>>>>>>>>>> with your position and provides the requisite functionality.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Paul
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>>>>>>>>>>> <jmh@joelhalpern.com>
>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> As far as I can tell, there is nothing in the Service
>>>>> Chaining
>>>>>>>>>>>>>>> work that
>>>>>>>>>>>>>> requires correlating service path IDs with service chain IDs
>>>>>>>>> within
>>>>>>>>>>>>>> the data plane.  Any such relationship exists entirely within
>>>>>> the
>>>>>>>>>>>>>> control plane or above, and would be driven by requirements
>>>>>> other
>>>>>>>>>>>>>> than the data plane.  When I look at this document, all of the
>>>>>>>>>>>>>> requirements that talk about service function chain IDs can be
>>>>>>>>>>>>>> accurately captured, in terms of data plane requirements, by
>>>>>>>>> service
>>>>>>>>>>> function path IDs.
>>>>>>>>>>>>>> Thus, the requirement that the data plane has is to see such
>>>>>> path
>>>>>>>>> IDs.
>>>>>>>>>>>>>> Yes, in some deployments those will be 1-1 with chain IDs.
>>>>> They
>>>>>>>>> are
>>>>>>>>>>>>> still path IDs.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Introducing a requirement for the data plane to see and work
>>>>>>>>> with
>>>>>>>>>>>>>>> chain
>>>>>>>>>>>>>> IDs is not grounded in the work of the group.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>>>> Joel M. Halpern
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>>>>>>>> Re-,
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> The control draft as it stands is compliant with the data
>>>>>> plane
>>>>>>>>>>>>>> architecture document.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>>>>>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>>>>>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>>>>>>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>>>>>>>>>>>> abstract
>>>>>>>>>>>>> SFC
>>>>>>>>>>>>
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> sfc mailing list
>>>>>>>>>>>> sfc@ietf.org
>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>> --
>> ----------------------------------
>> Shunsuke Homma
>> <homma.shunsuke@lab.ntt.co.jp>
>> TEL: +81 422 59 3486
>> FAX: +81 422 60 7460
>>
>> NTT Network Service System Labs.
>> Musashino city, Tokyo, Japan
>> ----------------------------------
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>


-- 
----------------------------------
Shunsuke Homma
<homma.shunsuke@lab.ntt.co.jp>
TEL: +81 422 59 3486
FAX: +81 422 60 7460

NTT Network Service System Labs.
Musashino city, Tokyo, Japan
----------------------------------



From nobody Sun Nov 22 22:35:56 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFADD1B30CB for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 22:35:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rFUTQyyyaD2h for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 22:35:51 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEEC41B30C9 for <sfc@ietf.org>; Sun, 22 Nov 2015 22:35:50 -0800 (PST)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm10.si.francetelecom.fr (ESMTP service) with ESMTP id 2DA0326417E; Mon, 23 Nov 2015 07:35:49 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.18]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 0AD47238048; Mon, 23 Nov 2015 07:35:49 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0248.002; Mon, 23 Nov 2015 07:35:48 +0100
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AdEluS7GlAu1oIoBRFeHYqkCdnlJ3Q==
Date: Mon, 23 Nov 2015 06:35:48 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA176C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.23.54518
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Jjs7b6vWt-dG8HGjm06ak1A8TDQ>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 06:35:55 -0000
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From nobody Sun Nov 22 23:00:10 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D3BB1B3141 for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 23:00:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4goNK44sC6Py for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 23:00:05 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F6FF1B313E for <sfc@ietf.org>; Sun, 22 Nov 2015 23:00:04 -0800 (PST)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id 4A1313242B7; Mon, 23 Nov 2015 08:00:03 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.17]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 2061835C068; Mon, 23 Nov 2015 08:00:03 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM24.corporate.adroot.infra.ftgroup ([fe80::a1e6:3e6a:1f68:5f7e%19]) with mapi id 14.03.0248.002; Mon, 23 Nov 2015 08:00:03 +0100
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TlAu1oIoBRFeHYqkCdnlJ3Z4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAWyCAA=
Date: Mon, 23 Nov 2015 07:00:02 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com>
In-Reply-To: <D27348EC.30C98%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.10.16.122716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/x6buw2OzwnnvfF9TE-VhJBxoKjU>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 07:00:09 -0000
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From nobody Sun Nov 22 23:10:46 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 089BD1B3178 for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 23:10:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.483
X-Spam-Level: 
X-Spam-Status: No, score=-2.483 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YW_t3g06_EdR for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 23:10:42 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07D241B3176 for <sfc@ietf.org>; Sun, 22 Nov 2015 23:10:42 -0800 (PST)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id 342BB401D6; Mon, 23 Nov 2015 08:10:40 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.41]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id E6CEB120055; Mon, 23 Nov 2015 08:10:39 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM31.corporate.adroot.infra.ftgroup ([fe80::2cc9:4bac:7b7d:229d%19]) with mapi id 14.03.0248.002; Mon, 23 Nov 2015 08:10:39 +0100
From: <mohamed.boucadair@orange.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Qin Wu <bill.wu@huawei.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5ejy7hwshPJkSenz9F/5cNK56klIsAgADIkYCAA9ZWkA==
Date: Mon, 23 Nov 2015 07:10:38 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA17AE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com>
In-Reply-To: <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008CA17AEOPEXCLILMA3corp_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-zLIgLv99YzGDJLcK872PumIce0>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 07:10:44 -0000

--_000_787AE7BB302AE849A7480A190F8B933008CA17AEOPEXCLILMA3corp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_787AE7BB302AE849A7480A190F8B933008CA17AEOPEXCLILMA3corp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTQgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
U2ltU3VuOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0KQGZvbnQtZmFjZQ0KCXtm
b250LWZhbWlseTpTaW1TdW47DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQpAZm9u
dC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQg
MyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpUYWhvbWE7DQoJcGFub3NlLTE6MiAx
MSA2IDQgMyA1IDQgNCAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpDb25zb2xhczsN
CglwYW5vc2UtMToyIDExIDYgOSAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFt
aWx5OiJcQFNpbVN1biI7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQovKiBTdHls
ZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1h
bA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTEu
MHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0KYTpsaW5rLCBzcGFu
Lk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0
ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtG
b2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0KCXRleHQt
ZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5Nc29QbGFpblRleHQsIGxpLk1zb1BsYWluVGV4dCwg
ZGl2Lk1zb1BsYWluVGV4dA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxp
bms6IlRleHRlIGJydXQgQ2FyIjsNCgltYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFw
dDsNCglmb250LXNpemU6MTAuNXB0Ow0KCWZvbnQtZmFtaWx5OkNvbnNvbGFzO30NCnAuTXNvQWNl
dGF0ZSwgbGkuTXNvQWNldGF0ZSwgZGl2Lk1zb0FjZXRhdGUNCgl7bXNvLXN0eWxlLXByaW9yaXR5
Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJUZXh0ZSBkZSBidWxsZXMgQ2FyIjsNCgltYXJnaW46MGNt
Ow0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6OC4wcHQ7DQoJZm9udC1mYW1p
bHk6IlRhaG9tYSIsInNhbnMtc2VyaWYiO30NCnNwYW4uVGV4dGVicnV0Q2FyDQoJe21zby1zdHls
ZS1uYW1lOiJUZXh0ZSBicnV0IENhciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1z
dHlsZS1saW5rOiJUZXh0ZSBicnV0IjsNCglmb250LWZhbWlseTpDb25zb2xhczt9DQpzcGFuLlRl
eHRlZGVidWxsZXNDYXINCgl7bXNvLXN0eWxlLW5hbWU6IlRleHRlIGRlIGJ1bGxlcyBDYXIiOw0K
CW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUtbGluazoiVGV4dGUgZGUgYnVsbGVz
IjsNCglmb250LWZhbWlseToiVGFob21hIiwic2Fucy1zZXJpZiI7fQ0Kc3Bhbi5QbGFpblRleHRD
aGFyDQoJe21zby1zdHlsZS1uYW1lOiJQbGFpbiBUZXh0IENoYXIiOw0KCW1zby1zdHlsZS1wcmlv
cml0eTo5OTsNCgltc28tc3R5bGUtbGluazoiUGxhaW4gVGV4dCI7DQoJZm9udC1mYW1pbHk6Q29u
c29sYXM7fQ0KcC5QbGFpblRleHQsIGxpLlBsYWluVGV4dCwgZGl2LlBsYWluVGV4dA0KCXttc28t
c3R5bGUtbmFtZToiUGxhaW4gVGV4dCI7DQoJbXNvLXN0eWxlLWxpbms6IlBsYWluIFRleHQgQ2hh
ciI7DQoJbWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjEx
LjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30NCnNwYW4uQmFsbG9v
blRleHRDaGFyDQoJe21zby1zdHlsZS1uYW1lOiJCYWxsb29uIFRleHQgQ2hhciI7DQoJbXNvLXN0
eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJCYWxsb29uIFRleHQiOw0KCWZvbnQt
ZmFtaWx5OiJUYWhvbWEiLCJzYW5zLXNlcmlmIjt9DQpwLkJhbGxvb25UZXh0LCBsaS5CYWxsb29u
VGV4dCwgZGl2LkJhbGxvb25UZXh0DQoJe21zby1zdHlsZS1uYW1lOiJCYWxsb29uIFRleHQiOw0K
CW1zby1zdHlsZS1saW5rOiJCYWxsb29uIFRleHQgQ2hhciI7DQoJbWFyZ2luOjBjbTsNCgltYXJn
aW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2Fs
aWJyaSIsInNhbnMtc2VyaWYiO30NCnAuYSwgbGkuYSwgZGl2LmENCgl7bXNvLXN0eWxlLW5hbWU6
57qv5paH5pysOw0KCW1zby1zdHlsZS1saW5rOiLnuq/mlofmnKwgQ2hhciI7DQoJbWFyZ2luOjBj
bTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZh
bWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30NCnNwYW4uQ2hhcg0KCXttc28tc3R5bGUtbmFt
ZToi57qv5paH5pysIENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUt
bGluazrnuq/mlofmnKw7DQoJZm9udC1mYW1pbHk6U2ltU3VuO30NCnAuYTAsIGxpLmEwLCBkaXYu
YTANCgl7bXNvLXN0eWxlLW5hbWU65om55rOo5qGG5paH5pysOw0KCW1zby1zdHlsZS1saW5rOiLm
ibnms6jmoYbmlofmnKwgQ2hhciI7DQoJbWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAx
cHQ7DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2Vy
aWYiO30NCnNwYW4uQ2hhcjANCgl7bXNvLXN0eWxlLW5hbWU6IuaJueazqOahhuaWh+acrCBDaGFy
IjsNCgltc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms65om55rOo5qGG5paH
5pysOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0Kc3Bhbi5FbWFpbFN0
eWxlMjkNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6IkNhbGlicmki
LCJzYW5zLXNlcmlmIjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCnNwYW4uRW1haWxTdHlsZTMwDQoJ
e21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1z
ZXJpZiI7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVtYWlsU3R5bGUzMQ0KCXttc28tc3R5bGUt
dHlwZTpwZXJzb25hbDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiOw0KCWNv
bG9yOiMxRjQ5N0Q7fQ0Kc3Bhbi5FbWFpbFN0eWxlMzINCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29u
YWw7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjsNCgljb2xvcjojMUY0OTdE
O30NCnNwYW4uRW1haWxTdHlsZTMzDQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQt
ZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVt
YWlsU3R5bGUzNA0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbDsNCglmb250LWZhbWlseToiQ2Fs
aWJyaSIsInNhbnMtc2VyaWYiOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0Kc3Bhbi5FbWFpbFN0eWxlMzUN
Cgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IkNvdXJpZXIg
TmV3IjsNCgljb2xvcjpibGFjazsNCglmb250LXdlaWdodDpub3JtYWw7DQoJZm9udC1zdHlsZTpu
b3JtYWw7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJ
Zm9udC1zaXplOjEwLjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7c2l6ZTo2MTIuMHB0IDc5
Mi4wcHQ7DQoJbWFyZ2luOjcyLjBwdCA3Mi4wcHQgNzIuMHB0IDcyLjBwdDt9DQpkaXYuV29yZFNl
Y3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNv
IDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAv
Pg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxh
eW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwv
bzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkZS
IiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250
LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+SGkgUGF1bCwNCjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9y
OmJsYWNrIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPklNSE8sIHRoZSBkaXNjdXNzaW9u
IGlzIG5vdCBhYm91dCBoYXZpbmcgZml4ZWQgaGVhZGVycyBidXQgd2h5IHNvbWUg4oCcbWV0YWRh
dGHigJ0gc2hvdWxkIGJlIHBhcnQgb2YgdGhvc2UgbGV0IGFsb25lIGhhdmluZyB0d28gdmVyc2lv
bnMgb2YgdGhlIHNhbWUgaGVhZGVyIG1heQ0KIG5vdCBmYWNpbGl0YXRlIGludGVyb3BlcmFiaWxp
dHkuIDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxh
bmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3Vy
aWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6
MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj5J
IHN0aWxsIGRvbuKAmXQgc2VlIHRoZSB0ZWNobmljYWwgcmVhc29uIGZvciA0IG1hbmRhdG9yeSBj
b250ZXh0IGhlYWRlcnMuIFdoeSBub3QgMiwgMywgNSwgMTA/IFRoYW5rIHlvdS48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5
bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7
Y29sb3I6YmxhY2siPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZh
bWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Q2hlZXJzLDxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90
Oztjb2xvcjpibGFjayI+TWVkPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCBi
bHVlIDEuNXB0O3BhZGRpbmc6MGNtIDBjbSAwY20gNC4wcHQiPg0KPGRpdj4NCjxkaXYgc3R5bGU9
ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0
IDBjbSAwY20gMGNtIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij5EZSZuYnNwOzo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij4gc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddDQo8Yj5EZSBsYSBwYXJ0IGRlPC9i
PiBQYXVsIFF1aW5uIChwYXVscSk8YnI+DQo8Yj5FbnZvecOpJm5ic3A7OjwvYj4gdmVuZHJlZGkg
MjAgbm92ZW1icmUgMjAxNSAxNToyNzxicj4NCjxiPsOAJm5ic3A7OjwvYj4gUWluIFd1PGJyPg0K
PGI+Q2MmbmJzcDs6PC9iPiB1cmkuZWx6dXJAaW50ZWwuY29tOyBEb2xnYW5vdywgQW5kcmV3IChB
bmRyZXcpOyBzZmNAaWV0Zi5vcmc7IExpbmRhIER1bmJhcjxicj4NCjxiPk9iamV0Jm5ic3A7Ojwv
Yj4gUmU6IFtzZmNdIE5TSCBjb250ZXh0IGhlYWRlcnM6IGZpeGVkL3RsdjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNw
OzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K
PGRpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206
NS4wcHQiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk9uIE5vdiAxOSwgMjAxNSwgYXQg
OToyOCBQTSwgUWluIFd1ICZsdDs8YSBocmVmPSJtYWlsdG86YmlsbC53dUBodWF3ZWkuY29tIj5i
aWxsLnd1QGh1YXdlaS5jb208L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXpl
OjEwLjVwdDtjb2xvcjojMUY0OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj5IaSwgQW5k
cmV3IGFuZCBQYXVsOjwvc3Bhbj48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6Wkgt
Q04iPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxh
bmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdEO21zby1mYXJl
YXN0LWxhbmd1YWdlOlpILUNOIj5JdCBsb29rcyBJIG1pc3NlZCBhIGxvdCBvZiBkaXNjdXNzaW9u
IHJlZ2FyZGluZyBOU0ggY29udGV4dCBoZWFkZXIgaW4gdGhlIHBhc3QsIHRoYW5rcyBQYXVsIHRv
IHBvaW50IG1lIHRoZSBhcmNoaXZlLjwvc3Bhbj48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFu
Z3VhZ2U6WkgtQ04iPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdE
O21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj5HZW5lcmFsbHkgc3BlYWtpbmcsIHRoZXJlIGlz
IHRyYWRlb2ZmIGJldHdlZW4gcGVyZm9ybWFuY2UgYW5kIGZsZXhpYmlsaXR5Ljwvc3Bhbj48c3Bh
biBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1z
aXplOjEwLjVwdDtjb2xvcjojMUY0OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJz
cDs8L3NwYW4+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPjwv
bzpwPjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7
LCZxdW90O3NlcmlmJnF1b3Q7O21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPiZuYnNw
OzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtmb250
LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4mcXVvdDssJnF1b3Q7c2VyaWYmcXVvdDsiPkFi
c29sdXRlbHksIGFuZCB0aGF0J3MgdGhlIHJlYXNvbiBmb3Igb2ZmZXJpbmcgdGhlIHR3byBvcHRp
b25zOiBiYWxhbmNlIHNwZWVkL3NpbXBsaWNpdHkgYW5kIGZsZXhpYmlsaXR5LjxvOnA+PC9vOnA+
PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTIuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZx
dW90OywmcXVvdDtzZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
Mi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7LCZxdW90O3Nlcmlm
JnF1b3Q7Ij5UaGUgcGhpbG9zb3BoeSBpcyB0byBtYW5kYXRlIHRoZSBzaW1wbGVzdCBmb3JtIG9m
IG1ldGFkYXRhLCBlbmFibGluZyBhIGJyb2FkIGltcGxlbWVudGF0aW9uIGJhc2UuICZuYnNwO0lm
L3doZW4gbW9yZSBmbGV4aWJpbGl0eSBpcyBuZWVkZWQgYSBtb3JlIGZsZXhpYmxlIE5TSCB0eXBl
IGlzIGF2YWlsYWJsZSwNCiBhbG9uZyB3aXRoIHRoZSBhc3NvY2lhdGVkIHRyYWRlb2Zmcy4gJm5i
c3A7VGhhdCdzIHRoZSBiYWxhbmNlIHRoYXQgd2UgZGVjaWRlZCB0byBzdHJpa2UgYW5kIGl0IHNl
ZW1zIHRvIGJlIHJlYXNvbmFibGUgYW5kIHdlbGwgYWNjZXB0ZWQuPG86cD48L286cD48L3NwYW4+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7LCZx
dW90O3NlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtm
b250LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4mcXVvdDssJnF1b3Q7c2VyaWYmcXVvdDsi
PlRoYW5rcyw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtmb250LWZhbWlseTomcXVv
dDtUaW1lcyBOZXcgUm9tYW4mcXVvdDssJnF1b3Q7c2VyaWYmcXVvdDsiPlBhdWw8bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEyLjBwdDtmb250LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4m
cXVvdDssJnF1b3Q7c2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwv
ZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_787AE7BB302AE849A7480A190F8B933008CA17AEOPEXCLILMA3corp_--


From nobody Sun Nov 22 23:36:55 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FEBB1B368E for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 23:36:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.485
X-Spam-Level: 
X-Spam-Status: No, score=-14.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9o8Nkm-IpzGe for <sfc@ietfa.amsl.com>; Sun, 22 Nov 2015 23:36:44 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD8221B3663 for <sfc@ietf.org>; Sun, 22 Nov 2015 23:36:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=172541; q=dns/txt; s=iport; t=1448264203; x=1449473803; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=iCSHaXvQCevNyk6o+COgisMRBD/P3KMYayvpmMMcomo=; b=UwYEyk0JX2jzul0niZ1uXMMemnsfIl3iTzbdAXBDZtfxai16Tdk6jUpP VTWraKi2c5HRotnmN3uYGY+UHwcHhdwPYlS9QW4bESdhOr1jxB4/Tkm9u XpL7rDJPROJGH8VQ6nOh3AEW5U/r3cG/PI04kiSY8uvK/VtQifZv+alQm o=;
X-Files: image001.png : 85906
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DQAgDOwFJW/40NJK1bA4JuTVNvBr8RD?= =?us-ascii?q?oFlhg8CgTI4FAEBAQEBAQGBCoQ0AQEBBAUBCAwLAgYBNwcKEwIBCA4DAQIBAQE?= =?us-ascii?q?GAQEBGAEGBwIFEAEODBQDBggCBAERAQYCBoggvW8BAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEPCYtShGgJCgEVBA2EFwEEiCCKS4NlAYQ5AYNbhRSBYoRAgyWKNoRjg3E?= =?us-ascii?q?BHwFDghEdgVZyhCSBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,336,1444694400";  d="png'150?scan'150,208,217,150";a="210982055"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 23 Nov 2015 07:36:41 +0000
Received: from XCH-ALN-009.cisco.com (xch-aln-009.cisco.com [173.36.7.19]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id tAN7afQJ016217 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 23 Nov 2015 07:36:41 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-009.cisco.com (173.36.7.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 23 Nov 2015 01:36:40 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Mon, 23 Nov 2015 01:36:40 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>, "Elzur, Uri" <uri.elzur@intel.com>, "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] will you trust your SF?
Thread-Index: AQHRHRVllFn7O1UA8UmUvJKuB0Kev56Y8jcAgAABkICAAOF6AIAAHe8AgACfQICAA37B8IAB8loAgAB2o2CAAJFnAIAIPRIA
Date: Mon, 23 Nov 2015 07:36:40 +0000
Message-ID: <2fb0a78486134a66a0e91228612706e7@XCH-RCD-020.cisco.com>
References: <7E05C330D7FD6D4FAD0728C46B89958581E222B1@ORSMSX114.amr.corp.intel.com> <7E05C330D7FD6D4FAD0728C46B89958581E2E869@ORSMSX114.amr.corp.intel.com> <D26A20AA.2D3D5%jguichar@cisco.com> <D269F907.1DA82%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E2FFA6@ORSMSX114.amr.corp.intel.com> <D26ACE44.1DB5B%repenno@cisco.com> <7E05C330D7FD6D4FAD0728C46B89958581E3091E@ORSMSX114.amr.corp.intel.com> <839169f654bb4759969c407a2f8a1553@XCH-RCD-020.cisco.com> <7E05C330D7FD6D4FAD0728C46B89958589139434@ORSMSX112.amr.corp.intel.com> <fe5dab2b6e604654a7c81fa902a35852@XCH-RCD-020.cisco.com> <E8355113905631478EFF04F5AA706E9830DAA925@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DAA925@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.23.132]
Content-Type: multipart/related; boundary="_004_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_"; type="multipart/alternative"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Bbe9XtQa0WBbp-9mAJNLoPa8rTo>
Subject: Re: [sfc] will you trust your SF?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 07:36:54 -0000

--_004_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_
Content-Type: multipart/alternative;
	boundary="_000_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_"

--_000_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Dave,

Sorry for the delayed response. Not assuming anything. Let me put together =
a draft on this.

Surendra.

From: Dave Dolson [mailto:ddolson@sandvine.com]
Sent: Tuesday, November 17, 2015 11:46 AM
To: Surendra Kumar (smkumar) <smkumar@cisco.com>; Elzur, Uri <uri.elzur@int=
el.com>; Reinaldo Penno (repenno) <repenno@cisco.com>; Jim Guichard (jguich=
ar) <jguichar@cisco.com>; sfc@ietf.org
Subject: RE: [sfc] will you trust your SF?

Surendra,
In your comment,
SK2> As for knowing whether SF is alive, you don't need a decrement from th=
e SF, the fact that the SFF is receiving the packet from that SF is indicat=
ion enough.

You are making an assumption that it is easy for an SFF to determine where =
a packet came from. This may be true for local direct connections, but in o=
ther cases would require checking source MAC addresses or source IP address=
es (if these can even be trusted). Upon receiving a packet, decide whether =
it came from an SF or an SFF in order to decide whether to decrement the SI=
 or not.

As currently defined, with the SF decrementing the index, the SFF can forwa=
rd the packet purely based on lookup tables indexed by {SPI,SI}.


-Dave



From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Surendra Kumar (smkuma=
r)
Sent: Tuesday, November 17, 2015 1:14 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Hi Uri,

I've tried consolidate the crux of your other comments here to do a single =
response, please correct me if I misstate any of your comments/response or =
if I'm taking them out of context.

Uri>>SF are not making forwarding decisions, however they can influence the=
m.
SK2> SI dictates what the next hop is at the SFF. IOW, this index clearly i=
nstructs the SFF where the packet must be sent next. An SI value of 2 may m=
ean send to a FW or 1 may mean the chain is done and forward on the underla=
y, etc.. So, this is not influencing, this is the actual decision - let's n=
ot confuse this. Also, this is not random, this is all programmed by the co=
ntrol plane.

Uri>>As to the SI vs SPI: if the criteria prevent damage to thy neighboring=
 chain, SI decrement is not a issue.
SK2> SFF is the one with the steering tables, which is programmed by the co=
ntrol plane dictating how the packets should be steered. There is a well fo=
rmulated structure that control plane manages. If an entity other than SFF =
wants to decrement, then that should be under control planes control to ens=
ure packet forwarding on the overlay network is correct. Otherwise you have=
 a wild west. By allowing this, you are removing the distinction between SF=
 and SFF - you might as well collapse them into one. The control plane now =
not only needs to manage the service chains but also the SFs - becomes intr=
actable.

Uri>> ...And it is an indication of the SF being alve and doing some action=
 which may be better option that he SFF blindly decrementing SI
SK2> As for knowing whether SF is alive, you don't need a decrement from th=
e SF, the fact that the SFF is receiving the packet from that SF is indicat=
ion enough. Anything beyond needs to well defined in the context of OAM and=
 not overload forwarding with OAM.

Uri>> Clearly some SFs must be trusted e.g. NAT. NAT  is an example of an S=
F that is part of the infrastructure.
SK2> This came up at the open-mic in Yokohama, I think Kent or someone had =
some good comments on it. NAT brings up a lot of questions. And so does rou=
ting that is part of many traditional firewalls or load balancers, which Ni=
colas brought up. As an example, what happens to the overlay when the packe=
t is transformed through a SF - does it terminate, or is it replaced with a=
 new one or continues through it ? What are the implications of each ? What=
 happens to the SPI+SI? It is not a question of mechanics but the underlay/=
overlay semantics come into picture to keep packet forwarding correctness i=
n the networks. Beyond that, what does it map to in SFC architecture, etc.

SK2> While I am happy to contribute to the NAT discussion, the SI issue we =
are talking does not warrant that - it is much general: SF vs. SFF. I would=
 prefer as WG, we address the SI even before we get to the NAT part to demo=
nstrate SFC with NSH is viable in real-world.

Finally, thanks for the SI snippet below. The "MUST" in that is the problem=
. Until the WG resolves this, please remove this requirement. It simply doe=
s not make sense to mix network forwarding with service delivery - they are=
 two distinct things. Let implementations make the right decision.

Surendra.

From: Elzur, Uri [mailto:uri.elzur@intel.com]
Sent: Monday, November 16, 2015 8:01 PM
To: Surendra Kumar (smkumar) <smkumar@cisco.com<mailto:smkumar@cisco.com>>;=
 Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>; Ji=
m Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; sfc@=
ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?

Draft-quinn-sfc-nsh-07 form February of this year has

[cid:image001.png@01D12117.69E206C0]

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Surendra Kumar (smkumar) [mailto:smkumar@cisco.com]
Sent: Sunday, November 15, 2015 10:26 PM
To: Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); sfc@ietf=
.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] will you trust your SF?


[Skipping to the top of this thread and repeating some things from previous=
 responses.]

Keep the separation

*        between packet forwarding and service delivery

*        between application and infrastructure

*        between metadata and forwarding data

*        etc.

Simple SFs without forwarding constraints enables SFs to focus on service d=
elivery and not service chaining and forwarding complexity, that goes into =
the SFFs. Enable SFs to consume metadata for value added service delivery a=
nd not for packet forwarding, that belongs in SFF.

Operators want the flexibility to on-board any SF into the service plane wi=
thout having to concern themselves about how that affects packet forwarding=
 in their infrastructure. Whether SF is trusted or not, SF must stay off do=
ing the SFF's job.

If ETSI/NFV is any guide, this separation in operators' view should be obvi=
ous.

NSH draft until the last couple of revisions stayed off the normative langu=
age in this regard and is misguided in specifying, for instance, the decrem=
ent of SI at SF as opposed to SFF. This tosses architecture robustness out =
the window.

Surendra.

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, November 13, 2015 8:55 AM
To: Reinaldo Penno (repenno) <repenno@cisco.com<mailto:repenno@cisco.com>>;=
 Jim Guichard (jguichar) <jguichar@cisco.com<mailto:jguichar@cisco.com>>; s=
fc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Reinaldo

It seems like we are arguing for the same outcome. My argument is NOT about=
 the security aspect, it is about the SF role under SFC for the purpose of =
clarifying the potential role SF can play and for SFF simplification (e.g. =
no need to keep state for checking the SF was indeed doing it role vs abusi=
ng SI or SPI. Can share the external tunnel info with the SF [if the latter=
 is capable of processing when it is present] and use it on the egress etc.=
 Still need to keep state for forwarding in some cases). If we agree an "SF=
 can be trusted for NSH purposes"  then it can lead to some simplifications=
, I believe
SK>

I'm also ok leaving status quo as-is with a delicate balance of SF, SFF and=
 proxy roles. But I do think that making the assumption like you make, that=
 the issue of the SF being rogue or not is beyond this WG scope, can simpli=
fy our drafts. At the same time, we need to agree to the NSH SPECIFC securi=
ty aspects and this is on-going on the ml

Hope this makes my comments a bit clearer

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 11:25 PM
To: Elzur, Uri; Jim Guichard (jguichar); sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

"The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF."

It seems again we are conflating generic security requirements with NSH.  I=
f you trust the device then you accept it being part of a chain. If a devic=
e is compromised changing NSH metadata is the least of the problems.

I will reiterate my point about NSH security requirements. What new specifi=
c NSH attacks (and only NSH) we should guard against. Solving device trust =
issue, IP networks layer issues, transport issues, etc seems very much out =
of scope of this WG.

Thanks,


From: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 9:37 PM
To: Reinaldo Penno <repenno@cisco.com<mailto:repenno@cisco.com>>, "Jim Guic=
hard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "sfc@ietf=
.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] will you trust your SF?

(reply #3, you may want to read the other ones first)

Agree w the sentiment of further focusing the security requirements draft. =
however,

The use model where trusting he SF or not, becomes interesting is that of B=
YOD SF.
I also think we should have clear agreement as to whether SF is trusted (or=
 not say by Control Plane signaling) and adjust the SFF enforcement accordi=
ngly

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: Reinaldo Penno (repenno) [mailto:repenno@cisco.com]
Sent: Thursday, November 12, 2015 8:11 AM
To: Jim Guichard (jguichar); Elzur, Uri; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] will you trust your SF?

Could not agree more. We need to focus on the security aspects that NSH bri=
ngs to the table and not generic things that were always there.

I have the same concerns about the SFC security requirements draft/presenta=
tion in Yokohama. The document mixes generic security attacks that were alw=
ays possible in IP networks with NSH specific things.  I think somebody wen=
t to the mike (Linda?) and said something like: too many requirements detra=
ct/weakens the real stuff we should be looking into.

Thanks,

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, November 12, 2015 at 8:05 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

[Chair hat off ...]

Honestly the whole SF trust issue makes no sense to me from a practical per=
spective. Presumably if I have programmatic control over network elements t=
hen I can do whatever I want and it has nothing to do with NSH. The argumen=
t that an SF can do bad things is a red herring given that if I can gain ac=
cess to any network element I can do bad things - add routes to VRFs that s=
hould not be there, put interfaces into the wrong VRF, inject routes that f=
orce traffic in a certain direction, the list goes on and on and on .. What=
 I can do from an SFC perspective is verify traffic from SF->SFF (which I n=
eed for loop prevention anyway) to make sure that packets received from an =
SF comply with the SFP policy implemented at the SFF e.g. I only expect to =
receive <SPI(10), index (254) from SF1 etc ..

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>
Date: Thursday, November 12, 2015 at 1:42 AM
To: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "sfc@ie=
tf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Re: [sfc] will you trust your SF?

Hi

Should I deduce from the no response on the list that the WG is in agreemen=
t that the SF should be trusted ?
For multiple reasons that can simplify handling the external tunnel encapsu=
lations (if present) as well as NSH header itself

Thx

Uri ("Oo-Ree")
C: 949-378-7568

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Thursday, November 5, 2015 1:19 PM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] will you trust your SF?

Hi

in continuation of the discussion in the meeting today, I'd like to surface=
 this issue and hopefully it can be easily and quickly resolved. In the dis=
cussion about Map assisted SFC Proxy, we discussed the potential of an SF (=
e.g. NAT) to legitimately change the 5 tuple. Control Plane intervention ma=
y be needed in such case to update the map (as the new 5 tuple may not be t=
here) and to imply the SF is trusted for this operation.

This goes beyond the question of what to do in the case the SF changed the =
5-tuple. It is the question of: is the SF trusted - for the sake of the 5 t=
uple, as well as for NSH header changes (e.g. SI decrement or even SPI chan=
ge in case a "Classifier" is incorporated). If not, the SFF (or the Proxy) =
has to keep that state and VERIFY it on the outbound...

There are opinions as if we need to allow for some SF that are fully truste=
d and some that are not trusted. I assume all agree the SFF is part of the =
infrastructure and is trusted. We need to close on this for the NSH draft t=
oo.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


--_000_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle29
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle30
	{mso-style-type:personal-reply;
	font-family:"Candara",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Dave,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Sorry for the delayed response. Not assuming anythi=
ng. Let me put together a draft on this.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Dave Dolson [mailto:ddolson@sandvine.co=
m] <br>
<b>Sent:</b> Tuesday, November 17, 2015 11:46 AM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;smkumar@cisco.com&gt;; Elzur, Uri &=
lt;uri.elzur@intel.com&gt;; Reinaldo Penno (repenno) &lt;repenno@cisco.com&=
gt;; Jim Guichard (jguichar) &lt;jguichar@cisco.com&gt;; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Surendra,<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">In your comment,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; As for knowing whether SF is alive, you don=
&#8217;t need a decrement from the SF, the fact that the SFF is receiving t=
he packet from that SF is indication enough.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">You are making an assu=
mption that it is easy for an SFF to determine where a packet came from. Th=
is may be true for local direct connections, but in other cases would requi=
re checking source MAC addresses or
 source IP addresses (if these can even be trusted). Upon receiving a packe=
t, decide whether it came from an SF or an SFF in order to decide whether t=
o decrement the SI or not.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">As currently defined, =
with the SF decrementing the index, the SFF can forward the packet purely b=
ased on lookup tables indexed by {SPI,SI}.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> sfc [<a href=3D"mailto:sfc-bounc=
es@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Surendra Kumar (smkumar)<br>
<b>Sent:</b> Tuesday, November 17, 2015 1:14 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); <=
a href=3D"mailto:sfc@ietf.org">
sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Hi Uri,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">I&#8217;ve tried consolidate the crux of your other=
 comments here to do a single response, please correct me if I misstate any=
 of your comments/response or if I&#8217;m taking them out
 of context. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000">Uri&gt;&gt;SF are not making forwardi=
ng decisions, however they can influence them.</span><o:p></o:p></p>
<p class=3D"MsoNormal">SK2&gt; SI dictates what the next hop is at the SFF.=
 IOW, this index clearly instructs the SFF where the packet must be sent ne=
xt. An SI value of 2 may mean send to a FW or 1 may mean the chain is done =
and forward on the underlay, etc.. So,
 this is not influencing, this is the actual decision - let&#8217;s not con=
fuse this. Also, this is not random, this is all programmed by the control =
plane.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000">Uri&gt;&gt;As to the S=
I vs SPI: if the criteria prevent damage to thy neighboring chain, SI decre=
ment is not a issue.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; SFF is the one with the steering tables, wh=
ich is programmed by the control plane dictating how the packets should be =
steered. There is a well formulated structure that
 control plane manages. If an entity other than SFF wants to decrement, the=
n that should be under control planes control to ensure packet forwarding o=
n the overlay network is correct. Otherwise you have a wild west. By allowi=
ng this, you are removing the distinction
 between SF and SFF &#8211; you might as well collapse them into one. The c=
ontrol plane now not only needs to manage the service chains but also the S=
Fs - becomes intractable.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#C00000">Uri&gt;&gt; &#8230;And=
 it is an indication of the SF being alve and doing some action which may b=
e better option that he SFF blindly decrementing SI</span><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Candara&quot;,sans-serif;color:#C00000"><o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; As for knowing whether SF is alive, you don=
&#8217;t need a decrement from the SF, the fact that the SFF is receiving t=
he packet from that SF is indication enough. Anything beyond
 needs to well defined in the context of OAM and not overload forwarding wi=
th OAM.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif;color:#C00000">Uri&gt;&gt;</span><span style=3D"colo=
r:#C00000"> Clearly some SFs must be trusted e.g. NAT. NAT&nbsp; is an exam=
ple of an SF that is part of the infrastructure.</span><span style=3D"font-=
size:10.0pt;font-family:&quot;Candara&quot;,sans-serif;color:#C00000"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; This came up at the open-mic in Yokohama, I=
 think Kent or someone had some good comments on it. NAT brings up a lot of=
 questions. And so does routing that is part of many
 traditional firewalls or load balancers, which Nicolas brought up. As an e=
xample, what happens to the overlay when the packet is transformed through =
a SF &#8211; does it terminate, or is it replaced with a new one or continu=
es through it ? What are the implications
 of each ? What happens to the SPI&#43;SI? It is not a question of mechanic=
s but the underlay/overlay semantics come into picture to keep packet forwa=
rding correctness in the networks. Beyond that, what does it map to in SFC =
architecture, etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK2&gt; While I am happy to contribute to the NAT d=
iscussion, the SI issue we are talking does not warrant that &#8211; it is =
much general: SF vs. SFF. I would prefer as WG, we address
 the SI even before we get to the NAT part to demonstrate SFC with NSH is v=
iable in real-world.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Finally, thanks for the SI snippet below. The &#822=
0;MUST&#8221; in that is the problem. Until the WG resolves this, please re=
move this requirement. It simply does not make sense to mix
 network forwarding with service delivery &#8211; they are two distinct thi=
ngs. Let implementations make the right decision.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Elzur, Uri [<a href=3D"mailto:uri.elzur=
@intel.com">mailto:uri.elzur@intel.com</a>]
<br>
<b>Sent:</b> Monday, November 16, 2015 8:01 PM<br>
<b>To:</b> Surendra Kumar (smkumar) &lt;<a href=3D"mailto:smkumar@cisco.com=
">smkumar@cisco.com</a>&gt;; Reinaldo Penno (repenno) &lt;<a href=3D"mailto=
:repenno@cisco.com">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;=
<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D">Draft-quinn-sfc-nsh-07 form February of this year has
</span></a><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img border=3D"0" widt=
h=3D"1029" height=3D"93" id=3D"Picture_x0020_1" src=3D"cid:image001.png@01D=
1257E.A17C25F0" alt=3D"cid:image001.png@01D12117.69E206C0"><o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Surendra Kumar (smkumar) [<a href=3D"ma=
ilto:smkumar@cisco.com">mailto:smkumar@cisco.com</a>]
<br>
<b>Sent:</b> Sunday, November 15, 2015 10:26 PM<br>
<b>To:</b> Elzur, Uri; Reinaldo Penno (repenno); Jim Guichard (jguichar); <=
a href=3D"mailto:sfc@ietf.org">
sfc@ietf.org</a><br>
<b>Subject:</b> RE: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">[Skipping to the top of this thread and repeating s=
ome things from previous responses.]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Keep the separation
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,serif">&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,sans=
-serif">between packet forwarding and service delivery<o:p></o:p></span></p=
>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,serif">&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,sans=
-serif">between application and infrastructure<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,serif">&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,sans=
-serif">between metadata and forwarding data<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-size:10.0pt;font-family:Symbol">&middot;</span><span style=3D"font-size=
:7.0pt;font-family:&quot;Times New Roman&quot;,serif">&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Candara&quot;,sans=
-serif">etc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Simple SFs without forwarding constraints enables S=
Fs to focus on service delivery and not service chaining and forwarding com=
plexity, that goes into the SFFs. Enable SFs to
 consume metadata for value added service delivery and not for packet forwa=
rding, that belongs in SFF.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Operators want the flexibility to on-board any SF i=
nto the service plane without having to concern themselves about how that a=
ffects packet forwarding in their infrastructure.
 Whether SF is trusted or not, SF must stay off doing the SFF&#8217;s job.<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">If ETSI/NFV is any guide, this separation in operat=
ors&#8217; view should be obvious.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">NSH draft until the last couple of revisions stayed=
 off the normative language in this regard and is misguided in specifying, =
for instance, the decrement of SI at SF as opposed
 to SFF. This tosses architecture robustness out the window.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">Surendra.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [<a href=3D"mailto:sfc-bounces@ietf=
.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Friday, November 13, 2015 8:55 AM<br>
<b>To:</b> Reinaldo Penno (repenno) &lt;<a href=3D"mailto:repenno@cisco.com=
">repenno@cisco.com</a>&gt;; Jim Guichard (jguichar) &lt;<a href=3D"mailto:=
jguichar@cisco.com">jguichar@cisco.com</a>&gt;;
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Reinaldo<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">It seems like we are a=
rguing for the same outcome. My argument is NOT about the security aspect, =
it is about the SF role under SFC for the purpose of clarifying the potenti=
al role SF can play and for SFF simplification
 (e.g. no need to keep state for checking the SF was indeed doing it role v=
s abusing SI or SPI. Can share the external tunnel info with the SF [if the=
 latter is capable of processing when it is present] and use it on the egre=
ss etc. Still need to keep state
 for forwarding in some cases). If we agree an &#8220;SF can be trusted for=
 NSH purposes&#8221; &nbsp;then it can lead to some simplifications, I beli=
eve<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ca=
ndara&quot;,sans-serif">SK&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m also ok leav=
ing status quo as-is with a delicate balance of SF, SFF and proxy roles. Bu=
t I do think that making the assumption like you make, that the issue of th=
e SF being rogue or not is beyond this WG
 scope, can simplify our drafts. At the same time, we need to agree to the =
<i>NSH SPECIFC security aspects</i> and this is on-going on the ml<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hope this makes my com=
ments a bit clearer<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568<o:p></=
o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Reinaldo Penno (repenno) [<a href=3D"ma=
ilto:repenno@cisco.com">mailto:repenno@cisco.com</a>]
<br>
<b>Sent:</b> Thursday, November 12, 2015 11:25 PM<br>
<b>To:</b> Elzur, Uri; Jim Guichard (jguichar); <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">&quot;<span style=3D"font-size:11.5pt;color:#1F497D"=
>The use model where trusting he SF or not, becomes interesting is that of =
BYOD SF.&#8221;</span><span style=3D"font-size:12.0pt"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">It se=
ems again we are conflating generic security requirements with NSH. &nbsp;I=
f you trust&nbsp;the device then you accept it being part of a chain. If a =
device is compromised changing NSH metadata is
 the least of the problems.&nbsp;</span><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I will reiterate my point about NSH security require=
ments. What
<i>new</i>&nbsp;<i>specific</i> NSH attacks (and only NSH) we should guard =
against. Solving device trust issue, IP networks layer issues, transport is=
sues, etc seems very much out of scope of this WG. &nbsp; &nbsp;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.5pt;color:#1F497D">Thank=
s,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a><span style=3D"color:black">&g=
t;<br>
<b>Date: </b>Thursday, November 12, 2015 at 9:37 PM<br>
<b>To: </b>Reinaldo Penno &lt;</span><a href=3D"mailto:repenno@cisco.com">r=
epenno@cisco.com</a><span style=3D"color:black">&gt;, &quot;Jim Guichard (j=
guichar)&quot; &lt;</span><a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a><span style=3D"color:black">&gt;, &quot;</span><a href=3D"mailto=
:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:black">&quot;
 &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"=
color:black">&gt;<br>
<b>Subject: </b>RE: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(reply #3, you may wan=
t to read the other ones first)
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Agree w the sentiment =
of further focusing the security requirements draft. however,</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The use model where tr=
usting he SF or not, becomes interesting is that of BYOD SF.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I also think we should=
 have clear agreement as to whether SF is trusted (or not say by Control Pl=
ane signaling) and adjust the SFF enforcement accordingly</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> Reinaldo Penno (repenno) [</span><a href=3D"mailto:=
repenno@cisco.com">mailto:repenno@cisco.com</a><span style=3D"color:black">=
]
<br>
<b>Sent:</b> Thursday, November 12, 2015 8:11 AM<br>
<b>To:</b> Jim Guichard (jguichar); Elzur, Uri; </span><a href=3D"mailto:sf=
c@ietf.org">sfc@ietf.org</a><span style=3D"color:black"><br>
<b>Subject:</b> Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Could n=
ot agree more. We need to focus on the security aspects that NSH brings to =
the table and not generic things that were always there.&nbsp;</span><span =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I have =
the same concerns about the SFC security requirements draft/presentation in=
 Yokohama. The document mixes generic security attacks that were always pos=
sible in IP networks with NSH specific
 things. &nbsp;I think somebody went to the mike (Linda?) and said somethin=
g like: too many requirements detract/weakens the real stuff we should be l=
ooking into.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Thanks,=
</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Jim Guichard (jguichar)&quot; &lt;</span><a href=3D"mailto:jguichar@ci=
sco.com">jguichar@cisco.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 8:05 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">[Chair =
hat off &#8230;]</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Honestl=
y the whole SF trust issue makes no sense to me from a practical perspectiv=
e. Presumably if I have programmatic control over network elements then I c=
an do whatever I want and it has nothing
 to do with NSH. The argument that an SF can do bad things is a red herring=
 given that if I can gain access to
<b>any</b>&nbsp;network element I can do bad things &#8211; add routes to V=
RFs that should not be there, put interfaces into the wrong VRF, inject rou=
tes that force traffic in a certain direction, the list goes on and on and =
on .. What I can do from an SFC perspective
 is verify traffic from SF-&gt;SFF (which I need for loop prevention anyway=
) to make sure that packets received from an SF comply with the SFP policy =
implemented at the SFF e.g. I only expect to receive &lt;SPI(10), index (25=
4) from SF1 etc ..</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;</span><a href=3D"mailto:sfc-bounces@ietf.o=
rg">sfc-bounces@ietf.org</a><span style=3D"color:black">&gt; on behalf of &=
quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a><span style=3D"color:black">&gt;<br>
<b>Date: </b>Thursday, November 12, 2015 at 1:42 AM<br>
<b>To: </b>&quot;Elzur, Uri&quot; &lt;</span><a href=3D"mailto:uri.elzur@in=
tel.com">uri.elzur@intel.com</a><span style=3D"color:black">&gt;, &quot;</s=
pan><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span style=3D"color:bl=
ack">&quot; &lt;</span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><spa=
n style=3D"color:black">&gt;<br>
<b>Subject: </b>Re: [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">&nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Should I deduce from t=
he no response on the list that the WG is in agreement that the SF should b=
e trusted ?</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">For multiple reasons t=
hat can simplify handling the external tunnel encapsulations (if present) a=
s well as NSH header itself
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc [</span><a href=3D"mailto:sfc-bounces@ietf.org"=
>mailto:sfc-bounces@ietf.org</a><span style=3D"color:black">]
<b>On Behalf Of </b>Elzur, Uri<br>
<b>Sent:</b> Thursday, November 5, 2015 1:19 PM<br>
<b>To:</b> </span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><span sty=
le=3D"color:black"><br>
<b>Subject:</b> [sfc] will you trust your SF?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">Hi </span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">in continuation of the=
 discussion in the meeting today, I&#8217;d like to surface this issue and =
hopefully it can be easily and quickly resolved. In the discussion about Ma=
p assisted SFC Proxy, we discussed the potential
 of an SF (e.g. NAT) to legitimately change the 5 tuple. Control Plane inte=
rvention may be needed in such case to update the map (as the new 5 tuple m=
ay not be there) and to imply the SF is trusted for this operation. &nbsp;<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">This goes beyond the q=
uestion of what to do in the case the SF changed the 5-tuple. It is the que=
stion of: is the SF trusted - for the sake of the 5 tuple, as well as for N=
SH header changes (e.g. SI decrement
 or even SPI change in case a &#8220;Classifier&#8221; is incorporated). If=
 not, the SFF (or the Proxy) has to keep that state and VERIFY it on the ou=
tbound&#8230;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#2E75B6">There are opinions as =
if we need to allow for some SF that are fully trusted and some that are no=
t trusted. I assume all agree the SFF is part of the infrastructure and is =
trusted. We need to close on this for
 the NSH draft too.</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thx</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Uri (&#8220;Oo-Ree&#82=
21;)</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">C: 949-378-7568</span>=
<span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_--

--_004_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=85906;
	creation-date="Mon, 23 Nov 2015 07:36:38 GMT";
	modification-date="Mon, 23 Nov 2015 07:36:38 GMT"
Content-ID: <image001.png@01D1257E.A17C25F0>
Content-Transfer-Encoding: base64

iVBORw0KGgoAAAANSUhEUgAABAUAAABdCAYAAADda9/9AAAAAXNSR0IArs4c6QAAAAlwSFlzAAAS
dAAAEnQB3mYfeAAAABl0RVh0U29mdHdhcmUATWljcm9zb2Z0IE9mZmljZX/tNXEAAP+QSURBVHhe
7P11dJ1pluaJPmJmZma0JEuWmTkYMiOpKquy+Hbf7p51566edf+9NN3TfWemu2e6q6sqs6qykoIj
HGa2ZZYlCyxGi5n5nPt7jwyyLYchoNKZ51t1ypH2gffb3wt7P/vZz3a2csl+2S1gt4DdAnYL2C1g
t4DdAnYL2C1gt4DdAnYL2C1gt8DvnQWcf+/u2H7DdgvYLWC3gN0CdgvYLWC3gN0CdgvYLWC3gN0C
dgvYLWCzgB0UsE8EuwXsFrBbwG4BuwXsFrBbwG4BuwXsFrBbwG4BuwV+Ty1gBwV+Tx+8/bbtFrBb
wG4BuwXsFrBbwG4BuwXsFrBbwG4BuwXsFrCDAvY5YLeA3QJ2C9gtYLeA3QJ2C9gtYLeA3QJ2C9gt
YLfA76kF7KDA7+mDt9+23QJ2C9gtYLeA3QJ2C9gtYLeA3QJ2C9gtYLeA3QJ2UMA+B+wWsFvAbgG7
BewWsFvAbgG7BewWsFvAbgG7BewW+D21gB0U+D198PbbtlvAbgG7BewWsFvAbgG7BewWsFvAbgG7
BewWsFvADgrY54DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL2C1gt4DdAr+nFrCDAr+nD95+23YL2C1g
t4DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL2EEB+xywW8BuAbsF7BawW8BuAbsF7BawW8BuAbsF7Baw
W+D31AJ2UOArP/gFTbVUqba5W8M+iUrKTFe8r6Pshv3Khv3d+oKlOS0sOUrOznJ2dJDDP8PdWefn
tOjgKEcXFzn9M/z+7/VPLgyqvapBdV1WBaanKTU+SH4u/xyz4Pf6KfwW3bxFi5Pdai+vUONCkILT
cpUX7SWX36IRfmtDsc5psrtOt+qGNeQar4KCWEV6Of2z7JGP37NV1tkB3blVoYYRZ7mnF6kgxlce
bOX2y26B57PALPO8WbUNfep3iFVWbqwSAlyf7yvs77ZbwG4BuwW+QQt8i7HrnCY6GlRf16yOoVnN
OXjINzxUIT6+8ua/vQMDFRTtK09nx98SZ+BZrT6n4Wsf6cN/Oqdbie/qvb9MVqSv60sICkxpqKFe
DXWt6pxckNXFTV5eBI/WBc1Oz2ja4iG3kASlpCcrNdz7a3aKJjXY2qTq2hb1ji/I0d1XgVFJSkyK
VUyQ+0vuKE9rsKNTrXdm5R4erfiYQHmv4lAuTXSqqbZBjR39mlhylpNPiKLC/eTu6SUH9wBFhgQo
1MtZ4AlaGu9SZ0OtatuHND7vKCcvT7kTYFrnpjU7Y9GSAhWZkq709EiFea8I/xcH1NE8oN7ZQMUn
RyjC39X2ffbrW7DAfIfKP/mF/tuxBeX/xZ/qxxGBzwgKWLU40qbG+tuq7RjVvDzk4cs8SklSUmyg
fF6GKNJqnOEGVde1qK1/WlYHZ7l6BygoPk1pCVGKIAB8GS+r1SLL4qKsVoA2Zyc5PtdismhhuEZX
f/rv9LPJfBX8SbTSf29BgUkNVX+hf/rv1ar2e0P/j4QIhTMnVp8V7G8W87LKwfEpAKt1WmNtTbp9
s1m9Vld5JWUojTMl1ud53B6rLJPNqvrN/66/rfVW0E9ilRwBKPDPHssxLsuiFi2sHAcngGbm4JP2
ckCXmf521d1sUMfYklwTUpSUzP4R4CYn+/7/LW494xq6fVwf/N1lXXQ8qH/1P4bYQYGnWd/KPLcu
2da79WnzXPiqzPPG6ia1DC/ILSqeczJZ8UEecrfP86dZ2v7vdgvYLPA8p+OLm2xhVEOt5Tp/7JTO
XKpTx+i8Fh09FRAdIPcZF7nMxypzx3btfTdHCT4vGwRv1dL8jKYmJjQxPUs2mM3rxS31z/hJAwqU
69Knp3W5d0RTS4uamVmUxcFF7jhADl6h8svYoQO+EYoO/ZpBAasBBSp09tApXW/r19ysRT7Zu7X3
nXf1+vpYhbycMcPysxyt1a2yazrTHqQ1O8IUG4MtH3rKi5rtrVPtpTM6fPq6KtoGNCNXOfiGK95/
SWNOgVLiNr13cIO2J3rLjc8uAgq0XjuuL87Xq3NiXrNT81rAO3R0d4GI4MkrVWv3ecg/JkyhgAL3
fs/BaVaDDRW6UCl17d6mrUVxCrWflt/OmgNcm5+Z1MTEgmbml3B0nvVnDSjQwvw4rA/LGjQ0Ip53
hja8947e+2GpsgNegv3SMqupOxW6dPyEztQOaWluRvOOgIwbf6Afv/OKXk/11ktwF489MMvMkPo7
W9U2F6iwyGglBLs/F6BttS5qbnpKE5PTmllgTjzrlPide9/yGTo9PqFJJxhVJgB40j1apvEl2tTb
j9NPcBvDWeT5pMljndF4W4XKfvG+zvaNaXbz9/Xd73xXf5Dj+3zzjbU7N23WrqM85n5LnpNlRhO9
nepsn5BDZIKiooPk/8RzkjOiv0EVn/5KhyqaNVp0QLu+88f6y3Xh8nmZz9aXbR0Q4C4tzGp6alLj
DrOaX/r9XfHP/Og4OyZ776irc0yLQdGKTAxX0BPnrAEFWlR99H19cKVVExkbtendn+gPS2MU7f7M
v2h/o90Cv9cW+OZBgaVpjTdc1Jljp3WqYU4O8SXaHOEjT81pbrxOZZ9e062mPk1G52r9Auj/S/c4
vBVS/LrecMtTqW+6coKdCOlexosgMj5DudtdFTTRr/6uOh3+okNjHnHKLE1VdlKoPEJTlRb6DaCu
Dv4KS8jRht3uimhvVceVE6oebFZb77DGFl5mUIAgvKJSDZXNmgqJkV+Qj9ycV85wsoUTzbp56LBO
XG1Wt2eMsrYUKcRLWpge1UgFQdStOY2OxWvjlhKo/7KBAk4ANFFZ67XFM0nD08NqAkypbV2Q+7p1
ysuLU7A7gEJ6hII8Hjk93UIU6i+5T1fpRi0Z2vgwgDmPl5yJ8ZKsNa8EFb36rv4qc1GhBdEKcXvW
nc5R7sEJSl+7UweDEtXb0KDTP4XtUd2r4SlAO+inv/UBtYObPMLSlLtOZGuntdBXp/qaqwRqPWR0
ZsjvLINdL9vlONuv7toT+ngsV6UekUoMfp47cJZnaLaKf/iv5DoTovDUALmZSPhZp8Xz/NRv+3sd
AxSes1ff/UmutrqnK80fRtSTxuw4reHKayq/MiG/78YqDNaa5xPfCxsxOlW5m/LVf/Gojg50qX5w
7jlBe5hYgXzH23+pn2xwllduyG9HIO1IyUUrgPMnDXLY/ZZ84wAFnmQH1p9bUDzneKHuTLTr6Gi7
anphlRGT2kGBb3FxOAQqPHOH3vqDZBU5JCs/0h6pPtX6AHLT7bWqOlSvuYId8kwBFHjih1yY57FK
L8xW7lCXTk+0Mc8nNDYvOyjwVEPb32C3wLIFvmFQwELg36GbF27pSq2T/PL3as++YrJbhpYOJWiq
XIHDVqhts3KdX7TRAl8+v8hBXskl2hBbqCVosS6uUBpfytnlpaCUApXG5vAcRjV457L6O6rU61+g
Pa+XanOahxydXOXm5ibXrz0KcZc/v7uBwKF4rF8d3oN6v86Cfww9cumlNCaDxuOa61R5RZ/aRoOU
sjlJ6VGeeigWXByCnVGmk3W96goq1Jb9W7QxPUTezlDmFkY0HDdHFrJK5wAS5pfIUJnEArZ38o1S
fFGQIvINrW5c1QOT8nOfks+ON3Rgd6qC0C1wdXWVq/ujdbm+is5MUnZzk241QCdNyVRmSLSCXsaI
7GWbFg5QRUu2K7LQCtUcdtRD4NBTbsY3TqlrwxWXN6HxO1e1eOGshphfFjMnlqfEb/fl6C7vqFyt
C0pXoWFSDQBKHRtTyyATz1DBX75Nf9neSzDEhtuoNY9VyvwLZP08YpS28y0lWAg80fn4/ZWYcJJn
7FptDccH4PR0cfsSUIAzYX6gVwMNw7JMwaL50pnvIZ+4PK17111unn1q6fC0UeyfG3dxClPChlcU
xVnk4MK++luRXUeTYhwNhvoOqXhOs19qB9h+oSnKexUA2KNHPRVLmjG6Ns/MVvrt3l5entG5yDN6
jTYABpaYeY6vaL+eYgFYQ0tjzPPGTs3GjjxlnqP5EZKozF27tOQ2SlnvsEacHPGR7Fa2W8BugWe1
wDe8K01oqr9eZe1T6vDP02vF67U+MeBBZjJwnTbsA7Fe7NB8mr+8cJQf8g+tYxqqK9fFawj5UT89
veQqj+B4pawpVemaRBFj3b1Y9SDgN69Rq0X94MCkp4IjMpWzYb1Ks3zlNndHty+e0dnrHRp2jlf6
pg1al+ik2brLKrvRqJ4FZ37XRd4BiUotLFZJXqh8ZqgBvnxdN27f0cTULPVMrnKPK1DhurUqivGA
8n1Ll05fVnlzv2YcPOUTk6zk7HwVpsUhkuTwJY46dzhCUHb9mq5Ut6pndIEgD1pUVLgigh216BWs
kKgUpUUEyH9FvbB1ql23r1zT1YpG3QH6XHSi7j4+RwWlRSpM8afS+KteOKZuHvLiZfLRTlN+8vPx
0aSPnwKCQxTg97AnNNN5S1Xnz+ta56IWYnJVUJyhTJ8xMpjlulzRou5Ji1zCcpRfsk4lWeEKfIw+
YcoVbup62U3VdA5r1NFXYekFyiXDHejjr0B/6HUmgn7UcVnsV+sNbHe1Vm3D02gduMs3MkM5JWu1
LidC94a5ONys+msXVFZ1R4NLbgRikYpLX6OSjQhBek5qoOKSKiqp4e8f0ogbcy+1VFuL85Qd5vb1
ZM4tc5rvqlTV6JxGwvK1g1rWMNeHBQaXRnrUdatK3S7BitmwUevXpSrm/opEY2PjLr0yCUNjLFox
1Ng63rWFg5OLXD152R65swIDfeWLUIEPuhyBwf4KeOJUcJBLeKriU5sUUdZOKQE03JwQBQL0PLej
/FWnm+3z85rsrNaNIxdVQQZvKYO1l5+ilKVuNVXe1I2mHtayk7zDYbCUlKi0IFJ+9wY6N6DOmis6
crFG3aNLcvFKVnbxRm3cGImiwoh6bsJOulil2xN+ispZr62lmUoOcn1Qp8z6brx5U5fLqbMdnIS3
xNwPZG/JX6O1hWnY24yPbBzA2NWjl3VrYBpHw9Q3BpJ9XKONO3KVFuKi+aZLunL9lqp7pzQ/Bwi6
EK5k5vzGzSmKdBxTX80ZHb98W829c3LyDFd0crbyinKUZvRTnmh0Av7helVcuc4e0aG+CQd5hqVw
f2lK9vFmLfpq0d2Aj48uDtZDW6XKrlaooqlfk3MAEL4xis8t0fqiDCUHrBbNzGuitVI3Ll7XzZZe
jVoJoHwpc4kjIzrvKf9gaPGFiYoEyH3xw4L90AX78rJdDuxtft7ymgQcfiqiwfg6a1R56Zoqm7o1
MEfttCv6GgkZyiouUH4yugqrzcWpVlUb+1U0qWsUHQOfcIXHxio+2AsquJ8ikuOVkR6Eng0fpuZ6
arBbXU316B40qrlrWNPQcqyU7kQgLFeyPk85UR4ratyXNM3aLj/ya/3q86uqGu/XYuttdYeZzJ8B
71wAUJOUu6VU60sp0Vmp+zDdqZpLZTp1uV7DaIe4+wcrPKNQBflZAHTuXyIAatXcIOO7dFXltazb
GQJiR28FRqcoo6hI+RmRd3+HNdV+XWUXr+pKmxs6PQXavCVeoU59arqKDevaNWDxkkd0vtat5yxL
DXzxs2N+UJ3VN1hndRqZgv4fnqvMtcXamRX8IHu/0K+2sku6dLlW3W7esnpnad2mQpWk+Wix66bK
D5/S1a5JjbpwnhG4pmavUdEaw6R59KGyJsbaVHXic334wWGdb5mX1986qu6kt3zYGK0GIPOOVFD2
Ru2F2ZbiZ4zOvHM1ekXsiYF+8p/0wceY4vhtVOV1nl/LIDTuUCWtWafS0iw+4/xgH5zrU2vFFR07
W63eKfYXnlNYaq5y8vPJ8HqJrfzBtUSteNMNHTtxU02jHkosKVVRbpT8hht1u/KWKpr7eNb+sEEK
VLKZMy6Cz3+V/XOmR00Xj+nzv/9Ix6q6tfgrqxprIhRiswOJFc4zz9T12rY+V0URZk5iB2c3ufv5
KTDAX/6Bi4ADlK11ssfW3tTFGs7IRXRr0nkusCqywzxXOQPRfaD07MrFCtV1DGjCyn7gx35ZYPaW
FCGH8TVdVs33Izp56bKuMa4B0A4nPxhu6E+FeaHl4BCs+LWUjfAMHs6zT2ig7qaullXqdsegprCw
c0CC0sz4CpMUuYJOYpnoUP3FMl28XKc+Fy95RmSpYAM+YZqf3GY7dfvCeV242a4+hzhlry9VcZqr
ppqu6NTVFvVMWOXN3usSEKmYou3amsH5yWfqLl7RlVut+JecGviTTlFrVLyxVFvinDTXU6PyY2d1
HT2fIfSBAtFmSsxYo8L8aEV4f9muiiZGUzm+Dn5Ea7/Gl7zky34cEwMrhI3L4h+nmNgkZQWt/A7W
f8ctXb1Yrqpm9vN52LfmDMgu0voSzsCAF9/F2YDUefuKTnOedc6GKDN/rdZk+GnpTrWqrlapvntC
s54hCk5lHpWusTEhHvwa4O+sSTa1qL72thpa7qhvfJ5kh4s8wlOUXlyidQgvhq/0ead71XqFssrf
fK4jN1o0MzWmpr7LCrtbaGXBB/ZNLda6dWu0Hp/czHMHZxJXvn4KCuCMCVrSoueSrH01qrl8Tacq
OjRi8VNwknk2BcqO8n5kDn1NU9j+NXYLvMQW+Ao7xDPcNTV98+Mo905bNRUardDQFYCA7ePeCs0t
0jbfRM16BSnU496hTP3tRJfqKm7o6oVrutnUqYFxaKZLOGouTWpigxwd2aQt6zMUH3hXsXlhSsO9
7Wom0K+opTTBqUd3Fr2gZPrLFQeu7FyZyhs71DNWTfbVQc5bExQ00KmGm6d17lqfBmd9lbz5oDzT
EH0yQ1uaQhyrUmeOUGNfTxY2PEnFeyOVRHbWVDwuzhB4IGJUXdWqMRzKHvcwhfV8X+KwCI4HQFjV
4WeT767VtVNndf5StRr6QD65J1fffnU2WuW0wCbom6u1e76vwKB7oMCMRhprVXP9ksqu1+h214gm
5hcQuHKSWz1U+6Eh9W3frPWpCMd9dWTg7kMFqBkjUJqh1tV1XFNTE/y9/0MPfGlmXGN0Xag8X6dr
c+cIfNZoM7XB7sMcqqC6A2gsTC41qr1/UkvOu7U5PVS+dzd862SfOqvO6+z5y7p8k2cys6AFhA29
u3B2KihP4Hl1uScrI39lVmaRALJJ9eUXdYkgzJScjMzxuQVHud5uUUd/H47yDm3KjlM8nEiH+UmN
9TUjrnRJN2s61D6XrXXfCVPyxgwlOFo0e/uEPvv7ozre4yDf3LXK80hVft7XVy9qZT4O1tVpDEaM
b3qMwkO9HnP4l7DrcO+AFtziFRaLU/foagzM0PrNwYqa8FQkZRsPOaL3n8aYphAYnOJZOVCrOIYT
EPAI+PDQg8OpCgyNVY7/DdUMM3+Gs5QUjMP4DMv5638L2a7ZcfU1VKn8erluEjycz8xXiR/sob52
tfSPaXyS3KEzgVo3c2Zmt3bm8nx9eb4EctMj3ax31NtxMBp6U7RmgAAgaFS+Q/Wqu4yTVlWn6h6r
fNqmcIxwhtdhZ1eCzPYq3Tx1TmU19aoyDiT13ExSsrUNZBPb1NSzTTvWZysfhMY6O0ZWskpV5Td1
CUbTlEeBtu+LUc7G5VInU1feXQE1+UKNmmYo2QjepFdhvRTaGC7U8o7cUWtDjaruDGqkbVYufrka
+CvjGGYozmO1TWJGw61k0k+c0oXyWlX3TWieOe7p26mubkCM+Sm1NM0qPCl/Wdzu3kOZ76VM5Yau
X7iim/Vtah2aIEMCk8QRcKyFtdI/qG07C5Ua5vPgWS+Oa/ROuS6cOq/TZ26rfWRKi64Ags7uarvt
oIFKJwVBd303NkohXwkUeHjmLE6P24DWhcVlCPiJ2MhMP6rv53T2coWul+OQj7InwcZyJGRxb8a5
bO5S7+YN2lSSqHD3e5ZYYJ/AbmdP6tT1WlUCJs+gj+LsHaR26Na11KTXdiZr43dfU0SaAQXYzeeH
1UNwe+3KVV1u6NSdEcrcGJRl1lm1CK/2TVKPvmej1oRznth+BnBoZhgmVataOke5lzZ1IPrm0k8m
Grrr0iIlHS6OCqCjgKFoP7xxTmm0t0311YCBfO8k2d7xzDf0umcU6zB8daCI5zRYRxCDNsnF683q
6hsm0wvAYyE4aWzCwe5WZ8l67dqaoRgfBj47rAE0fC4catfQ+FndqCxQVpKLZtsb1doMGIhWzJRH
i5on2AddN2lzHOUbL4QKGvHgmzpPrfpZ1p7vBh90ZwrQBAAoptPJgqGtW6jzHeCcPPKxznYQGOR/
XwGA5yUYZXEKTYYmzrTGAWwBUDsRo6i1jvJLCFNQ2KNlMTynxUmNtLaqtaNb3VNA1wSpS6O+8nGm
DAumocV/QlEB2drAHvjg4nNTU5qeYG9suK5rA3Os0Rn1treooQcV+EHpZvWA+sac9d0D6Yq5p8EC
C2Ry8I6aqm/BaOEZU6Y1GbdJ6x15TuzlQSuBHrQhFsY5uwEpT5e16tSlK7pYXKgMH8bbiZ3N76AF
4nSLLP2Q5PJmkbLCPV4cZDN6Al0dam3qUBeB0gKAlBbwA1xg1qEtY/XgrHWj5GHNIzS7mRnNTqJh
0d6kup5PbGy8hZ421sMddQ8uyvFmp9oHWV1vrlFGKPuAzYj4OmO9dMm4oEvXynWtvlt9gxNaAIBY
cmhWK2d239Q2bSiie0boCtD1RQ6LJfbXwVpVnD+tIyer1NA1zhwiWeGJuCpno4WIe3EpT68GhSvk
PijAPQCut98gAXCNJENjj/qHGZ9Zv45NamN8/YxvPUBsTvBy1x1zNo/1AAqXX1XN2AxJnWZNIKTs
5Rgm1V7UlfJKXa9pV9dErVqZZ/PWVEUPtOOb4Lddq9eUq7+CSl7TwSRq1m0mmtFoe42uf3hI13so
j0rIVNwuOgvY7O8oC3NnsJmSqSrmwjT701So/HMs+pfhsP2SV4U02ZNgTN6+qlNfnFf5bZJH7JeL
jj7y9mxTSxWB/xx+WdorOngw7j4osDTFOqq6pmuXAOEautgnxjVnzgCHRjW1EYRPjgJS0j0jwvPF
hKJJdEyPAthXndPpq6O6dKRMWRtS5GcZVH8z4DXnx4wjcFddh7r7AaV3rdeapJC7QD6sKvaBqquX
dOFyNf6aKQ1lbSLWOlfFfGwa1fTQdu3YCIDpeZfhyO9N9HWqjbF3jbOPo99icVlQnzP1AEafwRlf
hm4liTmPzPNZNEAmWPMd9Wq686kO17vKc7RNlS1t6h+FaXS1XYQQ0ptrVQDY+1Rc+kXmsv0zdgu8
pBb4ZkEB3E9Xdx+FaFxN7QTBTfEqiooVgPzdiwxYSJQSQ8KhkOIccgAY32Rpik3++kWdukBGxDlF
BQe2KSncV66oWE9QF3inpk5t187rlKu7dhLkJbGJyCsStHGffKKpv71crqNf9KjmwlE5TgTKHyfX
I2qzXi1x0HQnm5d1HjTXU4H5O7XPCaR46ogu3fFUXG6W0ghevcw24R6tnIxk5SbV0zLKR6kbduu1
HYXKY0M1W5ZHcKrW7fVUdBGBfcsxfVFBZmpiBPSTQNUCKPBYUm5J83eqdP2LY/rkxrCs4YXavila
UYEGTbVoqpUg5vQVMtde8l8zpSnjTBrlfw7J8jPndLVxWs4JW/TqPhx0+iE5zCJs2MO/ARiUnSRr
7LBZW7OCqBF8Ie/u8elrvGJeDndfj77BjYxz7r5XNUeGoOmXF3XhxDiU9216bcMmHSimY4BlTN1X
TsIkuKAzN6IVHh6iNSEOcuLvO6pBfz+jW8Okn0LXv6ZNtGcLcCf7Ntiq+rJTOka5SVcMgoZ7nOVm
c77IEs20kGE7owvX+zUfUagdPwRk8iOruchh01tP4AOz49RFwgUX+RRhI78YJW94VW8EJyrlDMF/
hQWFZuyKYzRngY7Gn8N+sYpKWat9ezaoKBO9BOgMX9eCWAQV76wbk+OsvxIjQK5XOfsdPTzl5eOu
haoOMuMEpGSgswi+7j9BlxBFJgQpkuDJQhCAwPQqlwmqHjynpz99Z/n4Byoh1UFlI8NqHZxSYRKC
n0+lxDJ/J4c00EfJwwzsjNBghQZSz/s8NPjHRg+dMjxTha+/RcZ0XJ0fXNDR270a27pX+0v36i20
RzxY81PdOFw1FTr6wZIclw7o1fVxZBIDFJaxWW++F6PRjiv62d8DcNw8o2OBjfIkiPb2zdLGN8gi
DHaqbwDXzAiZLQA2ThFwf/qxPjjdL2tqqopf2a34EIQzaRk5NdShjpYmXT/2KUHAvFxfI4iOzFLx
G+8oKN1XIx81AlZR4lKKercpgcLu7gm5Sk+jDrp2UAvhO7Rtww7tXEd22KQCHcjkpm7V/ncyVDo3
oqaPj+rmlQFN4rROLbDAH9V8IMs831uhq18c1RdXx+WeVKI92wiU6GbiRODaXVumM5+SxWqNULGx
JWUitimxBLh067LOnLqtxtkIpe0o1c4wb3m7LAHuDaurpladted13NtPLpvY45jnjjj7cwOAIp9/
rrNdOIklr+p7CcHydydTh6bISNtV/epog1qdezWEI/v1MjCX5+uXXouMu/qkPvnNUd2YhD2VA2sm
MVTBMGas6G0MARrVXL2sk8PjGnd5AxZatIJN4DB+WxUnvtDnZ7q1hE7JluJYRQcCqLHnT/cCzsBu
qq9xVljXhGjUsVx7geM8DwvNx+jaZGyRL+woP1PZAKDdcf0kmdSz+sAfYG8XLCNb6xAnuYfBXtm8
S7sn0MwZZw4XrNP+FD85EhBbrMwMx2BFJsF6enRDATxOKt6j74YXAAh0qaXsV/rV5LjujAKSmPE8
ug4Bp8day5j7H+lMBzoEyRu0Y2eoInwJ2ghuRglWbpdX69pnQ5rgPHyDMqWYqHyV7oNSPv6hfv5f
ynSOjhczr23X9rX7lLeZrPE0Wg7V1xGd4xUYo8yobEW9SBcLF7Rg4pO0Ji9GZW2JMGDWahs2cEIP
pq6iXt3+sB/So8iolpCBblfHb7rlnZOslFhv9lm0MkIzlf/GHyhofIqymBv6+GNA+jsjGsept5Dp
fXi7gyHiHa3UHTu0o2VYLrem5fP6G1qXRWbSBXDRAEyuvvKKSCSwX2l0kz3k15YIpGquq5JAI2zX
FtgKOVrrDdDcUqmLh9t069OLyuQ+glnntqSyaxAMoy16yyMF0GdA7XQY+riHs2uEwNrEICvt5egl
v3jOkXct7D1/q/cB2Y5PsF/vJcu8KVcl3lbO8VbVnsGX+OKcbqREAfImktl/Qa/RLVQxJZu0vY09
50iLLNv2ae2GNMW7mnI7Ai1n5jvZ6GTA3ocuGGasHs02kzkF4AzcskXbCvbqnR2AsN31unmiQQ2f
n9f1DPwSkjgBJv0x28e+c0Enj9eoxyNWa17foWhfgnSnec0MknhpbdDt62U6Meup0L3pZOR5Ti90
W5xxdOBpPPmFTpfTgSd1j17bCzvDrLf5EfUD6Jz9oAYhXoBA2HfLZSPGL2AM1ed14mSd+j3xL9/c
zX4JyO1AxwXqytsplau/VqbpOU+FUVoXju/k6BWuxA179UYoc7cGtujHVWo9e0ifjyfIn2SGU+IW
7csDZ+m7o04W5eSstyKytult48u6faRzXd7yg1m4MSFAtsS7d7hi12Qp/TrgNTovybteoRRwrQoj
zCEAyBKSqpxXvqfAzUPq7ahlPTbrehf09nGjb+HzOCiKMHd/5Xmd/By2W7+vEov4vkR8O8pqLLCS
uvCfjpXBGnIp0BpKaGzX4ijg9WWdO35TjTNBSgXE3OnPGeC6RJeTHnW2NpKhv6wTcx4K3J0Hy+0F
tGhgaIWnbdLBV+bk0vMzffz5R6od2q1tBzdr06ubYHIAgEyR4Lp9S7U3DuuTWQctvLoHliRMTc42
s0Yt7hGKR1OnKNxf3vg+cDA0eLtaFRdIMB12QNfqO9qcAvhh3E/3YEXnbQDM7oNNjKZA/gYV7C1W
ovOCDRSwGLHaENhfsDsfukgwOZuztK2O/WRK7iU8T/z3dzYDQPS16MbRGtUfvaCrccyDqFSYhfbL
bgG7Be5Z4OuKgVa3qAOHNNSg0vgraj59Vmc+J1Nm2apiFETD8LqcaSnk4u4hT0+Csfs+4rxGG3Ds
jlfrzgzUPjbXddlhCibYNcUF1oRYJfrPaOBQo66fq1ZIcJTiCgLkTJAQmeiviIR4hNoW1AJd8Ujd
rLzjdupVgr61yWwe4WzS02QnaIm46BWo4BBfpQZHKBZHwenqkCbDg+XKhmLbYpwJFJy8FRsWr83R
a7Xx9Ve1OZ4SA/iuZqhuUBWT8yKUBNKpeMRMaE01OGU2P9t+9cjFX1j61QDroezCkJxS1mnPO9u1
ITFQXrYgHtSzh+yhFcpig48CATlstFoO5N4KKPrN3RoOLtaWkmIVxkJjtX2EjEAG29nkcZ2irKDG
P1SJscVKp83cU+O7r2H+u9AyLzS/UEWWTsVX4dQtpGnzzv3avyXtbqs7i2Z8oWceva5LAxwUZKWy
aSPg2HNDN65B650KV8qmfXp1G0GKrTUem/x8tzL8ZjgQ2zUyS32p8b7MDCW7N1p1kcAQqrdXLlmJ
DSpN8Ubb4O6cSA2Tn+sZDXxaoXrPICXEwrKIClBIYoGC4rJUmAdw9NkxXaItWtVZgCH3XlUPBSoU
hsUbvHZnBvMcTEunL8laPpfNOIjnCGqaeYgWxIW8vJg3j3+Bc2CEYrJyFHnxomo//VAfEjiOrktW
TIgf78dWLoBZnu5yp03nizlaqw/a2duHzgRBGu6bV9sAdeozokvB026QTB5tw37515/rZHeYct7+
vr5P0J37WNTztO9Z+e+IcjKPEorXKXD+mj4/T/bLG/r+zoM6uCOTwNu0YDTzIk/xxz7Rr39TgbMB
2JMQoo2xnvKLSFVRWALrwFW3L7XoH07CqGkN124yFBty05QajbAjDuWECRzdKcdwHlTLoTPQRntk
Ifjb8+ZWyosiFEAxt21vISPbX39ZAR98otM1F3WMDHnoxgTFlwTj9IXwPZ/qWj9AVhRCqXclz529
qNP1jlNQoJv273+L+ZSmaJNttD0wmAuUtqwJT6f8aFaxPdDM229p1hZQrFLQaxlQ81kyQ5WDcsnd
o70H1mkt5VYeZu+DGTGR7I0z1gEdGQCNjOASwadxjJdGmlX+xQ0193srbPtaFRMghyH8Ydsm2CdS
g606ffSSjp2sVHhImKJKI+XrQF0xTnNbebtGg7Zp07qN2poOldxsxATQC12BGr3hrrqlANbWt90m
FmCiyzBHLujCJK36Nu3RK9sLlAG93saW4Z7mxzqUG/aJfnG0VReOViiV9oylURYN3jiry7faNZ6y
Xa/hqJakGY0OYz/m0Vicosmm3uhcUJDZY21IB/+G8xmTs1aBmbzHBcYIf2/DLKzJirZyzpxo040G
srzrkxTnbUptYJqx/8dnQQFur9Sl0XzlbtwObd53hYN/F6h7dOGaQDrJj72J549QYdMS5TO1Pra9
bLVzY3GYoKsM1kM3mfg1OLavrldOhFHcN8/JUHIHtCb2sD4/fEuXj1xVTBiMu/woJeSXytraqepP
pxRRsk279+/TbijtIUZnxDKhoYhF3fo/yejVwSKZzwQUeIEdhrK5wOQ8bdrWqbLjAcqLRlsh0KpB
gJdjf0PWNPk7+n5ovA7GxlGCskZhrZkq2pYHfZ7uKpjXxY+zey3nLzdu5f66ESQe7FoOXB9fHdiT
Mz4iF/p+fo2GBkbkj0bHlnWcQyuHzsJ7tDWkFd0KC20jnQKTlJK4U/tf2aXSDEraWIfW0Tj59fxS
R680q6cfdlsqoID5Ps7/gJgMFUexdq2j6nCHWVA2Sjbe2P0REQxHhDQBn/M2wixqvqTGIS/15e7V
vn2UOfI7vuYMm+9S4sJv9MFPGzXQM6zhBUCBF9VyYWxBqVnKL26FScNYCiib2p2l5Eft8CjwBmvN
Ytqe+EQpOmKrdh3Ypz1rExRhWDaTZLfnfq33f9nK+IY0bAEUcETkrbtaNQTVVYsxSico27w2jIz6
3f0yGQAGZGPq4+tqPHNeldlR8k/l7HqeI+D+e8n4TxpmUAsgboiiD2zRlgJKF217D3tVWigsRBIy
Fz0Uch94oLyL8rMqykZrLAgpFmzQlkLed298lgRFBjpq8pObaj9zQVWMzy+JvZvyipBkgPrEBGWE
083izFl9WFujmcQcvUHJaf6aDMVSauWMr9gHa2iGjHQ0zI64BPZVkiDWwwCllDvagDnbFkL75kBY
MiQWQoNy9OobjD0Nn/Su/Z19KF0sDFcM82amM0Sz3UtqrzF+2vI8fxge5V5JcpSfoGSgwVMZb7+q
g9sylQ7N0rbkF8bRGnIC/IHFiX/t4WJGAHt1iHbf1y/o5ihAdOF6bSyJVeBdX9VqodSW8S8dgjXJ
+XKLlp9hlCEEPj2D8PCTdPKkjXiqCl0BtcvO6OqNGbnnA07tf1Wv5Qfb7A5KoynKf05+8IU+u1Kp
y/6si8RshQKQm8/mA5hn4Na5Q00yqlHm3E0ENHO406STnQAXfVO8H1DArBlnL0pkEe9ek6OOGjq1
5BRo/e4tylo5blvS6pG9C+aO0SezeHOf2Zu1ec9+vbKFZ2NAi4keRc/MU4JEKcEdWC+ygwIvtFzt
H/qdtcA3CwoQyrgFpalkz05NLB7WofPH9Mv/70l97O0pb9Nb3SCseVCwdqynngsk1GZmygC6G3Xj
Bqhnv6NuD1ar3I+gcY4MDN/nDFWQgk5V3IDSSe1bGgHFDKCAwVsdbIcB7zEtjZygeMWkUTe5UduL
2RA872bVfCMV5cOGYd5pNm36ZUeVpCuq+Yqu1kC7TUhVXkkgseiAaqoRievyU+wmEOU4t4eVevms
7fM25TezvfO/ze8bhPOx6QKyOUwGsrVXt90ToLJRc5yKbsGKvcyJjGTB3j/Qn+XzTcGMET63hdKA
ropyVV6oU4tri9rrz+gI9Kl5kw0gc+zstqjh6mp19rjRJjBbBRMFSvmWQAEbi4D7dYbhYQ1OUnzM
RhWvzVasSdfZLmrBg/zkBfhj8j50crL1VR6prVNny4R8EjaqZEOuUoJd7yddnMhEJBZu0dbCm9Bf
EcuDemqSMlZKAQagcVYTJFybaQT1vqrTHtDiCIwsHAjEzlDFoDLWjBLcc+gMlSiPejEXxuhE1sQj
qkgb95FbOHJIX3zytzoy4yv/oj16dTvOcm4wAdLXvb4Zt8niDTpRGmAox5RBrPYTMAEi1uzVq3tn
5Xziii7/skLnPiIL7029tRs1sLGUkmzfqm0l1FA+se/WC4zdiGV5ohdBRm5oAvokNL6ny2/RonKw
BVr+GZ0iK7iA/Q7YPvdVL1PvSt4ah8kpNlO50Xu0Z2OOUqmluLc8nDwSlJ1bgEDWTf1quF3V3eME
IDBqzHpD/NLmlxlNgNB05aIrsHNLPoDC3QCSjguBPsEKwFHQRKNuXQOgWkxS0c7N2pgbYwsM7l/U
kEeia7B/CxTWjwZVRWnLHcoVwhiLk0eaSrMD1V7Woxv1XcqIC1WGL7/bX6U6SkDaQzP0GsBjBBHA
Q765YT/ZPEf2JfNbtn7iy+yOhy/GN9auyhus+fkElW5aq7Wp1PXf/zLq+9MKtGXXRh2jhnuJPcAm
PInuwfxgk25cR0+lBWWEAZzDkzicCzhGrE1HaixdF+5Qc9yrOqiTCeuKtW0toADOpJtvkIIAOGZv
0abyE+6xF+eRciw3d5w/nN6Ug7uU5B1FJhmBzK/6mJ/r89MabGxUW/2E/DMPasuWQgJJWm0+eFDy
CKKWducmldZ9ri8os2jvyAFQnAV4RXdgKELZbwAEZ0bAElvxeDmLsre/ob/ynaamnmd/D6gzTr3z
pNoqYGJcRr+mi/ZXTG0HJ8rZYGqVjQAWb5iHhrviqZn939RwG3DWOKCUNThzDjz9Wt43be90Ya/n
vx1NILvquUGpC/TulooeapT3aP22jVob67siSQ2wATiRQj30BgK5pl/XqqMhT0O5QYoGcLcuelJ2
QiDOGbihkODvfo0A7YBNza1DD4wYmG132+g+/zbIvXgDrnNeJQ20aam9R4N8X29zhU6dgcLclqGC
3VCCA6DPU24xmJIh/wjKeO79kO0MvWsz84fZr21n+JMus94NFmLmvrG9lTWFDb7U6Hf1BhxhJaWu
UcrGrdqRE70cdJgrKIT1TQch1yEtUoJgE7a1rbm7oM5y1IcwsnluAAu2M3+VEZpnaFuQdO9JylD0
Fs63DJgi9xaOh598g3wVwLk1t2Rs/vSZ8mXvMEwbi5l7BlDhZ50pJXoqSRBGjPF73GLTlZ69U7sK
OFcIlGyXH3tBGFod0NMthlFlY9HQDq67SbVnAdq6/XW7s163yeYuYCQbyILtLVMAixVdmvabVkTX
Aa0F8FoNAH/63XKOe6MlFEmioxp9qE8+RoQ6UYlhBL4kjtzQdApBk2pfZqBS8RX9zBfSrm78ToNq
zp3R5b5A1XXW6fYhdsT74yM/PU75VmWP5oMXFN11UGsSAAXMHDNrkDlhWeIBOwPSwfgq2rpVm4oj
CfyXywyIYmFFALwtca+2v6CUL8kkMXp0rb1ctQNpCvIjgJ0dVN9twJ7BBUWto612XKAewthsgevy
PHUx/quZKwboXY0thXDwwJ16Xe2d10DUOr1HiWwmbNL7c9yJZ5S1Rbvd0H2ZRY8kxiBbsOn6ETwt
u6hr1QsAz7SqvMhzxQ6LFn4HoNM63a/e2x1oR6TKa+cuytsABV7A+7exeW16KyGKzQpQwSs70QII
h5V29wmTSPNLLEQvASHjq+UaqbtNCUa2gmB8OAM+OYzWwQpgnLc71TvBPDL7JqUSA119mgoqVig+
3UoBTAfstDzH2WMplzIlc0/dZRfZqw1DA22uxNSdNj2dSEoObRdsuWDmeZh3G8A6bCpDOXkBOzx9
PtvfYbfAy2mBb3Y5GETdAec9jR7rrhwWgWUIP1ESMDvPocKGsNSj5iun6ENKLRLZ/A3FUdTqQcec
ppXbPEEdYlRhXu7yAi1eYHMzgbcBBR39kpS/EbQ8DuEfFMEe3iQmNUUd8oIrNV1Qw9dlUW8KIPDQ
ZTbl+3/BAR+SpsRABGrq0BtoS1dfkQ913NU4h91qdUvWVjIg4U+0lKHYQfM33RMeT/Us/woBiXWc
mmioaMPhUbSBC3sIELC9ByfcJ75Ym2MMYOEkAwDPUgs5yuHgCiIcEUqQSIDtiHiYOXBsIITVjaEX
oGiOMnlREpoCX6ba/A1MUFM3OguVzwl2BYGsj9fDRrLiWS+Zw/A+9X1ewx2jlLw6KaooVLFwrB8N
NpxBd2PouRw1YuW+jS3AwRdgCvTOyJGSj/AQI0IIQs/Gb7LIy3Zwkk9EOsCNj8Ly0ZnwXylwY+7b
SR5xCP2FLIE4oy/Rn6Bt64KVRA+xrx8QML9nHFtD9zdZK/M/V8t8mb8D2PFPUsHBV2nZFqKgy9Da
eqmj5KYt6ARMU1Jy+vAk4kY79Mp6KOpBOAfP77k//uDNPOX/lsdnHPNnmRsEEknQ0v9gST5DwQQi
0JTvOZTP8vEvew/zaAb0XiE46CnQvRFOejRv6eqLQxbvrvlmWpJNoRly33nnc9MAG0tBZF8ztHat
oce7P/J544Bxw5PQwYecNe2VqHjaMT4ECNwbH5nc4JRESpzG1daNejG/ZQ3x5Hm6KzQHFtLNLt08
f1stmZQQZEJ+vFEFyDUq99x4RaNm9WSHBX2VBQL4J/Zg54aghrYPOGvSFQEpnOOVoKFteE44NNFk
u316NHzfnqw/atN7ZrzQTUCsM5CSFCejym7WhW0qysEzksxxslK9c3GK/e/qnQCjRKHM/oN3Nfw+
GaaeelVe7lWbBxkpV2r2HWEjTMG8QgA23sZr/zYvs97HND3gpoTdhh66EhB4MA5HH+pJ2RdjKDeb
HIZ2PjFLrTiO5xwMrhjW9mN7trs8IzO1fS/BFA45WBTrYJr6bCi9py7r5q0mROXY0wCaXJkvjvPo
pkyh10GBsrvNsV/md9xbLks8zzn0XZaYv3PsgwtA08/DwrfOot0yh2isrf3CahclLcNjGulyQAQu
Gtr9SkBgxfs9oOhHRih5rkVzQ6OClQxJBT0LmFZLBiwzIPxK0QBYJ3PszQ7syy5fGoQ/yzNHtBAR
vlTvMurRG1XTOM65BTU6gqzs6KBm2qhn9uki+9srz8SN8vddTb0EwbHZWc5QE2w+5TcXKP3DZnOU
A8zPUgoG3v5Uo5v9jvt08fOXX3DAA0DA/JQBAsxuzYG7enkW7+F3Znm+NjD+S4a3NMM9EGU4uBIo
+sLmWHm4AXBzewQgJsD8MuDjWWzOezj/zJybB2CwzM3y3+aZP+Wzhi1j7pWz2juYssqVQDN2NUCA
AWiXkytmbcxrCpHOKc7rkCBK/IIMO8/8EBlXsw7M/EHELpW6cv/YPHQICN6fcfiPv439yp82fW+8
pTHXUzqFAGxD+YB6YJG6EtSas16LAPxBlLqAqNieg63GnYz5iDMZeoBfxufiMGNLHt0fXwAt6jan
k3FeozTKKR4a3wKgByKSRI9KRVeouMiIRD86snuAwPLfO6MZlcQ5VNnbrFO1A8oAnPamw1ZFJQmk
kSBtgnWIGZ5wMT/mmLNGE+pJEwkGgNEZuYMo60x8gmICVgqc3v1a2p8mZFNCYuaTcQiYW5NoQE0O
Qb/3CpBruB/7F3bAUcSFWgaivcMQaIxFzDRNefGsgRd+ToAulNbN4osFIWqcBuv3PvB17zvxV/2D
whRDSegMmkGT7DWLM92wQM7o5EXaaLaOm2UnZ84ZB/SdZqj/n+D8t4C8GIbsSnfEYtb5HPN8kfVD
YpD/XO7L/GWXAcuMFoXX8jz3W4FSWdizF1kHDgZMNAv+afvNV7CT/aN2C7yMFvhGQQGLqf3sQP0Z
wT+/WBS734PKvRNhJUCBRVC6uVnqbKEaXr98TpfcXeSftF+l4QR0Dh4EwFCDM0v05rs5igXlmyMK
sK1fE2TitHlwsPn6gvq6L9PlHzhrHNwm6Hcl24pSNyLtT7lMpj9K6VlRqoGmX9NPJhKKl2Nzo0ZH
LfJLT6D+OvjL9yHjeH9pjSy/4YFyLCPxGJ3QHKIxFk7wxwmbBIkPZZtAO72guWUnKmfvAW3Oj1QA
jofxIW0ACbZwoS7dk2DA25M/zUb3LEnfp5nkWf/9nu4AoMciXsk8h91KD23JBEA2YHzZoTbBuSto
sdWJQwzHDn3Bx1BaRzKfU5PQAqcJTEx2xjxyoFxnk72EqlqEGOSuTSkKxYlZMkrLtgDcdE6Aao8d
fDgIvKi9o6vfitMFWvhtxOzanOWdu037F1Hsh25Xew1dAhTdjbjU13sZ0TrKQEKX1GWZJMgnM2Se
/UM/Ah28p1ttNZNyjYcSv/VdJRagdQCXf45SlPnpSc0MlOv44Trd+OCigmG0hG+EEri62uCDb36W
AJ9M0AKaFD6evgr1RVPjmXQBPBSUsVfvpu/RWyYDbcvyfU1Wu6tbsTSJAzoKQPi4sVDVntH4kAXq
qjvlNTiK9xePAR5ZD044jKhT+wIArj4s/pbSIA+EBh2mcFQA8pYI9Fd98tR4z6Ln4eDF79gix+XL
kZrztBgyU7fRf2hrV2+Ek27XTqh/Llz5WdT++68Q/nvMNMsz2fz/1f0QMz76LDsyPpgxM0QQjy9l
aPUzlHsQhBrXfDmjwuecCfo845STU6gDPyhVpi/vs2XLzD/znEwrUQ9AO9s+QUtR264/i1Ajmbap
eOVv91fSHIHcCHaZJNNEaYGFsovOVtTGCUrHQgP1nVKouKurpz7/JHhCsvXBF6GRYmjusKIMk4Xk
8xMCPwTXZubomOCqYNMqlfF5++MpT4/ZgKMFdu3HDzj21BU9VRdHWtVUdkhHKxblHrVe+0tQKkcA
xOylLkuj6r78a82fGVQH08DsZysvWwbLBJw8N1cc3KceNY9a6gl6LQ/exj7C9zrjXI+h7m8L9lfV
JUMzAKHRYQuMB4QibYxiZo8tyIWdNW8E5mwBxL1vNl00DOC6HCw/Td7hyx8woH0QpWt5DqqY7EBA
d0AxY+5K3rtXhaj7u4zcUtkV5nS7izJzqBFf2VLn/hffzcrbFu5TNhVz9pkzhayhre3qc1Q9WO8F
GPzKfeaWaYnJgbqsafQEW9x9TvdH9qQh3v28hYB9ASBhfpF5dG8CmkCF88pCcmOZhfD8y+bRTxg7
EEkRNDP/nnHy2X6WObFIQEyM9eD8NfOB8dnYRSvs4OhEO9HIRKUVfUfbdhQpx2Oa+zLggrkNzl2j
9s6+6wMI4o0P98LtGvEh5hCDHB0jWZBDmUz2qEbwlcbH0NowZTKU4/UjFFff2q0hRJhdgumSgD6A
EzRBn+hkpZe8x/jQ5HF9ZHyw4txt46PzBEZ6eL6Y/Rhfgf3T/DuVQU+9HBBxjM6krKh5DIHq27qT
gc7HFFoC41Yt0JY6Fy0Xo/W5+rXMUPhSXxH2ghsdM3zn6fAwMiaS6YpY5cscTPvr+3MLLwgmhSft
hRPyt6rwzQPa4DUN2AgoeP8M4HthB3obHwmf2fUrOIq2fcWwExCbHsFX41R+ZISA/Eb4G3UOBxgo
gU481/oKXXyfLj6KVvzu/VoXg26LByAN/sxcOwLDnx2CkcXN2oCrFdfd9S4YHS62VstPfUQP9hDm
+dICAuUr+5aa7zfz3IYafT3r8FlGZH+P3QIviwW+UVDAOj2orpuHdRhlfa/SN7RnC051LPVcK6wT
PgmNiFrxGhRuBycIVhAgCQ0NVUpEm9ocUfVFFCaSutqH9mvqlsZRJp9EFXjBH0fXbyVC7SUv2AVu
0IwWDTWJYPHplxNsBoLD5C5VQwOrPD2lrs5B6v6ilJ1oVKG/7BvYWKj79mCjdbEFJvz+o1Zlw3aA
7poffJMgsF6tqORWpWxUDi3S7vs0tDUaRUH/zhgZDcoqok3dqC8tsahJdIcdMD3P4RsUpxSb0NWD
y4KC88g42SECSQvUKG+C7q8e4hIokl1yI4hydQVs8FpdIRcvnAMXEAdH1AI44Y5TsPJyNvXw7jip
HNzuOPnuZBbCMqPlV01GCUX28ipoljAGKPtbvnDCexuuICaIWvVEpjZ7+Nh8YCd3mBKZkfJG0XZ8
HuDDN8rWXu6hs5es3iiH6OQYBwEtDf15CMtfS41bM22zDlWqfjxJO/7wTa3xG1DtsauqPnqGA8hN
e7ckKeyrG23FrZvSDtqeJVhUxTztmwb95xDyfejRAQq03dL5v67QeHaptn8PanBSjHxCV3wNGcqe
6wiqVQ1opG8Supt1FVCAeYL93Qmg3I1woa0+/ssvC10KRu+MwcrBAYMu/izOkKlbnEfpenQIGy8A
2PgjsuSPQN3XQV0wmQxSBAst0FP76S6Rl2CrNb4fPywOqQ0Wz816F4WmxSgDAUKjLbp8sb6Zq8Yx
dqAjh1HOX/3+WZS00MpNc1PrJebexZtKCCoiu8Vn75uLDEhfg25eqEaM1E0xGVG2utEH38e8I/jP
pla7jFZeV2dGdWvMUTNJecqMJvP2pQEKz8nd6EO4slaw+WNAFONDzC470VFttxAQvdGglJAcJd2n
CyAa2HNb18+XkdWfVNg6s8+ZgbNO0VXJinVVBdTUWQTuwpPRIXhoCpBRM8G9yabTGs3X7JeOkxqu
uqDP/6ZVbjs2aP0rm1Vk+oaSLrQCCizS4vXWdJP+lozdzY4h7cyP/9pAAWcG7umBjgy0YHdAvMeb
MHjD1oDZk3RbN6qv6XIiLJpCyjhWbuWL1MXXXtW1FsotyP5viApjPlqUstab7i6tKr90EzGtEpz0
FawhC6J9qF53984iUBWm6ChfdAZoRVh/W/0u67VlE3XgxXd1AYzTO7CkYbJthuLuxFi9bHoCDy5D
JzdsjJlx2AYzj/DB5xB/pAPEPKUJnrTE83Z7HDByALT2wjF24Yxy8ySoWoXZ4BsVRZDkrfNGu+BK
vJK2UOq28gyA6WDalt2oomtGEAyo+HBRkcWFVg97r9tdQAh9xhUDZ+6g6O7Kvuxi29/vqn0/Zd9Y
/Z8Jq9DnCU9Bc+NUnS6dX9I62usW7d+opAQ69yBYebHKGyX+JG0mswiJZ5ULQMWUE7KPOZMh9QTw
f2KMaysJwy+wwqIju2jY3/evRbRtyJiOzTrZgHJ/H5MwIMj1Xp5vLgBHbh7c98oRGE0jD7MuZ9Fv
WeXsNu+llaKXASIp13MFXPN+gkvhBDBvnqcbz9P90e+iHtsbm7sTpFrc+Z2nZfWf9ixMQI74xZID
4rkwK2dX4lXM3ekxAjaU810IBAPINtvsyZg8mcOuRMaLtB7meH5wEYiaOeFO60IjgLu8v6LbEkmr
ZNpWNgFILThSasm6fMh++GKGpTMxBgi3RLbe+/mAmgcDYL21levUX1epzz9VW//1Tm2ibNSNDLFh
ctBnU/WnP9T7h6/rFt0nisYABdj3A6IibPud6Si14BioaMb30NxBj2hieBS/AKAGvSF/M757c8aF
Z8nDdOfsmTQJlmcKOI1OTDr7PR2NztEe9NKY2idaNE9LzeQNmexRX+ZS02GJvc+DeehMWaMn58Bj
R4aTj4Ii4pWHhsV4PWunMkG+hYicrnCAl9BeGBgc1MCCL8yXSMViJ+8wWq6SvKqdcURUEWFE2h0+
egbMjIxqbAJ/kfaTfj7LHR1e5HI2uhro37Q1Dqnj9DXlRG/R+uh7+yzgCN1/augo0OgSprgM/Gon
AIJGRKQr5uWxc422v7JBuXd/eInODL3dnAUE644IYboxRyGrrdxkWe+mPIt9DnDTts3eH7fpQAST
atr4iDCHA2ilaQzKGvc0MYCbWfPGL33wdY5m3rPePfBtnfjzURKx7Z2wmBcAlkeHRhDZpdwGYCM0
mFLYZwTeXsSm9s/YLfDbYoEX3Baebfi4+ZobaVfjtTYNDEOtZNG7oBYcdHfVL00262YtLUfmQuQf
HmdTjTXVXGHpCJKUoCh/pVyffuymuV2oF1ML5mKEWaZRw6UFz42ztKiaD1P6rk3aWBpLVtlQi0C/
ac3VM4hg2xgtTkYGEM3p0YgpOmfTN8GrbaNYjb7nCx04qVOZVz/V9c8u6JhnmlKKN2l3PK3iHr1d
03KJ35olM75oskcosg8bVHdxRMMErl30SPY2mSPjHJCWczY1D5QzFK7PUWfXCR1H0foDT0RntlI7
DYfZgYNrBIGzK7QyujQVraT1B/Qayu7xRoiOHtQptad17fhhHYddoS3ZivcyrikH/xAt2dBeqGqj
XUssokYbEcmhxcqL+RsoOMPNstFgLTA8+jk8JgAbHFCb7+3WiD+qDSYrgKPpbnZek3WZ4GAagPkx
OqL54SENDk1p1hunizT9kqGDDvIdHEQTzvwbrdVGcE78M+ngkN2qhkOIDX5GZsu6XaWp/vxJ1hK6
/LlPPtXRm7TvQQgnB1q0oW97s+GHou6dgdDd6QvYjwB1adsapeP9OtP2zbS9bK8uV3Vts/oC8lSw
abOK4+kFTdvIUb7zi1+e0fk7/krdX0Af+zwluhBULY5p8GfnqOOfhNa9XzuLaYVjnENYBl9HnOsC
KBAN9Xp+bFqNtJEcHBO93ldOJGxE9qOvnpabPZRUhPNMHXOVgFK67fwnUztcD5CB2rVjerIiqVP0
uluoaDU1qbb5Z0pWaKeF0zMKBW9h0LTYCoZtQhYBx8OANM6PpfMtGhsZVOtti3wjAlDex1l9psNu
Uv23PrUJDZ7qQmjw3e/pe28WKw8V/q98sTZN/bbbDO3Gag/pow8DFbC4Ueuz6ASC0ztac1InTwLi
uNPxIzcXcShaqHFwL5qyA4KvxT7a/Y3hmAIeDPQhAsUcNPJUjhz8BpQy2X4bVMIaXLNrLTohR3T8
0Cf6ACBpyzbatSHCxC5DP+k6VV49r0/LpuSculY7EeGytXi7fznKP4V63NxGHf/wgj67RI/wFILp
onTFBT/KOiAjYSi+OOzzJkOoCVp5kf1iTluHBtTfPYSDaEAME6jcHSPq2Wu2Z6m294LOHzoMK2JW
O9fz7MmAL0w0q/rUp/rokwuqbwshOzXCPcOqMM5PSLKKd0aq+kSVjnzE/J0rURFdVAygZuF9Q911
qrrRSOs6dyXsRVRwY7IiiGYXRlmHFw6pFVBxjH3IuThRYbYIHUonY+wbBjJzo5QnxIcWZ8+Rkn10
QpDpW6T7w6xpIWq0EAYG2CtoS0j3i1EUzPtHyPxRA+9kHDaTGee//bB/4bpO1Xx4Uec/wRkcQz0f
fQe6AhKdDKirgQz0J2dUiWBoyr4iZSMuatjQ8aXFymoh838WrQEn6MH0XTf7hItR8W+7qWtXAeJq
/JSxe7feBhQIRFHcizK1xUGEQWkx2JzMPqBJDbYgWnmZ2lc6HFT2BMklDHvz/KYReXNjTzd7hIsn
dfmBIXIGuKu/XqFyVP8TEM2Sabna0qBbVzs1E5Si3P1blMccc+f8sswbCvEyfV9z/Yje0nZzlAzm
UK96h2k9aYAGwFYPzilXghXPiAxlbyxR1s/Pqhqh3l/M7tf2NUlKQAgNREPDdPW5hKL95bpFRSEy
WZCF6CrnxAwihv3D2Jfn7zlMy7CJSJhBzBUHzi72xRHud3QckMiDvXlwUpH+nBuGQv80RHG1xU7v
9ZCIWIVg97pTlHW9RblgOt0Zwhto6XuEFn1Bmnlri14PJlN57/OGwYAtZqDb22rje5fB7UmClsH+
Xg0g3ufsYBgjBnBfUU6E/f2jeQZB9aqlI0l5nJfWG5X3uTH1t6KqT0vJutFoFWxBmDc/BKFRzknm
25Cx8wjnwQDit5MwhgwohX8yy+8NEdSOTIzRNYHa8HG+G+/fBaaQraSB0hkrAVCv7TnBTBlij+31
JLA3tdpmbNiUrKuhJU9j5wGzF6PdgVE1QJvDEDZXZ2w+O8MzGKIcid+xsP/2Ds0oBH/Hw1C8X2QD
Jaj0DiUhEjGt26aFaUUM7e0IMpnno50NqqtrVFVvgOLWlGjv1lj5shfNjpvzmrU+ioAgZ/PAAFTz
ANYGFO555skgQZAZnwP30cu9Bnu5yTc+Qxk5+Gl0PblEy0Bvp03KjVzu0GChK0MPbT6rK2vUOW+Y
bK9rdw7tAp8h4/7YLZsSu6leddxAOHmsRqNo/ViKTJcXA+uYtogjjJfsNz0REgCXOLa4YKDS/i89
owXl+jMqo8zQx2Gjsk3XGtv48BWboavfuq1uAIvIja9pJ7T7ELMGzLMlIO2nJ+XwhEko8Ox7RxRt
xs555IivuLwGH386Lr50wQAwbqm7qk+PtVGyE6jizflanxcEG+GRO7vbnnOGvW+R/542Io6jZp7D
CjR+VRgaCsxz4yuaee4ES9YPbZ3i9U3q/LxSpz44hF02agfioaYcygIbp4nOXGW36LYTtB5x532I
IhLcRqdxLqWr8iPa537goKPO21RANsvPDJ/2hQNtNaq+VaOWMRJgaw9oi7HtC3r/RqPACb9rqrVa
9Z98oI+DYKvszFUqvoDx6WtouX2mrB9B7e3K25CKwC+lYAB0XuhOjI7eUXvTmOJCKGQZh5V7C7Dz
2EldpeXsRGyw4jkTBkeZ2wa8gcHoyPnog66Ed8SMqjjHblzFf8swJcOAUehJVN2C8Tnoo9B0owVE
m3EAwznjiyJEOjoKEI4u18Ag4EQEZywg2jxxwRDzfJi9ZmGYc4juMdHG9ivFdK20Er19XB/+jHtr
8lLM3h/oT767TcVhX+EMfJE1bv+M3QL/DBZ4wW3hWUfKgWeo/Aa57qvVzc/QEPgVzsqkqeMjSCe7
5+RFJqRouzZuKr7fEs6Bdn/pO+hJ7kDvWRNA/0dUpuk1vWQxol0EPGRVPF3DlZBOn1IOCG9TODXe
oEtHYSWcu6KK6lY11k9qiTZdPXW0LOKEcDAt6koPaP9uAudINojHbsFHsamI1EVLX5xGcDAxTxvS
qVmlZuzRY8Ey0qLq05/q89P0SB/hgKEHatOdHnpV03sapeizpDgdY2h5tOMVvbGRPvC2jB40vMx1
2vwmPu2xiyo/9zP97ycWjJsI8okoGjQ9L2ozg7LilRoFtcrEWii2+sWt0/ad6ArQueDGyb/Vfzxk
DhfjqLBhImLnjiMdQJ1xakAgtGps86yP5rH3DaPQe4RWjhd0o5/M9ESvqiqHNO16QT3Nv9IvQKJ9
UxG4Obhbe/MC5d5+EzrY3+uD4+d1sRGH37tCrrR7nP+Dg9qcOKfOTz/Spx/+Su/XtKrNoUkjN7s1
8Z1X9fp+6ga376fGDGex/Lw+/P+d1K8J8l1QmvUJNG13IpRalKiphqs6/jf/Gdv+QN97nUxmdIG2
7iJAdrygKzd+o785848kNY0uBQgz2SV3Mjh+tLaMSyazEWLVeBXtC3/9gY5dv6pzN6hpDduptzft
17yhykNBd7fiBLWjkl32oY5eO6cja7Zo12sHtG8bAd7DKf0XsyjPJSQtSX5lteqpReV2DfMxwHsF
i8NQ18z6INuDWFN7+Rf6Rd3HsEVGuS/cIMboSRbLJ562avs3qCQz5H6N9EJvla4eZf5dQXQRMKD/
Vh1A2IJcEJk79zl6Fc4IY+6grd9BFNvRbXj4KAMoG+hGpZi6wswYahaZQ890h6Y9Zotqr5zV8eYE
zRXt1n7K+b+WyzafrXJPpl2ZHyJA4+U699Oz+gLQY5rMhwETfXH+8vft0mbqPsMMjX22lw4jx/SP
AHjN9IAuLwcY0HkO/EP6wMfUoHoplDHuObALJWj/u0AZGZV0VPbfYtUdvqibzKP/eu6fbM/A0JEN
x8adIM83EwHK7Sh6J/jdrb9fcZdkPGNQ3U5dOqmfo4icmBOjvDSAw8c2FECuxjId+/vPdK6jX8MO
C2R0G9RJP2YNd+nSCRxIK/Xw+du15+092pDmh6NN//M1W7V9ykHzX1zV7Y/+V5V9QPBomBm+sF9o
ju6enqsCWop1ff6f9J98UMd+7x0dXEO96DbudeGszpZd0ZH/ely/pkTE0JUXgTvcyGD6eeMMh+VS
d0sQfDdTZmqCTdvTOeZN5dGfqfUYQQ9Ag2FbLtLuycO0ZS2l1emamIez9M/50K0LaCWc+VgfHyez
1k3pFIr5fe11ujVTrW5AmAp/sr/BdHnY8V19H3X6LBSwHDxgRa3br3fIdh6j1de1f7iui9BhrQAG
NsCH9e7qFadsQOHtO9MUSw8rs0+7RJdo4x4jSos69tVf6D8f+5kt82NKR5zIGvnRpSWADjYJMctz
wikI6vHGndo8dklXfvn/1L/9hyW5UnvuGWTaspF5zMhQ+liljr7/n/TvO2v09o/e0b7NqTYhWPnE
KHHNZh1oPKWLJ/+L/l+n+T4yrs60ufVFZNUHqnEKOide9FVd3pcpNWGdf/75KZ2nAfo8bIexDlpx
jbB/XSFD+kvOASPct/FtvbOb+RcFM8GVtqS5u/QGgZz3Rd778X9SxS+g7BrxMPYJA6Q4e0VztpVo
5wGyp6FoZjQe06HP3tc//vq6qjkHff6W5zvzI33vjd3a7tVOG8pf6FeM4dNzg5r1vM53tWr/W2/p
YFGMaE///BeBjGcI5yuZdNPSci4GejUaBxHopUSTAQzk79yyAA1Ma827324Za6KF7Of6+yNVGqQu
wpma49oaAPWZc/oP//YLwB90QbxRG99/QG+/kqLwe5uYQ4CiC0q1Fme/49IH+m+XfqOf4ey7MMdd
PWEiBACKxKZRWggobOx9/ag++Ztf6hDgeRkCszfLBuVe+6be+WGBkq21Ovzzf9DPfnpYzX2Uj9Bv
/lrze/qj19cob7ZcZz78TIdrARtn6XkOYFg7QHB/vk3/4yHD+oFyvvYVvf7KQe2NJdipPaG/++n7
OgL7rIWWrW71i+rZ/qZ+/AP2YOfbOvz+r/XTn59EDHdADrQJvdz1Xb37GjR51PJfDMQ3HQjWqGgH
jMrT5/XB/+e0PsMOBrR38mKv8CErHh0h30CE+gigJprKdPi//0Ifnzqu85PU3J+fkNet1/SDP96s
wtAeXf7gF/rrv/5UlbeH5EA/+6td39F3XqNcLDdJ6et368DIcV2oPqcP//1x/RNA/aIROlwiswsL
wwe9gaiUVIURnD6U5X3emXS3JG1pnNaEF97Xz85MaHqSRAP8bwuBs7Mn8zx7t3YjHJ1pajGNPgI6
BBnr6SgxblqHntav/t1R/T3jM6KgVgvjIzPvE4weDV1IwgDcbZnh8WZVfoY6/qGLqu5pVzNtcOdb
WwDWPlvuZOGFQOTag3pnH/5azCqno+lMkQgwRyeoyc9uqM17r7Zk5isHFPYRVSUYV626dZauPccq
1dI/CWALIF+PVtWoH60uEd+ma4GLX47ytu7Tu69nUIfP7oYGTNLm7doLQGg9VaVLJC9O/YzuDNBi
XFGrdXVHGyMiRgl0Q4i3CTuz97nTDaVwh/ZyvJxD4O/o/3lJHwJIL5dYAoDBCPKhvj4sIYNElAF5
n/fhPHj/IgxGJxf874Q0eSU5abLiI/3t+Z/ZSkKNjoHFmW4LKaXaQ+ew4mhAHTQGgnMRez7Qo0OX
junv/qej+kfElz09KC1IjFNEPMAOAM6NW0f18f8yp/ZNb+lH727QpjRfQAE0yVLyVbijU+0nyvXF
v7+uUwDULgCzrjBJPb1oVxubr2TmuRttMqdaruj4L36h9784qbJhfJbgUTncekM/+aPtKokbUvnn
v9J//+nHuoI/aoVxUjE5oVf205azIPQBU8uARmN3SLiV6exVAOT4XXrraxFVfnGb2z9pt8C3ZYFv
FBRwYNFHFR7QK37FGqGXr9M0Was2HE7XGRxPFjWtWmKNwEsxGyqZHp97ES0OqV/MGlqJkCEORJWd
nsfNtE6bx3F38qB1X1SCUtMzlZWGYBioNYQ89kUyjTiKvnQXSMoMVWrOcu2WkQayQkFzpPe0j6mn
/RKRH5fgWCXvfk2vkLFdF5KvLaYH8mqUMtNKEWDC9HsPMFTbwFCtS5JKeWpW0GDTGWDJ1KiZTO1K
RAEHLzZ/iw54Q4e/eE3X6uihPkVkBfXMLyJFGbRbykM/IC6MMgCbLbgHPhNH6yUP+sIHXLqum6i2
9s2Y7ApItn+4opJBiLN4JUcrHCj5xR+oUYeFQuiPQwEN28N0QEg0jrZRbybDhwCbj6GcGTqtGZmp
7/KLVET6Zr2dApJPPWsQaTzDIrBpHUBb9E2iy0IoYmZWnAVKG/zgqznwPs8I/u4gvxV+Wf43UKfl
sFx0pmwkOVdZOCGx+zaq6eZ1XbvjRjADO8G06yJkCsxer20+2OrqdQ6QVnWNmywsz522duEJKUrN
QqkXDYhYeNwTppbQN1ShKcXansCIQ3OUb4I8U59sirF9UbTfc1Cvx/ZqbAF6KAG7t8lIvVDaZpXl
6gCdDiG37IB69TXVABqROUvCcbqP2pCFQZxpyx87K9V0cfCbg50Ba2YR+t8S9+sWqBBaYhWUrlWR
yZCuFJE0QmiUdPgy/wJ5LgHbEFNi3A4me449HB2Ze6QsDEvg0dux9jfR+qte/SFxigcECwV9erZb
hqqZvFH7/shRQUNBOC0rlKu/6m5lUxZekkN0prLzi/VKOD1IWqpRuwbxn3KXX1Sm8jaVogydamv3
Z4sPDPOHIM/X1CxG52tHzLKqv1GDN9uBlXZp/jAG3Ew7upXjcw6CfYOuRGCwIq6V2zqO9DGPFllP
brTqSmQNFpasUW4cANWqCBt9ngGo9r35hqw5HopcR5aaYP3x6hOTSWSN+iIQGsCewBiCiiOUWGye
07Jq+KKhf9Lz222lVLV7LE7uLqjq/mSpacvXCtgxjRZGSKLSi7KVGekIlf+ybtTc0QSq6R62chFT
UpOhku2sQcDBy6jx13YNo6wM+EH7rQBYWGmpCFWmw36iFeUy+5w9ll7be/9lAH3UafrlMqbeO3fU
jfO9YDJlfnQCyaVH9DqC9AivrwA2Lj8rJyjTPgA+gWiiyDFIwVFkwO+qK1gMA8ofdXZD8b6fmcMB
DkI8dDdZowgy/FcqdLtjkNavjM0ZSnRMitIKODvyUyglWkHrd/RTeO4m7WS/D6BV62Vo9bbn60Yt
Le1xs7JxwLNQpaZMzYbVulBukbVDr867y9/piipbhzRPDU9wCuBLYZ7WBG9QUvJ5xZ7ukBUFeU+Y
RPdBNieYBohvvvaKo4J9Lqm8uRd9A4TBPGk/lpyESjpjTEY0EpDq3vxwNDRtAJ4AMrQLZD2DaXmb
bOzAfFhCB8KBwNbv7jm1PG2NYBbre8vr8mDNRlyGEYX2zeC8mes4+hH0o88v0lraqGUBYDtzsk6Q
XXM3c3mdu2LXGvO7MJ9MRtsAogQV0P0Dk8ishS0C2AOUGaAITvWLM6TY86F8l7z9E/2bfDoCrKMt
J/fg6Jarbd/9C7ltQ49kO4K/K+IrUxNtnHo/ypAsLvMAKSHaFG/UYUxnARPIcJIZoTCTPX1of3GW
R0yBinbRidy1DHp1h/qnFuRMqV1gdKoyklOVnJKsZBTjnKzjnJ8woVg7qetCFWX2AgugAWeKWXIO
eA4eJuu7dbfiTPs22pZ6+ZiSC/YSgHoPytBo0oA6OorvoQhe2h78shK6yNT72MoUlwfnADDtExSv
tI2vKNUUezsDwhnmI4GdgwmAvELJ2m/k/DdiftgG1pxhZjzb3rvaBkv3EJIn2Vtf07xTmfwAzjrR
CHE2deORgKtJKUpn/iXHITqHsOQsZ4Y7InkJBXsVgE0dUNIPMh1aDIuKNe9mxle4UYEFjIh7c6HE
yOwtVkof3cOztO4VF2r3b+jKtTq19ZD5NauAMzsklvnHuZuGOGsiLWBfvEkOe2UU7YZ/7KjI0Vlk
niwaIlDv6HNB6NNCh0jKSDNKtKG0SIVJAKr3JgXnrHdMrta/xn4WfV2Xb9SrDbFe0gdMdRgssYlK
yWZ8yQn0pDetPM3ZgP8Gdd8HMbyowDBF5JkzZVn/yCYlyTr3p8zCtl5WvZinfglKKXlD7w0nqycE
Qeu1MY9V1i8vX/Nby/M8aNHU0IcpLC4bX9EmDGXrbOAMU8kb8asH8xz/KTBNuVspMwHcuXL9Fvs5
rJ4FnjnPKTIlRzn52cpKjlDo/fYq/FtoqtbsdWVPCNYl9A6aOD8nUPO30l3BP5x9JpszIJW1EWvq
/F/80F4iQLZSqhGVsU55b+9Q6FK3uiur1TCIuCFBemgaz2kDezNtJJer39BdoMQrfx/4NhpZ7tca
1DPN2jOADkyWtWiNuONApwJulfcCYrFu7mv5GF8StlXm5lcQtEY08EodgApsJPZRn3DmXDKlHKns
5/GBAD6AdrZ5HqP4/B0KIIFoxHkDoZW4Uk5sixEQLI5hHbqnzrFmWSvMc89HW+4CchrR763f/ws5
b3BX+LpMJX4diaIXN7n9k3YLfGsWePEY8lmG6EmtYT7Ibu6yau8SyqsziInNoB5rFGIdXTiwA0z9
92pONRT88EwV7o5W4lqopqZ+0HzGKN1Td+RLKxhTP33PcZIX9bjQ12LoD7zIRuJmFjqBxjy/ZdBS
UjhsqASmBEFPvGlq5kIY7zvJOPG83+uhjfrBDTsCZiSikfCd7D02FXSrcbRwBIxDtmhE3LhZCwer
FwEB5+7DF45kqOnGQAvCNYb+awTFTJDHweGLYwzL6vELemZoxgbtiEKo0XzGbPQmEIBm6onz64sj
8zT9uac/Ll+Fr9mq/YlF2mJugKDfZkNOygXKJBZQ+HeittKXA8xkNhzDOLTeIMhho+fcM/0G0Txi
g/WD6uVmVdwWkPa1e0DscWqNUJDVBO/8m80eOIQ824JdoN1FUOlQllvEMXEnEPILMJnMNcov3Kzt
44jBuXGg8sxsZxgZOL/EtdoYlqLsTdTYm2cLe8TJBF8ALT5+1LjbDiH6NyQCKv0oRUW2R48ThI1N
fZkNbOFw8Ego1Y4fIH5JFmKRZ7BkpWWVnwGOvi6KGN/jBh28KFzNvRzqVyuVGBOujcm+dx0aaHHR
WVr/ozTmj/EPEF6cNvWhzHOzWMw8Z74G+gO0PHKAOwclKnPnewSkptTDZAsBAEzrHjP3DN3V5uwy
1wGJHnJrFgfVdO2WrlRPKDArQVm0vPO9v4aeNkNgpKRs0cE/L9VubG5KcdxfWFXqkd9iXhnAzplX
YHKxNuwErFjaB/UPqus0TBAP9gjmBb78g8s1SJHZO/S9mHWsQVqfmrIPo3uAepZN4NK0JEJI0Yf5
+tiScqEFVRoAEyBE/jbmEYwE0/HDydUErqxZJsmXOetOfonKPfBDxc8ZAUzW+argAcFWdJ42/ihO
eUbhHAEvo7ZsWqixoBBaNQAOga8N3Hm45Z8JKhNKdissba02ENAaQTBnSmh8iVD8KPa1ZuerBBGu
aVgAHox3WeYJGwQmK2sLeiS5m+ngwm+Y0ibb3sJ9+RiQcmVduxHupL7zT3LZf1i7i9T0orRvaK7G
Fo6sFR/Ttu5r6GjiQPBgWm++lrRJu9AsMGwvI1DmagBVAFvT4sxKoOTqQ2D3kNYCa9s/gUwlZVSZ
pRqdxBbst2YtuxP8+JEdeqAtsWJuABoEkqnaSkeSPPN8+ZDFlK5RKuCHvXwfEUx0oG1lPC02QwiU
t9PBYMHWTcWAOctBRBRBVu56xB/JjHqwR1PCe/9yIPCIyN+mg/HQh9EWmEX4zYF7MXXxRnzt4fEB
rKVhg7B8lc6xTk2LO2MH09oQ4HXOqKqzmTqbYJS+5A9dzIm4wp3oLBRqA5TXOVOGYfZRwGlfgFzf
+90FHAmuCrXpdQKEA8wbol+rOW9tc5t55ggDY/v39eP1ABC2INmI7LFfGGX+F6eZsdfR/WDPDxWz
kzmHw27bhx2jlf36HyjNtEWD0bCyAsXBO1pppa/rz7M4IzifTT2xC/uJM6yd+2uYRII358ljWh38
vV8cTvsbKcrbThbfyPobIIS15G0y1+g32C5Ak4D0DdrzV4CvrA9nQ/OnnRoTjbIPU86Rpg2vRyjv
AL9v0HsDopl/M1opljUqfStRWZQ3LJ8xRkTP2IuSINMK17TkM/4E4qKm9t4nfp1e+3GO9pq90RBw
zCYO2B9ANxB3B9qZHohQ1o4lW5cDB/R/FtEYMP7BM5WxP2lrRq/Cw4Du+wD9SvGRTH81c86Z9e6N
Hs+9Nsw8X0/2ok1/mEgrOqPJwL0acUVznlKm6Mr5mbvrO4rbgLiq2Z9Yj0uI73kxf5ctydkdavZK
zus8xEjxxUydvwE73MnEG/E6LxyQFwc4zG8wBymVKf5uigptSpKch7AEphCENW31bGAac9QfX+ex
aWqAizD8qZ0AmQWUceJPMLvZJ5gT+Io+zKGVe7SVNqvJ215VSOFu1rrRneKchIm6aDqJmLMXf86Z
ZxsAs+WJFy2vQ7J26q34DSS5KJlcdSPC1ibrX3xQP07fAeOB52/mOTZ2Zs9dYF9aYC4ZoVhP/JeA
h5w4zi9f0zkBlkMO5QOwH+Z5do6UrHga1pgfgM5jg+MzAYnK2ESyKHMT7UZNtxujB8lvGqFZ4zNz
BnwFPMD2ix5GOwPKvSd7YRLn1JZI4LV9lF/QCWIWdoYH4G8AXUYefk68P3yN1h+IV+Z65qphG5g9
iTMm0NguLlIxabQPp3PYEsG6L6DZg/nE8w3KAgiEKbKWMh5UU60mKWDuiXPNFz992WtzlHtktta9
i3YQN250ikyiZIn9woe93A2fJWPLm4pcaxJ3Zi2bPXgZuH/YxzKgwDrt/LHxDzm38a/cV3ZvefKs
sP+L3QIvvQW+WVCAjLmhbN6nx5nDyv/5bOZAhicwnNfTPkZA6sNG4gOy/+IXGxU0fuLsL7/IInia
Oq4X/i3DkkCJmdezX8soZxivb+Yy309bN/N6lh8wAEEorye81wP2hMdTHpoDAX9gOK/HvgMHjCw/
j32Vy3RkIIvO68mXeY+/gsxr1TctB4z+vL7Zi5aRawqV0TmHgCLCgoOo2qON4WXLQJgDnsPmvrqR
cQyeNN6HR2kD04LM6zlHv0ht7KSTpgPWqDAbdknIao7Fk75zub7Pw7ye82ef/Hbo7aaWtbVBt2/W
qxE6vmWB7J/XKAJ71A6HhpHpAYRaDacxIBLrJ/K51tDKkSzPo9AvnUdPGLnJpCN+SefLL52DTgSh
AVG8XsReRqAuIHzVPcbBE7DIvFb7XqitfjAInraF2TLQzD181LsXWSlYF9/IZTKRvtB3eb3QZUqr
giJ4Pc+nTd9zBKKedZEYEDfEvB7/DQfouiFR/k/+cZ6VO8/qYc2QVR+Obc4Fm9fz3Mq995o5HxAq
pEC+dN45uzM3zGvVd8G8oJ7uq7QkW/3HTQcY9rCH/pG/gyGyahDCGerFGUoHtRe8ANSedoYaNgJ7
ajCv1S9nBYR5PWF9EqRxAD3b8AgscQbCnugQ8BshT/qdF7z9FR9zgl0SbF5P+ipbAMV8oCxx9Tnh
TNbcMB2+fCyOACYBnNfPZpPnvy8HqPFu9wVujCgi2fXn+JpnHZ+DbT8Jf879ZJWBmGQE7ZG/7DLA
hJcf2jhP35BX/xrAI59g83oOQ/AZXwR0v3bvhhaQU6MIDN5CZPf2bdV0e2uu7Lxck2F+kQAMDotA
9PDLAHVEtO/6bo9vs0aQNYLXk+/T0cxh83riW/DfSa4FmNeq73EiCQmz5KkT2ABKRvSQ13OY3f5W
uwV+FyzwzYICvwsWst+D3QJfxQI+GcrbGUI20ULdbcAD2uNX+c4X/axTuFJLdykgz0OhUehxPDNL
4EV/8GmfAyjpuK4T//Xn+uQS9GtagDrebNL//DnOYHC6St9+T28epEOA39fF3njaeOz/breA3QJ2
C9gtYLeA3QKPWWAOQOD6J2hjfIJ2VyNsJReV/4dmRLkBBRJ3aD+aUe/soEuU3XR2C9gt8NJawA4K
vLSPzj7wl8MC0O7DYhQQulxC87U0qH7RG6e2MBSBtRAj6PSi3/G1fo5Mnn+0UhB6208d4lZT8gzx
E3F2MozhdAOhK8lXoTR/rWO1f5ndAnYL2C1gt4DdAr+nFkD0L4CSx9I9roosmkcLhzIZSuMWlhBu
Rv8lNRLR099T09hv226B3xUL2Nfw78qTtN/Hb7cFCMS/Ws3l13B7ptuBwSW+hq/6er4CbYcQ2o8e
jEd0DqqxqfOjtaips7QYMShX6q3RtbBfdgvYLWC3gN0CdgvYLfDPaAGSCmEp67Q3fq2tpt8JLRQL
OkZLtm5JUO1NC8d/xuHZf9puAbsFvroF7KDAV7eh/RvsFrBb4IUsYHQKcCbMa8Xn7XV8L2RM+4fs
FrBbwG4BuwXsFvhmLGBEo43Q4Ur2HgKi9stuAbsFfncsYAcFfneepf1O7BawW8BuAbsF7BawW8Bu
AbsF7BawW8BuAbsF7BZ4LgvYQYHnMpf9zXYL2C1gt4DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL/O5Y
wA4K/O48S/ud2C1gt4DdAnYL2C1gt4DdAnYL2C1gt4DdAnYL2C3wXBawgwLPZS77m+0WsFvAbgG7
BewWsFvAbgG7BewWsFvAbgG7BewW+N2xgB0U+MrPclEznfVq6hjQmFeMYpITFO2NIMtX/t5/xi9Y
mtJEX5tqW6a16Bul5MQwhXm/1Hf0z2hM+0/bLWC3gN0Cdgv8VlhgflS9re1qvLMg38QkJcUGyH60
/VY8ma9hEPOaGexQc+ug+i0RSkmPVIyfvaft12BY+1fYLWC3wO+JBb49UMA6p+nBPvX1Dmh4ZlGL
NC9x9/GWtxs9Th3c5ObtJZ8gT7nRluzlumY1UPZL/dM/ndOtxHf1vb/8iV5PcZPXy3UTD492vk89
V3+p/+2vOzWZ+br+6k/3aHfKN6kyO6cJ5kZ314BGZ5ckZzd5B4QqJDRYQd4uv90Ay+I0Y+9R38i0
Jued5ekbxLgD5eflTJO9u9fSjKZHB9QzMK6pWQd5+PnJw2lJ8+Pjmly0ykobvsUF7tvDX0FR0Qr3
dZClv0vdfaMaswqFftaExVlufmEKDQ1S4L3vXhjXaD/PanBM4zNLcnD1lKe3j3zcHTChlzx8/eTv
wRKfn9BQX58GRszvL8pipfWfk7Ot3Z+jZUkLC/y+hbE6usrNI1AhEaEKDvBgLT7PJOY+ZobU1dWn
3tF5uXoHKTic7/Fzl+tv+ZJemsaJ7OtR9+C0Fqy0QnQPUHBYiEKCfOT57e2Qz2Ps35P3MqeYn0tL
ZhHQAstpuaXmN38tsjYH1dnZq6GJWVmc3OThE8h8DlOIL/P5udaFGS0tNqdG1NvWpf7JOVn9WRfh
4axzN7l8Ozf0zZvsZfmFyRZVfvqP+l9/M6GsP/1T/dn31yr5mzzavg27WOc1Ndirnt5+m29loUWc
A6emk1ewgiPDFBXkoZcjNDbrnbViXqZFrbPTgzP0mew4qaGao/rV357XqYW9+pf/9jW9mxPwLe0Z
zzRA+5vsFnj5LICPOz6Ef9Q7rLFZycnVS97+IQoNC5A/DtJzH4cvnwV+r0b87bi81kmNtt7UxSNH
dOzMTdX3zWrO0UehSRHyW3ST+1yMMrZv057v5irBx+Wl28QtC3OanZ7S9Oy8TGz38l8cytzT9DTB
rLknEzB+k5d1WJ03D+sf/vGILrcOaG7RSUH5B3Twu9/Vm+tjFfLtzNIXukPLVK9az/y9/v790zpX
u6jgta/rrT/5nt7YEK3Auw7/Yk+VLr3/N/pvn5arZSpCxa/s19oQASad0cWWDvUv0O8XYCwoY7v2
/OiHervQRZNnf6lffnRGZ9omNEXE7hIQq7S939f33t6lrQneBPpD6rh5VqeOndSp641qHyIQDwjH
CYxQqMblFFeowr1v6fUCnKKeK/rgv/xCn1xu0qjFkZZCgA5LBD7zPFiCLWdXAmHNY3dXLTiv1e4f
flc/fGeNUnyexyQ4o32VOv7+r/SPH9fIJWyddv3RH+vt3RmK8/jtjnwWe9mbPvyN/unUbQ2MOgKS
ZGnze9/V93+4Xnm/zZPveR7Py/heC+fEUJfq2ubkFBSm+Phg+XwbHoh1WtOtF/T+f/tIp2+1aXTO
UT5xRdr8oz/VD7dnKP65Ed8FzbI2zv4ff6sPzt9UR84ebfveX+hfbU9RhPvL+GBe4jFbl7Q4P6up
qRnNzgE4vcS3sjx0fI/umyo79Jk+OHZDtUNzcrRa5WB1lWPsDu3/3jv68b5EBb4U98mzGe9Re/uo
Rh0ClZgRoQCX5wECARWW5jU7A0C/sCBzvNkvuwXsFviKFpjtUevl3+gXH59SWeMsIH2gojIO6O2f
vKID68Nf7gToVzTN7+LHv/lwa2lWEw0gt8dO6WT9jJSyTfu3+svTYUZzo3W6+Ol1lbUMaDIuX+sJ
jn67w4fVpoCnggoP6IBThgp9M5Ub5PSSoPJfMp3dQhSZu1c//MmwZoPTlRb8DU8ThwCFpRRr99uB
SmprVvvlE6oea9Od/hGNL/x2gwIOZNaD4pMVaTkia91VXbEGyW/TFhXlRCvAT8znKfW31evqoTLd
vNqkiZwUbYtNUUZuqGKX+jU03KTh2WhF5qzT+tJSrY3zk4+ri1yz1mubs7Omf3FJV8om5ZeRr8K8
ZMUHu8lpsU8d5acADW6oedRLkcX7VBziJbfFMfW11Oj6scvq7HCXb8EBMi7zWpzsV10D2ST3XJVu
yVFh+KT6mm7pw897tRCeog3bc5QXOqHexlp9eGxULazH4akFCYDu2S+yOn7xWrN1i+7UDam2plMD
XYM8P8OA+Ibnz7MPctV3uoakKHvj6/pedLa66+p1+qcjGqrt1fDkgpYABeyFM1/RwC/6cYdZzXRV
64sPR+RdsE5vxQEKvOh3Pc/nHDzkGZ2jTQcdFV3Yqbbr51XT2ao7AyMABEQaXs+LTAC6BcQra8cO
Dc5164OJXoDxCQIXBmUHBZ7nyXz19/rEKmvnq/pJ6IyC1kQr6Ld7a3rK/cKgGacUouyIzjaMypKx
V2/HBcjXGbAD4GPcMVapwR5wMl+WC/bcULOunGzU7aUM/SAhTIGAAs9++SowdZMOfDdCaUspygu3
L65nt539nXYLPMECHsQDmVu0xxmftb5NdUcb1FHVpd6OEc3aQYHfuWnzDR+Ji5qbaFfF+QpdqrLK
O3eP9r+ySWtj/OSpSY33XJbv4JIm++flPG8ozCC9mPjlAgbIImVs0c7UjVqCtuf4rVFcv8G56Ogn
37RtejNlkUwKFHOH5zmYX2Rc7gTWa7TNvJZG1BI4qn+snJeDwzeB9n+9M8zB1V8hacUqSC1Uf9Gk
5OKs4eZudXROKpPyGJcFahz7+1XtEKbIVBf5bipWXmGecrKC5eI/LY21am42RzkH3tVrRTipd03t
k7tNm3KT5NzvQaZ/UKGb92tfaRZMGkdNNVSp6vQVtcyEK2XnDu3dnKm0ME85zgyo69Zp+fV26ij4
m2XJZMKWoGMKBkC8Egs36a0f7dKG6GENVRwl+G/QHE7Umz/crnVRwxqErdHUWK9ZU1Iwb3JozwMK
kNEJSFL+ujB5to3qyOgtzcBIcHT67Q+pHXzilb7OvKxa7Dgpp4vHdMcKW2YR22GF3/47eJE19zJ8
ZlEL4/2qrxlUQOiU5r+1gwFQLihN6/fx4kQaSnHRBx9dUr2zRYtLtjqb5zQeQHFAonJfC1GwT5e6
zverHeAPko79+rYt4ArjpGS3Ytbepah/a3Pqm7hRBy1N9qqroVHD7gUqevsv9ad5DyCAxblZmItO
cvsmfvob+U6LlmaG1dHcpdqFSE3Canu+y0Ve0UXaGpmnTcaLZIG91I/3+W7e/u5vwgJfr7v4TYzw
m/9OJ1+FpJRqm3ltbdKFqY/02fEFOc/N/w4wrb55871sv/DNggLWKU3116usdVbdASV6Y+MmbU7w
v7tR+8g3pkSbDswQgLRrLnG5fvehNbgwqkGyrNV1rWrvHydYwVnzDVV0cpay02IUcV8hCEcNGnf9
7WrdarijkSk3+QUlKDk/V9mJ3nKb7lLTrQpVNvZrnOAsNjdP2dHOWuys0a26dg3MOcnqwIHiF6W4
jGxlpgTIa65PDTW1iO31aWJqDqTCVR5RGcrISVd6qDu01kZV36hR3Z1hCHwucguKVFRyujITohTm
STD0xJlA7na4TS1kJG+3UbM6tSgnzxAFBQcoyMdBC578GRZPRpja8PsxGc7oRJdaa+p0u6lLg9QN
Ljl6yDs0UanZjCee8X7l029BE601qr9VSxZrSjPO1A35xSghI02piSEKeAR0n+tvUvPNCtX2EriH
YOv0OGi10xppa2KM3RqascjJn7/PzFZ2cqj8H01XLI1rqK1BdTVNahuAIu/ko6CEVMWHUuBJ+YCr
h5scV6EOWmf71GlsV9+u3gmokxZXeQWZcWbw3MKhGy4bfmn8jtpuV6qqsU8jC3jfTtRWJqUrJz9O
4W4zGmuo5Dta1TbEb7v7ySsuW4VZKUoMdNXzLwqAE2d/ReaVqmjeS3P9bept79ZoWqoCe5rUNzau
pewcZY/1EGx4yJSw2kILF+azG3oaUD1dCRIeT4rwd27U+fMeV1dezmZWTaqrokl1N6yK3QFFf0eB
sgPvRhceILn5W7Xn9U453HGXdyCsAlbUovktgnMX8xu2H3GhZIDvdeWh8ueDvzP/7oT5mb8vPJ/4
DlcPubu7aclWNnRL1wfvqB1Hb5C0qHtQrFIyM5WZyJx41NDWWU12kSWqa1Rj14imDP/THY2G+DRl
ZyQrwbAkvpYddnkNNtWyntr6qMNF54HyjKS0cAUtkb7F1h5uMAQetQG08vE7zO+6JsY3rJl5divP
YIUlpCsrPUnxQa6rj2+6V52ALTUNHeoepabc2Vu+oREK9+dm3D3lEpSojCgYJi5Lmu6sVnVljW73
TmoJjQn/5DUqgF0S7wnjqqNGVbcaAJkW5RiWpsw89qNIH7nf22wsUxq706ja201q6h7VLHoVDqD8
4YkZjC9Bccxt21snOmFy8F2sXY9gxm9Fc6IHXQqPaCXzW0k+kxpsuq3q+kFN+sYrZU2ucgByH0qQ
z/Srg3u6XdemnrFpzfJsvfxjFM+zzUoOF1OPy4qdm9V0+bpq+xl/KHtVejw13OPs6y2qb+nV4IRF
ruwfCey7uSkh2ODuA56nBv/2BX1yvEx1rcPycp3QP7lXKpLvtQIeW4CVA5IB03LSlIzdH95vKX3q
bVED86iuc1Bj0wtyRCciMAabZaUqKWy17Cm6Jt1Nqq/Gvnxm0pGytlDGmhIjzymrnN1ZL6yd5w1T
HpqujjAG0NDxYG9zweYjLZW6xV5R3wljaJ71GhynpCz2sSTsYCb6bL/a6qp0pfaOppeoErcGK9I8
y4J4RXDG2Pa50TaeQb2qOKdgTMvqkazMQs7HJHRLXnStwDgabqlVVW0LZUnTmrEwtgC0TALQ/WF/
8IhMVmwU+goPlQVZtTDawXjrVN/arb4pA0d6yjc8QSlZPHcy2A/mz4Kme5g7ldWq6Z7WvLOnApPz
lJuboWTvWU3fqbPN84YeykbCeWa5iYpzGVb79Vuq7xnXDGvTmfPCPTBNa0qYr+x/Mz23VVdVqwbo
87Nzi9DIyW6l56igJFbBjlPcz01du9XCWcNp7eGngLDlcSWyfu6aclVrWSY5d7mn2sYu9XHeOLh7
yyckXBH+HrKw1/uGRSolLUjeK/YKy3QfgTrjaWpX1xjjWXKXT3Cs4jPSlZHE2vjKqfslzQ23q6n6
mi5euqzrFxrVathYx9A2qnHGvwKgdQ1VQnauMtOD5bEwDAvslsqqOjU056+ELM6izHiF2yYIjIKO
alVW16lhwEMB2DuvKFUJrKmloXrVVjFHOy1y9k5Sdl6swrxglDHfmtk3R0DpnIOND2LmW7DQV37k
IsjnHG6+zfcAlA/APnPy8JFfMNo4aHNYl/jv8Eil4W+5izO547pOnD6v8xX16nEc0Ad/16lKmA6O
lDAuUl7nHZak1Pw89jxved7/LRJPQ+zlV2+qtnNII06e8vKNUARnRmZWpMK/TBRmaUKj7Y2qb2hR
S+8omkCck+6+8otIVEpqslJiYLSa32E9DLTc1pWKZvXNeikGXyM1zl+uIx1qaW5Ra++YZmA7BvOb
WbnsL0Huj/gQRm+nl7XBmqrrVD9rg0koH9ZUAHZwwOfzCYlXXozvVyfVLYzATGxQLf5RR/8EJYHm
nhhbTJLSMpKUEI4/fO8pzTEv6mtUyX31oOXkCJspiTmTmxEiH8oTu2/f0s1a9vc5X4UmZikXpmKM
33My59ASm+ptUH3FLeYXbMIQ9q+0UBg6Zm9rVkv3iCYWnPFl4ygXyXqw95nTA42i7rpqVVW1Mgb2
4CD248xc5aUHyXN+UHdqGN/tdsov/RSWxPmRl6gon3vjs2hh7I5amHuNZu6h5bLozN7rG66olDSl
JcPOtMUP+EdT3WoldrjZ0KuRaZKXPpyZcWnKyE/gvJnTaFsNMUiTWvqYh8xZ85zT4txkHWhVXV03
ZwUlmL74l6lZfG+kQm3re17T3a3EEA1qgTE57YTfF5zMd2YoKQJW5zPvzQua43fqaytViziqow8s
08xYhfpMaAAwsLm1RwP4L26cVUnG1+bs8H3Er7LM4DM31Ku+vsN2Vi8Qy7h6hygMhmtaWoJiAlbx
W+aZG834AJzvXcMIjjsHc38JivKFcQr3yA3dKjejdfXQxblsbM7eV9PSw9m+oEXOUZ+wROIDzrX4
wFVFXZewfwf+SE3jHfVOoiaCHpZvEIwnNzSy8KuDY6MUmxzIaWK/vg0LPH/88zyjoiZ0YQzxMbyV
UX8/uft5P4LceikkK1+bvOM154Nz6nkP2cWhmCabUlOuy+fP60J5HQtyjMMV8RzvcMVmrNO2nVu1
pSRN0b5GiA7nnE23ufKsvjh8TuV187K6FWrbj76rHxyIkE/PDZ38/IjOVLSoaypUqWRl394WI9/W
izr2m891vnKQINZHCRtf1Vt/hmObggOM2F5b+ef6u5+f0LWmaduBtGbve3rPHBis+tmRFpWf+UKH
rjVpZLhfg950Htj1Y/3l997QvkREFFezkxEE6q1T+VnqwM9eVTkLemyaevFAnDx/AhFRn+6Xq6I9
P9QfbIa2bxxk85lugucbl3T27DVdZ2Gbw3XJiqMWxiazeZu27livEgL3wK+k6MbvdFSp4vCnOgr1
u2vWAn06TSXv/lB//pOtKo152JOZG2xT86kP9P7ZBpU7xCt1wzrtTiOrDdByhaC1e8wAC7HK3PSK
3nxnt7akh9zfECxzg+qtuaRzp87qTFmtmocm2TS95c9mmwRFOIhD5I7JbONEPxD1whHiN1tuXdH5
s1d0md+4gwjY/IKLPANjlFy6SZt2bdXGjGjmkaMsZFA6y4/r0KFLts2+ezZL6979S/2bVGztMqXB
C7/Q3/33IzretSSPrEJl7XZRQFS8Yl8AFLBa0F1ArG/Bl8DSl6B6BEHNAQLhiVDN3u4X8ZNS4mIU
jJBdH6KC87Nslsahp/5x3oj8mfpHmDJUzzxCk+E5zxudigXb98+blD+gwOjgFEGcu4Jd/BXAmnno
cglQRNEebU3FYQsLpN5rQRZP5nwWzmmUj9AoNF6OlgzKu8g40I5YsIlGOBL4BBGwx2k+hgDV/UXD
bxxyR/QJZqgNvXVBk4MuGm9qUFMzhzcHo4s/ATClEjv3bNF6gptwfsd2tCyOqwfH9ebFszqP83+r
jYPUsIdwbkMS8rV5yxbt2LZGqaEcqC8MWCwf1pNddbp5+rjOXLimK019GoVVYeZQAvce47GgNgLk
gEQcGECY+z+1OKpugKQbF9iPrsPU6BjUDB7XogedORIKtIWyie1b8pQS4rlCWJF9DKZUzaULOnvq
nMqqTZAAwu7Oc4uKVaRDmzqg5Pls/In+b68FKc/fopnuapWf/AT9hzqcHTKBm36iP4fxcTCYkoyL
p3Ti1BXdah3TVPAG7XjnXfm+vkZJBhFkfHdulxMgXNDFGwALjG+W0g2LB4J2iYXavJ3xbUUnAgfA
ebpH9ed+of/t81qNhK3RlggnWXoI8ueCFAeQWpjALKO85PrVOjUtJCt3/3v6k+9vVEGkh5wdcLYI
SJpvlOnClRu6fK1OnWatW3F6/NC9KN2grp3btDE7WlEEHQtjHWo88Ru9f7Fap52ylLN+o95KddRM
222VV7eqs39KFu84pW06qLe+s0ebUozjwP3M4vTVl+tEWbla74zJdfoOyuJXcNIJNPCprQ5BStjl
LI/oRFsA80DUE0CDIOf6uQu6eqNC13m+Y1MwcpjbAbFFWr9xo3bsYL1Hch7d+xDdVsYaKWM7f1rH
z1YS1PZrCrDMKRR1+nRKgybR4hiBzZaN8/cYUvQcB6KV9Yw+yBLgYM/QGR1vp/aZYKO6A3HOaUDe
wARlla7Xht07tSWHgAYHv7vmtH790y9UWdXLOobC+Ud/qhCcwnDbWUmwMdWuymN/q//483PqdYhT
dNZ39McEoCkvBArwfYiX9ty+rHOHj+rs1Ro1jqDrsORBIBeEk8auReTkv/fP9N4buwAF7u4R7H9z
A3W6dY3PcUbdasCRnKA+HDDBJ4pAuGS7dm5eq/XZofK2OZJ07OkD7Of8+NXldvWMTstx4w/03vec
9b2QXtVeuahTpy+rvJ7ytYj12vraXh1Mn1LtsU/1+bkrujZBIOieraIdP1JABs5woKPmB27rxmd/
rb8/W6+WWQRbAzejScN8LopVEG7sWMsVnf4C3Rf24yUIXc4eedrzr/+Ffvg6OkareuiwpYZbdfv8
CZ08f1kXqg0oMC83X3/5hQEKuM4CHkUpZcdr+tep90ABPkPZW2M5Zxvn+00ApnZAwOl5gOtgAPK1
W7R103ptKYhREGfUi29jBtRsVE3ZF/rgUKVaAWFm3QjWezrV4AEDwgow65Ojrd8LUmgqJTcLY+pv
BGD7pyO6eNNJRa/9kX78f6csLxoxPxsQW6HLh/5JPz+xwDLZrz/7d3+siA2hchhpVu353+hnhyjl
G4jTulc2aG0BejeVN1VtArUJtDf8U5W6/Q29/foO7UgmqH2wYTInSJycPaET56+prN6AAovy9AOc
Cw1F42CWRE+8sve9of8BUCBc0wTo1brEnlJe36Il104d+wBfwp0DizNq0cFP4Tk7tCcUcJjA9gEo
gF8wRHDGnvnZNYAk/JbZuUg0id7Tv/mfDmh/qu8qdiZ4wV9sr7qqM6fxDyrxQUg6jXMOOrkifh1B
GeiaEm3ZsVHFRtcAcHuk9ZqOvf+xTleOKChng0o25inJQgAEaFfTRmA2SSATtU5bXn1d3zmQR3Lh
rgCb0bCY6Fbb1VM6evyMTuNb9QMyOgGc+/v7Ah7MqNsrXUlbf6D/9zuZinos0HrW/WU5cdRyrUzn
z13UJWjezb0TNpFWk7AIjMtU/qZNWr9unYpT/Qkc2T3mRtVXe0WnfnVUVxFVHXNOQe/o+3rvR2sV
2Xtd18+e1uEygvkhD4Xm79ersCLfKAojoH+OmYv/OtPH3nDin/TrM11qdsK/3ZSr4vhJ3SEBVdM2
ILYYeZLESynYqd07N7M+IhXI5myZG1Ff9SWd/NVJXeskOeeWrtLXvifL9woU3HVV186c1pFLVWoc
9VZ4wUG97vauXi8MVgBlZxN3ALoundPp84Bat02SCsFYwH43b5J3mUUq3rBRW2FeJoe4yUKs0Vp5
Wp99cl7Xq++wt6Sp4NU/1/8AkB7pPqae8o/00//8gQ43uCk0vkAle17juflKNYf1/t98pmuc6daU
vXrzx6EKjb0HChDM9zCff/nf9TeHqzUUkK61O9/R92PiFfNcoAB+3yjrsOwD/eLzOrVOpFCiSZlp
oatmam/Z1mEH/uBiYKISt7yuN9/cZVuHtjOU82ZuAIDo+kWdOXcNUJSSznET4AOq4hOGJHLWb9ii
betzlRXncxeoYB6RYG0v5zOUfJ+rauZ8nyG4D1J0SpLiIvEoq4Y0uhirWM7I++cu+8j0AB3Lrl3U
ufOXVA6I2juG70rCyzMkVdklJKt2FaswLVL+MEhtM8isjfEONaGNdfTzc7pwi9gGX8zFw4vzBuGe
AVMGlaZ1331N7wEKxD7rUrC/7ytZ4JsFBVAzdyYTFrgwpaYuMrvd/ZpLilyBkjnJK4yALiSKg4x4
iGymbbKQ2W+7fEYfnm1SF47Omrd260cJISBFUxolU1d3vVI1p76QAVx3b85Wkjkh/JJVtPsPlVRY
quscQp8f6lEXC/3TOQ4QKwF3wiv6w10E861N6pzFGePvU7Z8Tz8iKx/30yO61OmphC0bVVIYJX+T
7/NMVMm6EtU0D2kYMCNt4259f9ca5SPyZrZ774hC7fvDGBW9CljReFgf32jQrUUybhx8C0uAAo/F
VNxgD4fvF0f14dVhOURs0Rt7k5Uc7innpTkN3T6vslNVusjm3IvEp0lCchpy4LGxfHpcZbUTckja
qndeS1UcaK3jNHTvpuu6UHtZhz7jYNyzVTsygwRQ+oKXmwKyt2n3X+Vq3TTIXeMN/fwf+zQzPKkx
MiSkTx/6Xs+4tdr8ByC8CR/r3/3DKV38HMbE+C69se0V/Wi3P8EoNMBzh3Wx7bzOXidQD9ui/GCc
MY3pTsUpHfn4rCqn/BWx+4+0Nz2KrMU8WdhaVZw+oi+OVao7jgzxDhgY9zKHs6hGHzuq05e7NB2d
r51/9R0lUkfvscj42m7qek21Th6yanZ2u/YWEYCHkEV67c/kR21+xdFDOlYtsjrL2d+lhWnN8cWL
sdlKK1ynAwc2a10GSDWqXy+UxEHYyaikz1t8FZPoTya2XZcHOtVU54TjAQAxEavkeJyNxWYCPYIq
Dmozzx86Wm3P+8uue28gY+LvKFfPQdRgO9U+kKLwGK8H42bN+cSDuJuuBiDYvFPeUcV694/zaWDg
KT+GZ9Bxhnz/slpMcbMXddR330cXA39bqvJFLuiqHnMaG7ipk5WN8itBGHHLW/qj75MdcJ/WQFMN
z/icjv5qjIPlLb22iUweDuLkbQC9L8pVMcy63PSH2vlj6klxcOdGAPuuXlP9tcP6nLvZt71QOaFf
gTEwUKnLnx3RZ2VDck3eqrf2kWmE+eNMNr+Zw+nEx6d1uj6Uw3KXHGBy2KxgYY7VnNFnhytVPeqr
9G1/pD0g8oEeS5oZ6iZLdZ1s+CHG56z92/KUFfwgI994+jP94kS7Bl3StAHA0JYxxREcZ37UH6vR
zdYujZKNnbapYjnLL32rDvxlrvJ3XlXFxU/0czLBN49/qHlPi0ZcEGR9s1B7XIfUWDGimckRQEUO
VncCj2r2OgKEmokA5ez6ifYn4hy5L2hmoFuNV8vVdPFzfcbceGVrjjKCslVcslZba1v18x4HLbK3
vfOOu0bPfqgPD/2DfhazWdv2sl+yH1ZDm684e1EV+bAV2CtDHTp0+xRr9HS75pNyte0v3iTz7it3
9r7h1irdbqzWKdbhzPwOvV4aLb+oQm34o3+lgNRfa/DvEdb8bEIeu3Zpb+kr+sFeMmTWIbWX4fS1
4jCXJyoypEh5ptDbC0Cx9IB+MgJ7YmFQvvlFODw5NtHKJXNYwHbxgJ0VGbFyLmCH5jKdOHxZZ+94
Kq3gO/qr70YqzBfGAvOolcx0Y+URHWLlze9ar1JDO+BZTHZc0/EPPtX5Ow7yLHpbf/D9GEX5L2l2
+I4aLp3UkRMXdNshU5s2AJxRHvbClwPrkTU511ipCrLWs0VbOb++qz/5Ybh8HQD6AEGqas7q41/P
cT4d1DuUtORsf1f/0tlXn/23E2riuWVvTGP/vweeA/yFAAAkJGptBqBV+ht6jXKi3QVhQor0BS5E
2jov6djxCwAWYZxt2/V2aqgCnGBRDLXo1rmTunSuU4MGxGV/Wb44owbJon7xiU40AQgmUte+H0AI
apgz4O+d1tu6du2aTgH+OHrtUWmKORvcaAe4Ubv+mJKdXbAczr6v3wy268bJz+TnPaFOhxglHvxz
bX+bM6RuWKNkt+YDoYT/RbhS136ivznSoCrLWr36BntBpIHfOY8Ti7RuW5M6BizyDdkOSLdPb6xN
BAA2+yyZxPw39IcR2/TqGGfb+XO69HmXLOMT3AcfXwUUsE40q+b0YX34aYMmo/O0A/HY1HBAVcN+
gslQfeGMLnT0yH1o5kFZy2Sbqk58omM3ejWK0Or2P3mXvWVZ66W3vU4VFWgofTglq+s+bS+O+gri
f3S5ieT8fSeQoP+SLn9+WLfccpS+9RXtiTMOAAGfYd5FxrBe+Z/ukUpY97b+wgkg7f84pUE6a0wi
sgjfiPPQW8HZe/TGDzzlsQT4cR4BxmEYnnwsKAa68NsAGp4f66f/AZDoozGNuB7U/tJ39KNXOM8W
7pCsKNMX+CEfno5VelS+ku+C1IvD9ao8/oU+PtKm2YQi9jQCMBx9jyVYKAT/N06d18X2XgWMYD/b
PPJTRM42vfPmlManatXkkKH3/rRY2aYsDqbAkmFjkjgKifZ/hJFAUiBqjdb/UYhSv0OQ214J+FOv
CwDwYwBYpgjuMZdonoTT5cP69aeXdHEyUms2fF9/mcnzgO4xPwKYX1sL++aoPhoe18hrrxFohipu
7Sv6Uzc/JfzD3+o3Z47qk5EF7dtHMubNrXot0GpjWV47Vq/2T8/pemKEAjcQ2NqWx5DulF/QF79C
YNQvW3v+xR8rPdhdbgTkozCFzp05qZq+QfWMA87b9rXnCLjvr3DDRLijxjOf6Tf8TpNjpLIP/LFe
jSHwc8UfHSLwqqlS+TU6M3RMauG9ndqeFiA3z3Albn1bP05cpx01F1X28TV1c46c/qxPPsPDcoxe
r1f/xT65Eew19aOONIjG0yRJm8cofl+y1Th6yT9lE+e5l7wCf6n/+NPz+ujXbRp5/aD2bP8D7YoJ
RCdmWF01Fbp2uUzH/h6Gm/Pr2l0cqWAC+JSd7+rHaRu0/eZ55nm5eisBxr265TUyIqdYSh//rwfk
1N+qpkFnTQ3RXQmf0neiQuc++o2+uD4oS2KJdv05CbZIT7lbxzTUYRi+jbrxAeys8QW9+mqJsgNS
tXbPH8A2yNeV0yd1osYCwO2FdpOhXnGmzLrRzYkAeutaHXxvq0qyEklG4ilGc87j93nC1OmIKlBm
Mmyg+yK0HoBEMI8z0YHqC4Jdsld/+B3ApGTYJ8+1M9PJLLZYW94BNHb+tX721yd17hOAFLdXtaf4
DdZhoHxnWlV986qONN/UZ2fwYwPW4CM5a559+frhD/Tx2RYNBWZr7Q/esbFRPJ2nNdXXClgAA+KL
jzQ0OKmZd3dpXRj7wRKigpeO6JNPK1Q/G6XcN/bpe8kwhc351HpDl44d05GyPi1GvqFcj3uMOxJP
/bW6Aohw+NaEnCJ36ruIm5pEpxOMA/NsbzG/zhxGR8fhVRKEJEWMYwUYc+faMZ04U6lG7zXa+pd/
rLXRJB4474c6KnTq55dhmdMZij3i8YTZcxnR/ubnsMALh5DP9BsOPgTPySqOu6wmNr8TH89QY71J
BQnhCgsAzYKS6e5ObaVpN3X/C+c11MABeopM2VSQUveCrK/LVOpdXqkVek60z6wGP2/QzQs1Cg+D
WpIfAO0ZihMTPjQmUl6WEVWeuqljlaOwxnfolZ0bQHyh5EeQyR4nKzM4oyUv6DPhINshfgqeIKC9
PKSpQF9o1tCpzVg4VN2gpodRrlC0AeXp1/dqfTJI491xuvL5uFRe5n+HkhUdxYGZhrNgNvZVA7w+
Mn1kJs8PySWxWDve3aFNSWF3afU4oFGUJ8x2QGWD9kmG0moMMtXPJnhB19s5xKPXauPmLdSZhynA
9tTIMsNoWBw/olM3ylUfTH05gXqa34vQ38330fIuKFqxvMhrKy50ibHeUDuUWautjvbhy9nLT36G
yjVVp4grA4qfT9WW3Xt1YFuGIm0tkCxa49iu7i+u6epAP2ijRdkUzDv33NSN69d1eTpUSRv2EaTk
Kj1sORi3ZIGiuo1Bj+9E0AunxXDfzL3SEmWkukzXG8hOBGSqZD1OH9mWSFu6gAMxI0huTsc0+lmV
mq+FqDmBVinQQv0iM7QmEsphUozCPz6mK31QxM5YNenWo1td0PdK39YfbtuhfYj+gbO8+OVgtDCg
oaFS7hWToKBZR1W936y6wRp1QG3zzypQXvS8nPqYGAiVmQ5rz3eZD5hA3vzpo9isBCVm3dCvCZRn
PGY0XJqtnFicdz8cO2j7blB8IVncvVhblEfAcn3oengI5n9BjcbpefR9zzdO826DusAQIgBSeJby
tx/g4C1WfgQZdGOj7GSl+izp7z7p1s1TtcrLJJPl1qWa4xVq7XBQRCklRQTWNlq8+TqyuGn+83I8
clmHWe9h4cxR/9gXo+BaB9UE86i8ok+OmYBoBzepNC1smbJOqVMGa9Chp00VTWQ3yOguUtNKnwbW
WLtuHr6ptjuuitq4TpsQa0yLuEvDJLOa5rugw0eu6Mj5KkVEsh8FREL/ht5Xj9P3WbMm/LK0/hW0
H0jBL5c8YQey9XHzUHadYLR4MI9tbbhA8ClhijEvgh33vkv68FfM2f5sRezdrk2la5SVEAq7Yl4F
WbQfg3IeiC0Xoejf+OKmOns8FbelVJs2Zykl7C5QRJYw2XdRXxy5quOnq/heHJXiUEXFxCkHICwh
tEAFG8jOFPlCnbylunKCILJKuevJIKQtKKzzjkYbOzU+aoTx5uTRchlKKUyeIACBdYBpefGKussL
XyJjGuJnUe8/3VLL5RA1pIRqbSj7a3aJiuZqFMce2zOfpV0H92l3IVkHw6rAbc9079fIp6d1Eue4
e3wesVYo0LQB9IxJUWF2iqJofRSQXqySLfmKfaLPbNhid1Rzolx11XMK3Qi7CcA4F8qiLXtJ6Ucy
5Sc+lpP65eUa+QbHKzMyQX4TZNRunNGJXgLV/O168+A6WAR3KeWUMOSELGkcenFXlQXSFswL2xp8
EcfdTGazhk0mk9a7/mS6d7E29q9RJoGP2S/nc+OVEHZYsx/eUuOVKNWkHlBpRK62HCQLOT2rv2vw
IqsGC24FLmGdGNQgYqNusfv11ltv6GAhYNqL4hYWgv8uAiLaig4ElSh/y050Xu5y3qxpinJjHcIA
aDH7+z3GxPyAuutv6IvKOc0B1u7bgWZQHHuR7aCcAQwFzJ/6VCduMf+qMhQV4qMMf0qZoNtGmhel
Zd4DF3XoH26rqsdLmQc3asPaQuUmU17jtaDxvH6ysI7yi45SiHu0EqKdNDp6SH4NTvIP9Zb7XSqZ
kyctVN3DODtLtHXrQb32aq6S75ffMZcotUsPNWNKVhwtSAfLhjXFvr2qQD3BQ29VGWBGtXpjNmgX
a3dbXrSCocyawq+FMUoXHSdU3kJgwvm4bIpJQDGYLeUDanFM096t7C3JUYqwrY1FpXPWBzgeh4ly
U+eqk8gohmpz+PNotqzciSkl8QxUeFKAQikrmqur0KgrtOx1m1Ric0geuaDe+4Slq3gtQe7x27oK
cYZT/a6bAhvPh8RMbonWsae0l0+QpFjuyuDoRgY/vVDFHS26GkZJGkybHa8c0N4czl4cfhdNKNF7
mjIgQJJqhFmNCKcBBQiEu25d1NWbDRpJ3KZ9r8AcyiVQtt0umc+McPkD5lf1ztnevnwWMQ7KDTPT
YR7Ez2tiMVdr129Svu/TJjM+Ba0XIzhHIviWzBg3DTdOqGoC4Iy19vhlyhToBHKmVuV9kSp+m6Af
oC0d8MZ2ZLJPTGQCFJOc+PzELfzIcCUnH1ARbM7swjGNlcercihAcyWIS+9DS4jnGmiWSGqkvHuH
9NnnbepDIHnMCijAvLAQFPW0tjFXHBT6CnoHezbiXd290sPlwTxqoxRwyfMJpWer3MFjfwUgOwhL
7MqRCnW7xKvgzbf1xmao3n4Es+bNlEnkZsAuOnEMn/iiTl6LVmhgiQrZf33CAeZ4JQfTzvHsMV27
0q3e2HTt37RN64ozlRyB/hdlBn0DgPiitNW2Bp7nMs8nXNHZaCk1lnO21ak3OE/rdr+qg5theeGv
OjLb5ijTinL/TO9fqNbxGxmKiArRtijGBzM3k1eSz6iGzh3X1XKSZrEZOrBph9athWERASBNmUH/
0JQmKOEImKWc6uppnWmgLDR5r959nfugLPBeOdtSfrYyYs/ri8+u6MqlazobFqH4XbEKiM7gBZsn
PkbRJ8l2k6A6dwo9GY9BNddI3jmv6sfv7NX2Qkq77pkgoFRbmMBLlhM61cR6mQJwYQzLMQLluCOj
mpj0VlIBycR339DWbBIvz2M623uNXxakiOQC5aTWKyOMMjGfDO18ZZ/25CQonrpeZ2ZUqM+8GgGm
am9TkrwdMCPUrEGYErfuqDt0g/bs261dRfgf9+qM54Yorcb3ITl3puqmzhCnpe6LlTf7f8WZCt1Z
DFf26+/olY2U9sHGNn7QQiYMn8UhNVHWV8HamsKRNfPLOrtc2nULsMAaladifJWNSfdKhhfwqwBk
HE4C0rTo4rkGymvyKFOivHSSEoXbzWiIzMt7b6FK96xXga2kiX05K0JOXZyJ6KKEwBpZ9ppe/OR9
brP/Hn/gq4RCz2A2As3gDASbdmhq4Qt9XnZUv/hfzutQAHoCviDN3jinGUVs/sVaAz1kOTnJ5kRd
7PXrN3R10lPdoNEt5w16RBbC9N51hIIJk+DmlSGNQb9KLynRrAEF7o8GSq9x3kDAfSPSVFy6Wbs3
Zdyt8+FNfpFsTCuG7uKn6OJURTZd0dWaFjUnpim3xJ/J3qcaFlTLHW/FbkpUfiw13U+6YxYHJC3A
DSPKt9qbcOSGGnSlsUc1LonayGG3LWNlNsdJ7jF5WrvvD/Vn+RY5hFATx48tDZFpKS9X9bVWdfvC
WOgny/lrqN+21YFj4LKgwcpbBCuOCg2nJn4CejCb7Fe/+A0DBPAbjtwQf6x+wXDgsaDQnqaU+O3a
tqlAJPjvXrS+8/enbs4TN8BKLMxChzo/Su1Qe+O4vBI3a/2WQjIBD3oROxoacelu7Smt1mgTmQEy
2CaRY4Va3neLLCgZ4ypKLEZHm1TxmbG4ceoM7Z3vbUGboHKAcnCc/eFi5VJ3uDwnyHRErdWG/eQj
Dh3SofeZf7PMvzV79Crzcl/OVwQE7luGsRhkmRKC2EhHpc9/ro8/qlYdh8nrr1PPHUn99HUCC+x6
LyC3xReGIWOqQFc1svkX/s28kU14GRSAnZFeqs1vAZ785gwUun/Qfz1nqIiIQ/qQyTJ1yXnrtLEE
bQyoXt/wAl9lXkChRaPDDeZOAZTDg3sICAHjll07Mpt+ScrYu0Nrr3ygi02UgHRkKMa/VTdvQs2v
m4AmPoDy/yE5m1IJKxMPwNBt6Y6aULutuDOriDVFGlv7IqAAbu4kv3MVmvxMvNZu3QidOcyQAJcv
By8CzxJt39+s0xeqbAeeoakb8G1hsEk3rsFGaV+QN3Xeg5WfQLs1z4Snw/hc5zvVCL24oneRjFKJ
JkoABeZ71NZSrzOUkGRR3rO9NNm2pu/+GPS9SKVu+Y5+GEOWyCNRsRTkPrTMKClZ5PudvKlVzN2k
jdspl0q89zydFRAfj4tmrilNNjfo6pVyXeu28Lt96i/HGbSJthr74WzPAzZWdVO/DtxHmc8koIAn
43f0oC4/BgAixBdHBn0LHyiCyXEaz0xSItl/Z2iYXj7YxYzNycy/SQ1Qx1lFRqfcCWr3GAHGp8b5
Xlrem51hJgx2qu5yJ/oX8coY3KwCWB2OrOIFMsuLaAokx+3QTkCVlPsF77DFAqgfJNCcY47PAcbc
P/zJwiza+pazn9NCc9FsBk+Mo/gcrIoqdE7KcE48cITHashUOrIuzVbmBLtqoZ9621ZdrhmWR2qx
Rg7EIeRJKcT1dlnDdmrtFujRODD3L1eCrrVQ37dV685wC0CtGc9zI3oPvs+IV3IfDhEpSskGENiN
oxx274bg9EAxzdkAs4ja+E8HAb3b1uO4B8rVK05Z2wqU3FiG0jzMDUoLNgNgOWlIrRdx0Chvc8/e
q9L0rwAI2NYAwLQBhr1rVddCbfdRSsrSCeY8qMWlNG2JvTV562tKTUbY9K6OiQXg+s7ta7pU0arZ
5l5ZB8t1il15mYlk9jXKdQiWawYdNBe8Xbtw5A0ocP9aoE7XCPR64QukUjpBh4aN6AstLxWYM9Fx
5JBXXD4INqaFqKWT8xQ6bFp0oHL8mGFQlOvb2tUQkKXXk2LRIFj5oZX/ffcZmrPanG2Pvc2UZBh2
Urtam/yU/udbtcEwz+4P2VEu7G2ZW1/Xn3igvu0fJ7rLsk1AdW5kj6i4rmrAKec51qShaJt1yN7u
TJAw3UcNMKUidxwKtGYtmf4XBgXuDZq9lhKhReN/cK5YbOyNJx3WgNFmLTEWB+79sePGrDHzaZgw
D9llkdKQBWqIvbJUVAoLZROgyn2bGR2RIAVBhXdDd+ne2jB1xU2XO9TZGaKs/8s2lRYwh+4Pi/2I
jkb5u97UnwZBb0djxv/+9xlRXLNGzJ/cl23BP48/wx5j7IANnGy6OKvYYn5UA63UqY/x73k79faO
NUq/H+UZAxCIRq9RybZpGA2/0PG+Kl1u24auBfXNjGcJraWIrCRF7dmhDVmA8PfG7uYj/2C6H3gS
GPG++5lNklVBEQA4IdSW153DJ5hXEcCYl+kwhIaMY3ih9u7wkUccLYxfqC6Oc4pSq050t251UGKx
D6bZvnTZCCP3LhJc/knMtyU0ugZP6OPKZt1KhiLP3rJsIQI+5pEpSfUiyZawYau27aY+/p5QBro5
EZR1GtDlhS98xZlFSsxCKCPKg8Wzk4B+xRngFpah/K1dqu8e0q8r0VlJpy1wVOjdZCHzHNHfRazt
HYHGDYDFtl3pSrmXlSdBF2FenByzDVdVfxN2iluSig4c1JZcbH1/0MwLL+6vlPsbGFb3r9rUff22
OjfDciGSdzS6OPGU2u3Apz1ySJ98eFnHAVzDcrZqv6HlF1Gv/5ABKF+LIPGUS9zQwrlYVaXozBht
DWUdjsM0wne/NuKpkHVF2pb5IoDAih+jDGN21kXuXpkqLITRuxn9lfv/jP6NH12wqMF3m8FpMSxR
GFGdUP+HZ0OUuXcfJQJxNtbUg48EKSx3i7YMjajn5zUaLK9W1zoSSmiy1bVQmpxfrJ07UpV4n0XF
vudPsmDrTm29hB5ONQkUymBtswcQ0GjfXLoOk4NSpokZmGO2Gj+z9/E5gK++NsCaRoD3uXT17chQ
DqCAg6ePAqNoS+/UrTracx93QnyesjdPWmQ7Oy/KOSVPmwM9FZqZoGAm6vPCUS88V3/PP/iNxgwm
K2JZYiKkQR96F5pLIAjepdtqGwN1BN0b7utSxx1Qvm7oiLs2cHiYLDg9hGenqC0hQzMLrbinSz0j
1Aza1NCZGBzkhlkQEJeirIwUpUd7PRKIQ38zyuue/Fv2Bm0ik7Us/PGki6xUKJm1wNtqrKfVRmuW
+oq8FTWOY3SHoJzNZQvZ30i+Y/VJycRnw5q3AQPmWs1pZPGMogyPwzsUgcYBtd6P0TsdETAylMrE
B+OcmabOrm8G8Q7EyZwGsRcOFjXmS8bjune4uwUqoiRJ6TlxCoUS/6Kk74etY2p5oATdv6cn2M4c
3gQvFha+I6r7JjhYqdVuq581gY1xNGwDA8ToHMN/ckb9OQBGwSrqwG7BCg/1V9gA7oBx6M2mswjd
up9aqBGEntxA4QehJ3Pw2hwuEzYbJAZWR2BhgWLXcGD7PCr0QwVYAs4MdK9hBNSuDSRo+waoqPFf
FyBwd2YAesxZvRUEyp2ZZdFfH6YMZMaXtlAcqJ7McxwWG/X57tuX/+AecGDMPTzuw+C8mXuzlSfc
m1c8G5cQRRft1w/J5MSfoRaLOsW+yQH1kzWcp0SnpxvgZHJM01vXKS8SNszXMymecas0zhwMILcw
JcLaiUT58bFcD8KaEajhBFIbPz0Mmu5IZm7GqjHmnBd6DL1zA3yHycqak8B0MGAeABitW5+u7Hj/
FxRjwsGcGKD+jvyWEyJDRsjzsTtyl18IdHOfNg2Yn7aZnOB8ilaP0PTH5ugBPtyrniko92bu3xsf
de4W3wSVJiI0Gkfmwtzw1DBtHcfUiYhecQz0u1X2IEfq+UvCVjerdZ4SF1azRzag6ZZiFcFLXH2z
Znw8654pi0bnEVEb6VH3BE6NrXOCuQlQdgJ6C1m49QgsZUQvB1zLQTZ/b2r070bbJmgwUJutHNGG
iBhhJfMeMrvMIQfqfscGGNfQrBx9oRKzH6EIYAMQ769DxuzPOkwoSFG09926WrQzbMGLoc8783ok
gWee9RLpb0ezDlbusiYwMJ9jXEvG3l/aEGORKo9x2GULiKktKmSMeYQAk/mQjehk5pFh9LhEaW0p
jlUqDAKTzRke0XDHosI3BCs2dJU8DrXMQWGAJQEd6jPz8Cv1Pjf13la5ICobnEQW2f/xyNXJi/as
sS6ab5pUL7X2cxZAAQPsRNIiMeGG+nDezlwrhoJMp5KRCv67Q11uqdqxKRUG3TMu0Se9zQENAKi+
uzeMw465qttVlzTZ7Stfd+jOlNI483J0D1Z8LE/77l5v5ayehGk348heN0vQ0Un9KUjx8hm1vH85
WmG3pCYBOIWQ2X74FLVS6zsHKOCeiR7HplKtvw8IPGmQ7K+IY0UggHbpUq1aESHM9HPXYC1aAmTu
PdamKDbmHqiw2neQqWafWWZrPeFEnyWjfgeAahR6dfi9ZMXK7+J5hGZq+ysr/m6GTCX6SVNW/A/K
jUa6YLuZLi7Lk4/pZ14IL8YXawMiyfFPzYA/y7NkjNzLgjlnTbLEKE0+MYgm8OO985SvmbX6WMBs
zpi7ILUNjL13oRcxb9aglQQP5Z0P7+XsD2afse3RD4AGyxT26zJivxGU5K0mggwlOipHu6IevUdz
dnA/tr3V+A4rAMJnMQfreQkQw+jvPHGZzhN4jA5pAh/BOy1e0auqTALiBHDGJrnLsXZcndRszy8C
CvAsjZ9n/E+zH65sRGIxe5zxl4wvtAJscnSLUAIlra8ND+rDS52qPn1aUzBcXJ0BBQAGnCjpcg1J
RkyX/fiZ7vHxNy3BFBhFu2JA0YoLD1fMqgcFZzJluiEhwVqASTE8OM48uAcKwIxD28rqHK20PEox
NmbDAHnBwaz6MSYW7ME5i9EEoywgIkzkCR65OHcQ+Ati/3NG2G56lDKbe+8wugT4B3KNRaivSBs3
pK+g6a/4GvyvScNo67coICiERNUT9gHHQIXArE1wQA9naECDaBosEvwuH9HMC3RqktmbnWBfVI0n
ym1bpOJgGzwMCNz9XQCXsKxkpTcgDnwbhvONfBXv9tF8TaVuXqfVejgxCHtS+NMIL08zNzYwwIgF
CrHz3XX4AAJkv0V/aXkdmsQp65ezY5zz2dMBP5dM3erdpQGLAlij7rXoFvTgM+J3QdUfnA9RiBFk
fKysypRpU8KDbYOYv4ZRZNbZIiIto+j2DCAGOT2BNgfte0c5g5d93eXEosXir8ScRMp1YancZX07
+lDWBKNvI9oDYxcoUSkbo5SP8gruwawNTgV5B6UAtDkvn/3fqh/7tAfyu/vv3ywoMDOu4TvNiLxx
CETkaeMfUhvzHepXzKbNJjE72amKQ8d1jlrFsziFPvF7tYEI3gF3PTAYqtr2jXrnh2uhN7njmM8v
I9mm1ICsjwvOpXFSnBDNeHiucPiarJAzm61RbX9qSzQWkFOU0jLDVdt6R7cHEAZrp/i9rdGmD+CN
qFNscvCXqIUuI+9OBn23ZR/47cc2AKNR4A3tiJrVcbooGLEP8MsnGv/uardyOLt645DixJYeoM6q
lM1lCfXQu4ePAweQM6iaCwvU2MT5MVu86MQ1DjoBu82pW2ZArHoZR8e8z8biv5uZXPFG43jYXvfs
w3+7IhxkxYGZhA47xWb8/2/vr6PsStM1T+wJZmZmZhAzs5RcNwsuN0+37Rm3vew/7D+82mu8lt32
zPSs1d3Tty8VZVVySsoUMyukkBQcIYWCmZn9+/aJkEJSCELKrM6sPHvdc6tKcc6Gd3/fy+/zPF35
m5tmphAAweExsrYEEbaWPv7TzVshVEzjtryjfdtyyYTjAFhKyVzDVCn5DrJwcgJkycjiiRtmbhgU
29KHvOr09doOiFwwIErV9xIVtpL5sGW3xD0ljUfPifLDQXPFsMWuWqvc7REg2ucpk7ZlD96ZFUSa
BImRG6dwdGGN0n420jOlAdB/ny30GHYFFCbJngCDWG6U/TQAmLBoNE0Hgei6S+9T7Tg4TusuQZ7B
SugFwK389Kf6/MYp9boGy38PlRDfp51f2zt96ft9reVjkMFNYwNtmszsDvFcc8xmPHEHIK8P4miO
ulDRJmPhDBKzp0eqihg92fWXW7U2wUsOJAFN5cm6R7PfzXvlxE7mHb+W1mKRMhrk7gLV5fCwRsYw
suzBJ2P1KY3j0A4SXE8Y587qC2YzOnN/XhlaCabIgb/eYs29WffHmn90f+w9F7P/FlgkHKmu8nz+
GMmJATODTRPJ8+57iQKfOa9Z005mHIT3/3y6bhPowhTiw4hCcbEOAQpaaLKgC/dn3rO1J3BkjSE3
5+KpJuaTGk+gW/A8j3JPC3mu+a4kE9RY+xAgrtAcuq/oanpnHYGeB5Uq45AYxHOzz40cSBDadPRC
ktIWNDxSI0+14D+hJ6iuPl4rtnZ726gtAckLnQIjB2TlDi3mWrqA/i2t97G01bMvjCNvMsdGNzsb
Z9zoB1g9XEi7dJqAjYrd0NgYa9W45U+/pDGNDLOWQaW2OWRvUK9wQC7mIcaomvWxBk279ROUDoh4
kvvop4JIktPbY1FCzTVC6RvzldDBCFrJVZXGpCqgBlC/MQBci+lwSCT591r7dbFTTafH4Iy8k6gS
/QUztCRMBpjdHUQus3RtjcE4U1tyXZdq0KeOB/UnxbSFGQcOBzK4kCr/lj36Zxsj6OqzJZNsARJr
wiQUjMzNmmBtLD4czBo3utvYakYJX14XdpRbOJ0W0bVKuFqth/ez1YD32lxNu2xvmFaBTxNrDaw+
7zC4EKylebu0lGlzcHEHEM9BLu74L9jqccKBx9XGpc9r9pEzrAa+6Tu0q/At/V/3M5piWuXRc7aE
mdFzRnchB8NCYaLKNz64ppGfqYqbZ3qprzPfUWB1zjzNpMH6Zq9MmX2++G/Gti787/kg/fFtGxti
s+/m+RYSDY6w2jBdKCdGAXvAg5jAuX9+2/RTys/SQTZfwvJBliUjG2aH07zvYqiUn/FcLNkzYgmu
1CiYAcPkUbyX6iqZAHcK3IDZSTpaGXO11smCH2ONAT2ZUjKMD5ZdN/J61DHK9ybxZ1gJ3sVv6YPE
fhJNPQAuMtNtdI1p+2f04uZ1wEbvj8vvn+9UscG3WdYzG9VGkgrwNpe5QY2Okpzi988CXTMGN47O
odA0xz5z81i802xyczb2EfA4TM4y5f4KN2zWCUH7zNiAhvALBpGfqf4+Pgy4OBgfUyScwYry8gdr
a+GPRvcbXxCf3s3c33MLdLiThpmEv4/y/voYWZ1hZPXZ1wsoHkm8foDLp93oXuBCjwHzRtVdC3MI
78MTgN6dYAu4Tt1X2S1G7dbhfz+jZNnTYYYRIAsciiqSkxd1gRG9uRIA+oailb0lR6set0S8gqCe
8xVrH9qScrZh1cWHzfZaiUez/s1/x09ypfNkkiC/b5BxziVRZsCDIanbD4DZuCddBs74mMjCiRGa
CeSHyZP/E+8InW6SwKOsI7pK5kwCwtwPdtHJhSQLmArZdFS89266vPBJTVHQdEkZu2v8cld0ntO8
DjRPMcNowPAoeAu5e/TzTJLzA4yI9IEfY5IfJFa7K8oYZylTBVmbqeA9Wk9X8Rthqb++9H9Uv1yu
/lmWcOZGqI7fPKJj95m1Xv0T7ducwnyK/2OFBS2XUx7zmsyVlI8wxzgAKnEoc2y0NSUE16phCuXh
xIy9JzPnT1mVubFhKhQjmgDswsPL3dr4tvWLcmZDGCVnOdavdMdUt6Deiwal9F51ne6cH1Ub6N0D
o1HKSYgGUfwlJwEDwDjdTlAmOmFwrCD5iYN/Y4Y1K7AEWkHAE6H/qcrxVwYZs0f3N4uh6O8EtZ9N
STUmHIRdd3+qRilBzCpNA4qCIjBAccyNP3mQWUeZDo0Z+jpalNwWZhxf6cGf8yWjVAyPtqky2hy6
JQ+jfIxzY5SVqQA+BcJlHA/LATOysdr53KgYhcunDOTkhgdQtOUqMT9Ej7tJaUuCAaHkXoOq+sgQ
cm2TrHRyJxsL4JUbCOm9gMNMglWBaJ46TBtdvwbHUHQmSELT20BycWCZgz76VYlK++O148/fVqF/
h8q+BsUdgKapaWazNiTpzTo5eb55Z8ABw0edUoF5u/TTfz5MQAw4HDmm2db5rOm8LMydOXnDuBAe
oJG6XtUZtNaMKIUGLdLCbff1EGaLpugYZcYGg/6NrPuqdfX8FX3SmaS3Du4gKQDDAG1jC05rCFRZ
3p3XdRSKpfpOnDIq3HNEo086VxgP9ohJ6DiZQNFE8d/aYYJYZgRp1b9z67YSVlEBDKKLZWEJ4bgM
AgpZCYDcQCTUOtGmPXlC6RF00YzR8j1pAKUMGN9TB5UYE0iNQe/l6gXl4ZKtvy96CG7APxqgP0cA
BWvI6jdQ1fdTChW7BdnMAchUScvfvbYu+eYu0DdiLAMJyCLnVIKh6gdJ3MM34NkAjCSnqW6MzXhq
Dn3kxhxlFK2Y+cP31HOnUpWMCwUmLK5csE6GoC6j6j5G5SKS2XsfWgwevScqSC5Wh41JvL3ISeP+
giKUgfxKp7i/CRKw6NhngqtpknDm/pCs44JDaDUS2CpbC4dFZ8a6sAW/rNl578PB0SRgaU8FJ8Cz
bgiqOgw17BdMrTxzzIEaPTCOQ+LCCBdZfgfoXg2dpgmIHU1wiAO7+LCCdfOsVkJhkQysoJIwHUdx
2lSUTSH0kYdHwMUMJ7liuoegEfPk/sBySI1yVluLWfc4EKBqPnN7BpEZGtIxkyjwAZQzNFyRGZ46
zV4rq2xWEdRONswWc5D4acVhvw1bRfMMbdO8++dnZ15hBxnqUVfNtgNm1nxTJTiZCQZwbmH7zdLa
zMjJvSoS5DiWmbCFoM7nD66dXKxV2WA8ANJ29qtqTVPx88lnrISZaAsz8U2PqS49PPsbnaqbkcMq
5kmZvw1xNRVb06mELLpgA3I5ojsn21RVg30kKRDoHazQMIBkb+LMgQcxyQgT6u6pg4o2juQQFFWe
PlRcjR579FgEaKwNa/TOfF7lGai+xoARlJdZqfOANl6ESaWnf1qdYPW8D4ZEwAtPwrowjqlZi1Yy
/ekLst9oRY7KohW8qUJlIKRn0p0UZAEaLhzookHmYVtpSSQREBkXCGgbHSXMZodPtWu8i+AMaruY
ZyIzgzvDHiUSdcVv8X0Mof8qT73Ed0iQmCSkpcdNIeTFetzqRmPkcAyHf8AqsixEOHQktj5Q3cNm
tU0z7jSfOLQuaPYue9bYNysB8cRd2JJ/VrBigu35be3oxygI89M+0G3eK60Eo2MFM8SLNBJI5SP9
jFt0EACSPQgHbM4mqvkCC8mJuSk6Lizw1YWD9UcgN2oYX0yS1h0b8IxbYvSLsWfG/zP3swQ1tKHn
i0xUzPRt3b51U9dXh2szAM1PVIGZt26tZh+W06vlBWgfLTjWtVifRiebJJbRVYuNqpW4thI+Rk5c
35IFSebuMl0+c1m/a43TFka3fgEDzKTpvjKZTny+7oqzcmk/rXLADRs7NyqDpMASKvUF64NOTDNz
TjU41eeaOqphXqlP09YEbNDiX8G20FRZCeB3HyCfYYpD5o+3CQljEncuJulhbIJJ6r/milz6Z5zU
vA86zcZ7YHooj1ZJbTE+nfdjOz9msElg6wAbIASE+nj21OPDFAX4IFQnukef9a/nv8mN+xhmkFQf
Xaps0q3rZVoBBlXSY4XOF9m7sFtVghNT7RSgqHiwF3CpbUtpXH0113Tpm4sqm4hWwX/3gfL92lR7
4ZKunT2sLwFAPLQ2QWFPG1cH7HdGjlaubmU046J+84+ugrtDnmsZnytM0nOaAZcpYda1ZScpqpli
oLVbFg7Wo0m8Gp1mDKZ5eaFBikwLZpyrS6UACuaGrlRI7OKMBn7hUJ1qamtUPo4OTktRmD8YF2BI
RHvdVUNrNUW0XAUk2Ci0rWMGLBZovu+Y9zTprzUkco05dnQNVDT4bFGeXQAMT2uEAl60x9OtJlDW
GmBXkgVO2AhvlzmNgNtw5R+vqqwrUNl/BtPHphXQp9rGZOcM/TMtL3NHzuky7CJlbWOM3dBh8226
qst8Az+Wr3+nSQHcQpBsoYu51qCuHlD7HUE9Be0n0BvH3oFqHDyvpZWNqh8JoDoBeA1OmpmUDAZs
pmBVjWpv3NLhTzw0uQkaEwCJPM1cDY50OwwEdy89UMdkqNK2MHawhhljMxdlQJhmekHT7KVKCTp3
Xw9IyT0ahl/ZdMg6G0oSUyFaYvDfwTcVGqcmKF0O6xYIssegJUlZCcgQbAnBTzsZBH5TZLkmGRyb
xoDNgsraC6jI4HSv+ro71APK7pxxfMi8uVt855zAJU5Fa7PU0nxKp64e0+8BbdqzLlMp4XQMTMKD
S9Wn5MZNXRuOUuKaPTroD5aBwT+g+pcMMnvJqcM6SpvO6Hpap0gmuBAADBAwPrx7U5WNvRqNAYhr
De3i8IC9VsWIStAE7dHG8XZ2YLTDyJAxjwEH2qBpfRsYwlRBdeRqwCHZmVZr9SDc5j20f2PgJ/pA
ie6HWz0I1FbkO0NGcQSZGLn0O/eopxMe4GCcK+hg8qrhXT0KsugXzGQBPLkSwMYAgsWu+tu68tXn
OgrAU0VgqDKGDYLwHCi0PgotXqXMCkAVrx7XMToNpjbBOmEyylSkhwe61FwD8nnlA3UGAn4I3Uxx
LHPK423qqCNA/h1jKw2+St5dqA3gHiS4DSqEwKX97y/oym/Iik6BBr2CEREf42jYMv6vfpCBNwkq
Wrj7+9000E/QOwObQgBUKmtNIgAnlNc/NNJH5nqQYIlMOZVHYnX5mjk4uG2TvrmkipMndBI96rDW
tF2jf9kbVSdOYuB75UNlNiUFQD6zW+kG6GtiBOJyndXCGDhRCJgaCQOSIA6mjbChUnfLugjEgpQe
g8PusyjIMnSIRukCDNNrkITZI6Zy0c27HvYiYKWCYBy/V3LMlxKQSYjMEtiP0j4Kt25N5RF9GQy/
7Nw2bQJcKtiVd1xzW5c/u6DqCei8tuYAZAQCPRcs2hyt29/U6cyX4AmMrdaKtAgFAcA3TWtyX+cD
VUFBWVvroMiNG7TaILAvAOa88ovinbqxBzeT0W+7AOXa1+iaMW1n1j+OmeTJXuYYLwF09MkZldf7
KHOknzU/DCUaybnAZK3eHqOKE1U6+dkROY2Ck5ASDrq/A4aOtd1xXzXMadbWOSt660atW5cKaFIw
84V52rqqVh/dO68vf09nwk4wNAhaPJnNH2zhN9dO62wL+iFzrz5EFmlm7mDadH1ATcie6+5nf7Gv
+rr57704i6bv3jjpVvfAwnsybaHJWrUtUhUANx77mErTULHykwExxSu07q8dxhboWOvq3ZSwa4s2
bkiQv2npY0RhlHc1ZOaBjQtJJXCKfTvEdQ1ytzXsi86dpHtivBvgJhIOMcwaZt1p0/1LR/SNK4lM
QGBTcCS8cHCHQfhvqYf3m5n4dn9ojjZs1mZmBJ2H+6FtRZ7oieFedEvfiMaDAR9ypipIwD8A0nVv
H9eEi763i/ZPcAi8TUnAkZld/0AlOgPyCDJ/6d0o+YCa7QWaex/MGw/KoA8cJTGRDeMIc8tBzJsX
bUlQ1eF7Ovf5YbkOr9RKUMXD0JczQ+hoeKPra0hAl04oYCWUVHtzFQsvew4Ajgl/V6J7XznqC6ed
WpeBznfheUgUVJz5TJ+fggmiN1Fe6Ls+upimsV/LNpy020+OogvRAcPQ8T2oHdbvfweg4QQ0YSSM
/AGm7KwASf4sgKpz8cqnTbbIUEAuXt9OEUoryFJj6QWd+KpcA1G79FdF+VpFpfzb8ZXgFG8r15WT
VLnag1gjgP5lwU1Pe74j4359XbTaDo7JNQruaAPyZ+7NI1KxaYAhXvtK165/oV97jmkHgImG2tUF
e9XbaZhs4EJ/yGiHL4wB2/NVZLgqoVmdpCtiFNycnl7ePUC9fTiwnX3g65i1aYDnzDrH1jzbnMFI
YpzhrA/T159e0pfnulgDRUrcmq14UN+e1F9mvA/bRneGNYEI20U3c7R9vMvJPkbyQCyHTY4RGZKR
jEm4mk4VZ6gMATvMaYZCjXV+lGTg2OZCwE/pxphBt6F/75LwvHjPVRFFMAJF4RS7BJHwLtTGmE91
qvqwfvvZnHYUAN6FfXcn2BiCpaSRhE8luAt1Yl5680rtSPd77YrsHHMsUyDY93azv9k7/e48E7Ic
AM3PWC/I9axOSdNlZJMf/9ub95ZIaHbrvq5eua10L3wcQFIHG0t08fOP9Luvy1U3vVH5Q6aTa04+
TuhzGE566BbpZ/9M8I56R6cUjk/jbkaSmM8fMPqJfT0IoF5vHzqC/eplUO1XGvl16PCZL3QEfI8R
6FotOlloNnuhDL114y4YSz6KZ777XQLUcGud4y/5IEvAcyvrS3XnJoHKyjgS9hMabGvQg+pKqANB
Ik/YqA2FmcowcaOxOYxUjuG4zDkSkODvWfczCKY9/l8POstl3FAAcm7sm5MjSatUgKPzoV0+cV6/
/vWM+rbyv7OY6WcdTPbxnsroxoH68tYUiblV62EpIRlAh2Y/drLb+DPMiXuhswaGQ8BcMTtvRiMk
ibqRU98g6PnmP4cliKqMAlZX1Q2dOQ4Y5MCc0kPWwdYSKH937LDxGThn1ySYO7SzBwPotiSV9Uts
nANJgWja/tesqdMnZ2Ev+c8k4d5dpVwAPwNJ0Bv2gful0HxerlLlRJLWgTdUHMuV0EkzdO1O0NHb
bdYRe6IXkO4eU0ygc9fLAHHSPeDGOnJfDg3hUvdr/CBXAx4NhfWVCX30mzC57StSfjz0xzMUPgCm
PHamWlXjjLkVg3cQRbhp7o+9O46NMn58D5XkPkdzf6x7RhE8zDgYgLTGp3ez7g/fLTiNd7ZCWc0n
dOnYP+jXk8zTrwADxdAAzhr2AVr8CfLPX++Wa+Z2wGvTYejAn2fcr73qqk5/DhNZo5di9uzXuvWF
SnIdUhg4Qq1fXYQFjETVxFvaA5VyAkiqVlHF2lskK4JTlZkPq8FlGIzODClgy5/or1YDdBv5dEHm
lR2WRV9Ef1n+I3ttoA+8AJ4fHzLMm+SYhb2En8B67OPfBya71cX6m2JEMqpwtQobvoQt4CN9DO7E
wBawtgBU83TEbncamsPzOnmuUSPhgLNuy1a4PzLKBFOt8K6qr16HwhRcoUOFyuc37pMkyqou6NSn
XwFsXq32oGQC/BF4I8g/eIQqhXeW1tSkUyWn9Hv3OR0yXYSAIDrirw73GltdpYryAeKDDK2C8aEw
is0GgGUnoIVnLk+rJhTfM2CzisNhj+D3E3RUd7EOh4ZdFRznb2OzWY5b/jpitv/GksCyfZtlyY22
JmdaydwwLhMdFbpzDHoKaCkGbNbZ2vTjzEwGZzNXsqkYqixb5onyOOBcAFrMXdTl26f0ZfUJfWP4
zFn/MwYQx7SHTUFnlxxvVR6ovQAi9kAl5+A4v35NJbehHSkf0vTDarL23+hLKNzm3MPhLN6qrRuL
lUl77bMtRT4AHYHIHT2nUxcb1ZDAbFU26J6gpj8dJM0OwAd8+TjBfZUe9htKJrhAybLXzzZoCCTg
SlBd3SJRTmu3azfzRHFWcR+nPnu1NtJOOAKS+r3zv9XfXGFOjxS0CdvmyLDJBSeYADmKpIJVRDAA
MYlrGKNgVvj8TVBBf6X/7aKpDKCGDEIwc37GOXAPJpEA6oo3Mno955D30Q9w09mzOn2z3grqhrsa
VVLSDTdsGYBiBC8BQfIMgF+WoGL72kj54Dze+vKX+uzkBTKHOPm3GvQ7HAe3P9mhlbHTGNyjOv7F
F/ry7n09cAAg4OGIHN7Zo73bk5Wzfg8zTEd1quyivvrfruk4Aa2HqTiwVhxnAhSXlwDPLFnET34J
BdSM3gehuzCsUOu2GrAI+MdLP9M/lnxJxp5KgGlTxYAxlkq1JgD0d18FeM1quOYS9Gef6+T1Szpx
uUVd0KT47QHn1hIQYEJeGAJmci9fwHjwzq6u2qRtAOBtXp2oqAWAnVdY7HNQ2bXcPqML5dd1EoCW
eCg2w0GWtugh5xfZDJzSFZcA2jx7U5cMHZRfjrIScQKiYSZI3qgDW4ehtSHo+fx/haOed44jPEv1
a2QY4Li0FbBnkOiglcH2blkzGEHPOQwk4JjnBkt0CcM5YpgaDAbDDEYITtnMlRu0YSVsDovbk+E0
L7t8ScfpNLhfU6MrsHPMNBFcNF/R5VzACfeBXp0JmM5raQX2ZcddnTp/TB//40lVDwUyhxejkPFq
3fhtrW5jeOdo0x7lFc45RCtv6yZml5kNJmPiQEovch2yB0jn3KW7uvCrWzpDRdYFo28A6hzMe55j
fftm4GhRaXztFm4AGfPhCh9ifRy5qdqj/4VAGpT/+VZ3A1ipmDTlRz5Q91V4u3+J3vrgkHZkQEm1
Yae2TpzV2csg9f4D75pN6IK8TWLQeAYudK/4+GUoBUNtYQqY9wT7RdE7O9Xhekk3ykgE1pzQp1Tp
XVFkszg1Zu06Q4uZEQYgp1UShsqx5rzOnbusi7fv0T0CBzZ6rZd31XEU4MxpRhJ8c7XurS3aUByl
IGt9IRvPMCUAALRl6rzOY8xP/MNlfU1Fa+H+rI4dc38BgE/Od1WZ8SoHZqC77pzU2fAEnLMiRXJv
070NuvvNl3IPCFX0W0lUNJm7bweR+LOzUDaBzLwRVPAtJEtGz4Au/qV+c+ULqhTcuwEII6HoaBJL
dAhEAlQY5MVsfOddlXz8kY4wS3u7ckxjns36rwSY78C+sjZuQq2njuurj36rw7UPVEmj7d9Xdmni
p/u0a1uSIuh88onL1Y7ddTp27YaO/sd70FF54KzihOHkm8KoeywVWrM+LJ/QV+Ert2gTLCBjZyp0
45PbuvCZqe6ZfcFagk3CnZYzNxc6gziPEbkDbY+R+YZKdUwnqKic+2WVzlGR8TaIx050oPGe/dJT
lAYAU8Wxv9X/h+Dgr95lDb109n2x8sBGwHxy8befw1Lxha4MugFWBp/1EIHR7+7oCs8xRbJuGo5d
18Bope7aro2rAaZ8BngMMMIwcHdCw+SAfkhYUawcUPF9vi1nyVSDoRD2YMRmvLlElz+tUgnB7Qw6
eJbAa5y5Y9fQaK3fu1pb6PCyzBpz8n5wd+/c16GZ89CeHf8H/ecTZu6afU3gP43WsrpDAmIUhiPo
ZXH1Qj9bf5Xkw0loS0n2oX/vDPmovrpFk6eMPXen+pmlVXu2aOtmgPyWeD4HbwAySaimzl3Wr2pH
lZAfr58BGvtEUdB6BVSlm6Ao+/iErj6A5YIAc6CuRver2zXz6bhqATUNcSFQpMtgEywDxQxTe5J4
8wBsrngbQeYwiOdlX+nvS4/hxyB/F0Mpa6rF0HH55yiMpKbFbmEo82Bb2bi7UzNnrujClU/0q4sz
VoecGT63ui3MSCNI+b7pdHPR2fL6Bx2VbXew1wBpnrqp8pJ76nDr1P0Gul0MTs8sttSTPb1tp7Zs
pAPSKhmzZ2AZSNu0VnlDZ3TsxH/Wv7/szbwu9+JNe/yEu/wZ9Ha/d1Hf/OOU+qbf1tZ49nIl1H2f
GGowKFy/aVVHxLj278AHCO5T86XP9fFnX+uri4Doqkp/+5/61PrOIe3OhwoRJqRV29H3o6d1s+RT
/U3JEWu/uZJMMPvQEcA+L/BWwuiUexwIExSHpWnV5gck3y6q5Lf/s24fRd9b7FSmA9TQkDIekkTC
aN5GzY60qAa0+S/OUWnvhbZ5qF01YOxUdfvqt/8JpqPDdE2x39NWb9GBPSRrSaa6+CepAOrOMezL
lwaB/pck4+hGdUJPzMGwMka3modvlLJ27QQUNV3hzvitt86SxPtCJ05eglEIdqMeH01tP6CfHkrE
xpXr2Ccf66OPz+t+1YDcfuukesbTfoHfsoL2dC8v2C8otHRWndbhv7vOONkEPixrgjG1MXS6awxr
bf1GZdOb/loNP6xXC6gPYL3B6ZM6V3oGv+qKDtMR404ieY57GccvcItMh2p3u/bwfmBfhmiBUcSr
F3Ty2BXdoWW+sqxRQ64U8f7HBp32MuNm+KEZG7V581rtSPZ+7QSW5eubTiPAfD1CUpRIq7pXL0mA
vzuvb0zdBByIySn0Qli28mCD2p4N9gGCmB1u04MrBK4nrqm0ukLVdHINu1MsmXygE7D4uEDV6p0F
fe7mNdqa6Gm7P9PNBrPQHrpxnE9f0a1zv9XfnoW2kjFFR0cSs4wzTjlQnGKMdOeB1VqT6qKxuku6
cJyO5lMEqABkjgZt1f61850v4Kw4sldHuqt08fRZ4pF7ur1mg3bs2qG1+PbxC427juwjHzpkPLxg
fQCcELBnw3wDRu8bHry7VvzU01/o4y8v0gEBnflEi3r+cUL7dsMoEEjwfPNTffTbo/rmUofaZu7p
H/26NOr0gTZmEOzvYlzS4Ywulh3Rr6Fz/Ao5ODnbmL3Gp2DgimZMezvvOJsEtdlTofg/e3arZwaf
thSKy4av9SV+geOcGcfmYRwjlJo+oLmHV3Xm94wF+f+cBADU3mlFWrsX9prjgIGfAfwao2Y6EA0A
qgEan2UczssDlhOouRc6xRzMOAh7w8UB2sGKc/rqH+/qJN3fU6Y4QbFgeBSa9CjoMtet0TqAdW1+
lf34riXwWu7/K98UFGchmVu0zRVkfCdvOQ2ScWNj93XR9j/HnHVQAuwBG7Rpywrl0cr7uGUY0L24
ldq1309RQed16nKpypo6NUZ7vjOMBRFJmcovLFRRbpoSIljMJinAIhobIptlgPlA9s5fa1oRWZBk
o1qaoIMDOMSHKseEQeZ8zgO4EtAlbN2jzRNky0IKtT0Niq2ltLSpclD96u2iEt2LonEgkCfIi8XZ
n5kmWIO+ZQowuEgzt7z4Yi60ba3YrZ+A2BuLgjkL/VdT27hmyfSGxOepcO06sqSpSgbwauHFOLiE
KmHTDvkAXud/6rwuw7HaPER23IENHRyLM5SvwuI85aZGA942z4/+yi9o4YvcJO3ZowT13VR2Ogap
M1AtyV7N3ISZ6eWZ2lqZNYXebHDMxn4wN0lVmnbQCfc4rc0xHRMEqlPMz/H3Kaqd40NUf1AgcckB
ip4lMcQc+aiZpRtzVTjvdtOHUAZePKdj50pUDqBjH9eLzsE4roHPeG6TKi4gn/uEScxkD48jV3Am
wos2aRfjJf5nL+riZaoacF+PGWXjj6OQmaP8oiIV5ICcHjCjrhY6RuB/H3ZlrmtzvGYxRtGUpAHB
NVYIXAtmo3OLtMqtHSo2Z03T8TAAV/A8nuUrS3DOdIowX2VADjODZxRgImre+2IQItM1Me0ErVjK
KigcoRTEoDkaMC56Oty8oRB664D8Y+FfPnNV12tYU9M4dp5Rii+Cnxc6zTWg5FPMth0etMCv3KGf
h05A1YLT2WUq6G1Q8hBt00btTxCVB1XcFnAo0kLcnzTkrNsJwAhbO2nldQpT/nrGd2inHqUa1EHL
6zAG8/XB1XE+yAr3c54xz0Rlv/eu1myFjcK5Q/evXtPNcqiO2OFesGys3rbL6pJJeBTNUJ3zgwd+
B4m5QD+dPn9DN+raQM7lfjyCFMz8dGYe6zw/Sxlx7IM3GSxzj2E97FNAgL8unAFhvayZ9e4k78hM
FRSt0kp4zPoLMIjXq9VJlWdwmI4gkk4OtCFu2uUFOCb3d+E699dhUXDNgswcwv1lFxSowNxfDK2o
C/4+TpBv0kYd+iCI5OIZnbx0RxWgK884kZSKgkIMAKr1a/KUxbu30XvjsDD3OdDZBg2bceJWajOJ
B4PPMIhOmZwASXkCMB6zB59YoQQB0Pxs2eOj6KCLOn3ppm7WGcpCc39QrwLKmoueyM8jKRBrAzmd
9QNMKRtgU9q63eCynkBReURx/+jjooo5KhAkpaYBBE3NVc72Ttp9oaEzVZtZ0IBzN2oXDDL+JJcu
kMSp64Afeo6qBY50fCL0mOjmwpxkJVEtHm2m8g/40yh6Yl0uT0jlztFgOhggItbjWD8dRDRbRoLb
EonjOgv96NAQetp6QBy/wBQVvgeiW4iHZs/eVkU7VUcXxqqSoOXMZ61nk4gBGfsRpah3Mt0gXgpm
dODCRebfLRBOuh5IGPpFoVtz81RQkEPHBuMcC0kVP/As3nkf4pALOn6KPVgFgwMJ2QDASbM3rVaO
L1Wk68d0tIwZc2Z2+wGIWF57rZktpqOJqvSoa4Ly9kLbtx7wyLkGVZdQlaxqUecoAVocNm0HCO8b
QQ9/Tmv5dBf6inWQuP0QCOHQGRIEfmsHjD1BGSBtv0+ljgSLWzeI0aCat1L2nHYkgcnezdm4Wds3
oKPnwaKsa7th61Yf1AH0cMjZC7p8FyYYkuUz2HhfEk5JWXQHGJmnxyvCancax9xgK0w3DLbGGQT2
9QZ0jm6Tvs5BHEgCbo8oDY3aeOaXPthbgNXt3LdDo0BkB8D6kR28FNCu6UbBDlBF72olOQyTggsJ
ioRtcSxGEuu9rWqZoeTsb+aZzfz//OHgq5CsDdrr66dQbNExqNLq2obQRwQiMdmwB0BNuorunih4
vxd0M1XooNwd2gnVov85bPWtCtUYGzXtIm+AIeNTCpSXm6387CTFwLbx+rkcngnAvGH2ziB2LCBj
nSJpx52d6VF7m2m5p5uIrgAzIsBY7+PD2R88kJ3aM+NBHvOczlcASjvsDzPOOsDbDujg1lrdOnxW
N9l/Qz1Uwun6c2etzxKIZ+wLp8oOcSY4E0OGLphAbhwHfpQEdEpRgLJMRXmEDoN+En/mpcHcEZ6/
RfthIAqhen3yaqUetI9gv6gEYqOKV67S+pWsI1iCFlfHHUGHT6UgNIetnjt5DQYOgF1nkKuhFs5h
/bHfM5NJvM/3+8+ZDsdRKsBdjGK1jZJ08oRGEepLA6BKN2VXw4ic/EBaRwc89sXwVaJWacshOvXC
L+jc5RLdvg/15RhrkXGYsNRVWrNurTYWJynSJNUNxgyjSoOTdDAlFivbwkyhE3KITivs+DTvYoTW
P8eIJLqmbMDKM1R1ewDHcwrgedbs1i8CGNxyGJNv933astvUPUXAhI8YlQUz0o5NWpfHKN3LATVe
sNVJziWt0Z4/o2085Tw26o7lMzNVA9MN/hGUgBu2rdFK0/mz4NOy/iex/b0g8Q8BqBq+eoWijb/H
KC8TVppFz/pF8JwWOOWb4AyYmQS6RwnGfSM2k2Bg9HHDqMrP3lAp/k7PNFTIqUVaR1Fm64pEPZo0
mSVwNR1eXX3gD1HwWQNeycL90YkxS4IvIJr7e2LMhBv1BDxv09t6LwKaw1PoI3zmhnY6TEhW+1Bw
zIS6c/06KuCxhlZ4iFEz1i34EuN0PSWvSZJfYKbiPYgdzOZxpYvOiVEifLdVY61WkWKGrpDOoad8
e3Sauc9ufJ/UHVnatSXtccLgjRQ0ew38ixFGsxwZ00rbFcHop7dm+/DX6NqZ9iex1I8+ZRQiuSBQ
KRba/zjd0tAjumKPC+g6Do1U+Bn2+2V0WOeQJkwHM8DDSavXasNmqCmT8FkemRESpGnrdcCbcYAI
upqv3FNNey+jgIxR4x+tXROnoB3gYJy+pFtgbox2D1gjfDM+Yfir2/U+eicK8OvzdCY29dFV50hC
DEasxNx8rShi/6bGKhKGNKsXzJdzbt2vd+P7NRvGOCnsQbUN+D64sg74fWEkNTZsI8mfSwHkjfbG
G72AH92Pv9OkgCMBfMzqtxW5ymZqLSAbKg4WhY6ZHzPgE7QIuhsMgGdEDxVZWKYK90Nhtt20tc+7
BxZgj60tzvXRDDu/9kujghanwt3z1IWmDZDqlUGutpDbze9M14IBNHruawYlfsVb+us8rkWXgwsV
26WSU44BBD0H/pVSdtLGbj2aqSqZtnPDtmDjoZ+lOuJGltiAojxxUFkJMAjPsVDE/BRKPwsG2QBw
GKAlqpZLvRE2fHDaRu0jmN72M5uhtwHxcI/mecigv1lrDRcNytbm95O15qAt4DCAOc5Ghgb4B+Nh
runAnLMbTpUp9jjG0Ir/LzO1ii9bIDzmmQ3gjWnBJAue9c4/UeLBeaARCzwIUCTkT4HPOhwDoSXa
C3f01p/ybm3vzNmNc7MeXB0JsFbv0zuGWnK+fc0mRrKxMSu0+Se5Wn3IBPC2BI8jzoqzAe1D2Dba
ahcF5gB4krJJhyxQpXkAFlOpsYagqIoU7NdPoPF61wCuoegNUJqLQdme571+VU1gnJjkHX+lf73V
IKSbeTfTHWOe4fEZXMKytOKDZOW9a+VYrFlWFzMLuvAV7xglrn9ff1lM5YFgyfLjzPozc5MGOGex
90g1ei1UMSvNkjbI7yBOT/Ix17bA2JgtM22wboxBPON0+hAw7funyqQCZlE5mrFIs0csUmoysbxb
ttVrHjjkBLEH/zxXu35mJmeoalM1NuBCq9chZzMLatYs69zDXGeJar+j4cve+B4Uofv0E4sT3sjB
hntgZrFNK/HrO9KLHotW36iifXo3a6v2gsg9PcN9may1pYtY3DkE43/J3jSdTmYPz+9JB984aAQj
AJE8oA/RR4/uD5lb90dV+dn7M7RFdNi8TaJxD3Px82iSFhCqheq+eI7ag3W7R++mUNWy3okBzDRA
ezY6MQM8au1BqlqI9pnDiUA/fStc7mvf0s9ecn+OOD4r2O/5h9jv1h6je8qfvfXPcrUG2c/hOBgd
65y1W+/8P7ZpP06sBXporWvm29mHG97nuQ5Q5ZkH/DS4AwbE6/E+NP5ZsTb962ytNrRzFpOGoQxD
TzBT7UZlLvNd9MSBv6T118jBVBTQpVbb88LjkRgIydGKQ6nK2WlL6lqMCmadm5lGM+7ylNAdPOCe
JkiNzN+lQwZpfl7/m3XkYkbIltLrsFukAJIXu+Kgfmaef36tmjXBFtTcCoJh8EqmoO0zIF3L81H4
TVSxdv2f0LFGX87va5fZlSracMDSc4alxRmAO6NfF4/cP37JyGaCGe3rVD+bpbitJEDhjV4SEfs1
d7AIGqOMvV5p2s9NMG0qeGZ/GD1u7C7625LHErvQkYDTJBQSV9NRg5wWkKeNjTIyN6DAj3Sim/xS
WeP/eq22m04gg+ZuWpVNu7Bl24z9Mb4B6/y51SHWk0+S8t75l8pg/7IgniM3bEbiBh34vyB/Qyln
AW/awPNMUsCivyPpZ9kPI/snHo3gMYaExXvGDzHo35YRpLvEgLHZ9u6zkgArIH6FtsAWseZtszfm
bZQB+zR2gYDS5bU7nRZeLJXPmDXg4xRo/c9s8nPC9zCMITZWBSM/AzTGHnu6H90w1xQd1C+ydlg6
mVB23u6aNb2C8Zu39XOTHDH60LznNYzZoM8tR8iiV+S9GDmRNMo4+L/T/3mPLWA0e3CGvWv0/uO9
C5tFPF0lH+YjC2OvLWNs2QB3bLWxUUsdDj7xjIX+XPGr3qWaaaMYdDbys3wdM475+FdOJNWzt/+1
/m8bzPsxbp7BLjGz5zYGFlty3sgee/QYoMM6gdGXWduilbTubVgcbLKzZGm+y/09gg9xDVXsmvf0
fyh4C3kZnAJTFTFjJsaW4bvOrdd7/4LRGGPbLSYk5GT0tDmHsw/jjGACreWCxvjTifCBRf9n3QHP
ZN7Ri4Bkl7OZ2aO0ZxfuSVTGZuTN81uX4Z0Z2bkbfb5I5A7gJaTs/IX+u40/sT2XYZAydubROjIY
FMYne91i0+J7N/ScxtdwgY4cu7MRYNy171O0w7fnvTmYNQGY8mK/yRG/KH3vnyseH9GsU4OZ4WAx
mi0UL8xetK2lZ/YhnXFBaZu0O45q+c8NdbbNbjxrd73AE9uuQwkbxFK2+RtmDRifw1ovnrAL7Naf
pmzXh1zXPIOxX5av+shG4du0QXN5457KxmFW2LRBhbCivQyc9NXeLKCdsez1PyvUpp/P70Nr+Zn9
bWyFv1L2/iv9DzsMC4jNhhomHyvWsXwEdEUUNIsfZGml8Zktyl8Te5nKv9mrS3UXm9/QKf0+awn7
bvNZzFrlmbF9zipS0Tb2JskYsz6MjrFyCsg8EKa53TCsbDasKPPKyAI6Njb9iTjFUR6hySr4SaLy
LEfKlmicMvvQOpctXjPv9o1gfF5NyPZvLZLAd5oUsG3CRU4vxtSNTO5yDqN4Pb35vOxHKH4Lvfh1
hrIWndsEdaal/4WHAU0BSAPQ9Nc7DFAIcvBelixMa6cZEfh2VM0zN4783GmTeuVbwmlwp+1waXHz
zmFbeDFDlgnEnvduDeq6edalxIvRhxfZy3xeIH1j2D1fsBicuLb5vPFhkk0I7UUrxkp+gST+wkDC
zLQifzADX7L2bEwXC4ldF2MUX/UhDLWZO2Atr/yDVz3x/PcwNB5efBb/zDiRPNfTQKHPPfNy1+Ey
b/HR1zE6z93DGDoP81nq3AahmWdcngiNw8V6NJ8X3u+rfu+FC5+WPPTsy+TCGjJG1yA1Pz5MYo61
/MSPTbBkPk+f0LYPPc3nRdcyM58+fJ7zHRf0BFNTLz1MIOFpPi/95vwXjD1YzrozPzOOvJHdEorF
AWXv9doK3/g4rBkwc55YNyYZ42k+z3+oOQAiRwdor+ztUlfFaX36DdzXwxl6hySOuwXs8q2kyRaE
ZgOLRblY+sXY61eVt/meNX7wPL39hFJA9+PwQQu3vH309M3YAjOTtHn+YUv4eVCdej1zze9RXt6v
rMCshcTeoEXafJYjv2V81zyTu/ks4zePvmr8FzjCn8EsNo6/2Y9PnPN57wgb/0o+kAHCY++YzzLu
1SQ/n+9fLDqReRb8NZfX9YsW9PkLb84EKHR3PdeAv9hHNT7wo31kEmTLkMPrfNXymdG5L9WVlu/C
iNbryu6Vbo5k3zhjas1VqnsAVknrBLRz0Sqv86bbA4BY/2Awxp5zIpMs5N5e+92ahNdL/WyTYH6B
vbeSEQZT4Vk/a47O2P7+bnV0NunhpdP6BpyXDubz88PoavvW1LJNxy11fZvUbPuQqcUX68BXsdVP
nIHzYpg9zeeZM5ukPn7kUtc0hRT249K++1MnmmfzsPmyJnHAe1iOknil9Wf/0nIl8N0mBZZ7N/bv
2yVgl4BdAnYJ2CVgl4AlATMzXXf+d/qHo9cBEK0FoXxEfYC/ejqHwPfsq52gp/vZZWWXgF0Cdgl8
HyUAinx/3WXmz3+tj06W6W6jg7y6SvV/rwtmZI/uub0/008Ajc54cQXpe/hkszApVOvakS/0m2M3
VFcDmDrjMQ4Ro/I4Hq1Q332A7NIt8K0lB76HIrDf0h+lBOxJgT/K12p/KLsE7BKwS8AugR+6BBwA
tPMGOyYpbQKQQVD+TbsyuA4untEKAcnUjr30Q3/D9vu3S+CPWQJU68G1CU1cAZAxYzimGwVgp+EJ
upwCohUXCLDpD1SJOTLbHxCWoIxsR0WlrWKUxHQVeMsPXKEg5p5+oI/1x7wY7c/2ChKwJwVeQUj2
r9glYJeAXQJ2Cdgl8IeWgCNzv0kbfqZ/ueEPfWX79ewSsEvALoE3lACA2L4waG01nzc81ffr54yE
BILttN98vl93Zr8buwTeRAL2pMCbSM/+W7sE7BKwS8AuAbsE7BKwS8AuAbsE7BKwS8AuAbsEfsAS
sCcFfsAvz37rdgnYJWCXgF0CdgnYJWCXgF0CdgnYJWCXgF0Cdgm8iQTsSYE3kZ79t3YJ2CVgl4Bd
AnYJ2CVgl4BdAnYJ2CVgl4BdAnYJ/IAlYE8K/IBfnv3W7RKwS8AuAbsE7BKwS8AuAbsE7BKwS8Au
AbsE7BJ4EwnYkwJvIj37b+0SsEvALgG7BOwSsEvALgG7BOwSsEvALgG7BOwS+AFLwJ4U+AG/PPut
2yVgl4BdAnYJ2CVgl4BdAnYJ2CVgl4BdAnYJ2CXwJhKwJwXeRHr23/6RSwAu3elR9XT0amDcSZ5B
AQry85CLwx/5Y/8QH29uTIOdveoZnIUqKEiBAR5yd7S/qB/iq1zynqdH1NfVp95hB3mFBivIx00u
diLoP5rXa38QuwQWS2BudkJj/f3q7JmQkw92N8xHnnZ1voxFMquZ8SH19fSpb9Zd3v7BCvdx1o9O
hHOTGu3vVXfvhGbd/RQS7i9PJ/345KBpTQz2q7tnVJNOXgoMC5CPm6PsJnQZW+pH8tUfRlIAAzHS
26WuviGNTc1pzmxpR3d5+GIsgnzly+K2H98DCcxNaby/G0M+oNHJGc2a9+TgJjdvfwUG+8nPw/kH
poRmpOFKnfq7L3SqxlM5H7yj93alKfyHsWu+BwviD3gLkw9V8tln+ujcuBLfeU/v7s1SkhfW/3t1
TGliqE8dnf0amWBtObvLEx3m7+8jH3enH9je+AMLdrhWl379hT676aSiv/ip3tqUqEi3P/A9/NFe
zgQQw+pjXY5PT2va01deXn4K8HHRYlU3NzWGfidBOjGl4Wk3efn4KzjITY4TBB+t3eodGdeMG8ka
Zxe5ujjLxS9QAd4k556KRGbHB9Tb26eekSk5ubjIadZZ7pzLP8hbHprUuNkjfWOamZ2WZvixs7f8
w4Is++G0jKhmbmpEg3096hiYlIOrj/wDuYY397eMc/zRvvLXfrA5zSLX4V7s/ADrYcZJbh7e8vEL
UICvu9yW84JecA9z462qPXNYf/Nxi3w27NfP/3K9Mtxf+6Z/fD+cm9B48zWd+P1X+mowXcX7f6J/
sy74if38oxDKTJfqL36lf/z4vibSt+oX/3KP8v1+jEmBYbWWHtdHv72tBp8ivfevDmh9rJdeaEKp
iYloSw4vUJhz05ocJvGEzz884yw3H3S+n7e87DHZD3Z7fe/Dm7npQfXU3tD5Uxd0ubxZgzgJc6zT
KYcIxRZu0e49q7UmzsOW+Zsb1WBXj7qpFrr4Biok0FvuznYP4A+yOpH9QP0dXT17VmdvP1TPOEGP
w6zGZ0MUnr5BOw+s1/oUf6q3f5C7+ZYuwkKb7Fbjvdu6UuIrl3XbNWYpSvvxvZPAzIDaa8p07cKw
xoq3adf09/BFzRF41V7RF1+cV0Vrn0bHnRWQtkZr9+7V9pwwBbp876T6/bmhyR61lJfqykUXee86
oLHZ78+t/fDvZEqTHeW69qsvdbaiST1+qYpdtU8/eytfKb4LibUR9VSf1/HffKHL3SPqdVutjbv3
64O94fLoqdKNj47obBW/JbnlMD2lKUeSwEVv6f2967Q+ZrHrOaPpnmpdO3ZMX1ysIcnvIi+/NBVy
rl07sxTnMKDOytP6zdfXVP6gC9EGKypzvba/u1NrUvzktQxhz400q/LSUf3qeI0GpqK0+sAB7d6R
p0TPZZzE/tWnJDCnmcEG1SDXzy/V6WHXpNxc45WUt1X7P1ytzOAnE0mvLb4pEk2NFbp+/j5VzZU6
QH7IfixHAuyzoRbV37umCz10V60cN+HdD+4wHSMmEdnTQ5LQO1CBof7yWU6uH7+0v6laty/d0eh0
mvZNWWHuj/CY0HDnfZVfu6nywECtH56maPecwyT9+omjhinreYcoNMBL5GOXPmbw+x9c0dmjJ3Wx
dk7OiVu1a/9mbc0PkOuPUMp/DI/8PU8KzGq2647uXDmpc3ea1DruIj83kxSY09TMuMbGJjRpKm4L
h8OQ2urKdKF0Wn7ZRdq1xkf25PIfaJn21ajqxgmdvlmn+mFnebKyXBwxTFModd7TBJ0DJpnzwzqI
0vyStWr/Ic3luCouK1Q+P6ikxg9L2m90tx4xyt6yVz/3HVVYQZSCXL+HL8rBWc5U0hxmZzRD1bWn
4q5q2kY0l1yk4jR7UuCF798vQYV7DujPYqXkjGA9ilXfaNHYf2yTgLGpk5rsLNf5w6d1fSBU6R3e
yliVrBhfP5sNnWzRg9LD+vu//6XOtLgoZEWkMrcZhU7SfQ47PUUigDU92E6gWF6umskIuVcEKDYq
SQUxcU8G83x/empYvfV3VVbaJYdMd4VvovnP5O9NVWp6SAN1l3XsbJccQ1bpnWQc2NexHea+ZsY0
0lGnexfLNBeYquz19qTAm616RzpBTMcGHZsm+dPXqId3W9RQE6iMXYVK+ZaSAo7eEUpYsV0f/pNs
ueUmKsyeMF3ea3PwlHdkntbs/VAzw3FKS/bRcmLp5V3su/u2A5Xo0eZqlZ2r11TmKuVHkBRYzuVc
QhRXtEXv/mWSxmIyFY0y+3GWCf0UkbFGe38eoFy3VKUFuj5/PVBg6Wu4qfMPp+SYvFM7/EkKPE/m
6OU5OrqmJjp0/9ZD3a/wlU98rtbbkwLLWaXfq+/+AZMCGJFZjDTW3bLvGH9HR1pml9yhfIcIcnaM
DGHZdd2p7pZj3tv6872btNJ3flMb54HWdHfaFW2nMOcfUmtDva5dnlSEa5LW5QTLy9dxPhjFGedi
jg6OL+iG4ZoztL3bbpDvO8ppqRs0zoZ5DvM9/m6+tzgEmcPpt87BtZb8/SstgXl5Wd07yOnRBYyj
w2f+/I5OL5sLsp1nxvYDmww42TNit56Jj/kO9+2IfB93DS26F/Osi9uJ5n83XHFd98oeajhhmz48
uEcrgxwftSY5OrrKxd1Dbo7zTuTi5+f3M1zXkqV1zaVlNsf3rPXz0vubX1Nm/fAx53MwDoz57dz8
u5p/eNt7evLfbLe28H3+0zFGK976QLkm9+TqKa9nYs35tWrk+9S9W+c368TI05LbC178gvzn5fDE
3jB/W/j3F7Vyvej0T8vPrNtH3+cezZqyluzz9qRR/vPPY20P3hNr78UG1uwnc++2FrRnnsl6J7ab
sN7TMzLi99basK1bB7M+nnjGBdmb74QoZeshxW7gRfGePJ/XkjK/d22v61l98Gjvmr3/PFnPEdTP
LOixV3i35p5NImDWTb6p2/Sn/8eNyHpazV/8T/ridqdGnWjZ5nzfjruyWM++is6bF+ji9WfpCSd0
17ML6tE+fLRvnqcnFvbhgs5//D0z/uW4sP4W1vbCvrOWilkL5l0v3ofRyt7zvlK2z8rRw0uerxQk
PLn+LL32xLpfasMY/WrTHS+0AU+tw0frfN5uvPw6r2QE/kBfcpFHTIG2/em7utTsqO5zTYp2bVRV
U7fWJPgplpLPZNt9NbV2aCiGwG8wRnv37NLBHTHyx/I5hBdp2/8+Wxume/Xw5Kc6/uVZlXtGariu
TyMPalVLUJLvvfAoTnKJKNSuXyQqLzNPX//6jEojt6owN14R1jsNVGTmWh3aeF/dIf4K2fiW/s2O
eAV4uMl1md68o18KbdP/VAkJ6frq332lZgICW0fsvK2bX2vGhr7w1E/ZqOf7Lct8XQt+hNGNT/sl
xn4Z3Wep2qds7lOXWayXl9ajS93Xor3xIl/nmXWODfCIU/qOf65/u5X7a72t4/+/06LpQ074TotK
NMsUhu3rj/WLvyKKd+vPsicZH/GQ51JlxwX5GX2y+B0aXYv8bHbjTXywFz3C6+jZeTtr7s3yY566
7/nnNz4DjiXP9NjePfYlnuc3L9KVCwm0gCytOUgylZqts4fnk+Npln80b1st27x4B5hzzevAp3Sm
eT/W/T397498nRf59Yvk+YS/Y9PLT/iVC2ZpclwjzfWqv3RL466Rit2UpohHtf55n2AJ38q2jswz
eCk0f6t+kkFikXjBk+j2VcoFT/s6z/pvi33ixT7TYpvzKj7SK2wTa73M+xuL/aUnXtmCzZo/n+Ur
2Wyo9Z5nneSbvEYHYos1OYe+93LX0iaU60wxDtBertvVk5r1Wqf8eB8Fk4mxFfXm162JIcz1nflb
9m69kxAn78Bj+uiih5wmp2361PJ55v3fl8YpryAH+1f+IBL47pMCZPqmxobU39Op9vYu9QyMasK0
gjl7yic8VvGJkYqgrPyEUaYlZbi7Vfcry1R+4bbu1vVryqVVrXUPVO1F9gol5xUUrohowGe85pf2
ZJ86GypUVl6muvoJDfi760xQg8L9nDXNBR3cfOQXEa/42AiFMGv8jGJgTKG7sUEPmzrVNzatGTAL
PANRQgkxig5yXzSLNaPx3lY133+olr5xTbt7yy+c88ZEKNiTzTfUpgc1D9UIsImjX6TiEuMUGeyx
7Faa2fE+7gdl2DqkCecwRSREKypwWiOdzapv6FQ/9zjnitMUm8AzhT6n9Xhcwx2NfL9dHf2jmkIZ
uPgAOMNvEiN8LcAV65gFC6CnSQ8fNqqVZ5rxDFJARIwS48MV6DSryb4G1dc2qGXQQc5BMYrnXiL9
MTSmtau3BXnXq/r8TZVUtKgnro33VKPabie5YpTd/bn3mEj54cU/KfM5TQ+2q+Vhg5q7BjUMVoSD
C9ntwAhFxplnXaS0uL+xrgY1NNAt0j+pOc9gBUTGcn8hCqAbYbyH+6trUNsQ1wyNV3JSsLxHu9T2
sFMDDl7ypS97dgiwmQEHeYTGKik+UJ7jHWp8UK/GfgAEwxOVnMD7W0iHTg6qr61etY3dGhhzkKuX
v4LCIxQexv097T3OgHfRVa/7DzsYmfBScFS84qK85TTGem9oVmv3kEYczBrhugmRCvV+FuxnesR8
t1FN7b0amuB9uPkyQxuluEhvOY93qqm5T8NOtNHGRys6ALks0zmWweToeMj7bVH7IP1z3gC1RSco
KSZQvo7ItvMh8mtS+6iL3MPjFB8fqXDu8/H7AvSpu0UPG1rU1jOCUSFgZI2EmnUUCWDNUtZllra9
VrP22tQ1ROuiq58Co+OoHPrLe7BN7c1tau5nJnU+K+Dk4iGP4ChFRkfNPyMWaLJXLeyzh60DmvUJ
URi/jwn1kdfCSNA067uzXjWs7+7BGRwfPwCpwhUegRO5pPqcZr02q7G+QU3szzl0gm8EzxAXrmA3
wvSBJuTQqObeGTkGRSvO7P0At0V7n/m5oXY11zepqWtI46xZuXFN3nl8LOdYsi1pVhNcs/lhk1q6
hjXuwlpgb0XHUfEI9GFue1DT39aI09yIRtqb9ACZdwxMkXZwkad/oPy8XOXh7io3/1AF+zPv9/T1
RrvV0dyoBubC+5iPcUA3e4fw/ElRgFMtriigJ7qpDNYjo74pObijU2OSWEdG/6Dnexp1/z5rfoDx
LfZhUmKo/Bi/aa1pUOvoDPvbvBRPufpFKzEtXCHIa6LroRqa29U5gj6bmqEDzE+hCfFKTAyUF2to
sK1O1Q+71DuKqL0Ceb9hvF+T9HmJfZweUAe6paG5S/2jbCp3KhgAUAbxPDPTHvINQncGcS+L9xKz
8b2t9XrYgp3ifmbmcCLRR9GJvK9gvrvUJeeG1IPdqG/soN1yUo4kpNwN1g3XmWWO3Yu5+uhA9P9y
9+wfxPwvXARHz8nVmuv3Ds5QZr6PYuPnVMc4QFNWjGIjZhjha1Vfi7OyC4s0POipSLxrzwUcDOu3
fKbb1NvjpD73jdq6L1FOpadUOlSnWw9XKiub8asFf9V83zNU8StWa21Xm6ovs2brmtWXlqYQ0W2A
7r1b56jIxDzt2prBGnxNYTg6y9WdNRMYoEBfLw2YKYbRXrVjLxqbu9U/wVr3DVVEHDY0yu9Z3W6C
j3HsSBM2t6WXdTQlZzf2T2iM4uJjFEEf8+tXX81eakIXNaoFvevmH0PyIkJhfsZOootGutReXYsf
Ma6pwGhsKO8hxOspfAaSiX3N7McmNXejW+bY4+BB+IFR4kWnlBsjlP6seX+6K584AM/ta8H2tXSo
izU7yTr3DghXZHysYkO9ll7nVA970BFmnfdYNjFEEfHYRG8wnXzZW65Obz6vPjuuUfRLPXaquW9G
LmAV+AbhP0SAH2UU+pNOoiYHW9TEHm/sA9fAN0ZJ2H0/l0F1ot9b2vs1NIU/EBiFDxeruBDPN3hX
T60/7nOkw+x5/CpwFaaoo3obTAUDbsss9ZxHsEL8eQ+LNz2jYwNtxndrV9cgPhbScnYPUHB0rBKi
uW/rHYE5g62oRYe2Dbtgo7nv6AB5TfSqs5m1AubH6Cz7Ltjo5lhF+OLPWbdmbCVjtrzTB82d6KE5
qxjl4MS6MjL0C1FIWKic0GE2fA9bwa29HtvaNqRp5sCDY7HNIewBExEA6trf1qDqhm4NzRJUR8cr
NiZY/i7GT2xUzf1WdbBmg7HHcdhzz3FwO5q4P/y4sTkPeVm2w+yPpUdJZsZY2w/wkdv7NETOx9HT
T74B/iT+wCJxwLcPC5GfAZJF//c+rNK9W3d0r75WY4E35XbCRR0k0a1nwEd3D+EeYqOUELDICaHr
ybLz+LPNvVOaw6/0DQ5TGD6c+0vnj3i3xsd+iA3FP5miUuLoDiZWRDQ+fhg+vm3Hz00MqPthvRqa
eCe02AeZNebnoNke2zvuHJ5C/wdaPlJClNmDr6nDTPw01Km21hZ88zGNzbjLH/lGx0Za/qptS+DX
4Es3NbZwzxOaIYnmG5mgmHD2/xT+Cvf5sIO4i6SIX2AoayHC1E2WTITOTgyqt4446naZaqtIAE6d
0uXxSHX7zgkoGXwDsFlC0FVJYQryRleZhBLy9fQ32Ej4glTN3F1mNDHcgnya8CnAF3PyZS0bHylM
IR6vkpJ5TVnZf/atSOA7TgqQVZzowSm8o5uXr+v6nSo1YrzGSCfPOXrKI7JQa7ft1L71aUoIAbBo
4ZEm+9VVc1HHP2dO8co93e8GkKhpSO13L1hBjKOjr8Jztmn3u7u0OTeMdiKU4kiLKq9f1sWrV1X9
YFwtIw800ICyYRhmanRcToHxSt1wSIf2EkiSFHjs4M1pEkXXWH5dF89d0/XKJnWOTmqaqp5naJIy
N27R5s3Fyo3259rmBgFZairXzS8P69idegIpd0WvOKCD7+3Qyshhtd86q1OnrulGdadGQgq0+uA7
emd7jlJITizHgZgj+Gi88aU+PnxbZZ1hii0u0sp8D822V6n01n21E2hNonTCU9dqw+at2l4cT6D+
+HXOTvWouapUty5d1IVbNWpA7pOzbGKfKCXmrNP2HWu0OjsKZ56Hmp3U0MMSXf7qmM6W1KjZjfbr
dW/rFwfWabVHjx7eOKNjp67oXjPXDF2rbW8d0ltb0xTjitPecE1nvjymU6evq7adua/6EXVWX9cJ
jJzDlKuC0zdq2zsHtGNVtGgesB0zAEA1len2tau6ePGOqlowDtNUAF29SBSlKjl/rTavL1RBCsG9
ERpGeKj+hi58dVLnb9WqzTNGQRve05/vX6EVrl2qu3ZWx05fVVkr2eCoTTr4k00qdqzWld98o2P3
nRSSH60QF4xgw5gcwjK1ek2KwmaZN715SRfKRuSetEX7/+SQ9hRxXqO8cQRb7p7UF9/cUHXrsIb6
nBWaAS7CTz/Q3nWxCl6s16Yx9vWXdfLz4zp7fULecSu0ejNghK4darpdqor6DrWN4XQlrtCGA/u1
n2vHYyytUxjj1VLB+7yGHEqYoe3AUSUYdweHISVdufE42PW3dKFyTB4Z+/QnP92jEJMUWO7Wxwns
r2Hu68hZXbhDBc43TmFbf6a/3pmjHMdWVVw+o5NnbqqSEV6HmE3a8/4+7V+doFAji9kBa//euYys
Sip5xwOsIxwfKoGx6au0fft6rS2II8Bjlnj+vuZwaNvKr+rSpavgS9SRyBnm+zh3WQXKTvaTR/ll
3Slv1AOe1YkSkAMjJjOToxpN2qptb3+ov9iYqHDzkGNmJvgr/fbTC2r3SlTuW3+tn+8pUnbg/Dqf
IpFXfU5ff3VZpQ09Gux1kl9ksbb+4qc6sDmZVsGnI7EpjTaW6vqRr/XNjfvqoTHaZf3P9KcHNmiL
f58e3Div02euqbR+UCPBK7Tx4CG9tyNL8V7mPLBQNFTq7tVLunzjru419miMjPiMW6jCEou1acsG
bV6TqqjFQbRxHh9yvSsXdPY8owKs8xGCCvfIFKVnxiqkuUoPh73kbVXl3zBqJCHQXVui6yeO69SN
Kj3AqZ7F2feNjJS/45hcXNGZm3+iQ5vylBawoIkIKnpqVVFyQ5cu3lBpbQvBOcrZkX0Yl6WcNeiV
tbnKAZDIJvEJ9MQNXf7imI7dbtSgIw7q1r/QX+xbo3We7aq4ck5nzt1UGftsKnqD9r6zUav92nTr
oy90pvq+6khkTrnnqmjzu/rLSBxVAvvRphJd+v3H+upOszrHmBn3WqU9v3hP75G485rqV0cZ+/Dw
DZW39GtswEMBsWu055/+VHvRJyHPsV4zA816UHJeZy5e05V7zLkzvuTkSxIigjWII9XUFafivVv0
zv5UhVuiwH4MNaru7k1dPH9VtytJ+JI8m54mmRKRorTVW7R1XZFWpATIY7ESx1nvqrysMyfP6fit
B2obnMTZAiwvgEDTa1INbpnK2rBH/2Jn8vcfnNQAk42MaXLGW6FJ6UoMn9Wdu9iZlWkaC57QA/R6
S3+ccgvC1XSXJP3YmEbHEN0jJ5tgvuKSrja0qi5yh97KjVWgR4WuHOvGwWxWf3rms+/LLUxxuenK
unxEd0tu6XpegnZ7k4y9cklnBwNVmJSqHP/lKrunv88s7eioxnB2ex7eVcnJYd19cEd3yxrVzcjD
bADOatY6bdsMNlEheuzR2BG6oqdeldcu6cr1W7pRaxKPY3I2iZ7oAq1cu57f5CotzHvZCX/bHU5q
uBmsmk9/q8/vTWnQb6d+/s/f1gcbIxDprKb661V19Jf65Hy57oZv1IpDP9P/cCBDMY8C/EmNtNXo
ztljOnke29FGQEYC3BOk/kCSUO548H6Fe7Rl725tjFq0aIcJWsrNOr+m2+V0fwzw3lnnXvg6aas2
a9PaYq1Mw+4uMjKzY+16WIIfcfaCLuIftcIA4u4erJjMJIIxoXc6NeSYQhD6ss6xl7xLgsCB+ms6
++VJHb/Xw4iVA4mBDK374EO9/VaBkp9IBE6TzK5QybHf6fcX0P3TqVrD+EJW4pS6bt9SGe+3g4hz
Cnufu/2ADu2i9TyUjsU3XU6zfWqrxFdiz1++U6OH/RSGHAHcDCbhGoi5JOE6l/223tm4SmvDbTp9
ZrhVD29f1ZUr13SZRFszCPAOeINO7qGKymAtbdqgNQXpSvaf1FjbXZ359HMdudkt3/gcFawtVJo7
18SXu01hpmuUjpmgPK3YyTNtz1J6sM2TnaMI0Vj6jT4/XqI7zVMAfZp3wfjmOH6YM2MEh97WT/48
XwnzS8HgDdSd+1y/++q66kioJB78a/3l7tUqDuJk01yv/Jw+/t0p3WxyUvr2P9E7v3hHWyIoDjSX
6uQnX6D/++VP0q5oTZ6SXfDxK+/oVi26dhxg6eACrdq1Twe3ZSk1aLHEsTe993Xv2jmdPImdqOvS
IBVsFxI/wQaImgKBm1O08j54WxsZTwoa71bLHXTBqcu6cr+NceFhCgR3KATZgAFmXGEZKuI6B4Kf
Sgqgi5pu6/LXX+t4KUU+dLmbV6qK9r6ntz/coCy6lpYKTee4XmvZDV29eFmXKkmwdI1odpo35QY+
WVKOijfg6xTnKCOMRPkE93blqL745IpuO5AYKcCnzg5W8ECNbtysUG3HsIZngxSfv1m7Dm5jxj5K
fssJAB6tU1gDDN7LZ7/WJ+fq1OGWpbVv/VSHSFYHeFCkm7fLo92VunL0E316HjvkFKsV7/+1/vpQ
sbz6a3T39Gf68hpFp65RkkSxSlt3UG//YoeKSbY9neieZV08KLmk82dvqqKZJIcpyN6kKOYxgw41
+5E4asU+vR0EvsMjJYHPME7ycnKYZEA/hZWrOn1iWi03b+tOTTNJT4plKWu148Be7V6Hb/fDAhZ7
U43xg/v9d54UmDFBUz8zglPeCo7LUVgKqooNPQdSfScKsu6bE7rgCmrlzkxFoj+szWqYBfwjlZie
o4HeQahERjUTlar0tDiF0gru4IBzSNU1xHtRFcuFDFYkBj4+XnVd4/JLBLwoK1DeLEAz7+jojQI2
2U7+92P324CxNKn66kVdu9WgDoUyx8Z1p5l/n6GlaQKE5Ac3dIZZ4Ln1K7QyDrRO2mZcfUMUmZal
7Gl3OV24oa7r53TOc0JdUY4a6+nWZHiyMqmitVL27W5rV2uPCQSpHi8jSWahJUclKyn5vm7dPKfP
7t7S7TXFWl0YS4Car8gZ5vnobuhquKWLvx/RxMQu7dyarhgycY5Ul1srbuj0pSo19HkoJKVQEam2
VnmD6DzRU6ZbF2nrcdmotekoF8YTXP2oiKXmKm90SDNk6u/cuagTTv3q9cFhoTo/G8nz+gH21QlY
WlMbyMMkIULJ7OJsx6fkq6CtGxABjHOwCXhMUIeUZ8CAiI5ROGnSx6ZhDLA1HOmvj+lcDdUNuiDi
shLk5mLeK1XVoUG1XvxaX3T1a+DAFm3KDGGOn/XBeohN4/5GBjXT1MD9XdBJR7LiON99/dNyjOb+
AjBm3cikkcA1nVZ/rzHVk0CpI7u6A8c8K71R1aVn9Nuq2wpL5j5jspQXc0sVDwkGr8UoKjpEa2NA
UHYmKApNVFrWtLzCB1R/7Ko6S8v0YN1WDa6KZV59UZaV0Qj3ADKn6YkqP/u1rnxcq+pmgiTa3GIj
0pXpT1a3jyo7iv2bk6FQAwXo7UJk7oxT0w4w3tGvdLKCyuRsoCIySdg4kRRgocxNdaj6xHl9c+W+
HgRs0FsbybIScL5WUdmRdjGqTXHpeRqia+cW7Xilty7o1CyGwmXc6qBwS8hRdiiVeaoRPaZbpjBe
oU4jGgDk8+y5ctV1OhEoYuxxuuhqtUDBJ7trVHYZ4Cmq0BuyooXPhVdEEunWGR3/6qpqxhzlEZ+l
fCcq78yhzk41qPzIXd0+eU99AdnK2VyE/InSqHIM15zWkY5alTYZdPP59ePsSwUjRalhN9T7oFJ1
JhM+nKcMkgKWfXVy47limTEfkWNwn5ou3lbz3Tu6X79NvWsSFbUoUWHTzDggVAajUnJY5zOqq72t
s+VXdNJ1UBP+6KPeMU2H8c78utXcSiKFinv3SLpiPehqabkLiGaJSh6OyyUsS8WRJKBMuyz6YKqv
VQ3Xz+ish6s2FyYphqSjgwmgG2/p3JdHdOHBgIYwxon8zdWNThGTLLh3Rieu31V70Cpt2oSD+FoO
w7y9oRNkovmGjp+8oqvVM/KmFbwYPSs6OlzcxtV67QaV13HVh+F8rsyeTwqYDoYHqrh0RuerBzTo
ZYx9nJJJzhmHa5Ygsec2iVIqOe77ipTCDKIzetANPRGTlqeCSSfVVd/QxbtXdMK5V8PeoyR82YeR
Gcr2JyFJJ0XXw24NFhvHN105k826daFf/XRehMXQiTSPTuwaECEasSQqxr3MfKdlJSk+AiwYo6Sd
3Kk6JSiVfege3s37vauWW6VUw/ZosPA5SYEJ2t4vHtfXX5eq0dFN/mk5imXTODO+5DLWBljhXR25
0q4JHO4d+0gKmLZMkM7rrgOQymx0q0O44gh8Y5ADRRqOCfXfB+BwZI6utLXKjp6v1tIh0Fl5Q6d+
e0kVkyQN0wsVg21ycXEC7xZk9irk0jasztAV+vnWH0BSwAQWBKOkZuUcEK3Y8AmNljxQS9ND1Xj3
qm5kUh3Y78LwaQ269lnt2U8cU71qLq1mv0wqeGWSosPp5ppJV/jQdfZkpR7uS6Ni/1SHHkGsf3S2
Nq0uVe25WsAHz8g3ukXXr/fJN2MzCYi45c0PL+l+8TzO2PnJByo5fQ/bt5rEZChFhSDFOmILSUb2
VV/UqS667/Sudhehx7BFk911JLku6/idHhKaScpZEc856I7huafH6UQsu6ALrOHZTcXKC3gdN8rY
3HBFJaIv6u7oq7sNqqzv14SVFCAQ8SDQTE5X/P0anW5/qAu1PforypYxbkZR0LHUVUnC/6w+vd7L
+0pTXjQ2g/XuRPKyn6JFxaUywDjpgFi/cz4pYKrD7aonWXYem9gwG6rovGBF4+tMocxnTccbifqr
x2fl7rFOBUkkb406H8N2XT+lzz+/rbohRwUQCEagy11d2B9jjbp3skx3b7gqqCBNMyixN1FjUETQ
WUiHHPqlmGT/cEOtqq5gdysb1bnv6aQA2AZeJN/isQ93m3T4k8/06+YHWvnWKuX6YxPy6ayjW7Cx
rUW3SGjPgFEQvTdREW+Cij5NsereOX3zNUFj/bR8Q9OUm4A+p8DlPsff6q7rGuCYPTNFKiqkC8bI
b5j9c+64vvwcuzTtgg3NUH4cjbJGvxHkDnSX6tyRfnzECb2/K0XBrIn4dDqlKgBZPPl7lRMMr1+d
rvTwJGXQIRk90K+22oe69/kZhfn7KWx3osjLWJ23vnwnNQsdxB515gIOFHsGqipVeuG+aqOaNPCn
+cYkWP6vI92IQXFxdFveUS1yvv2QSvPgHEkB/upE50NIrNITgvTw/h0111XqPhX3ddAumTWbiB+e
YO7veBX316INq9KVFpqsbCrmA9BIttY80N0vzimM6n8ooz/+1r6keoy/UHr6iOXTNBMwR+bEkFBg
f3pRuOu6T8dQOYnHRDmuZpzIJAWobPvShZuYkqiEDgeNJ1IwKk7CS5+3UfgHPol0jlmVo0WHsVP4
pdHJOcp3YAS5tkJ16Kb6O3Vqf3uD0kgKPBkMYwOYiW+4ekpHPruqO91z8p5jbD4AAE92SURBVEpM
phBI94uZlJggWTVQrRsn+vGPxvXu/iJl+Xnh25IUS6/SbWKAb35Dx8+KldpTSEEtNU/eUWMaYj22
1mBfL9GtEX5QGyKR33Jz//jmTq7e8sTGT3V2aiqhWD7EMb5OBpOFrpOeOflEBciXLroQEpSiy7ph
yFkFdGz4IVsnjyCFxZMYm6A7tKaKhO5DNd2qVPOhTcpeIing4EJnLZ2PCcl0ODPuOxNVpMxYX4W5
0r2EnnByDVM068Kf7PjjRyGwwcd0J14YbLmo6x312IdcJWHPswrp0Gh4oIYHJBXPeCkgOlTbUnwp
hCyprO3/+D2QwOtYs2XctmktCVBIQq5WBhfKL4AWYj9XG6Ugla37v/+v+uLYPd0rpwV1dYZCUUjW
ZnULUkTOLr0HMvdGAvGPrnZopOBdHTiwWllLWh3O5x2v/C27NdzjSNsYmAJb9+hffZBEteIFt0tG
tLsa437xlqomk1V4YAcVdyprCz/pKtHxz77R8bNndBEHJiKoQIm+rvJNLNJG86EFq+I//7/0j1/e
UNkNZ006rFRxwVaq3CuU5T+mjvsEiJ0uCjBB5FM+1MuE6OiHwtz8c0VnhYPxRKv70V7N+aRpBdQy
e4qiFGx25EyLqr74nT76/J7OXiJbSaLkQIav3BuYBzp6UTc7fBS9cbsOrSdZYCHkkcUeb1LtqU/1
m7Mosgk/+VBZWB/nLr/U9dppPgfX6cYXf6d/91UTwIGSRy6B+Iqt2lGUoQxvlCKKtXmc9iQHgkNH
qKJStugAn828p0/O3lNDMt0Y72wTTQ1LHrN9FTgzJ3WstE8O6Tu0d992bSPDalMSUxp6QDb9y6/0
ccl1HfegrS1wAx0YHvJP36Td5nNgjS5/9l/1775+qPKbs3LNzVNe8U5kkqYUzz4c0/tqnQ5WXLaz
fBkRWFEeoP7Uzdrzk7e0NZIs/H/4n/Tf/56KT+BKbf2LnVo9dESf/urX+iXjE9WdI8qNIingGaH4
Ve/wMfc0qsqg/1XHL7YTrJvEyvw84MLTuWBc03fqHSphYc0o7q5b6sApSV+5SzvW5SrVzNJO3KMa
+qn+3ZdNqqQcvyWTpIALGdnbOBhksocjV2nrru3aWoAhtHbkmPrrqJj813JdAdE1cc1BvfPWJq2J
p0rwsoWz1N+h9ArK2a4D5tO9Sqd//1/0/zwJ+NbNcSk3X3lr1mtlcaLiXLpVf6Ne3WS+vZyoWnRg
xA+f1bUGdwWshOljS7ZSrCqzcTi61HzuE/32WIm+OULrmG+QNiQyT9ZWohuXcZq6AbTZs1+H9jCD
bM1c8EwVJ3X47x/o1hyVgfx39NN/81d6O8M8EZ0jZ701dXlMwyTtZhaQpr2Yh9yZoDSyMMlfHNU1
fwyRme/lF5YaYHwmPI8OCj64X2r87O/09W9uaMh0OJg5Or71pA12lU/SWm0xn0OMIh3+/6r781bV
XJ+Vb162Mot2a+eKLGUFjKr1bjWjJa4KdDWUO22qIWC5eGtQU1lb9NZOkhkR81gmDiPqKzmsr46U
6ORhxlIwzsGFwfIcfqAqnOmjdKJ4ZG/X2/u2ai3G0Cqs9lfqztG/17+/hN5oGyehZxJir/Ni538z
i3NZRyfInUa1R+zTv/3LXVoXO9+NMtWi27+b05cnqtUf4k3Ca/5C0yQ+Kq7oq1M16gkv1IbdW7Q+
NUDe1hAzIzltt3T6Hz/XuWuML0WH6adrEhTpYfTEJvQEHygCSz/5f6v9SKPKr0/JNz9HqcW7tGYF
+9CnX40EHi0j3opMTVdc4Qpt6y2W//9yXuUOadq6g4QZSIHmTrwTc5XJ/t3UlaL1e/9UH+xIpQNp
/rmcghRV/I7+rNj8b+zFR3+rIx9V8t5tWBLPNEBiU3rLzukCo0wVc2na+NYebTO6zzofwU8TVafP
HHSvnWQl40zORucgu/76mzpy8o6qHRK1at9ubc1lbGpeTDP91br66WcEhyf0FSMiXn5ZyjAtY1Bd
GTaEExf7FfL+B/rFn20kGTLfWtp5R9e/dqDizb7xe7Ya8wZv+rv9qUkGmS4+l2DG1dg9qXd0iu6T
0boOKqAk9deazgrGddhr49b+WjjomOlrUkU5YxqzcdqSy/gRiUKH6DxtiL+tU+0PdK9pUOkBtJc+
vc7dScCs3qjc8q90+dTf6m/8/DU8kqgDVE6LbSADb3w4ONChgq1vZfzNNzhPWz48hK4lGWXOPFCn
ksO/p8JaQSdVkuIiGP2InVLLjSu68PVdNcds0K4dG7QhZb6tnmTZWP11XaDb6PDJSxpxIojbFy+/
ZTu57vgRVBf/PJHk8efq/dsxdMP83DB6yzUoXfkfJik2M0hdX3CPJhnwCC58ijnru7pVekcl0xv1
z94/qJ8UBNqqhtNdekDnxREqL1WR2PeFIJi90d+AP3P6lm4NR2rV2/u1IwcZzPtTk71VKvn6G524
dkJHIkJp4SbZQaKvr/amrn5zWRWjScqm0vc+DBFRlm0n6VdxSp92wjyBH9RmwJ/NbP+bvC0nbwWm
bdUB8zFJ1dJj+nz8KJ2LS4EUMxpFp+mG9wiECY5nyj7SJRM0Z67Tzs2FyqUlyJFesPqzv9W//2U9
1el6dWyh5d7ttSyo6Re3uvquHb6s67WOCt31J/pwe6Fywmwu9NwQCPdHSXyfZNzVB/wkqyjCKEMZ
3ZCHr6h8OF5Zh/brvX35SlqAzx+mFf/6MX2G7Sg/f5yEWITeX7FKB/88jqBzWv/hPx7XVd9YxTAT
v3dnAfuHa020qfzj3+i3f1urBjqamneSFDCjAl5RSl7zPp/FL2BaPecP69f9JepysrxuawkZzevs
z/3s+1BxMEL5HT6lY8hlBvwfy7Ky/2OL9uuvGUtN8fsHneim0ASo5CyjXz4J6/T2n8coy2dS/8t/
OaOSIEb6Crdr//Y8vstvxyko/ebX+t2v6aIwHVfbSQoY55dC1UMKOV9dfKBmjwKYKg5pS364bQ/i
Y/XdPaWvxmd1rsydUZT5VeQRpvh1u3VoclLOo7c0seWgtv3VZmW8bI2ZZCN7a4f58N2x0q915D8e
VZWHRZL9DPvA3Cw2HD13+fB5lbRgs3a9pZ+8vVI5wfM9/5Odarh5Qke/Jul+/YSORQTKZ0uGErb/
RBF5pJW9ZlR/fIzRq3Tlbd2ndXkRCjSPcP+oPv7oI33Zxh5p3K7iMF9R/1zmQUEnMkfrdhxS70yk
Hibv1cbNmUoeK9fl04f1+Q1HJR06pF/sydOmnSRAJkkCTK3RwZXpSjCt+h45WnWQD1edpFv03H/9
TFcZt2Ggdkn8Dyc/8EI27QV/ASDkO5OaKfrn+mfrw5T6snE9zu/AmO/UFGOAdBFF58BGsn0lhTr+
0HRBx3/39/pNfbVuNvQrlyQDTLX243sqgWUv0eU9B1kuZm5DQlgsgwTI16+o3bRbkcmjFE91kHEC
jIsDXQN0Iy5JFWJQ66dQClMTtNRRtXo+DKZlEemENxV0vs+8sRn5fdEx14djd4s2pvu0mgVRlay4
qjMNBhwD1YGidXYeZ364VUN1g3oQnqaGLVmK9oVT+dFJaZOdoXJOW+E0s7XZu/Zqbx4o4lQDRY0j
LCkfB8MMJb1uJXCC8S6ckFmqvEXrteNP9mmvQVZfcKycopS2dZ22DPeo/HIbLZFdWp/MtRqY47xa
o3bPaPm20J57uloutDrPGvRzWoknwXdofNAGzUut6lbkawXOLp1ItsPo72HaLZnRnqP6VbRjt/Zm
4yRYttRfUfkFCjOtHgbAZ5Fwp4jkJpD9JNeZMHPxS276SfXfKVFFBa2BJBL24phsIWp+nDUkk04r
9tYPp5nFP057Xpkqc5LIkifQAv34YmO0uY4NzMk1npbeHbu0CzRyc38O5MxjCgrECCz818zPMx89
48MsZkqcoozDziyrB9ndgEIPpeUlMZPHOacwdLSuOVIJn6RqQvF3PuJcuJ4ZJaHSxCO7zgPdLR2/
gYMx4q+whO1a9/47tGkzQrCwUNgDfoFU+hnpcDKz02ZdNpN9L6tSa2ixNu/Zg5PKXNqjZyQJkrxe
e9+t092pqzrK90cZgTEzzi9GxHqF3cnFx4aZ5R8kIMtYrXV7thEkB4pxPo5gJa7wl1myDs4jaiut
YKSmUi2uEXJuL1XJufu6Q7VqzgImoiIxRIW8kaD6fpXq1q+kk8ZJE3fK1dA2pcC1m7RxS56SHoEw
mMTORu3+2Zhayz9VJfOJk1TpZkhzUFvVJOc1YHsWfuhTAp6m4mFm+8x1rb8v+Zh0s6BHpumGsQAr
jZF6oTioXIwzI0kXzAxdEnnbDmhffph8LYcExyAnX6G8dAeSI+MNjKKcu6cHnVTEwqvojmjXfQuk
yawVsv+jYJF0dKnqfqVSiou1oTBIjvfLVX2ngZGIndq5e7PWkRB4hHPgn6ac/W/rUMlDjZca7I03
BRrknt08qb7TOjsAvkXVXfmMMjqFo+fmSatvbL4Kt0RoIjVSYXQxWMfAQz0oo5Ohtk+hji20+p3S
iXvsF9MCYoCbmIHt6aNLpaNNTeWMRmTHkhRYZC5wkifGkA1dOg5ZRk/s0Q5rHxqpgzqPnog08rP0
Bv8WmKZVsZfUXkGQXdaqxI0kGczpeu+orKZdtbOp2osTGvJcn9208yMn3u+zqBzzL5qKf+WZMj3s
9lcaIzA71qUo6tH5cIRiclW8bULvgR3gm0oXmXnVVBNbKm7qXGWHJoK8lVR+UWfqrJyStY6cnKaY
BX6I3TKtpQ+0Oj+FpIDZ2Lw3kiRufszb02Z+7x5BWZiP3JA5bhydaiu0A5wMT3BPfjBMCSbhiQKc
m2MtMQfrle2jjl+f0rWaSa3ef1C70sHNaGmygZLainW2w8xLN1bpZpubBqKo3IaT2OM8Do7gBoBC
7XKhWyX3WrQ5GRwNaxRn8UG3T1SmNhRfomMPlqGqZKX+yU+UQdfUQmLmFbTaC76C80uS0cElXKmb
aen++dvaj41+ZJ5glynYvVuDg9/o9yfoaLjPOEPguOpu0U13o4FOuBi6zaj63SWxgF/gAPibIzgZ
7b09ul9KEjioXm1UQ8n9vN7BPpo0jrRZbs+MEGH/sanGJj35J+7BlWou7TReHWB41FBY8YySt6ur
XB3RSwGJyli/RcFBjGUujAoxxtlWc0uXK5vV4Oyu1KpLOvPABK4GTJe9YQKjlkZLf9RXPFDRqkLl
uXWpgSLA3VovpXywXXt2Zyrq0Wy0j0JI0u95v1G1D6/optU+RtL89aSwxK/AMsKXmJoHKnuuLoeF
amQEwGmvldrJqMRbb61UJsbMZkq9FYDdNaN8rcyHT1hB72seZhyztkwXwbpwSdqoPzlEtXhRhdrB
J17pa3Zqr3ukIl1jFU12dY4u1NqSWkafgpT1M1q2D2EPF7dOe8cqZf0evTPFvPfx+7pMBX1FPAnz
cPTqJF0ZaYXauu1DvbOJPbEwGsr4WUAESbuAavVNM8JjfOLnrj18YHzhaWOoHiNVLxIAe4MxkykL
5PbpNcbrRP7GLpvuIQvkd+ElMDc0QqdYYOZK7djxM72zPkHJC73xdLgGMMse7ndfQ4YhzCT4sfVT
XbBTlVeqwT1N2VsP6ACJ18dj9uibpJVav29a3rGDsCYsQrs3M/XG/ycpMTlp4HmXe5hZeJ7DWudL
j7fMgOlUf7tKd+57KHozoHk/X6OsxbbONVRxK7bpIImq0a/o2OWdptKhkpCO/PBFR70Yjd2Qo0P7
sfWMMz9qRvEz2FwBjEdSBwDXBveSjo7l3r+RH7StYYHgJ7iqCTrYh4zx5jo/UOVVkmbHXZSbyhjn
VvBIWlrBPBpVeBJ4OWHPghhMsxYmjH43oKZG3zzvVrhRo3cm6bCeA+jx5eihBsiQcatpfI7o7dq7
cbf+8kAhnZrzF/APUnhihDwZ4+gfY028NI57DRnZf/KtSeB1lugyLs7CYjau9g7z4MxMl5Q3AILC
/DAtMaD/aRSQsB6XeGUW4EgZ9NGnzjxnFjEbegpncMos0ucGmws/xGnk+zO01s/M//ZFu3ByjMpS
I0BUDxrUDhDHWFe5SlFAFsW5iS1My/PIMLEwowqAsLgZxNVF9zg1TiA45kngv0Jx2zZoE3ND8yNe
89+iNcrM7L/2QRXRBC7ObHhagDLjHmf2F07pYO4NECLfYeb6Wgb4vjvtjcz1dHbpPvPgIxMPVU11
cMpQAlqsArizgPMNjpO0SAb0DOAUkwN5dAwNaxRP3jtnhTK3bNTKjHAyt4v+jgNhVdieOADIMZRU
xmk3CpiML5BbS1S1R9X5oBusJzclMD+akUhb1TPnYs6bFu7soCvEze0a7OhR72w835tfH9zfOLPM
PnkZKt7OrGU6LflL3p+hQ7SNTDhZNHDcsCUDZ9oOafej8mL9m0kEGKNn5iGX1JI4fjyXNfLy3PeI
tscAGkPuTAIgIJAKzROt6zbmA6d5+fMf+NHDGhkYAesCBR5Kpf0ZORBshocrLMxfTl20erP+TWf3
m/Vn2q47QYuYX2GO1u9YT5t50JNz0gS5zlbcOKLR/k7d7+rWQ9omB6YBtCJxMGWSAmZ78BCuBMz9
/QARxQI452nkR7s0LbBTA+6AJ9EaS5v/E48Fd3kg7ZM5BEojpvJAUmCERJMv2T6zz20MGc8eJhh8
pl35ma/hXBuKrAV2k5ftOfb+GAvfLaNYWRs3aX0eHUKL1xE6ytlKlIxopr+D+cJe3W/i+W4w517K
sjHt5eZ2rf2ALht2UwDUPYEAn7poHFAuRjAa55QAQnuyAWN64n7Yh744UgB1JTUPWGMzr0W5tnBO
JxwxuhH21ZDpOX9Llw7TJhwJwKA77fdeOAcmoeUTqSQztznvlM4O96q3s0GdcEAP3evTBC/XUAtZ
frOFik2rN8HzGKCAkeA+uDxlKWZGR3hKqEdzV6oA3bceuk4LpGrhMHJ5IsAPUhIt/34PwGO5BIBa
JuBpzNwO3inV/Y5+zeRvs4A1n4/HxD40ARLPsnSLMklP0y5cjqM2mqCs5BgwMZ7e0IBZpa3Th6HU
NN2o1HKvs+MD6gU0rBvu9Z7eXl3uL2d0x3YdywZYcgBjgvnfYBDw3am4WX+iQpxAu+hbza36BIac
E5+RZMEB9HJnpha5u7I4vEIiCZAZhfiOrezLlvpy/m6hi7Nr3YIARY0DeK7xI31dDvjrW8lK5/14
dZqEiUG0XpS8Yxa3mVGK0vZm9TgG68bJWTVYG5+5+Vqq3Pd6SfIScBPcxIF6/cz7cwhUDEm45Mhq
JYGfs7E4VfFQ2307h0HxR+fzvlISwWmB+vNprCtHwHNjo0IUO1qpoY5uwBIn1NHTpeqWFnmWnlfP
fdJQgBUbv8DG3mNqGtPgoYQqMpCOofkEyYuTkM95GvygCYNNspQCwNG2/JlHoxoL+hGMmoSVWrcS
gLfmK6o+00frOj6CN51kbDp3k+F1oH0+JEzgBtqOCUbBOsFL6gNcbnhI176pYDwGv8p0hpjkl3EM
GCGYdKZTAvvo64rnPtKttrYxNU4kgG8DmNvT+wl9HhqXDNgsQLUtJAAtdqBv6TBymTDJ4IXuiaXP
O0fxZxxa6lnAfP0B9Qzk2R+vL3w5K6FCocQy7q/1hoyWoMMS4NLeDlUB1BxH91MGCYEnTTYYVNFF
WhvIqBRggF6eFLpaSTh2TKvTOVXrUxhpWGKW2sEVgEdGGcOvd+pqHe3gfSNSiPF3Z5meouINSGaA
zyI7aq0Ho5/nGVxeJHAzVoYum36eDM37R8bTKP1nLS9FOK5lfvsYLMgmwlkSCfwMXwc8HHwdf2Tx
qKbEb4yvY+6P/7Mls7ArY73t6u/qk3/EGqVkRT4OnBdeK6Mgceu3K6SAE3s9phKfZZ9ZyWCCWbMX
rMLgcpo9TPIan35yyWc0F8dnABumrWNM7XMJWsV6ziQh8Iw7BrVhCOMLkSEPGbfrUXtrv8SI6rRJ
quAvOwEu608ntDXdYx3IzVzTsDnxee2lZ50LWxoQhu3211wtII13a9UZARNMTxug7d6AjFKQqG7R
LGOK461QZxd5KsQYt6eOSYRn5PDSPTov8xnkPkfQxRJ6+WE6OClauXj5KdjoHYzeIxmaaxo5MMa1
IJqXn9D+jf9WEvhO3ZVpZqlrz5zQ8esP1Ogeraxdq22tZ6ZyTktfz82vdZl5VkdT4bMU11JK+yXl
/sWSMzQrRgcx3+KIcXR+SU+uUThMiioInvC4dWSYY8nGYWAeX3E+Iw8QSjjomXHM1S52VQzVx+wM
ID1+fooMY85mOcrqld74fHbWOAXWZ6kfEdLyHI60qznToeBo2AIADnL3Z+45M0ebV4ZQBWYO8tFv
TbWD6oxnoMKiQJyN938y0cy5ZomG3EJAeycgfSIh8Nx7nr8/Sxe++H1Z1IAmoDLL4Ln5EkOkYhwv
0yZsu+ijlWHeGZlT91AA3sIIvp+7ghdkZ0tU2J7fVMJ4PpSjMXhWAGRRP/FHyylbqo17ng7Gojh6
sYNiZkRmSUaNAboyyrkfd0AYjAquZ6gRzXfMdbn/QIKIuUba2MtqSYLQjrY4cpzsAtyphNn/BxrB
0XAmUn++vF5pMdm+ZDLFLqwPg9KP5VgoHD97BtMxQ4u1d6rysvO0ehWjDa4Y5sXOK3gKbiAoh0bA
WEAV0MNxADmbTgLW23MckTnjUC9aJtYSMHKlG2MOD8KJ6NOWlHh8uLrg7JovWjRGL3nWV3lP5hSG
7stUyHgPoVQ2GHV/zmECdm7IOU4pRQlasxuATTebs/R4S5nZfRCKg0ElT4kg2JwFMNIYU3MNQy01
H2E+dQWj78zac3zZunrZI5vHcQ5VxuptcgbT437nkEYnAAU188IkXqb6SRLU0vYNvojTPi86OsA3
MfImgeWbRdvhShJsJHBM++jCM1k0qC4wsATDDhPLjOFCy+vCvZg+cwJmt1BmBsMCBI7qSw72LLPC
yaHM/F8vI8ECtgE4DmW3e9Q95K+8Alp7aY99kdtuU4PP24dmvxtqK/MEL1gnzN4GhTy+VRMYATgg
98RVWg9F3r54L5KAiyue2AD+bsADQ2NgqlhoZeDxHQJgFNmxX2/FNKkLLJNRk7g2XUVjIFIPdKuh
vF09/Q7MCa9SOoBbLxXRy0T4nf59Xq4W/R5734UEEvgQa/MSdcM7RbE5gGiyCcfo8LP2+KOkAGsM
BppKqpwDoNP3Ejx/+Q/X5vcr5wFp/H4N2fyxUpW3blBBZLge4Vw+eh5kDNZHYECSEr28qW4DQvwm
ufSn99n8Xn1epdD2dbpkWHzW6jGUlE7gBqWGau3PVirBVITnk6HWV03CkM4cH99IRcfHKfoNGrhs
NsVcG9sNHsUTawRsJTfGMIzusyiaFzanoX8jII9IWUU3WbBqQPjuo3prAqeZGaq4PR3qBdOjqn1G
o45BOlgURJcbitPY/XiwkaJX689z3KzK+XyR2JYIBLXcwxewNNZ5Sij6oM9mJ80ssUVR/Mz6s/2b
df/m/y/DVXv5Urbp10f7/YXnNrIhUAXrgbrmooPnM8GkWa9vtJ5MdtBUV/kYn8TozqUeAEwHDxIz
ti6UaSrlNrplK6nzos1v0e0uUELbzmyeftYkucfoIlhcWTX701RyTTLnFSLNF6dBbH6b1UjgSjLl
CcMLijwJTncqQCbZYxvXWjhsb93c3yQgngaV/lEmxtD1mkKLlSibv7qVHMCn4zPfULKE9LD9nj7y
eZo2yLhmZpECSGh8IOp0r3E8fs5n16jZ9Dyf2TtGFi+K360Mh22tP3aDzLkNSj8FPKtquahtw5zT
4JMZG/8ad/34JyRdvCiy+IcrHfDlybv4hYaOxyNNa+nsnKNz6cGlUvxOBmamYrXa12ceQPfJi1rP
vmA/X7Sf5umrjcPpzLp4Jb/TdnIrATSFHAwG7SOXaj6hY96jNXz6urm5N5Kh/cevKoHX2mKvdvJZ
6LGY+z5RppruUGX9i3cBXIp7PK8/N6CqiVoyqRXqBcXS0xdky6dO7OBGG6Y39FhepLt9qQ77vezK
JttN8EWLytTkHIZ7cXRB6xEgehYFCgbdk4yyizez1glk4KCoCs7apC1bUxW91CWomA1NG4dzYSbL
9iU3D5xhLwypAUsxYH0vu71l/x1ANR7JeRxwkIezulmRoZUE+mGLBDXdSoUKVNpx0EgTk5nNB+DQ
GZCiRICephhfWLlvLbNeS1yYtqDRMdqDzHzu4j/7kJ32ptI1SFDAANTTAdrSjwDOAu/IhwqDF7/3
pey9tCw8FZYaJq/yByDpVoLyna7QbFqsnlASZP5bQLKFhq/BO1zrDWDVYm5xc37DsTqCE8X94Uc9
5zDPZToAeD8eoDEbmVkOGO/RvH/WFf6WlQyYM5UEOI88aQd+9nmh6SJj7+0xAbcrFXHDqvDMFc1o
AqjUZM49+fhg3J6s/HMtH7AemI30MllwU8gBhDC1oFCpD26SODuir4a7tJKuhwDOPzcFem7zHV39
8pQulkABuB7sBFOx/BaUqQPPbckPI+uE/J6/Zn2gqWKWLDxIw/HZKtixWcWLgqlHIqC6NAat1azV
M+elMJCr3ZhBrqmsUU0O3OMACT56RTO03Zbf0JXqZtUFA2wHR52lgCyngRGCYQJZsikU9h4fM4Af
PnyoujYqGjFUxOnTXbqGCHI9a9+H9zgOTZY/M+MvFBfBhx9ycCMJ4QSd1vPrklwPY5wcHiDHsBRl
bnhL22OXOvMMeImjVNrMMIQTgDpB0B1Og8hcAwNFqpKyAhZVwTGcHbBv3AXorytEeYZKkTb/1z1m
mXlsAqejdBQKoqxt2ruJauxonwboMjKOznTjOR377LR+/Q0AmylpyiIp4O8PbVYY76edClYBv+Hl
LtWFapzSEVDA3UxCC4ku3KUTFQE/9IQb1FnGcXgl3ecOYFtapO7XAU52766iQXC+0kWgGQqyM/SY
L57LZg6Rd+btDjUghsDvGXkZxymMDiQXEmmMT92pVlY47brYlUWLifbKXnUAiOjMfgwKZk4cOqwg
wKzCvb0Un7beotJbkgGPPUkHMpWgeRkMMkpzu0LH+2KZjYUFh5b50cFB7IsBKIQasuGCfv0/n9Wd
Djclr8pRQpDfU3EB8jTdclRth0aYdTXUtn6eFubD66+E111BZg+aFmxAFKEw83Cj24GEmWtQplZ9
+Jf6V0OMdTBaQ12MeVF0GZ1GLt5mr5nrQYfV3qrq3lTQuVcoCQC/GdMqO69XnWlp31jUTCfGhBob
mHllBvfZpACnAYjXn/frY3So0c1v8ChP/hQfAmAhN6dO1d67Jd/STVpF987itTYN7WXVg1bVA7C4
KYpnDRpTBEnx1Bg3xRfv0X5wepaahpul62oUJhZjo5dO+73CQ5hgmxbp2RGCKzrsnsh5joAldB86
z64JgDZ96UKaV4yzgOneu0S7c68mM7Zp7SpQ2KFv7QXkcQqnfBJQtLtff66/oTtzyCdbm0kKBEPJ
GRgWJ04DlsFKbXwnxeqUeeagJX1gFN/JREemcEAbcgQoEjWgsd/PCjHF0ccHYLj1ZaXcR6t6AvLl
BSXf0lSwryCHp78ChoU/wY0Ptnucven9HN/PAcA8P/w4L5iLvPHFDITP4wObjC0w/qMHrBq+BLmv
d/CO8PUiQiKUOVzOrHWpbuyM0yoShE840OPQHvePMBCLrKkae0IBGx3pqjCANitgKkiPBeTS/6nd
PQYdZ3m56nuGFZgaAa4WT+A0RMLJC1+BYg90jzQePT7gkvNjrxg7N4v+Zau8/jE/izdD1mF4YL5D
duFsAKn2Akhc2zCgfk9sBrppodHBETn7WfdnaC/xZxbdn8Oi+3Pk/mxLlrFN6IZDQgPBSoJu9Fa9
tkGJDO7oomOSSa4eKKDZAbSb+/uQiDW5GKOa0DFTJLtGqeyw3Z445vDNB9CfcySwfZghdX7aSXIA
B8fIy9MATxND+C8KVq0z4UO6g10DjXSkY50aq8DjWh2jFVDbPPGmJqH2gyL9flsPIw4roE42C5Ln
90M3mM7TOUbHLN7MhYNfc13jD3uyfo3/h1p9zYNzOfkrgm6mVP+rusAI3tHWVCgWYWBLdNfowzrV
n+/WnZh02HJyFRTAmlniSr7sE19P3hvjYT7+L9irVhISf2YcfU+ew9YxuXDQQUL39Ci6ytH41Z4G
RBzbCxWqF/rbgy4LT/zlJ2yoiQtYL55gLzj5+j25nl9TIvaffXcS+A6TAraq6JzhCsZqOk9SEeqG
PBA6kUkoWmruQhly4rJuPpiSf9KgBvoG1Q/fpZ9pOwHoaoZs0yjtMT09feodGNBYX6e6OnqhlrO5
po5UD92tYG/RnJADQQOZ2hBQzoeY6S1/gAYIJShhgY/3wxUOL2vTNNyhydBsMUcdEAjIEYBGoYCM
lH35tY5yze1FkVCHcH6TkTXcr/UVqoF+bJiZ2PS8fGWEugO6QuBKNXi4s1vdfSjNQebMyM539QRa
4zcOVFBduTcPE1S/UYqQQJC2djcHeOyr6nXiGMivse7aBDiMqULPTbQzQ3tD5yuZ4U5JhkoIZUoQ
7ABHbFb6PR2uOqmPjsxBo5eqOLAQDHLyLPc+Ajd4dUkjiPdQuazJV1Yq86PmmaDumuiAh5hnGhzo
Uz/P1N5JYGFx3pq2RIIAuhGME2QdpnJrHFuqFF0o9L4B3iOztz1dXeqgndwgtzo642DCae1O4GVS
BYE5xcqGW7jqQokuHgERfHSdiuNx9g3MBLPjEwAX3Tt1DgRYR/kU5SqDdk9fqn+zk+AIjPP39g71
9eFI98/fX/cEE8zz97dwHev+TFcAlQPQ9gcGMdSGB9PM+c0wrzc8AJrsMCMUs4owWVEcfuPQD46Q
7Z32oRWR7zArNm7anuZGea+gpg8ymtHbxRoMZqyEINKV6qKRB/c9O0UQAP91Ty9t9tCS9fbgoA37
KgCF6WrAV8Z6aNsEVZ917MMsaicOQBBcvNFZG7W/fUgnbtTo3tE6lZ9DWZtZNjLvjqxzTbKGDKIs
bcumrddKxr5WxGBmB5Efxt/Ir9e8X9rH+3vbYGsw4HeGtoj9BPm77T2Zg7GG+ASAM2/q49rT+vxL
kmqbspU8PxJg0KrNnqotYaZ2CF5zOm3y0gG5yYNCCdqq6tuADQZiCDZlKREKRtAGCJSgr/z0iE6X
12tu7UaszXyLGWvLm0qs92iVqsoqdIeRlYA4MxdKyyvzqsePw2Zweww6Ot4bMh4miDYc6Q6svTHj
TNN5MkvnUXsnawL2inFk3NPWiTFm/5kqMM/lZukJ1hEZ/XFTUUIO5n0NgpY8QFsoXcM4lMjBoOia
dfRonfPfYaJYtcZD9wEfO/IZ1KnboVYM97D2tm09gdxcQVtugxQEdWhBYYyCU6EuKqzSlRMAdR1n
LThApQgHnzMVoRnm+WvPHdXxSyS/ZnAw2Df98F17M6tugs5lH1Owbtz8Qr++ijO/bkb/4iDOZ6gJ
sGxJ0qnAEAXDUx04AB3iwjgTc8dJSdA8XrmhW0cd5DG1UeuSARq0IhwSq6zn7qYa3WqgAuefrs2r
YVCBC9rMGBrdNwbbSHcv66jP7EPYSLoDTQqOxCl6AufLWkfPPIq3InKh+Gut1sVLIJpfh90hkMTY
mlzFQkHwpDHinUJVOUaiaMJUqnC1O3hf/UMDcu3pUVerF8k9M+Jhup48aJvm3UFxl7wpR4kd52GK
OK6THuCb5EP9aNaKqSQONej+PcCOqlwVs3KltmxOVDCo5JHJ2Vp57pTKznyp33ju1LasMNhBTLBm
9s2g+lqhbQQgqdWJNuA1mYCL4d2NAsR64TP9hzNBavzJIXnt5xkIlP3xxuboHnM1/OpBwRph1MmC
mHnm4L30AEB19BudKRuTe/oWqKvWWOf+thrnl7OOTBv2GDpu2Oh9L1h3COKjfNBRK/Zq/5yhSXWl
bZhEE/Z4gO/NDLI+eA/eQ6D0X4fdwjUeSrgD+icgvFt7c+HiRk88BFAV2tpfXripklhazgEY8+Y7
4OVb+3HEUCEOsx8ZZemFare7CxpXKK+CjD7CH3hu3vdlD2gCZMBTegfwPXphnrnZqZ5oAHMDttAt
gw6hg2dmGF115hyJymF5FG9UagodUf7jSs0NVvnDWzrx+yNy3AmbTLKP5ceYStg0bfUdDQ2qrRiS
UxTI/9tyFUcE8xo7F6wDdD7l0YgZqGKrSBQ2BirHsJeQDO2AKefol2d0/X4IAQH2o2sY6jYTnBkG
H2gwf3tZZRmz+ot3t2tHEoGvL4ltc38AdAax34PwfbxACbeS/q7Q3CZmqeDCCd249ol+FXVAW1nn
IZZeZJ2PEwS2gVIPN32jElW8IlcrYmBiyktWHrgCZy9d0DE6ONxWhtl0BACdfQ9gZzhyQpdu92l2
xTp0GGsDMElv/J7lqzGTJGOP4kuMM04xje4fwY72YZf76brpZIywhz3paPwQAjx30z5h2SDWjNFB
g9wD427dzFT7YJc9GJGcHuceuzkHiP0DU4yFoOSHo6EVpZKw7PtzBtQ2KUsb0mp0pOK6vvwiWI6b
05VEe6gTfu7MEDS8NVCwwVvfC23z1lX5yg2NURoAyIXVx3Xx1EkdxZeb3ZCgMN4Jg6nIvAt8HeiM
L4JZ4hSvdYC5xvhAodnLcxifo5/RMmTQ1UPxCrRqF9gyxgeRQ28fz2R0bxf+54iG2See6MJlu5rI
0sUb8E+ivpGaajBwEtUOS5cLQ/ATUP9d/uaYDl+s1mAW6PXIsHfYINobukxkbnQxWVJLF/d4sWcM
cCt+Nnutt6/fur/Rfvyl/lFFcX9egVBeZmcpqe626i8f1pGQndqQDK6LWX+w8Qy2k5i7WQ19HcH5
xm0qzppPCnBvnoG8b8B/73dAZ3gvR5ERRicQIxi7+xD62V7uKwbMGhKOfmDaGJs8aWbXaWGYwZYN
M/rXNzikfjfjm4KtgV10dyKRDSON0S/O0CUnFGSqGIrO07AyHSbQn9uepnh8ZmfT2QlFencV9Mrn
KqBRDoMZIVXZsU4UGU1Mgx/F8w6OoA8ZjxhNCMRHRmPRoTfOOJrlE/bjW1nvkcIATFzOC4nll+mv
J/5O4S0WfJrQft0/fh3gUV/t/sV2fbAWlqAOurFvsfZgGNjzU0CsSXZbh6X/bH6zwZUYZ/2b9zIw
4qXebph2XAzNOvGZJQfe34ICA7fCw9sfrKRGNcAyUQeAtH80/pih0B5oU0NVi7rHvRSeS7dfSqh8
wMQYI9ney7rsH3BWH2uibziUBAS2DLs7NTC/XqBJdsJ+dPf4Kgq+axfThbIsGdi//IeQwHeYFHCU
NxWYrG1JagKVvuTIb2iHhkKGlLuZxx2hvXWY9mQXAWR1DZRuJ1/NbF2tDYAA+buwgR/e0+VLl3Xj
DLzgtYOabiNEaK/XTdDAHU32Dzq53BV5zNnbqHNsB7ygqbTUZN7XhQaQcX9ZoytsEE82xCSB4DBo
hhNUj4rCMpRuoncXjCeI+5sKab27VKGKb36tplJoC1EaTsZAEUSNoHiHCZuCoRpJMJiBKIkx+IHv
3SzVrYpKlV+6okpA6ny5r662m6DyY3D84qHEAQQvHWCvN0LZtFW257wwtN5jmgHs7eqRIdWTRfUx
lEDwwUNtr1mQgrcBDFQESr+VIcR45e5iBvrrW9C8fKnfVkNvRBbfmSDXgLtNQIXT0+qADIsUWmTa
HwAJaQVYqQRgv1IoRaDtqoDreww+3ck4ZqWo6HoEMmu1okC56cEYhvmtDP3JUDO0ejdv6ebxs7pc
0QaSN2RsPY26RUDmBK2jj6HlWwFKL7PrFvJ0QI6KVvfBEnFUp6pwFtugzGGmnviR4BwUegKN9tY5
+WWCEL8bw8ozOWE0BuCXv1VK0Mj93Si/p8qhNtobMTw4mT5zGI5gFPWqAuWQ4ECXm5eL4aV1uvce
wDDMuYKcnQslgitvc9LMNTuHqATwk/hgKsHw3feX3dStEFBeE8lqjlEFxIEtJ/kwMj2kJiiNKu+P
kFF2UFdnvIJpu45MzlM+hj8jiNnBFnifr5wGofyCyuud1HCK6mfwXu1aSSA1RifHDVCdj55TWeWo
mpwGmRMc1+xW0G2jEpS9933AWTA4Jy7pOsF0YzsVOh8ofwoAIATAx62sSadHXWxzp68LVMN7GqyH
a/suYD+3L1jyq8ZZ9iDR1hdNoAi1pjf0SnnrCuB5JuE074W7w9Get2eDqo+Akn/rG31afxUObIOm
DngP+3d6CkeSd+Xqly3fgvk57JBCFa/p1kA7yMQ3vtJv4KwNpbrvCXPDGIA+TczlmwDDj6yWMbjW
lJnBiIBqZ0U8M6xXz+ibv69SLevOjazS7EgbzsCQBodwPi5/o09wrKb2rofXOVAuAOHdPXFN5dAo
DgMK2nb5CjJu0RQJm/7eEubaAMOKyVTe6gJlxph5ddppQZC+C4BlKUnJKj4VzDqO9AzI6Q7MAbOM
Q3glKntdofIz0EPz5W8nkJ3Td2xU4fhlXSw/q687SGjiINOMgNHFATEz571k1plJXJlmm2OVPxz1
K8nk1x2Gm/qYPmbvXgqiy8U4VVTfBwAmHGMfe/VBB3X2sH5L2e7ghixlhhhaseUdBgTKzHBODQIi
dgOU5IkalQC0YbpoZrjWMHR/PY4+ygMhuphODluFEITgrBXav6VFh6HbvPQZSNiBVObMMxtn2yTg
hvvU4RBFoieR6XDTPIuDZVDPb99TadkddMVtVeKMz5DwUokv+gWHnVbzvE1FzG6zD5d4EIewNCUl
lin4448tUNeUn+zVyuyIp7BYzP2RROJdlZxBh7EPx5yH1XyeIKi6W85Hf63eBvBVYP4IhdmmcB3I
1yRrXalTBtDxtX4tLBZfs39P/E61NwIU7GMCbXTcUB/JznH1zmUqgE4yC0wQxHN/mGT2bG/Q1KX7
un34t/BPm6oi+osk5ThjIGNDOLmzvnJJiVLhwhwWySMX1pNDF87spaP6bKBUgQS6JkCYHSWRQDDT
6pkI+NgaZQOc9WxBD6DLXhIUn/+D/vZMv/y2eit6XREc2P8tkgKMAPRAI3YWW3brrurZ0yfPkDCB
JSKOTgpb9RUdXHdPV74+resPqzV6Fdvw97UKAoOh4vplsHgyNXclVOkkvlatJSlmvXsqkI23VXIB
+ljoJMtu11kjYZ5ue7UZYFWfObrVWsrAG7oNWOldld6oUGWDqwY+khqh9Vq9tkD5OPrP4q282v4w
3O0P714ENfykzlSP0VnmKQfDqvH7VpWz97zdQfGHV7utmQ6uqHzt3GU4yI0FdVPUitVaOTKipnO3
dfGTalWGUBE1YLYkqkYIXCdJZAwPhijFPV7ZzFC/tnPrQpEiKV0bc8p0pvZr/f4/1+gaesKdtTeJ
Ha3tGATriEDg/Bf6OHBMe/asV34syWa6c+bADmopu6jTjiRRSABYHVdU+kcIRvpB8woD82Lz+lgF
WuIicIJSdvvWZk1duKe7R3+ntit0BZKENqjhkySNh6kADmELlEBHgEF25c2HZhVr1R7ak78gWQsr
UXcZ743uD0eSgxMEtTT00SFHd0Ed3POfhsjt4FaYGgBbfqXWocXvkTXYT7Hg4g26CNvV50igWF+u
O5UVGqZzodu5U2W8AO8g7PiGVcpL8JETuvMu9KOHj1/QxfoueZ6nYy3bCwYpgFV9+tR+5yzMOEd1
7kYTVKMd+oLk5wh6vDiBBOmy78+AFKer6OBatTte0oVLX+iT+vMKCqJCbMbl0BH9JmEG21aQH3g5
FmARVG45q7Vm77C6Pr6h6mO/UntdpAIJljzZG5P8pgvK7QF3oyd2al8Ofh5dHpePH9XRw5d0FzYj
x4nP5TG4S57bGOHxYXb82kkdIRFzuayad+ao/ogQja7M10aYY4CHeuowYwmmwMXSWHJEjWpxWCqF
FxhjqipU+mm7/lNVBF1YPA+dZm33u9RH90NnxWWd/SROvusA5I2h46f0pL45SqdK6ywA1l/KY2CX
vLYmKhrAkYqr2J+jJ3Wp7D7+irMGwkM0hl+2MQm677x1OkiAfvQya/13UC4D7m3hJWBvBgkkewga
3aH7DcF+PiqmkTQLSIKOfHUZvstNnfh7qGkjGC8icTEFVWA/4HUTHgYHIFZFBmSYYxrfte7GLZUA
qtlD4WDoYZnK7lSq24fA/G8mVcbe9/eH1WhFkfIzQykCYgPSi7RqL3TMH1/WrTMfQW8ZydgXvqAp
UGI3TGGozylCsYXbtKcA2lwX1teVM1BrH9HFGwB20613kURPju9m5WUGyqEeZpDj3+ibU1d1exBG
op4QnRwGLHwb7DrMKi7XxpvncmbU0TsoiOT2OKMpMwqGujIuC7Dzi64kJcAD6XaiuwkMivl2mRkw
dppL8c3pSGynEDLUUq2am/fUOBmo5l/Nqpbx4EBvEn+5yAGeTEMpbUnQHUyABHRvBPb/ztf6qv+2
yiLpQDb2ECyhEcCFnSmSrkBvpRm7SgKpBBrxk9iP22WOJLgmlZAqbVybpTioiBvPnNGpLy+qpJm1
2BqkuOFt8t6RqSS6M5a9DV9N9du/9QYS+A6TAnQHAFKVAk3gNJnjsRNXVXq9QtUucASnglS+ZQso
pAWqv3hU31wgawVqeW1KugozccadQfuFxqOC1rSyPm7Rm1n/oRbVX4UaxMAgASoTnmOwAFBmTyQF
3AG5LtKGDyc0e/yUTuH0XyubYWSU4D8SYK8s0Kez4UdPABzF2pUE/95xygBh35P24Ivnr+jGvWuq
HCXAIWHhDid3ZBKtUwW5ys3OsLi6jXM5BC95PZR5Nyrgz0VpOUc6arwbiq7zwFaTsHAKx2GCtzU9
maTAG7wcUzI2geCES5pSV7NxC2mLnqxXCVnBHtqsHUDWTyjaoi0Afa1LMcH6/MWcAEDK2ax3mAu9
ef6SLuL0Xy8bprWQbB8tgaGxyUpbjzOdn6XsBIOKPqm+Tlq0Sy/p0t1mdU0A/ETwoobbKm0huz0J
gFrMrDxiQJZefB2UxFg3/LJ3rtMmS1AEWIw3jkLDzYviZyQqXRWa5iivBFrlk0gKWDJ3Bpl7tba8
C+jcNYzrxVJV3CrXPZwQRzcfWq5RNFtJCKzPB5COQM2kv0E6Ge9qUN3ti7oEinXvFOjmLjgABLq3
mhyIYUjaxDvASplqXcdWcvRRYHgU8/DedDLQ8UFnwABzomExiVoT0Uww00l1c1DDcQCpxQJAdaeJ
oKFXIwDQjZBFfXjrmq5QNek385skHRTjh7GBWutiE8FWsJKm4NnNzlV6IEEDsqu6c189IPB6pcyw
PnBW7rerIBuuVxD6H1bcV2PXuMLjeBiAH+/fB5gpB3q/KIJEDxITRTt0KCpXa/qGLbReR3hpfaju
RsxdUT3Bo2OjmU18CZ7Bi9aZSfqQZa+5eYEAtYOqCR0ijmR3oZu68RAqqTFYE5JdFJjOewJj4pHF
cgSYDcaAt538FHfxks6VVKqkAlo+BjTnwBIIYfY0lYpSXnaOclMAWTPvCjqgcOhodnn4yvfcWSiu
7ur6nQm5QLGZUARv8EFa6XVZvWSInIwzarmrOKahhdqxZwqAtq919nqprjdhLgIAjFsJG8XPMlRw
7zw88qAEm8QQ1yso8JcDSYbG0pu6VteqTjNHbsAY4+nkGOV9XOcdT/vCOe+p4IxsjKVx9UmKQZ32
gHV++U4rDg9c5S7oh8a7KmkjQTFJx0rApDwBFEqlQwVJ2A5aq11jV8Frj5MXAN/udQKcml6Nk9yc
gRbRPxwan7R8ZbIeCrLI1Fvrz41gc7V2/MxF/lTZTlyp0O3yQdpQDdhiDgmsd/Snxbkgrl/Q2XaS
G1XNKgbZPvU1kgL05NF6ulrbZlLVNUfFkOpnVaV5PioFjEb5wJySv3ULAQFJVM5vqyihnwNTlLPr
HTkGXNcl6BFv3ysDCBYQPmaPPeGpjk3MZqacfZgFl7qFIkjVAaT92lvIr7yTTpsQnKMJzVFRvQrQ
2PQEIyeBJPRYR2kk55Y8AEALh+t8x8Yq9dWAyp2TqywC4WedJO4dTJoHN67qSguVB7BSTCujQ2KQ
ZnuqVXalDv0SRGt+gKKgk8TntD2Vc5RSNuyRBzRl5y9e0/nSEtXRbTBDIs87PEXZuau1tTAPvUdV
yRIEjrM7o1cbDmq/7w1swDXdgtv7Hs7mDCM2HoGgiSfAFsGaywLc1NBjWodbiGJy12r/xLBCvafl
2s09NVLhmzTdEnSsxbMWdm3T1rUZdBAshZVAtxHgj8nF67R6dlQeRYlU5t+gKv6i/f/Sv9G1QNK8
o2OKjhIofX2G1XKfxN6GJM0tjOGYAB5Aq5b2EblleWjCvZlOiQ6ryjcxyzpwR29Wk2y9C/BcHkkB
K/NEpRZ63Lt3AJYccaDaDeBYW6uamkmimaQA9m2it0EVN9G1AGWN0lHknzWrnjocWUPlG42dAqX8
0T586XM8+YU5Apr2BxUkQangJe/UoS2rlRnvqG7GCMpvEzCAsjcdlKjkQih3sTlrTCJrfk04g9yf
v9l0DJ3X5avcTylt44AkO8Io4QoNW3JqhlZshs41K1mRb4ApQN8t7fyF2vzzIU19c1qn713VpXJG
Jrl+btEGHczNUGLJFZ0qJWBG/6YW5istBj8gFprnLeO0LYfJB6C0Jux2Q/cQo9cklUDCT121Wdt3
rCUAJnheUGNQvCWs3ad9flT3zuKPVVaqirbx8RknfJ0wfJ1MpRdkKDuP5Ei46XVmb3iCkL/xgH4K
ZsrFcyTk7+L4M7rnBuJ6cmGuNv1ihVbn3NDlc9XqqaarsomEKiOZyw+6DUAogJXQfN64WKFWknLW
TD3VUWfHHjjkz+BTYNMZ3fLPRtfyXLMDrWqso8I9OC6XbHcCcfQeie+kFJ7BhQAPNpgaRlYcqGLH
OPfoYXmVatLzaOMnKbDMtWR9HRyHkMzNMAzwn3QzXrpdqVuV6MQZF3n7RxGgMZZRnKecDCr+1piA
kV+0ktbv1wc+QehYk1S+oxt9YwTrZmQxQjFZRdq+CR0Ay1Kc14T66htUDftD3QAdCMznONJVVcvY
aHMxmCvOdBZA61beAchrTBAdsIAA36tQFUj4q+jyeiYpYLC7LMR9g2NksH6efmg6XP0SlQfA389G
p6GrhE7xbBW1tShFZBepeD9jg7lXdO1ytRqq76kcUORAxxFV38eGDlJMMQE9gWZdVaZaV0QrzAH9
8IBxuW6Kb4yDOU9DCXmPd4Bftgo/0y2ArpMdb1P5v6iTJ/EZ8fkrSLLOkUgJiKaoQzK5mPWeTkHg
0WgLIH7ukfjtO6Y1OndC3zA7f7WWwiCjxb7hYJDQkVeURTI9DSwfq1hl1hEBO/d769xdNfLcU8aH
YwzSzWFULdfPq4NRA//IcWx6mtJMUsC8KXzmmBW79BZAkhHnL+g8933rHiDDgBE7uwUzdpevtRvX
aW0h3SGAoDqRDO+qr1MdFNMOcx7KdO3RJJ115Q3g5qSQfATEt6aiRZ10UYZSyHAnwV1dlaicVQmK
fj6A0YtXJf5YGEXMbbudFeOerzWJ2FswckIBGd5xMEq5QSu1OoYxmvn3PMtoRW99pe5i26sHKAaa
jlsoX+k7VXf5TSiinSgG5WqSrsHkHJICC1fHhwtMWKE9u6blMX1S5+8AXlxBeRK65YBIEljEUVkm
jsIWezHW0QOA6QO6LLrx4cMjZ+RGjFKOPk+jyyhiAuYPRrPaulyhZmekswsqTRhmGk1ihaSA/fj+
SeA7TAqYnQZgXQBI8hto/wkl4G/pxa3EKTbGPgsnCITW9OhYxeXRjjINYBkz8ValynKqirVpX7gy
tpoWYFN1Nmi0gHdZ/flkjEPilRjxLFq1A9z2YQUbtcUPYI58synN3Dyz4Mw0RREARodSCX2iP5Om
dgCjUtaywUIw9vW0tBKZMcUtN5IRITE4x7GAbT2in3FkbidVOTsOyLeYaqlBmuZ8c2TizP2RQ5MD
s/BRSVDMvfYM0cJC4dz+KFMPrh+eD5c4dEmezcovIBkxxD16RoCEy1hDAi1xT6wtAi5XKoE4rX7M
Q0dlQVtEwDlFG6iTJ4FeaKTi4qHNCaJ93/yOLLJnVLaKtoFaWkhUSkXFVHanTKuwYRMguPf0xeiZ
9uJHPUb8jlEF76g8rdnhr/g1BqiI6pkZAaC92KAGG9Rnz6BYxVPNf4KJCkXmE1ukNTgn4QRI9W1k
2KGcNEkBv1DWQ2oiM7iLAgUAfLxj86AfhDFhBdU56Jg8Ht0f9zkF2KN/tOKhYlkYuzRJgeCUDXrv
n8Rq1ZCn/Al2XZhTDM+CLuWvM9Q6hmFPovqDoktY/RP9VRithZ6RgFwRGLrhEO57W/60dOMGWmwF
rhicOZ7LsEHMYAT8Y5KVYDJLJIE8o4q0bne40rYZ3G7a7A0Ka1iy4kF+d3MhGbXhPf00c5ztAFWX
SX74wT0czjkNKBmBpQNJgAAq9oy0PnlQFR1q6QJoKhVMAzMv95oKhPfkm4C8dwUpZq3Bm0J+pkWQ
cZkJg0A8xXsMiFESM/t0Nj55kBAITV+pTX4kVKBIagLAapKkgCOOkT8zlrFmHdGqvniGzcE4TdnQ
2PF+w9Ia1DYAUrcv301PUbTPqOrKmlXCDJ4/822PRkWdWHsZ0ErRFRObC7/xEEE6M+KxaQSY4agp
ujIKqCB1MDcfmU4CAkk7Y8xydx+UD2t7GI/HjOy44kw6UPUy72mSdeEbkaAk2nVsoRxBXmQmAbKL
fPMer/MZg69hUJpZ5y4EiAnQ1dm6TRYfVCzi87TOh2QIwXJBez8JHEowrFkfM4YUG6OYaPiLFzte
zF77p67Ven8y70n1aqDjYcowP0CxGQ9NZrT7Gq2iI6SohXXlm6gUWkRfRyE70PEUvfptvVPA2sMJ
Gqf9tLW9W4OAps4YbmmwA5LYU0lm9OmJZ2K/op/z1lHdikhUZnOXekcNgCBJAeZhQyPN3g1T0CPU
Nzpyoo2DRhKu2NAN0p7sbICFaNU0gGTTrHsP+LLpNrESREseOEhUgzZ88NeKGGSOPhzU9CUfmnsA
6K74kJNCh3C8eXdmDMmVavwc3Q+TANpNTLlbgWMSEcjiUzgDABe/doc8Q+MVn9dKSzFJARfmOwGC
TEgERA0U/ScvyXomOZxazHwy+iq1kXEI9OsM+tIDWqlg5BAHh3jEo6wrD0Y3T9a6Q/o3eXPyYMRo
km6MVsZXBqY4Fx0MARHxSknnHfs+D9uCtk0csvW/+O/huUengd8Ra1oqX3OLv9nPSFCQIMp7608V
sYPRLCf2VwA4C0+g/VFZj4MX/k+DlUkb86TRG2CJzNCC7AqTg9EnY7SU+kXHiLzT/EF1mg6g1fvD
Fb8dXAqKA7OM74WbtmHzDZJtnpHZ2rDPU4nrJ+VixmdIRk8OGmDYUMVmkEh+XZ1nTg87QHzedv2J
72pylRE4swmK8BxTdwbPCusQOHrIHbuWRrKHQHsBqN9289i8oGQVbqb4EJOqtGYSxCNTFhWgG/s5
MorfGTYgi4LzTQ7sphuJ+iISE9iw2KImdBzvwzcaPZTEnp3TmhUrtLaqUxMkteNIJLsbm5O6SVuD
87WKcZ2ZQcYZGJfqghp51snQZEYpJgkfC7v7JGAja5Oup4RCfB2ulVrQqg5Alqaw0+4ErWadxxrW
mCeCFjrXvKOVuXGnAiNJNkBl3DUG/pMHSeukJJLIfnKhSzF//QO1gYQeuLhosCyx8Mz+sUqniOQM
8PMIvoSjqxlpoyvBsNMAaDeFXXVHLomRjDGY90uQmb3xPXlmkchknGAO59DBB/rmEN6RB4WRgl06
EEoS0NCHEhBNORBUEcgs3sbLukXzZWe6k0wCltGaqMwGNfYQoFNs8cTWRSSkKDluUXHGOjl2yiDr
r90mX4CdE2qgSsavMMCSLvx7RDwyTDLdsea7s9DOpdFZ8BPFrp2kG8SMyJFY8MNeMF7lih+Yvmqf
fh67iffMCIIBsoMVJSyeufYl9wlJOEYXW01xiQSDKbA88zV8K6+ILK0DgDY0IZ+ZeWwUhaMgAvm0
BGQ1nq+iFQ/0cICqOWwqUcFTCiJwTsgnqOb+BNaWE8n72ACSBG5RylizXz9P3AJgHwkJA9jJOgkH
w8ZGXMEz+1PVXwfAbXCychrYgwbYG31pEusJ6Twn7XlP3qMZbcQvBAh20158+5QGNfWRiGYs0AuG
lGiYt+IisNePeABNMTJKSWth46HQghuBjTajniRZYCWbZNzQ+MGuVMhjGSFebK8d3QMVkb9R28Oi
8J0b1dILnhMgBs4eQYDMJlIQAxdhnrt7zjVA4QVbtTMgV2vNu4AKdJr1FRhPkoGkgwO+wqp38S3N
7L0ZRWONuCKnaN+nn285K5B3lLFF7/2LQsbS6OIhcWcGtULz9uhnIRs16eoLOwLjCfOndPKEgaRg
g3b4JqkQezlnjQnwd7ofpky3k2G4YA1G0jEbaHCuHt0K8YNbAIXFddrjRcK3sFXtJMnZfPJlDcTE
RyuKLgMrJMLP90LORbsZCdhowKINcCVFlCDeJd2Kbh7Y3G3v6IPs3Zq0Whd5P9C8xuP//rexdcuR
94/zu6/jgy5bUs4EQekr+TzzS1d8KwwbnycPnEVa3Vbzeb3DF8e92Pq88gEVTwRBSUTGy35BoMuM
cZb5vOyrb/B3a869/yEAP8wxgY/QSJtfWRXt0HmBii5mTo3h1Ze33gD4EZujFXxeeJC8MQ54nvks
555NUgCnrpjP6xxOVI+TV/J52Y9xPL3gss43n5d999HfcQRwMlIL+Sz+DbNt2av5LP43zlsQtegf
4K7OjuDzStdyIimQo5V8ljy8CA5W8VnijzPMpLXfr1UzYxoTZo6L5IOHBTRmEjK0hp6+o0bGZrJW
RSgZR8dC4H+dAxRrHypLRebzOr8n5PdgYxSYzyv/noA8Jker+BhnZ9J0ZvQxHlBJt0UNGXV6BMbL
a2jASFYU4ErWbCEZal90wcpn9AGnICBZFffUxY1e2bqUXnneTZIUoF0y23xe+TkWf5EEJZXFTPN5
5d8TWJrRDPN55jeedJtglF/vZh6dzYBp+kQkPQb3SUxbxv3hDHiHUfU2n5c9FHzJEYxjmM/Lvvqi
v9PB5B8PuOALz0G7LsCOubv4vM61HEhmpRTzWcaPcYTCSIDBiPryAwcsKMx85r+anLnMNWWYbaBv
IqgCc/O/8YGTTFIwbQOf590JgahPdJoK+Lz6QTIyjmQun6UP8CDC07WKz3dxOBAYxrK/Yp/YXwT/
BWF0EL3iFQke4qArfe4jvOJpXvo1s16TV1ifpw+vpBUE4E/9K1TE4XxsB4HlcjYJgW1IKv7RE4bx
JXdI4jE8Yw2fJb4XgW4zn5c+5Iu+QGBF4SF5LZ9XPU9gojJW8lny++50rBGQvsT1edVLPfk9khPo
wHzzeeUTkPTHrq1ZyrY9OgeJKGxTsfkseV4obPPNZ4k/MsLWD05OG10IYwS97mDsTI/U6vo9wPMi
wuhyilUo/sPSKSySw7DWZG7k8/SpvdOUsZ7P4n9PfJ71i1RKIZ+XycQdrJI883nZFxf/HQpZ/NiV
5vPCnxF0+pCELDaf5Zx/4bsUoHivxebzgp87kCgIB1T1uesrNhN/69W9hFe7U3xakk8xfJ6QDEnK
BP9nz+BIgTQiexWfVzv7M9+iIBSQQkLyRS8U39I7kk5b81nyMiTpVvF5zVuw/+wPL4E/SFLgD/9Y
P/wrzgG81HTzuI4dPkGLGjPBzg91ePq6yq4xI5i9Xts3roVaiIz4D/9Rf7RPYAFZPgDz4Ga5Sjup
OKBgTcab6XCrCj054qHodHA2VtLm9lQ19IcktNmOu7pxgbmyOw/V2ckIUEW52mdhJvnSQwM6pPc3
ZymD53udObsfkhzs92qXgF0CdgnYJWCXwLcrAaqzEz1quXtCX5yvBIPFkc4DAxYLbpcrXWSbVmj9
ungAme2HXQJ2Cdgl8GIJ2JMC39MVYpD4x5jzmgaDIWdNEO2UBIuACBk2Bgeoz8YMQq/pXn7T7sXv
6fP/GG7LCRol/3AwDaJ71DzaQLuaYUBgNh5EWAeqJrFrAKbBoBcnMS/4A96phqFijJnlXgCzhsZh
oAD5PQQk2zEvOghwXKYM9/OP4YXbn9EuAbsE7BKwS8AugW9VAoZ9yVDDmsQ6+Esg7fc6M9bjFau0
VYzSbl2hgphvj+TzW711+8nsErBL4HslgR9wqPG9kuO3fjOOgFAlrn1HH2btgRLQBhYzBWbBBEMD
rn4AnwQzH2RPCHzrcv9DntARsL7wrDVaHwvg4/AI3K/M6DKjZSb/HBgn8KU3OQz2jPkxtj/krX2r
13IyoF3bGc8pguUD/mtnUKSdzYiEYR9hljWcIU97l8C3KnL7yewSsEvALgG7BH4sEqAlP6Zgjz6I
WaNdowYsg5l+Rpz8Q8BtCmJ+2+4r/lhWgv057RJ4IwnYkwJvJL7v7scGfM4PIEUIEOzHH6kEHKA1
c4UPNtB8/kif0TyWgzuUmNHm80f8kPZHs0vALgG7BOwSsEvgv4UEDDhsICCSfOyHXQJ2Cdgl8LoS
sCcFXldy9t/ZJWCXgF0CdgnYJWCXgF0CdgnYJWCXgF0CdgnYJfADl4A9KfADf4H227dLwC4BuwTs
ErBLwC4BuwTsErBLwC4BuwTsErBL4HUlYE8KvK7k7L+zS8AuAbsE7BKwS8AuAbsE7BKwS8AuAbsE
7BKwS+AHLgF7UuAH/gLtt2+XgF0CdgnYJWCXgF0CdgnYJWCXgF0CdgnYJWCXwOtKwJ4UeF3JPfrd
jCZ6WtXRPahRtyAFhYcq0N3Rjqb+xnK1n8AuAbsEvtcSgFZyvK9dTZ2TmnaHDzvKXz52mOvv9Sv7
zm9uZlQDnV1q65qWR2ioQkN95OH4nV/VfoHvsQTmJqCjbWtV97iL3MJjFO3nJmc7Gv73+I3Zb80u
AbsEfqwSsCcF3vjNT6j/9lEdPnZbtZHbteu9g9oU4yqPNz6v/QR2CdglYJfA91gCM4PqLjusX37e
raHYLfqzP1uj3ABn6FPtx49WAmMtqj3/jX51ol9xe9/SW3tyFG83hj/a5SDNarq/RqWf/ErHWoMU
8d4/1V+tDJOvnYP2R7wm7I9ul4BdAt9XCdiTAm/8ZqY1WHlR5z77UlcygxS7db/WxbzxSe0nsEvA
LgG7BL7fEpgdUX/dBX3zSb16CmK1/b1VygmAgvL7fdf2u/suJTDWpcbbZ/XJ79uVH71CG7bZkwLf
pbi//+ee08xgg2pOfqbPqqKVXvihflEcJnsr5ff/zdnv0C4BuwR+fBL4/wPLFEo+isiDRwAAAABJ
RU5ErkJggg==

--_004_2fb0a78486134a66a0e91228612706e7XCHRCD020ciscocom_--


From nobody Mon Nov 23 07:27:46 2015
Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49A691A883A for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 07:27:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MsmktKJ6kpN1 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 07:27:40 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D84941A8837 for <sfc@ietf.org>; Mon, 23 Nov 2015 07:27:40 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id BD105259ECE; Mon, 23 Nov 2015 07:27:40 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id F14B62401E2; Mon, 23 Nov 2015 07:27:39 -0800 (PST)
To: mohamed.boucadair@orange.com, Dave Dolson <ddolson@sandvine.com>
References: <787AE7BB302AE849A7480A190F8B933008CA176C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <56533067.4040807@joelhalpern.com>
Date: Mon, 23 Nov 2015 10:27:35 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA176C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8dEWQvQ52jgqD67emEw9oGWVlZg>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 15:27:45 -0000

And that case can be easily handled by carrying and SFP ID.  There is no 
need for an SFC ID in the communication between the control plane and 
the data plane.

Yours,
Joel

On 11/23/15 1:35 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
> A trivial case is when there are no constraints on the chain itself (no predetermined loose/strict path). Packets bound to a chain will fly over a (hop-by-hop computed) path that will result from the decision-making process of crossed sfc-aware elements, distributed load-balancing policies, local SF failure detect/repair, etc.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> EnvoyÃ© : jeudi 19 novembre 2015 15:22
>> Ã€ : BOUCADAIR Mohamed IMT/OLN; Dave Dolson
>> Cc : sfc@ietf.org
>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane operates
>> on SFC IDs, SFP IDs, etc.
>>
>> Can you please describe some situation where there is increased value in
>> having SFC information in the data plane.  Having the coordination
>> within the control components is understandable and usually necessary.
>> But that is out of scope for this document and this working group.
>> In what circumstance does the increased flexibility, which introduces
>> additional complexity in the data plane, add value?
>>
>> Yours,
>> Joel
>>
>> On 11/19/15 2:41 AM, mohamed.boucadair@orange.com wrote:
>>> Re-,
>>>
>>> Yes, but still there is a record somewhere to link the name to one or a
>> list of IP addresses. That record can be maintained in a central entity or
>> be local (an SFF can decide which exact SF instance it can solicited (LB
>> cases, redundancy group, etc.).
>>>
>>> What I'm asking for is more freedom in the cp architecture to make the
>> resolution when it is appropriate: either centralized, distributed, or a
>> mix (hierarchical context).
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Dave Dolson [mailto:ddolson@sandvine.com]
>>>> EnvoyÃ© : jeudi 19 novembre 2015 08:32
>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>> Cc : sfc@ietf.org
>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>> operates
>>>> on SFC IDs, SFP IDs, etc.
>>>>
>>>> Med,
>>>> I would say that the SFC has no representation in the data plane (like
>>>> host name has no representation in IP routing.)
>>>> â€ŽBoth are abstractions.
>>>>
>>>> -Dave
>>>>
>>>>     Original Message
>>>> From: mohamed.boucadair@orange.com
>>>> Sent: Thursday, November 19, 2015 2:12 AM
>>>> To: Dave Dolson
>>>> Cc: sfc@ietf.org
>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>> operates
>>>> on SFC IDs, SFP IDs, etc.
>>>>
>>>>
>>>> Hi Dave,
>>>>
>>>> I fully agree with this analogy:
>>>>
>>>> ==
>>>> SFC <--> destination host name
>>>> SFP <--> destination IP address
>>>> RSP <--> sequence of routers and links to deliver the IP packet
>>>> ==
>>>>
>>>> Hence the need for the control plane to instruct the underlying data
>> plane
>>>> elements with required information at each of these three levels.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
>>>>> EnvoyÃ© : mercredi 18 novembre 2015 20:34
>>>>> Ã€ : Jim Guichard (jguichar)
>>>>> Cc : sfc@ietf.org
>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>> operates
>>>>> on SFC IDs, SFP IDs, etc.
>>>>>
>>>>> [reduced distribution to Jim & sfc list]
>>>>>
>>>>> Jim,
>>>>> I think your description is helpful. Can we find a place for this in
>> the
>>>>> docs?
>>>>>
>>>>> I don't think I can understand it without referring to the concrete
>> NSH,
>>>>> however.
>>>>>
>>>>>
>>>>> If I understand correctly, the following are true:
>>>>> - if the NSH SPI in two packets are the same, they are on the same
>> SFP.
>>>>> - if the NSH SPI in two packets are different, they are on different
>>>> SFPs.
>>>>> - although two packets have the same SPI, they may traverse different
>>>>> RSPs.
>>>>>
>>>>> - when thinking of the data-plane and south-bound interfaces C1 thru
>> C4,
>>>>> the SFC concept doesn't exist.
>>>>>      (SFC is just a north-interface concept like, "chain A provides a
>>>>> firewall and a NAT")
>>>>>
>>>>> Have I got it right?
>>>>>
>>>>>
>>>>> I also think the following *analogy* with routing can be drawn:
>>>>> SFC <--> destination host name
>>>>> SFP <--> destination IP address
>>>>> RSP <--> sequence of routers and links to deliver the IP packet
>>>>>
>>>>>
>>>>> -Dave
>>>>>
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard
>>>>> (jguichar)
>>>>> Sent: Wednesday, November 18, 2015 11:18 AM
>>>>> To: Carlos Pignataro (cpignata); mohamed.boucadair@orange.com
>>>>> Cc: sfc issue tracker; sfc@ietf.org; Paul Quinn (paulq); draft-ietf-
>> sfc-
>>>>> control-plane@tools.ietf.org; Joel Halpern; Joel M. Halpern
>>>>> Subject: Re: [sfc] #15 (control-plane): Whether the control plane
>>>> operates
>>>>> on SFC IDs, SFP IDs, etc.
>>>>>
>>>>> [Chair hat off â€¦]
>>>>>
>>>>> I have to say I am struggling to see the â€œissueâ€ in this thread that
>>>> needs
>>>>> to be addressed other than confusion over SFC vs SFP definition; from
>> a
>>>>> data plane perspective it is *very* clear that SFP/SI identifiers are
>>>> used
>>>>> as the lookup key into a forwarding construct that may contain 1:n
>>>> number
>>>>> of next-hops (SFFs, SFs). In some cases that lookup will point to a
>>>> single
>>>>> next-hop, in others multiple next-hops. In *all* cases this has
>>>> absolutely
>>>>> nothing to do with the SFC as each representation of that SFC is
>>>> uniquely
>>>>> identified by an SFP-id.
>>>>>
>>>>> Jim
>>>>>
>>>>> On 11/18/15, 10:19 AM, "sfc on behalf of Carlos Pignataro (cpignata)"
>>>>> <sfc-bounces@ietf.org on behalf of cpignata@cisco.com> wrote:
>>>>>
>>>>>> Hi, Med,
>>>>>>
>>>>>> I also referred to other parts of the document, when I wrote:
>>>>>>
>>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>>> planeÂ²
>>>>>>
>>>>>>
>>>>>> For example, I am not sure I understand what this means:
>>>>>>
>>>>>> "   o  Populate SFC forwarding policy tables of involved SFC data
>>>> planeÂ²
>>>>>>
>>>>>>
>>>>>> Or at:
>>>>>> "   o  SFC Forwarding Policy Table: this table reflects the SFC-
>>>> specific
>>>>>>       traffic forwarding policy enforced by SFF components for every
>>>>>>       relevant incoming packet that is associated to one of the
>> existing
>>>>>>       SFCs."
>>>>>>
>>>>>>
>>>>>> My comment is that those should be Â³SFP"
>>>>>>
>>>>>> Thanks,
>>>>>>
>>>>>> â€¹ Carlos.
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Med Boucadair <mohamed.boucadair@orange.com>
>>>>>> Date: Wednesday, November 18, 2015 at 10:03 AM
>>>>>> To: Carlos Pignataro <cpignata@cisco.com>
>>>>>> Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
>>>>>> "draft-ietf-sfc-control-plane@tools.ietf.org"
>>>>>> <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
>>>>>> <jmh@joelhalpern.com>, sfc issue tracker <trac+sfc@tools.ietf.org>,
>>>>>> "sfc@ietf.org" <sfc@ietf.org>, Joel Halpern
>> <joel.halpern@ericsson.com>
>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control plane
>>>>> operates
>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>
>>>>>>> Carlos,
>>>>>>>
>>>>>>> There is not SFC ID in the core text of the control plane draft.
>>>>>>>
>>>>>>> The text you quoted is part of an appendix with a note that clearly
>>>>>>> states this is not discussed. A corresponding issue record has been
>>>>>>> recorded to seek for more feedback on that appendix.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 15:35
>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN
>>>>>>>> Cc : Paul Quinn (paulq); draft-ietf-sfc-control-
>>>> plane@tools.ietf.org;
>>>>>>>> Joel
>>>>>>>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>> operates
>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>
>>>>>>>> Med,
>>>>>>>>
>>>>>>>>> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>
>>>>>>>>> Carlos,
>>>>>>>>>
>>>>>>>>> This is an open issue for this draft, so it is normal to continue
>>>>>>>> discussing it. I don't know how you can conclude in advance that we
>>>>> are
>>>>>>>> circling.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Discussion is great, Med. But my Å’we are circling' comment (not in
>>>>>>>> advanced, but already evident) is because I saw the same questions,
>>>>>>>> same
>>>>>>>> arguments, and same answers as before.
>>>>>>>>
>>>>>>>>> "strongly believe" is not a technical argument, btw.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Well, I believe so on technical grounds! Most of which have already
>>>>>>>> been
>>>>>>>> said, so I do not want to contribute to the circular discussion.
>>>>>>>>
>>>>>>>> The control-plane draft talks about Â³SFC forwardingÂ² and Â³SFC data
>>>>>>>> planeÂ²,
>>>>>>>> and Â³SFC IDsÂ². The architecture says that SFC are made of abstract
>>>>>>>> service
>>>>>>>> functions. ThereÂ¹s no actual forwarding in this abstract conceptual
>>>>>>>> model.
>>>>>>>>
>>>>>>>> The control-plane draft says Â³Suppose the SFC ID for this SFP is
>>>>>>>> "yellowÂ²,Â², and my point again is that in the data plane an SFP has
>>>> an
>>>>>>>> identifier (which identifies the SFP (SFP-ID) and is not the
>>>>> identifier
>>>>>>>> of
>>>>>>>> something else, itÂ¹s not a Topology-ID, itÂ¹s not a SKU, itÂ¹s not a
>>>>> URI,
>>>>>>>> itÂ¹s not a Family Name, and not an SFC ID), and the control (and
>>>>>>>> policy)
>>>>>>>> plane can of course work with SFCs.
>>>>>>>>
>>>>>>>> My $0.02.
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>>
>>>>>>>> â€¹ Carlos.
>>>>>>>>
>>>>>>>>> Cheers,
>>>>>>>>> Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>>>> EnvoyÃ© : mercredi 18 novembre 2015 11:52
>>>>>>>>>> Ã€ : Joel Halpern
>>>>>>>>>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq); draft-ietf-
>>>> sfc-
>>>>>>>>>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue tracker;
>>>>>>>>>> sfc@ietf.org
>>>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>> operates
>>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>>
>>>>>>>>>> I am a bit baffled to see this thread again â€¹ it appears the
>>>>>>>> discussion
>>>>>>>>>> restarted to continue in circles.
>>>>>>>>>>
>>>>>>>>>> Med,
>>>>>>>>>>
>>>>>>>>>> I too agree with Joel and strongly believe there is no need for
>>>> SFC
>>>>>>>>>> identification passed down â€¹ there is no provisioning of SFCs
>>>>>>>> southbound.
>>>>>>>>>>
>>>>>>>>>> (Almost) every instance of Â³SFCÂ² in the control-plane
>>>> requirements
>>>>>>>> draft
>>>>>>>>>> should really say Â³SFPÂ². There is no use of talking about SFCs
>>>>>>>> towards
>>>>>>>> the
>>>>>>>>>> data plane. The relationship between chains and paths is a policy
>>>>>>>> matter
>>>>>>>>>> which belongs in the policy/control itself, but not out of there.
>>>>>>>>>>
>>>>>>>>>> This is no different than what I said a few months ago on the
>>>> same
>>>>>>>> topic.
>>>>>>>>>>
>>>>>>>>>> Thanks,
>>>>>>>>>>
>>>>>>>>>> â€¹ Carlos.
>>>>>>>>>>
>>>>>>>>>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>>>>>>>> <joel.halpern@ericsson.com>
>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>> What is provisioned into the SFF reflects the SFP.  The control
>>>>>>>> system
>>>>>>>>>> decides whether that SFP indicates the same set of all possible
>>>>>>>> choices
>>>>>>>>>> that the SFC does, or is a proper subset.
>>>>>>>>>>>
>>>>>>>>>>> In order to allow for an SFP that reflects meaningful
>>>> constraints,
>>>>>>>> what
>>>>>>>>>> is provisioned has to be the SFP.
>>>>>>>>>>> No special provision is needed for the case where the SFP is
>>>>>>>> isomorphic
>>>>>>>>>> to the SFC. In such a case, you still provision the SFP.  And the
>>>>>>>> result
>>>>>>>>>> is an SFP with as much flexibility as the SFC.
>>>>>>>>>>>
>>>>>>>>>>> If, in contrast, you declare that the provisioning includes the
>>>>> SFC
>>>>>>>> then
>>>>>>>>>> you are introducing extra complexity without adding any new cases
>>>>>>>> that
>>>>>>>> can
>>>>>>>>>> be handled.
>>>>>>>>>>>
>>>>>>>>>>> Yours,
>>>>>>>>>>> Joel
>>>>>>>>>>>
>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>>>>>>>>>> To: Joel Halpern; Paul Quinn (paulq)
>>>>>>>>>>> Cc: sfc issue tracker; draft-ietf-sfc-control-
>>>>> plane@tools.ietf.org;
>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>>>> plane
>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>
>>>>>>>>>>> Hi Joel,
>>>>>>>>>>>
>>>>>>>>>>> Please see inline.
>>>>>>>>>>>
>>>>>>>>>>> Cheers,
>>>>>>>>>>> Med
>>>>>>>>>>>
>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>>>>>>>>>> EnvoyÃ© : mardi 17 novembre 2015 14:49
>>>>>>>>>>>> Ã€ : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc : sfc
>>>> issue
>>>>>>>>>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>> Objet : RE: [sfc] #15 (control-plane): Whether the control
>>>> plane
>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>
>>>>>>>>>>>> Your statement that " It happens that information is no more
>>>> than
>>>>>>>> the
>>>>>>>>>>>> service chain itself (without any constraints)." (Where "it"
>>>>>>>> refers
>>>>>>>> to
>>>>>>>>>> "
>>>>>>>>>>>> the exact sequence of steps to be used to realize the SFC".)
>>>> Does
>>>>>>>> not
>>>>>>>>>>>> make sense to me.
>>>>>>>>>>>
>>>>>>>>>>> [Med] RFC 7665 says:
>>>>>>>>>>>
>>>>>>>>>>> "   Thus, the policies and logic of SFP selection or creation
>>>>>>>> (depending
>>>>>>>>>>>    upon the solution) produce what may be thought of as a
>>>>> constrained
>>>>>>>>>>>    version of the original SFC. "
>>>>>>>>>>>
>>>>>>>>>>> in short: SFP is defined as a constrained version of the
>>>> original
>>>>>>>> SFC.
>>>>>>>>>>>
>>>>>>>>>>> What is the name to use to refer to a "non-constrained" SFC or
>>>> to
>>>>>>>> the
>>>>>>>>>> information that you will provision to an SFF when the path
>>>>>>>> computation
>>>>>>>>>> and selection decision is "deferred to the SFF"?
>>>>>>>>>>>
>>>>>>>>>>> It does not make sense to call a non-constrained version of the
>>>>> SFC
>>>>>>>> as
>>>>>>>>>> SFP given that RFC7665 explicitly defines SFP as "constrained
>>>>>>>> version
>>>>>>>> of
>>>>>>>>>> the original SFC"!
>>>>>>>>>>>
>>>>>>>>>>> The SFC is the general description of the objective.  That
>>>>>>>>>>>> is not the same as the exact sequence of places that must be
>>>>>>>> visited.
>>>>>>>>>>>>
>>>>>>>>>>>> I stand by my earlier comments that almost all uses of SFC in
>>>> the
>>>>>>>>>>>> control requirements draft should be SFP.
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> [Med] I noted that Joel.. that's fair but this position is IMHO
>>>>> not
>>>>>>>>>> aligned with RFC7665 that allows to control any variation from a
>>>>>>>> non-
>>>>>>>>>> constrained SFC to a fully constrained SFC.
>>>>>>>>>>>
>>>>>>>>>>>> Yours,
>>>>>>>>>>>> Joel
>>>>>>>>>>>>
>>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>>>>>>>>>> To: Paul Quinn (paulq)
>>>>>>>>>>>> Cc: sfc issue tracker;
>>>>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>>>> plane
>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>
>>>>>>>>>>>> Hi Paul,
>>>>>>>>>>>>
>>>>>>>>>>>> Thank you for sharing your feedback.
>>>>>>>>>>>>
>>>>>>>>>>>> RFC7665 says the following:
>>>>>>>>>>>>
>>>>>>>>>>>> "
>>>>>>>>>>>> This architecture does not mandate the degree of
>>>>>>>>>>>>    specificity of the SFP.  Architecturally, within the same
>> SFC-
>>>>>>>> enabled
>>>>>>>>>>>>    domain, some SFPs may be fully specified, selecting exactly
>>>>> which
>>>>>>>> SFF
>>>>>>>>>>>>    and which SF are to be visited by packets using that SFP,
>>>> while
>>>>>>>> other
>>>>>>>>>>>>    SFPs may be quite vague, deferring to the SFF the decisions
>>>>> about
>>>>>>>> the
>>>>>>>>>>>>    exact sequence of steps to be used to realize the SFC.  The
>>>>>>>>>>>>    specificity may be anywhere in between these extremes.
>>>>>>>>>>>> "
>>>>>>>>>>>>
>>>>>>>>>>>> The control draft is completely aligned with that approach.
>>>>>>>>>>>>
>>>>>>>>>>>> The control-plane document allows in particular to provision
>>>>>>>> required
>>>>>>>>>>>> information when "deferring to the SFF the decisions about the
>>>>>>>>>>>>    exact sequence of steps to be used to realize the SFC". It
>>>>>>>> happens
>>>>>>>>>>>> that information is no more than the service chain itself
>>>>> (without
>>>>>>>> any
>>>>>>>>>>>> constraints).
>>>>>>>>>>>>
>>>>>>>>>>>> Also, the current control-plane document allows to instruct a
>>>>>>>> loose
>>>>>>>>>>>> path
>>>>>>>>>>>> (SFP) or a strict path (RSP), etc.
>>>>>>>>>>>>
>>>>>>>>>>>> I fully agree that whether a full path is specified within a
>>>>>>>> domain
>>>>>>>> or
>>>>>>>>>>>> if it is deferred to SFFs is really deployment-specific.
>>>>>>>> Nevertheless,
>>>>>>>>>>>> the control plan should accommodate all these flavors.
>>>>>>>>>>>>
>>>>>>>>>>>> Cheers,
>>>>>>>>>>>> Med
>>>>>>>>>>>>
>>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] EnvoyÃ© :
>>>>>>>> vendredi
>>>>>>>>>>>>> 16 octobre 2015 14:04 Ã€ : Joel M. Halpern Cc : BOUCADAIR
>>>> Mohamed
>>>>>>>>>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>>>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc] #15
>>>>>>>>>>>>> (control-plane): Whether the control plane operates on SFC
>>>> IDs,
>>>>>>>> SFP
>>>>>>>>>> IDs, etc.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Joel,
>>>>>>>>>>>>>
>>>>>>>>>>>>> I concur.
>>>>>>>>>>>>>
>>>>>>>>>>>>> The data plane deal with paths, not chains.  The relationship
>>>> of
>>>>>>>>>>>>> paths to chains falls squarely in the control plane (or even
>>>>> more
>>>>>>>>>>>>> likely
>>>>>>>>>>>> "policy"
>>>>>>>>>>>>> plane) realm.  The specificity of the path is left to
>>>>>>>>>>>>> implementation, in the architecture draft, but that's
>>>> consistent
>>>>>>>>>>>>> with your position and provides the requisite functionality.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Paul
>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>>>>>>>>>> <jmh@joelhalpern.com>
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> As far as I can tell, there is nothing in the Service
>>>> Chaining
>>>>>>>>>>>>>> work that
>>>>>>>>>>>>> requires correlating service path IDs with service chain IDs
>>>>>>>> within
>>>>>>>>>>>>> the data plane.  Any such relationship exists entirely within
>>>>> the
>>>>>>>>>>>>> control plane or above, and would be driven by requirements
>>>>> other
>>>>>>>>>>>>> than the data plane.  When I look at this document, all of the
>>>>>>>>>>>>> requirements that talk about service function chain IDs can be
>>>>>>>>>>>>> accurately captured, in terms of data plane requirements, by
>>>>>>>> service
>>>>>>>>>> function path IDs.
>>>>>>>>>>>>> Thus, the requirement that the data plane has is to see such
>>>>> path
>>>>>>>> IDs.
>>>>>>>>>>>>> Yes, in some deployments those will be 1-1 with chain IDs.
>>>> They
>>>>>>>> are
>>>>>>>>>>>> still path IDs.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Introducing a requirement for the data plane to see and work
>>>>>>>> with
>>>>>>>>>>>>>> chain
>>>>>>>>>>>>> IDs is not grounded in the work of the group.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>>> Joel M. Halpern
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>>>>>>>>> Re-,
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> The control draft as it stands is compliant with the data
>>>>> plane
>>>>>>>>>>>>> architecture document.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>>>>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>>>>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>>>>>>>>>> (3) Some deployments may not impose any constraint on the
>>>>>>>>>>>>>>> abstract
>>>>>>>>>>>> SFC
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> sfc mailing list
>>>>>>>>>>> sfc@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>


From nobody Mon Nov 23 07:51:16 2015
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 317761A8907 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 07:51:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4L0dDen2CCcD for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 07:51:13 -0800 (PST)
Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com [IPv6:2a00:1450:400c:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4D7A1A8909 for <sfc@ietf.org>; Mon, 23 Nov 2015 07:51:12 -0800 (PST)
Received: by wmww144 with SMTP id w144so102116958wmw.1 for <sfc@ietf.org>; Mon, 23 Nov 2015 07:51:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=2Mh4/ErJw8Zj8ZwCukU7dBZF//WIXLrEVjeDgYfzP0U=; b=soshlIbSEBAwK+KIoHEQMTAN2ViM+ctOjNE3g2oZnQSIbbEvXDW8+q1ofz11CtCI1d SkmiYvXPRGbxUiyMqUzwMPGE+h2J758RUoeUYTexaezRAAhYIWgnDxR3VKF9IlorvTJx Fa+XdxclHF7Db/6nv0jHCxWWwgOfTzIzNP7c84KqnCOW1vMXkM13CshwNh1JXb7iD28a wC0ZDW55P7Q4UWtTIXaXQKm1wBjEaQlWJoqwDAMDpdN900ooaIlkGht5jL1Ib0NxcIrA u/8WXQrUPYZJCIkYkOQViMVE83OWeXtndIcEhoVmE9zRc40w2X0cTEEUHL35QG3nO5ge Hlzg==
X-Received: by 10.194.23.73 with SMTP id k9mr21942375wjf.3.1448293871234; Mon, 23 Nov 2015 07:51:11 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.148.208 with HTTP; Mon, 23 Nov 2015 07:50:51 -0800 (PST)
In-Reply-To: <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com> <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Mon, 23 Nov 2015 10:50:51 -0500
Message-ID: <CAA=duU0UvERU3-YE2EFT-kOExHWgLesSERRAkox0Ji1V28nNdQ@mail.gmail.com>
To: "Bottorff, Paul" <paul.bottorff@hpe.com>
Content-Type: multipart/alternative; boundary=047d7b5d4396b9b6e80525373158
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/IDKYVyACIzljZahHP3bFNu4Z9AY>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, Linda Dunbar <linda.dunbar@huawei.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>, Qin Wu <bill.wu@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 15:51:15 -0000

--047d7b5d4396b9b6e80525373158
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I agree with Paul B. that interoperability is best served by using a header
that accommodates the greatest number of possible applications and use
cases as the common denominator. This argues for type 2 being the MUST to
implement, with type 1 being an optional optimization for some particular
use cases or applications that require at most a particular number context
headers.

In a separate email, Med asked a very reasonable question - for type 1, why
are there four mandatory context headers, rather than 2, 3, 5, 10, etc.?
The draft contains no particular justification for this choice.

It=E2=80=99s true that there are two particular use
cases, draft-guichard-sfc-nsh-dc-allocation
and draft-napper-sfc-nsh-mobility-allocation, that look to make good use of
exactly 4 context headers. However, these are just two particular examples,
and not yet accepted by the WG.  Further development of these drafts, or
even implementation, may show that four are insufficient.

Cheers,
Andy


On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul <paul.bottorff@hpe.com>
wrote:

> I think we all could agree that fixed headers are easier to implement tha=
n
> TLVs, however that does not rationalize mandating a fixed header
> implementation. It would rationalize supporting only fixed length headers=
,
> however we have been unable to do this. Options always weaken standards
> agreement.
>
>
>
> If the application requires TLVs, then it does not provide any standards
> advantage to mandate support for fixed headers. It will not be possible f=
or
> an application that requires TLVs to fall back to fixed length headers. I=
f
> they could, then we should eliminate the TLV option from NSH.
>
>
>
> IMHO we should be looking at the abstract semantics for meta-data before
> we consider how to encode it. Once we decide what needs to be encoded the=
n
> we can consider the best encodings and what should be mandatory or
> optional.
>
>
>
> Cheers,
>
>
>
> Paul
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Paul Quinn
> (paulq)
> *Sent:* Friday, November 20, 2015 6:27 AM
> *To:* Qin Wu
> *Cc:* uri.elzur@intel.com; Dolganow, Andrew (Andrew); sfc@ietf.org; Linda
> Dunbar
> *Subject:* Re: [sfc] NSH context headers: fixed/tlv
>
>
>
>
>
> On Nov 19, 2015, at 9:28 PM, Qin Wu <bill.wu@huawei.com> wrote:
>
>
>
> Hi, Andrew and Paul:
>
> It looks I missed a lot of discussion regarding NSH context header in the
> past, thanks Paul to point me the archive.
>
> Generally speaking, there is tradeoff between performance and flexibility=
.
>
>
>
>
>
> Absolutely, and that's the reason for offering the two options: balance
> speed/simplicity and flexibility.
>
>
>
> The philosophy is to mandate the simplest form of metadata, enabling a
> broad implementation base.  If/when more flexibility is needed a more
> flexible NSH type is available, along with the associated tradeoffs.
> That's the balance that we decided to strike and it seems to be reasonabl=
e
> and well accepted.
>
>
>
> Thanks,
>
> Paul
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>

--047d7b5d4396b9b6e80525373158
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I agree with Paul B. that interoperability is best served =
by using a header that accommodates the greatest number of possible applica=
tions and use cases as the common denominator. This argues for type 2 being=
 the MUST to implement, with type 1 being an optional optimization for some=
 particular use cases or applications that require at most a particular num=
ber context headers.<div><br></div><div>In a separate email, Med asked a ve=
ry reasonable question - for type 1, why are there=C2=A0four mandatory cont=
ext headers, rather than 2, 3, 5, 10, etc.? The draft contains no particula=
r justification for this choice.</div><div><br></div><div>It=E2=80=99s true=
 that there are two particular use cases,=C2=A0draft-guichard-sfc-nsh-dc-al=
location and=C2=A0draft-napper-sfc-nsh-mobility-allocation, that look to ma=
ke good use of exactly 4 context headers. However, these are just two parti=
cular examples, and not yet accepted by the WG.=C2=A0 Further development o=
f these drafts, or even implementation, may show that four are insufficient=
.</div><div><br></div><div>Cheers,</div><div>Andy</div><div><br></div></div=
><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Fri, Nov 20, =
2015 at 12:20 PM, Bottorff, Paul <span dir=3D"ltr">&lt;<a href=3D"mailto:pa=
ul.bottorff@hpe.com" target=3D"_blank">paul.bottorff@hpe.com</a>&gt;</span>=
 wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">I think we all could a=
gree that fixed headers are easier to implement than TLVs, however that doe=
s not rationalize mandating a fixed header implementation. It would rationa=
lize supporting only fixed length headers,
 however we have been unable to do this. Options always weaken standards ag=
reement.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">If the application req=
uires TLVs, then it does not provide any standards advantage to mandate sup=
port for fixed headers. It will not be possible for an application that req=
uires TLVs to fall back to fixed length
 headers. If they could, then we should eliminate the TLV option from NSH. =
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">IMHO we should be look=
ing at the abstract semantics for meta-data before we consider how to encod=
e it. Once we decide what needs to be encoded then we can consider the best=
 encodings and what should be mandatory
 or optional. <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">Cheers,<u></u><u></u><=
/span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">Paul <u></u><u></u></s=
pan></p>
<div>
<div style=3D"border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:<a href=3D"mailto:sfc-bounc=
es@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>] <b>On Behalf Of
</b>Paul Quinn (paulq)<br>
<b>Sent:</b> Friday, November 20, 2015 6:27 AM<br>
<b>To:</b> Qin Wu<br>
<b>Cc:</b> <a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elz=
ur@intel.com</a>; Dolganow, Andrew (Andrew); <a href=3D"mailto:sfc@ietf.org=
" target=3D"_blank">sfc@ietf.org</a>; Linda Dunbar<br>
<b>Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u></u><u></u></p>
</div>
</div><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt"><u></u>=C2=A0<u></u=
></span></p>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">On Nov 19, 2015, at 9:28 PM, Qin Wu &lt;<a href=3D"m=
ailto:bill.wu@huawei.com" target=3D"_blank">bill.wu@huawei.com</a>&gt; wrot=
e:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1f497d">Hi, A=
ndrew and Paul:</span><span><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1f497d">It lo=
oks I missed a lot of discussion regarding NSH context header in the past, =
thanks Paul to point me the archive.</span><span><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1f497d">Gener=
ally speaking, there is tradeoff between performance and flexibility.</span=
><span><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:#1f497d">=C2=
=A0</span><span><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif"><u></u>=C2=A0<u></u></span></p>
</div>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif">Absolutely, and that&#39;s the reason for offeri=
ng the two options: balance speed/simplicity and flexibility.<u></u><u></u>=
</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif">The philosophy is to mandate the simplest form o=
f metadata, enabling a broad implementation base.=C2=A0 If/when more flexib=
ility is needed a more flexible NSH type is available,
 along with the associated tradeoffs.=C2=A0 That&#39;s the balance that we =
decided to strike and it seems to be reasonable and well accepted.<u></u><u=
></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif">Thanks,<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif">Paul<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif"><u></u>=C2=A0<u></u></span></p>
</div>
</div></div></div>
</div>

<br>_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br></blockquote></div><br></div>

--047d7b5d4396b9b6e80525373158--


From nobody Mon Nov 23 08:31:26 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADADF1A8A6A for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 08:31:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.185
X-Spam-Level: 
X-Spam-Status: No, score=-3.185 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WoT_I6r8rqKI for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 08:31:24 -0800 (PST)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id CE9271A8A62 for <sfc@ietf.org>; Mon, 23 Nov 2015 08:31:23 -0800 (PST)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([fe80::ac6b:cc1e:f2ff:93aa%18]) with mapi id 14.03.0195.001; Mon, 23 Nov 2015 11:31:23 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH: RSP open item
Thread-Index: AQHRJTfNwS9raGPDEUqKf86XkpwNZJ6olfGAgAE2yBA=
Date: Mon, 23 Nov 2015 16:31:24 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com>
References: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com> <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com>
In-Reply-To: <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PuW6eeTK0v1NlyOGmNDE7vFGLAA>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 16:31:25 -0000

I think a flow ID is useful to have around as a key to select from a choice=
 of next hops, but I wouldn't want to see it MUST be used.
I believe there are many cases when deeper analysis of the traffic can make=
 a better decision, or may be stateful.

A fairly obvious example is when a vendor provides a load-balancer to accom=
pany their service functions, using a proprietary SF-selection.
I don't think it is reasonable to expect an up-stream classifier to know th=
e load-balancing requirements.

-Dave


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ron Parker
Sent: Sunday, November 22, 2015 11:53 AM
To: Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: Re: [sfc] NSH: RSP open item

I'm in agreement with this approach.  However some of the terminology aroun=
d SFPID is confusing, especially where part of the SFPID's role is to "sele=
ct the next hops", as stated below.  The phrase is certainly truthful, but =
perhaps inadequate.   When considering a loosely specified approach with al=
lowed late binding, the phrase would be more evocative as "select the eligi=
ble next hops (I.e., one or more service function instances for each abstra=
ct service function specified in the chain)".  This would allow for another=
 explanatory sentence that makes it explicit that in some deployments, ther=
e may be exactly one eligible service function instance in each position of=
 the chain to satisfy the SFP (i.e. Strictly specified).=20

   Ron

> On Nov 22, 2015, at 10:09 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> SFCers,
>=20
> We need resolve the concept of the RSPID that's been discussed on list, a=
nd listed in the NSH draft as an "open item".  Currently, NSH specifies a s=
ervice path ID which is used to i) identify the service path, ii) select th=
e required overlay encap + next hops.  The arch and the NSH drafts do not s=
pecify the granularity of the path ID: it can represent as specific a path =
as the control plane wants to assign.  In the current open source implement=
ation, we've been using it as an explicit indication of which SFF and SFs a=
re composed to create a path.
>=20
> Having said that, I know some folks have presented a case where further g=
ranularity might be required: an explicit indication of specific instances =
within the scope of a SFP.  I think we have a  solution for each NSH MD Typ=
e, although we might have slightly different terminology, the desired funct=
ionality will be equivalent:
>=20
> MD-type 1: As you know the metadata in type 1 is opaque, so in theory an =
implementation could assign any additional identifiers to the metadata.  Th=
ere are also a couple of drafts that provide allocation guidelines, the dat=
a center one specifically allows for an additional identifier -- a flow ID =
of sorts -- that can be used for dataplane granularity.
>=20
> MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.=
org/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.=
  This can be used, as needed, within the dataplane to further identify a f=
low, and therefore be used for specific instance selection, load balancing =
and such.
>=20
> So, given these two options, I think we can, with the existing drafts, pr=
ovide the needed functionality for the RSPID use cases.  If we get consensu=
s, we can update NSH accordingly so please weigh in, on list, as needed.
>=20
> Thanks
> Paul
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Nov 23 09:20:09 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5F6F1A916F for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 09:20:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ToFisJyCGy5Y for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 09:20:06 -0800 (PST)
Received: from hub021-ca-3.exch021.serverdata.net (hub021-ca-3.exch021.serverdata.net [64.78.22.170]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 974AC1A916D for <sfc@ietf.org>; Mon, 23 Nov 2015 09:20:06 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-3.exch021.domain.local ([10.254.4.36]) with mapi id 14.03.0224.002;  Mon, 23 Nov 2015 09:20:06 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Dave Dolson <ddolson@sandvine.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH: RSP open item
Thread-Index: AQHRJUZHJepkeKscxU+YywTFucRfPZ6qVFgA//+GrTA=
Date: Mon, 23 Nov 2015 17:20:05 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E9608AA@MBX021-W3-CA-2.exch021.domain.local>
References: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com> <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com> <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/EWiN23mF71Ny60679yPdPF5Mpto>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 17:20:08 -0000

Agree that this is an optional attribute, but also that it could be very us=
eful.  =20

For example, the classifier can determine on what granularity a "macro-flow=
" is identified and consequently stamped with a unique "flow ID".   This is=
 extremely useful if the classifier understands "subscribers" and can facil=
itate the late-binding style of load balancing such that all flows from a p=
articular subscriber are processed by the exact same set of service functio=
n instances (barring failures, of course).

    Ron


-----Original Message-----
From: Dave Dolson [mailto:ddolson@sandvine.com]=20
Sent: Monday, November 23, 2015 11:31 AM
To: Ron Parker <Ron_Parker@affirmednetworks.com>; Paul Quinn (paulq) <paulq=
@cisco.com>
Cc: sfc@ietf.org
Subject: RE: [sfc] NSH: RSP open item

I think a flow ID is useful to have around as a key to select from a choice=
 of next hops, but I wouldn't want to see it MUST be used.
I believe there are many cases when deeper analysis of the traffic can make=
 a better decision, or may be stateful.

A fairly obvious example is when a vendor provides a load-balancer to accom=
pany their service functions, using a proprietary SF-selection.
I don't think it is reasonable to expect an up-stream classifier to know th=
e load-balancing requirements.

-Dave


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ron Parker
Sent: Sunday, November 22, 2015 11:53 AM
To: Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: Re: [sfc] NSH: RSP open item

I'm in agreement with this approach.  However some of the terminology aroun=
d SFPID is confusing, especially where part of the SFPID's role is to "sele=
ct the next hops", as stated below.  The phrase is certainly truthful, but =
perhaps inadequate.   When considering a loosely specified approach with al=
lowed late binding, the phrase would be more evocative as "select the eligi=
ble next hops (I.e., one or more service function instances for each abstra=
ct service function specified in the chain)".  This would allow for another=
 explanatory sentence that makes it explicit that in some deployments, ther=
e may be exactly one eligible service function instance in each position of=
 the chain to satisfy the SFP (i.e. Strictly specified).=20

   Ron

> On Nov 22, 2015, at 10:09 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> SFCers,
>=20
> We need resolve the concept of the RSPID that's been discussed on list, a=
nd listed in the NSH draft as an "open item".  Currently, NSH specifies a s=
ervice path ID which is used to i) identify the service path, ii) select th=
e required overlay encap + next hops.  The arch and the NSH drafts do not s=
pecify the granularity of the path ID: it can represent as specific a path =
as the control plane wants to assign.  In the current open source implement=
ation, we've been using it as an explicit indication of which SFF and SFs a=
re composed to create a path.
>=20
> Having said that, I know some folks have presented a case where further g=
ranularity might be required: an explicit indication of specific instances =
within the scope of a SFP.  I think we have a  solution for each NSH MD Typ=
e, although we might have slightly different terminology, the desired funct=
ionality will be equivalent:
>=20
> MD-type 1: As you know the metadata in type 1 is opaque, so in theory an =
implementation could assign any additional identifiers to the metadata.  Th=
ere are also a couple of drafts that provide allocation guidelines, the dat=
a center one specifically allows for an additional identifier -- a flow ID =
of sorts -- that can be used for dataplane granularity.
>=20
> MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.=
org/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.=
  This can be used, as needed, within the dataplane to further identify a f=
low, and therefore be used for specific instance selection, load balancing =
and such.
>=20
> So, given these two options, I think we can, with the existing drafts, pr=
ovide the needed functionality for the RSPID use cases.  If we get consensu=
s, we can update NSH accordingly so please weigh in, on list, as needed.
>=20
> Thanks
> Paul
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Nov 23 09:23:09 2015
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8A391A9245 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 09:23:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zBw1OAUknuK8 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 09:23:07 -0800 (PST)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 292F31A9244 for <sfc@ietf.org>; Mon, 23 Nov 2015 09:22:58 -0800 (PST)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-3.sandvine.com (192.168.196.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Mon, 23 Nov 2015 12:23:00 -0500
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Mon, 23 Nov 2015 12:22:57 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH: RSP open item
Thread-Index: AQHRJTfNwS9raGPDEUqKf86XkpwNZJ6olfGAgAE2yBCAAGMMgP//rHNQ
Date: Mon, 23 Nov 2015 17:22:59 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830DB7F3E@wtl-exchp-2.sandvine.com>
References: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com> <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com> <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E9608AA@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E9608AA@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/nAOfFVfNo_PnOCCppoNQxCzMchw>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 17:23:08 -0000

Yes, I think it has a lot of value.
Even when (optionally) present, however, I don't think it must be obeyed.


-----Original Message-----
From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]=20
Sent: Monday, November 23, 2015 12:20 PM
To: Dave Dolson; Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: RE: [sfc] NSH: RSP open item

Agree that this is an optional attribute, but also that it could be very us=
eful.  =20

For example, the classifier can determine on what granularity a "macro-flow=
" is identified and consequently stamped with a unique "flow ID".   This is=
 extremely useful if the classifier understands "subscribers" and can facil=
itate the late-binding style of load balancing such that all flows from a p=
articular subscriber are processed by the exact same set of service functio=
n instances (barring failures, of course).

    Ron


-----Original Message-----
From: Dave Dolson [mailto:ddolson@sandvine.com]=20
Sent: Monday, November 23, 2015 11:31 AM
To: Ron Parker <Ron_Parker@affirmednetworks.com>; Paul Quinn (paulq) <paulq=
@cisco.com>
Cc: sfc@ietf.org
Subject: RE: [sfc] NSH: RSP open item

I think a flow ID is useful to have around as a key to select from a choice=
 of next hops, but I wouldn't want to see it MUST be used.
I believe there are many cases when deeper analysis of the traffic can make=
 a better decision, or may be stateful.

A fairly obvious example is when a vendor provides a load-balancer to accom=
pany their service functions, using a proprietary SF-selection.
I don't think it is reasonable to expect an up-stream classifier to know th=
e load-balancing requirements.

-Dave


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ron Parker
Sent: Sunday, November 22, 2015 11:53 AM
To: Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: Re: [sfc] NSH: RSP open item

I'm in agreement with this approach.  However some of the terminology aroun=
d SFPID is confusing, especially where part of the SFPID's role is to "sele=
ct the next hops", as stated below.  The phrase is certainly truthful, but =
perhaps inadequate.   When considering a loosely specified approach with al=
lowed late binding, the phrase would be more evocative as "select the eligi=
ble next hops (I.e., one or more service function instances for each abstra=
ct service function specified in the chain)".  This would allow for another=
 explanatory sentence that makes it explicit that in some deployments, ther=
e may be exactly one eligible service function instance in each position of=
 the chain to satisfy the SFP (i.e. Strictly specified).=20

   Ron

> On Nov 22, 2015, at 10:09 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> SFCers,
>=20
> We need resolve the concept of the RSPID that's been discussed on list, a=
nd listed in the NSH draft as an "open item".  Currently, NSH specifies a s=
ervice path ID which is used to i) identify the service path, ii) select th=
e required overlay encap + next hops.  The arch and the NSH drafts do not s=
pecify the granularity of the path ID: it can represent as specific a path =
as the control plane wants to assign.  In the current open source implement=
ation, we've been using it as an explicit indication of which SFF and SFs a=
re composed to create a path.
>=20
> Having said that, I know some folks have presented a case where further g=
ranularity might be required: an explicit indication of specific instances =
within the scope of a SFP.  I think we have a  solution for each NSH MD Typ=
e, although we might have slightly different terminology, the desired funct=
ionality will be equivalent:
>=20
> MD-type 1: As you know the metadata in type 1 is opaque, so in theory an =
implementation could assign any additional identifiers to the metadata.  Th=
ere are also a couple of drafts that provide allocation guidelines, the dat=
a center one specifically allows for an additional identifier -- a flow ID =
of sorts -- that can be used for dataplane granularity.
>=20
> MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.=
org/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.=
  This can be used, as needed, within the dataplane to further identify a f=
low, and therefore be used for specific instance selection, load balancing =
and such.
>=20
> So, given these two options, I think we can, with the existing drafts, pr=
ovide the needed functionality for the RSPID use cases.  If we get consensu=
s, we can update NSH accordingly so please weigh in, on list, as needed.
>=20
> Thanks
> Paul
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Nov 23 09:25:33 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBA511A92B3 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 09:25:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ptvd33viORzH for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 09:25:29 -0800 (PST)
Received: from hub021-ca-6.exch021.serverdata.net (hub021-ca-6.exch021.serverdata.net [64.78.56.71]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 144E21A92B1 for <sfc@ietf.org>; Mon, 23 Nov 2015 09:25:29 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-6.exch021.domain.local ([10.254.4.92]) with mapi id 14.03.0224.002;  Mon, 23 Nov 2015 09:25:28 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Dave Dolson <ddolson@sandvine.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH: RSP open item
Thread-Index: AQHRJUZHJepkeKscxU+YywTFucRfPZ6qVFgA//+GrTCAAIe9gP//emug
Date: Mon, 23 Nov 2015 17:25:28 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E9608F4@MBX021-W3-CA-2.exch021.domain.local>
References: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com> <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com> <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E9608AA@MBX021-W3-CA-2.exch021.domain.local> <E8355113905631478EFF04F5AA706E9830DB7F3E@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DB7F3E@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AcVziXhmRstIkZxBxnjW5ZAenDY>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 17:25:31 -0000

Agree.   It is optional whether SFF consumes this value when present.

   Ron


-----Original Message-----
From: Dave Dolson [mailto:ddolson@sandvine.com]=20
Sent: Monday, November 23, 2015 12:23 PM
To: Ron Parker <Ron_Parker@affirmednetworks.com>; Paul Quinn (paulq) <paulq=
@cisco.com>
Cc: sfc@ietf.org
Subject: RE: [sfc] NSH: RSP open item

Yes, I think it has a lot of value.
Even when (optionally) present, however, I don't think it must be obeyed.


-----Original Message-----
From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]=20
Sent: Monday, November 23, 2015 12:20 PM
To: Dave Dolson; Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: RE: [sfc] NSH: RSP open item

Agree that this is an optional attribute, but also that it could be very us=
eful.  =20

For example, the classifier can determine on what granularity a "macro-flow=
" is identified and consequently stamped with a unique "flow ID".   This is=
 extremely useful if the classifier understands "subscribers" and can facil=
itate the late-binding style of load balancing such that all flows from a p=
articular subscriber are processed by the exact same set of service functio=
n instances (barring failures, of course).

    Ron


-----Original Message-----
From: Dave Dolson [mailto:ddolson@sandvine.com]=20
Sent: Monday, November 23, 2015 11:31 AM
To: Ron Parker <Ron_Parker@affirmednetworks.com>; Paul Quinn (paulq) <paulq=
@cisco.com>
Cc: sfc@ietf.org
Subject: RE: [sfc] NSH: RSP open item

I think a flow ID is useful to have around as a key to select from a choice=
 of next hops, but I wouldn't want to see it MUST be used.
I believe there are many cases when deeper analysis of the traffic can make=
 a better decision, or may be stateful.

A fairly obvious example is when a vendor provides a load-balancer to accom=
pany their service functions, using a proprietary SF-selection.
I don't think it is reasonable to expect an up-stream classifier to know th=
e load-balancing requirements.

-Dave


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ron Parker
Sent: Sunday, November 22, 2015 11:53 AM
To: Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: Re: [sfc] NSH: RSP open item

I'm in agreement with this approach.  However some of the terminology aroun=
d SFPID is confusing, especially where part of the SFPID's role is to "sele=
ct the next hops", as stated below.  The phrase is certainly truthful, but =
perhaps inadequate.   When considering a loosely specified approach with al=
lowed late binding, the phrase would be more evocative as "select the eligi=
ble next hops (I.e., one or more service function instances for each abstra=
ct service function specified in the chain)".  This would allow for another=
 explanatory sentence that makes it explicit that in some deployments, ther=
e may be exactly one eligible service function instance in each position of=
 the chain to satisfy the SFP (i.e. Strictly specified).=20

   Ron

> On Nov 22, 2015, at 10:09 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> SFCers,
>=20
> We need resolve the concept of the RSPID that's been discussed on list, a=
nd listed in the NSH draft as an "open item".  Currently, NSH specifies a s=
ervice path ID which is used to i) identify the service path, ii) select th=
e required overlay encap + next hops.  The arch and the NSH drafts do not s=
pecify the granularity of the path ID: it can represent as specific a path =
as the control plane wants to assign.  In the current open source implement=
ation, we've been using it as an explicit indication of which SFF and SFs a=
re composed to create a path.
>=20
> Having said that, I know some folks have presented a case where further g=
ranularity might be required: an explicit indication of specific instances =
within the scope of a SFP.  I think we have a  solution for each NSH MD Typ=
e, although we might have slightly different terminology, the desired funct=
ionality will be equivalent:
>=20
> MD-type 1: As you know the metadata in type 1 is opaque, so in theory an =
implementation could assign any additional identifiers to the metadata.  Th=
ere are also a couple of drafts that provide allocation guidelines, the dat=
a center one specifically allows for an additional identifier -- a flow ID =
of sorts -- that can be used for dataplane granularity.
>=20
> MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.=
org/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.=
  This can be used, as needed, within the dataplane to further identify a f=
low, and therefore be used for specific instance selection, load balancing =
and such.
>=20
> So, given these two options, I think we can, with the existing drafts, pr=
ovide the needed functionality for the RSPID use cases.  If we get consensu=
s, we can update NSH accordingly so please weigh in, on list, as needed.
>=20
> Thanks
> Paul
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Nov 23 10:57:52 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAF491ACDE5 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 10:57:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id juwc-Ao2MYN2 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 10:57:38 -0800 (PST)
Received: from g2t2353.austin.hp.com (g2t2353.austin.hp.com [15.217.128.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2048E1ACDD5 for <sfc@ietf.org>; Mon, 23 Nov 2015 10:57:38 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g2t2353.austin.hp.com (Postfix) with ESMTPS id 5C9CD5F; Mon, 23 Nov 2015 18:57:37 +0000 (UTC)
Received: from G2W4313.americas.hpqcorp.net (16.197.24.255) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Mon, 23 Nov 2015 18:57:06 +0000
Received: from G1W3656.americas.hpqcorp.net ([169.254.3.159]) by G2W4313.americas.hpqcorp.net ([16.197.24.255]) with mapi id 14.03.0169.001; Mon, 23 Nov 2015 18:57:06 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Dave Dolson <ddolson@sandvine.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] NSH: RSP open item
Thread-Index: AQHRJTfNwS9raGPDEUqKf86XkpwNZJ6oQh+AgAGMOgCAACGlwA==
Date: Mon, 23 Nov 2015 18:57:05 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254AC0A8@G1W3656.americas.hpqcorp.net>
References: <32E21273-F3FC-4D7E-9CBB-C213E29ED0B6@cisco.com> <0E02A6BB-FC36-4B92-875F-0E2F8CA10127@affirmednetworks.com> <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830DB7A6D@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.192.129.45]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/R99ywWL41vRpy_Q4UvCN31mYJQE>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] NSH: RSP open item
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 18:57:43 -0000

Hi Dave:

I believe a flow ID is desirable. I also agree that the classifier may not =
always provide sufficient flow analysis for LB operations. Your example of =
a SF specific LB is well taken.

I don't see how the existence of a flow ID in the meta-data mandates that i=
t is always used for directing packets to specific SF instances along the p=
ath. If the NSH MUST have a flow ID it doesn't limit a SF specific LB from =
using other information for the LB decision. What a MUST have a flow ID doe=
s is assure that simple LBs can rely on having a flow ID.

We should consider that other transport fields may also carry a flow ID. It=
 seems to me we have been mixing both transport and meta-data in the NSH he=
ader. Particularly the SPI, SI and RSP together form a transport address.

Cheers,

Paul

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Monday, November 23, 2015 8:31 AM
To: Ron Parker; Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: Re: [sfc] NSH: RSP open item

I think a flow ID is useful to have around as a key to select from a choice=
 of next hops, but I wouldn't want to see it MUST be used.
I believe there are many cases when deeper analysis of the traffic can make=
 a better decision, or may be stateful.

A fairly obvious example is when a vendor provides a load-balancer to accom=
pany their service functions, using a proprietary SF-selection.
I don't think it is reasonable to expect an up-stream classifier to know th=
e load-balancing requirements.

-Dave


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Ron Parker
Sent: Sunday, November 22, 2015 11:53 AM
To: Paul Quinn (paulq)
Cc: sfc@ietf.org
Subject: Re: [sfc] NSH: RSP open item

I'm in agreement with this approach.  However some of the terminology aroun=
d SFPID is confusing, especially where part of the SFPID's role is to "sele=
ct the next hops", as stated below.  The phrase is certainly truthful, but =
perhaps inadequate.   When considering a loosely specified approach with al=
lowed late binding, the phrase would be more evocative as "select the eligi=
ble next hops (I.e., one or more service function instances for each abstra=
ct service function specified in the chain)".  This would allow for another=
 explanatory sentence that makes it explicit that in some deployments, ther=
e may be exactly one eligible service function instance in each position of=
 the chain to satisfy the SFP (i.e. Strictly specified).=20

   Ron

> On Nov 22, 2015, at 10:09 AM, Paul Quinn (paulq) <paulq@cisco.com> wrote:
>=20
> SFCers,
>=20
> We need resolve the concept of the RSPID that's been discussed on list, a=
nd listed in the NSH draft as an "open item".  Currently, NSH specifies a s=
ervice path ID which is used to i) identify the service path, ii) select th=
e required overlay encap + next hops.  The arch and the NSH drafts do not s=
pecify the granularity of the path ID: it can represent as specific a path =
as the control plane wants to assign.  In the current open source implement=
ation, we've been using it as an explicit indication of which SFF and SFs a=
re composed to create a path.
>=20
> Having said that, I know some folks have presented a case where further g=
ranularity might be required: an explicit indication of specific instances =
within the scope of a SFP.  I think we have a  solution for each NSH MD Typ=
e, although we might have slightly different terminology, the desired funct=
ionality will be equivalent:
>=20
> MD-type 1: As you know the metadata in type 1 is opaque, so in theory an =
implementation could assign any additional identifiers to the metadata.  Th=
ere are also a couple of drafts that provide allocation guidelines, the dat=
a center one specifically allows for an additional identifier -- a flow ID =
of sorts -- that can be used for dataplane granularity.
>=20
> MD-type 2:  As per the recently submitted draft (http://datatracker.ietf.=
org/doc/draft-quinn-sfc-nsh-tlv/), a flow id specific TLV has been defined.=
  This can be used, as needed, within the dataplane to further identify a f=
low, and therefore be used for specific instance selection, load balancing =
and such.
>=20
> So, given these two options, I think we can, with the existing drafts, pr=
ovide the needed functionality for the RSPID use cases.  If we get consensu=
s, we can update NSH accordingly so please weigh in, on list, as needed.
>=20
> Thanks
> Paul
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Nov 23 13:40:12 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D00A1B34C7 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 13:40:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VEF_1Ji7YZsT for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 13:40:06 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20B271B3453 for <sfc@ietf.org>; Mon, 23 Nov 2015 13:40:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=29444; q=dns/txt; s=iport; t=1448314806; x=1449524406; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=3uFFKINsPlcjUMQnMvl6uGs5dufazC7eHalrdSLUNJI=; b=FODPKMMrUp0fVQJAX0S0CT9upI+c5kQ/oZ5N2gH8d0dZHw8wQf3BvBv0 NhJAfSao92kcKP7m3Go3dKsUMLgGNt1u/BFy/W1XcmBDeaBoU6YHP4Msb tGnqY2E4PMsBCEXyO3qLCjgZFMQo+vheOapblRBk4Rwc4ndyW1AJ08Vnb 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D/AQBEh1NW/51dJa1egztTbwa/GAENg?= =?us-ascii?q?WIDFwqFbgIcgS04FAEBAQEBAQF/C4Q0AQEBBAEBARcJEToEBwwEAgEGAhEBAgE?= =?us-ascii?q?BAQECAiMDAgICJQsUAQIGCAIEDgUbiBMNkWSdNZAhAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBFASBAYVThH6EWRiDBIFEAQSNHokyAYgVhRuBW4RAkj6DcQEfAQFCghE?= =?us-ascii?q?dFoFAcoQkgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,338,1444694400"; d="scan'208";a="53018146"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Nov 2015 21:40:04 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id tANLe40A005465 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 23 Nov 2015 21:40:04 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 23 Nov 2015 15:40:03 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Mon, 23 Nov 2015 15:40:03 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAYb6gCAAKICgA==
Date: Mon, 23 Nov 2015 21:40:03 +0000
Message-ID: <D278F107.3228F%jguichar@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.180]
Content-Type: text/plain; charset="utf-8"
Content-ID: <77B4C4FC3274F14CAD63B108F64660B4@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/X55kRe6OIgPTP-FBvqCnwAgYQ3s>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 21:40:10 -0000
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From nobody Mon Nov 23 13:59:30 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 087E21B3AB3 for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 13:59:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PujspjruxwlW for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 13:59:24 -0800 (PST)
Received: from hub021-ca-2.exch021.serverdata.net (hub021-ca-2.exch021.serverdata.net [64.78.22.169]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A7711B3515 for <sfc@ietf.org>; Mon, 23 Nov 2015 13:59:24 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-2.exch021.domain.local ([10.254.4.33]) with mapi id 14.03.0224.002;  Mon, 23 Nov 2015 13:59:24 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+CAAI54gIAAA+EAgAAA+ACAAVwAgIAAJjmAgAAYMoCAAAgQAIAABEEAgAAQWwCAAQMyAIAAdI2AgAXIFwCAAPXggP//fp+A
Date: Mon, 23 Nov 2015 21:59:23 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B2E960C83@MBX021-W3-CA-2.exch021.domain.local>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com>
In-Reply-To: <D278F107.3228F%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/gkgrSvOXR1qI5fRmzF-6XLlB6WI>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 21:59:29 -0000

SGksIEppbS4NCg0KSW4gdGhlIGNhc2Ugb2YgbGF0ZS1iaW5kaW5nIG9mIGxvYWQgYmFsYW5jaW5n
IGRlY2lzaW9ucywgSSB3b3VsZCBtb2RpZnkgdGhlIHNlbnRlbmNlIHRvIGJlOg0KDQpGb3J3YXJk
aW5nIGlzIHJlYWxpemVkIGJ5IHRoZSByZXN1bHQgb2YgdGhlIGxvb2t1cCBvbiB0aGUgU0ZQLWlk
IGFuZCB0aGUgZmxvdy1pZCBhbmQvb3IgY2hhcmFjdGVyaXN0aWNzIHdpdGhpbiB0aGUgb3JpZ2lu
YWwvY2FycmllZCBwYWNrZXQgc3VjaCBhcyBpdHMgNS10dXBsZS4NCg0KICAgUm9uDQoNCg0KLS0t
LS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGll
dGYub3JnXSBPbiBCZWhhbGYgT2YgSmltIEd1aWNoYXJkIChqZ3VpY2hhcikNClNlbnQ6IE1vbmRh
eSwgTm92ZW1iZXIgMjMsIDIwMTUgNDo0MCBQTQ0KVG86IG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5n
ZS5jb20NCkNjOiBzZmMgaXNzdWUgdHJhY2tlciA8dHJhYytzZmNAdG9vbHMuaWV0Zi5vcmc+OyBz
ZmNAaWV0Zi5vcmcNClN1YmplY3Q6IFJlOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0
aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVzIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4N
Cg0KSGkgTWVkLA0KDQpJIHRoaW5rIHRoZSBwb2ludCBpcyB0aGF0IHRoZSBTRlAtaWQgKG5vdCBT
RkMtaWQgb3IgYW55IG90aGVyIGlkKSBpcyB1c2VkIGFzIHRoZSBsb29rdXAga2V5IHRvIGRldGVy
bWluZSBmb3J3YXJkaW5nIGFjdGlvbiByZWdhcmRsZXNzIG9mIHdoZXRoZXIgdGhlIFNGQyBpcyBm
dWxseSBjb25zdHJhaW5lZCwgcGFydGlhbGx5IGNvbnN0cmFpbmVkLCBvciBub3QgY29uc3RyYWlu
ZWQgYXQgYWxsLiBGb3J3YXJkaW5nIGlzIHNpbXBseSByZWFsaXplZCBieSB0aGUgcmVzdWx0IG9m
IHRoZSBsb29rdXAgb24gdGhlIFNGUC1pZC4gDQoNCkppbQ0KDQpPbiAxMS8yMy8xNSwgMjowMCBB
TSwgIm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20iDQo8bW9oYW1lZC5ib3VjYWRhaXJAb3Jh
bmdlLmNvbT4gd3JvdGU6DQoNCj5IaSBKaW0sDQo+DQo+VGhlIGV4Y2VycHQgeW91IHF1b3RlZCBp
cyBjbGVhciB0byBtZSB0b28uIFRoaXMgaXMgbm90IHdoZXJlIHRoZSANCj5kaXNjb25uZWN0IGNv
bWVzIGZyb20uDQo+DQo+VGhlIGNhc2Ugb2YgUlNQIGlzIGFsc28gY2xlYXIuDQo+DQo+VGhlIG9u
ZSB3aGljaCBpcyBsZXNzIGNsZWFyIGlzIHdoZW4gdGhlcmUgYXJlIG5vIGNvbnN0cmFpbnRzIG9u
IHRoZSBzZmMgDQo+YW5kLCB1c2luZyB0aGUgd29yZGluZyBmcm9tIHRoZSBkcCBhcmNoIFJGQywg
dGhlIGRlY2lzaW9ucyBhcmUgDQo+ImRlZmVycmVkIHRvIHRoZSBTRkYgYWJvdXQgdGhlIGV4YWN0
IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gDQo+cmVhbGl6ZSB0aGUgU0ZDIiAoU2Vj
dGlvbiAyLjMgb2YgUkZDIDc2NjUpLiBDYWxsaW5nIHRoYXQgY2FzZSBhbiBTRlAgaXMgDQo+b2Rk
IHNpbmNlIFNGUCBpcyBieSBkZWZpbml0aW9uIGEgInRob3VnaHQgb2YgYXMgYSBjb25zdHJhaW5l
ZCB2ZXJzaW9uIA0KPm9mIHRoZSBvcmlnaW5hbCBTRkMiIChTZWN0aW9uIDIuMyBvZiBSRkMgNzY2
NSkNCj4NCj5SRkM3NjY1IGFsc28gQUNLcyAidGhlIHNwZWNpZmljaXR5IG1heSBiZSBhbnl3aGVy
ZSBpbiBiZXR3ZWVuIHRoZXNlIA0KPmV4dHJlbWVzIiB3aGljaCBJIHVuZGVyc3RhbmQgYXMgdGhl
IGFyY2hpdGVjdHVyZSBhbGxvd3MgZm9yIHRoZXNlDQo+Y29uZmlndXJhdGlvbnM6ICgxKSBmdWxs
eSBkaXN0cmlidXRlZCwgKDIpIGxvb3NlIHBhdGgsICgzKSBzdHJpY3QgcGF0aC4NCj4NCj5DaGVl
cnMsDQo+TWVkDQo+DQo+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+IERlIDogSmlt
IEd1aWNoYXJkIChqZ3VpY2hhcikgW21haWx0bzpqZ3VpY2hhckBjaXNjby5jb21dICBFbnZvecOp
IDogDQo+PmpldWRpIDE5IG5vdmVtYnJlIDIwMTUgMTU6NDMgIMOAIDogQk9VQ0FEQUlSIE1vaGFt
ZWQgSU1UL09MTiAgQ2MgOiBzZmMgDQo+Pmlzc3VlIHRyYWNrZXI7IHNmY0BpZXRmLm9yZzsgSm9l
bCBIYWxwZXJuOyBKb2VsIE0uIEhhbHBlcm4gIE9iamV0IDogDQo+PlJlOiBbc2ZjXSAjMTUgKGNv
bnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5lIG9wZXJhdGVzICBvbiANCj4+
U0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gDQo+PiBIaSBNZWQsDQo+PiANCj4+IE9uIDExLzE5
LzE1LCAyOjQ1IEFNLCAibW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbSINCj4+IDxtb2hhbWVk
LmJvdWNhZGFpckBvcmFuZ2UuY29tPiB3cm90ZToNCj4+IA0KPj4gPkhpIEppbSwNCj4+ID4NCj4+
ID5MZXQncyBtZSByZXBocmFzZSB0aGUgaXNzdWUuDQo+PiA+DQo+PiA+V2hhdCB3ZSBhcmUgZGlz
Y3Vzc2luZyBpcyByZWxhdGVkIHRvIHRoaXMgcGFydCBvZiB0aGUgZHJhZnQgKGFuZCANCj4+ID5z
b21lIG90aGVyIG9jY3VycmVuY2VzKToNCj4+ID4NCj4+ID49PT09PT0NCj4+ID4gICBvICBTRkMg
Rm9yd2FyZGluZyBQb2xpY3kgVGFibGU6IHRoaXMgdGFibGUgcmVmbGVjdHMgdGhlIFNGQy1zcGVj
aWZpYw0KPj4gPiAgICAgIHRyYWZmaWMgZm9yd2FyZGluZyBwb2xpY3kgZW5mb3JjZWQgYnkgU0ZG
IGNvbXBvbmVudHMgZm9yIGV2ZXJ5DQo+PiA+ICAgICAgcmVsZXZhbnQgaW5jb21pbmcgcGFja2V0
IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBvbmUgb2YgdGhlDQo+PmV4aXN0aW5nDQo+PiA+ICAgICAg
U0ZDcy4NCj4+ID4NCj4+ID4gICAgICAgICBbW05vdGU6IFRoZSBxdWVzdGlvbiBvZiB3aGV0aGVy
IHRoZSBkYXRhIHBsYW5lIG9wZXJhdGVzIA0KPj4gPiBqdXN0DQo+PmluDQo+PiA+ICAgICAgICAg
dGVybXMgb2YgU0ZQIElEcyBvciBuZWVkcyBTRkMgSURzLCBhcyBkZXNjcmliZWQgaW4gdGhpcw0K
Pj52ZXJzaW9uDQo+PiA+ICAgICAgICAgb2YgdGhlIGRyYWZ0LCBpcyBzdGlsbCB1bmRlciBkaXNj
dXNzaW9uIGFtb25nIHRoZSANCj4+ID5hdXRob3JzLl1dID09PT09PT0NCj4+ID4NCj4+ID5UaGUg
Y3VycmVudCBkcmFmdCBpcyBnZW5lcmljIGFzIGl0IGFsbG93cyB0byBpbnN0cnVjdCB2aWEgdGhl
IGNwIA0KPj4gPmludGVyZmFjZXMgdGhlIHVuZGVybHlpbmcgZHAgZWxlbWVudHMgd2l0aCBTRkMs
IFNGUCwgUlNQLCBhbmQgb3RoZXIgDQo+PiA+cG9saWNpZXMuIFdoZW4gcHJlcGFyaW5nIHRoZSBk
cmFmdCwgSSBoYWQgYSBkaXNjdXNzaW9uIHdpdGggSm9lbCANCj4+ID5hYm91dCB0aGlzIGRlc2ln
bi4gV2UgYm90aCBhZ3JlZWQgdGhhdCB0aGlzIGlzIHdvcnRoIHRvIGJlIGRpc2N1c3NlZC4NCj4+
ID4NCj4+ID5JIGV4cGxhaW5lZCwgYW5kIG90aGVyIGhhdmUgZG9uZSB0aGF0IHRvbywgdGhhdCBi
b3RoIG1vZGVscyBzaG91bGQgDQo+PiA+YmUgYWRkcmVzc2VkLg0KPj4gPg0KPj4gPlRoZSBkaXNj
dXNzaW9uIHJldmVhbGVkIHRoZSBkZWZpbml0aW9uIGluIHRoZSBkcCBSRkMgYXJlIHRvbyB2YWd1
ZS4gDQo+PiA+V2UgbmVlZCB0byByZXNvbHZlIHRoYXQgYXMgV0cuDQo+PiANCj4+IEppbT4gd2hp
Y2ggZG9jdW1lbnQgYW5kIHdoYXQgZXhhY3RseSBpcyB0b28gdmFndWU/IEZvciBleGFtcGxlIGlm
IHdlDQo+PnJlZmVyDQo+PiB0byBzZWN0aW9uIDIuMy4xIG9mIFJGQzc2NjUgaXQgc3RhdGVzOg0K
Pj4gDQo+PiAiQXMgYW4gZXhhbXBsZSBvZiB0aGlzIHByb2dyZXNzaXZlIHJlZmluZW1lbnQsIGNv
bnNpZGVyIGEgU2VydmljZQ0KPj4gICAgRnVuY3Rpb24gQ2hhaW4gKFNGQykgdGhhdCBzdGF0ZXMg
dGhhdCBwYWNrZXRzIHVzaW5nIHRoaXMgY2hhaW4gc2hvdWxkDQo+PiAgICBiZSBkZWxpdmVyZWQg
dG8gYSBmaXJld2FsbCBhbmQgYSBjYWNoaW5nIGVuZ2luZS4NCj4+IA0KPj4gICAgQSBTZXJ2aWNl
IEZ1bmN0aW9uIFBhdGggKFNGUCkgY291bGQgcmVmaW5lIHRoaXMsIGNvbnNpZGVyaW5nIHRoYXQN
Cj4+ICAgIHRoaXMgYXJjaGl0ZWN0dXJlIGRvZXMgbm90IG1hbmRhdGUgdGhlIGRlZ3JlZSBvZiBz
cGVjaWZpY2l0eSBhbiBTRlANCj4+ICAgIGhhcyB0byBoYXZlLiAgSXQgbWlnaHQgc3BlY2lmeSB0
aGF0IHRoZSBmaXJld2FsbCBhbmQgY2FjaGluZyBlbmdpbmUNCj4+ICAgIGFyZSBib3RoIHRvIGJl
IGluIGEgc3BlY2lmaWMgZGF0YSBjZW50ZXIgKGUuZy4sIGluIERDMSksIG9yIGl0IG1pZ2h0DQo+
PiAgICBzcGVjaWZ5IGV4YWN0bHkgd2hpY2ggaW5zdGFuY2Ugb2YgZWFjaCBmaXJld2FsbCBhbmQg
Y2FjaGluZyBlbmdpbmUgaXMNCj4+ICAgIHRvIGJlIHVzZWQuDQo+PiANCj4+IA0KPj4gVGhlIFJl
bmRlcmVkIFNlcnZpY2UgUGF0aCAoUlNQKSBpcyB0aGUgYWN0dWFsIHNlcXVlbmNlIG9mIFNGRnMg
YW5kDQo+PiAgICBTRnMgdGhhdCB0aGUgcGFja2V0cyB3aWxsIGFjdHVhbGx5IHZpc2l0LiAgU28g
aWYgdGhlIFNGUCBwaWNrZWQgdGhlDQo+PiAgICBEQywgdGhlIFJTUCB3b3VsZCBiZSBtb3JlIHNw
ZWNpZmljLuKAnQ0KPj4gDQo+PiANCj4+IFdoYXQgZXhhY3RseSBpcyB2YWd1ZSBhYm91dCB0aGlz
PyBTZWVtcyBwcmV0dHkgY2xlYXIsIGF0IGxlYXN0IHRvIG1lLCANCj4+aG93ICBwcm9ncmVzc2l2
ZSByZWZpbmVtZW50IGZyb20gU0ZDIHRvIGV2ZW50dWFsIFJTUCBpcyBhY2hpZXZlZC4NCj4+IA0K
Pj4gSmltDQo+PiANCj4+ID4NCj4+ID5DaGVlcnMsDQo+PiA+TWVkDQo+PiA+DQo+PiA+PiAtLS0t
LU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+ID4+IERlIDogSmltIEd1aWNoYXJkIChqZ3VpY2hh
cikgW21haWx0bzpqZ3VpY2hhckBjaXNjby5jb21dICBFbnZvecOpIDogDQo+PiA+Pm1lcmNyZWRp
IDE4IG5vdmVtYnJlIDIwMTUgMTc6MTggIMOAIDogQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEp
OyANCj4+ID4+Qk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTiAgQ2MgOiBzZmMgaXNzdWUgdHJhY2tl
cjsgc2ZjQGlldGYub3JnOyANCj4+ID4+UGF1bCBRdWlubiAocGF1bHEpOw0KPj4gPj5kcmFmdC1p
ZXRmLXNmYy0NCj4+ID4+IGNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7IEpvZWwgSGFscGVy
bjsgSm9lbCBNLiBIYWxwZXJuICBPYmpldCANCj4+ID4+OiBSZTogW3NmY10gIzE1IChjb250cm9s
LXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZSBvcGVyYXRlcyAgDQo+PiA+Pm9uIFNG
QyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4+ID4+DQo+PiA+PiBbQ2hhaXIgaGF0IG9mZiDigKZdDQo+
PiA+Pg0KPj4gPj4gSSBoYXZlIHRvIHNheSBJIGFtIHN0cnVnZ2xpbmcgdG8gc2VlIHRoZSDigJxp
c3N1ZeKAnSBpbiB0aGlzIHRocmVhZCANCj4+ID4+dGhhdCBuZWVkcyAgdG8gYmUgYWRkcmVzc2Vk
IG90aGVyIHRoYW4gY29uZnVzaW9uIG92ZXIgU0ZDIHZzIFNGUCANCj4+ID4+ZGVmaW5pdGlvbjsN
Cj4+ZnJvbSBhDQo+PiA+PiBkYXRhIHBsYW5lIHBlcnNwZWN0aXZlIGl0IGlzICp2ZXJ5KiBjbGVh
ciB0aGF0IFNGUC9TSSBpZGVudGlmaWVycyANCj4+ID4+YXJlIHVzZWQgIGFzIHRoZSBsb29rdXAg
a2V5IGludG8gYSBmb3J3YXJkaW5nIGNvbnN0cnVjdCB0aGF0IG1heSANCj4+ID4+Y29udGFpbiAx
Om4gbnVtYmVyICBvZiBuZXh0LWhvcHMgKFNGRnMsIFNGcykuIEluIHNvbWUgY2FzZXMgdGhhdCAN
Cj4+ID4+bG9va3VwIHdpbGwgcG9pbnQgdG8gYSBzaW5nbGUgIG5leHQtaG9wLCBpbiBvdGhlcnMg
bXVsdGlwbGUgDQo+PiA+Pm5leHQtaG9wcy4gSW4gKmFsbCogY2FzZXMgdGhpcyBoYXMgYWJzb2x1
dGVseSAgbm90aGluZyB0byBkbyB3aXRoIA0KPj4gPj50aGUgU0ZDIGFzIGVhY2ggcmVwcmVzZW50
YXRpb24gb2YgdGhhdCBTRkMgaXMgdW5pcXVlbHkgIGlkZW50aWZpZWQgDQo+PiA+PmJ5IGFuIFNG
UC1pZC4NCj4+ID4+DQo+PiA+PiBKaW0NCj4+ID4+DQo+PiA+PiBPbiAxMS8xOC8xNSwgMTA6MTkg
QU0sICJzZmMgb24gYmVoYWxmIG9mIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSINCj4+ID4+
IDxzZmMtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgY3BpZ25hdGFAY2lzY28uY29tPiB3
cm90ZToNCj4+ID4+DQo+PiA+PiA+SGksIE1lZCwNCj4+ID4+ID4NCj4+ID4+ID5JIGFsc28gcmVm
ZXJyZWQgdG8gb3RoZXIgcGFydHMgb2YgdGhlIGRvY3VtZW50LCB3aGVuIEkgd3JvdGU6DQo+PiA+
PiA+DQo+PiA+PiA+PiBUaGUgY29udHJvbC1wbGFuZSBkcmFmdCB0YWxrcyBhYm91dCDCs1NGQyBm
b3J3YXJkaW5nwrIgYW5kIMKzU0ZDIA0KPj4gPj4gPj5kYXRhIHBsYW5lwrINCj4+ID4+ID4NCj4+
ID4+ID4NCj4+ID4+ID5Gb3IgZXhhbXBsZSwgSSBhbSBub3Qgc3VyZSBJIHVuZGVyc3RhbmQgd2hh
dCB0aGlzIG1lYW5zOg0KPj4gPj4gPg0KPj4gPj4gPiIgICBvICBQb3B1bGF0ZSBTRkMgZm9yd2Fy
ZGluZyBwb2xpY3kgdGFibGVzIG9mIGludm9sdmVkIFNGQyBkYXRhDQo+PiA+PnBsYW5lwrINCj4+
ID4+ID4NCj4+ID4+ID4NCj4+ID4+ID5PciBhdDoNCj4+ID4+ID4iICAgbyAgU0ZDIEZvcndhcmRp
bmcgUG9saWN5IFRhYmxlOiB0aGlzIHRhYmxlIHJlZmxlY3RzIHRoZQ0KPj4gPj5TRkMtc3BlY2lm
aWMNCj4+ID4+ID4gICAgIHRyYWZmaWMgZm9yd2FyZGluZyBwb2xpY3kgZW5mb3JjZWQgYnkgU0ZG
IGNvbXBvbmVudHMgZm9yIGV2ZXJ5DQo+PiA+PiA+ICAgICByZWxldmFudCBpbmNvbWluZyBwYWNr
ZXQgdGhhdCBpcyBhc3NvY2lhdGVkIHRvIG9uZSBvZiB0aGUNCj4+IGV4aXN0aW5nDQo+PiA+PiA+
ICAgICBTRkNzLiINCj4+ID4+ID4NCj4+ID4+ID4NCj4+ID4+ID5NeSBjb21tZW50IGlzIHRoYXQg
dGhvc2Ugc2hvdWxkIGJlIMKzU0ZQIg0KPj4gPj4gPg0KPj4gPj4gPlRoYW5rcywNCj4+ID4+ID4N
Cj4+ID4+ID7igLkgQ2FybG9zLg0KPj4gPj4gPg0KPj4gPj4gPi0tLS0tT3JpZ2luYWwgTWVzc2Fn
ZS0tLS0tDQo+PiA+PiA+RnJvbTogTWVkIEJvdWNhZGFpciA8bW9oYW1lZC5ib3VjYWRhaXJAb3Jh
bmdlLmNvbT4NCj4+ID4+ID5EYXRlOiBXZWRuZXNkYXksIE5vdmVtYmVyIDE4LCAyMDE1IGF0IDEw
OjAzIEFNDQo+PiA+PiA+VG86IENhcmxvcyBQaWduYXRhcm8gPGNwaWduYXRhQGNpc2NvLmNvbT4N
Cj4+ID4+ID5DYzogIlBhdWwgUXVpbm4gKHBhdWxxKSIgPHBhdWxxQGNpc2NvLmNvbT4sIA0KPj4g
Pj4gPiJkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnIg0KPj4gPj4g
PjxkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnPiwgSm9lbCBIYWxw
ZXJuIA0KPj4gPj4gPjxqbWhAam9lbGhhbHBlcm4uY29tPiwgc2ZjIGlzc3VlIHRyYWNrZXIgDQo+
PiA+PiA+PHRyYWMrc2ZjQHRvb2xzLmlldGYub3JnPiwgInNmY0BpZXRmLm9yZyIgPHNmY0BpZXRm
Lm9yZz4sIEpvZWwgDQo+PiA+PiA+SGFscGVybg0KPj4gPGpvZWwuaGFscGVybkBlcmljc3Nvbi5j
b20+DQo+PiA+PiA+U3ViamVjdDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRo
ZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4+ID4+IG9wZXJhdGVzDQo+PiA+PiA+b24gU0ZDIElEcywg
U0ZQIElEcywgZXRjLg0KPj4gPj4gPg0KPj4gPj4gPj5DYXJsb3MsDQo+PiA+PiA+Pg0KPj4gPj4g
Pj5UaGVyZSBpcyBub3QgU0ZDIElEIGluIHRoZSBjb3JlIHRleHQgb2YgdGhlIGNvbnRyb2wgcGxh
bmUgZHJhZnQuDQo+PiA+PiA+Pg0KPj4gPj4gPj5UaGUgdGV4dCB5b3UgcXVvdGVkIGlzIHBhcnQg
b2YgYW4gYXBwZW5kaXggd2l0aCBhIG5vdGUgdGhhdCANCj4+ID4+ID4+Y2xlYXJseSBzdGF0ZXMg
dGhpcyBpcyBub3QgZGlzY3Vzc2VkLiBBIGNvcnJlc3BvbmRpbmcgaXNzdWUgDQo+PiA+PiA+PnJl
Y29yZCBoYXMgYmVlbiByZWNvcmRlZCB0byBzZWVrIGZvciBtb3JlIGZlZWRiYWNrIG9uIHRoYXQg
YXBwZW5kaXguDQo+PiA+PiA+Pg0KPj4gPj4gPj5DaGVlcnMsDQo+PiA+PiA+Pk1lZA0KPj4gPj4g
Pj4NCj4+ID4+ID4+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4+ID4+ID4+PiBEZSA6
IENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSBbbWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbV0g
DQo+PiA+PiA+Pj4gRW52b3nDqSA6IG1lcmNyZWRpIDE4IG5vdmVtYnJlIDIwMTUgMTU6MzUgw4Ag
OiBCT1VDQURBSVIgTW9oYW1lZCANCj4+ID4+ID4+PiBJTVQvT0xOIENjIDogUGF1bCBRdWlubiAo
cGF1bHEpOw0KPj4gPj5kcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3Jn
Ow0KPj4gPj4gPj4+Sm9lbA0KPj4gPj4gPj4+IE0uIEhhbHBlcm47IHNmYyBpc3N1ZSB0cmFja2Vy
OyBzZmNAaWV0Zi5vcmc7IEpvZWwgSGFscGVybiAgDQo+PiA+PiA+Pj5PYmpldCA6IFJlOiBbc2Zj
XSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIA0KPj4gPj4gPj4+cGxh
bmUgb3BlcmF0ZXMgIG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4+ID4+ID4+Pg0KPj4gPj4g
Pj4+IE1lZCwNCj4+ID4+ID4+Pg0KPj4gPj4gPj4+ID4gT24gTm92IDE4LCAyMDE1LCBhdCA4OjA4
IEFNLCBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+Pndyb3RlOg0KPj4gPj4gPj4+ID4N
Cj4+ID4+ID4+PiA+IENhcmxvcywNCj4+ID4+ID4+PiA+DQo+PiA+PiA+Pj4gPiBUaGlzIGlzIGFu
IG9wZW4gaXNzdWUgZm9yIHRoaXMgZHJhZnQsIHNvIGl0IGlzIG5vcm1hbCB0bw0KPj5jb250aW51
ZQ0KPj4gPj4gPj4+IGRpc2N1c3NpbmcgaXQuIEkgZG9uJ3Qga25vdyBob3cgeW91IGNhbiBjb25j
bHVkZSBpbiBhZHZhbmNlIA0KPj4gPj4gPj4+IHRoYXQNCj4+d2UNCj4+ID4+IGFyZQ0KPj4gPj4g
Pj4+IGNpcmNsaW5nLg0KPj4gPj4gPj4+ID4NCj4+ID4+ID4+Pg0KPj4gPj4gPj4+IERpc2N1c3Np
b24gaXMgZ3JlYXQsIE1lZC4gQnV0IG15IMWSd2UgYXJlIGNpcmNsaW5nJyBjb21tZW50IA0KPj4g
Pj4gPj4+IChub3QNCj4+aW4NCj4+ID4+ID4+PiBhZHZhbmNlZCwgYnV0IGFscmVhZHkgZXZpZGVu
dCkgaXMgYmVjYXVzZSBJIHNhdyB0aGUgc2FtZQ0KPj5xdWVzdGlvbnMsDQo+PiA+PiA+Pj5zYW1l
DQo+PiA+PiA+Pj4gYXJndW1lbnRzLCBhbmQgc2FtZSBhbnN3ZXJzIGFzIGJlZm9yZS4NCj4+ID4+
ID4+Pg0KPj4gPj4gPj4+ID4gInN0cm9uZ2x5IGJlbGlldmUiIGlzIG5vdCBhIHRlY2huaWNhbCBh
cmd1bWVudCwgYnR3Lg0KPj4gPj4gPj4+ID4NCj4+ID4+ID4+Pg0KPj4gPj4gPj4+IFdlbGwsIEkg
YmVsaWV2ZSBzbyBvbiB0ZWNobmljYWwgZ3JvdW5kcyEgTW9zdCBvZiB3aGljaCBoYXZlDQo+PmFs
cmVhZHkNCj4+ID4+ID4+PmJlZW4NCj4+ID4+ID4+PiBzYWlkLCBzbyBJIGRvIG5vdCB3YW50IHRv
IGNvbnRyaWJ1dGUgdG8gdGhlIGNpcmN1bGFyIGRpc2N1c3Npb24uDQo+PiA+PiA+Pj4NCj4+ID4+
ID4+PiBUaGUgY29udHJvbC1wbGFuZSBkcmFmdCB0YWxrcyBhYm91dCDCs1NGQyBmb3J3YXJkaW5n
wrIgYW5kIMKzU0ZDDQo+PmRhdGENCj4+ID4+ID4+PnBsYW5lwrIsDQo+PiA+PiA+Pj4gYW5kIMKz
U0ZDIElEc8KyLiBUaGUgYXJjaGl0ZWN0dXJlIHNheXMgdGhhdCBTRkMgYXJlIG1hZGUgb2YNCj4+
YWJzdHJhY3QNCj4+ID4+ID4+PnNlcnZpY2UNCj4+ID4+ID4+PiBmdW5jdGlvbnMuIFRoZXJlwrlz
IG5vIGFjdHVhbCBmb3J3YXJkaW5nIGluIHRoaXMgYWJzdHJhY3QNCj4+Y29uY2VwdHVhbA0KPj4g
Pj4gPj4+bW9kZWwuDQo+PiA+PiA+Pj4NCj4+ID4+ID4+PiBUaGUgY29udHJvbC1wbGFuZSBkcmFm
dCBzYXlzIMKzU3VwcG9zZSB0aGUgU0ZDIElEIGZvciB0aGlzIFNGUCANCj4+ID4+ID4+PiBpcyAi
eWVsbG93wrIswrIsIGFuZCBteSBwb2ludCBhZ2FpbiBpcyB0aGF0IGluIHRoZSBkYXRhIHBsYW5l
IGFuIA0KPj4gPj4gPj4+IFNGUA0KPj5oYXMNCj4+ID4+YW4NCj4+ID4+ID4+PiBpZGVudGlmaWVy
ICh3aGljaCBpZGVudGlmaWVzIHRoZSBTRlAgKFNGUC1JRCkgYW5kIGlzIG5vdCB0aGUNCj4+ID4+
IGlkZW50aWZpZXINCj4+ID4+ID4+Pm9mDQo+PiA+PiA+Pj4gc29tZXRoaW5nIGVsc2UsIGl0wrlz
IG5vdCBhIFRvcG9sb2d5LUlELCBpdMK5cyBub3QgYSBTS1UsIGl0wrlzIA0KPj4gPj4gPj4+bm90
DQo+PmENCj4+ID4+IFVSSSwNCj4+ID4+ID4+PiBpdMK5cyBub3QgYSBGYW1pbHkgTmFtZSwgYW5k
IG5vdCBhbiBTRkMgSUQpLCBhbmQgdGhlIGNvbnRyb2wgDQo+PiA+PiA+Pj4oYW5kDQo+PiA+PiA+
Pj5wb2xpY3kpDQo+PiA+PiA+Pj4gcGxhbmUgY2FuIG9mIGNvdXJzZSB3b3JrIHdpdGggU0ZDcy4N
Cj4+ID4+ID4+Pg0KPj4gPj4gPj4+IE15ICQwLjAyLg0KPj4gPj4gPj4+DQo+PiA+PiA+Pj4gVGhh
bmtzLA0KPj4gPj4gPj4+DQo+PiA+PiA+Pj4g4oC5IENhcmxvcy4NCj4+ID4+ID4+Pg0KPj4gPj4g
Pj4+ID4gQ2hlZXJzLA0KPj4gPj4gPj4+ID4gTWVkDQo+PiA+PiA+Pj4gPg0KPj4gPj4gPj4+ID4+
IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLSBEZSA6IENhcmxvcyBQaWduYXRhcm8gDQo+PiA+
PiA+Pj4gPj4gKGNwaWduYXRhKSBbbWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbV0gRW52b3nDqSA6
IG1lcmNyZWRpIDE4IA0KPj4gPj4gPj4+ID4+IG5vdmVtYnJlIDIwMTUgMTE6NTIgw4AgOiBKb2Vs
IEhhbHBlcm4gQ2MgOiBCT1VDQURBSVIgTW9oYW1lZCANCj4+ID4+ID4+PiA+PiBJTVQvT0xOOyBQ
YXVsIFF1aW5uIChwYXVscSk7DQo+PiA+PmRyYWZ0LWlldGYtc2ZjLQ0KPj4gPj4gPj4+ID4+IGNv
bnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybjsgc2ZjIGlzc3VlDQo+
PiB0cmFja2VyOw0KPj4gPj4gPj4+ID4+IHNmY0BpZXRmLm9yZw0KPj4gPj4gPj4+ID4+IE9iamV0
IDogUmU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wNCj4+
cGxhbmUNCj4+ID4+ID4+PiBvcGVyYXRlcw0KPj4gPj4gPj4+ID4+IG9uIFNGQyBJRHMsIFNGUCBJ
RHMsIGV0Yy4NCj4+ID4+ID4+PiA+Pg0KPj4gPj4gPj4+ID4+IEkgYW0gYSBiaXQgYmFmZmxlZCB0
byBzZWUgdGhpcyB0aHJlYWQgYWdhaW4g4oC5IGl0IGFwcGVhcnMgDQo+PiA+PiA+Pj4gPj4gdGhl
DQo+PiA+PiA+Pj5kaXNjdXNzaW9uDQo+PiA+PiA+Pj4gPj4gcmVzdGFydGVkIHRvIGNvbnRpbnVl
IGluIGNpcmNsZXMuDQo+PiA+PiA+Pj4gPj4NCj4+ID4+ID4+PiA+PiBNZWQsDQo+PiA+PiA+Pj4g
Pj4NCj4+ID4+ID4+PiA+PiBJIHRvbyBhZ3JlZSB3aXRoIEpvZWwgYW5kIHN0cm9uZ2x5IGJlbGll
dmUgdGhlcmUgaXMgbm8gbmVlZA0KPj5mb3INCj4+ID4+U0ZDDQo+PiA+PiA+Pj4gPj4gaWRlbnRp
ZmljYXRpb24gcGFzc2VkIGRvd24g4oC5IHRoZXJlIGlzIG5vIHByb3Zpc2lvbmluZyBvZiANCj4+
ID4+ID4+PiA+PiBTRkNzDQo+PiA+PiA+Pj4gc291dGhib3VuZC4NCj4+ID4+ID4+PiA+Pg0KPj4g
Pj4gPj4+ID4+IChBbG1vc3QpIGV2ZXJ5IGluc3RhbmNlIG9mIMKzU0ZDwrIgaW4gdGhlIGNvbnRy
b2wtcGxhbmUNCj4+ID4+cmVxdWlyZW1lbnRzDQo+PiA+PiA+Pj4gZHJhZnQNCj4+ID4+ID4+PiA+
PiBzaG91bGQgcmVhbGx5IHNheSDCs1NGUMKyLiBUaGVyZSBpcyBubyB1c2Ugb2YgdGFsa2luZyBh
Ym91dCANCj4+ID4+ID4+PiA+PiBTRkNzDQo+PiA+PiA+Pj50b3dhcmRzDQo+PiA+PiA+Pj4gdGhl
DQo+PiA+PiA+Pj4gPj4gZGF0YSBwbGFuZS4gVGhlIHJlbGF0aW9uc2hpcCBiZXR3ZWVuIGNoYWlu
cyBhbmQgcGF0aHMgaXMgYQ0KPj4gcG9saWN5DQo+PiA+PiA+Pj4gbWF0dGVyDQo+PiA+PiA+Pj4g
Pj4gd2hpY2ggYmVsb25ncyBpbiB0aGUgcG9saWN5L2NvbnRyb2wgaXRzZWxmLCBidXQgbm90IG91
dCBvZg0KPj4gdGhlcmUuDQo+PiA+PiA+Pj4gPj4NCj4+ID4+ID4+PiA+PiBUaGlzIGlzIG5vIGRp
ZmZlcmVudCB0aGFuIHdoYXQgSSBzYWlkIGEgZmV3IG1vbnRocyBhZ28gb24gDQo+PiA+PiA+Pj4g
Pj4gdGhlDQo+PiA+PnNhbWUNCj4+ID4+ID4+PiB0b3BpYy4NCj4+ID4+ID4+PiA+Pg0KPj4gPj4g
Pj4+ID4+IFRoYW5rcywNCj4+ID4+ID4+PiA+Pg0KPj4gPj4gPj4+ID4+IOKAuSBDYXJsb3MuDQo+
PiA+PiA+Pj4gPj4NCj4+ID4+ID4+PiA+Pj4gT24gTm92IDE3LCAyMDE1LCBhdCA5OjA2IEFNLCBK
b2VsIEhhbHBlcm4NCj4+ID4+ID4+Pjxqb2VsLmhhbHBlcm5AZXJpY3Nzb24uY29tPg0KPj4gPj4g
Pj4+ID4+IHdyb3RlOg0KPj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBXaGF0IGlzIHByb3Zp
c2lvbmVkIGludG8gdGhlIFNGRiByZWZsZWN0cyB0aGUgU0ZQLiAgVGhlDQo+PmNvbnRyb2wNCj4+
ID4+ID4+PnN5c3RlbQ0KPj4gPj4gPj4+ID4+IGRlY2lkZXMgd2hldGhlciB0aGF0IFNGUCBpbmRp
Y2F0ZXMgdGhlIHNhbWUgc2V0IG9mIGFsbA0KPj5wb3NzaWJsZQ0KPj4gPj4gPj4+Y2hvaWNlcw0K
Pj4gPj4gPj4+ID4+IHRoYXQgdGhlIFNGQyBkb2VzLCBvciBpcyBhIHByb3BlciBzdWJzZXQuDQo+
PiA+PiA+Pj4gPj4+DQo+PiA+PiA+Pj4gPj4+IEluIG9yZGVyIHRvIGFsbG93IGZvciBhbiBTRlAg
dGhhdCByZWZsZWN0cyBtZWFuaW5nZnVsDQo+PiA+PmNvbnN0cmFpbnRzLA0KPj4gPj4gPj4+IHdo
YXQNCj4+ID4+ID4+PiA+PiBpcyBwcm92aXNpb25lZCBoYXMgdG8gYmUgdGhlIFNGUC4NCj4+ID4+
ID4+PiA+Pj4gTm8gc3BlY2lhbCBwcm92aXNpb24gaXMgbmVlZGVkIGZvciB0aGUgY2FzZSB3aGVy
ZSB0aGUgU0ZQIA0KPj4gPj4gPj4+ID4+PiBpcw0KPj4gPj4gPj4+IGlzb21vcnBoaWMNCj4+ID4+
ID4+PiA+PiB0byB0aGUgU0ZDLiBJbiBzdWNoIGEgY2FzZSwgeW91IHN0aWxsIHByb3Zpc2lvbiB0
aGUgU0ZQLiAgDQo+PiA+PiA+Pj4gPj4gQW5kDQo+PiB0aGUNCj4+ID4+ID4+PiByZXN1bHQNCj4+
ID4+ID4+PiA+PiBpcyBhbiBTRlAgd2l0aCBhcyBtdWNoIGZsZXhpYmlsaXR5IGFzIHRoZSBTRkMu
DQo+PiA+PiA+Pj4gPj4+DQo+PiA+PiA+Pj4gPj4+IElmLCBpbiBjb250cmFzdCwgeW91IGRlY2xh
cmUgdGhhdCB0aGUgcHJvdmlzaW9uaW5nIA0KPj4gPj4gPj4+ID4+PiBpbmNsdWRlcw0KPj50aGUN
Cj4+ID4+IFNGQw0KPj4gPj4gPj4+IHRoZW4NCj4+ID4+ID4+PiA+PiB5b3UgYXJlIGludHJvZHVj
aW5nIGV4dHJhIGNvbXBsZXhpdHkgd2l0aG91dCBhZGRpbmcgYW55IG5ldw0KPj4gY2FzZXMNCj4+
ID4+ID4+PnRoYXQNCj4+ID4+ID4+PiBjYW4NCj4+ID4+ID4+PiA+PiBiZSBoYW5kbGVkLg0KPj4g
Pj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBZb3VycywNCj4+ID4+ID4+PiA+Pj4gSm9lbA0KPj4g
Pj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPj4g
Pj4gPj4+ID4+PiBGcm9tOiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+PiA+PiA+Pj4g
W21haWx0bzptb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tXQ0KPj4gPj4gPj4+ID4+PiBTZW50
OiBUdWVzZGF5LCBOb3ZlbWJlciAxNywgMjAxNSA5OjAzIEFNDQo+PiA+PiA+Pj4gPj4+IFRvOiBK
b2VsIEhhbHBlcm47IFBhdWwgUXVpbm4gKHBhdWxxKQ0KPj4gPj4gPj4+ID4+PiBDYzogc2ZjIGlz
c3VlIHRyYWNrZXI7IGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtDQo+PiA+PiBwbGFuZUB0b29scy5p
ZXRmLm9yZzsNCj4+ID4+ID4+PiA+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPj4g
Pj4gPj4+ID4+PiBTdWJqZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhl
ciB0aGUgDQo+PiA+PiA+Pj4gPj4+IGNvbnRyb2wNCj4+ID4+cGxhbmUNCj4+ID4+ID4+PiA+PiBv
cGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+PiA+PiA+Pj4gPj4+DQo+PiA+PiA+
Pj4gPj4+IEhpIEpvZWwsDQo+PiA+PiA+Pj4gPj4+DQo+PiA+PiA+Pj4gPj4+IFBsZWFzZSBzZWUg
aW5saW5lLg0KPj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBDaGVlcnMsDQo+PiA+PiA+Pj4g
Pj4+IE1lZA0KPj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+Pj4gLS0tLS1NZXNzYWdlIGQnb3Jp
Z2luZS0tLS0tIERlIDogSm9lbCBIYWxwZXJuIA0KPj4gPj4gPj4+ID4+Pj4gW21haWx0bzpqb2Vs
LmhhbHBlcm5AZXJpY3Nzb24uY29tXQ0KPj4gPj4gPj4+ID4+Pj4gRW52b3nDqSA6IG1hcmRpIDE3
IG5vdmVtYnJlIDIwMTUgMTQ6NDkgw4AgOiBCT1VDQURBSVIgDQo+PiA+PiA+Pj4gPj4+PiBNb2hh
bWVkIElNVC9PTE47IFBhdWwgUXVpbm4gKHBhdWxxKSBDYyA6IHNmYw0KPj4gPj5pc3N1ZQ0KPj4g
Pj4gPj4+ID4+Pj4gdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0b29scy5p
ZXRmLm9yZzsNCj4+ID4+ID4+PiA+Pj4+IHNmY0BpZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuIE9i
amV0IDogUkU6IFtzZmNdICMxNSANCj4+ID4+ID4+PiA+Pj4+IChjb250cm9sLXBsYW5lKTogV2hl
dGhlciB0aGUgY29udHJvbA0KPj4gPj5wbGFuZQ0KPj4gPj4gPj4+ID4+Pj4gb3BlcmF0ZXMgb24g
U0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gPj4gPj4+ID4+Pj4NCj4+ID4+ID4+PiA+Pj4+IFlv
dXIgc3RhdGVtZW50IHRoYXQgIiBJdCBoYXBwZW5zIHRoYXQgaW5mb3JtYXRpb24gaXMgbm8gDQo+
PiA+PiA+Pj4gPj4+PiBtb3JlDQo+PiA+PnRoYW4NCj4+ID4+ID4+PnRoZQ0KPj4gPj4gPj4+ID4+
Pj4gc2VydmljZSBjaGFpbiBpdHNlbGYgKHdpdGhvdXQgYW55IGNvbnN0cmFpbnRzKS4iIChXaGVy
ZSAiaXQiDQo+PiA+PiA+Pj5yZWZlcnMNCj4+ID4+ID4+PiB0bw0KPj4gPj4gPj4+ID4+ICINCj4+
ID4+ID4+PiA+Pj4+IHRoZSBleGFjdCBzZXF1ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJl
YWxpemUgdGhlIA0KPj4gPj4gPj4+ID4+Pj4gU0ZDIi4pDQo+PiA+PkRvZXMNCj4+ID4+ID4+Pm5v
dA0KPj4gPj4gPj4+ID4+Pj4gbWFrZSBzZW5zZSB0byBtZS4NCj4+ID4+ID4+PiA+Pj4NCj4+ID4+
ID4+PiA+Pj4gW01lZF0gUkZDIDc2NjUgc2F5czoNCj4+ID4+ID4+PiA+Pj4NCj4+ID4+ID4+PiA+
Pj4gIiAgIFRodXMsIHRoZSBwb2xpY2llcyBhbmQgbG9naWMgb2YgU0ZQIHNlbGVjdGlvbiBvciBj
cmVhdGlvbg0KPj4gPj4gPj4+IChkZXBlbmRpbmcNCj4+ID4+ID4+PiA+Pj4gIHVwb24gdGhlIHNv
bHV0aW9uKSBwcm9kdWNlIHdoYXQgbWF5IGJlIHRob3VnaHQgb2YgYXMgYQ0KPj4gPj4gY29uc3Ry
YWluZWQNCj4+ID4+ID4+PiA+Pj4gIHZlcnNpb24gb2YgdGhlIG9yaWdpbmFsIFNGQy4gIg0KPj4g
Pj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBpbiBzaG9ydDogU0ZQIGlzIGRlZmluZWQgYXMgYSBj
b25zdHJhaW5lZCB2ZXJzaW9uIG9mIHRoZQ0KPj4gPj5vcmlnaW5hbA0KPj4gPj4gPj4+U0ZDLg0K
Pj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBXaGF0IGlzIHRoZSBuYW1lIHRvIHVzZSB0byBy
ZWZlciB0byBhICJub24tY29uc3RyYWluZWQiIA0KPj4gPj4gPj4+ID4+PiBTRkMNCj4+b3INCj4+
ID4+dG8NCj4+ID4+ID4+PnRoZQ0KPj4gPj4gPj4+ID4+IGluZm9ybWF0aW9uIHRoYXQgeW91IHdp
bGwgcHJvdmlzaW9uIHRvIGFuIFNGRiB3aGVuIHRoZSBwYXRoDQo+PiA+PiA+Pj5jb21wdXRhdGlv
bg0KPj4gPj4gPj4+ID4+IGFuZCBzZWxlY3Rpb24gZGVjaXNpb24gaXMgImRlZmVycmVkIHRvIHRo
ZSBTRkYiPw0KPj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBJdCBkb2VzIG5vdCBtYWtlIHNl
bnNlIHRvIGNhbGwgYSBub24tY29uc3RyYWluZWQgdmVyc2lvbiANCj4+ID4+ID4+PiA+Pj4gb2YN
Cj4+dGhlDQo+PiA+PiBTRkMNCj4+ID4+ID4+PmFzDQo+PiA+PiA+Pj4gPj4gU0ZQIGdpdmVuIHRo
YXQgUkZDNzY2NSBleHBsaWNpdGx5IGRlZmluZXMgU0ZQIGFzIA0KPj4gPj4gPj4+ID4+ICJjb25z
dHJhaW5lZA0KPj4gPj4gPj4+dmVyc2lvbg0KPj4gPj4gPj4+IG9mDQo+PiA+PiA+Pj4gPj4gdGhl
IG9yaWdpbmFsIFNGQyIhDQo+PiA+PiA+Pj4gPj4+DQo+PiA+PiA+Pj4gPj4+IFRoZSBTRkMgaXMg
dGhlIGdlbmVyYWwgZGVzY3JpcHRpb24gb2YgdGhlIG9iamVjdGl2ZS4gIFRoYXQNCj4+ID4+ID4+
PiA+Pj4+IGlzIG5vdCB0aGUgc2FtZSBhcyB0aGUgZXhhY3Qgc2VxdWVuY2Ugb2YgcGxhY2VzIHRo
YXQgbXVzdCANCj4+ID4+ID4+PiA+Pj4+IGJlDQo+PiA+PiA+Pj52aXNpdGVkLg0KPj4gPj4gPj4+
ID4+Pj4NCj4+ID4+ID4+PiA+Pj4+IEkgc3RhbmQgYnkgbXkgZWFybGllciBjb21tZW50cyB0aGF0
IGFsbW9zdCBhbGwgdXNlcyBvZiANCj4+ID4+ID4+PiA+Pj4+IFNGQw0KPj5pbg0KPj4gPj50aGUN
Cj4+ID4+ID4+PiA+Pj4+IGNvbnRyb2wgcmVxdWlyZW1lbnRzIGRyYWZ0IHNob3VsZCBiZSBTRlAu
DQo+PiA+PiA+Pj4gPj4+Pg0KPj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBbTWVkXSBJIG5v
dGVkIHRoYXQgSm9lbC4uIHRoYXQncyBmYWlyIGJ1dCB0aGlzIHBvc2l0aW9uIGlzDQo+PklNSE8N
Cj4+ID4+IG5vdA0KPj4gPj4gPj4+ID4+IGFsaWduZWQgd2l0aCBSRkM3NjY1IHRoYXQgYWxsb3dz
IHRvIGNvbnRyb2wgYW55IHZhcmlhdGlvbg0KPj5mcm9tIGENCj4+ID4+ID4+Pm5vbi0NCj4+ID4+
ID4+PiA+PiBjb25zdHJhaW5lZCBTRkMgdG8gYSBmdWxseSBjb25zdHJhaW5lZCBTRkMuDQo+PiA+
PiA+Pj4gPj4+DQo+PiA+PiA+Pj4gPj4+PiBZb3VycywNCj4+ID4+ID4+PiA+Pj4+IEpvZWwNCj4+
ID4+ID4+PiA+Pj4+DQo+PiA+PiA+Pj4gPj4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0K
Pj4gPj4gPj4+ID4+Pj4gRnJvbTogbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbSANCj4+ID4+
ID4+PiA+Pj4+IFttYWlsdG86bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbV0NCj4+ID4+ID4+
PiA+Pj4+IFNlbnQ6IFR1ZXNkYXksIE5vdmVtYmVyIDE3LCAyMDE1IDg6MzQgQU0NCj4+ID4+ID4+
PiA+Pj4+IFRvOiBQYXVsIFF1aW5uIChwYXVscSkNCj4+ID4+ID4+PiA+Pj4+IENjOiBzZmMgaXNz
dWUgdHJhY2tlcjsNCj4+ID4+ID4+PmRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9vbHMu
aWV0Zi5vcmc7DQo+PiA+PiA+Pj4gPj4+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0K
Pj4gPj4gPj4+ID4+Pj4gU3ViamVjdDogUkU6IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdo
ZXRoZXIgdGhlIA0KPj4gPj4gPj4+ID4+Pj4gY29udHJvbA0KPj4gPj5wbGFuZQ0KPj4gPj4gPj4+
ID4+Pj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPj4gPj4gPj4+ID4+Pj4N
Cj4+ID4+ID4+PiA+Pj4+IEhpIFBhdWwsDQo+PiA+PiA+Pj4gPj4+Pg0KPj4gPj4gPj4+ID4+Pj4g
VGhhbmsgeW91IGZvciBzaGFyaW5nIHlvdXIgZmVlZGJhY2suDQo+PiA+PiA+Pj4gPj4+Pg0KPj4g
Pj4gPj4+ID4+Pj4gUkZDNzY2NSBzYXlzIHRoZSBmb2xsb3dpbmc6DQo+PiA+PiA+Pj4gPj4+Pg0K
Pj4gPj4gPj4+ID4+Pj4gIg0KPj4gPj4gPj4+ID4+Pj4gVGhpcyBhcmNoaXRlY3R1cmUgZG9lcyBu
b3QgbWFuZGF0ZSB0aGUgZGVncmVlIG9mICANCj4+ID4+ID4+PiA+Pj4+IHNwZWNpZmljaXR5IG9m
IHRoZSBTRlAuICBBcmNoaXRlY3R1cmFsbHksIHdpdGhpbiB0aGUgc2FtZQ0KPj4gU0ZDLQ0KPj4g
Pj4gPj4+IGVuYWJsZWQNCj4+ID4+ID4+PiA+Pj4+ICBkb21haW4sIHNvbWUgU0ZQcyBtYXkgYmUg
ZnVsbHkgc3BlY2lmaWVkLCBzZWxlY3RpbmcgDQo+PiA+PiA+Pj4gPj4+PiBleGFjdGx5DQo+PiA+
PiB3aGljaA0KPj4gPj4gPj4+IFNGRg0KPj4gPj4gPj4+ID4+Pj4gIGFuZCB3aGljaCBTRiBhcmUg
dG8gYmUgdmlzaXRlZCBieSBwYWNrZXRzIHVzaW5nIHRoYXQgDQo+PiA+PiA+Pj4gPj4+PiBTRlAs
DQo+PiA+PndoaWxlDQo+PiA+PiA+Pj4gb3RoZXINCj4+ID4+ID4+PiA+Pj4+ICBTRlBzIG1heSBi
ZSBxdWl0ZSB2YWd1ZSwgZGVmZXJyaW5nIHRvIHRoZSBTRkYgdGhlIA0KPj4gPj4gPj4+ID4+Pj4g
ZGVjaXNpb25zDQo+PiA+PiBhYm91dA0KPj4gPj4gPj4+IHRoZQ0KPj4gPj4gPj4+ID4+Pj4gIGV4
YWN0IHNlcXVlbmNlIG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDLiAgDQo+
PiA+PiA+Pj4gPj4+PiBUaGUgIHNwZWNpZmljaXR5IG1heSBiZSBhbnl3aGVyZSBpbiBiZXR3ZWVu
IHRoZXNlIGV4dHJlbWVzLg0KPj4gPj4gPj4+ID4+Pj4gIg0KPj4gPj4gPj4+ID4+Pj4NCj4+ID4+
ID4+PiA+Pj4+IFRoZSBjb250cm9sIGRyYWZ0IGlzIGNvbXBsZXRlbHkgYWxpZ25lZCB3aXRoIHRo
YXQgYXBwcm9hY2guDQo+PiA+PiA+Pj4gPj4+Pg0KPj4gPj4gPj4+ID4+Pj4gVGhlIGNvbnRyb2wt
cGxhbmUgZG9jdW1lbnQgYWxsb3dzIGluIHBhcnRpY3VsYXIgdG8gDQo+PiA+PiA+Pj4gPj4+PiBw
cm92aXNpb24NCj4+ID4+ID4+PnJlcXVpcmVkDQo+PiA+PiA+Pj4gPj4+PiBpbmZvcm1hdGlvbiB3
aGVuICJkZWZlcnJpbmcgdG8gdGhlIFNGRiB0aGUgZGVjaXNpb25zIA0KPj4gPj4gPj4+ID4+Pj4g
YWJvdXQNCj4+dGhlDQo+PiA+PiA+Pj4gPj4+PiAgZXhhY3Qgc2VxdWVuY2Ugb2Ygc3RlcHMgdG8g
YmUgdXNlZCB0byByZWFsaXplIHRoZSBTRkMiLiANCj4+ID4+ID4+PiA+Pj4+IEl0DQo+PiA+PiA+
Pj5oYXBwZW5zDQo+PiA+PiA+Pj4gPj4+PiB0aGF0IGluZm9ybWF0aW9uIGlzIG5vIG1vcmUgdGhh
biB0aGUgc2VydmljZSBjaGFpbiBpdHNlbGYNCj4+ID4+ICh3aXRob3V0DQo+PiA+PiA+Pj4gYW55
DQo+PiA+PiA+Pj4gPj4+PiBjb25zdHJhaW50cykuDQo+PiA+PiA+Pj4gPj4+Pg0KPj4gPj4gPj4+
ID4+Pj4gQWxzbywgdGhlIGN1cnJlbnQgY29udHJvbC1wbGFuZSBkb2N1bWVudCBhbGxvd3MgdG8g
DQo+PiA+PiA+Pj4gPj4+PiBpbnN0cnVjdA0KPj5hDQo+PiA+PiA+Pj5sb29zZQ0KPj4gPj4gPj4+
ID4+Pj4gcGF0aA0KPj4gPj4gPj4+ID4+Pj4gKFNGUCkgb3IgYSBzdHJpY3QgcGF0aCAoUlNQKSwg
ZXRjLg0KPj4gPj4gPj4+ID4+Pj4NCj4+ID4+ID4+PiA+Pj4+IEkgZnVsbHkgYWdyZWUgdGhhdCB3
aGV0aGVyIGEgZnVsbCBwYXRoIGlzIHNwZWNpZmllZCANCj4+ID4+ID4+PiA+Pj4+IHdpdGhpbiBh
DQo+PiA+PiA+Pj5kb21haW4NCj4+ID4+ID4+PiBvcg0KPj4gPj4gPj4+ID4+Pj4gaWYgaXQgaXMg
ZGVmZXJyZWQgdG8gU0ZGcyBpcyByZWFsbHkgZGVwbG95bWVudC1zcGVjaWZpYy4NCj4+ID4+ID4+
PiBOZXZlcnRoZWxlc3MsDQo+PiA+PiA+Pj4gPj4+PiB0aGUgY29udHJvbCBwbGFuIHNob3VsZCBh
Y2NvbW1vZGF0ZSBhbGwgdGhlc2UgZmxhdm9ycy4NCj4+ID4+ID4+PiA+Pj4+DQo+PiA+PiA+Pj4g
Pj4+PiBDaGVlcnMsDQo+PiA+PiA+Pj4gPj4+PiBNZWQNCj4+ID4+ID4+PiA+Pj4+DQo+PiA+PiA+
Pj4gPj4+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tIERlIDogUGF1bCBRdWlubiAocGF1
bHEpIA0KPj4gPj4gPj4+ID4+Pj4+IFttYWlsdG86cGF1bHFAY2lzY28uY29tXSBFbnZvecOpIDoN
Cj4+ID4+ID4+PnZlbmRyZWRpDQo+PiA+PiA+Pj4gPj4+Pj4gMTYgb2N0b2JyZSAyMDE1IDE0OjA0
IMOAIDogSm9lbCBNLiBIYWxwZXJuIENjIDogQk9VQ0FEQUlSDQo+PiA+Pk1vaGFtZWQNCj4+ID4+
ID4+PiA+Pj4+PiBJTVQvT0xOOyBzZmMgaXNzdWUgdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29u
dHJvbC0gDQo+PiA+PiA+Pj4gPj4+Pj4gcGxhbmVAdG9vbHMuaWV0Zi5vcmc7IHNmY0BpZXRmLm9y
ZyBPYmpldCA6IFJlOiBbc2ZjXSAjMTUNCj4+ID4+ID4+PiA+Pj4+PiAoY29udHJvbC1wbGFuZSk6
IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUgb3BlcmF0ZXMgb24gDQo+PiA+PiA+Pj4gPj4+Pj4g
U0ZDDQo+PiA+PklEcywNCj4+ID4+ID4+PlNGUA0KPj4gPj4gPj4+ID4+IElEcywgZXRjLg0KPj4g
Pj4gPj4+ID4+Pj4+DQo+PiA+PiA+Pj4gPj4+Pj4gSm9lbCwNCj4+ID4+ID4+PiA+Pj4+Pg0KPj4g
Pj4gPj4+ID4+Pj4+IEkgY29uY3VyLg0KPj4gPj4gPj4+ID4+Pj4+DQo+PiA+PiA+Pj4gPj4+Pj4g
VGhlIGRhdGEgcGxhbmUgZGVhbCB3aXRoIHBhdGhzLCBub3QgY2hhaW5zLiAgVGhlDQo+PnJlbGF0
aW9uc2hpcA0KPj4gPj5vZg0KPj4gPj4gPj4+ID4+Pj4+IHBhdGhzIHRvIGNoYWlucyBmYWxscyBz
cXVhcmVseSBpbiB0aGUgY29udHJvbCBwbGFuZSAob3INCj4+ZXZlbg0KPj4gPj4gbW9yZQ0KPj4g
Pj4gPj4+ID4+Pj4+IGxpa2VseQ0KPj4gPj4gPj4+ID4+Pj4gInBvbGljeSINCj4+ID4+ID4+PiA+
Pj4+PiBwbGFuZSkgcmVhbG0uICBUaGUgc3BlY2lmaWNpdHkgb2YgdGhlIHBhdGggaXMgbGVmdCB0
byANCj4+ID4+ID4+PiA+Pj4+PiBpbXBsZW1lbnRhdGlvbiwgaW4gdGhlIGFyY2hpdGVjdHVyZSBk
cmFmdCwgYnV0IHRoYXQncw0KPj4gPj5jb25zaXN0ZW50DQo+PiA+PiA+Pj4gPj4+Pj4gd2l0aCB5
b3VyIHBvc2l0aW9uIGFuZCBwcm92aWRlcyB0aGUgcmVxdWlzaXRlDQo+PmZ1bmN0aW9uYWxpdHku
DQo+PiA+PiA+Pj4gPj4+Pj4NCj4+ID4+ID4+PiA+Pj4+PiBQYXVsDQo+PiA+PiA+Pj4gPj4+Pj4N
Cj4+ID4+ID4+PiA+Pj4+Pj4gT24gU2VwIDE3LCAyMDE1LCBhdCAxMTozNiBBTSwgSm9lbCBNLiBI
YWxwZXJuIA0KPj4gPj4gPj4+ID4+Pj4+PiA8am1oQGpvZWxoYWxwZXJuLmNvbT4NCj4+ID4+ID4+
PiA+Pj4+PiB3cm90ZToNCj4+ID4+ID4+PiA+Pj4+Pj4NCj4+ID4+ID4+PiA+Pj4+Pj4gQXMgZmFy
IGFzIEkgY2FuIHRlbGwsIHRoZXJlIGlzIG5vdGhpbmcgaW4gdGhlIFNlcnZpY2UNCj4+ID4+Q2hh
aW5pbmcNCj4+ID4+ID4+PiA+Pj4+Pj4gd29yayB0aGF0DQo+PiA+PiA+Pj4gPj4+Pj4gcmVxdWly
ZXMgY29ycmVsYXRpbmcgc2VydmljZSBwYXRoIElEcyB3aXRoIHNlcnZpY2UgY2hhaW4NCj4+SURz
DQo+PiA+PiA+Pj53aXRoaW4NCj4+ID4+ID4+PiA+Pj4+PiB0aGUgZGF0YSBwbGFuZS4gIEFueSBz
dWNoIHJlbGF0aW9uc2hpcCBleGlzdHMgZW50aXJlbHkNCj4+d2l0aGluDQo+PiA+PiB0aGUNCj4+
ID4+ID4+PiA+Pj4+PiBjb250cm9sIHBsYW5lIG9yIGFib3ZlLCBhbmQgd291bGQgYmUgZHJpdmVu
IGJ5IA0KPj4gPj4gPj4+ID4+Pj4+IHJlcXVpcmVtZW50cw0KPj4gPj4gb3RoZXINCj4+ID4+ID4+
PiA+Pj4+PiB0aGFuIHRoZSBkYXRhIHBsYW5lLiAgV2hlbiBJIGxvb2sgYXQgdGhpcyBkb2N1bWVu
dCwgYWxsIA0KPj4gPj4gPj4+ID4+Pj4+IG9mDQo+PiB0aGUNCj4+ID4+ID4+PiA+Pj4+PiByZXF1
aXJlbWVudHMgdGhhdCB0YWxrIGFib3V0IHNlcnZpY2UgZnVuY3Rpb24gY2hhaW4gSURzIA0KPj4g
Pj4gPj4+ID4+Pj4+IGNhbg0KPj4gYmUNCj4+ID4+ID4+PiA+Pj4+PiBhY2N1cmF0ZWx5IGNhcHR1
cmVkLCBpbiB0ZXJtcyBvZiBkYXRhIHBsYW5lIA0KPj4gPj4gPj4+ID4+Pj4+IHJlcXVpcmVtZW50
cywNCj4+YnkNCj4+ID4+ID4+PnNlcnZpY2UNCj4+ID4+ID4+PiA+PiBmdW5jdGlvbiBwYXRoIElE
cy4NCj4+ID4+ID4+PiA+Pj4+PiBUaHVzLCB0aGUgcmVxdWlyZW1lbnQgdGhhdCB0aGUgZGF0YSBw
bGFuZSBoYXMgaXMgdG8gc2VlDQo+PnN1Y2gNCj4+ID4+IHBhdGgNCj4+ID4+ID4+PiBJRHMuDQo+
PiA+PiA+Pj4gPj4+Pj4gWWVzLCBpbiBzb21lIGRlcGxveW1lbnRzIHRob3NlIHdpbGwgYmUgMS0x
IHdpdGggY2hhaW4gSURzLg0KPj4gPj5UaGV5DQo+PiA+PiA+Pj5hcmUNCj4+ID4+ID4+PiA+Pj4+
IHN0aWxsIHBhdGggSURzLg0KPj4gPj4gPj4+ID4+Pj4+Pg0KPj4gPj4gPj4+ID4+Pj4+PiBJbnRy
b2R1Y2luZyBhIHJlcXVpcmVtZW50IGZvciB0aGUgZGF0YSBwbGFuZSB0byBzZWUgYW5kDQo+Pndv
cmsNCj4+ID4+ID4+PndpdGgNCj4+ID4+ID4+PiA+Pj4+Pj4gY2hhaW4NCj4+ID4+ID4+PiA+Pj4+
PiBJRHMgaXMgbm90IGdyb3VuZGVkIGluIHRoZSB3b3JrIG9mIHRoZSBncm91cC4NCj4+ID4+ID4+
PiA+Pj4+Pj4NCj4+ID4+ID4+PiA+Pj4+Pj4gWW91cnMsDQo+PiA+PiA+Pj4gPj4+Pj4+IEpvZWwg
TS4gSGFscGVybg0KPj4gPj4gPj4+ID4+Pj4+Pg0KPj4gPj4gPj4+ID4+Pj4+PiBPbiA5LzE3LzE1
IDc6NTMgQU0sIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6DQo+PiA+PiA+Pj4g
Pj4+Pj4+PiBSZS0sDQo+PiA+PiA+Pj4gPj4+Pj4+Pg0KPj4gPj4gPj4+ID4+Pj4+Pj4gVGhlIGNv
bnRyb2wgZHJhZnQgYXMgaXQgc3RhbmRzIGlzIGNvbXBsaWFudCB3aXRoIHRoZSANCj4+ID4+ID4+
PiA+Pj4+Pj4+IGRhdGENCj4+ID4+IHBsYW5lDQo+PiA+PiA+Pj4gPj4+Pj4gYXJjaGl0ZWN0dXJl
IGRvY3VtZW50Lg0KPj4gPj4gPj4+ID4+Pj4+Pj4NCj4+ID4+ID4+PiA+Pj4+Pj4+IEluZGVlZCwg
dGhlIGFyY2ggZHJhZnQgYWNrbm93bGVkZ2VzIHRoZSBmb2xsb3dpbmc6DQo+PiA+PiA+Pj4gPj4+
Pj4+PiAoMSkgU0ZQcyBhcmUgImFzc29jaWF0ZWQgd2l0aCBhIGdpdmVuIFNGQyIuDQo+PiA+PiA+
Pj4gPj4+Pj4+PiAoMikgU0ZQcyBhcmUgcHJlc2VudGVkIGFzIGEgZm9ybSBvZiBjb25zdHJhaW5l
ZCBTRkNzLg0KPj4gPj4gPj4+ID4+Pj4+Pj4gKDMpIFNvbWUgZGVwbG95bWVudHMgbWF5IG5vdCBp
bXBvc2UgYW55IGNvbnN0cmFpbnQgb24gDQo+PiA+PiA+Pj4gPj4+Pj4+PiB0aGUgYWJzdHJhY3QN
Cj4+ID4+ID4+PiA+Pj4+IFNGQw0KPj4gPj4gPj4+ID4+Pg0KPj4gPj4gPj4+ID4+PiBfX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPj4gPj4gPj4+ID4+PiBz
ZmMgbWFpbGluZyBsaXN0DQo+PiA+PiA+Pj4gPj4+IHNmY0BpZXRmLm9yZw0KPj4gPj4gPj4+ID4+
PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KPj4gPj4gPj4+ID4N
Cj4+ID4+ID4+DQo+PiA+PiA+DQo+PiA+PiA+X19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX18NCj4+ID4+ID5zZmMgbWFpbGluZyBsaXN0DQo+PiA+PiA+c2ZjQGll
dGYub3JnDQo+PiA+PiA+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMN
Cj4+ID4NCj4NCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X18NCnNmYyBtYWlsaW5nIGxpc3QNCnNmY0BpZXRmLm9yZw0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcv
bWFpbG1hbi9saXN0aW5mby9zZmMNCg==


From nobody Mon Nov 23 15:34:52 2015
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0CC51AD08F for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 15:34:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UzXPyHnIg0Mb for <sfc@ietfa.amsl.com>; Mon, 23 Nov 2015 15:34:45 -0800 (PST)
Received: from g1t5425.austin.hp.com (g1t5425.austin.hp.com [15.216.225.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF0041AD087 for <sfc@ietf.org>; Mon, 23 Nov 2015 15:34:44 -0800 (PST)
Received: from G2W4316.americas.hpqcorp.net (g2w4316.austin.hp.com [16.197.9.73]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g1t5425.austin.hp.com (Postfix) with ESMTPS id B8D495E; Mon, 23 Nov 2015 23:34:43 +0000 (UTC)
Received: from G2W4311.americas.hpqcorp.net (16.197.24.199) by G2W4316.americas.hpqcorp.net (16.197.9.73) with Microsoft SMTP Server (TLS) id 14.3.169.1; Mon, 23 Nov 2015 23:34:22 +0000
Received: from G1W3656.americas.hpqcorp.net ([169.254.3.159]) by G2W4311.americas.hpqcorp.net ([16.197.24.199]) with mapi id 14.03.0169.001; Mon, 23 Nov 2015 23:34:22 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9T1lmHHc0DUEGZ5S7afLAxI54/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAYb6gCAAKICgP//9K+AgAAYnJA=
Date: Mon, 23 Nov 2015 23:34:21 +0000
Message-ID: <94DA9C7F532AD946852C9C5527195239254AC16C@G1W3656.americas.hpqcorp.net>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com> <CDF2F015F4429F458815ED2A6C2B6B0B2E960C83@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B2E960C83@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.193.232.33]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Fq8Uw9OmJWJSJQtwQFpKq3GOn44>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2015 23:34:50 -0000
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From nobody Tue Nov 24 04:57:47 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA2A01A21C7 for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 04:57:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9LQeovc6pdUj for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 04:57:40 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 345601A21C2 for <sfc@ietf.org>; Tue, 24 Nov 2015 04:57:38 -0800 (PST)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id C1CB52DC0DA; Tue, 24 Nov 2015 13:57:36 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.60]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id A65BA27C059; Tue, 24 Nov 2015 13:57:36 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7F.corporate.adroot.infra.ftgroup ([fe80::c1d7:e278:e357:11ad%19]) with mapi id 14.03.0248.002; Tue, 24 Nov 2015 13:57:36 +0100
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TlAu1oIoBRFeHYqkCdnlJ3Z4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAYb6gCAAKICgIAA5pRw
Date: Tue, 24 Nov 2015 12:57:35 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com>
In-Reply-To: <D278F107.3228F%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.24.122717
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/IZJrsWNP06FGeXQbMIMBkjycqQ0>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2015 12:57:46 -0000
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From nobody Tue Nov 24 04:59:52 2015
Return-Path: <christian.jacquenet@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02E0F1A6EDA for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 04:59:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rK2Cx4JugBtP for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 04:59:45 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF1681A3BA6 for <sfc@ietf.org>; Tue, 24 Nov 2015 04:59:44 -0800 (PST)
Received: from opfednr01.francetelecom.fr (unknown [xx.xx.xx.65]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id EEA9C402C3; Tue, 24 Nov 2015 13:59:42 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.75]) by opfednr01.francetelecom.fr (ESMTP service) with ESMTP id BC5001A0056; Tue, 24 Nov 2015 13:59:42 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA4.corporate.adroot.infra.ftgroup ([fe80::65de:2f08:41e6:ebbe%19]) with mapi id 14.03.0248.002; Tue, 24 Nov 2015 13:59:39 +0100
From: <christian.jacquenet@orange.com>
To: BOUCADAIR Mohamed IMT/OLN <mohamed.boucadair@orange.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWGyAgDILZ+D///eYgIAAA+EAgAAA+ACAAVwAgIAAJjmAgAAYMoCAAAgQAIAABEEAgAAQWwCAAQMyAIAAdI2AgAXIFwCAAPXggIABAFuAgAARMPA=
Date: Tue, 24 Nov 2015 12:59:38 +0000
Message-ID: <1977_1448369982_56545F3E_1977_70_5_f05052b5-6974-4bba-9bf1-f3fcafdc47fa@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/J_exeOVPb3tElg3GoR5XESHYReE>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2015 12:59:51 -0000
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From nobody Tue Nov 24 07:01:57 2015
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3E3A1A8718 for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 07:01:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n4BPwYz9wjXB for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 07:01:50 -0800 (PST)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 154BC1A8711 for <sfc@ietf.org>; Tue, 24 Nov 2015 07:01:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=35340; q=dns/txt; s=iport; t=1448377310; x=1449586910; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=Pyp+Gt5k+PDrkpxjqTISUBYxXIWrK1sntK44RelOHu0=; b=XE5F2mCOKo3nrexGBF6O/VqJtVN5UgCZklxCmRUM3CuYBuL0DrbR85RL IH4Sw1vDEtHPu3jEEwAiaMOc8F+gCdTpxUtmE4+a1409gJRkXds+kzeeI UaHVv0Z8iiXsLeB5XSUc73rxfqCCnLl0a6AdoRR/012QM2mBc2ggHTnRB U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D/AQAIe1RW/4wNJK1egztTbwa/IgENg?= =?us-ascii?q?WIDFwqFbgIcgR44FAEBAQEBAQGBCoQ0AQEBBAEBARcJEToEBwwEAgEGAhEBAgE?= =?us-ascii?q?BAQECAiMDAgICJQsUAQIGCAIEAQ0FG4gTDZB9nTWQLwEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBARQEgQGFU4R+hHGDBIFEAQSNHokyAYgVhRuBW4RAhzWLCYNxAR8BAUK?= =?us-ascii?q?CER0WgUByhCSBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,338,1444694400"; d="scan'208";a="49673898"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 24 Nov 2015 15:01:48 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id tAOF1mLZ021640 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 24 Nov 2015 15:01:48 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 24 Nov 2015 09:01:47 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Tue, 24 Nov 2015 09:01:47 -0600
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TSmXd8s/yhEWwIxa2o1DCmZ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAYb6gCAAKICgIABVDmA///O6AA=
Date: Tue, 24 Nov 2015 15:01:47 +0000
Message-ID: <D279E504.3230F%jguichar@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.131.77.10]
Content-Type: text/plain; charset="utf-8"
Content-ID: <D44AB9C195056C4D9752C9789FD03ABF@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0gNYiL0DyBxTSwfLwUUS3f9AD0I>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2015 15:01:54 -0000
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From nobody Tue Nov 24 07:38:05 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9C851A88E3 for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 07:38:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YS7Kck4YuaOr for <sfc@ietfa.amsl.com>; Tue, 24 Nov 2015 07:37:59 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 500311A88A3 for <sfc@ietf.org>; Tue, 24 Nov 2015 07:37:58 -0800 (PST)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id A136722C4E5; Tue, 24 Nov 2015 16:37:56 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.31]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 80FEF35C072; Tue, 24 Nov 2015 16:37:56 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM22.corporate.adroot.infra.ftgroup ([fe80::8c90:f4e9:be28:2a1%19]) with mapi id 14.03.0248.002; Tue, 24 Nov 2015 16:37:56 +0100
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TlAu1oIoBRFeHYqkCdnlJ3Z4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAYb6gCAAKICgIABVDmA///O6AD///kCcA==
Date: Tue, 24 Nov 2015 15:37:56 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA254A@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D279E504.3230F%jguichar@cisco.com>
In-Reply-To: <D279E504.3230F%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.24.144516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/isV-QXHpqcCvHT4My4eSOZMM72U>
Cc: sfc issue tracker <trac+sfc@tools.ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2015 15:38:04 -0000

UmUtLA0KDQpJIGNhbiBtYWtlIHRob3NlIGNoYW5nZXMuDQoNCkNoZWVycywNCk1lZA0KDQo+IC0t
LS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPiBEZcKgOiBKaW0gR3VpY2hhcmQgKGpndWljaGFy
KSBbbWFpbHRvOmpndWljaGFyQGNpc2NvLmNvbV0NCj4gRW52b3nDqcKgOiBtYXJkaSAyNCBub3Zl
bWJyZSAyMDE1IDE2OjAyDQo+IMOAwqA6IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE47IHNmY0Bp
ZXRmLm9yZw0KPiBDY8KgOiBzZmMgaXNzdWUgdHJhY2tlcg0KPiBPYmpldMKgOiBSZTogW3NmY10g
IzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29udHJvbCBwbGFuZSBvcGVyYXRlcw0K
PiBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+IA0KPiBIaSBNZWQsDQo+IA0KPiBJIHdvdWxk
IGxpa2UgdG8gc2VlIOKAnFNGQyBGb3J3YXJkaW5nIFBvbGljeSBUYWJsZeKAnSByZXBsYWNlZCB3
aXRoIOKAnFNGUA0KPiBGb3J3YXJkaW5nIFBvbGljeSBUYWJsZeKAnSBhbmQg4oCcU0ZDLXNwZWNp
ZmljIHRyYWZmaWMgZm9yd2FyZGluZ+KAnSByZXBsYWNlZA0KPiB3aXRoIOKAnFNGUC1zcGVjaWZp
YyB0cmFmZmljIGZvcndhcmRpbmfigJ07IGZvcndhcmRpbmcgaXMgZGV0ZXJtaW5lZCBiYXNlZA0K
PiB1cG9uIHRoZSBTRlAgKm5vdCogU0ZDLiBJZiB5b3UgY2FuIG1ha2UgdGhvc2UgY2hhbmdlcyB0
aGUgdGV4dCBsb29rcyBnb29kLg0KPiANCj4gSmltDQo+IA0KPiBPbiAxMS8yNC8xNSwgNzo1NyBB
TSwgIm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20iDQo+IDxtb2hhbWVkLmJvdWNhZGFpckBv
cmFuZ2UuY29tPiB3cm90ZToNCj4gDQo+ID5IaSBKaW0sIGFsbCwNCj4gPg0KPiA+SW4gb3JkZXIg
dG8gbWFrZSBzb21lIHByb2dyZXNzLCBJIHN1Z2dlc3QgdG8gbWFrZSB0aGUgZm9sbG93aW5nIGNo
YW5nZSBhcw0KPiA+YSByZXNvbHV0aW9uIHRvIHRoZSBpc3N1ZSB3ZSBhcmUgZGlzY3Vzc2luZy4g
T3RoZXIgb2NjdXJyZW5jZXMgaW4gdGhlDQo+ID5kcmFmdCB3aWxsIGJlIHR3ZWFrZWQgdG9vLg0K
PiA+DQo+ID49PT0NCj4gPk9MRDoNCj4gPiAgIG8gIFNGQyBGb3J3YXJkaW5nIFBvbGljeSBUYWJs
ZTogdGhpcyB0YWJsZSByZWZsZWN0cyB0aGUgU0ZDLXNwZWNpZmljDQo+ID4gICAgICB0cmFmZmlj
IGZvcndhcmRpbmcgcG9saWN5IGVuZm9yY2VkIGJ5IFNGRiBjb21wb25lbnRzIGZvciBldmVyeQ0K
PiA+ICAgICAgcmVsZXZhbnQgaW5jb21pbmcgcGFja2V0IHRoYXQgaXMgYXNzb2NpYXRlZCB0byBv
bmUgb2YgdGhlIGV4aXN0aW5nDQo+ID4gICAgICBTRkNzLg0KPiA+DQo+ID4gICAgICAgICBbW05v
dGU6IFRoZSBxdWVzdGlvbiBvZiB3aGV0aGVyIHRoZSBkYXRhIHBsYW5lIG9wZXJhdGVzIGp1c3Qg
aW4NCj4gPiAgICAgICAgIHRlcm1zIG9mIFNGUCBJRHMgb3IgbmVlZHMgU0ZDIElEcywgYXMgZGVz
Y3JpYmVkIGluIHRoaXMgdmVyc2lvbg0KPiA+ICAgICAgICAgb2YgdGhlIGRyYWZ0LCBpcyBzdGls
bCB1bmRlciBkaXNjdXNzaW9uIGFtb25nIHRoZSBhdXRob3JzLl1dDQo+ID5ORVc6DQo+ID4gICBv
ICBTRkMgRm9yd2FyZGluZyBQb2xpY3kgVGFibGU6IHRoaXMgdGFibGUgcmVmbGVjdHMgdGhlIFNG
Qy1zcGVjaWZpYw0KPiA+ICAgICAgdHJhZmZpYyBmb3J3YXJkaW5nIHBvbGljeSBlbmZvcmNlZCBi
eSBTRkYgY29tcG9uZW50cyBmb3IgZXZlcnkNCj4gPiAgICAgIHJlbGV2YW50IGluY29taW5nIHBh
Y2tldCB0aGF0IGlzIGFzc29jaWF0ZWQgdG8gb25lIG9mIHRoZSBleGlzdGluZw0KPiA+ICAgICAg
U0ZDcy4gIFRoZSBTRlAgSWRlbnRpZmllciAoU0ZQLWlkKSBpcyB1c2VkIGFzIGEgbG9va3VwIGtl
eSB0bw0KPiA+ICAgICAgZGV0ZXJtaW5lIGZvcndhcmRpbmcgYWN0aW9uIHJlZ2FyZGxlc3Mgb2Yg
d2hldGhlciB0aGUgU0ZDIGlzIGZ1bGx5DQo+ID4gICAgICBjb25zdHJhaW5lZCwgcGFydGlhbGx5
IGNvbnN0cmFpbmVkLCBvciBub3QgY29uc3RyYWluZWQgYXQgYWxsLg0KPiA+ICAgICAgQWRkaXRp
b25hbCBpbmZvcm1hdGlvbiBzdWNoIGFzIGEgZmxvdyBpZGVudGlmaWVyIGFuZC9vciBvdGhlcg0K
PiA+ICAgICAgY2hhcmFjdGVyaXN0aWNzIChlLmcuLCB0aGUgNS10dXBsZSB0cmFuc3BvcnQgY29v
cmRpbmF0ZXMgb2YgdGhlDQo+ID5vcmlnaW5hbA0KPiA+ICAgICAgcGFja2V0KSBtYXkgYmUgdXNl
ZCBmb3IgbG9va3VwIHB1cnBvc2VzLiAgVGhlIHNldCBvZiBpbmZvcm1hdGlvbg0KPiA+ICAgICAg
dG8gdXNlIGZvciBsb29rdXAgcHVycG9zZXMgbWF5IGJlIGluc3RydWN0ZWQgYnkgdGhlIGNvbnRy
b2wgcGxhbmUuDQo+ID49PT0NCj4gPg0KPiA+UGxlYXNlIHJldmlldyB0aGlzIHByb3Bvc2VkIHRl
eHQuDQo+ID4NCj4gPkNoZWVycywNCj4gPk1lZA0KPiA+DQo+ID4+IC0tLS0tTWVzc2FnZSBkJ29y
aWdpbmUtLS0tLQ0KPiA+PiBEZSA6IEppbSBHdWljaGFyZCAoamd1aWNoYXIpIFttYWlsdG86amd1
aWNoYXJAY2lzY28uY29tXQ0KPiA+PiBFbnZvecOpIDogbHVuZGkgMjMgbm92ZW1icmUgMjAxNSAy
Mjo0MA0KPiA+PiDDgCA6IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE4NCj4gPj4gQ2MgOiBzZmMg
aXNzdWUgdHJhY2tlcjsgc2ZjQGlldGYub3JnDQo+ID4+IE9iamV0IDogUmU6IFtzZmNdICMxNSAo
Y29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4gPj5vcGVyYXRlcw0K
PiA+PiBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+ID4+DQo+ID4+IEhpIE1lZCwNCj4gPj4N
Cj4gPj4gSSB0aGluayB0aGUgcG9pbnQgaXMgdGhhdCB0aGUgU0ZQLWlkIChub3QgU0ZDLWlkIG9y
IGFueSBvdGhlciBpZCkgaXMNCj4gPj51c2VkDQo+ID4+IGFzIHRoZSBsb29rdXAga2V5IHRvIGRl
dGVybWluZSBmb3J3YXJkaW5nIGFjdGlvbiByZWdhcmRsZXNzIG9mIHdoZXRoZXINCj4gPj50aGUN
Cj4gPj4gU0ZDIGlzIGZ1bGx5IGNvbnN0cmFpbmVkLCBwYXJ0aWFsbHkgY29uc3RyYWluZWQsIG9y
IG5vdCBjb25zdHJhaW5lZCBhdA0KPiA+PiBhbGwuIEZvcndhcmRpbmcgaXMgc2ltcGx5IHJlYWxp
emVkIGJ5IHRoZSByZXN1bHQgb2YgdGhlIGxvb2t1cCBvbiB0aGUNCj4gPj4gU0ZQLWlkLg0KPiA+
Pg0KPiA+PiBKaW0NCj4gPj4NCj4gPj4gT24gMTEvMjMvMTUsIDI6MDAgQU0sICJtb2hhbWVkLmJv
dWNhZGFpckBvcmFuZ2UuY29tIg0KPiA+PiA8bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbT4g
d3JvdGU6DQo+ID4+DQo+ID4+ID5IaSBKaW0sDQo+ID4+ID4NCj4gPj4gPlRoZSBleGNlcnB0IHlv
dSBxdW90ZWQgaXMgY2xlYXIgdG8gbWUgdG9vLiBUaGlzIGlzIG5vdCB3aGVyZSB0aGUNCj4gPj4g
PmRpc2Nvbm5lY3QgY29tZXMgZnJvbS4NCj4gPj4gPg0KPiA+PiA+VGhlIGNhc2Ugb2YgUlNQIGlz
IGFsc28gY2xlYXIuDQo+ID4+ID4NCj4gPj4gPlRoZSBvbmUgd2hpY2ggaXMgbGVzcyBjbGVhciBp
cyB3aGVuIHRoZXJlIGFyZSBubyBjb25zdHJhaW50cyBvbiB0aGUNCj4gc2ZjDQo+ID4+ID5hbmQs
IHVzaW5nIHRoZSB3b3JkaW5nIGZyb20gdGhlIGRwIGFyY2ggUkZDLCB0aGUgZGVjaXNpb25zIGFy
ZQ0KPiA+PiJkZWZlcnJlZA0KPiA+PiA+dG8gdGhlIFNGRiBhYm91dCB0aGUgZXhhY3Qgc2VxdWVu
Y2Ugb2Ygc3RlcHMgdG8gYmUgdXNlZCB0byByZWFsaXplIHRoZQ0KPiA+PiA+U0ZDIiAoU2VjdGlv
biAyLjMgb2YgUkZDIDc2NjUpLiBDYWxsaW5nIHRoYXQgY2FzZSBhbiBTRlAgaXMgb2RkIHNpbmNl
DQo+ID4+U0ZQDQo+ID4+ID5pcyBieSBkZWZpbml0aW9uIGEgInRob3VnaHQgb2YgYXMgYSBjb25z
dHJhaW5lZCB2ZXJzaW9uIG9mIHRoZQ0KPiBvcmlnaW5hbA0KPiA+PiA+U0ZDIiAoU2VjdGlvbiAy
LjMgb2YgUkZDIDc2NjUpDQo+ID4+ID4NCj4gPj4gPlJGQzc2NjUgYWxzbyBBQ0tzICJ0aGUgc3Bl
Y2lmaWNpdHkgbWF5IGJlIGFueXdoZXJlIGluIGJldHdlZW4gdGhlc2UNCj4gPj4gPmV4dHJlbWVz
IiB3aGljaCBJIHVuZGVyc3RhbmQgYXMgdGhlIGFyY2hpdGVjdHVyZSBhbGxvd3MgZm9yIHRoZXNl
DQo+ID4+ID5jb25maWd1cmF0aW9uczogKDEpIGZ1bGx5IGRpc3RyaWJ1dGVkLCAoMikgbG9vc2Ug
cGF0aCwgKDMpIHN0cmljdA0KPiBwYXRoLg0KPiA+PiA+DQo+ID4+ID5DaGVlcnMsDQo+ID4+ID5N
ZWQNCj4gPj4gPg0KPiA+PiA+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gPj4gPj4g
RGUgOiBKaW0gR3VpY2hhcmQgKGpndWljaGFyKSBbbWFpbHRvOmpndWljaGFyQGNpc2NvLmNvbV0N
Cj4gPj4gPj4gRW52b3nDqSA6IGpldWRpIDE5IG5vdmVtYnJlIDIwMTUgMTU6NDMNCj4gPj4gPj4g
w4AgOiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xODQo+ID4+ID4+IENjIDogc2ZjIGlzc3VlIHRy
YWNrZXI7IHNmY0BpZXRmLm9yZzsgSm9lbCBIYWxwZXJuOyBKb2VsIE0uIEhhbHBlcm4NCj4gPj4g
Pj4gT2JqZXQgOiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0aGUgY29u
dHJvbCBwbGFuZQ0KPiA+PiA+Pm9wZXJhdGVzDQo+ID4+ID4+IG9uIFNGQyBJRHMsIFNGUCBJRHMs
IGV0Yy4NCj4gPj4gPj4NCj4gPj4gPj4gSGkgTWVkLA0KPiA+PiA+Pg0KPiA+PiA+PiBPbiAxMS8x
OS8xNSwgMjo0NSBBTSwgIm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20iDQo+ID4+ID4+IDxt
b2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tPiB3cm90ZToNCj4gPj4gPj4NCj4gPj4gPj4gPkhp
IEppbSwNCj4gPj4gPj4gPg0KPiA+PiA+PiA+TGV0J3MgbWUgcmVwaHJhc2UgdGhlIGlzc3VlLg0K
PiA+PiA+PiA+DQo+ID4+ID4+ID5XaGF0IHdlIGFyZSBkaXNjdXNzaW5nIGlzIHJlbGF0ZWQgdG8g
dGhpcyBwYXJ0IG9mIHRoZSBkcmFmdCAoYW5kDQo+ID4+c29tZQ0KPiA+PiA+PiA+b3RoZXIgb2Nj
dXJyZW5jZXMpOg0KPiA+PiA+PiA+DQo+ID4+ID4+ID49PT09PT0NCj4gPj4gPj4gPiAgIG8gIFNG
QyBGb3J3YXJkaW5nIFBvbGljeSBUYWJsZTogdGhpcyB0YWJsZSByZWZsZWN0cyB0aGUgU0ZDLQ0K
PiA+PiBzcGVjaWZpYw0KPiA+PiA+PiA+ICAgICAgdHJhZmZpYyBmb3J3YXJkaW5nIHBvbGljeSBl
bmZvcmNlZCBieSBTRkYgY29tcG9uZW50cyBmb3INCj4gZXZlcnkNCj4gPj4gPj4gPiAgICAgIHJl
bGV2YW50IGluY29taW5nIHBhY2tldCB0aGF0IGlzIGFzc29jaWF0ZWQgdG8gb25lIG9mIHRoZQ0K
PiA+PiA+PmV4aXN0aW5nDQo+ID4+ID4+ID4gICAgICBTRkNzLg0KPiA+PiA+PiA+DQo+ID4+ID4+
ID4gICAgICAgICBbW05vdGU6IFRoZSBxdWVzdGlvbiBvZiB3aGV0aGVyIHRoZSBkYXRhIHBsYW5l
IG9wZXJhdGVzDQo+ID4+anVzdA0KPiA+PiA+PmluDQo+ID4+ID4+ID4gICAgICAgICB0ZXJtcyBv
ZiBTRlAgSURzIG9yIG5lZWRzIFNGQyBJRHMsIGFzIGRlc2NyaWJlZCBpbiB0aGlzDQo+ID4+ID4+
dmVyc2lvbg0KPiA+PiA+PiA+ICAgICAgICAgb2YgdGhlIGRyYWZ0LCBpcyBzdGlsbCB1bmRlciBk
aXNjdXNzaW9uIGFtb25nIHRoZQ0KPiA+PmF1dGhvcnMuXV0NCj4gPj4gPj4gPj09PT09PT0NCj4g
Pj4gPj4gPg0KPiA+PiA+PiA+VGhlIGN1cnJlbnQgZHJhZnQgaXMgZ2VuZXJpYyBhcyBpdCBhbGxv
d3MgdG8gaW5zdHJ1Y3QgdmlhIHRoZSBjcA0KPiA+PiA+PiA+aW50ZXJmYWNlcyB0aGUgdW5kZXJs
eWluZyBkcCBlbGVtZW50cyB3aXRoIFNGQywgU0ZQLCBSU1AsIGFuZCBvdGhlcg0KPiA+PiA+PiA+
cG9saWNpZXMuIFdoZW4gcHJlcGFyaW5nIHRoZSBkcmFmdCwgSSBoYWQgYSBkaXNjdXNzaW9uIHdp
dGggSm9lbA0KPiA+PmFib3V0DQo+ID4+ID4+ID50aGlzIGRlc2lnbi4gV2UgYm90aCBhZ3JlZWQg
dGhhdCB0aGlzIGlzIHdvcnRoIHRvIGJlIGRpc2N1c3NlZC4NCj4gPj4gPj4gPg0KPiA+PiA+PiA+
SSBleHBsYWluZWQsIGFuZCBvdGhlciBoYXZlIGRvbmUgdGhhdCB0b28sIHRoYXQgYm90aCBtb2Rl
bHMgc2hvdWxkDQo+ID4+YmUNCj4gPj4gPj4gPmFkZHJlc3NlZC4NCj4gPj4gPj4gPg0KPiA+PiA+
PiA+VGhlIGRpc2N1c3Npb24gcmV2ZWFsZWQgdGhlIGRlZmluaXRpb24gaW4gdGhlIGRwIFJGQyBh
cmUgdG9vIHZhZ3VlLg0KPiA+PldlDQo+ID4+ID4+ID5uZWVkIHRvIHJlc29sdmUgdGhhdCBhcyBX
Ry4NCj4gPj4gPj4NCj4gPj4gPj4gSmltPiB3aGljaCBkb2N1bWVudCBhbmQgd2hhdCBleGFjdGx5
IGlzIHRvbyB2YWd1ZT8gRm9yIGV4YW1wbGUgaWYgd2UNCj4gPj4gPj5yZWZlcg0KPiA+PiA+PiB0
byBzZWN0aW9uIDIuMy4xIG9mIFJGQzc2NjUgaXQgc3RhdGVzOg0KPiA+PiA+Pg0KPiA+PiA+PiAi
QXMgYW4gZXhhbXBsZSBvZiB0aGlzIHByb2dyZXNzaXZlIHJlZmluZW1lbnQsIGNvbnNpZGVyIGEg
U2VydmljZQ0KPiA+PiA+PiAgICBGdW5jdGlvbiBDaGFpbiAoU0ZDKSB0aGF0IHN0YXRlcyB0aGF0
IHBhY2tldHMgdXNpbmcgdGhpcyBjaGFpbg0KPiA+PiBzaG91bGQNCj4gPj4gPj4gICAgYmUgZGVs
aXZlcmVkIHRvIGEgZmlyZXdhbGwgYW5kIGEgY2FjaGluZyBlbmdpbmUuDQo+ID4+ID4+DQo+ID4+
ID4+ICAgIEEgU2VydmljZSBGdW5jdGlvbiBQYXRoIChTRlApIGNvdWxkIHJlZmluZSB0aGlzLCBj
b25zaWRlcmluZyB0aGF0DQo+ID4+ID4+ICAgIHRoaXMgYXJjaGl0ZWN0dXJlIGRvZXMgbm90IG1h
bmRhdGUgdGhlIGRlZ3JlZSBvZiBzcGVjaWZpY2l0eSBhbg0KPiA+PlNGUA0KPiA+PiA+PiAgICBo
YXMgdG8gaGF2ZS4gIEl0IG1pZ2h0IHNwZWNpZnkgdGhhdCB0aGUgZmlyZXdhbGwgYW5kIGNhY2hp
bmcNCj4gPj5lbmdpbmUNCj4gPj4gPj4gICAgYXJlIGJvdGggdG8gYmUgaW4gYSBzcGVjaWZpYyBk
YXRhIGNlbnRlciAoZS5nLiwgaW4gREMxKSwgb3IgaXQNCj4gPj5taWdodA0KPiA+PiA+PiAgICBz
cGVjaWZ5IGV4YWN0bHkgd2hpY2ggaW5zdGFuY2Ugb2YgZWFjaCBmaXJld2FsbCBhbmQgY2FjaGlu
Zw0KPiBlbmdpbmUNCj4gPj4gaXMNCj4gPj4gPj4gICAgdG8gYmUgdXNlZC4NCj4gPj4gPj4NCj4g
Pj4gPj4NCj4gPj4gPj4gVGhlIFJlbmRlcmVkIFNlcnZpY2UgUGF0aCAoUlNQKSBpcyB0aGUgYWN0
dWFsIHNlcXVlbmNlIG9mIFNGRnMgYW5kDQo+ID4+ID4+ICAgIFNGcyB0aGF0IHRoZSBwYWNrZXRz
IHdpbGwgYWN0dWFsbHkgdmlzaXQuICBTbyBpZiB0aGUgU0ZQIHBpY2tlZA0KPiA+PnRoZQ0KPiA+
PiA+PiAgICBEQywgdGhlIFJTUCB3b3VsZCBiZSBtb3JlIHNwZWNpZmljLuKAnQ0KPiA+PiA+Pg0K
PiA+PiA+Pg0KPiA+PiA+PiBXaGF0IGV4YWN0bHkgaXMgdmFndWUgYWJvdXQgdGhpcz8gU2VlbXMg
cHJldHR5IGNsZWFyLCBhdCBsZWFzdCB0bw0KPiBtZSwNCj4gPj4gPj5ob3cNCj4gPj4gPj4gcHJv
Z3Jlc3NpdmUgcmVmaW5lbWVudCBmcm9tIFNGQyB0byBldmVudHVhbCBSU1AgaXMgYWNoaWV2ZWQu
DQo+ID4+ID4+DQo+ID4+ID4+IEppbQ0KPiA+PiA+Pg0KPiA+PiA+PiA+DQo+ID4+ID4+ID5DaGVl
cnMsDQo+ID4+ID4+ID5NZWQNCj4gPj4gPj4gPg0KPiA+PiA+PiA+PiAtLS0tLU1lc3NhZ2UgZCdv
cmlnaW5lLS0tLS0NCj4gPj4gPj4gPj4gRGUgOiBKaW0gR3VpY2hhcmQgKGpndWljaGFyKSBbbWFp
bHRvOmpndWljaGFyQGNpc2NvLmNvbV0NCj4gPj4gPj4gPj4gRW52b3nDqSA6IG1lcmNyZWRpIDE4
IG5vdmVtYnJlIDIwMTUgMTc6MTgNCj4gPj4gPj4gPj4gw4AgOiBDYXJsb3MgUGlnbmF0YXJvIChj
cGlnbmF0YSk7IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE4NCj4gPj4gPj4gPj4gQ2MgOiBzZmMg
aXNzdWUgdHJhY2tlcjsgc2ZjQGlldGYub3JnOyBQYXVsIFF1aW5uIChwYXVscSk7DQo+ID4+ID4+
ID4+ZHJhZnQtaWV0Zi1zZmMtDQo+ID4+ID4+ID4+IGNvbnRyb2wtcGxhbmVAdG9vbHMuaWV0Zi5v
cmc7IEpvZWwgSGFscGVybjsgSm9lbCBNLiBIYWxwZXJuDQo+ID4+ID4+ID4+IE9iamV0IDogUmU6
IFtzZmNdICMxNSAoY29udHJvbC1wbGFuZSk6IFdoZXRoZXIgdGhlIGNvbnRyb2wgcGxhbmUNCj4g
Pj4gPj4gPj5vcGVyYXRlcw0KPiA+PiA+PiA+PiBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+
ID4+ID4+ID4+DQo+ID4+ID4+ID4+IFtDaGFpciBoYXQgb2ZmIOKApl0NCj4gPj4gPj4gPj4NCj4g
Pj4gPj4gPj4gSSBoYXZlIHRvIHNheSBJIGFtIHN0cnVnZ2xpbmcgdG8gc2VlIHRoZSDigJxpc3N1
ZeKAnSBpbiB0aGlzIHRocmVhZA0KPiA+PnRoYXQNCj4gPj4gPj4gPj5uZWVkcw0KPiA+PiA+PiA+
PiB0byBiZSBhZGRyZXNzZWQgb3RoZXIgdGhhbiBjb25mdXNpb24gb3ZlciBTRkMgdnMgU0ZQIGRl
ZmluaXRpb247DQo+ID4+ID4+ZnJvbSBhDQo+ID4+ID4+ID4+IGRhdGEgcGxhbmUgcGVyc3BlY3Rp
dmUgaXQgaXMgKnZlcnkqIGNsZWFyIHRoYXQgU0ZQL1NJIGlkZW50aWZpZXJzDQo+ID4+IGFyZQ0K
PiA+PiA+PiA+PnVzZWQNCj4gPj4gPj4gPj4gYXMgdGhlIGxvb2t1cCBrZXkgaW50byBhIGZvcndh
cmRpbmcgY29uc3RydWN0IHRoYXQgbWF5IGNvbnRhaW4NCj4gMTpuDQo+ID4+ID4+ID4+bnVtYmVy
DQo+ID4+ID4+ID4+IG9mIG5leHQtaG9wcyAoU0ZGcywgU0ZzKS4gSW4gc29tZSBjYXNlcyB0aGF0
IGxvb2t1cCB3aWxsIHBvaW50IHRvDQo+ID4+YQ0KPiA+PiA+PiA+PnNpbmdsZQ0KPiA+PiA+PiA+
PiBuZXh0LWhvcCwgaW4gb3RoZXJzIG11bHRpcGxlIG5leHQtaG9wcy4gSW4gKmFsbCogY2FzZXMg
dGhpcyBoYXMNCj4gPj4gPj4gPj5hYnNvbHV0ZWx5DQo+ID4+ID4+ID4+IG5vdGhpbmcgdG8gZG8g
d2l0aCB0aGUgU0ZDIGFzIGVhY2ggcmVwcmVzZW50YXRpb24gb2YgdGhhdCBTRkMgaXMNCj4gPj4g
Pj4gPj51bmlxdWVseQ0KPiA+PiA+PiA+PiBpZGVudGlmaWVkIGJ5IGFuIFNGUC1pZC4NCj4gPj4g
Pj4gPj4NCj4gPj4gPj4gPj4gSmltDQo+ID4+ID4+ID4+DQo+ID4+ID4+ID4+IE9uIDExLzE4LzE1
LCAxMDoxOSBBTSwgInNmYyBvbiBiZWhhbGYgb2YgQ2FybG9zIFBpZ25hdGFybw0KPiA+PiAoY3Bp
Z25hdGEpIg0KPiA+PiA+PiA+PiA8c2ZjLWJvdW5jZXNAaWV0Zi5vcmcgb24gYmVoYWxmIG9mIGNw
aWduYXRhQGNpc2NvLmNvbT4gd3JvdGU6DQo+ID4+ID4+ID4+DQo+ID4+ID4+ID4+ID5IaSwgTWVk
LA0KPiA+PiA+PiA+PiA+DQo+ID4+ID4+ID4+ID5JIGFsc28gcmVmZXJyZWQgdG8gb3RoZXIgcGFy
dHMgb2YgdGhlIGRvY3VtZW50LCB3aGVuIEkgd3JvdGU6DQo+ID4+ID4+ID4+ID4NCj4gPj4gPj4g
Pj4gPj4gVGhlIGNvbnRyb2wtcGxhbmUgZHJhZnQgdGFsa3MgYWJvdXQgwrNTRkMgZm9yd2FyZGlu
Z8KyIGFuZCDCs1NGQw0KPiA+PiBkYXRhDQo+ID4+ID4+ID4+ID4+cGxhbmXCsg0KPiA+PiA+PiA+
PiA+DQo+ID4+ID4+ID4+ID4NCj4gPj4gPj4gPj4gPkZvciBleGFtcGxlLCBJIGFtIG5vdCBzdXJl
IEkgdW5kZXJzdGFuZCB3aGF0IHRoaXMgbWVhbnM6DQo+ID4+ID4+ID4+ID4NCj4gPj4gPj4gPj4g
PiIgICBvICBQb3B1bGF0ZSBTRkMgZm9yd2FyZGluZyBwb2xpY3kgdGFibGVzIG9mIGludm9sdmVk
IFNGQw0KPiBkYXRhDQo+ID4+ID4+ID4+cGxhbmXCsg0KPiA+PiA+PiA+PiA+DQo+ID4+ID4+ID4+
ID4NCj4gPj4gPj4gPj4gPk9yIGF0Og0KPiA+PiA+PiA+PiA+IiAgIG8gIFNGQyBGb3J3YXJkaW5n
IFBvbGljeSBUYWJsZTogdGhpcyB0YWJsZSByZWZsZWN0cyB0aGUNCj4gPj4gPj4gPj5TRkMtc3Bl
Y2lmaWMNCj4gPj4gPj4gPj4gPiAgICAgdHJhZmZpYyBmb3J3YXJkaW5nIHBvbGljeSBlbmZvcmNl
ZCBieSBTRkYgY29tcG9uZW50cyBmb3INCj4gPj5ldmVyeQ0KPiA+PiA+PiA+PiA+ICAgICByZWxl
dmFudCBpbmNvbWluZyBwYWNrZXQgdGhhdCBpcyBhc3NvY2lhdGVkIHRvIG9uZSBvZiB0aGUNCj4g
Pj4gPj4gZXhpc3RpbmcNCj4gPj4gPj4gPj4gPiAgICAgU0ZDcy4iDQo+ID4+ID4+ID4+ID4NCj4g
Pj4gPj4gPj4gPg0KPiA+PiA+PiA+PiA+TXkgY29tbWVudCBpcyB0aGF0IHRob3NlIHNob3VsZCBi
ZSDCs1NGUCINCj4gPj4gPj4gPj4gPg0KPiA+PiA+PiA+PiA+VGhhbmtzLA0KPiA+PiA+PiA+PiA+
DQo+ID4+ID4+ID4+ID7igLkgQ2FybG9zLg0KPiA+PiA+PiA+PiA+DQo+ID4+ID4+ID4+ID4tLS0t
LU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiA+PiA+PiA+PiA+RnJvbTogTWVkIEJvdWNhZGFpciA8
bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbT4NCj4gPj4gPj4gPj4gPkRhdGU6IFdlZG5lc2Rh
eSwgTm92ZW1iZXIgMTgsIDIwMTUgYXQgMTA6MDMgQU0NCj4gPj4gPj4gPj4gPlRvOiBDYXJsb3Mg
UGlnbmF0YXJvIDxjcGlnbmF0YUBjaXNjby5jb20+DQo+ID4+ID4+ID4+ID5DYzogIlBhdWwgUXVp
bm4gKHBhdWxxKSIgPHBhdWxxQGNpc2NvLmNvbT4sDQo+ID4+ID4+ID4+ID4iZHJhZnQtaWV0Zi1z
ZmMtY29udHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZyINCj4gPj4gPj4gPj4gPjxkcmFmdC1pZXRm
LXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnPiwgSm9lbCBIYWxwZXJuDQo+ID4+ID4+
ID4+ID48am1oQGpvZWxoYWxwZXJuLmNvbT4sIHNmYyBpc3N1ZSB0cmFja2VyDQo+ID4+PHRyYWMr
c2ZjQHRvb2xzLmlldGYub3JnPiwNCj4gPj4gPj4gPj4gPiJzZmNAaWV0Zi5vcmciIDxzZmNAaWV0
Zi5vcmc+LCBKb2VsIEhhbHBlcm4NCj4gPj4gPj4gPGpvZWwuaGFscGVybkBlcmljc3Nvbi5jb20+
DQo+ID4+ID4+ID4+ID5TdWJqZWN0OiBSRTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hl
dGhlciB0aGUgY29udHJvbA0KPiBwbGFuZQ0KPiA+PiA+PiA+PiBvcGVyYXRlcw0KPiA+PiA+PiA+
PiA+b24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPiA+PiA+PiA+PiA+DQo+ID4+ID4+ID4+ID4+
Q2FybG9zLA0KPiA+PiA+PiA+PiA+Pg0KPiA+PiA+PiA+PiA+PlRoZXJlIGlzIG5vdCBTRkMgSUQg
aW4gdGhlIGNvcmUgdGV4dCBvZiB0aGUgY29udHJvbCBwbGFuZQ0KPiBkcmFmdC4NCj4gPj4gPj4g
Pj4gPj4NCj4gPj4gPj4gPj4gPj5UaGUgdGV4dCB5b3UgcXVvdGVkIGlzIHBhcnQgb2YgYW4gYXBw
ZW5kaXggd2l0aCBhIG5vdGUgdGhhdA0KPiA+PiBjbGVhcmx5DQo+ID4+ID4+ID4+ID4+c3RhdGVz
IHRoaXMgaXMgbm90IGRpc2N1c3NlZC4gQSBjb3JyZXNwb25kaW5nIGlzc3VlIHJlY29yZCBoYXMN
Cj4gPj4gYmVlbg0KPiA+PiA+PiA+PiA+PnJlY29yZGVkIHRvIHNlZWsgZm9yIG1vcmUgZmVlZGJh
Y2sgb24gdGhhdCBhcHBlbmRpeC4NCj4gPj4gPj4gPj4gPj4NCj4gPj4gPj4gPj4gPj5DaGVlcnMs
DQo+ID4+ID4+ID4+ID4+TWVkDQo+ID4+ID4+ID4+ID4+DQo+ID4+ID4+ID4+ID4+PiAtLS0tLU1l
c3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gPj4gPj4gPj4gPj4+IERlIDogQ2FybG9zIFBpZ25hdGFy
byAoY3BpZ25hdGEpIFttYWlsdG86Y3BpZ25hdGFAY2lzY28uY29tXQ0KPiA+PiA+PiA+PiA+Pj4g
RW52b3nDqSA6IG1lcmNyZWRpIDE4IG5vdmVtYnJlIDIwMTUgMTU6MzUNCj4gPj4gPj4gPj4gPj4+
IMOAIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTg0KPiA+PiA+PiA+PiA+Pj4gQ2MgOiBQYXVs
IFF1aW5uIChwYXVscSk7DQo+ID4+ID4+ID4+ZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZUB0
b29scy5pZXRmLm9yZzsNCj4gPj4gPj4gPj4gPj4+Sm9lbA0KPiA+PiA+PiA+PiA+Pj4gTS4gSGFs
cGVybjsgc2ZjIGlzc3VlIHRyYWNrZXI7IHNmY0BpZXRmLm9yZzsgSm9lbCBIYWxwZXJuDQo+ID4+
ID4+ID4+ID4+PiBPYmpldCA6IFJlOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVy
IHRoZSBjb250cm9sDQo+ID4+cGxhbmUNCj4gPj4gPj4gPj4gPj4+b3BlcmF0ZXMNCj4gPj4gPj4g
Pj4gPj4+IG9uIFNGQyBJRHMsIFNGUCBJRHMsIGV0Yy4NCj4gPj4gPj4gPj4gPj4+DQo+ID4+ID4+
ID4+ID4+PiBNZWQsDQo+ID4+ID4+ID4+ID4+Pg0KPiA+PiA+PiA+PiA+Pj4gPiBPbiBOb3YgMTgs
IDIwMTUsIGF0IDg6MDggQU0sIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20NCj4gPj4gPj53
cm90ZToNCj4gPj4gPj4gPj4gPj4+ID4NCj4gPj4gPj4gPj4gPj4+ID4gQ2FybG9zLA0KPiA+PiA+
PiA+PiA+Pj4gPg0KPiA+PiA+PiA+PiA+Pj4gPiBUaGlzIGlzIGFuIG9wZW4gaXNzdWUgZm9yIHRo
aXMgZHJhZnQsIHNvIGl0IGlzIG5vcm1hbCB0bw0KPiA+PiA+PmNvbnRpbnVlDQo+ID4+ID4+ID4+
ID4+PiBkaXNjdXNzaW5nIGl0LiBJIGRvbid0IGtub3cgaG93IHlvdSBjYW4gY29uY2x1ZGUgaW4g
YWR2YW5jZQ0KPiA+PnRoYXQNCj4gPj4gPj53ZQ0KPiA+PiA+PiA+PiBhcmUNCj4gPj4gPj4gPj4g
Pj4+IGNpcmNsaW5nLg0KPiA+PiA+PiA+PiA+Pj4gPg0KPiA+PiA+PiA+PiA+Pj4NCj4gPj4gPj4g
Pj4gPj4+IERpc2N1c3Npb24gaXMgZ3JlYXQsIE1lZC4gQnV0IG15IMWSd2UgYXJlIGNpcmNsaW5n
JyBjb21tZW50DQo+ID4+KG5vdA0KPiA+PiA+PmluDQo+ID4+ID4+ID4+ID4+PiBhZHZhbmNlZCwg
YnV0IGFscmVhZHkgZXZpZGVudCkgaXMgYmVjYXVzZSBJIHNhdyB0aGUgc2FtZQ0KPiA+PiA+PnF1
ZXN0aW9ucywNCj4gPj4gPj4gPj4gPj4+c2FtZQ0KPiA+PiA+PiA+PiA+Pj4gYXJndW1lbnRzLCBh
bmQgc2FtZSBhbnN3ZXJzIGFzIGJlZm9yZS4NCj4gPj4gPj4gPj4gPj4+DQo+ID4+ID4+ID4+ID4+
PiA+ICJzdHJvbmdseSBiZWxpZXZlIiBpcyBub3QgYSB0ZWNobmljYWwgYXJndW1lbnQsIGJ0dy4N
Cj4gPj4gPj4gPj4gPj4+ID4NCj4gPj4gPj4gPj4gPj4+DQo+ID4+ID4+ID4+ID4+PiBXZWxsLCBJ
IGJlbGlldmUgc28gb24gdGVjaG5pY2FsIGdyb3VuZHMhIE1vc3Qgb2Ygd2hpY2ggaGF2ZQ0KPiA+
PiA+PmFscmVhZHkNCj4gPj4gPj4gPj4gPj4+YmVlbg0KPiA+PiA+PiA+PiA+Pj4gc2FpZCwgc28g
SSBkbyBub3Qgd2FudCB0byBjb250cmlidXRlIHRvIHRoZSBjaXJjdWxhcg0KPiA+PmRpc2N1c3Np
b24uDQo+ID4+ID4+ID4+ID4+Pg0KPiA+PiA+PiA+PiA+Pj4gVGhlIGNvbnRyb2wtcGxhbmUgZHJh
ZnQgdGFsa3MgYWJvdXQgwrNTRkMgZm9yd2FyZGluZ8KyIGFuZCDCs1NGQw0KPiA+PiA+PmRhdGEN
Cj4gPj4gPj4gPj4gPj4+cGxhbmXCsiwNCj4gPj4gPj4gPj4gPj4+IGFuZCDCs1NGQyBJRHPCsi4g
VGhlIGFyY2hpdGVjdHVyZSBzYXlzIHRoYXQgU0ZDIGFyZSBtYWRlIG9mDQo+ID4+ID4+YWJzdHJh
Y3QNCj4gPj4gPj4gPj4gPj4+c2VydmljZQ0KPiA+PiA+PiA+PiA+Pj4gZnVuY3Rpb25zLiBUaGVy
ZcK5cyBubyBhY3R1YWwgZm9yd2FyZGluZyBpbiB0aGlzIGFic3RyYWN0DQo+ID4+ID4+Y29uY2Vw
dHVhbA0KPiA+PiA+PiA+PiA+Pj5tb2RlbC4NCj4gPj4gPj4gPj4gPj4+DQo+ID4+ID4+ID4+ID4+
PiBUaGUgY29udHJvbC1wbGFuZSBkcmFmdCBzYXlzIMKzU3VwcG9zZSB0aGUgU0ZDIElEIGZvciB0
aGlzIFNGUA0KPiA+PmlzDQo+ID4+ID4+ID4+ID4+PiAieWVsbG93wrIswrIsIGFuZCBteSBwb2lu
dCBhZ2FpbiBpcyB0aGF0IGluIHRoZSBkYXRhIHBsYW5lIGFuDQo+ID4+U0ZQDQo+ID4+ID4+aGFz
DQo+ID4+ID4+ID4+YW4NCj4gPj4gPj4gPj4gPj4+IGlkZW50aWZpZXIgKHdoaWNoIGlkZW50aWZp
ZXMgdGhlIFNGUCAoU0ZQLUlEKSBhbmQgaXMgbm90IHRoZQ0KPiA+PiA+PiA+PiBpZGVudGlmaWVy
DQo+ID4+ID4+ID4+ID4+Pm9mDQo+ID4+ID4+ID4+ID4+PiBzb21ldGhpbmcgZWxzZSwgaXTCuXMg
bm90IGEgVG9wb2xvZ3ktSUQsIGl0wrlzIG5vdCBhIFNLVSwgaXTCuXMNCj4gPj5ub3QNCj4gPj4g
Pj5hDQo+ID4+ID4+ID4+IFVSSSwNCj4gPj4gPj4gPj4gPj4+IGl0wrlzIG5vdCBhIEZhbWlseSBO
YW1lLCBhbmQgbm90IGFuIFNGQyBJRCksIGFuZCB0aGUgY29udHJvbA0KPiA+PihhbmQNCj4gPj4g
Pj4gPj4gPj4+cG9saWN5KQ0KPiA+PiA+PiA+PiA+Pj4gcGxhbmUgY2FuIG9mIGNvdXJzZSB3b3Jr
IHdpdGggU0ZDcy4NCj4gPj4gPj4gPj4gPj4+DQo+ID4+ID4+ID4+ID4+PiBNeSAkMC4wMi4NCj4g
Pj4gPj4gPj4gPj4+DQo+ID4+ID4+ID4+ID4+PiBUaGFua3MsDQo+ID4+ID4+ID4+ID4+Pg0KPiA+
PiA+PiA+PiA+Pj4g4oC5IENhcmxvcy4NCj4gPj4gPj4gPj4gPj4+DQo+ID4+ID4+ID4+ID4+PiA+
IENoZWVycywNCj4gPj4gPj4gPj4gPj4+ID4gTWVkDQo+ID4+ID4+ID4+ID4+PiA+DQo+ID4+ID4+
ID4+ID4+PiA+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gPj4gPj4gPj4gPj4+ID4+
IERlIDogQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpDQo+ID4+W21haWx0bzpjcGlnbmF0YUBj
aXNjby5jb21dDQo+ID4+ID4+ID4+ID4+PiA+PiBFbnZvecOpIDogbWVyY3JlZGkgMTggbm92ZW1i
cmUgMjAxNSAxMTo1Mg0KPiA+PiA+PiA+PiA+Pj4gPj4gw4AgOiBKb2VsIEhhbHBlcm4NCj4gPj4g
Pj4gPj4gPj4+ID4+IENjIDogQk9VQ0FEQUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlubiAo
cGF1bHEpOw0KPiA+PiA+PiA+PmRyYWZ0LWlldGYtc2ZjLQ0KPiA+PiA+PiA+PiA+Pj4gPj4gY29u
dHJvbC1wbGFuZUB0b29scy5pZXRmLm9yZzsgSm9lbCBNLiBIYWxwZXJuOyBzZmMgaXNzdWUNCj4g
Pj4gPj4gdHJhY2tlcjsNCj4gPj4gPj4gPj4gPj4+ID4+IHNmY0BpZXRmLm9yZw0KPiA+PiA+PiA+
PiA+Pj4gPj4gT2JqZXQgOiBSZTogW3NmY10gIzE1IChjb250cm9sLXBsYW5lKTogV2hldGhlciB0
aGUgY29udHJvbA0KPiA+PiA+PnBsYW5lDQo+ID4+ID4+ID4+ID4+PiBvcGVyYXRlcw0KPiA+PiA+
PiA+PiA+Pj4gPj4gb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPiA+PiA+PiA+PiA+Pj4gPj4N
Cj4gPj4gPj4gPj4gPj4+ID4+IEkgYW0gYSBiaXQgYmFmZmxlZCB0byBzZWUgdGhpcyB0aHJlYWQg
YWdhaW4g4oC5IGl0IGFwcGVhcnMNCj4gPj50aGUNCj4gPj4gPj4gPj4gPj4+ZGlzY3Vzc2lvbg0K
PiA+PiA+PiA+PiA+Pj4gPj4gcmVzdGFydGVkIHRvIGNvbnRpbnVlIGluIGNpcmNsZXMuDQo+ID4+
ID4+ID4+ID4+PiA+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4gTWVkLA0KPiA+PiA+PiA+PiA+Pj4gPj4N
Cj4gPj4gPj4gPj4gPj4+ID4+IEkgdG9vIGFncmVlIHdpdGggSm9lbCBhbmQgc3Ryb25nbHkgYmVs
aWV2ZSB0aGVyZSBpcyBubw0KPiBuZWVkDQo+ID4+ID4+Zm9yDQo+ID4+ID4+ID4+U0ZDDQo+ID4+
ID4+ID4+ID4+PiA+PiBpZGVudGlmaWNhdGlvbiBwYXNzZWQgZG93biDigLkgdGhlcmUgaXMgbm8g
cHJvdmlzaW9uaW5nIG9mDQo+ID4+U0ZDcw0KPiA+PiA+PiA+PiA+Pj4gc291dGhib3VuZC4NCj4g
Pj4gPj4gPj4gPj4+ID4+DQo+ID4+ID4+ID4+ID4+PiA+PiAoQWxtb3N0KSBldmVyeSBpbnN0YW5j
ZSBvZiDCs1NGQ8KyIGluIHRoZSBjb250cm9sLXBsYW5lDQo+ID4+ID4+ID4+cmVxdWlyZW1lbnRz
DQo+ID4+ID4+ID4+ID4+PiBkcmFmdA0KPiA+PiA+PiA+PiA+Pj4gPj4gc2hvdWxkIHJlYWxseSBz
YXkgwrNTRlDCsi4gVGhlcmUgaXMgbm8gdXNlIG9mIHRhbGtpbmcgYWJvdXQNCj4gPj4gU0ZDcw0K
PiA+PiA+PiA+PiA+Pj50b3dhcmRzDQo+ID4+ID4+ID4+ID4+PiB0aGUNCj4gPj4gPj4gPj4gPj4+
ID4+IGRhdGEgcGxhbmUuIFRoZSByZWxhdGlvbnNoaXAgYmV0d2VlbiBjaGFpbnMgYW5kIHBhdGhz
IGlzIGENCj4gPj4gPj4gcG9saWN5DQo+ID4+ID4+ID4+ID4+PiBtYXR0ZXINCj4gPj4gPj4gPj4g
Pj4+ID4+IHdoaWNoIGJlbG9uZ3MgaW4gdGhlIHBvbGljeS9jb250cm9sIGl0c2VsZiwgYnV0IG5v
dCBvdXQgb2YNCj4gPj4gPj4gdGhlcmUuDQo+ID4+ID4+ID4+ID4+PiA+Pg0KPiA+PiA+PiA+PiA+
Pj4gPj4gVGhpcyBpcyBubyBkaWZmZXJlbnQgdGhhbiB3aGF0IEkgc2FpZCBhIGZldyBtb250aHMg
YWdvIG9uDQo+ID4+dGhlDQo+ID4+ID4+ID4+c2FtZQ0KPiA+PiA+PiA+PiA+Pj4gdG9waWMuDQo+
ID4+ID4+ID4+ID4+PiA+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4gVGhhbmtzLA0KPiA+PiA+PiA+PiA+
Pj4gPj4NCj4gPj4gPj4gPj4gPj4+ID4+IOKAuSBDYXJsb3MuDQo+ID4+ID4+ID4+ID4+PiA+Pg0K
PiA+PiA+PiA+PiA+Pj4gPj4+IE9uIE5vdiAxNywgMjAxNSwgYXQgOTowNiBBTSwgSm9lbCBIYWxw
ZXJuDQo+ID4+ID4+ID4+ID4+Pjxqb2VsLmhhbHBlcm5AZXJpY3Nzb24uY29tPg0KPiA+PiA+PiA+
PiA+Pj4gPj4gd3JvdGU6DQo+ID4+ID4+ID4+ID4+PiA+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+PiBX
aGF0IGlzIHByb3Zpc2lvbmVkIGludG8gdGhlIFNGRiByZWZsZWN0cyB0aGUgU0ZQLiAgVGhlDQo+
ID4+ID4+Y29udHJvbA0KPiA+PiA+PiA+PiA+Pj5zeXN0ZW0NCj4gPj4gPj4gPj4gPj4+ID4+IGRl
Y2lkZXMgd2hldGhlciB0aGF0IFNGUCBpbmRpY2F0ZXMgdGhlIHNhbWUgc2V0IG9mIGFsbA0KPiA+
PiA+PnBvc3NpYmxlDQo+ID4+ID4+ID4+ID4+PmNob2ljZXMNCj4gPj4gPj4gPj4gPj4+ID4+IHRo
YXQgdGhlIFNGQyBkb2VzLCBvciBpcyBhIHByb3BlciBzdWJzZXQuDQo+ID4+ID4+ID4+ID4+PiA+
Pj4NCj4gPj4gPj4gPj4gPj4+ID4+PiBJbiBvcmRlciB0byBhbGxvdyBmb3IgYW4gU0ZQIHRoYXQg
cmVmbGVjdHMgbWVhbmluZ2Z1bA0KPiA+PiA+PiA+PmNvbnN0cmFpbnRzLA0KPiA+PiA+PiA+PiA+
Pj4gd2hhdA0KPiA+PiA+PiA+PiA+Pj4gPj4gaXMgcHJvdmlzaW9uZWQgaGFzIHRvIGJlIHRoZSBT
RlAuDQo+ID4+ID4+ID4+ID4+PiA+Pj4gTm8gc3BlY2lhbCBwcm92aXNpb24gaXMgbmVlZGVkIGZv
ciB0aGUgY2FzZSB3aGVyZSB0aGUgU0ZQDQo+ID4+aXMNCj4gPj4gPj4gPj4gPj4+IGlzb21vcnBo
aWMNCj4gPj4gPj4gPj4gPj4+ID4+IHRvIHRoZSBTRkMuIEluIHN1Y2ggYSBjYXNlLCB5b3Ugc3Rp
bGwgcHJvdmlzaW9uIHRoZSBTRlAuDQo+ID4+QW5kDQo+ID4+ID4+IHRoZQ0KPiA+PiA+PiA+PiA+
Pj4gcmVzdWx0DQo+ID4+ID4+ID4+ID4+PiA+PiBpcyBhbiBTRlAgd2l0aCBhcyBtdWNoIGZsZXhp
YmlsaXR5IGFzIHRoZSBTRkMuDQo+ID4+ID4+ID4+ID4+PiA+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+
PiBJZiwgaW4gY29udHJhc3QsIHlvdSBkZWNsYXJlIHRoYXQgdGhlIHByb3Zpc2lvbmluZw0KPiA+
PmluY2x1ZGVzDQo+ID4+ID4+dGhlDQo+ID4+ID4+ID4+IFNGQw0KPiA+PiA+PiA+PiA+Pj4gdGhl
bg0KPiA+PiA+PiA+PiA+Pj4gPj4geW91IGFyZSBpbnRyb2R1Y2luZyBleHRyYSBjb21wbGV4aXR5
IHdpdGhvdXQgYWRkaW5nIGFueQ0KPiBuZXcNCj4gPj4gPj4gY2FzZXMNCj4gPj4gPj4gPj4gPj4+
dGhhdA0KPiA+PiA+PiA+PiA+Pj4gY2FuDQo+ID4+ID4+ID4+ID4+PiA+PiBiZSBoYW5kbGVkLg0K
PiA+PiA+PiA+PiA+Pj4gPj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4gWW91cnMsDQo+ID4+ID4+ID4+
ID4+PiA+Pj4gSm9lbA0KPiA+PiA+PiA+PiA+Pj4gPj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4gLS0t
LS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gPj4gPj4gPj4gPj4+ID4+PiBGcm9tOiBtb2hhbWVk
LmJvdWNhZGFpckBvcmFuZ2UuY29tDQo+ID4+ID4+ID4+ID4+PiBbbWFpbHRvOm1vaGFtZWQuYm91
Y2FkYWlyQG9yYW5nZS5jb21dDQo+ID4+ID4+ID4+ID4+PiA+Pj4gU2VudDogVHVlc2RheSwgTm92
ZW1iZXIgMTcsIDIwMTUgOTowMyBBTQ0KPiA+PiA+PiA+PiA+Pj4gPj4+IFRvOiBKb2VsIEhhbHBl
cm47IFBhdWwgUXVpbm4gKHBhdWxxKQ0KPiA+PiA+PiA+PiA+Pj4gPj4+IENjOiBzZmMgaXNzdWUg
dHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtY29udHJvbC0NCj4gPj4gPj4gPj4gcGxhbmVAdG9vbHMu
aWV0Zi5vcmc7DQo+ID4+ID4+ID4+ID4+PiA+PiBzZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVy
bg0KPiA+PiA+PiA+PiA+Pj4gPj4+IFN1YmplY3Q6IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxh
bmUpOiBXaGV0aGVyIHRoZQ0KPiA+PmNvbnRyb2wNCj4gPj4gPj4gPj5wbGFuZQ0KPiA+PiA+PiA+
PiA+Pj4gPj4gb3BlcmF0ZXMgb24gU0ZDIElEcywgU0ZQIElEcywgZXRjLg0KPiA+PiA+PiA+PiA+
Pj4gPj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4gSGkgSm9lbCwNCj4gPj4gPj4gPj4gPj4+ID4+Pg0K
PiA+PiA+PiA+PiA+Pj4gPj4+IFBsZWFzZSBzZWUgaW5saW5lLg0KPiA+PiA+PiA+PiA+Pj4gPj4+
DQo+ID4+ID4+ID4+ID4+PiA+Pj4gQ2hlZXJzLA0KPiA+PiA+PiA+PiA+Pj4gPj4+IE1lZA0KPiA+
PiA+PiA+PiA+Pj4gPj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdp
bmUtLS0tLQ0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBEZSA6IEpvZWwgSGFscGVybiBbbWFpbHRvOmpv
ZWwuaGFscGVybkBlcmljc3Nvbi5jb21dDQo+ID4+ID4+ID4+ID4+PiA+Pj4+IEVudm95w6kgOiBt
YXJkaSAxNyBub3ZlbWJyZSAyMDE1IDE0OjQ5DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IMOAIDogQk9V
Q0FEQUlSIE1vaGFtZWQgSU1UL09MTjsgUGF1bCBRdWlubiAocGF1bHEpIENjIDoNCj4gPj5zZmMN
Cj4gPj4gPj4gPj5pc3N1ZQ0KPiA+PiA+PiA+PiA+Pj4gPj4+PiB0cmFja2VyOyBkcmFmdC1pZXRm
LXNmYy1jb250cm9sLXBsYW5lQHRvb2xzLmlldGYub3JnOw0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBz
ZmNAaWV0Zi5vcmc7IEpvZWwgTS4gSGFscGVybg0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBPYmpldCA6
IFJFOiBbc2ZjXSAjMTUgKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZQ0KPiA+PmNvbnRyb2wN
Cj4gPj4gPj4gPj5wbGFuZQ0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBvcGVyYXRlcyBvbiBTRkMgSURz
LCBTRlAgSURzLCBldGMuDQo+ID4+ID4+ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+
IFlvdXIgc3RhdGVtZW50IHRoYXQgIiBJdCBoYXBwZW5zIHRoYXQgaW5mb3JtYXRpb24gaXMgbm8N
Cj4gPj4gbW9yZQ0KPiA+PiA+PiA+PnRoYW4NCj4gPj4gPj4gPj4gPj4+dGhlDQo+ID4+ID4+ID4+
ID4+PiA+Pj4+IHNlcnZpY2UgY2hhaW4gaXRzZWxmICh3aXRob3V0IGFueSBjb25zdHJhaW50cyku
IiAoV2hlcmUNCj4gPj4gIml0Ig0KPiA+PiA+PiA+PiA+Pj5yZWZlcnMNCj4gPj4gPj4gPj4gPj4+
IHRvDQo+ID4+ID4+ID4+ID4+PiA+PiAiDQo+ID4+ID4+ID4+ID4+PiA+Pj4+IHRoZSBleGFjdCBz
ZXF1ZW5jZSBvZiBzdGVwcyB0byBiZSB1c2VkIHRvIHJlYWxpemUgdGhlDQo+ID4+IFNGQyIuKQ0K
PiA+PiA+PiA+PkRvZXMNCj4gPj4gPj4gPj4gPj4+bm90DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IG1h
a2Ugc2Vuc2UgdG8gbWUuDQo+ID4+ID4+ID4+ID4+PiA+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+PiBb
TWVkXSBSRkMgNzY2NSBzYXlzOg0KPiA+PiA+PiA+PiA+Pj4gPj4+DQo+ID4+ID4+ID4+ID4+PiA+
Pj4gIiAgIFRodXMsIHRoZSBwb2xpY2llcyBhbmQgbG9naWMgb2YgU0ZQIHNlbGVjdGlvbiBvcg0K
PiA+PiBjcmVhdGlvbg0KPiA+PiA+PiA+PiA+Pj4gKGRlcGVuZGluZw0KPiA+PiA+PiA+PiA+Pj4g
Pj4+ICB1cG9uIHRoZSBzb2x1dGlvbikgcHJvZHVjZSB3aGF0IG1heSBiZSB0aG91Z2h0IG9mIGFz
IGENCj4gPj4gPj4gPj4gY29uc3RyYWluZWQNCj4gPj4gPj4gPj4gPj4+ID4+PiAgdmVyc2lvbiBv
ZiB0aGUgb3JpZ2luYWwgU0ZDLiAiDQo+ID4+ID4+ID4+ID4+PiA+Pj4NCj4gPj4gPj4gPj4gPj4+
ID4+PiBpbiBzaG9ydDogU0ZQIGlzIGRlZmluZWQgYXMgYSBjb25zdHJhaW5lZCB2ZXJzaW9uIG9m
IHRoZQ0KPiA+PiA+PiA+Pm9yaWdpbmFsDQo+ID4+ID4+ID4+ID4+PlNGQy4NCj4gPj4gPj4gPj4g
Pj4+ID4+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4+IFdoYXQgaXMgdGhlIG5hbWUgdG8gdXNlIHRvIHJl
ZmVyIHRvIGEgIm5vbi1jb25zdHJhaW5lZCINCj4gPj5TRkMNCj4gPj4gPj5vcg0KPiA+PiA+PiA+
PnRvDQo+ID4+ID4+ID4+ID4+PnRoZQ0KPiA+PiA+PiA+PiA+Pj4gPj4gaW5mb3JtYXRpb24gdGhh
dCB5b3Ugd2lsbCBwcm92aXNpb24gdG8gYW4gU0ZGIHdoZW4gdGhlDQo+IHBhdGgNCj4gPj4gPj4g
Pj4gPj4+Y29tcHV0YXRpb24NCj4gPj4gPj4gPj4gPj4+ID4+IGFuZCBzZWxlY3Rpb24gZGVjaXNp
b24gaXMgImRlZmVycmVkIHRvIHRoZSBTRkYiPw0KPiA+PiA+PiA+PiA+Pj4gPj4+DQo+ID4+ID4+
ID4+ID4+PiA+Pj4gSXQgZG9lcyBub3QgbWFrZSBzZW5zZSB0byBjYWxsIGEgbm9uLWNvbnN0cmFp
bmVkIHZlcnNpb24NCj4gPj5vZg0KPiA+PiA+PnRoZQ0KPiA+PiA+PiA+PiBTRkMNCj4gPj4gPj4g
Pj4gPj4+YXMNCj4gPj4gPj4gPj4gPj4+ID4+IFNGUCBnaXZlbiB0aGF0IFJGQzc2NjUgZXhwbGlj
aXRseSBkZWZpbmVzIFNGUCBhcw0KPiA+PiJjb25zdHJhaW5lZA0KPiA+PiA+PiA+PiA+Pj52ZXJz
aW9uDQo+ID4+ID4+ID4+ID4+PiBvZg0KPiA+PiA+PiA+PiA+Pj4gPj4gdGhlIG9yaWdpbmFsIFNG
QyIhDQo+ID4+ID4+ID4+ID4+PiA+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+PiBUaGUgU0ZDIGlzIHRo
ZSBnZW5lcmFsIGRlc2NyaXB0aW9uIG9mIHRoZSBvYmplY3RpdmUuDQo+IFRoYXQNCj4gPj4gPj4g
Pj4gPj4+ID4+Pj4gaXMgbm90IHRoZSBzYW1lIGFzIHRoZSBleGFjdCBzZXF1ZW5jZSBvZiBwbGFj
ZXMgdGhhdA0KPiBtdXN0DQo+ID4+IGJlDQo+ID4+ID4+ID4+ID4+PnZpc2l0ZWQuDQo+ID4+ID4+
ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IEkgc3RhbmQgYnkgbXkgZWFybGllciBj
b21tZW50cyB0aGF0IGFsbW9zdCBhbGwgdXNlcyBvZg0KPiA+PlNGQw0KPiA+PiA+PmluDQo+ID4+
ID4+ID4+dGhlDQo+ID4+ID4+ID4+ID4+PiA+Pj4+IGNvbnRyb2wgcmVxdWlyZW1lbnRzIGRyYWZ0
IHNob3VsZCBiZSBTRlAuDQo+ID4+ID4+ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4N
Cj4gPj4gPj4gPj4gPj4+ID4+PiBbTWVkXSBJIG5vdGVkIHRoYXQgSm9lbC4uIHRoYXQncyBmYWly
IGJ1dCB0aGlzIHBvc2l0aW9uDQo+IGlzDQo+ID4+ID4+SU1ITw0KPiA+PiA+PiA+PiBub3QNCj4g
Pj4gPj4gPj4gPj4+ID4+IGFsaWduZWQgd2l0aCBSRkM3NjY1IHRoYXQgYWxsb3dzIHRvIGNvbnRy
b2wgYW55IHZhcmlhdGlvbg0KPiA+PiA+PmZyb20gYQ0KPiA+PiA+PiA+PiA+Pj5ub24tDQo+ID4+
ID4+ID4+ID4+PiA+PiBjb25zdHJhaW5lZCBTRkMgdG8gYSBmdWxseSBjb25zdHJhaW5lZCBTRkMu
DQo+ID4+ID4+ID4+ID4+PiA+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4gWW91cnMsDQo+ID4+ID4+
ID4+ID4+PiA+Pj4+IEpvZWwNCj4gPj4gPj4gPj4gPj4+ID4+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+
Pj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gPj4gPj4gPj4gPj4+ID4+Pj4gRnJvbTog
bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbQ0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBbbWFpbHRv
Om1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb21dDQo+ID4+ID4+ID4+ID4+PiA+Pj4+IFNlbnQ6
IFR1ZXNkYXksIE5vdmVtYmVyIDE3LCAyMDE1IDg6MzQgQU0NCj4gPj4gPj4gPj4gPj4+ID4+Pj4g
VG86IFBhdWwgUXVpbm4gKHBhdWxxKQ0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBDYzogc2ZjIGlzc3Vl
IHRyYWNrZXI7DQo+ID4+ID4+ID4+ID4+PmRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmVAdG9v
bHMuaWV0Zi5vcmc7DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IHNmY0BpZXRmLm9yZzsgSm9lbCBNLiBI
YWxwZXJuDQo+ID4+ID4+ID4+ID4+PiA+Pj4+IFN1YmplY3Q6IFJFOiBbc2ZjXSAjMTUgKGNvbnRy
b2wtcGxhbmUpOiBXaGV0aGVyIHRoZQ0KPiA+PmNvbnRyb2wNCj4gPj4gPj4gPj5wbGFuZQ0KPiA+
PiA+PiA+PiA+Pj4gPj4+PiBvcGVyYXRlcyBvbiBTRkMgSURzLCBTRlAgSURzLCBldGMuDQo+ID4+
ID4+ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IEhpIFBhdWwsDQo+ID4+ID4+ID4+
ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IFRoYW5rIHlvdSBmb3Igc2hhcmluZyB5b3Vy
IGZlZWRiYWNrLg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBSRkM3
NjY1IHNheXMgdGhlIGZvbGxvd2luZzoNCj4gPj4gPj4gPj4gPj4+ID4+Pj4NCj4gPj4gPj4gPj4g
Pj4+ID4+Pj4gIg0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBUaGlzIGFyY2hpdGVjdHVyZSBkb2VzIG5v
dCBtYW5kYXRlIHRoZSBkZWdyZWUgb2YNCj4gPj4gPj4gPj4gPj4+ID4+Pj4gIHNwZWNpZmljaXR5
IG9mIHRoZSBTRlAuICBBcmNoaXRlY3R1cmFsbHksIHdpdGhpbiB0aGUNCj4gPj5zYW1lDQo+ID4+
ID4+IFNGQy0NCj4gPj4gPj4gPj4gPj4+IGVuYWJsZWQNCj4gPj4gPj4gPj4gPj4+ID4+Pj4gIGRv
bWFpbiwgc29tZSBTRlBzIG1heSBiZSBmdWxseSBzcGVjaWZpZWQsIHNlbGVjdGluZw0KPiA+PiBl
eGFjdGx5DQo+ID4+ID4+ID4+IHdoaWNoDQo+ID4+ID4+ID4+ID4+PiBTRkYNCj4gPj4gPj4gPj4g
Pj4+ID4+Pj4gIGFuZCB3aGljaCBTRiBhcmUgdG8gYmUgdmlzaXRlZCBieSBwYWNrZXRzIHVzaW5n
IHRoYXQNCj4gPj5TRlAsDQo+ID4+ID4+ID4+d2hpbGUNCj4gPj4gPj4gPj4gPj4+IG90aGVyDQo+
ID4+ID4+ID4+ID4+PiA+Pj4+ICBTRlBzIG1heSBiZSBxdWl0ZSB2YWd1ZSwgZGVmZXJyaW5nIHRv
IHRoZSBTRkYgdGhlDQo+ID4+IGRlY2lzaW9ucw0KPiA+PiA+PiA+PiBhYm91dA0KPiA+PiA+PiA+
PiA+Pj4gdGhlDQo+ID4+ID4+ID4+ID4+PiA+Pj4+ICBleGFjdCBzZXF1ZW5jZSBvZiBzdGVwcyB0
byBiZSB1c2VkIHRvIHJlYWxpemUgdGhlIFNGQy4NCj4gPj4gVGhlDQo+ID4+ID4+ID4+ID4+PiA+
Pj4+ICBzcGVjaWZpY2l0eSBtYXkgYmUgYW55d2hlcmUgaW4gYmV0d2VlbiB0aGVzZSBleHRyZW1l
cy4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4gIg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pg0KPiA+PiA+PiA+
PiA+Pj4gPj4+PiBUaGUgY29udHJvbCBkcmFmdCBpcyBjb21wbGV0ZWx5IGFsaWduZWQgd2l0aCB0
aGF0DQo+ID4+YXBwcm9hY2guDQo+ID4+ID4+ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+
Pj4+IFRoZSBjb250cm9sLXBsYW5lIGRvY3VtZW50IGFsbG93cyBpbiBwYXJ0aWN1bGFyIHRvDQo+
ID4+IHByb3Zpc2lvbg0KPiA+PiA+PiA+PiA+Pj5yZXF1aXJlZA0KPiA+PiA+PiA+PiA+Pj4gPj4+
PiBpbmZvcm1hdGlvbiB3aGVuICJkZWZlcnJpbmcgdG8gdGhlIFNGRiB0aGUgZGVjaXNpb25zDQo+
ID4+YWJvdXQNCj4gPj4gPj50aGUNCj4gPj4gPj4gPj4gPj4+ID4+Pj4gIGV4YWN0IHNlcXVlbmNl
IG9mIHN0ZXBzIHRvIGJlIHVzZWQgdG8gcmVhbGl6ZSB0aGUgU0ZDIi4NCj4gPj5JdA0KPiA+PiA+
PiA+PiA+Pj5oYXBwZW5zDQo+ID4+ID4+ID4+ID4+PiA+Pj4+IHRoYXQgaW5mb3JtYXRpb24gaXMg
bm8gbW9yZSB0aGFuIHRoZSBzZXJ2aWNlIGNoYWluDQo+IGl0c2VsZg0KPiA+PiA+PiA+PiAod2l0
aG91dA0KPiA+PiA+PiA+PiA+Pj4gYW55DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IGNvbnN0cmFpbnRz
KS4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4gQWxzbywgdGhlIGN1
cnJlbnQgY29udHJvbC1wbGFuZSBkb2N1bWVudCBhbGxvd3MgdG8NCj4gPj5pbnN0cnVjdA0KPiA+
PiA+PmENCj4gPj4gPj4gPj4gPj4+bG9vc2UNCj4gPj4gPj4gPj4gPj4+ID4+Pj4gcGF0aA0KPiA+
PiA+PiA+PiA+Pj4gPj4+PiAoU0ZQKSBvciBhIHN0cmljdCBwYXRoIChSU1ApLCBldGMuDQo+ID4+
ID4+ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IEkgZnVsbHkgYWdyZWUgdGhhdCB3
aGV0aGVyIGEgZnVsbCBwYXRoIGlzIHNwZWNpZmllZA0KPiA+PndpdGhpbg0KPiA+PiBhDQo+ID4+
ID4+ID4+ID4+PmRvbWFpbg0KPiA+PiA+PiA+PiA+Pj4gb3INCj4gPj4gPj4gPj4gPj4+ID4+Pj4g
aWYgaXQgaXMgZGVmZXJyZWQgdG8gU0ZGcyBpcyByZWFsbHkgZGVwbG95bWVudC1zcGVjaWZpYy4N
Cj4gPj4gPj4gPj4gPj4+IE5ldmVydGhlbGVzcywNCj4gPj4gPj4gPj4gPj4+ID4+Pj4gdGhlIGNv
bnRyb2wgcGxhbiBzaG91bGQgYWNjb21tb2RhdGUgYWxsIHRoZXNlIGZsYXZvcnMuDQo+ID4+ID4+
ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IENoZWVycywNCj4gPj4gPj4gPj4gPj4+
ID4+Pj4gTWVkDQo+ID4+ID4+ID4+ID4+PiA+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiAtLS0t
LU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0NCj4gPj4gPj4gPj4gPj4+ID4+Pj4+IERlIDogUGF1bCBR
dWlubiAocGF1bHEpIFttYWlsdG86cGF1bHFAY2lzY28uY29tXSBFbnZvecOpDQo+ID4+Og0KPiA+
PiA+PiA+PiA+Pj52ZW5kcmVkaQ0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4gMTYgb2N0b2JyZSAyMDE1
IDE0OjA0IMOAIDogSm9lbCBNLiBIYWxwZXJuIENjIDoNCj4gQk9VQ0FEQUlSDQo+ID4+ID4+ID4+
TW9oYW1lZA0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4gSU1UL09MTjsgc2ZjIGlzc3VlIHRyYWNrZXI7
IGRyYWZ0LWlldGYtc2ZjLWNvbnRyb2wtDQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiBwbGFuZUB0b29s
cy5pZXRmLm9yZzsgc2ZjQGlldGYub3JnIE9iamV0IDogUmU6IFtzZmNdDQo+ICMxNQ0KPiA+PiA+
PiA+PiA+Pj4gPj4+Pj4gKGNvbnRyb2wtcGxhbmUpOiBXaGV0aGVyIHRoZSBjb250cm9sIHBsYW5l
IG9wZXJhdGVzIG9uDQo+ID4+U0ZDDQo+ID4+ID4+ID4+SURzLA0KPiA+PiA+PiA+PiA+Pj5TRlAN
Cj4gPj4gPj4gPj4gPj4+ID4+IElEcywgZXRjLg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4NCj4gPj4g
Pj4gPj4gPj4+ID4+Pj4+IEpvZWwsDQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pg0KPiA+PiA+PiA+PiA+
Pj4gPj4+Pj4gSSBjb25jdXIuDQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pg0KPiA+PiA+PiA+PiA+Pj4g
Pj4+Pj4gVGhlIGRhdGEgcGxhbmUgZGVhbCB3aXRoIHBhdGhzLCBub3QgY2hhaW5zLiAgVGhlDQo+
ID4+ID4+cmVsYXRpb25zaGlwDQo+ID4+ID4+ID4+b2YNCj4gPj4gPj4gPj4gPj4+ID4+Pj4+IHBh
dGhzIHRvIGNoYWlucyBmYWxscyBzcXVhcmVseSBpbiB0aGUgY29udHJvbCBwbGFuZSAob3INCj4g
Pj4gPj5ldmVuDQo+ID4+ID4+ID4+IG1vcmUNCj4gPj4gPj4gPj4gPj4+ID4+Pj4+IGxpa2VseQ0K
PiA+PiA+PiA+PiA+Pj4gPj4+PiAicG9saWN5Ig0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4gcGxhbmUp
IHJlYWxtLiAgVGhlIHNwZWNpZmljaXR5IG9mIHRoZSBwYXRoIGlzIGxlZnQgdG8NCj4gPj4gPj4g
Pj4gPj4+ID4+Pj4+IGltcGxlbWVudGF0aW9uLCBpbiB0aGUgYXJjaGl0ZWN0dXJlIGRyYWZ0LCBi
dXQgdGhhdCdzDQo+ID4+ID4+ID4+Y29uc2lzdGVudA0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4gd2l0
aCB5b3VyIHBvc2l0aW9uIGFuZCBwcm92aWRlcyB0aGUgcmVxdWlzaXRlDQo+ID4+ID4+ZnVuY3Rp
b25hbGl0eS4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiBQYXVs
DQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+IE9uIFNlcCAxNywg
MjAxNSwgYXQgMTE6MzYgQU0sIEpvZWwgTS4gSGFscGVybg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+
IDxqbWhAam9lbGhhbHBlcm4uY29tPg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4gd3JvdGU6DQo+ID4+
ID4+ID4+ID4+PiA+Pj4+Pj4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4+PiBBcyBmYXIgYXMgSSBjYW4g
dGVsbCwgdGhlcmUgaXMgbm90aGluZyBpbiB0aGUgU2VydmljZQ0KPiA+PiA+PiA+PkNoYWluaW5n
DQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pj4gd29yayB0aGF0DQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiBy
ZXF1aXJlcyBjb3JyZWxhdGluZyBzZXJ2aWNlIHBhdGggSURzIHdpdGggc2VydmljZQ0KPiBjaGFp
bg0KPiA+PiA+PklEcw0KPiA+PiA+PiA+PiA+Pj53aXRoaW4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4+
IHRoZSBkYXRhIHBsYW5lLiAgQW55IHN1Y2ggcmVsYXRpb25zaGlwIGV4aXN0cyBlbnRpcmVseQ0K
PiA+PiA+PndpdGhpbg0KPiA+PiA+PiA+PiB0aGUNCj4gPj4gPj4gPj4gPj4+ID4+Pj4+IGNvbnRy
b2wgcGxhbmUgb3IgYWJvdmUsIGFuZCB3b3VsZCBiZSBkcml2ZW4gYnkNCj4gPj4gcmVxdWlyZW1l
bnRzDQo+ID4+ID4+ID4+IG90aGVyDQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiB0aGFuIHRoZSBkYXRh
IHBsYW5lLiAgV2hlbiBJIGxvb2sgYXQgdGhpcyBkb2N1bWVudCwgYWxsDQo+ID4+b2YNCj4gPj4g
Pj4gdGhlDQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiByZXF1aXJlbWVudHMgdGhhdCB0YWxrIGFib3V0
IHNlcnZpY2UgZnVuY3Rpb24gY2hhaW4gSURzDQo+ID4+IGNhbg0KPiA+PiA+PiBiZQ0KPiA+PiA+
PiA+PiA+Pj4gPj4+Pj4gYWNjdXJhdGVseSBjYXB0dXJlZCwgaW4gdGVybXMgb2YgZGF0YSBwbGFu
ZQ0KPiA+PnJlcXVpcmVtZW50cywNCj4gPj4gPj5ieQ0KPiA+PiA+PiA+PiA+Pj5zZXJ2aWNlDQo+
ID4+ID4+ID4+ID4+PiA+PiBmdW5jdGlvbiBwYXRoIElEcy4NCj4gPj4gPj4gPj4gPj4+ID4+Pj4+
IFRodXMsIHRoZSByZXF1aXJlbWVudCB0aGF0IHRoZSBkYXRhIHBsYW5lIGhhcyBpcyB0byBzZWUN
Cj4gPj4gPj5zdWNoDQo+ID4+ID4+ID4+IHBhdGgNCj4gPj4gPj4gPj4gPj4+IElEcy4NCj4gPj4g
Pj4gPj4gPj4+ID4+Pj4+IFllcywgaW4gc29tZSBkZXBsb3ltZW50cyB0aG9zZSB3aWxsIGJlIDEt
MSB3aXRoIGNoYWluDQo+ID4+SURzLg0KPiA+PiA+PiA+PlRoZXkNCj4gPj4gPj4gPj4gPj4+YXJl
DQo+ID4+ID4+ID4+ID4+PiA+Pj4+IHN0aWxsIHBhdGggSURzLg0KPiA+PiA+PiA+PiA+Pj4gPj4+
Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pj4gSW50cm9kdWNpbmcgYSByZXF1aXJlbWVudCBmb3Ig
dGhlIGRhdGEgcGxhbmUgdG8gc2VlDQo+IGFuZA0KPiA+PiA+PndvcmsNCj4gPj4gPj4gPj4gPj4+
d2l0aA0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+IGNoYWluDQo+ID4+ID4+ID4+ID4+PiA+Pj4+PiBJ
RHMgaXMgbm90IGdyb3VuZGVkIGluIHRoZSB3b3JrIG9mIHRoZSBncm91cC4NCj4gPj4gPj4gPj4g
Pj4+ID4+Pj4+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+IFlvdXJzLA0KPiA+PiA+PiA+PiA+Pj4g
Pj4+Pj4+IEpvZWwgTS4gSGFscGVybg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+DQo+ID4+ID4+ID4+
ID4+PiA+Pj4+Pj4gT24gOS8xNy8xNSA3OjUzIEFNLCBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2Uu
Y29tDQo+IHdyb3RlOg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+PiBSZS0sDQo+ID4+ID4+ID4+ID4+
PiA+Pj4+Pj4+DQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pj4+IFRoZSBjb250cm9sIGRyYWZ0IGFzIGl0
IHN0YW5kcyBpcyBjb21wbGlhbnQgd2l0aCB0aGUNCj4gPj4gZGF0YQ0KPiA+PiA+PiA+PiBwbGFu
ZQ0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4gYXJjaGl0ZWN0dXJlIGRvY3VtZW50Lg0KPiA+PiA+PiA+
PiA+Pj4gPj4+Pj4+Pg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+PiBJbmRlZWQsIHRoZSBhcmNoIGRy
YWZ0IGFja25vd2xlZGdlcyB0aGUgZm9sbG93aW5nOg0KPiA+PiA+PiA+PiA+Pj4gPj4+Pj4+PiAo
MSkgU0ZQcyBhcmUgImFzc29jaWF0ZWQgd2l0aCBhIGdpdmVuIFNGQyIuDQo+ID4+ID4+ID4+ID4+
PiA+Pj4+Pj4+ICgyKSBTRlBzIGFyZSBwcmVzZW50ZWQgYXMgYSBmb3JtIG9mIGNvbnN0cmFpbmVk
IFNGQ3MuDQo+ID4+ID4+ID4+ID4+PiA+Pj4+Pj4+ICgzKSBTb21lIGRlcGxveW1lbnRzIG1heSBu
b3QgaW1wb3NlIGFueSBjb25zdHJhaW50IG9uDQo+ID4+IHRoZQ0KPiA+PiA+PiA+PiA+Pj4gPj4+
Pj4+PiBhYnN0cmFjdA0KPiA+PiA+PiA+PiA+Pj4gPj4+PiBTRkMNCj4gPj4gPj4gPj4gPj4+ID4+
Pg0KPiA+PiA+PiA+PiA+Pj4gPj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fDQo+ID4+ID4+ID4+ID4+PiA+Pj4gc2ZjIG1haWxpbmcgbGlzdA0KPiA+PiA+
PiA+PiA+Pj4gPj4+IHNmY0BpZXRmLm9yZw0KPiA+PiA+PiA+PiA+Pj4gPj4+IGh0dHBzOi8vd3d3
LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo+ID4+ID4+ID4+ID4+PiA+DQo+ID4+ID4+
ID4+ID4+DQo+ID4+ID4+ID4+ID4NCj4gPj4gPj4gPj4gPl9fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4+ID4+ID4+ID5zZmMgbWFpbGluZyBsaXN0DQo+
ID4+ID4+ID4+ID5zZmNAaWV0Zi5vcmcNCj4gPj4gPj4gPj4gPmh0dHBzOi8vd3d3LmlldGYub3Jn
L21haWxtYW4vbGlzdGluZm8vc2ZjDQo+ID4+ID4+ID4NCj4gPj4gPg0KPiA+DQoNCg==


From nobody Wed Nov 25 02:25:08 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DEAA1A1A6A for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:25:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3oGEgIVINBZj for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:25:05 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6FBA1A1A51 for <sfc@ietf.org>; Wed, 25 Nov 2015 02:25:05 -0800 (PST)
Received: from localhost ([::1]:59703 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1a1XG4-0007bW-Mt; Wed, 25 Nov 2015 02:25:04 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Wed, 25 Nov 2015 10:25:04 -0000
X-URL: http://tools.ietf.org/sfc/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/sfc/trac/ticket/14#comment:1
Message-ID: <081.ca85065e01142b2bcd09f45e1b25e336@tools.ietf.org>
References: <066.30544c61f7d483f2c92b00ddfacd598d@tools.ietf.org>
X-Trac-Ticket-ID: 14
In-Reply-To: <066.30544c61f7d483f2c92b00ddfacd598d@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-control-plane@ietf.org
Resent-Message-Id: <20151125102505.E6FBA1A1A51@ietfa.amsl.com>
Resent-Date: Wed, 25 Nov 2015 02:25:05 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/sCynE3RKs4ACkHx6G9x7yiWyEPc>
Cc: sfc@ietf.org
Subject: Re: [sfc] #14 (control-plane): Taeho's Comments
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 10:25:07 -0000

#14: Taeho's Comments


Comment (by mohamed.boucadair@orange.com):

 The following changes are made in -01:

 OLD:
    SFP fail-over:   re-construct a SFP with replacing the failed SF
       instance with another instance of the same SF.

    SFP fail-over:   re-construct a SFP with replacing the failed SF
       instance with another instance of the same SF or withdraw the
       failed SF from being invoked.  Note that withdrawing an SF may be
       envisaged if the resulting connectivity service is not broken
       (that is, packets bound to the updated SFP can be successfully
       delivered to their ultimate destinations).  Rerouting the traffic
       to another SF instance or withdrawing the failed SF is deployment-
       specific.

 OLD:
    SF/SFC Load balancing:   re-construct SFPs to distribute the workload
       among various SF instances.

 NEW:
    SF/SFP Load balancing:   re-construct SFPs to distribute the workload
       among various SF instances.  Particularly, load distribution
       policies can be taken into account by the Control Element to re-
       compute an SFP or be provisioned as attributes to SFPs that will
       be installed using the control interfaces.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  control-plane@tools.ietf.org
     Type:  enhancement              |      Status:  new
 Priority:  minor                    |   Milestone:
Component:  control-plane            |     Version:
 Severity:  -                        |  Resolution:
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/14#comment:1>
sfc <http://tools.ietf.org/sfc/>


From nobody Wed Nov 25 02:26:43 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 677C91A1A7B for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:26:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YUkVFlYDXSbe for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:26:40 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 654DC1A1A78 for <sfc@ietf.org>; Wed, 25 Nov 2015 02:26:40 -0800 (PST)
Received: from localhost ([::1]:59776 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1a1XHc-0006a3-4w; Wed, 25 Nov 2015 02:26:40 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Wed, 25 Nov 2015 10:26:40 -0000
X-URL: http://tools.ietf.org/sfc/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/sfc/trac/ticket/16#comment:1
Message-ID: <081.30630e920d476a82a03eac1264b51fcf@tools.ietf.org>
References: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org>
X-Trac-Ticket-ID: 16
In-Reply-To: <066.4de1a1b2496e7fbeb2cea22aa41193b6@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-control-plane@ietf.org
Resent-Message-Id: <20151125102640.654DC1A1A78@ietfa.amsl.com>
Resent-Date: Wed, 25 Nov 2015 02:26:40 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cuLc8-ymPBSiMmpglD-tymmqkD8>
Cc: sfc@ietf.org
Subject: Re: [sfc] #16 (control-plane): RSP-related Considerations (L. Dunbar/A. Malis)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 10:26:41 -0000

#16: RSP-related Considerations (L.  Dunbar/A.  Malis)


Comment (by mohamed.boucadair@orange.com):

 These two sections are moved to the core text in -01. These two sections
 appear in -01 as: 4.10.4 and 4.10.5.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  control-plane@tools.ietf.org
     Type:  defect                   |      Status:  new
 Priority:  major                    |   Milestone:
Component:  control-plane            |     Version:
 Severity:  -                        |  Resolution:
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/16#comment:1>
sfc <http://tools.ietf.org/sfc/>


From nobody Wed Nov 25 02:29:06 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FBD71A1A7E for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:29:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eT3tb89I6efJ for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:29:04 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 084EC1A1A68 for <sfc@ietf.org>; Wed, 25 Nov 2015 02:29:04 -0800 (PST)
Received: from localhost ([::1]:59825 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1a1XJv-0007Vc-PE; Wed, 25 Nov 2015 02:29:03 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Wed, 25 Nov 2015 10:29:03 -0000
X-URL: http://tools.ietf.org/sfc/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/sfc/trac/ticket/15#comment:1
Message-ID: <081.a981c8dad8895a73800708bc0d7e735d@tools.ietf.org>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org>
X-Trac-Ticket-ID: 15
In-Reply-To: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-control-plane@ietf.org
Resent-Message-Id: <20151125102904.084EC1A1A68@ietfa.amsl.com>
Resent-Date: Wed, 25 Nov 2015 02:29:04 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cxNO9Aox1PU5wpKYVv78CF7xpXg>
Cc: sfc@ietf.org
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 10:29:05 -0000

#15: Whether the control plane operates on SFC IDs, SFP IDs, etc.


Comment (by mohamed.boucadair@orange.com):

 The following changes are made in -01:

 OLD:
    o  SFC Forwarding Policy Table: this table reflects the SFC-specific
       traffic forwarding policy enforced by SFF components for every
       relevant incoming packet that is associated to one of the existing
       SFCs.

          [[Note: The question of whether the data plane operates just in
          terms of SFP IDs or needs SFC IDs, as described in this version
          of the draft, is still under discussion among the authors.]]

 NEW:
    o  SFP Forwarding Policy Table: this table reflects the SFP-specific
       traffic forwarding policy enforced by SFF components for every
       relevant incoming packet that is associated to one of the existing
       SFCs.  The SFP Identifier (SFP-id) is used as a lookup key to
       determine forwarding action regardless of whether the SFC is fully
       constrained, partially constrained, or not constrained at all.
       Additional information such as a flow identifier and/or other
       characteristics (e.g., the 5-tuple transport coordinates of the
       original packet) may be used for lookup purposes.  The set of
       information to use for lookup purposes may be instructed by the
       control plane.

 * Add this NEW text to Section 1.3:
 NEW:
    As a reminder, a Service Function Path (SFP) designates a subset of
    the collection designated by the SFC.  For some SFPs, in some
    deployments, that will be a set of 1.  For other SFPs (in the same or
    other deployments) it may be a larger set.  For some SFPs in some
    deployments the SFP may designate the same set of choices as the SFC.
    This document accommodates all those deployments.

 * Others minor edits.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  control-plane@tools.ietf.org
     Type:  defect                   |      Status:  new
 Priority:  major                    |   Milestone:
Component:  control-plane            |     Version:
 Severity:  -                        |  Resolution:
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/15#comment:1>
sfc <http://tools.ietf.org/sfc/>


From nobody Wed Nov 25 02:34:22 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C45E1A1A82 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:34:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oOhaBJWs0uPN for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:34:19 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AD321A1A7D for <sfc@ietf.org>; Wed, 25 Nov 2015 02:34:19 -0800 (PST)
Received: from localhost ([::1]:59970 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1a1XP1-00041x-5G; Wed, 25 Nov 2015 02:34:19 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Wed, 25 Nov 2015 10:34:19 -0000
X-URL: http://tools.ietf.org/sfc/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/sfc/trac/ticket/13#comment:3
Message-ID: <081.54c5a761f7ec2d00c9384cb3d98d6a1c@tools.ietf.org>
References: <066.e47bcbfaf64ea83e17548ea0b67b4a27@tools.ietf.org>
X-Trac-Ticket-ID: 13
In-Reply-To: <066.e47bcbfaf64ea83e17548ea0b67b4a27@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-control-plane@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-control-plane@ietf.org
Resent-Message-Id: <20151125103419.9AD321A1A7D@ietfa.amsl.com>
Resent-Date: Wed, 25 Nov 2015 02:34:19 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ak3vP2S8W4WwVk1qj68S4IG5yQI>
Cc: sfc@ietf.org
Subject: Re: [sfc] #13 (control-plane): Sumandra Majee's comments
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 10:34:20 -0000

#13: Sumandra Majee's comments


Comment (by mohamed.boucadair@orange.com):

 The following changes are made in -01:

 * Add this text in Section 4.7:

 NEW:
    Local failure detect and repair mechanisms may be enabled by SFC-
    aware nodes.  Control Elements may be fed directly or indirectly with
    inputs from these mechanisms.

 * In section 3.3.1:

 OLD:
    SFC Classification policy entry should be bound to one single service
    function chain (or one single SFP); when an incoming packet matches
    more than one classification entry, tie-breaking criteria should be
    specified (e.g., priority).  Such tie-breaking criteria should be
    instructed by the control plane.

 NEW:
    When an incoming packet matches more than one classification entry,
    tie-breaking criteria should be followed (e.g., priority).  Such tie-
    breaking criteria should be instructed by the control plane.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  control-plane@tools.ietf.org
     Type:  enhancement              |      Status:  new
 Priority:  minor                    |   Milestone:
Component:  control-plane            |     Version:
 Severity:  -                        |  Resolution:
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/sfc/trac/ticket/13#comment:3>
sfc <http://tools.ietf.org/sfc/>


From nobody Wed Nov 25 02:36:25 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 072721A19EC; Wed, 25 Nov 2015 02:36:24 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151125103624.6238.76237.idtracker@ietfa.amsl.com>
Date: Wed, 25 Nov 2015 02:36:24 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/sJB94XBPtxINOscfArPfkmOAe1Q>
Cc: sfc@ietf.org
Subject: [sfc] I-D Action: draft-ietf-sfc-control-plane-01.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 10:36:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Service Function Chaining Working Group of the IETF.

        Title           : Service Function Chaining (SFC) Control Plane Components & Requirements
        Authors         : Hongyu Li
                          Qin Wu
                          Yong(Oliver) Huang
                          Mohamed Boucadair
                          Christian Jacquenet
                          Walter Haeffner
                          Seungik Lee
                          Ron Parker
                          Linda Dunbar
                          Andrew Malis
                          Joel M. Halpern
                          Tirumaleswar Reddy
                          Prashanth Patil
	Filename        : draft-ietf-sfc-control-plane-01.txt
	Pages           : 27
	Date            : 2015-11-25

Abstract:
   This document describes requirements for conveying information
   between Service Function Chaining (SFC) control elements and SFC
   functional elements.  Also, this document identifies a set of control
   interfaces to interact with SFC-aware elements to establish, maintain
   or recover service function chains.  This document does not specify
   protocols nor extensions to existing protocols.

   This document exclusively focuses on SFC deployments that are under
   the responsibility of a single administrative entity.  Inter-domain
   considerations are out of scope.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-control-plane/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-control-plane-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Nov 25 02:43:40 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D070E1A1A8C for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:43:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TCZW3xJ2SiBO for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 02:43:34 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC6341A1A97 for <sfc@ietf.org>; Wed, 25 Nov 2015 02:43:29 -0800 (PST)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id 6603A40125 for <sfc@ietf.org>; Wed, 25 Nov 2015 11:43:28 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.75]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id 450C11A005D for <sfc@ietf.org>; Wed, 25 Nov 2015 11:43:28 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA4.corporate.adroot.infra.ftgroup ([fe80::65de:2f08:41e6:ebbe%19]) with mapi id 14.03.0248.002; Wed, 25 Nov 2015 11:43:28 +0100
From: <mohamed.boucadair@orange.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] I-D Action: draft-ietf-sfc-control-plane-01.txt
Thread-Index: AQHRJ20luM0T8A44FU+U1CMd6WRfbp6si7IA
Date: Wed, 25 Nov 2015 10:43:27 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA2B55@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <20151125103624.6238.76237.idtracker@ietfa.amsl.com>
In-Reply-To: <20151125103624.6238.76237.idtracker@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/b55zaU0oypovBGB1Pj3eLehJKtE>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-control-plane-01.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 10:43:39 -0000

Hi all,

This new version takes into account the feedback received to address the is=
sues available at:=20
https://trac.tools.ietf.org/wg/sfc/trac/query?component=3Dcontrol-plane&ord=
er=3Dpriority=20

For your convenience, you may check the diff to track the changes: https://=
www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sfc-control-plane-01=20

FWIW, I requested an early review from the security directorate (many thank=
s to S. Farrel and T. Kivinen for scheduling it). The review will be shared=
 with the list when available.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de internet-
> drafts@ietf.org
> Envoy=E9=A0: mercredi 25 novembre 2015 11:36
> =C0=A0: i-d-announce@ietf.org
> Cc=A0: sfc@ietf.org
> Objet=A0: [sfc] I-D Action: draft-ietf-sfc-control-plane-01.txt
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>  This draft is a work item of the Service Function Chaining Working Group
> of the IETF.
>=20
>         Title           : Service Function Chaining (SFC) Control Plane
> Components & Requirements
>         Authors         : Hongyu Li
>                           Qin Wu
>                           Yong(Oliver) Huang
>                           Mohamed Boucadair
>                           Christian Jacquenet
>                           Walter Haeffner
>                           Seungik Lee
>                           Ron Parker
>                           Linda Dunbar
>                           Andrew Malis
>                           Joel M. Halpern
>                           Tirumaleswar Reddy
>                           Prashanth Patil
> 	Filename        : draft-ietf-sfc-control-plane-01.txt
> 	Pages           : 27
> 	Date            : 2015-11-25
>=20
> Abstract:
>    This document describes requirements for conveying information
>    between Service Function Chaining (SFC) control elements and SFC
>    functional elements.  Also, this document identifies a set of control
>    interfaces to interact with SFC-aware elements to establish, maintain
>    or recover service function chains.  This document does not specify
>    protocols nor extensions to existing protocols.
>=20
>    This document exclusively focuses on SFC deployments that are under
>    the responsibility of a single administrative entity.  Inter-domain
>    considerations are out of scope.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-control-plane/
>=20
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-sfc-control-plane-01
>=20
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sfc-control-plane-01
>=20
>=20
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Nov 25 12:02:42 2015
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 062F91B2F19 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:02:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Xs6sUltpqpD for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:02:28 -0800 (PST)
Received: from hub021-ca-4.exch021.serverdata.net (hub021-ca-4.exch021.serverdata.net [64.78.22.171]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4F0B1B2F00 for <sfc@ietf.org>; Wed, 25 Nov 2015 12:02:26 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-4.exch021.domain.local ([10.254.4.39]) with mapi id 14.03.0224.002;  Wed, 25 Nov 2015 12:02:26 -0800
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Andrew G. Malis" <agmalis@gmail.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5emPvL6Hp77kOGF+aJe36w6Z6kIicggAFcfQCAADCFgIAEnguAgALjdmA=
Date: Wed, 25 Nov 2015 20:02:26 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0@MBX021-W3-CA-2.exch021.domain.local>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com> <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net> <CAA=duU0UvERU3-YE2EFT-kOExHWgLesSERRAkox0Ji1V28nNdQ@mail.gmail.com>
In-Reply-To: <CAA=duU0UvERU3-YE2EFT-kOExHWgLesSERRAkox0Ji1V28nNdQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: multipart/alternative; boundary="_000_CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0MBX021W3CA2exch_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/klnR9dnlK4uVdKarBI7LewEAecY>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, Linda Dunbar <linda.dunbar@huawei.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>, Qin Wu <bill.wu@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 20:02:31 -0000

--_000_CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0MBX021W3CA2exch_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0MBX021W3CA2exch_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0MBX021W3CA2exch_--


From nobody Wed Nov 25 12:33:10 2015
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 306551B2F91 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:33:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tvDyvueAzWde for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:33:06 -0800 (PST)
Received: from mail-wm0-x22f.google.com (mail-wm0-x22f.google.com [IPv6:2a00:1450:400c:c09::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBEFD1B2F95 for <sfc@ietf.org>; Wed, 25 Nov 2015 12:33:02 -0800 (PST)
Received: by wmec201 with SMTP id c201so3227037wme.0 for <sfc@ietf.org>; Wed, 25 Nov 2015 12:33:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=4Li542Z0mnM5644DfCHzanFtY7Bi6y1smpVjmnWxGEY=; b=VC9BxjVBzKh2IhrpqmjC4E2zIYBnhJ/Vd/gB0DRRnaW27O7jNHev30Yw6TdEn4rNTt 4pBp4r00fgTp6xEXmHgN6IxdMHOO0MK2i+fKPpx3RQqncWMhPbR1HB/e9MYJnlJytrIM XkDmbI9JvhiB/lkYiy2lqayv1AWQT4gpGbRUPIeQIpG0tknzLXXbtvFlRsl+opQz3hmk XVTFVDle1uf/pB633/F847CHfpn+Zp5NuFFIW8YjCtMpMsRywNzCjymo/Rv2gp8Qawiq QdltUUo/oDjB8FxwpyJWqFYwoFbhnwW3eWE2zNByNfrmy+ZfPqssgZAMYNQKXbzWPuZj bDZA==
X-Received: by 10.28.215.211 with SMTP id o202mr6418360wmg.85.1448483581325; Wed, 25 Nov 2015 12:33:01 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.148.208 with HTTP; Wed, 25 Nov 2015 12:32:41 -0800 (PST)
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0@MBX021-W3-CA-2.exch021.domain.local>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com> <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net> <CAA=duU0UvERU3-YE2EFT-kOExHWgLesSERRAkox0Ji1V28nNdQ@mail.gmail.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0@MBX021-W3-CA-2.exch021.domain.local>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 25 Nov 2015 15:32:41 -0500
Message-ID: <CAA=duU0TJ6J73zWsqJRT2ChEe0Q75g2Ecy36dwLMXSBWWpWo-A@mail.gmail.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>
Content-Type: multipart/alternative; boundary=001a11469e2253f98a0525635dee
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ol4JOxQBMcDCv13LpAWuw09CnNQ>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, Linda Dunbar <linda.dunbar@huawei.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>, Qin Wu <bill.wu@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 20:33:09 -0000

--001a11469e2253f98a0525635dee
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Ron,

While discussing the distinctions between Types 1 and 2, another thing
that=E2=80=99s currently unsaid in the current text, but probably should be=
, is
that one of the TLV Types should be for the Type 1 four-octet unstructured
metadata, making Type 2 a true superset of Type 1.

There=E2=80=99s also a bug with section 14.2.3. The text should be correcte=
d as
follows:

OLD:

14.2.3 <https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3>.
TLV Class Registry

   IANA is requested to set up a registry of "TLV Types".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226 <https://tools.ietf.org/html/rfc5226>
[RFC5226 <https://tools.ietf.org/html/rfc5226>].


NEW:

14.2.3 <https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3>.
TLV Class Registry

   IANA is requested to set up a registry of "TLV Classes".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226 <https://tools.ietf.org/html/rfc5226>
[RFC5226 <https://tools.ietf.org/html/rfc5226>].



I would then also recommend adding:

TLV Class 0x0001 is allocated to =E2=80=9CIETF=E2=80=9D.

For TLV Class x0001, there will be a new TLV Type registry. These are 7-bit
values. Registry entries are assigned by using the "IETF Review=E2=80=9D po=
licy
defined in RFC 5226 [RFC5226].

For TLV Class x0001, TLV Type x01 is allocated to =E2=80=9C32-bit unstructu=
red
metadata=E2=80=9D.

Cheers,
Andy


On Wed, Nov 25, 2015 at 3:02 PM, Ron Parker <Ron_Parker@affirmednetworks.co=
m
> wrote:

> There are 2 distinctions between types 1 and 2.
>
>
>
> Type 1:
>
> =C2=B7        Fixed length metadata
>
> =C2=B7        Unstructured metadata
>
>
>
> Type 2:
>
> =C2=B7        Variable length metadata
>
> =C2=B7        Structured metadata
>
>
>
> Wouldn=E2=80=99t type 1 be more flexible if it supported a variable lengt=
h of
> unstructured metadata?   Perhaps in 4 byte increments?   Then the
> distinction would be only whether or not the metadata was structured and
> perhaps a reasonable justification for the continued existence of both is
> that the byte length to encode the additional structure in type 2 is
> greater and perhaps less efficient to parse and that certain deployment
> scenarios would benefit from the simplicity of type 1.
>
>
>
>    Ron
>
>
>
>
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Andrew G. Malis
> *Sent:* Monday, November 23, 2015 10:51 AM
> *To:* Bottorff, Paul <paul.bottorff@hpe.com>
> *Cc:* sfc@ietf.org; Dolganow, Andrew (Andrew) <
> andrew.dolganow@alcatel-lucent.com>; Linda Dunbar <linda.dunbar@huawei.co=
m>;
> Paul Quinn (paulq) <paulq@cisco.com>; uri.elzur@intel.com; Qin Wu <
> bill.wu@huawei.com>
>
> *Subject:* Re: [sfc] NSH context headers: fixed/tlv
>
>
>
> I agree with Paul B. that interoperability is best served by using a
> header that accommodates the greatest number of possible applications and
> use cases as the common denominator. This argues for type 2 being the MUS=
T
> to implement, with type 1 being an optional optimization for some
> particular use cases or applications that require at most a particular
> number context headers.
>
>
>
> In a separate email, Med asked a very reasonable question - for type 1,
> why are there four mandatory context headers, rather than 2, 3, 5, 10,
> etc.? The draft contains no particular justification for this choice.
>
>
>
> It=E2=80=99s true that there are two particular use
> cases, draft-guichard-sfc-nsh-dc-allocation
> and draft-napper-sfc-nsh-mobility-allocation, that look to make good use =
of
> exactly 4 context headers. However, these are just two particular example=
s,
> and not yet accepted by the WG.  Further development of these drafts, or
> even implementation, may show that four are insufficient.
>
>
>
> Cheers,
>
> Andy
>
>
>
>
>
> On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul <paul.bottorff@hpe.com>
> wrote:
>
> I think we all could agree that fixed headers are easier to implement tha=
n
> TLVs, however that does not rationalize mandating a fixed header
> implementation. It would rationalize supporting only fixed length headers=
,
> however we have been unable to do this. Options always weaken standards
> agreement.
>
>
>
> If the application requires TLVs, then it does not provide any standards
> advantage to mandate support for fixed headers. It will not be possible f=
or
> an application that requires TLVs to fall back to fixed length headers. I=
f
> they could, then we should eliminate the TLV option from NSH.
>
>
>
> IMHO we should be looking at the abstract semantics for meta-data before
> we consider how to encode it. Once we decide what needs to be encoded the=
n
> we can consider the best encodings and what should be mandatory or
> optional.
>
>
>
> Cheers,
>
>
>
> Paul
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Paul Quinn
> (paulq)
> *Sent:* Friday, November 20, 2015 6:27 AM
> *To:* Qin Wu
> *Cc:* uri.elzur@intel.com; Dolganow, Andrew (Andrew); sfc@ietf.org; Linda
> Dunbar
> *Subject:* Re: [sfc] NSH context headers: fixed/tlv
>
>
>
>
>
> On Nov 19, 2015, at 9:28 PM, Qin Wu <bill.wu@huawei.com> wrote:
>
>
>
> Hi, Andrew and Paul:
>
> It looks I missed a lot of discussion regarding NSH context header in the
> past, thanks Paul to point me the archive.
>
> Generally speaking, there is tradeoff between performance and flexibility=
.
>
>
>
>
>
> Absolutely, and that's the reason for offering the two options: balance
> speed/simplicity and flexibility.
>
>
>
> The philosophy is to mandate the simplest form of metadata, enabling a
> broad implementation base.  If/when more flexibility is needed a more
> flexible NSH type is available, along with the associated tradeoffs.
> That's the balance that we decided to strike and it seems to be reasonabl=
e
> and well accepted.
>
>
>
> Thanks,
>
> Paul
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>

--001a11469e2253f98a0525635dee
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Ron,<div><br></div><div>While discussing the distinctions =
between Types 1 and 2, another thing that=E2=80=99s currently unsaid in the=
 current text, but probably should be, is that one of the TLV Types should =
be for the Type 1 four-octet unstructured metadata, making Type 2 a true su=
perset of Type 1.</div><div><br></div><div>There=E2=80=99s also a bug with =
section 14.2.3. The text should be corrected as follows:</div><div><br></di=
v><div>OLD:=C2=A0</div><div><br></div><div><pre class=3D"" style=3D"font-si=
ze:13.3333px;margin-top:0px;margin-bottom:0px;color:rgb(0,0,0);line-height:=
normal"><span class=3D"h4" style=3D"line-height:0pt;display:inline;font-siz=
e:1em;font-weight:bold"><h4 style=3D"line-height:0pt;display:inline;font-si=
ze:1em"><a class=3D"" name=3D"section-14.2.3" href=3D"https://tools.ietf.or=
g/html/draft-ietf-sfc-nsh-01#section-14.2.3" style=3D"color:black;text-deco=
ration:none">14.2.3</a>.  TLV Class Registry</h4></span>

   IANA is requested to set up a registry of &quot;TLV Types&quot;.  These =
are 16-
   bit values.  Registry entries are assigned by using the &quot;IETF Revie=
w&quot;
   policy defined in <a href=3D"https://tools.ietf.org/html/rfc5226">RFC 52=
26</a> [<a href=3D"https://tools.ietf.org/html/rfc5226" title=3D"&quot;Guid=
elines for Writing an IANA Considerations Section in RFCs&quot;">RFC5226</a=
>].
</pre></div><div><br></div><div>NEW:</div><div><br></div><div><pre class=3D=
"" style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;color:rgb(=
0,0,0);line-height:normal"><span class=3D"h4" style=3D"line-height:0pt;disp=
lay:inline;font-size:1em;font-weight:bold"><h4 style=3D"line-height:0pt;dis=
play:inline;font-size:1em"><a class=3D"" name=3D"section-14.2.3" href=3D"ht=
tps://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3" style=3D"co=
lor:black;text-decoration:none">14.2.3</a>.  TLV Class Registry</h4></span>

   IANA is requested to set up a registry of &quot;TLV Classes&quot;.  Thes=
e are 16-
   bit values.  Registry entries are assigned by using the &quot;IETF Revie=
w&quot;
   policy defined in <a href=3D"https://tools.ietf.org/html/rfc5226">RFC 52=
26</a> [<a href=3D"https://tools.ietf.org/html/rfc5226" title=3D"&quot;Guid=
elines for Writing an IANA Considerations Section in RFCs&quot;">RFC5226</a=
>].
</pre></div><div><br></div><div><br></div><div>I would then also recommend =
adding:</div><div><br></div><div>TLV Class 0x0001 is allocated to =E2=80=9C=
IETF=E2=80=9D.</div><div><br></div><div>For TLV Class x0001, there will be =
a new TLV Type registry. These are 7-bit values. Registry entries are assig=
ned by using the &quot;IETF Review=E2=80=9D policy defined in RFC 5226 [RFC=
5226].</div><div><br></div><div>For TLV Class x0001, TLV Type x01 is alloca=
ted to =E2=80=9C32-bit unstructured metadata=E2=80=9D.</div><div><br></div>=
<div>Cheers,</div><div>Andy</div><div><br></div><div><br></div><div class=
=3D"gmail_extra"><div class=3D"gmail_quote">On Wed, Nov 25, 2015 at 3:02 PM=
, Ron Parker <span dir=3D"ltr">&lt;<a href=3D"mailto:Ron_Parker@affirmednet=
works.com" target=3D"_blank">Ron_Parker@affirmednetworks.com</a>&gt;</span>=
 wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.=
8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-st=
yle:solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">There are 2 distinctions between types 1 and=
 2.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">Type 1:<u></u><u></u></span></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=C2=B7<span style=3D"font-style:normal;font-variant:normal;font=
-weight:normal;font-size:7pt;line-height:normal;font-family:&#39;Times New =
Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Fixed length metadata<u></u><u></u></sp=
an></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=C2=B7<span style=3D"font-style:normal;font-variant:normal;font=
-weight:normal;font-size:7pt;line-height:normal;font-family:&#39;Times New =
Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Unstructured metadata<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">Type 2:<u></u><u></u></span></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=C2=B7<span style=3D"font-style:normal;font-variant:normal;font=
-weight:normal;font-size:7pt;line-height:normal;font-family:&#39;Times New =
Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Variable length metadata<u></u><u></u><=
/span></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=C2=B7<span style=3D"font-style:normal;font-variant:normal;font=
-weight:normal;font-size:7pt;line-height:normal;font-family:&#39;Times New =
Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Structured metadata<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">Wouldn=E2=80=99t type 1 be more flexible if =
it supported a variable length of unstructured metadata?=C2=A0=C2=A0 Perhap=
s in 4 byte increments?=C2=A0=C2=A0 Then the distinction would be only
 whether or not the metadata was structured and perhaps a reasonable justif=
ication for the continued existence of both is that the byte length to enco=
de the additional structure in type 2 is greater and perhaps less efficient=
 to parse and that certain deployment
 scenarios would benefit from the simplicity of type 1.<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">=C2=A0=C2=A0 Ron<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><a name=3D"151403d77cf973ba__MailEndCompose"><span s=
tyle=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"=
><u></u>=C2=A0<u></u></span></a></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11pt;font-family:Calibri=
,sans-serif">From:</span></b><span style=3D"font-size:11pt;font-family:Cali=
bri,sans-serif"> sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=
=3D"_blank">sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Andrew G. Malis<br>
<b>Sent:</b> Monday, November 23, 2015 10:51 AM<br>
<b>To:</b> Bottorff, Paul &lt;<a href=3D"mailto:paul.bottorff@hpe.com" targ=
et=3D"_blank">paul.bottorff@hpe.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</=
a>; Dolganow, Andrew (Andrew) &lt;<a href=3D"mailto:andrew.dolganow@alcatel=
-lucent.com" target=3D"_blank">andrew.dolganow@alcatel-lucent.com</a>&gt;; =
Linda Dunbar &lt;<a href=3D"mailto:linda.dunbar@huawei.com" target=3D"_blan=
k">linda.dunbar@huawei.com</a>&gt;; Paul Quinn (paulq) &lt;<a href=3D"mailt=
o:paulq@cisco.com" target=3D"_blank">paulq@cisco.com</a>&gt;; <a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>; Qin Wu=
 &lt;<a href=3D"mailto:bill.wu@huawei.com" target=3D"_blank">bill.wu@huawei=
.com</a>&gt;</span></p><div><div class=3D"h5"><br>
<b>Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u></u><u></u></div=
></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">I agree with Paul B. that interoperability is best s=
erved by using a header that accommodates the greatest number of possible a=
pplications and use cases as the common denominator. This argues for type 2=
 being the MUST to implement, with
 type 1 being an optional optimization for some particular use cases or app=
lications that require at most a particular number context headers.<u></u><=
u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">In a separate email, Med asked a very reasonable que=
stion - for type 1, why are there=C2=A0four mandatory context headers, rath=
er than 2, 3, 5, 10, etc.? The draft contains no particular justification f=
or this choice.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">It=E2=80=99s true that there are two particular use =
cases,=C2=A0draft-guichard-sfc-nsh-dc-allocation and=C2=A0draft-napper-sfc-=
nsh-mobility-allocation, that look to make good use of exactly 4 context he=
aders. However, these are just two particular examples,
 and not yet accepted by the WG.=C2=A0 Further development of these drafts,=
 or even implementation, may show that four are insufficient.<u></u><u></u>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Cheers,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Andy<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul &lt=
;<a href=3D"mailto:paul.bottorff@hpe.com" target=3D"_blank">paul.bottorff@h=
pe.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border-style:none none none solid;border-left-color:rg=
b(204,204,204);border-left-width:1pt;padding:0in 0in 0in 6pt;margin-left:4.=
8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">I think we all =
could agree that fixed headers are easier to implement than TLVs, however t=
hat does not rationalize mandating a fixed header implementation.
 It would rationalize supporting only fixed length headers, however we have=
 been unable to do this. Options always weaken standards agreement.</span><=
u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">=C2=A0</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">If the applicat=
ion requires TLVs, then it does not provide any standards advantage to mand=
ate support for fixed headers. It will not be possible for
 an application that requires TLVs to fall back to fixed length headers. If=
 they could, then we should eliminate the TLV option from NSH.
</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">=C2=A0</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">IMHO we should =
be looking at the abstract semantics for meta-data before we consider how t=
o encode it. Once we decide what needs to be encoded then we
 can consider the best encodings and what should be mandatory or optional. =
</span>
<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">=C2=A0</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Cheers,</span><=
u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">=C2=A0</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Paul
</span><u></u><u></u></p>
<div>
<div style=3D"border-style:solid none none;border-top-color:rgb(225,225,225=
);border-top-width:1pt;padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:<a href=3D"mailto:sfc-bounc=
es@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Paul Quinn (paulq)<br>
<b>Sent:</b> Friday, November 20, 2015 6:27 AM<br>
<b>To:</b> Qin Wu<br>
<b>Cc:</b> <a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elz=
ur@intel.com</a>; Dolganow, Andrew (Andrew);
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>; Linda D=
unbar<br>
<b>Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u></u><u></u></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<blockquote style=3D"margin-top:5pt;margin-bottom:5pt">
<div>
<p class=3D"MsoNormal">On Nov 19, 2015, at 9:28 PM, Qin Wu &lt;<a href=3D"m=
ailto:bill.wu@huawei.com" target=3D"_blank">bill.wu@huawei.com</a>&gt; wrot=
e:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">Hi, Andrew and Paul:</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">It looks I missed a lot of discussion regarding NSH context header in the=
 past, thanks Paul to point me the archive.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">Generally speaking, there is tradeoff between performance and flexibility=
.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">=C2=A0</span><u></u><u></u></p>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal">Absolutely, and that&#39;s the reason for offering t=
he two options: balance speed/simplicity and flexibility.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The philosophy is to mandate the simplest form of me=
tadata, enabling a broad implementation base.=C2=A0 If/when more flexibilit=
y is needed a more flexible NSH type is available, along
 with the associated tradeoffs.=C2=A0 That&#39;s the balance that we decide=
d to strike and it seems to be reasonable and well accepted.<u></u><u></u><=
/p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Thanks,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Paul<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div></div></div>
</div>

</blockquote></div><br></div></div>

--001a11469e2253f98a0525635dee--


From nobody Wed Nov 25 12:39:03 2015
Return-Path: <narten@us.ibm.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 264E01B2F7D for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:39:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.786
X-Spam-Level: 
X-Spam-Status: No, score=-4.786 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TddKlZ1-TTe7 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:38:58 -0800 (PST)
Received: from e17.ny.us.ibm.com (e17.ny.us.ibm.com [129.33.205.207]) (using TLSv1 with cipher CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4E781B2FB0 for <sfc@ietf.org>; Wed, 25 Nov 2015 12:38:57 -0800 (PST)
Received: from localhost by e17.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <sfc@ietf.org> from <narten@us.ibm.com>; Wed, 25 Nov 2015 15:38:56 -0500
Received: from d01dlp01.pok.ibm.com (9.56.250.166) by e17.ny.us.ibm.com (146.89.104.204) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 25 Nov 2015 15:38:54 -0500
X-IBM-Helo: d01dlp01.pok.ibm.com
X-IBM-MailFrom: narten@us.ibm.com
X-IBM-RcptTo: sfc@ietf.org
Received: from b01cxnp22033.gho.pok.ibm.com (b01cxnp22033.gho.pok.ibm.com [9.57.198.23]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id D10F938C8046 for <sfc@ietf.org>; Wed, 25 Nov 2015 15:38:53 -0500 (EST)
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by b01cxnp22033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id tAPKcrol24051726 for <sfc@ietf.org>; Wed, 25 Nov 2015 20:38:53 GMT
Received: from d01av02.pok.ibm.com (localhost [127.0.0.1]) by d01av02.pok.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id tAPKcrTr020206 for <sfc@ietf.org>; Wed, 25 Nov 2015 15:38:53 -0500
Received: from cichlid.raleigh.ibm.com ([9.80.97.12]) by d01av02.pok.ibm.com (8.14.4/8.14.4/NCO v10.0 AVin) with ESMTP id tAPKcqkb020169 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <sfc@ietf.org>; Wed, 25 Nov 2015 15:38:53 -0500
Received: from cichlid.raleigh.ibm.com.us.ibm.com (localhost.localdomain [127.0.0.1]) by cichlid.raleigh.ibm.com (8.14.4/8.12.5) with ESMTP id tAPKcqMU029917 for <sfc@ietf.org>; Wed, 25 Nov 2015 15:38:52 -0500
Date: Wed, 25 Nov 2015 15:38:52 -0500
Message-ID: <m3bnahbyqr.wl-narten@us.ibm.com>
From: Thomas Narten <narten@us.ibm.com>
To: sfc@ietf.org
User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (=?ISO-8859-4?Q?Goj=F2?=) APEL/10.8 EasyPG/1.0.0 Emacs/23.1 (x86_64-redhat-linux-gnu) MULE/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset=US-ASCII
X-TM-AS-MML: disable
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 15112520-0041-0000-0000-0000027EB5EE
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/O1smlcrPCiMBQ9gxLgXnpahByq8>
Subject: [sfc] Draft minutes for the SFC Meeting in Yokohama
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 20:39:02 -0000

Below are the draft minutes for the Yokohama SFC meeting. Please send
minor corrections to me directly, larger corrections should go to the
list.

Thanks!

Minutes for SFC Meeting in Yokohoma (IETF 94)

Minute takers:
    "Elzur, Uri" <uri.elzur@intel.com>
    Dave Dolson <ddolson@sandvine.com>
Merged by: Thomas Narten <narten@us.ibm.com>    

> 00:00 Introduction (WG-chairs) - [5 minutes]
> Agenda bashing, note-well, (WG-chairs) - [5 minutes]

Stand-in chairs: Joel Halpern and Carlos Pignataro.
Carlos kicks off the meeting.
Arch published as an RFC, this is the 2nd RFC the WG released

> 00:05 SFC Security Requirements (Presenter + open-mic) - [25 minutes]
> 
> - SFC Environment Security Requirements (Daniel Migault) - [15 minutes]
> - http://www.ietf.org/id/draft-mglt-sfc-security-environment-req-00.txt
> - SFC Security Requirements Q&A (open-mic) - [10 minutes]

Basic architecture: Divided to two plane.

Attack Scenarios:
The CP benefits from strong access control, in the Tenant User plane
this is not the case as the tenant can craft any packet and controls
both ends of the communication. Tenant can also measure which packets
will take more resources, create loop or leak information and use
those to launch DDOS. 

Another scenario: can discern if the client is on WL, RAN or other
access method, force the user to provide some additional info to
discern info about the user identity, location etc.

Attacker can also change metadata Requirements: 2 type of categories

1)      Plane Separation

2)      SFC service itself

In the talk today, focus on SFC specific: REQ14, 15, 16, 17.

Recommend use of fixed length metadata to allow for more predictable
performance and less exposure of what loads the nodes.

REQ19 - keep isolation. Ability to detect the user in the domain to
prevent man in the middle (MitM) attack Question to the WG: 2
additional requirements 23 and 24 - are they in scope?

Q&A:

Ramki - NFVRG has a draft about misconfiguration. Did you consider
addressing miss configuration? Needs to be added to the draft, it is a
major source for security exposure.

Daniel - agree. Detect misconfiguration with auditing.

Ramki: mention explicitly?

Daniel: OK, I will get back.

Linda: Similar to I2RS security reqirements: Can relax security if
firewall around everything. Requirements should be based on whether
there is a firewalled network or not. Have different reqirement for
each type. Another issue is that without specificity, a user may
discredit other requirements if they notice some of them as
irrelevant.

Daniel: all REQ are preceded by a scenario so if the scenario
doesn't apply, no need to follow it. This is the reason the draft
uses SHOULD vs. MUST.

Linda: REQx mentions use of a FW, need to be specific, otherwise it
is meaningless. Protects against what threat?

Joel: asks for action to start 2 threads on the list for these issues.

Nicolas - Disputes prohibitation against use of metadata for
steering.

Daniel: it is just "SHOULD".

Nicolas: Also, important to allow components to share SFs, for
efficiency. Metadata size is performance oriented not security, Where
is the boundary?  One use of the metadata is to carry multi tenant
information. It provides efficiency. The draft seems to discourage
that

Surendra: Meaning of "Volume must be limited"?

Daniel: Be careful about size of metadata;

Surendra: But says "MUST"

Daniel: agree

Surendra: Important to protect both path and index.

Uri: Is this draft REQ normative or not? Or good advice? This is
especially important when it comes to some of the MUST like REQ24,
which may have wire protocol implications.

Joel -if WG adopts document, depends on SHOULD or MUST, which would be
normative. WG needs to decide what will be normative. If the WG adopts
the draft (or parts of it) it affects all the other documents
including NSH.

Carlos: Work was tasked because WG declared security important; thanks
to Alia for raising issues. If a MUST is adopted, then it is
normative.

Uri: in that case, I hope this WG will not be more zealous than other
WGs. Especially on MUST Requirements, which needs to be carefully
analyze and with a proper scenario like what Linda suggested.

Joel: point is WG members need to review and comment, possibly provide
caveats

Alia - Some WGs have been more relaxed and then later in the IETF
process find that more rigor is required and they get sent back to the
beginning. So my advice is for the WG to think before submitting their
drafts and include all the necessary security provisions. This is
especially important as SFC has some potential privacy exposures

Al Morten: wrt threads on slide; are people who want to measure
performance threats? Need to distinguish legitimate testers vs. those
doing "reconnaisance". Sometimes the man-in-the-middle is a
tester. Suggest to use API control for testing vs.
reconnaissance. Sometimes the man in the middle is legitimate.

Daniel: the point is to only allow legitimate devices (a tester would
be legitimate)

>         00:30 SFC Use Cases (Presenters + open-mic) - [30 minutes]
> 
>         - SFC Use Cases for Network Security (Eric Wang) - [10 minutes]
>                 - https://www.ietf.org/internet-drafts/draft-wang-sfc-ns-use-cases-00.txt

Scenario awareness is important: SPI may be different if the traffic
is a response or a request.  Need to classify based on Network and
Application criteria: for example a SSL proxy will not be identified
before the handshake is established and it may result in moving to
another SPI .

Service Function (slide 4): Embedding: beneficial to avoid unnecessary
roundtrip to the classifier.  Note color code on the slide for new
requirements that are not in the current WG docs.  E.g., Bypass /
offloading - may require TCP state clearing too. Need to be reviewed
in the offload mechanism.  Tap mode - is an input device w/o output,
requires a copy of the traffic and maybe more. Discussion needed

Packet handling (slide 5): Results to allow multiple devices to make a
joint decision.

Poll of the room: Very few read the use case draft.

Q&A:

Carlos: who has read this? Show of hands? [Joel: very few]

Al Moron: "I volunteer to read because we need more of this for
measurements."

Carlos: "who are on the hook"

Diego Lopez: impression is using SFC to provide security.

Joel: yes, the opposite.

Diego: then title is misleading.

Joel: send suggestion for better title to the list.

Diego: I will.

>         - SFC Use Cases in Broadband (Wei Meng) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-meng-sfc-broadband-usecases/

Slide 3: SFC can be used to simplify the architecture of certain
devices. If split out some SFC out of BNG, then the rest can be common
such a switch today!

Slide 4: Same for CPE which is complex, then it can be cheaper and simpler!

Q&A:

Kengo Naito: Is there NSH inside the CPE?

Wei: Yes

Slide 5: IPTV - special use case in BB scenario, as it is forked. The
BNAS fwd and traffic is duplicated to STB. It is also not symmetric.
Q to the WG: Is it one SFC and SFP or six different ones? Suggest to
have ml discussion to follow.

Slide 6 Issue-1:

In legacy devices/architecture, the address pool is configured on the
device itself. However using SFC - should it be distributed or
centralized?  Who provides input to BB network to steer the traffic?
If asymmetric traffic inbound SFP and outbound SFP are separate. How
do we ensure both have the same SF devices in the path?

Slide 7 Issue-2 :

In legacy devices/architecture, fwd-ing and control are integrated in
one device. How to do it w SFC? NAT can send a session to SFF or to a
physical witch. So now a 2nd or 3rd packet can be fwd by SFF feeing up
NAT resources. For a high perf scenario, can use by-pass to avoid
sending all the traffic to the NAT.

Request WG adoption.

Joel: we aren't going to progress the adoption question today.
Chairs: Send a note to ml to ask for WG adoption of the document.

Q&A:

Kent Leung: many issues are wrt NAT: why is this just a broadband
issue? Other issues are generic and overlapping too.

Diego - the presentation is much to specific to particular
architecture/solution. If we go this way, we will have 10M use
cases. Should not go there.

Joel - focus should be on use cases that drive new protocol needs /
requirements.

Carlos - Use case presented, should be Protocol or Security
requirement driven.

Wei: not to provide a solution

Ericsson - How does this relate to broadband forum WT345 (?)

Meng - will consider contributing there too

> 01:00 SFC Architecture Discussion (Presenters + open-mic) - [50 Minutes]
> 
>         - UDP Overlay Transport For Network Service Header (Surendra Kumar) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-kumar-sfc-nsh-udp-transport/

Transport is out of scope for the SFC WG. Today NSH editors have to go
to each WG to get NSH supported .  A draft in NVO3 WG for VxLAN-gpe,
but it requires to operate a Virtual Network and is NOT native on top
of UDP.  It is out of scope for SFC, so Surendra presented this draft
in the routing WG and received lots of feedback.

Q&A:

Carlos: does "signaling" mean signaling?
Surendra: must be a way to indicate carrying NSH.

Joel - commenting as an individual. Conflict between slide 2
(i.e. Transport out of scope) and slide 3 (i.e. ask SFC for UDP as
transport for NSH) is confusing. Aiming for WG adoption for something
outside of charter?

Alia: it is outside the charter, but WG may discuss. UDP encap is not
the hard part, but we need to understand security
considerations. Knowledge to turn this from "NSH in UDP" to something
that is reasonable to use; the knowledge to do that is within SFC.

Joel: is it not the case that the same knowledge applies to all encap
types. The same arguments would seem to apply to all of them. Agree
that transports should not be work item.  advice not to do it here?

Alia: yes, same types of arguments apply, and if there is active
interest in multiple transports, then maybe have a "general
considerations" draft.

Joel: I could understand a different general considerations draft.

Alia: Discuss here because it is the first. Could consider general
considerations.

Lucy Yong - first, this is still a Transport draft. Second, we have
a GRE draft and only need to register EtherType and get it done.

Surendra - still, even with GRE still need to manage a virtual network?

Daniel E/// - note discussion in DOTS. Are Service Providers ready to
use UDP for such a purpose? Say on mailing list.

Kengo Naito - I like this encap, but should not be WG  recommendation.

Dino - NSH runs over L4 transport, can use UDP like any other protocol
like DNS. Made this comment to NSH authors few times.

Dave Dolson- There is an EtherType in the NSH draft. Was it an
omission not to relate to it?

>         - Map Assisted SFC Proxy using LISP (Albert Cabellos) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-cabellos-sfc-map-assisted-proxy/

Proxy may also need to re-classify as legacy may change the packet!
RFC6830 offers a std interface to a way to store a key and retrieve it
back later. This simplifies the Proxy

Q&A:

Kent Leung: How to deal with NFC-unaware device has rewritten 5-tuple?
Is NAT ok changes the 5 tuple?

Albert: this is an advantage: it can rewrite it

Kent: who is doing rewrite when legacy SF creates a packet with brand
new 5-tuple. How does mapper know it?

Albert: SFC control function must be aware of that.

Kent: now clear: proxy must be ready for new 5-tuples.

Albert: control plane is aware of the mapping done by the NAT.

Uri: this goes beyond the question of what to do in the case the SF
changed the 5-tuple. It is the question of: is the SF trusted - for
the sake of the 5 tuple, as well as the NSH header. There are opinions
as if we need to allow for some SF that are and some that are not
trusted. I assume all agree the SFF is part of the infrastructure and
is trusted. We need to close on this for the NSH draft too.

Albert: in my scenario, all elements are trusted.

Lucy Yong: with these applications, is it a LISP network, or just
between the proxy & SF

Albert: maybe semantics, but does not understand this as a LISP
network.

Wei Meng: if the packet is received by the proxy, does the proxy need
to put the payload in the cache?

Albert: depends on mappings of 5-tuple to NSH. Can be defined by
prefix.


>         - Packet Generation in Service Function Chains (Reinaldo Penno) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-penno-sfc-packet/

SF need to generate packets on their own, intrinsic need of these
devices. SF needs 3 pieces of data to be able to send a packet back. 
Options:

1) SFF sends this to the SF

2) SF sends NSH OAM to the SFF

3) Classifier - but that consumes lots of metadata space

4) Algorithmic - draft authors have invested time on this option and
have also implemented in ODL

How to determine the metadata?
Key focus right now. Two options:

1.  Path-invariant - Min amount of metadata an push it to every SF

2.  Flow invariant - metadata in every packet in specific positions

Q&A:

David Dolson: I think this is important; I would like to work on it.

Kent Leung: this is important, and an oversight. This needs to be addressed.

>         - Hierarchical Service Function Chaining (Dave Dolson) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-dolson-sfc-hierarchical/
	       
Problem space - for a large scale network/DC. Maybe Containers
based. Large network and asymmetric traffic patterns (e.g. packets
from WAN). And also for supporting multiple teams who need access to
control / configure SFC elements: e.g., separate teams for Security,
DDOS, network that are all involved.

Many operators can't use a "Super controller" - a single controller to
setup paths in the entire network - becoming a single point of failure
and a performance bottleneck

Slide 7 Mechanism - inbound into IBN is not too difficult, back is
complex.

Reviewed the CP drafts and found no issues yet. IBN is viewed as a SF
and a Classifier to external higher hierarchy. Need to treat theses
function independently.

Q&A:

x- Current SFC assumes single domain. This draft seems to require
multi domain. What is the practical scenario?

Dave - draft has examples. E.g. biz traffic vs residential
services. The high level classifier sorts out what DC to use, and the
low level classifier - controlled by a separate team, implements the
paths and the features e.g. FW, NAT for a residential traffic and
another team for the biz etc.

Andy Beach NetCracker - looked into API for..

> 01:50 SFC Miscellaneous (Presenters + open-mic) - [35 minutes]
> 
>         - SFC Trace Issue Analysis & Solutions (Xinpeng Wei) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-yang-sfc-trace-issue-analysis/

There are issues that are not covered by current drafts the WG has.

Slide 4: frame format suggests that OAM can extend the MD-Type1
packet???

Q&A:

Uri: you were showing OAM type 1, which is fixed size. Did you mean
OAM type 2 for TLV structure?

Joel: we could redefine the fixed length format as not fixed. We
should discuss it.

Presenter - agree Joel - we have fixed size for MD Type = 1, but can
redefine if the WG thinks it is of value

Erik Nordmark - OAM work assumed the trace packets go along the same path as
regular packets, here the trace report goes to the controller which is
a novel idea. We should study this new approach that allows packets to
cause events in the control plane. Including potential DDOS against
the controller?

Carlos: please clarify: operations or security

Erik: it feels novel. We know how to do tracert because it flows in
reverse direction, but this feels new because it crosses into a
different security domain.

Kengo Naito: how to deal  (in terms of getting OAM supported)  with
NSH-unaware service functions?

Xinpeng: proxy is not here right now

Kengo: we should get some OAM

Xinpeng: ok

>         - SFC: Subscriber & Host Identification Considerations (TBD) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-sarikaya-sfc-hostid-serviceheader/

Presented by Behcet Sarikaya

Joel: on IMEI or subscriber ID, both arch and security draft indicate
we should obscure that. Also it is a large thing to pass around. In
security we said indirect IDs should be used. Also, we do have a draft
for a list of useful TLVs, which has a subscriber ID. As a personal
point of view, I'd rather see one draft of TLVs. WG also has a draft
with proposed TLV for MD Type=2, pls join.

Behcet: open to merging. Problem with merging drafts is loss of
rationale and use case.

>         - SFC NSH Context Header Allocation -- Mobility (Praveen Muley) - [10 minutes]
>                - https://datatracker.ietf.org/doc/draft-napper-sfc-nsh-mobility-allocation/


Q&A:

Uri: bothered by whether the WG can merge the bit allocation
schemes. In some areas there is duplication of the same
entity. Another way to pose the question is to ask what happens when a
packet from mobility domain enters DC domain. Who does the mapping?
Why is different information being carried? Can we strive to blend
them together?

Praveen: I guess the information is different.

Uri - While I fully recognize that in some fields the info carried for
the mobile case and the DC case are different it still makes sense to
attempt to merge what is possible between DC and mobility bit
allocation drafts. Also is there a case where the traffic will
traverse te boundary between the two and hence will be good to make it
easier with similar format?

Uri: Looked at both drafts, and there is common information.

Praveen: please post to lists.

Surendra: I raised this earlier; there are some commonalities, which
we can try to align. But use cases are different and we should align
common parts.

Kent Leung: should align formatting, but there are some that don't
match. There is a draft proposing a bit for which is used?

Dave Dolson: control plane is a possible way of setting the metadata
"schema" for each SPI/SI at each node.

Kent: also feels need to address.

Not sure we want to create registry

Dave Dolson - put it in the CP to tell what format to use where. It is
a schema and it is important to the WG to work on it




From nobody Wed Nov 25 12:58:58 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 144061A8872 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:58:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XNYlTmScnuRs for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 12:58:53 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78D811A8894 for <sfc@ietf.org>; Wed, 25 Nov 2015 12:58:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26898; q=dns/txt; s=iport; t=1448485133; x=1449694733; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=0eTGkL5UloxPzuEaNKgG1r1HgGGERaei2mYWrPTQWhg=; b=mpYj18KyAFT0hC8xUTxCKtnmuoYi1cnIb43funNrR6tesftP//t5q7d1 0E/1LnBxLaFGv7lX1oKyEndsWtHlxZb09wjykWrwlHgZYhZOEUzTIk+pt 6+mblbM4lunUAFIBlWUnHzPx1pdx0cOLqqDLTSiAWGNR/rEX8J9z9dyuJ s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D5AQA0IFZW/4MNJK1egm5NU2++QgENg?= =?us-ascii?q?WYXAQmFbgKBRTgUAQEBAQEBAYEKhDQBAQEEAQEBC1cJCxACAQgRBAEBIQcHIQY?= =?us-ascii?q?LFAkIAgQOBYgZAxINuWgNhGMBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUghCCb?= =?us-ascii?q?oJTgVcRAUwJgxOBFQWII4pMg2gBhSeGF4F2lQiHVQEfAQFChARyAQGDaYFBAQE?= =?us-ascii?q?B?=
X-IronPort-AV: E=Sophos; i="5.20,344,1444694400"; d="scan'208,217"; a="48100190"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 25 Nov 2015 20:58:52 +0000
Received: from XCH-RTP-009.cisco.com (xch-rtp-009.cisco.com [64.101.220.149]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tAPKwpdM010269 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 25 Nov 2015 20:58:52 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-009.cisco.com (64.101.220.149) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 25 Nov 2015 15:58:51 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Wed, 25 Nov 2015 15:58:51 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5ejy7hwshPJkSenz9F/5cNK56kIicggAFcfQCAADCFgIAEnguAgALjdmCAAF2ngP//s35q
Date: Wed, 25 Nov 2015 20:58:51 +0000
Message-ID: <0C166DA2-A718-48F8-B9A9-00BB241D6129@cisco.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com> <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net> <CAA=duU0UvERU3-YE2EFT-kOExHWgLesSERRAkox0Ji1V28nNdQ@mail.gmail.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0@MBX021-W3-CA-2.exch021.domain.local>, <CAA=duU0TJ6J73zWsqJRT2ChEe0Q75g2Ecy36dwLMXSBWWpWo-A@mail.gmail.com>
In-Reply-To: <CAA=duU0TJ6J73zWsqJRT2ChEe0Q75g2Ecy36dwLMXSBWWpWo-A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: multipart/alternative; boundary="_000_0C166DA2A71848F8B9A900BB241D6129ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/UsxjFQ0RgmbIyXXyL-SFDsLsmjU>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, Linda Dunbar <linda.dunbar@huawei.com>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>, Qin Wu <bill.wu@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 20:58:57 -0000

--_000_0C166DA2A71848F8B9A900BB241D6129ciscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi, Ron, Andy,

MD Type 1 is not "unstructured" metadata. MD Type 1 has a pre-defined struc=
ture and model. It does not use TLVs however, it is not self-describing but=
 its structure is pre-allocated (DC and mobility examples) and contextually=
 revealed.

Hi, Ron,

The benefit of an MD Type 1 is friendliness to hardware processing. Making =
it of variable length defeats that goal and would make it in my opinion of =
only very incremental value.

Hi, Andy,

What would be the goal of making MD Type 2 "a true superset of MD Type 1" w=
hen it is really not a superset. [I can imagine (perhaps) that such Type va=
lue might potentially be used in interworking scenarios, but I'd suggest no=
t to go there and turn SFC into a routed layer network, and cross that brid=
ge if we ever get there.]

I do not see a use case for that four-32-bit-word (not four-octet) opaque T=
ype.

I do agree with the editorial bug you found.

But I object with an allocation of a "32-bit (or 128-bit) unstructured data=
" Type.

And in any case, might be useful to discuss this within the context of http=
s://tools.ietf.org/html/draft-quinn-sfc-nsh-tlv-00

Thanks!

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

On Nov 25, 2015, at 15:33, Andrew G. Malis <agmalis@gmail.com<mailto:agmali=
s@gmail.com>> wrote:

Ron,

While discussing the distinctions between Types 1 and 2, another thing that=
=92s currently unsaid in the current text, but probably should be, is that =
one of the TLV Types should be for the Type 1 four-octet unstructured metad=
ata, making Type 2 a true superset of Type 1.

There=92s also a bug with section 14.2.3. The text should be corrected as f=
ollows:

OLD:


14.2.3<https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3>.  =
TLV Class Registry


   IANA is requested to set up a registry of "TLV Types".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226<https://tools.ietf.org/html/rfc5226> [RFC5226=
<https://tools.ietf.org/html/rfc5226>].


NEW:


14.2.3<https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3>.  =
TLV Class Registry


   IANA is requested to set up a registry of "TLV Classes".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226<https://tools.ietf.org/html/rfc5226> [RFC5226=
<https://tools.ietf.org/html/rfc5226>].



I would then also recommend adding:

TLV Class 0x0001 is allocated to =93IETF=94.

For TLV Class x0001, there will be a new TLV Type registry. These are 7-bit=
 values. Registry entries are assigned by using the "IETF Review=94 policy =
defined in RFC 5226 [RFC5226].

For TLV Class x0001, TLV Type x01 is allocated to =9332-bit unstructured me=
tadata=94.

Cheers,
Andy


On Wed, Nov 25, 2015 at 3:02 PM, Ron Parker <Ron_Parker@affirmednetworks.co=
m<mailto:Ron_Parker@affirmednetworks.com>> wrote:
There are 2 distinctions between types 1 and 2.

Type 1:

=95        Fixed length metadata

=95        Unstructured metadata

Type 2:

=95        Variable length metadata

=95        Structured metadata

Wouldn=92t type 1 be more flexible if it supported a variable length of uns=
tructured metadata?   Perhaps in 4 byte increments?   Then the distinction =
would be only whether or not the metadata was structured and perhaps a reas=
onable justification for the continued existence of both is that the byte l=
ength to encode the additional structure in type 2 is greater and perhaps l=
ess efficient to parse and that certain deployment scenarios would benefit =
from the simplicity of type 1.

   Ron


From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Andrew G. Malis
Sent: Monday, November 23, 2015 10:51 AM
To: Bottorff, Paul <paul.bottorff@hpe.com<mailto:paul.bottorff@hpe.com>>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>; Dolganow, Andrew (Andrew) <andrew.do=
lganow@alcatel-lucent.com<mailto:andrew.dolganow@alcatel-lucent.com>>; Lind=
a Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>; Paul Qu=
inn (paulq) <paulq@cisco.com<mailto:paulq@cisco.com>>; uri.elzur@intel.com<=
mailto:uri.elzur@intel.com>; Qin Wu <bill.wu@huawei.com<mailto:bill.wu@huaw=
ei.com>>

Subject: Re: [sfc] NSH context headers: fixed/tlv

I agree with Paul B. that interoperability is best served by using a header=
 that accommodates the greatest number of possible applications and use cas=
es as the common denominator. This argues for type 2 being the MUST to impl=
ement, with type 1 being an optional optimization for some particular use c=
ases or applications that require at most a particular number context heade=
rs.

In a separate email, Med asked a very reasonable question - for type 1, why=
 are there four mandatory context headers, rather than 2, 3, 5, 10, etc.? T=
he draft contains no particular justification for this choice.

It=92s true that there are two particular use cases, draft-guichard-sfc-nsh=
-dc-allocation and draft-napper-sfc-nsh-mobility-allocation, that look to m=
ake good use of exactly 4 context headers. However, these are just two part=
icular examples, and not yet accepted by the WG.  Further development of th=
ese drafts, or even implementation, may show that four are insufficient.

Cheers,
Andy


On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul <paul.bottorff@hpe.com<mai=
lto:paul.bottorff@hpe.com>> wrote:
I think we all could agree that fixed headers are easier to implement than =
TLVs, however that does not rationalize mandating a fixed header implementa=
tion. It would rationalize supporting only fixed length headers, however we=
 have been unable to do this. Options always weaken standards agreement.

If the application requires TLVs, then it does not provide any standards ad=
vantage to mandate support for fixed headers. It will not be possible for a=
n application that requires TLVs to fall back to fixed length headers. If t=
hey could, then we should eliminate the TLV option from NSH.

IMHO we should be looking at the abstract semantics for meta-data before we=
 consider how to encode it. Once we decide what needs to be encoded then we=
 can consider the best encodings and what should be mandatory or optional.

Cheers,

Paul
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Paul Quinn (paulq)
Sent: Friday, November 20, 2015 6:27 AM
To: Qin Wu
Cc: uri.elzur@intel.com<mailto:uri.elzur@intel.com>; Dolganow, Andrew (Andr=
ew); sfc@ietf.org<mailto:sfc@ietf.org>; Linda Dunbar
Subject: Re: [sfc] NSH context headers: fixed/tlv


On Nov 19, 2015, at 9:28 PM, Qin Wu <bill.wu@huawei.com<mailto:bill.wu@huaw=
ei.com>> wrote:

Hi, Andrew and Paul:
It looks I missed a lot of discussion regarding NSH context header in the p=
ast, thanks Paul to point me the archive.
Generally speaking, there is tradeoff between performance and flexibility.


Absolutely, and that's the reason for offering the two options: balance spe=
ed/simplicity and flexibility.

The philosophy is to mandate the simplest form of metadata, enabling a broa=
d implementation base.  If/when more flexibility is needed a more flexible =
NSH type is available, along with the associated tradeoffs.  That's the bal=
ance that we decided to strike and it seems to be reasonable and well accep=
ted.

Thanks,
Paul


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

--_000_0C166DA2A71848F8B9A900BB241D6129ciscocom_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body dir=3D"auto">
<div>Hi, Ron, Andy,</div>
<div><br>
</div>
<div>
<div>MD Type 1 is not &quot;unstructured&quot; metadata. MD Type 1 has a pr=
e-defined structure and model. It does not use TLVs however, it is not self=
-describing but its structure is pre-allocated (DC and mobility examples) a=
nd contextually revealed.&nbsp;</div>
<div><br>
</div>
<div>Hi, Ron,</div>
<div><br>
</div>
<div>The benefit of an MD Type 1 is friendliness to hardware processing. Ma=
king it of variable length defeats that goal and would make it in my opinio=
n of only very incremental value.&nbsp;</div>
<div><br>
</div>
<div>Hi, Andy,</div>
<div><br>
</div>
<div>What would be the goal of making MD Type 2 &quot;a true superset of MD=
 Type 1&quot; when it is really not a superset. [I can imagine (perhaps) th=
at such Type value might potentially be used in interworking scenarios, but=
 I'd suggest not to go there and turn SFC
 into a routed layer network, and cross that bridge if we ever get there.]<=
/div>
<div><br>
</div>
<div>I do not see a use case for that four-32-bit-word (not four-octet) opa=
que Type.&nbsp;</div>
<div><br>
</div>
<div>I do agree with the editorial bug you found.&nbsp;</div>
<div><br>
</div>
<div>But I object with an allocation of a &quot;32-bit (or 128-bit) unstruc=
tured data&quot; Type.</div>
<div><br>
</div>
<div>And in any case, might be useful to discuss this within the context of=
&nbsp;<a href=3D"https://tools.ietf.org/html/draft-quinn-sfc-nsh-tlv-00">ht=
tps://tools.ietf.org/html/draft-quinn-sfc-nsh-tlv-00</a></div>
<div><br>
</div>
<div>Thanks!<br>
<br>
<div><span class=3D"Apple-style-span" style=3D"-webkit-tap-highlight-color:=
 rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192,=
 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.2304=
69); ">Thumb typed by Carlos Pignataro.</span>
<div><span class=3D"Apple-style-span" style=3D"-webkit-tap-highlight-color:=
 rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192,=
 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.2304=
69); ">Excuze typofraphicak errows</span></div>
</div>
</div>
<div><br>
On Nov 25, 2015, at 15:33, Andrew G. Malis &lt;<a href=3D"mailto:agmalis@gm=
ail.com">agmalis@gmail.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div>
<div dir=3D"ltr">Ron,
<div><br>
</div>
<div>While discussing the distinctions between Types 1 and 2, another thing=
 that=92s currently unsaid in the current text, but probably should be, is =
that one of the TLV Types should be for the Type 1 four-octet unstructured =
metadata, making Type 2 a true superset
 of Type 1.</div>
<div><br>
</div>
<div>There=92s also a bug with section 14.2.3. The text should be corrected=
 as follows:</div>
<div><br>
</div>
<div>OLD:&nbsp;</div>
<div><br>
</div>
<div>
<pre class=3D"" style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0=
px;color:rgb(0,0,0);line-height:normal"><span class=3D"h4" style=3D"line-he=
ight:0pt;display:inline;font-size:1em;font-weight:bold"><h4 style=3D"line-h=
eight:0pt;display:inline;font-size:1em"><a class=3D"" name=3D"section-14.2.=
3" href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3=
" style=3D"color:black;text-decoration:none">14.2.3</a>.  TLV Class Registr=
y</h4></span>

   IANA is requested to set up a registry of &quot;TLV Types&quot;.  These =
are 16-
   bit values.  Registry entries are assigned by using the &quot;IETF Revie=
w&quot;
   policy defined in <a href=3D"https://tools.ietf.org/html/rfc5226">RFC 52=
26</a> [<a href=3D"https://tools.ietf.org/html/rfc5226" title=3D"&quot;Guid=
elines for Writing an IANA Considerations Section in RFCs&quot;">RFC5226</a=
>].
</pre>
</div>
<div><br>
</div>
<div>NEW:</div>
<div><br>
</div>
<div>
<pre class=3D"" style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0=
px;color:rgb(0,0,0);line-height:normal"><span class=3D"h4" style=3D"line-he=
ight:0pt;display:inline;font-size:1em;font-weight:bold"><h4 style=3D"line-h=
eight:0pt;display:inline;font-size:1em"><a class=3D"" name=3D"section-14.2.=
3" href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3=
" style=3D"color:black;text-decoration:none">14.2.3</a>.  TLV Class Registr=
y</h4></span>

   IANA is requested to set up a registry of &quot;TLV Classes&quot;.  Thes=
e are 16-
   bit values.  Registry entries are assigned by using the &quot;IETF Revie=
w&quot;
   policy defined in <a href=3D"https://tools.ietf.org/html/rfc5226">RFC 52=
26</a> [<a href=3D"https://tools.ietf.org/html/rfc5226" title=3D"&quot;Guid=
elines for Writing an IANA Considerations Section in RFCs&quot;">RFC5226</a=
>].
</pre>
</div>
<div><br>
</div>
<div><br>
</div>
<div>I would then also recommend adding:</div>
<div><br>
</div>
<div>TLV Class 0x0001 is allocated to =93IETF=94.</div>
<div><br>
</div>
<div>For TLV Class x0001, there will be a new TLV Type registry. These are =
7-bit values. Registry entries are assigned by using the &quot;IETF Review=
=94 policy defined in RFC 5226 [RFC5226].</div>
<div><br>
</div>
<div>For TLV Class x0001, TLV Type x01 is allocated to =9332-bit unstructur=
ed metadata=94.</div>
<div><br>
</div>
<div>Cheers,</div>
<div>Andy</div>
<div><br>
</div>
<div><br>
</div>
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">On Wed, Nov 25, 2015 at 3:02 PM, Ron Parker <spa=
n dir=3D"ltr">
&lt;<a href=3D"mailto:Ron_Parker@affirmednetworks.com" target=3D"_blank">Ro=
n_Parker@affirmednetworks.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;p=
adding-left:1ex">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">There are 2 distinctions between types 1 and=
 2.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>&nbsp;<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">Type 1:<u></u><u></u></span></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=B7<span style=3D"font-style:normal;font-variant:normal;font-we=
ight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Fixed length metadata<u></u><u></u></sp=
an></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=B7<span style=3D"font-style:normal;font-variant:normal;font-we=
ight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Unstructured metadata<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>&nbsp;<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">Type 2:<u></u><u></u></span></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=B7<span style=3D"font-style:normal;font-variant:normal;font-we=
ight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Variable length metadata<u></u><u></u><=
/span></p>
<p><u></u><span style=3D"font-size:11pt;font-family:Symbol;color:rgb(31,73,=
125)"><span>=B7<span style=3D"font-style:normal;font-variant:normal;font-we=
ight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u></u><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">Structured metadata<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>&nbsp;<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">Wouldn=92t type 1 be more flexible if it sup=
ported a variable length of unstructured metadata?&nbsp;&nbsp; Perhaps in 4=
 byte increments?&nbsp;&nbsp; Then the distinction would be
 only whether or not the metadata was structured and perhaps a reasonable j=
ustification for the continued existence of both is that the byte length to=
 encode the additional structure in type 2 is greater and perhaps less effi=
cient to parse and that certain
 deployment scenarios would benefit from the simplicity of type 1.<u></u><u=
></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>&nbsp;<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">&nbsp;&nbsp; Ron<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>&nbsp;<u></u></span></p>
<p class=3D"MsoNormal"><a name=3D"151403d77cf973ba__MailEndCompose"><span s=
tyle=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"=
><u></u>&nbsp;<u></u></span></a></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11pt;font-family:Calibri=
,sans-serif">From:</span></b><span style=3D"font-size:11pt;font-family:Cali=
bri,sans-serif"> sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=
=3D"_blank">sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Andrew G. Malis<br>
<b>Sent:</b> Monday, November 23, 2015 10:51 AM<br>
<b>To:</b> Bottorff, Paul &lt;<a href=3D"mailto:paul.bottorff@hpe.com" targ=
et=3D"_blank">paul.bottorff@hpe.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</=
a>; Dolganow, Andrew (Andrew) &lt;<a href=3D"mailto:andrew.dolganow@alcatel=
-lucent.com" target=3D"_blank">andrew.dolganow@alcatel-lucent.com</a>&gt;; =
Linda Dunbar &lt;<a href=3D"mailto:linda.dunbar@huawei.com" target=3D"_blan=
k">linda.dunbar@huawei.com</a>&gt;;
 Paul Quinn (paulq) &lt;<a href=3D"mailto:paulq@cisco.com" target=3D"_blank=
">paulq@cisco.com</a>&gt;;
<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.co=
m</a>; Qin Wu &lt;<a href=3D"mailto:bill.wu@huawei.com" target=3D"_blank">b=
ill.wu@huawei.com</a>&gt;</span></p>
<div>
<div class=3D"h5"><br>
<b>Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u></u><u></u></div=
>
</div>
<p></p>
<div>
<div class=3D"h5">
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<p class=3D"MsoNormal">I agree with Paul B. that interoperability is best s=
erved by using a header that accommodates the greatest number of possible a=
pplications and use cases as the common denominator. This argues for type 2=
 being the MUST to implement, with
 type 1 being an optional optimization for some particular use cases or app=
lications that require at most a particular number context headers.<u></u><=
u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">In a separate email, Med asked a very reasonable que=
stion - for type 1, why are there&nbsp;four mandatory context headers, rath=
er than 2, 3, 5, 10, etc.? The draft contains no particular justification f=
or this choice.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">It=92s true that there are two particular use cases,=
&nbsp;draft-guichard-sfc-nsh-dc-allocation and&nbsp;draft-napper-sfc-nsh-mo=
bility-allocation, that look to make good use of exactly 4 context headers.=
 However, these are just two particular examples,
 and not yet accepted by the WG.&nbsp; Further development of these drafts,=
 or even implementation, may show that four are insufficient.<u></u><u></u>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Cheers,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Andy<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<p class=3D"MsoNormal">On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul &lt=
;<a href=3D"mailto:paul.bottorff@hpe.com" target=3D"_blank">paul.bottorff@h=
pe.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border-style:none none none solid;border-left-color:rg=
b(204,204,204);border-left-width:1pt;padding:0in 0in 0in 6pt;margin-left:4.=
8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">I think we all =
could agree that fixed headers are easier to implement than TLVs, however t=
hat does not rationalize mandating a fixed header implementation. It would =
rationalize supporting only fixed length
 headers, however we have been unable to do this. Options always weaken sta=
ndards agreement.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">&nbsp;</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">If the applicat=
ion requires TLVs, then it does not provide any standards advantage to mand=
ate support for fixed headers. It will not be possible for an application t=
hat requires TLVs to fall back to fixed
 length headers. If they could, then we should eliminate the TLV option fro=
m NSH.
</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">&nbsp;</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">IMHO we should =
be looking at the abstract semantics for meta-data before we consider how t=
o encode it. Once we decide what needs to be encoded then we can consider t=
he best encodings and what should be
 mandatory or optional. </span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">&nbsp;</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Cheers,</span><=
u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">&nbsp;</span><u=
></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Paul </span><u>=
</u><u></u></p>
<div>
<div style=3D"border-style:solid none none;border-top-color:rgb(225,225,225=
);border-top-width:1pt;padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> sfc [mailto:<a href=3D"mailto:sfc-bounc=
es@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Paul Quinn (paulq)<br>
<b>Sent:</b> Friday, November 20, 2015 6:27 AM<br>
<b>To:</b> Qin Wu<br>
<b>Cc:</b> <a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elz=
ur@intel.com</a>; Dolganow, Andrew (Andrew);
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>; Linda D=
unbar<br>
<b>Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u></u><u></u></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
<div>
<blockquote style=3D"margin-top:5pt;margin-bottom:5pt">
<div>
<p class=3D"MsoNormal">On Nov 19, 2015, at 9:28 PM, Qin Wu &lt;<a href=3D"m=
ailto:bill.wu@huawei.com" target=3D"_blank">bill.wu@huawei.com</a>&gt; wrot=
e:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">Hi, Andrew and Paul:</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">It looks I missed a lot of discussion regarding NSH context header in the=
 past, thanks Paul to point me the archive.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">Generally speaking, there is tradeoff between performance and flexibility=
.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
">&nbsp;</span><u></u><u></u></p>
<div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
</div>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal">Absolutely, and that's the reason for offering the t=
wo options: balance speed/simplicity and flexibility.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The philosophy is to mandate the simplest form of me=
tadata, enabling a broad implementation base.&nbsp; If/when more flexibilit=
y is needed a more flexible NSH type is available, along with the associate=
d tradeoffs.&nbsp; That's the balance that we
 decided to strike and it seems to be reasonable and well accepted.<u></u><=
u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Thanks,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Paul<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</blockquote>
<blockquote type=3D"cite">
<div><span>_______________________________________________</span><br>
<span>sfc mailing list</span><br>
<span><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></span><br>
<span><a href=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.iet=
f.org/mailman/listinfo/sfc</a></span><br>
</div>
</blockquote>
</div>
</body>
</html>

--_000_0C166DA2A71848F8B9A900BB241D6129ciscocom_--


From nobody Wed Nov 25 13:01:05 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DE711B300A for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 13:01:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.086
X-Spam-Level: 
X-Spam-Status: No, score=-15.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bYUS4aNN19CV for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 13:00:59 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 025631B3009 for <sfc@ietf.org>; Wed, 25 Nov 2015 13:00:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=27099; q=dns/txt; s=iport; t=1448485259; x=1449694859; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=WuXdt4Cz2HPZSGlVrY0pNq9wgo9pTd3Fpum6GijM3uE=; b=lxqpY2nEEs26r0cZ722joGZzZIph8tLeq8Q9X7Hp4FAYVYewgYAzMjtb ajmk9PxPuS4pi8rEv/4cSjkeYgEtAPaDzUT2o9KxHCPNjj9ftd9We0MtV 78wAkxD5GaGXUR/+aiiIdLzpQTFF+v0F8BWugn9dSovRE9kkiCHA9JIgQ s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D5AQA0IFZW/5ldJa1egztTb75CAQ2BZ?= =?us-ascii?q?hcKhW4CgUU4FAEBAQEBAQF/C4Q0AQEBAwEBAQEXVAQHBQcEAgEIEQECAQEBASc?= =?us-ascii?q?HJwsUAwYIAgQOBRuICwgNvlgBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIZUghCCb?= =?us-ascii?q?oRZg0uBFQEEjSKJNQGIGYUbgVyEQYc3ixiDcQEfAQFCghEdFoFAcoUsAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,344,1444694400"; d="scan'208";a="48100706"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Nov 2015 21:00:57 +0000
Received: from XCH-RTP-007.cisco.com (xch-rtp-007.cisco.com [64.101.220.147]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id tAPL0uRQ007025 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 25 Nov 2015 21:00:57 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-007.cisco.com (64.101.220.147) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 25 Nov 2015 16:00:56 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Wed, 25 Nov 2015 16:00:56 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
Thread-Index: AQHQ8I9TaP+ioWasF0yH+cbhi+fUbJ4/uTKAgAE4bQCAAD5zgIAtWD4AgDJ0eICAAAQNgIAAA+EAgAAA+ACAAVwBgIAAJjmAgAAYMoCAAAgPAIAABEIA//+8hACAAO3HcIAAifwAgAYb6gCAAKICgIAA5pRwgAB/lYCAAAoZAIABmMLY
Date: Wed, 25 Nov 2015 21:00:56 +0000
Message-ID: <AF23854C-C410-4575-89D4-A680B9921E6C@cisco.com>
References: <066.a5062f0b71b46ed47abec3662c87c450@tools.ietf.org> <55F9A3A1.8000100@joelhalpern.com> <787AE7BB302AE849A7480A190F8B9330053950B1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55FADE19.4000703@joelhalpern.com> <B24CAC5F-6D95-44F4-B8CC-3B0BCD68E427@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9F3F1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A61@eusaamb101.ericsson.se> <787AE7BB302AE849A7480A190F8B933008C9F449@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <6BCE198E4EAEFC4CAB45D75826EFB07614FF7A7C@eusaamb101.ericsson.se> <124FC034-8627-4976-846F-15136797DD48@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FC4B@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <8916AB2A-FE0C-4386-B617-96BC3087BE0E@cisco.com> <787AE7BB302AE849A7480A190F8B933008C9FE25@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D272001C.2F600%cpignata@cisco.com> <D2720C4C.2F7CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA04CD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D27348EC.30C98%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA1789@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D278F107.3228F%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA23B2@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D279E504.3230F%jguichar@cisco.com>, <787AE7BB302AE849A7480A190F8B933008CA254A@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA254A@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CVU-H4hP9kQD0CoLMHw9jYfZ0M4>
Cc: "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #15 (control-plane): Whether the control plane operates on SFC IDs, SFP IDs, etc.
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 21:01:03 -0000

This reads as a positive change. I agree those relate to SFP and not SFC.=20

Thanks,

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

> On Nov 24, 2015, at 10:38, "mohamed.boucadair@orange.com" <mohamed.boucad=
air@orange.com> wrote:
>=20
> Re-,
>=20
> I can make those changes.
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : Jim Guichard (jguichar) [mailto:jguichar@cisco.com]
>> Envoy=E9 : mardi 24 novembre 2015 16:02
>> =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
>> Cc : sfc issue tracker
>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane operate=
s
>> on SFC IDs, SFP IDs, etc.
>>=20
>> Hi Med,
>>=20
>> I would like to see =93SFC Forwarding Policy Table=94 replaced with =93S=
FP
>> Forwarding Policy Table=94 and =93SFC-specific traffic forwarding=94 rep=
laced
>> with =93SFP-specific traffic forwarding=94; forwarding is determined bas=
ed
>> upon the SFP *not* SFC. If you can make those changes the text looks goo=
d.
>>=20
>> Jim
>>=20
>> On 11/24/15, 7:57 AM, "mohamed.boucadair@orange.com"
>> <mohamed.boucadair@orange.com> wrote:
>>=20
>>> Hi Jim, all,
>>>=20
>>> In order to make some progress, I suggest to make the following change =
as
>>> a resolution to the issue we are discussing. Other occurrences in the
>>> draft will be tweaked too.
>>>=20
>>> =3D=3D=3D
>>> OLD:
>>>  o  SFC Forwarding Policy Table: this table reflects the SFC-specific
>>>     traffic forwarding policy enforced by SFF components for every
>>>     relevant incoming packet that is associated to one of the existing
>>>     SFCs.
>>>=20
>>>        [[Note: The question of whether the data plane operates just in
>>>        terms of SFP IDs or needs SFC IDs, as described in this version
>>>        of the draft, is still under discussion among the authors.]]
>>> NEW:
>>>  o  SFC Forwarding Policy Table: this table reflects the SFC-specific
>>>     traffic forwarding policy enforced by SFF components for every
>>>     relevant incoming packet that is associated to one of the existing
>>>     SFCs.  The SFP Identifier (SFP-id) is used as a lookup key to
>>>     determine forwarding action regardless of whether the SFC is fully
>>>     constrained, partially constrained, or not constrained at all.
>>>     Additional information such as a flow identifier and/or other
>>>     characteristics (e.g., the 5-tuple transport coordinates of the
>>> original
>>>     packet) may be used for lookup purposes.  The set of information
>>>     to use for lookup purposes may be instructed by the control plane.
>>> =3D=3D=3D
>>>=20
>>> Please review this proposed text.
>>>=20
>>> Cheers,
>>> Med
>>>=20
>>>> -----Message d'origine-----
>>>> De : Jim Guichard (jguichar) [mailto:jguichar@cisco.com]
>>>> Envoy=E9 : lundi 23 novembre 2015 22:40
>>>> =C0 : BOUCADAIR Mohamed IMT/OLN
>>>> Cc : sfc issue tracker; sfc@ietf.org
>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>> operates
>>>> on SFC IDs, SFP IDs, etc.
>>>>=20
>>>> Hi Med,
>>>>=20
>>>> I think the point is that the SFP-id (not SFC-id or any other id) is
>>>> used
>>>> as the lookup key to determine forwarding action regardless of whether
>>>> the
>>>> SFC is fully constrained, partially constrained, or not constrained at
>>>> all. Forwarding is simply realized by the result of the lookup on the
>>>> SFP-id.
>>>>=20
>>>> Jim
>>>>=20
>>>> On 11/23/15, 2:00 AM, "mohamed.boucadair@orange.com"
>>>> <mohamed.boucadair@orange.com> wrote:
>>>>=20
>>>>> Hi Jim,
>>>>>=20
>>>>> The excerpt you quoted is clear to me too. This is not where the
>>>>> disconnect comes from.
>>>>>=20
>>>>> The case of RSP is also clear.
>>>>>=20
>>>>> The one which is less clear is when there are no constraints on the
>> sfc
>>>>> and, using the wording from the dp arch RFC, the decisions are
>>>> "deferred
>>>>> to the SFF about the exact sequence of steps to be used to realize th=
e
>>>>> SFC" (Section 2.3 of RFC 7665). Calling that case an SFP is odd since
>>>> SFP
>>>>> is by definition a "thought of as a constrained version of the
>> original
>>>>> SFC" (Section 2.3 of RFC 7665)
>>>>>=20
>>>>> RFC7665 also ACKs "the specificity may be anywhere in between these
>>>>> extremes" which I understand as the architecture allows for these
>>>>> configurations: (1) fully distributed, (2) loose path, (3) strict
>> path.
>>>>>=20
>>>>> Cheers,
>>>>> Med
>>>>>=20
>>>>>> -----Message d'origine-----
>>>>>> De : Jim Guichard (jguichar) [mailto:jguichar@cisco.com]
>>>>>> Envoy=E9 : jeudi 19 novembre 2015 15:43
>>>>>> =C0 : BOUCADAIR Mohamed IMT/OLN
>>>>>> Cc : sfc issue tracker; sfc@ietf.org; Joel Halpern; Joel M. Halpern
>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>> operates
>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>=20
>>>>>> Hi Med,
>>>>>>=20
>>>>>> On 11/19/15, 2:45 AM, "mohamed.boucadair@orange.com"
>>>>>> <mohamed.boucadair@orange.com> wrote:
>>>>>>=20
>>>>>>> Hi Jim,
>>>>>>>=20
>>>>>>> Let's me rephrase the issue.
>>>>>>>=20
>>>>>>> What we are discussing is related to this part of the draft (and
>>>> some
>>>>>>> other occurrences):
>>>>>>>=20
>>>>>>> =3D=3D=3D=3D=3D=3D
>>>>>>>  o  SFC Forwarding Policy Table: this table reflects the SFC-
>>>> specific
>>>>>>>     traffic forwarding policy enforced by SFF components for
>> every
>>>>>>>     relevant incoming packet that is associated to one of the
>>>>>> existing
>>>>>>>     SFCs.
>>>>>>>=20
>>>>>>>        [[Note: The question of whether the data plane operates
>>>> just
>>>>>> in
>>>>>>>        terms of SFP IDs or needs SFC IDs, as described in this
>>>>>> version
>>>>>>>        of the draft, is still under discussion among the
>>>> authors.]]
>>>>>>> =3D=3D=3D=3D=3D=3D=3D
>>>>>>>=20
>>>>>>> The current draft is generic as it allows to instruct via the cp
>>>>>>> interfaces the underlying dp elements with SFC, SFP, RSP, and other
>>>>>>> policies. When preparing the draft, I had a discussion with Joel
>>>> about
>>>>>>> this design. We both agreed that this is worth to be discussed.
>>>>>>>=20
>>>>>>> I explained, and other have done that too, that both models should
>>>> be
>>>>>>> addressed.
>>>>>>>=20
>>>>>>> The discussion revealed the definition in the dp RFC are too vague.
>>>> We
>>>>>>> need to resolve that as WG.
>>>>>>=20
>>>>>> Jim> which document and what exactly is too vague? For example if we
>>>>>> refer
>>>>>> to section 2.3.1 of RFC7665 it states:
>>>>>>=20
>>>>>> "As an example of this progressive refinement, consider a Service
>>>>>>   Function Chain (SFC) that states that packets using this chain
>>>> should
>>>>>>   be delivered to a firewall and a caching engine.
>>>>>>=20
>>>>>>   A Service Function Path (SFP) could refine this, considering that
>>>>>>   this architecture does not mandate the degree of specificity an
>>>> SFP
>>>>>>   has to have.  It might specify that the firewall and caching
>>>> engine
>>>>>>   are both to be in a specific data center (e.g., in DC1), or it
>>>> might
>>>>>>   specify exactly which instance of each firewall and caching
>> engine
>>>> is
>>>>>>   to be used.
>>>>>>=20
>>>>>>=20
>>>>>> The Rendered Service Path (RSP) is the actual sequence of SFFs and
>>>>>>   SFs that the packets will actually visit.  So if the SFP picked
>>>> the
>>>>>>   DC, the RSP would be more specific.=94
>>>>>>=20
>>>>>>=20
>>>>>> What exactly is vague about this? Seems pretty clear, at least to
>> me,
>>>>>> how
>>>>>> progressive refinement from SFC to eventual RSP is achieved.
>>>>>>=20
>>>>>> Jim
>>>>>>=20
>>>>>>>=20
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>=20
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : Jim Guichard (jguichar) [mailto:jguichar@cisco.com]
>>>>>>>> Envoy=E9 : mercredi 18 novembre 2015 17:18
>>>>>>>> =C0 : Carlos Pignataro (cpignata); BOUCADAIR Mohamed IMT/OLN
>>>>>>>> Cc : sfc issue tracker; sfc@ietf.org; Paul Quinn (paulq);
>>>>>>>> draft-ietf-sfc-
>>>>>>>> control-plane@tools.ietf.org; Joel Halpern; Joel M. Halpern
>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control plane
>>>>>>>> operates
>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>=20
>>>>>>>> [Chair hat off =85]
>>>>>>>>=20
>>>>>>>> I have to say I am struggling to see the =93issue=94 in this threa=
d
>>>> that
>>>>>>>> needs
>>>>>>>> to be addressed other than confusion over SFC vs SFP definition;
>>>>>> from a
>>>>>>>> data plane perspective it is *very* clear that SFP/SI identifiers
>>>> are
>>>>>>>> used
>>>>>>>> as the lookup key into a forwarding construct that may contain
>> 1:n
>>>>>>>> number
>>>>>>>> of next-hops (SFFs, SFs). In some cases that lookup will point to
>>>> a
>>>>>>>> single
>>>>>>>> next-hop, in others multiple next-hops. In *all* cases this has
>>>>>>>> absolutely
>>>>>>>> nothing to do with the SFC as each representation of that SFC is
>>>>>>>> uniquely
>>>>>>>> identified by an SFP-id.
>>>>>>>>=20
>>>>>>>> Jim
>>>>>>>>=20
>>>>>>>> On 11/18/15, 10:19 AM, "sfc on behalf of Carlos Pignataro
>>>> (cpignata)"
>>>>>>>> <sfc-bounces@ietf.org on behalf of cpignata@cisco.com> wrote:
>>>>>>>>=20
>>>>>>>>> Hi, Med,
>>>>>>>>>=20
>>>>>>>>> I also referred to other parts of the document, when I wrote:
>>>>>>>>>=20
>>>>>>>>>> The control-plane draft talks about =B3SFC forwarding=B2 and =B3=
SFC
>>>> data
>>>>>>>>>> plane=B2
>>>>>>>>>=20
>>>>>>>>>=20
>>>>>>>>> For example, I am not sure I understand what this means:
>>>>>>>>>=20
>>>>>>>>> "   o  Populate SFC forwarding policy tables of involved SFC
>> data
>>>>>>>> plane=B2
>>>>>>>>>=20
>>>>>>>>>=20
>>>>>>>>> Or at:
>>>>>>>>> "   o  SFC Forwarding Policy Table: this table reflects the
>>>>>>>> SFC-specific
>>>>>>>>>    traffic forwarding policy enforced by SFF components for
>>>> every
>>>>>>>>>    relevant incoming packet that is associated to one of the
>>>>>> existing
>>>>>>>>>    SFCs."
>>>>>>>>>=20
>>>>>>>>>=20
>>>>>>>>> My comment is that those should be =B3SFP"
>>>>>>>>>=20
>>>>>>>>> Thanks,
>>>>>>>>>=20
>>>>>>>>> =8B Carlos.
>>>>>>>>>=20
>>>>>>>>> -----Original Message-----
>>>>>>>>> From: Med Boucadair <mohamed.boucadair@orange.com>
>>>>>>>>> Date: Wednesday, November 18, 2015 at 10:03 AM
>>>>>>>>> To: Carlos Pignataro <cpignata@cisco.com>
>>>>>>>>> Cc: "Paul Quinn (paulq)" <paulq@cisco.com>,
>>>>>>>>> "draft-ietf-sfc-control-plane@tools.ietf.org"
>>>>>>>>> <draft-ietf-sfc-control-plane@tools.ietf.org>, Joel Halpern
>>>>>>>>> <jmh@joelhalpern.com>, sfc issue tracker
>>>> <trac+sfc@tools.ietf.org>,
>>>>>>>>> "sfc@ietf.org" <sfc@ietf.org>, Joel Halpern
>>>>>> <joel.halpern@ericsson.com>
>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the control
>> plane
>>>>>>>> operates
>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>=20
>>>>>>>>>> Carlos,
>>>>>>>>>>=20
>>>>>>>>>> There is not SFC ID in the core text of the control plane
>> draft.
>>>>>>>>>>=20
>>>>>>>>>> The text you quoted is part of an appendix with a note that
>>>> clearly
>>>>>>>>>> states this is not discussed. A corresponding issue record has
>>>> been
>>>>>>>>>> recorded to seek for more feedback on that appendix.
>>>>>>>>>>=20
>>>>>>>>>> Cheers,
>>>>>>>>>> Med
>>>>>>>>>>=20
>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
>>>>>>>>>>> Envoy=E9 : mercredi 18 novembre 2015 15:35
>>>>>>>>>>> =C0 : BOUCADAIR Mohamed IMT/OLN
>>>>>>>>>>> Cc : Paul Quinn (paulq);
>>>>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>> Joel
>>>>>>>>>>> M. Halpern; sfc issue tracker; sfc@ietf.org; Joel Halpern
>>>>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control
>>>> plane
>>>>>>>>>>> operates
>>>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>=20
>>>>>>>>>>> Med,
>>>>>>>>>>>=20
>>>>>>>>>>>> On Nov 18, 2015, at 8:08 AM, mohamed.boucadair@orange.com
>>>>>> wrote:
>>>>>>>>>>>>=20
>>>>>>>>>>>> Carlos,
>>>>>>>>>>>>=20
>>>>>>>>>>>> This is an open issue for this draft, so it is normal to
>>>>>> continue
>>>>>>>>>>> discussing it. I don't know how you can conclude in advance
>>>> that
>>>>>> we
>>>>>>>> are
>>>>>>>>>>> circling.
>>>>>>>>>>>=20
>>>>>>>>>>> Discussion is great, Med. But my =8Cwe are circling' comment
>>>> (not
>>>>>> in
>>>>>>>>>>> advanced, but already evident) is because I saw the same
>>>>>> questions,
>>>>>>>>>>> same
>>>>>>>>>>> arguments, and same answers as before.
>>>>>>>>>>>=20
>>>>>>>>>>>> "strongly believe" is not a technical argument, btw.
>>>>>>>>>>>=20
>>>>>>>>>>> Well, I believe so on technical grounds! Most of which have
>>>>>> already
>>>>>>>>>>> been
>>>>>>>>>>> said, so I do not want to contribute to the circular
>>>> discussion.
>>>>>>>>>>>=20
>>>>>>>>>>> The control-plane draft talks about =B3SFC forwarding=B2 and =
=B3SFC
>>>>>> data
>>>>>>>>>>> plane=B2,
>>>>>>>>>>> and =B3SFC IDs=B2. The architecture says that SFC are made of
>>>>>> abstract
>>>>>>>>>>> service
>>>>>>>>>>> functions. There=B9s no actual forwarding in this abstract
>>>>>> conceptual
>>>>>>>>>>> model.
>>>>>>>>>>>=20
>>>>>>>>>>> The control-plane draft says =B3Suppose the SFC ID for this SFP
>>>> is
>>>>>>>>>>> "yellow=B2,=B2, and my point again is that in the data plane an
>>>> SFP
>>>>>> has
>>>>>>>> an
>>>>>>>>>>> identifier (which identifies the SFP (SFP-ID) and is not the
>>>>>>>> identifier
>>>>>>>>>>> of
>>>>>>>>>>> something else, it=B9s not a Topology-ID, it=B9s not a SKU, it=
=B9s
>>>> not
>>>>>> a
>>>>>>>> URI,
>>>>>>>>>>> it=B9s not a Family Name, and not an SFC ID), and the control
>>>> (and
>>>>>>>>>>> policy)
>>>>>>>>>>> plane can of course work with SFCs.
>>>>>>>>>>>=20
>>>>>>>>>>> My $0.02.
>>>>>>>>>>>=20
>>>>>>>>>>> Thanks,
>>>>>>>>>>>=20
>>>>>>>>>>> =8B Carlos.
>>>>>>>>>>>=20
>>>>>>>>>>>> Cheers,
>>>>>>>>>>>> Med
>>>>>>>>>>>>=20
>>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>>> De : Carlos Pignataro (cpignata)
>>>> [mailto:cpignata@cisco.com]
>>>>>>>>>>>>> Envoy=E9 : mercredi 18 novembre 2015 11:52
>>>>>>>>>>>>> =C0 : Joel Halpern
>>>>>>>>>>>>> Cc : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq);
>>>>>>>> draft-ietf-sfc-
>>>>>>>>>>>>> control-plane@tools.ietf.org; Joel M. Halpern; sfc issue
>>>>>> tracker;
>>>>>>>>>>>>> sfc@ietf.org
>>>>>>>>>>>>> Objet : Re: [sfc] #15 (control-plane): Whether the control
>>>>>> plane
>>>>>>>>>>> operates
>>>>>>>>>>>>> on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> I am a bit baffled to see this thread again =8B it appears
>>>> the
>>>>>>>>>>> discussion
>>>>>>>>>>>>> restarted to continue in circles.
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> Med,
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> I too agree with Joel and strongly believe there is no
>> need
>>>>>> for
>>>>>>>> SFC
>>>>>>>>>>>>> identification passed down =8B there is no provisioning of
>>>> SFCs
>>>>>>>>>>> southbound.
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> (Almost) every instance of =B3SFC=B2 in the control-plane
>>>>>>>> requirements
>>>>>>>>>>> draft
>>>>>>>>>>>>> should really say =B3SFP=B2. There is no use of talking about
>>>> SFCs
>>>>>>>>>>> towards
>>>>>>>>>>> the
>>>>>>>>>>>>> data plane. The relationship between chains and paths is a
>>>>>> policy
>>>>>>>>>>> matter
>>>>>>>>>>>>> which belongs in the policy/control itself, but not out of
>>>>>> there.
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> This is no different than what I said a few months ago on
>>>> the
>>>>>>>> same
>>>>>>>>>>> topic.
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> Thanks,
>>>>>>>>>>>>>=20
>>>>>>>>>>>>> =8B Carlos.
>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> On Nov 17, 2015, at 9:06 AM, Joel Halpern
>>>>>>>>>>> <joel.halpern@ericsson.com>
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> What is provisioned into the SFF reflects the SFP.  The
>>>>>> control
>>>>>>>>>>> system
>>>>>>>>>>>>> decides whether that SFP indicates the same set of all
>>>>>> possible
>>>>>>>>>>> choices
>>>>>>>>>>>>> that the SFC does, or is a proper subset.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> In order to allow for an SFP that reflects meaningful
>>>>>>>> constraints,
>>>>>>>>>>> what
>>>>>>>>>>>>> is provisioned has to be the SFP.
>>>>>>>>>>>>>> No special provision is needed for the case where the SFP
>>>> is
>>>>>>>>>>> isomorphic
>>>>>>>>>>>>> to the SFC. In such a case, you still provision the SFP.
>>>> And
>>>>>> the
>>>>>>>>>>> result
>>>>>>>>>>>>> is an SFP with as much flexibility as the SFC.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> If, in contrast, you declare that the provisioning
>>>> includes
>>>>>> the
>>>>>>>> SFC
>>>>>>>>>>> then
>>>>>>>>>>>>> you are introducing extra complexity without adding any
>> new
>>>>>> cases
>>>>>>>>>>> that
>>>>>>>>>>> can
>>>>>>>>>>>>> be handled.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>>> Joel
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>>>>> Sent: Tuesday, November 17, 2015 9:03 AM
>>>>>>>>>>>>>> To: Joel Halpern; Paul Quinn (paulq)
>>>>>>>>>>>>>> Cc: sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>> plane@tools.ietf.org;
>>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the
>>>> control
>>>>>>>> plane
>>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> Hi Joel,
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> Please see inline.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>> Med
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>>>>> De : Joel Halpern [mailto:joel.halpern@ericsson.com]
>>>>>>>>>>>>>>> Envoy=E9 : mardi 17 novembre 2015 14:49
>>>>>>>>>>>>>>> =C0 : BOUCADAIR Mohamed IMT/OLN; Paul Quinn (paulq) Cc :
>>>> sfc
>>>>>>>> issue
>>>>>>>>>>>>>>> tracker; draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>>>>> Objet : RE: [sfc] #15 (control-plane): Whether the
>>>> control
>>>>>>>> plane
>>>>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> Your statement that " It happens that information is no
>>>> more
>>>>>>>> than
>>>>>>>>>>> the
>>>>>>>>>>>>>>> service chain itself (without any constraints)." (Where
>>>> "it"
>>>>>>>>>>> refers
>>>>>>>>>>> to
>>>>>>>>>>>>> "
>>>>>>>>>>>>>>> the exact sequence of steps to be used to realize the
>>>> SFC".)
>>>>>>>> Does
>>>>>>>>>>> not
>>>>>>>>>>>>>>> make sense to me.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> [Med] RFC 7665 says:
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> "   Thus, the policies and logic of SFP selection or
>>>> creation
>>>>>>>>>>> (depending
>>>>>>>>>>>>>> upon the solution) produce what may be thought of as a
>>>>>>>> constrained
>>>>>>>>>>>>>> version of the original SFC. "
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> in short: SFP is defined as a constrained version of the
>>>>>>>> original
>>>>>>>>>>> SFC.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> What is the name to use to refer to a "non-constrained"
>>>> SFC
>>>>>> or
>>>>>>>> to
>>>>>>>>>>> the
>>>>>>>>>>>>> information that you will provision to an SFF when the
>> path
>>>>>>>>>>> computation
>>>>>>>>>>>>> and selection decision is "deferred to the SFF"?
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> It does not make sense to call a non-constrained version
>>>> of
>>>>>> the
>>>>>>>> SFC
>>>>>>>>>>> as
>>>>>>>>>>>>> SFP given that RFC7665 explicitly defines SFP as
>>>> "constrained
>>>>>>>>>>> version
>>>>>>>>>>> of
>>>>>>>>>>>>> the original SFC"!
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> The SFC is the general description of the objective.
>> That
>>>>>>>>>>>>>>> is not the same as the exact sequence of places that
>> must
>>>> be
>>>>>>>>>>> visited.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> I stand by my earlier comments that almost all uses of
>>>> SFC
>>>>>> in
>>>>>>>> the
>>>>>>>>>>>>>>> control requirements draft should be SFP.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> [Med] I noted that Joel.. that's fair but this position
>> is
>>>>>> IMHO
>>>>>>>> not
>>>>>>>>>>>>> aligned with RFC7665 that allows to control any variation
>>>>>> from a
>>>>>>>>>>> non-
>>>>>>>>>>>>> constrained SFC to a fully constrained SFC.
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>>>> Joel
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>>>>>> From: mohamed.boucadair@orange.com
>>>>>>>>>>>>>>> [mailto:mohamed.boucadair@orange.com]
>>>>>>>>>>>>>>> Sent: Tuesday, November 17, 2015 8:34 AM
>>>>>>>>>>>>>>> To: Paul Quinn (paulq)
>>>>>>>>>>>>>>> Cc: sfc issue tracker;
>>>>>>>>>>> draft-ietf-sfc-control-plane@tools.ietf.org;
>>>>>>>>>>>>>>> sfc@ietf.org; Joel M. Halpern
>>>>>>>>>>>>>>> Subject: RE: [sfc] #15 (control-plane): Whether the
>>>> control
>>>>>>>> plane
>>>>>>>>>>>>>>> operates on SFC IDs, SFP IDs, etc.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> Hi Paul,
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> Thank you for sharing your feedback.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> RFC7665 says the following:
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> "
>>>>>>>>>>>>>>> This architecture does not mandate the degree of
>>>>>>>>>>>>>>> specificity of the SFP.  Architecturally, within the
>>>> same
>>>>>> SFC-
>>>>>>>>>>> enabled
>>>>>>>>>>>>>>> domain, some SFPs may be fully specified, selecting
>>>> exactly
>>>>>>>> which
>>>>>>>>>>> SFF
>>>>>>>>>>>>>>> and which SF are to be visited by packets using that
>>>> SFP,
>>>>>>>> while
>>>>>>>>>>> other
>>>>>>>>>>>>>>> SFPs may be quite vague, deferring to the SFF the
>>>> decisions
>>>>>>>> about
>>>>>>>>>>> the
>>>>>>>>>>>>>>> exact sequence of steps to be used to realize the SFC.
>>>> The
>>>>>>>>>>>>>>> specificity may be anywhere in between these extremes.
>>>>>>>>>>>>>>> "
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> The control draft is completely aligned with that
>>>> approach.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> The control-plane document allows in particular to
>>>> provision
>>>>>>>>>>> required
>>>>>>>>>>>>>>> information when "deferring to the SFF the decisions
>>>> about
>>>>>> the
>>>>>>>>>>>>>>> exact sequence of steps to be used to realize the SFC".
>>>> It
>>>>>>>>>>> happens
>>>>>>>>>>>>>>> that information is no more than the service chain
>> itself
>>>>>>>> (without
>>>>>>>>>>> any
>>>>>>>>>>>>>>> constraints).
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> Also, the current control-plane document allows to
>>>> instruct
>>>>>> a
>>>>>>>>>>> loose
>>>>>>>>>>>>>>> path
>>>>>>>>>>>>>>> (SFP) or a strict path (RSP), etc.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> I fully agree that whether a full path is specified
>>>> within
>>>> a
>>>>>>>>>>> domain
>>>>>>>>>>> or
>>>>>>>>>>>>>>> if it is deferred to SFFs is really deployment-specific.
>>>>>>>>>>> Nevertheless,
>>>>>>>>>>>>>>> the control plan should accommodate all these flavors.
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>> Med
>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>>>>>>>> De : Paul Quinn (paulq) [mailto:paulq@cisco.com] Envoy=E9
>>>> :
>>>>>>>>>>> vendredi
>>>>>>>>>>>>>>>> 16 octobre 2015 14:04 =C0 : Joel M. Halpern Cc :
>> BOUCADAIR
>>>>>>>> Mohamed
>>>>>>>>>>>>>>>> IMT/OLN; sfc issue tracker; draft-ietf-sfc-control-
>>>>>>>>>>>>>>>> plane@tools.ietf.org; sfc@ietf.org Objet : Re: [sfc]
>> #15
>>>>>>>>>>>>>>>> (control-plane): Whether the control plane operates on
>>>> SFC
>>>>>>>> IDs,
>>>>>>>>>>> SFP
>>>>>>>>>>>>> IDs, etc.
>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>> Joel,
>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>> I concur.
>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>> The data plane deal with paths, not chains.  The
>>>>>> relationship
>>>>>>>> of
>>>>>>>>>>>>>>>> paths to chains falls squarely in the control plane (or
>>>>>> even
>>>>>>>> more
>>>>>>>>>>>>>>>> likely
>>>>>>>>>>>>>>> "policy"
>>>>>>>>>>>>>>>> plane) realm.  The specificity of the path is left to
>>>>>>>>>>>>>>>> implementation, in the architecture draft, but that's
>>>>>>>> consistent
>>>>>>>>>>>>>>>> with your position and provides the requisite
>>>>>> functionality.
>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>> Paul
>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>> On Sep 17, 2015, at 11:36 AM, Joel M. Halpern
>>>>>>>>>>>>>>>>> <jmh@joelhalpern.com>
>>>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>> As far as I can tell, there is nothing in the Service
>>>>>>>> Chaining
>>>>>>>>>>>>>>>>> work that
>>>>>>>>>>>>>>>> requires correlating service path IDs with service
>> chain
>>>>>> IDs
>>>>>>>>>>> within
>>>>>>>>>>>>>>>> the data plane.  Any such relationship exists entirely
>>>>>> within
>>>>>>>> the
>>>>>>>>>>>>>>>> control plane or above, and would be driven by
>>>> requirements
>>>>>>>> other
>>>>>>>>>>>>>>>> than the data plane.  When I look at this document, all
>>>> of
>>>>>> the
>>>>>>>>>>>>>>>> requirements that talk about service function chain IDs
>>>> can
>>>>>> be
>>>>>>>>>>>>>>>> accurately captured, in terms of data plane
>>>> requirements,
>>>>>> by
>>>>>>>>>>> service
>>>>>>>>>>>>> function path IDs.
>>>>>>>>>>>>>>>> Thus, the requirement that the data plane has is to see
>>>>>> such
>>>>>>>> path
>>>>>>>>>>> IDs.
>>>>>>>>>>>>>>>> Yes, in some deployments those will be 1-1 with chain
>>>> IDs.
>>>>>>>> They
>>>>>>>>>>> are
>>>>>>>>>>>>>>> still path IDs.
>>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>> Introducing a requirement for the data plane to see
>> and
>>>>>> work
>>>>>>>>>>> with
>>>>>>>>>>>>>>>>> chain
>>>>>>>>>>>>>>>> IDs is not grounded in the work of the group.
>>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>> Yours,
>>>>>>>>>>>>>>>>> Joel M. Halpern
>>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>> On 9/17/15 7:53 AM, mohamed.boucadair@orange.com
>> wrote:
>>>>>>>>>>>>>>>>>> Re-,
>>>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>>> The control draft as it stands is compliant with the
>>>> data
>>>>>>>> plane
>>>>>>>>>>>>>>>> architecture document.
>>>>>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>>>>>> Indeed, the arch draft acknowledges the following:
>>>>>>>>>>>>>>>>>> (1) SFPs are "associated with a given SFC".
>>>>>>>>>>>>>>>>>> (2) SFPs are presented as a form of constrained SFCs.
>>>>>>>>>>>>>>>>>> (3) Some deployments may not impose any constraint on
>>>> the
>>>>>>>>>>>>>>>>>> abstract
>>>>>>>>>>>>>>> SFC
>>>>>>>>>>>>>>=20
>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>> sfc mailing list
>>>>>>>>>>>>>> sfc@ietf.org
>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>=20
>>>>>>>>> _______________________________________________
>>>>>>>>> sfc mailing list
>>>>>>>>> sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Nov 25 13:07:26 2015
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17B4D1B3032 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 13:07:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.085
X-Spam-Level: 
X-Spam-Status: No, score=-15.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mhpsLta5yTb8 for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 13:07:21 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 552461B302C for <sfc@ietf.org>; Wed, 25 Nov 2015 13:07:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=32499; q=dns/txt; s=iport; t=1448485641; x=1449695241; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=3h/G4/e9WxXG2OHxdfLCrn+VwCuf5EdjZj4DdNIDvX4=; b=QnyTSc45uQRVmI2p4lOXPTjRmIDkSZmA6uJ5rjHmSvXPQYZKpf6GL0/9 NKbprtrDfUffQ+n81DmLgpeI4gGUchTrkkODXunhFNf9hIxHAix7Vhgxc 8Bacts9Y3iKTJdkz6g0VUem/mma0DFf3fIzJnVOSrcxG0A+dn3AfDEVg2 E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D7AQAWIlZW/5RdJa1egm5NU2APBr48A?= =?us-ascii?q?Q2BZhcBCYI+gzACgUU4FAEBAQEBAQGBCoQ0AQEBBAEBAQtXCQsQAgEIEQQBASE?= =?us-ascii?q?BBgchBgsUCQgCBA4FiBkDEg25aQ2EYwEBAQEBAQEBAQEBAQEBAQEBAQEBARQEh?= =?us-ascii?q?lSCEIJuglOBVxEBTAmDE4EVBYgjikyDaAGFJ4YXgXaVCIdVAR8BAUKEBHIBAYN?= =?us-ascii?q?pOoEHAQEB?=
X-IronPort-AV: E=Sophos;i="5.20,344,1444694400";  d="scan'208,217";a="212339626"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Nov 2015 21:07:20 +0000
Received: from XCH-ALN-017.cisco.com (xch-aln-017.cisco.com [173.36.7.27]) by rcdn-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id tAPL7KMw024280 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 25 Nov 2015 21:07:20 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-017.cisco.com (173.36.7.27) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 25 Nov 2015 15:07:18 -0600
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.000; Wed, 25 Nov 2015 15:07:19 -0600
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] NSH context headers: fixed/tlv
Thread-Index: AQHRIy5ejy7hwshPJkSenz9F/5cNK56klIsAgADIkYCAADCGgIAEnguAgANq9ACAAAh0gIAAB0+AgAACXIA=
Date: Wed, 25 Nov 2015 21:07:19 +0000
Message-ID: <D9046AE1-A36E-49E0-B312-9659613B8469@cisco.com>
References: <D273AF56.849AA%andrew.dolganow@alcatel-lucent.com> <B8F9A780D330094D99AF023C5877DABA848C056D@nkgeml501-mbs.china.huawei.com> <36EF1E54-A0D8-46CE-AF4F-EEDE873123E3@cisco.com> <94DA9C7F532AD946852C9C5527195239254ABE3A@G1W3656.americas.hpqcorp.net> <CAA=duU0UvERU3-YE2EFT-kOExHWgLesSERRAkox0Ji1V28nNdQ@mail.gmail.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D6E02B0@MBX021-W3-CA-2.exch021.domain.local> <CAA=duU0TJ6J73zWsqJRT2ChEe0Q75g2Ecy36dwLMXSBWWpWo-A@mail.gmail.com> <0C166DA2-A718-48F8-B9A9-00BB241D6129@cisco.com>
In-Reply-To: <0C166DA2-A718-48F8-B9A9-00BB241D6129@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.230]
Content-Type: multipart/alternative; boundary="_000_D9046AE1A36E49E0B3129659613B8469ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cGXPSf9gCP_WVtkMRK2U7bCYtIY>
Cc: "sfc@ietf.org" <sfc@ietf.org>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "Dolganow, Andrew \(Andrew\)" <andrew.dolganow@alcatel-lucent.com>, "Andrew G. Malis" <agmalis@gmail.com>, Linda Dunbar <linda.dunbar@huawei.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>, Qin Wu <bill.wu@huawei.com>
Subject: Re: [sfc] NSH context headers: fixed/tlv
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 21:07:25 -0000

--_000_D9046AE1A36E49E0B3129659613B8469ciscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

My apologies, I'm behind on this thread...


On Nov 25, 2015, at 3:58 PM, Carlos Pignataro (cpignata) <cpignata@cisco.co=
m<mailto:cpignata@cisco.com>> wrote:

Hi, Ron, Andy,

MD Type 1 is not "unstructured" metadata. MD Type 1 has a pre-defined struc=
ture and model. It does not use TLVs however, it is not self-describing but=
 its structure is pre-allocated (DC and mobility examples) and contextually=
 revealed.

Hi, Ron,

The benefit of an MD Type 1 is friendliness to hardware processing. Making =
it of variable length defeats that goal and would make it in my opinion of =
only very incremental value.

I would add: the value of the fixed, simple size goes beyond hardware: soft=
ware implementation derive significant benefit as well by not having to par=
se a set of TLVs.  I'm not saying they can't do it, rather that the simplic=
ity and "cost" savings should not be ignored.




Hi, Andy,

What would be the goal of making MD Type 2 "a true superset of MD Type 1" w=
hen it is really not a superset. [I can imagine (perhaps) that such Type va=
lue might potentially be used in interworking scenarios, but I'd suggest no=
t to go there and turn SFC into a routed layer network, and cross that brid=
ge if we ever get there.]

I do not see a use case for that four-32-bit-word (not four-octet) opaque T=
ype.

I do agree with the editorial bug you found.

But I object with an allocation of a "32-bit (or 128-bit) unstructured data=
" Type.

And in any case, might be useful to discuss this within the context of http=
s://tools.ietf.org/html/draft-quinn-sfc-nsh-tlv-00

Thanks!

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

On Nov 25, 2015, at 15:33, Andrew G. Malis <agmalis@gmail.com<mailto:agmali=
s@gmail.com>> wrote:

Ron,

While discussing the distinctions between Types 1 and 2, another thing that=
=92s currently unsaid in the current text, but probably should be, is that =
one of the TLV Types should be for the Type 1 four-octet unstructured metad=
ata, making Type 2 a true superset of Type 1.

There=92s also a bug with section 14.2.3. The text should be corrected as f=
ollows:

OLD:


14.2.3<https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3>.  =
TLV Class Registry


   IANA is requested to set up a registry of "TLV Types".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226<https://tools.ietf.org/html/rfc5226> [RFC5226=
<https://tools.ietf.org/html/rfc5226>].


NEW:


14.2.3<https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2.3>.  =
TLV Class Registry


   IANA is requested to set up a registry of "TLV Classes".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226<https://tools.ietf.org/html/rfc5226> [RFC5226=
<https://tools.ietf.org/html/rfc5226>].



I would then also recommend adding:

TLV Class 0x0001 is allocated to =93IETF=94.

For TLV Class x0001, there will be a new TLV Type registry. These are 7-bit=
 values. Registry entries are assigned by using the "IETF Review=94 policy =
defined in RFC 5226 [RFC5226].

For TLV Class x0001, TLV Type x01 is allocated to =9332-bit unstructured me=
tadata=94.

Cheers,
Andy


On Wed, Nov 25, 2015 at 3:02 PM, Ron Parker <Ron_Parker@affirmednetworks.co=
m<mailto:Ron_Parker@affirmednetworks.com>> wrote:
There are 2 distinctions between types 1 and 2.

Type 1:

=95        Fixed length metadata

=95        Unstructured metadata

Type 2:

=95        Variable length metadata

=95        Structured metadata

Wouldn=92t type 1 be more flexible if it supported a variable length of uns=
tructured metadata?   Perhaps in 4 byte increments?   Then the distinction =
would be only whether or not the metadata was structured and perhaps a reas=
onable justification for the continued existence of both is that the byte l=
ength to encode the additional structure in type 2 is greater and perhaps l=
ess efficient to parse and that certain deployment scenarios would benefit =
from the simplicity of type 1.

   Ron


From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Andrew G. Malis
Sent: Monday, November 23, 2015 10:51 AM
To: Bottorff, Paul <paul.bottorff@hpe.com<mailto:paul.bottorff@hpe.com>>
Cc: sfc@ietf.org<mailto:sfc@ietf.org>; Dolganow, Andrew (Andrew) <andrew.do=
lganow@alcatel-lucent.com<mailto:andrew.dolganow@alcatel-lucent.com>>; Lind=
a Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>; Paul Qu=
inn (paulq) <paulq@cisco.com<mailto:paulq@cisco.com>>; uri.elzur@intel.com<=
mailto:uri.elzur@intel.com>; Qin Wu <bill.wu@huawei.com<mailto:bill.wu@huaw=
ei.com>>

Subject: Re: [sfc] NSH context headers: fixed/tlv


I agree with Paul B. that interoperability is best served by using a header=
 that accommodates the greatest number of possible applications and use cas=
es as the common denominator. This argues for type 2 being the MUST to impl=
ement, with type 1 being an optional optimization for some particular use c=
ases or applications that require at most a particular number context heade=
rs.

In a separate email, Med asked a very reasonable question - for type 1, why=
 are there four mandatory context headers, rather than 2, 3, 5, 10, etc.? T=
he draft contains no particular justification for this choice.

It=92s true that there are two particular use cases, draft-guichard-sfc-nsh=
-dc-allocation and draft-napper-sfc-nsh-mobility-allocation, that look to m=
ake good use of exactly 4 context headers. However, these are just two part=
icular examples, and not yet accepted by the WG.  Further development of th=
ese drafts, or even implementation, may show that four are insufficient.

Cheers,
Andy


On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul <paul.bottorff@hpe.com<mai=
lto:paul.bottorff@hpe.com>> wrote:
I think we all could agree that fixed headers are easier to implement than =
TLVs, however that does not rationalize mandating a fixed header implementa=
tion. It would rationalize supporting only fixed length headers, however we=
 have been unable to do this. Options always weaken standards agreement.

If the application requires TLVs, then it does not provide any standards ad=
vantage to mandate support for fixed headers. It will not be possible for a=
n application that requires TLVs to fall back to fixed length headers. If t=
hey could, then we should eliminate the TLV option from NSH.

IMHO we should be looking at the abstract semantics for meta-data before we=
 consider how to encode it. Once we decide what needs to be encoded then we=
 can consider the best encodings and what should be mandatory or optional.

Cheers,

Paul
From: sfc [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>] On Beh=
alf Of Paul Quinn (paulq)
Sent: Friday, November 20, 2015 6:27 AM
To: Qin Wu
Cc: uri.elzur@intel.com<mailto:uri.elzur@intel.com>; Dolganow, Andrew (Andr=
ew); sfc@ietf.org<mailto:sfc@ietf.org>; Linda Dunbar
Subject: Re: [sfc] NSH context headers: fixed/tlv


On Nov 19, 2015, at 9:28 PM, Qin Wu <bill.wu@huawei.com<mailto:bill.wu@huaw=
ei.com>> wrote:

Hi, Andrew and Paul:
It looks I missed a lot of discussion regarding NSH context header in the p=
ast, thanks Paul to point me the archive.
Generally speaking, there is tradeoff between performance and flexibility.


Absolutely, and that's the reason for offering the two options: balance spe=
ed/simplicity and flexibility.

The philosophy is to mandate the simplest form of metadata, enabling a broa=
d implementation base.  If/when more flexibility is needed a more flexible =
NSH type is available, along with the associated tradeoffs.  That's the bal=
ance that we decided to strike and it seems to be reasonable and well accep=
ted.

Thanks,
Paul


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_D9046AE1A36E49E0B3129659613B8469ciscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <150BD7E769BAD84F8F0593B2A2CA8D66@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;" class=3D"">
<div class=3D"">My apologies, I'm behind on this thread...</div>
<div class=3D""><br class=3D"">
</div>
<br class=3D"">
<div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Nov 25, 2015, at 3:58 PM, Carlos Pignataro (cpignata) &l=
t;<a href=3D"mailto:cpignata@cisco.com" class=3D"">cpignata@cisco.com</a>&g=
t; wrote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div dir=3D"auto" class=3D"">
<div class=3D"">Hi, Ron, Andy,</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">
<div class=3D"">MD Type 1 is not &quot;unstructured&quot; metadata. MD Type=
 1 has a pre-defined structure and model. It does not use TLVs however, it =
is not self-describing but its structure is pre-allocated (DC and mobility =
examples) and contextually revealed.&nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Hi, Ron,</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">The benefit of an MD Type 1 is friendliness to hardware pro=
cessing. Making it of variable length defeats that goal and would make it i=
n my opinion of only very incremental value.&nbsp;</div>
</div>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<div>I would add: the value of the fixed, simple size goes beyond hardware:=
 software implementation derive significant benefit as well by not having t=
o parse a set of TLVs. &nbsp;I'm not saying they can't do it, rather that t=
he simplicity and &quot;cost&quot; savings should
 not be ignored.</div>
<div><br class=3D"">
</div>
<div><br class=3D"">
</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div dir=3D"auto" class=3D"">
<div class=3D"">
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Hi, Andy,</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">What would be the goal of making MD Type 2 &quot;a true sup=
erset of MD Type 1&quot; when it is really not a superset. [I can imagine (=
perhaps) that such Type value might potentially be used in interworking sce=
narios, but I'd suggest not to go there and
 turn SFC into a routed layer network, and cross that bridge if we ever get=
 there.]</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I do not see a use case for that four-32-bit-word (not four=
-octet) opaque Type.&nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I do agree with the editorial bug you found.&nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">But I object with an allocation of a &quot;32-bit (or 128-b=
it) unstructured data&quot; Type.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">And in any case, might be useful to discuss this within the=
 context of&nbsp;<a href=3D"https://tools.ietf.org/html/draft-quinn-sfc-nsh=
-tlv-00" class=3D"">https://tools.ietf.org/html/draft-quinn-sfc-nsh-tlv-00<=
/a></div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Thanks!<br class=3D"">
<br class=3D"">
<div class=3D""><span class=3D"Apple-style-span" style=3D"-webkit-tap-highl=
ight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgb=
a(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, =
180, 0.230469); ">Thumb typed by Carlos
 Pignataro.</span>
<div class=3D""><span class=3D"Apple-style-span" style=3D"-webkit-tap-highl=
ight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgb=
a(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, =
180, 0.230469); ">Excuze typofraphicak
 errows</span></div>
</div>
</div>
<div class=3D""><br class=3D"">
On Nov 25, 2015, at 15:33, Andrew G. Malis &lt;<a href=3D"mailto:agmalis@gm=
ail.com" class=3D"">agmalis@gmail.com</a>&gt; wrote:<br class=3D"">
<br class=3D"">
</div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div dir=3D"ltr" class=3D"">Ron,
<div class=3D""><br class=3D"">
</div>
<div class=3D"">While discussing the distinctions between Types 1 and 2, an=
other thing that=92s currently unsaid in the current text, but probably sho=
uld be, is that one of the TLV Types should be for the Type 1 four-octet un=
structured metadata, making Type 2 a
 true superset of Type 1.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">There=92s also a bug with section 14.2.3. The text should b=
e corrected as follows:</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">OLD:&nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">
<pre class=3D"" style=3D"font-size: 13.3333px; margin-top: 0px; margin-bott=
om: 0px; line-height: normal;"><span class=3D"h4" style=3D"line-height:0pt;=
display:inline;font-size:1em;font-weight:bold"><h4 style=3D"line-height:0pt=
;display:inline;font-size:1em" class=3D""><a class=3D"" name=3D"section-14.=
2.3" href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2=
.3" style=3D"text-decoration: none;">14.2.3</a>.  TLV Class Registry</h4></=
span>

   IANA is requested to set up a registry of &quot;TLV Types&quot;.  These =
are 16-
   bit values.  Registry entries are assigned by using the &quot;IETF Revie=
w&quot;
   policy defined in <a href=3D"https://tools.ietf.org/html/rfc5226" class=
=3D"">RFC 5226</a> [<a href=3D"https://tools.ietf.org/html/rfc5226" title=
=3D"&quot;Guidelines for Writing an IANA Considerations Section in RFCs&quo=
t;" class=3D"">RFC5226</a>].
</pre>
</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">NEW:</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">
<pre class=3D"" style=3D"font-size: 13.3333px; margin-top: 0px; margin-bott=
om: 0px; line-height: normal;"><span class=3D"h4" style=3D"line-height:0pt;=
display:inline;font-size:1em;font-weight:bold"><h4 style=3D"line-height:0pt=
;display:inline;font-size:1em" class=3D""><a class=3D"" name=3D"section-14.=
2.3" href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-01#section-14.2=
.3" style=3D"text-decoration: none;">14.2.3</a>.  TLV Class Registry</h4></=
span>

   IANA is requested to set up a registry of &quot;TLV Classes&quot;.  Thes=
e are 16-
   bit values.  Registry entries are assigned by using the &quot;IETF Revie=
w&quot;
   policy defined in <a href=3D"https://tools.ietf.org/html/rfc5226" class=
=3D"">RFC 5226</a> [<a href=3D"https://tools.ietf.org/html/rfc5226" title=
=3D"&quot;Guidelines for Writing an IANA Considerations Section in RFCs&quo=
t;" class=3D"">RFC5226</a>].
</pre>
</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I would then also recommend adding:</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">TLV Class 0x0001 is allocated to =93IETF=94.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">For TLV Class x0001, there will be a new TLV Type registry.=
 These are 7-bit values. Registry entries are assigned by using the &quot;I=
ETF Review=94 policy defined in RFC 5226 [RFC5226].</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">For TLV Class x0001, TLV Type x01 is allocated to =9332-bit=
 unstructured metadata=94.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Cheers,</div>
<div class=3D"">Andy</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">On Wed, Nov 25, 2015 at 3:02 PM, Ron Parker <spa=
n dir=3D"ltr" class=3D"">
&lt;<a href=3D"mailto:Ron_Parker@affirmednetworks.com" target=3D"_blank" cl=
ass=3D"">Ron_Parker@affirmednetworks.com</a>&gt;</span> wrote:<br class=3D"=
">
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;p=
adding-left:1ex">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" class=3D"">
<div class=3D"">
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D"">There are 2 distinctions between =
types 1 and 2.<u class=3D""></u><u class=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D""><u class=3D""></u>&nbsp;<u class=
=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D"">Type 1:<u class=3D""></u><u class=
=3D""></u></span></p>
<p class=3D""><u class=3D""></u><span style=3D"font-size:11pt;font-family:S=
ymbol;color:rgb(31,73,125)" class=3D""><span class=3D"">=B7<span style=3D"f=
ont-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-=
height:normal;font-family:'Times New Roman'" class=3D"">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u class=3D""></u><span style=3D"font-size:11pt;font-f=
amily:Calibri,sans-serif;color:rgb(31,73,125)" class=3D"">Fixed length meta=
data<u class=3D""></u><u class=3D""></u></span></p>
<p class=3D""><u class=3D""></u><span style=3D"font-size:11pt;font-family:S=
ymbol;color:rgb(31,73,125)" class=3D""><span class=3D"">=B7<span style=3D"f=
ont-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-=
height:normal;font-family:'Times New Roman'" class=3D"">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u class=3D""></u><span style=3D"font-size:11pt;font-f=
amily:Calibri,sans-serif;color:rgb(31,73,125)" class=3D"">Unstructured meta=
data<u class=3D""></u><u class=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D""><u class=3D""></u>&nbsp;<u class=
=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D"">Type 2:<u class=3D""></u><u class=
=3D""></u></span></p>
<p class=3D""><u class=3D""></u><span style=3D"font-size:11pt;font-family:S=
ymbol;color:rgb(31,73,125)" class=3D""><span class=3D"">=B7<span style=3D"f=
ont-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-=
height:normal;font-family:'Times New Roman'" class=3D"">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u class=3D""></u><span style=3D"font-size:11pt;font-f=
amily:Calibri,sans-serif;color:rgb(31,73,125)" class=3D"">Variable length m=
etadata<u class=3D""></u><u class=3D""></u></span></p>
<p class=3D""><u class=3D""></u><span style=3D"font-size:11pt;font-family:S=
ymbol;color:rgb(31,73,125)" class=3D""><span class=3D"">=B7<span style=3D"f=
ont-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-=
height:normal;font-family:'Times New Roman'" class=3D"">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><u class=3D""></u><span style=3D"font-size:11pt;font-f=
amily:Calibri,sans-serif;color:rgb(31,73,125)" class=3D"">Structured metada=
ta<u class=3D""></u><u class=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D""><u class=3D""></u>&nbsp;<u class=
=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D"">Wouldn=92t type 1 be more flexibl=
e if it supported a variable length of unstructured metadata?&nbsp;&nbsp; P=
erhaps in 4 byte increments?&nbsp;&nbsp; Then the distinction
 would be only whether or not the metadata was structured and perhaps a rea=
sonable justification for the continued existence of both is that the byte =
length to encode the additional structure in type 2 is greater and perhaps =
less efficient to parse and that
 certain deployment scenarios would benefit from the simplicity of type 1.<=
u class=3D""></u><u class=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D""><u class=3D""></u>&nbsp;<u class=
=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D"">&nbsp;&nbsp; Ron<u class=3D""></u=
><u class=3D""></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)" class=3D""><u class=3D""></u>&nbsp;<u class=
=3D""></u></span></p>
<p class=3D"MsoNormal"><a name=3D"151403d77cf973ba__MailEndCompose" class=
=3D""><span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rg=
b(31,73,125)" class=3D""><u class=3D""></u>&nbsp;<u class=3D""></u></span><=
/a></p>
<p class=3D"MsoNormal"><b class=3D""><span style=3D"font-size:11pt;font-fam=
ily:Calibri,sans-serif" class=3D"">From:</span></b><span style=3D"font-size=
:11pt;font-family:Calibri,sans-serif" class=3D""> sfc [mailto:<a href=3D"ma=
ilto:sfc-bounces@ietf.org" target=3D"_blank" class=3D"">sfc-bounces@ietf.or=
g</a>]
<b class=3D"">On Behalf Of </b>Andrew G. Malis<br class=3D"">
<b class=3D"">Sent:</b> Monday, November 23, 2015 10:51 AM<br class=3D"">
<b class=3D"">To:</b> Bottorff, Paul &lt;<a href=3D"mailto:paul.bottorff@hp=
e.com" target=3D"_blank" class=3D"">paul.bottorff@hpe.com</a>&gt;<br class=
=3D"">
<b class=3D"">Cc:</b> <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" cla=
ss=3D"">sfc@ietf.org</a>; Dolganow, Andrew (Andrew) &lt;<a href=3D"mailto:a=
ndrew.dolganow@alcatel-lucent.com" target=3D"_blank" class=3D"">andrew.dolg=
anow@alcatel-lucent.com</a>&gt;; Linda Dunbar &lt;<a href=3D"mailto:linda.d=
unbar@huawei.com" target=3D"_blank" class=3D"">linda.dunbar@huawei.com</a>&=
gt;;
 Paul Quinn (paulq) &lt;<a href=3D"mailto:paulq@cisco.com" target=3D"_blank=
" class=3D"">paulq@cisco.com</a>&gt;;
<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank" class=3D"">uri.elz=
ur@intel.com</a>; Qin Wu &lt;<a href=3D"mailto:bill.wu@huawei.com" target=
=3D"_blank" class=3D"">bill.wu@huawei.com</a>&gt;</span></p>
<div class=3D"">
<div class=3D"h5"><br class=3D"">
<b class=3D"">Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u class=
=3D""></u><u class=3D""></u></div>
</div>
<div class=3D""><br class=3D"webkit-block-placeholder">
</div>
<div class=3D"">
<div class=3D"h5">
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
<div class=3D"">
<p class=3D"MsoNormal">I agree with Paul B. that interoperability is best s=
erved by using a header that accommodates the greatest number of possible a=
pplications and use cases as the common denominator. This argues for type 2=
 being the MUST to implement, with
 type 1 being an optional optimization for some particular use cases or app=
lications that require at most a particular number context headers.<u class=
=3D""></u><u class=3D""></u></p>
<div class=3D"">
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">In a separate email, Med asked a very reasonable que=
stion - for type 1, why are there&nbsp;four mandatory context headers, rath=
er than 2, 3, 5, 10, etc.? The draft contains no particular justification f=
or this choice.<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">It=92s true that there are two particular use cases,=
&nbsp;draft-guichard-sfc-nsh-dc-allocation and&nbsp;draft-napper-sfc-nsh-mo=
bility-allocation, that look to make good use of exactly 4 context headers.=
 However, these are just two particular examples,
 and not yet accepted by the WG.&nbsp; Further development of these drafts,=
 or even implementation, may show that four are insufficient.<u class=3D"">=
</u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">Cheers,<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">Andy<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
</div>
</div>
<div class=3D"">
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
<div class=3D"">
<p class=3D"MsoNormal">On Fri, Nov 20, 2015 at 12:20 PM, Bottorff, Paul &lt=
;<a href=3D"mailto:paul.bottorff@hpe.com" target=3D"_blank" class=3D"">paul=
.bottorff@hpe.com</a>&gt; wrote:<u class=3D""></u><u class=3D""></u></p>
<blockquote style=3D"border-style:none none none solid;border-left-color:rg=
b(204,204,204);border-left-width:1pt;padding:0in 0in 0in 6pt;margin-left:4.=
8pt;margin-right:0in" class=3D"">
<div class=3D"">
<div class=3D"">
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">I th=
ink we all could agree that fixed headers are easier to implement than TLVs=
, however that does not rationalize mandating a fixed header implementation=
. It would rationalize supporting only
 fixed length headers, however we have been unable to do this. Options alwa=
ys weaken standards agreement.</span><u class=3D""></u><u class=3D""></u></=
p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">&nbs=
p;</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">If t=
he application requires TLVs, then it does not provide any standards advant=
age to mandate support for fixed headers. It will not be possible for an ap=
plication that requires TLVs to fall back
 to fixed length headers. If they could, then we should eliminate the TLV o=
ption from NSH.
</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">&nbs=
p;</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">IMHO=
 we should be looking at the abstract semantics for meta-data before we con=
sider how to encode it. Once we decide what needs to be encoded then we can=
 consider the best encodings and what
 should be mandatory or optional. </span><u class=3D""></u><u class=3D""></=
u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">&nbs=
p;</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">Chee=
rs,</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">&nbs=
p;</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)" class=3D"">Paul=
 </span><u class=3D""></u><u class=3D""></u></p>
<div class=3D"">
<div style=3D"border-style:solid none none;border-top-color:rgb(225,225,225=
);border-top-width:1pt;padding:3pt 0in 0in" class=3D"">
<p class=3D"MsoNormal"><b class=3D"">From:</b> sfc [mailto:<a href=3D"mailt=
o:sfc-bounces@ietf.org" target=3D"_blank" class=3D"">sfc-bounces@ietf.org</=
a>]
<b class=3D"">On Behalf Of </b>Paul Quinn (paulq)<br class=3D"">
<b class=3D"">Sent:</b> Friday, November 20, 2015 6:27 AM<br class=3D"">
<b class=3D"">To:</b> Qin Wu<br class=3D"">
<b class=3D"">Cc:</b> <a href=3D"mailto:uri.elzur@intel.com" target=3D"_bla=
nk" class=3D"">
uri.elzur@intel.com</a>; Dolganow, Andrew (Andrew); <a href=3D"mailto:sfc@i=
etf.org" target=3D"_blank" class=3D"">
sfc@ietf.org</a>; Linda Dunbar<br class=3D"">
<b class=3D"">Subject:</b> Re: [sfc] NSH context headers: fixed/tlv<u class=
=3D""></u><u class=3D""></u></p>
</div>
</div>
<div class=3D"">
<div class=3D"">
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
<div class=3D"">
<blockquote style=3D"margin-top:5pt;margin-bottom:5pt" class=3D"">
<div class=3D"">
<p class=3D"MsoNormal">On Nov 19, 2015, at 9:28 PM, Qin Wu &lt;<a href=3D"m=
ailto:bill.wu@huawei.com" target=3D"_blank" class=3D"">bill.wu@huawei.com</=
a>&gt; wrote:<u class=3D""></u><u class=3D""></u></p>
</div>
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
<div class=3D"">
<div class=3D"">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
" class=3D"">Hi, Andrew and Paul:</span><u class=3D""></u><u class=3D""></u=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
" class=3D"">It looks I missed a lot of discussion regarding NSH context he=
ader in the past, thanks Paul to point me the archive.</span><u class=3D"">=
</u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
" class=3D"">Generally speaking, there is tradeoff between performance and =
flexibility.</span><u class=3D""></u><u class=3D""></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:rgb(31,73,125)=
" class=3D"">&nbsp;</span><u class=3D""></u><u class=3D""></u></p>
<div class=3D"">
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
</div>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal">Absolutely, and that's the reason for offering the t=
wo options: balance speed/simplicity and flexibility.<u class=3D""></u><u c=
lass=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">The philosophy is to mandate the simplest form of me=
tadata, enabling a broad implementation base.&nbsp; If/when more flexibilit=
y is needed a more flexible NSH type is available, along with the associate=
d tradeoffs.&nbsp; That's the balance that we
 decided to strike and it seems to be reasonable and well accepted.<u class=
=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">Thanks,<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">Paul<u class=3D""></u><u class=3D""></u></p>
</div>
<div class=3D"">
<p class=3D"MsoNormal">&nbsp;<u class=3D""></u><u class=3D""></u></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br class=3D"">
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank" class=3D"">sfc@ietf.org</=
a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" cla=
ss=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><u class=3D""></u><u c=
lass=3D""></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u class=3D""></u>&nbsp;<u class=3D""></u></p>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<br class=3D"">
</div>
</div>
</div>
</blockquote>
<blockquote type=3D"cite" class=3D"">
<div class=3D""><span class=3D"">__________________________________________=
_____</span><br class=3D"">
<span class=3D"">sfc mailing list</span><br class=3D"">
<span class=3D""><a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a=
></span><br class=3D"">
<span class=3D""><a href=3D"https://www.ietf.org/mailman/listinfo/sfc" clas=
s=3D"">https://www.ietf.org/mailman/listinfo/sfc</a></span><br class=3D"">
</div>
</blockquote>
</div>
</div>
</div>
</blockquote>
</div>
<br class=3D"">
</body>
</html>

--_000_D9046AE1A36E49E0B3129659613B8469ciscocom_--


From nobody Wed Nov 25 22:49:33 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D0D5A1AD160; Wed, 25 Nov 2015 22:49:29 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151126064929.5744.67520.idtracker@ietfa.amsl.com>
Date: Wed, 25 Nov 2015 22:49:29 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1LpmyWMACZNcOvMqgjrtN1b6q7g>
Cc: sfc@ietf.org
Subject: [sfc] I-D Action: draft-ietf-sfc-control-plane-02.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 06:49:30 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Service Function Chaining Working Group of the IETF.

        Title           : Service Function Chaining (SFC) Control Plane Components & Requirements
        Authors         : Hongyu Li
                          Qin Wu
                          Yong(Oliver) Huang
                          Mohamed Boucadair
                          Christian Jacquenet
                          Walter Haeffner
                          Seungik Lee
                          Ron Parker
                          Linda Dunbar
                          Andrew Malis
                          Joel M. Halpern
                          Tirumaleswar Reddy
                          Prashanth Patil
	Filename        : draft-ietf-sfc-control-plane-02.txt
	Pages           : 27
	Date            : 2015-11-25

Abstract:
   This document describes requirements for conveying information
   between Service Function Chaining (SFC) control elements and SFC
   functional elements.  Also, this document identifies a set of control
   interfaces to interact with SFC-aware elements to establish, maintain
   or recover service function chains.  This document does not specify
   protocols nor extensions to existing protocols.

   This document exclusively focuses on SFC deployments that are under
   the responsibility of a single administrative entity.  Inter-domain
   considerations are out of scope.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-control-plane/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-control-plane-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Nov 25 23:26:11 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12A851B29FA for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 23:26:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MF5LkYz4V4Uz for <sfc@ietfa.amsl.com>; Wed, 25 Nov 2015 23:26:08 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7CE401B29FF for <sfc@ietf.org>; Wed, 25 Nov 2015 23:26:08 -0800 (PST)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id C5D464048E; Thu, 26 Nov 2015 08:26:06 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.32]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id 9C4011A0065; Thu, 26 Nov 2015 08:26:06 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0248.002; Thu, 26 Nov 2015 08:26:06 +0100
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern (jmh@joelhalpern.com)" <jmh@joelhalpern.com>
Thread-Topic: Subscriber & Host Identification Considerations (was RE: [sfc] Draft minutes for the SFC Meeting in Yokohama)
Thread-Index: AdEoG7MWnb8So7siSHO7JBbN6yOvSw==
Date: Thu, 26 Nov 2015 07:26:06 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA3139@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/mMrEm99J2an6Gq8-Gb3g5UGgDHI>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: [sfc] Subscriber & Host Identification Considerations (was RE: Draft minutes for the SFC Meeting in Yokohama)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 07:26:10 -0000

Hi Joel, all,

Some comments about this part of the minutes.=20
Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> Envoy=E9=A0: mercredi 25 novembre 2015 21:39
> =C0=A0: sfc@ietf.org
> Objet=A0: [sfc] Draft minutes for the SFC Meeting in Yokohama
>=20
> Below are the draft minutes for the Yokohama SFC meeting. Please send
> minor corrections to me directly, larger corrections should go to the
> list.
>=20
> >         - SFC: Subscriber & Host Identification Considerations (TBD) -
> [10 minutes]
> >                - https://datatracker.ietf.org/doc/draft-sarikaya-sfc-
> hostid-serviceheader/
>=20
> Presented by Behcet Sarikaya
>=20
> Joel: on IMEI or subscriber ID, both arch and security draft indicate
> we should obscure that.=20

[Med] draft-sarikaya-* inherits the security considerations from the arch R=
FC and CP draft. Furthermore, it includes a dedicated discussion about Priv=
acy considerations (https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-s=
erviceheader-00#section-7). BTW, the draft does not recommend what informat=
ion to enclose in the object as this is deployment-specific. =20

Also it is a large thing to pass around. In
> security we said indirect IDs should be used. Also, we do have a draft
> for a list of useful TLVs, which has a subscriber ID. As a personal
> point of view, I'd rather see one draft of TLVs. WG also has a draft
> with proposed TLV for MD Type=3D2, pls join.

[Med] I guess you were referring to draft-quinn-sfc-nsh-tlv. When writing d=
raft-sarikaya-* back in September, draft-quinn wasn't yet there. That's sai=
d, I'm OK with merging with draf-quinn. =20

>=20
> Behcet: open to merging. Problem with merging drafts is loss of
> rationale and use case.
>=20


From nobody Thu Nov 26 00:14:12 2015
Return-Path: <frank.xialiang@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A1661B367E for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 00:14:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.486
X-Spam-Level: 
X-Spam-Status: No, score=-4.486 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 40uSAlXnymck for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 00:14:08 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FBFE1B367C for <sfc@ietf.org>; Thu, 26 Nov 2015 00:14:08 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAV34896; Thu, 26 Nov 2015 08:14:06 +0000 (GMT)
Received: from SZXEMA412-HUB.china.huawei.com (10.82.72.71) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 26 Nov 2015 08:14:03 +0000
Received: from SZXEMA502-MBS.china.huawei.com ([169.254.4.87]) by SZXEMA412-HUB.china.huawei.com ([10.82.72.71]) with mapi id 14.03.0235.001; Thu, 26 Nov 2015 16:12:20 +0800
From: "Xialiang (Frank)" <frank.xialiang@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRKBuDtET1bUtm7ESfHAPvl6TSH56t72KA
Date: Thu, 26 Nov 2015 08:12:19 +0000
Message-ID: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.135.43.91]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.5656BF4E.00B9, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.4.87, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: b4f281d35ea95e383185aa30503e2f6e
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/wIdJyd1vP0nfc2_CLZvuTAQzGsE>
Subject: [sfc] =?utf-8?b?6L2s5Y+ROiBOZXcgVmVyc2lvbiBOb3RpZmljYXRpb24gZm9y?= =?utf-8?q?_draft-xia-sfc-yang-oam-04=2Etxt?=
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 08:14:10 -0000
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From nobody Thu Nov 26 02:00:27 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A3D71B3877 for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 02:00:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level: 
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0ey1Nsts95su for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 02:00:23 -0800 (PST)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B72A1B386D for <sfc@ietf.org>; Thu, 26 Nov 2015 02:00:23 -0800 (PST)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id ED94A4010B; Thu, 26 Nov 2015 11:00:21 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.18]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id C87FC120063; Thu, 26 Nov 2015 11:00:21 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0248.002; Thu, 26 Nov 2015 11:00:21 +0100
From: <mohamed.boucadair@orange.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Responses to NSH open tickets
Thread-Index: AQHRGKzzwNMRn7ESEEWTNnkkiNG1N56uJu5g
Date: Thu, 26 Nov 2015 10:00:21 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA321A@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <1E890AFD-822D-44F0-95E5-72F507FFE1F1@cisco.com>
In-Reply-To: <1E890AFD-822D-44F0-95E5-72F507FFE1F1@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/m4_wKHeVCnWZ0bNVUHKChA9WQKQ>
Subject: Re: [sfc] Responses to NSH open tickets
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 10:00:26 -0000

Hi Paul,

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Paul Quinn (paulq)
> Envoy=E9=A0: vendredi 6 novembre 2015 17:05
> =C0=A0: sfc@ietf.org
> Objet=A0: [sfc] Responses to NSH open tickets
>=20
> Hi,
>=20
> Below is my analysis and responses to the NSH tracking tickets and my
> suggested actions/next steps.
>=20
> Thanks
> Paul
>=20
> ------------
> Ticket #1: Add a new field to include the SFC Identifier
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/1
>=20
> Reply:
> The current NSH draft specifies a pathID, this has proven simple and
> viable to implement.  Implementation may (and do) utilize that pathID to
> represent an abstract or specific path.  If further specificty is desired=
,
> the NSH metadata may be used to carry other path information.  I do not
> plan to update the draft, given that there is no WG consensus for any
> changes.
>=20

[Med] It would be good to add a clarification to the document to be aligned=
 with the discussion we had for the control plane draft. Having this text i=
ncluded is really helpful to increase clarity:=20

"The SFP Identifier (SFP-id) is used as a lookup key to
      determine forwarding action regardless of whether the SFC is fully
      constrained, partially constrained, or not constrained at all.
      Additional information such as a flow identifier and/or other
      characteristics (e.g., the 5-tuple transport coordinates of the
      original packet) may be used for lookup purposes.  The set of
      information to use for lookup purposes may be instructed by the
      control plane."

>=20
> Ticket #2: Remove "MD Type" field and the companion "MD-type 1"
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/2
>=20
> Reply: Having the ability specify formats for NSH has proven very useful.
> This was raised on on list and there was no consensus for change, I
> recommend this item be marked as resolved in the tracker.
>=20
>=20

[Med] I'm following that discussion but I still don't get the answer about =
why mandating 4 context headers. Why not 2, 3, 5, 10, etc.? For me, this on=
e is not resolved.


> Ticket #3: Critical Metadata
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/3
>=20
> Reply:  it is unclear what suggested action is being requested.  If
> further clarification of critical metadata in required, text can be added
> to the draft, subject to WG review.
>=20

[Med] the issue is that a metadata cane be critical for a given chain but n=
ot for another one. It can be critical for a deployment but not for another=
 one it. Whether a metadata is critical or not should be left to the taste =
of the operators. My suggestion is to let that flag a configurable paramete=
r and have one single registry instead of two as currently defined.=20

>=20
> Ticket #4: Reuse the IPFIX registry for identifying context types
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/4
>=20
> Reply:  The 400+ IPFIX information elements were created for a protocol
> for IP Flow Information Export, and thus it would not be optimal to reuse
> as there are many unneeded things. Consensus seems to want to prioritize
> precision over blind reuse.  I do not plan to update the draft and sugges=
t
> that this item be marked as resolved in the tracker.
>=20

[Med] The advantage I see in reusing an existing registry is to avoid waiti=
ng for codepoint assignments for NEW metadata needed for a given service de=
ployment. My proposal is to define a dedicated field in the context header =
"Registry ID": =20

=3D=3D
      Registry ID:  In order to foster service innovation, this field
         allows to inherit from existing code point registries that are
         likely to be useful in a SFC context.  The following value is
         reserved by this specification:
         0:  None.
         1:  IPFIX [IPFIX].
=3D=3D

Some bits of the current TLV class can be grabbed for the Registry ID.=20

>=20
> Ticket #5: Support of SF Spirals
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/5
>=20
> Reply: This was answered on the list: http://www.ietf.org/mail-
> archive/web/sfc/current/msg03188.html and therefore no changes are needed=
.
> Given that, this item can be marked as resolved.
>=20

[Med] Adding some text to clarify spiral is supported would be helpful, IMO=
. This is much better than looking in an email thread.

> Ticket #6: Version Handling
> https://tools.ietf.org/wg/sfc/trac/ticket/6
>=20
> Reply: Discussed on list: http://www.ietf.org/mail-
> archive/web/sfc/current/msg03149.html.  There was no consensus to changed
> the adopted format, in fact the value of version bits seems well accepted
> and therefore no changes are needed and the topic should be marked as
> resolved in the tracker.
>=20

[Med] Wouldn't you plan to update the text to describe the behavior when se=
veral versions are supported by an SFC-aware node or when it receives a ver=
sion it does not support? I thought that was part of the points discussed i=
n that thread.

>=20
> Ticket #7: reserved bits
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/7
>=20
> Reply: This text seems like a helpful clarification.  Barring objection,
> it can be added to the draft.
>=20
>=20
[Med] OK, thanks.


> Ticket #8:
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/8
>=20
> Reply: NSH and the use case draft seem consistent.  However, it would be
> helpful for the use case drafts to reference the allocations drafts, and
> vice versa to provide a consistent view for readers.
>=20
>=20

[Med] One of the comments is to cite the SFC use cases already adopted by t=
he working group.

> Ticket #9: Remove Section 2.2
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/9
>=20
> Reply: The current version of the draft states:  "A short reference is
> included below, RFC 7498 [RFC7498], provides a
> more comprehensive review of the SFC Problem Statement."  That seems like
> a reasonable approach, and propose marking this item as resolved.
>=20
>=20

[Med] IMHO, a pointer to RFC7498 would be enough ; no need to reproduce her=
e what was already covered in section 2 of RFC7498.=20

> Ticket #10: O bit
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/10
>=20
> Reply: Reserving a bit for OAM is acceptable, and done in other protocol
> specifications.  OAM-specific drafts exist and will leverage the presence
> of the bit.   Further, over time new OAM uses may arise, having the
> explicit ability to support them day-0 is key. The O bit was agreed upon
> by the WG during adoption, and there is no consensus to remove it.  I
> propose that a reference be added to the OAM framework draft.
>=20

[Med] I do think it is odd to define a bit without specifying the associate=
d behavior. Giving a name to a flag does not mean associate a meaning with =
that flag. A flag name is not helpful for an implementer if the behavior as=
sociated with it is not present in the spec.=20

The following text is underspecified as it is not clear what is meant by "M=
UST examine the payload and take appropriate action".=20

=3D=3D=3D
   O bit: when set to 0x1 indicates that this packet is an operations
   and management (OAM) packet.  The receiving SFF and SFs nodes MUST
   examine the payload and take appropriate action (e.g. return status
   information).

   OAM message specifics and handling details are outside the scope of
   this document.
=3D=3D=3D=3D

Adding a reference to the OAM framework draft would be OK if the OAM refere=
nce is cited as a NORMATIVE one. I don't think this is what you have in min=
d when you said "a reference be added to the OAM framework draft".

> ---------------
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 26 07:27:51 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84CA11B3B37 for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 07:27:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O15nUG9jzNwu for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 07:27:48 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A2AB1B3B36 for <sfc@ietf.org>; Thu, 26 Nov 2015 07:27:48 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id F1DE0259F2E; Thu, 26 Nov 2015 07:27:47 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 96C14258CE6; Thu, 26 Nov 2015 07:27:47 -0800 (PST)
To: mohamed.boucadair@orange.com
References: <787AE7BB302AE849A7480A190F8B933008CA3139@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <565724E7.2000108@joelhalpern.com>
Date: Thu, 26 Nov 2015 10:27:35 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA3139@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/N-_1vBG3V0L2nnpmj9tjt9dnGBs>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] Subscriber & Host Identification Considerations (was RE: Draft minutes for the SFC Meeting in Yokohama)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 15:27:49 -0000

Thank you.  My concern about the IMSI / IMEI was to make sure that we 
kept to the agreement we had reached with the security folks on an 
indirect reference.  It sounds like you intended that, which means we 
are in agreement.

It seems to me  that it will be helpful to the WG to have a single 
document creating the initial metadata TLV type registry.

Yours,
Joel

On 11/26/15 2:26 AM, mohamed.boucadair@orange.com wrote:
> Hi Joel, all,
>
> Some comments about this part of the minutes.
> Please see inline.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>> Envoyé : mercredi 25 novembre 2015 21:39
>> À : sfc@ietf.org
>> Objet : [sfc] Draft minutes for the SFC Meeting in Yokohama
>>
>> Below are the draft minutes for the Yokohama SFC meeting. Please send
>> minor corrections to me directly, larger corrections should go to the
>> list.
>>
>>>          - SFC: Subscriber & Host Identification Considerations (TBD) -
>> [10 minutes]
>>>                 - https://datatracker.ietf.org/doc/draft-sarikaya-sfc-
>> hostid-serviceheader/
>>
>> Presented by Behcet Sarikaya
>>
>> Joel: on IMEI or subscriber ID, both arch and security draft indicate
>> we should obscure that.
>
> [Med] draft-sarikaya-* inherits the security considerations from the arch RFC and CP draft. Furthermore, it includes a dedicated discussion about Privacy considerations (https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-serviceheader-00#section-7). BTW, the draft does not recommend what information to enclose in the object as this is deployment-specific.
>
> Also it is a large thing to pass around. In
>> security we said indirect IDs should be used. Also, we do have a draft
>> for a list of useful TLVs, which has a subscriber ID. As a personal
>> point of view, I'd rather see one draft of TLVs. WG also has a draft
>> with proposed TLV for MD Type=2, pls join.
>
> [Med] I guess you were referring to draft-quinn-sfc-nsh-tlv. When writing draft-sarikaya-* back in September, draft-quinn wasn't yet there. That's said, I'm OK with merging with draf-quinn.
>
>>
>> Behcet: open to merging. Problem with merging drafts is loss of
>> rationale and use case.
>>


From nobody Thu Nov 26 07:40:02 2015
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B6D61B3B54; Thu, 26 Nov 2015 07:40:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aMb_d2-C7Z7s; Thu, 26 Nov 2015 07:39:59 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7173E1B3B52; Thu, 26 Nov 2015 07:39:59 -0800 (PST)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm11.si.francetelecom.fr (ESMTP service) with ESMTP id A7D9A3B468B; Thu, 26 Nov 2015 16:39:57 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.24]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 77B6C35C079; Thu, 26 Nov 2015 16:39:57 +0100 (CET)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0248.002; Thu, 26 Nov 2015 16:39:57 +0100
From: <mohamed.boucadair@orange.com>
To: Daniel Migault <daniel.migault@ericsson.com>, "draft-mglt-sfc-security-environment-req@ietf.org" <draft-mglt-sfc-security-environment-req@ietf.org>
Thread-Topic: Mail regarding draft-mglt-sfc-security-environment-req
Thread-Index: AdEoKfYOoEmizwoxRgqojtD4+Hr5QAAK4LOwAAJMTLA=
Date: Thu, 26 Nov 2015 15:39:56 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008CA36FE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <787AE7BB302AE849A7480A190F8B933008CA31CA@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <2DD56D786E600F45AC6BDE7DA4E8A8C11219F1BA@eusaamb107.ericsson.se>
In-Reply-To: <2DD56D786E600F45AC6BDE7DA4E8A8C11219F1BA@eusaamb107.ericsson.se>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.11.26.142415
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PeEwYWiVqEfq9ZmkjDCrKrp2h3E>
Cc: "sfc-sec-team@external.cisco.com" <sfc-sec-team@external.cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Tirumaleswar Reddy \(tireddy\) \(tireddy@cisco.com\)" <tireddy@cisco.com>, "Behcet Sarikaya \(behcet.sarikaya@huawei.com\)" <behcet.sarikaya@huawei.com>, "Dirk.von-Hugo@telekom.de" <Dirk.von-Hugo@telekom.de>
Subject: Re: [sfc] Mail regarding draft-mglt-sfc-security-environment-req
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 15:40:01 -0000

Re-,

(adding the sfc list as suggested by Behcet)

The NEW proposed rationale looks good to me. It is much better than the ini=
tial "one" sentence in -00. Thank you.

BTW, it would be good to include a reference to, e.g.- https://tools.ietf.o=
rg/html/rfc6973#section-5.2.2, as an example of what is meant by privacy-se=
nsitive data.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Daniel Migault [mailto:daniel.migault@ericsson.com]
> Envoy=E9=A0: jeudi 26 novembre 2015 16:18
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; draft-mglt-sfc-security-environment-
> req@ietf.org
> Cc=A0: Behcet Sarikaya (behcet.sarikaya@huawei.com); Dirk.von-
> Hugo@telekom.de; Tirumaleswar Reddy (tireddy) (tireddy@cisco.com); sfc-
> sec-team@external.cisco.com
> Objet=A0: RE: Mail regarding draft-mglt-sfc-security-environment-req
>=20
> Hi Mohamed,
>=20
> Thanks for raising the concern. This is important for us to have feed
> backs as one of the issue we have is to provide requirements that could b=
e
> well understood in any specific deployment case.
> I am CC the sfc design team, as we are currently discussing the whole
> scope/content of the draft.
>=20
> The reason we mentioned MUST as a requirement was to specify that if you
> do not follow the requirement your are at your own risk and must provide
> the necessary means to prevent any leak - in our case enforcing the
> necessary boundaries security policies that your environment / deployment
> needs to enforce.
>=20
> Would you agree with this way of defining requirements ? -- We are
> planning to indicate it more clearly.
>=20
> The working version provides more explanations on the scope and
> applicability of the reqs. This has been done partly to address the
> comment from Linda among others. Once we have a more stable version we ar=
e
> planning to put it on github.
>=20
>=20
> What do you think of the following text ?
>=20
> As a general guidance exposing privacy sensitive metadata in any
> communications between two any SFC component should be avoided. [One way,
> for example  to avoid exposing privacy sensitive metadata is to include a
> reference to the metadata instead of the metadata itself. Another way
> could be to encrypt the metadata itself - but that is part of the solutio=
n
> space.]  Applying this principle prevents any private oriented data to be
> leaked. This requirement is mandatory when the SFC is not deployed in a
> trusted environment.
> When exposition of the privacy sensitive metadata cannot be avoided and
> you are in a trusted domain, then exposing privacy sensitive metadata may
> be considered as long as they do not leak outside the boundaries of the
> trusted environment.  In this case, the security is delegated to the
> security policies of the trusted environment boundaries, that may be
> outside the scope of SFC. More especially, the security policies may be
> for example enforced by a firewall. In this specific case, the trusted
> environment MUST prevent leakage of the metadata out of the trusted
> environment and MUST ensure that untrusted node cannot access in any way
> the communications within the trusted environment.
>=20
> The reason we mentioned MUST as a requirement was to specify that if you
> do not follow the requirement your are at your own risk and must provide
> the necessary means to prevent any leak - in our case enforcing the
> necessary security policies that your environment / deployment needs.
>=20
> Would you agree with this way of defining requirements ?
>=20
> BR,
> Daniel
>=20
>=20
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
> Sent: Thursday, November 26, 2015 4:08 AM
> To: draft-mglt-sfc-security-environment-req@ietf.org
> Cc: Behcet Sarikaya (behcet.sarikaya@huawei.com); Dirk.von-
> Hugo@telekom.de; Tirumaleswar Reddy (tireddy) (tireddy@cisco.com)
> Subject: Mail regarding draft-mglt-sfc-security-environment-req
>=20
> Bonjour Daniel,
>=20
> Je te contacte =E0 propos du REQ15 :
>=20
>=20
>=20
>    REQ15: Communication MUST NOT reveal privacy sensitive metadata.
>=20
> This requirement as currently worded is not accurate. It is not an issue
> if SFC-tagged packets include privacy-related data (as this is already th=
e
> case within a domain: a network has access to that information anyway).
> What is problematic is to LEAK that information OUTSIDE an administrative
> domain


From nobody Thu Nov 26 10:11:07 2015
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E145D1A1B77 for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 10:11:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.486
X-Spam-Level: 
X-Spam-Status: No, score=-14.486 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PTvKj1LLk3SG for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 10:11:03 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FE491A1B76 for <sfc@ietf.org>; Thu, 26 Nov 2015 10:11:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8565; q=dns/txt; s=iport; t=1448561463; x=1449771063; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=OSx09UQemHaOUX/j6vtjYh6+eama8Ltf2eqdX47Crls=; b=S+T/bFmL1RheK1s+iO9dI5Z0M/9Q3aKeecLGpSPru5rGB5c/3v+PJmLh q0Y0Z6JaCwAYHI7FBjsPTmfD0WNPm1Cx31F2ag7KyLzK/4e1rPRojPumN ZWUF0bpjv9/WzoG77RE9vBRk7bqEKuFJdwDfxxxVQUbQ8No+b5W+VlLMY 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ArAgDOSldW/4sNJK1egztTaQYGvgIBD?= =?us-ascii?q?YFkFwqFaQMCAoE0OBQBAQEBAQEBgQqENAEBAQMBAQEBaxAHBAIBCBEEAQEoByc?= =?us-ascii?q?LFAkIAgQBEggBiB0ICAW+CAEBAQEBAQEBAQEBAQEBAQEBAQEBARiLUoFAAYJpE?= =?us-ascii?q?AIBC4RxBYdKhVg5hRSDaAGFJ4JyhRSBY0mDeI1pgRCHRwEfAQFCghEdgVZyAYR?= =?us-ascii?q?YgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,347,1444694400"; d="scan'208";a="54172524"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 26 Nov 2015 18:11:01 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id tAQIB1uu013693 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 26 Nov 2015 18:11:01 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 26 Nov 2015 12:11:00 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Thu, 26 Nov 2015 12:11:00 -0600
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Responses to NSH open tickets
Thread-Index: AQHRGKzzwNMRn7ESEEWTNnkkiNG1N56uJu5ggACSURA=
Date: Thu, 26 Nov 2015 18:11:00 +0000
Message-ID: <068d784c957c445bb6a3fb4677bc4ac9@XCH-RCD-020.cisco.com>
References: <1E890AFD-822D-44F0-95E5-72F507FFE1F1@cisco.com> <787AE7BB302AE849A7480A190F8B933008CA321A@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008CA321A@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.106.202]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FNlbDUCkhgmlfelK2drf-8Lcm_s>
Subject: Re: [sfc] Responses to NSH open tickets
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 18:11:06 -0000

Inline.

Surendra.

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@oran=
ge.com
Sent: Thursday, November 26, 2015 2:00 AM
To: Paul Quinn (paulq) <paulq@cisco.com>; sfc@ietf.org
Subject: Re: [sfc] Responses to NSH open tickets

Hi Paul,

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Paul Quinn=20
> (paulq) Envoy=E9=A0: vendredi 6 novembre 2015 17:05 =C0=A0: sfc@ietf.org =
Objet=A0
> : [sfc] Responses to NSH open tickets
>=20
> Hi,
>=20
> Below is my analysis and responses to the NSH tracking tickets and my=20
> suggested actions/next steps.
>=20
> Thanks
> Paul
>=20
> ------------
> Ticket #1: Add a new field to include the SFC Identifier
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/1
>=20
> Reply:
> The current NSH draft specifies a pathID, this has proven simple and=20
> viable to implement.  Implementation may (and do) utilize that pathID=20
> to represent an abstract or specific path.  If further specificty is=20
> desired, the NSH metadata may be used to carry other path information. =20
> I do not plan to update the draft, given that there is no WG consensus=20
> for any changes.
>=20

[Med] It would be good to add a clarification to the document to be aligned=
 with the discussion we had for the control plane draft. Having this text i=
ncluded is really helpful to increase clarity:=20

"The SFP Identifier (SFP-id) is used as a lookup key to
      determine forwarding action regardless of whether the SFC is fully
      constrained, partially constrained, or not constrained at all.
      Additional information such as a flow identifier and/or other
      characteristics (e.g., the 5-tuple transport coordinates of the
      original packet) may be used for lookup purposes.  The set of
      information to use for lookup purposes may be instructed by the
      control plane."

SK> It is not SFP-id alone. It is SFP+SI, to be correct, that leads to the =
forwarding action.

>=20
> Ticket #2: Remove "MD Type" field and the companion "MD-type 1"
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/2
>=20
> Reply: Having the ability specify formats for NSH has proven very useful.
> This was raised on on list and there was no consensus for change, I=20
> recommend this item be marked as resolved in the tracker.
>=20
>=20

[Med] I'm following that discussion but I still don't get the answer about =
why mandating 4 context headers. Why not 2, 3, 5, 10, etc.? For me, this on=
e is not resolved.


> Ticket #3: Critical Metadata
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/3
>=20
> Reply:  it is unclear what suggested action is being requested.  If=20
> further clarification of critical metadata in required, text can be=20
> added to the draft, subject to WG review.
>=20

[Med] the issue is that a metadata cane be critical for a given chain but n=
ot for another one. It can be critical for a deployment but not for another=
 one it. Whether a metadata is critical or not should be left to the taste =
of the operators. My suggestion is to let that flag a configurable paramete=
r and have one single registry instead of two as currently defined.=20

>=20
> Ticket #4: Reuse the IPFIX registry for identifying context types
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/4
>=20
> Reply:  The 400+ IPFIX information elements were created for a=20
> protocol for IP Flow Information Export, and thus it would not be=20
> optimal to reuse as there are many unneeded things. Consensus seems to=20
> want to prioritize precision over blind reuse.  I do not plan to=20
> update the draft and suggest that this item be marked as resolved in the =
tracker.
>=20

[Med] The advantage I see in reusing an existing registry is to avoid waiti=
ng for codepoint assignments for NEW metadata needed for a given service de=
ployment. My proposal is to define a dedicated field in the context header =
"Registry ID": =20

=3D=3D
      Registry ID:  In order to foster service innovation, this field
         allows to inherit from existing code point registries that are
         likely to be useful in a SFC context.  The following value is
         reserved by this specification:
         0:  None.
         1:  IPFIX [IPFIX].
=3D=3D

Some bits of the current TLV class can be grabbed for the Registry ID.=20

>=20
> Ticket #5: Support of SF Spirals
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/5
>=20
> Reply: This was answered on the list: http://www.ietf.org/mail-=20
> archive/web/sfc/current/msg03188.html and therefore no changes are needed=
.
> Given that, this item can be marked as resolved.
>=20

[Med] Adding some text to clarify spiral is supported would be helpful, IMO=
. This is much better than looking in an email thread.

> Ticket #6: Version Handling
> https://tools.ietf.org/wg/sfc/trac/ticket/6
>=20
> Reply: Discussed on list: http://www.ietf.org/mail-=20
> archive/web/sfc/current/msg03149.html.  There was no consensus to=20
> changed the adopted format, in fact the value of version bits seems=20
> well accepted and therefore no changes are needed and the topic should=20
> be marked as resolved in the tracker.
>=20

[Med] Wouldn't you plan to update the text to describe the behavior when se=
veral versions are supported by an SFC-aware node or when it receives a ver=
sion it does not support? I thought that was part of the points discussed i=
n that thread.

>=20
> Ticket #7: reserved bits
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/7
>=20
> Reply: This text seems like a helpful clarification.  Barring=20
> objection, it can be added to the draft.
>=20
>=20
[Med] OK, thanks.


> Ticket #8:
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/8
>=20
> Reply: NSH and the use case draft seem consistent.  However, it would=20
> be helpful for the use case drafts to reference the allocations=20
> drafts, and vice versa to provide a consistent view for readers.
>=20
>=20

[Med] One of the comments is to cite the SFC use cases already adopted by t=
he working group.

> Ticket #9: Remove Section 2.2
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/9
>=20
> Reply: The current version of the draft states:  "A short reference is=20
> included below, RFC 7498 [RFC7498], provides a more comprehensive=20
> review of the SFC Problem Statement."  That seems like a reasonable=20
> approach, and propose marking this item as resolved.
>=20
>=20

[Med] IMHO, a pointer to RFC7498 would be enough ; no need to reproduce her=
e what was already covered in section 2 of RFC7498.=20

> Ticket #10: O bit
> http://trac.tools.ietf.org/wg/sfc/trac/ticket/10
>=20
> Reply: Reserving a bit for OAM is acceptable, and done in other=20
> protocol specifications.  OAM-specific drafts exist and will leverage the=
 presence
> of the bit.   Further, over time new OAM uses may arise, having the
> explicit ability to support them day-0 is key. The O bit was agreed=20
> upon by the WG during adoption, and there is no consensus to remove=20
> it.  I propose that a reference be added to the OAM framework draft.
>=20

[Med] I do think it is odd to define a bit without specifying the associate=
d behavior. Giving a name to a flag does not mean associate a meaning with =
that flag. A flag name is not helpful for an implementer if the behavior as=
sociated with it is not present in the spec.=20

The following text is underspecified as it is not clear what is meant by "M=
UST examine the payload and take appropriate action".=20

=3D=3D=3D
   O bit: when set to 0x1 indicates that this packet is an operations
   and management (OAM) packet.  The receiving SFF and SFs nodes MUST
   examine the payload and take appropriate action (e.g. return status
   information).

   OAM message specifics and handling details are outside the scope of
   this document.
=3D=3D=3D=3D

Adding a reference to the OAM framework draft would be OK if the OAM refere=
nce is cited as a NORMATIVE one. I don't think this is what you have in min=
d when you said "a reference be added to the OAM framework draft".

> ---------------
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Nov 26 22:19:46 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE0261ACD79 for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 22:19:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hCJAn-37k5SI for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 22:19:44 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F18D61ACD78 for <sfc@ietf.org>; Thu, 26 Nov 2015 22:19:43 -0800 (PST)
Received: from localhost ([::1]:43181 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1a2CNg-00033b-4z; Thu, 26 Nov 2015 22:19:41 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-nsh@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Fri, 27 Nov 2015 06:19:40 -0000
X-URL: https://tools.ietf.org/sfc/
X-Trac-Ticket-URL: https://trac.tools.ietf.org/wg/sfc/trac/ticket/18
Message-ID: <067.9df4155255e7f9166fd94d4f85865aa0@tools.ietf.org>
X-Trac-Ticket-ID: 18
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-nsh@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-nsh@ietf.org
Resent-Message-Id: <20151127061943.F18D61ACD78@ietfa.amsl.com>
Resent-Date: Thu, 26 Nov 2015 22:19:43 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/NyisNB_EZ-IfA5TeRbDo7OzBclA>
Cc: sfc@ietf.org
Subject: [sfc]  #18 (nsh): Mandatory to implement MD Type
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Nov 2015 06:19:45 -0000

#18: Mandatory to implement MD Type

 Interoperability is best served by using a header that accommodates the
 greatest number of possible applications and use cases as the common
 denominator. This argues for type 2 being the MUST to implement, with type
 1 being an optional optimization for some particular use cases or
 applications that require at most a particular number context headers.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |      Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
     Type:  defect                   |     Status:  new
 Priority:  major                    |  Milestone:
Component:  nsh                      |    Version:
 Severity:  -                        |   Keywords:
-------------------------------------+-------------------------------------

Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/18>
sfc <https://tools.ietf.org/sfc/>


From nobody Thu Nov 26 22:20:57 2015
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 726661ACD83 for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 22:20:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.485
X-Spam-Level: 
X-Spam-Status: No, score=-2.485 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.585] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AIIq2qHfvG3n for <sfc@ietfa.amsl.com>; Thu, 26 Nov 2015 22:20:55 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EE281ACD82 for <sfc@ietf.org>; Thu, 26 Nov 2015 22:20:55 -0800 (PST)
Received: from localhost ([::1]:43312 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1a2COs-0005Ht-9x; Thu, 26 Nov 2015 22:20:55 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-nsh@tools.ietf.org, mohamed.boucadair@orange.com
X-Trac-Project: sfc
Date: Fri, 27 Nov 2015 06:20:54 -0000
X-URL: https://tools.ietf.org/sfc/
X-Trac-Ticket-URL: https://trac.tools.ietf.org/wg/sfc/trac/ticket/19
Message-ID: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org>
X-Trac-Ticket-ID: 19
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-nsh@tools.ietf.org, mohamed.boucadair@orange.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-nsh@ietf.org
Resent-Message-Id: <20151127062055.7EE281ACD82@ietfa.amsl.com>
Resent-Date: Thu, 26 Nov 2015 22:20:55 -0800 (PST)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/x-zot7KdvODM9Xu0Zt4Zz24veq0>
Cc: sfc@ietf.org
Subject: [sfc]  #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Nov 2015 06:20:56 -0000

#19: Mandatory context headers

 For type 1, why are there four mandatory context headers, rather than 2,
 3, 5, 10, etc.?

 The draft contains no particular justification for this choice.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |      Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
     Type:  defect                   |     Status:  new
 Priority:  major                    |  Milestone:
Component:  nsh                      |    Version:
 Severity:  -                        |   Keywords:
-------------------------------------+-------------------------------------

Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/19>
sfc <https://tools.ietf.org/sfc/>


From nobody Sat Nov 28 08:38:35 2015
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1CD61B31B2; Sat, 28 Nov 2015 08:38:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.199
X-Spam-Level: 
X-Spam-Status: No, score=-104.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IGFPw1rSBqbK; Sat, 28 Nov 2015 08:38:32 -0800 (PST)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 412751B31AD; Sat, 28 Nov 2015 08:38:31 -0800 (PST)
X-AuditID: c6180641-f799c6d000007d66-b3-5659d88514ef
Received: from EUSAAHC004.ericsson.se (Unknown_Domain [147.117.188.84]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 83.E5.32102.588D9565; Sat, 28 Nov 2015 17:38:29 +0100 (CET)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC004.ericsson.se ([147.117.188.84]) with mapi id 14.03.0248.002; Sat, 28 Nov 2015 11:38:30 -0500
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "lime@ietf.org" <lime@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Alia Atlas (akatlas@gmail.com)" <akatlas@gmail.com>
Thread-Topic: [Lime] Fwd: [sfc] New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRKBuDtET1bUtm7ESfHAPvl6TSH56xo3wg
Date: Sat, 28 Nov 2015 16:38:29 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF1122194A461@eusaamb103.ericsson.se>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com>
In-Reply-To: <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.12]
Content-Type: multipart/alternative; boundary="_000_7347100B5761DC41A166AC17F22DF1122194A461eusaamb103erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrFIsWRmVeSWpSXmKPExsUyuXRPiG7rjcgwg8e7pS0+PbzEbPHp3Q4W i/8tM9gsOrZtZ7J48mAruwOrx5TfG1k9ds66y+6xZMlPpgDmKC6blNSczLLUIn27BK6MQxfu MxW8mstYcWrhCdYGxgszGbsYOTkkBEwkXn3azwphi0lcuLeeDcQWEjjCKHFhuUsXIxeQvZxR Ytn9R8wgCTYBI4kXG3vYQRIiAhsYJd6dfM0CkmAWcJf4sWorWJGwQLTE0u9LwCaJCMRI/Pn2 hh3CNpKY178azGYRUJU4P/cu2GZeAV+JK9evsUJs62CUONd4A2wQp4CtxJcJ18CKGIHO+35q DRPEMnGJW0/mM0GcLSCxZM95ZghbVOLl439Q7yhJzHl9jRmiPl/i8P95UMsEJU7OfMIygVF0 FpJRs5CUzUJSNouRAyiuKbF+lz5EiaLElO6H7BC2hkTrnLnsyOILGNlXMXKUFhfk5KYbGW5i BMbgMQk2xx2Me3s9DzEKcDAq8fBukIgME2JNLCuuzD3EKMHBrCTCW7scKMSbklhZlVqUH19U mpNafIhRmoNFSZyXkYGBQUggPbEkNTs1tSC1CCbLxMEp1cAoHDGv/kKXpCOnRZde6uwX3D9K 6t4p+dT6uRzUfNfOwKLA3ix2cm+JxY1lbotCXkgxvNiiJ/EvYIJN4f+/j1z96sw/JKQLanyT LXCc4aLp9mrx1dprTVoH5DX8dJ52LBb/5/Oe/VUn39HWST9mvLG47d9TO0+h28/zz9bEdJla 9/yNNwtuGiqxFGckGmoxFxUnAgAIgvCsvQIAAA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/BsRwncZoPHV65snQonxhzq-rvpw>
Cc: "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>
Subject: Re: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Nov 2015 16:38:34 -0000

--_000_7347100B5761DC41A166AC17F22DF1122194A461eusaamb103erics_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

RGVhciBBbGwsDQp0aGlzIHdvcmsgdW5kZXJsaW5lcywgaW4gbXkgb3Bpbmlvbiwgb25lIGZ1bmRh
bWVudGFsIHF1ZXN0aW9uIHRoYXQgTElNRSBXRyBiZWVuIGRpc2N1c3NpbmcgZm9yIHF1aXRlIHNv
bWUgdGltZS4gSXMgZGF0YSBtb2RlbCBvZiB0aGUgcGFydGljdWxhciBPQU0gb3IgIGZvciB0aGF0
IE9BTT8gSWYgdGhlIGxhdHRlciwgdGhlbiB3ZSB3aWxsIGJlIGRldmVsb3BpbmcgT0FNIHByb3Rv
Y29scyB0byBtdWNoIHdoYXRldmVyIGRhdGEgbW9kZWwgYmVlbiBjcmVhdGVkLiBEb2VzIHRoYXQg
c291bmQgcmlnaHQ/IEkgdGhpbmsgdGhhdCB3ZSBmaXJzdCBidWlsZCB1cCBPQU0gdG9vbCBib3gg
YW5kIHRoZW4gZGVzY3JpYmUgaXRzIGRhdGEgbW9kZWwgd2l0aCBZQU5HLiBJZiB0aGF04oCZcyB0
aGUgb3RoZXIgd2F5IGFyb3VuZCwgd2UgbWF5IGVuZCB1cCB3aXRoIGNhcnQgYmVmb3JlIHRoZSBo
b3JzZS4NCg0KICAgICAgICAgICAgICAgIFJlZ2FyZHMsDQogICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgIEdyZWcNCg0KRnJvbTogTGltZSBbbWFpbHRvOmxpbWUtYm91bmNlc0BpZXRmLm9y
Z10gT24gQmVoYWxmIE9mIENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKQ0KU2VudDogU2F0dXJk
YXksIE5vdmVtYmVyIDI4LCAyMDE1IDY6NTAgQU0NClRvOiBsaW1lQGlldGYub3JnDQpDYzogZHJh
ZnQteGlhLXNmYy15YW5nLW9hbUBpZXRmLm9yZw0KU3ViamVjdDogW0xpbWVdIEZ3ZDogW3NmY10g
TmV3IFZlcnNpb24gTm90aWZpY2F0aW9uIGZvciBkcmFmdC14aWEtc2ZjLXlhbmctb2FtLTA0LnR4
dA0KDQpGWUkuDQoNCg0KQmVnaW4gZm9yd2FyZGVkIG1lc3NhZ2U6DQoNCkZyb206ICJYaWFsaWFu
ZyAoRnJhbmspIiA8ZnJhbmsueGlhbGlhbmdAaHVhd2VpLmNvbTxtYWlsdG86ZnJhbmsueGlhbGlh
bmdAaHVhd2VpLmNvbT4+DQpEYXRlOiBOb3ZlbWJlciAyNiwgMjAxNSBhdCAzOjEyOjE5IEFNIEVT
VA0KVG86ICJzZmNAaWV0Zi5vcmc8bWFpbHRvOnNmY0BpZXRmLm9yZz4iIDxzZmNAaWV0Zi5vcmc8
bWFpbHRvOnNmY0BpZXRmLm9yZz4+DQpTdWJqZWN0OiBbc2ZjXSDovazlj5E6IE5ldyBWZXJzaW9u
IE5vdGlmaWNhdGlvbiBmb3IgZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNC50eHQNCg0KSGkgYWxs
LA0KV2UgdXBkYXRlIGEgbmV3IC0wNCB2ZXJzaW9uIG9mIHRoaXMgZHJhZnQuIFVudGlsIG5vdywg
dGhpcyBkcmFmdCBpcyBmb2N1c2VkIG9uIHByb3Bvc2luZyB0aGUgU0ZDIHNwZWNpZmljIE9BTSBZ
QU5HIG1vZGVsIGJ5IGluaGVyaXRpbmcgYW5kIGV4dGVuZGluZyB0aGUgZXhpc3Rpbmcgd29yayBv
ZiBTRkMgWUFORyBtb2RlbCBhbmQgTElNRSBPQU0gWUFORyBtb2RlbC4gU28sIHRoaXMgZHJhZnQg
d2lsbCBrZWVwIG9uIGJlaW5nIHN5bmNocm9uaXplZCB3aXRoIHRoZSBsYXRlc3QgdXBkYXRlIG9m
IHRoZSByZWxhdGVkIHdvcmsgb2YgTElNRSBhbmQgU0ZDIFlBTkcgbW9kZWxzLiBNZWFud2hpbGUs
IHRoZSBzZmMgb2FtIGZyYW1ld29yayBhbmQgc3BlY2lmaWMgZnVuY3Rpb25zIGFyZSBhbHNvIHZl
cnkgaW1wb3J0YW50IHRvIGJlIGNvbnNpZGVyZWQuDQpZb3VyIHJldmlldyBhbmQgY29tbWVudHMg
b24gdGhpcyBkcmFmdCBhcmUgZ3JlYXRseSBhcHByZWNpYXRlZCENCg0KQi5SLg0KRnJhbmsNCg0K
LS0tLS3pgq7ku7bljp/ku7YtLS0tLQ0K5Y+R5Lu25Lq6OiBpbnRlcm5ldC1kcmFmdHNAaWV0Zi5v
cmc8bWFpbHRvOmludGVybmV0LWRyYWZ0c0BpZXRmLm9yZz4gW21haWx0bzppbnRlcm5ldC1kcmFm
dHNAaWV0Zi5vcmddDQrlj5HpgIHml7bpl7Q6IDIwMTXlubQxMeaciDI25pelIDE1OjI1DQrmlLbk
u7bkuro6IFhpYWxpYW5nIChGcmFuayk7IE1vaGFtZWQgQm91Y2FkYWlyOyBEZWVwYWsgS3VtYXI7
IFFpbiBXdTsgd2FuZ3ppdGFvDQrkuLvpopg6IE5ldyBWZXJzaW9uIE5vdGlmaWNhdGlvbiBmb3Ig
ZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNC50eHQNCg0KDQpBIG5ldyB2ZXJzaW9uIG9mIEktRCwg
ZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNC50eHQgaGFzIGJlZW4gc3VjY2Vzc2Z1bGx5IHN1Ym1p
dHRlZCBieSBMaWFuZyBYaWEgYW5kIHBvc3RlZCB0byB0aGUgSUVURiByZXBvc2l0b3J5Lg0KDQpO
YW1lOiAgICAgICAgICAgICAgZHJhZnQteGlhLXNmYy15YW5nLW9hbQ0KUmV2aXNpb246ICAgICAg
ICAgMDQNClRpdGxlOiAgICAgICAgICAgICAgICBZQU5HIERhdGEgTW9kZWwgZm9yIFNGQyBPcGVy
YXRpb25zLCBBZG1pbmlzdHJhdGlvbiwgYW5kIE1haW50ZW5hbmNlIChPQU0pDQpEb2N1bWVudCBk
YXRlOiAgICAgICAgICAyMDE1LTExLTI1DQpHcm91cDogICAgICAgICAgICAgSW5kaXZpZHVhbCBT
dWJtaXNzaW9uDQpQYWdlczogICAgICAgICAgICAgIDIxDQpVUkw6ICAgICAgICAgICAgaHR0cHM6
Ly93d3cuaWV0Zi5vcmcvaW50ZXJuZXQtZHJhZnRzL2RyYWZ0LXhpYS1zZmMteWFuZy1vYW0tMDQu
dHh0DQpTdGF0dXM6ICAgICAgICAgaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJh
ZnQteGlhLXNmYy15YW5nLW9hbS8NCkh0bWxpemVkOiAgICAgICBodHRwczovL3Rvb2xzLmlldGYu
b3JnL2h0bWwvZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNA0KRGlmZjogICAgICAgICAgIGh0dHBz
Oi8vd3d3LmlldGYub3JnL3JmY2RpZmY/dXJsMj1kcmFmdC14aWEtc2ZjLXlhbmctb2FtLTA0DQoN
CkFic3RyYWN0Og0KICBUaGlzIGRvY3VtZW50IGRlZmluZXMgWUFORyBkYXRhIG1vZGVsIGZvciBT
ZXJ2aWNlIEZ1bmN0aW9uIENoYWluaW5nDQogIChTRkMgT3BlcmF0aW9ucywgQWRtaW5pc3RyYXRp
b24sIGFuZCBNYWludGVuYW5jZSAoT0FNKS4gIEl0IGV4dGVuZHMNCiAgZnJvbSB0aGUgYmFzaWMg
WUFORyBkYXRhIG1vZGVsIGZvciBMYXllciBpbmRlcGVuZGVudCBPQU0gTWFuYWdlbWVudA0KICBk
ZWZpbmVkIGluIFtJLUQuaWV0Zi1saW1lLXlhbmctb2FtLW1vZGVsXSB3aXRoIFNGQyB0ZWNobm9s
b2d5DQogIHNwZWNpZmljcy4gIEl0IGluY2x1ZGVzIFNGQyBPQU0gcmVsYXRlZCBjb25maWd1cmF0
aW9uLCBzdGF0ZSwgYW5kIFJQQw0KICBpbmZvcm1hdGlvbiBkYXRhLg0KDQoNCg0KDQpQbGVhc2Ug
bm90ZSB0aGF0IGl0IG1heSB0YWtlIGEgY291cGxlIG9mIG1pbnV0ZXMgZnJvbSB0aGUgdGltZSBv
ZiBzdWJtaXNzaW9uIHVudGlsIHRoZSBodG1saXplZCB2ZXJzaW9uIGFuZCBkaWZmIGFyZSBhdmFp
bGFibGUgYXQgdG9vbHMuaWV0Zi5vcmc8aHR0cDovL3Rvb2xzLmlldGYub3JnPi4NCg0KVGhlIElF
VEYgU2VjcmV0YXJpYXQNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX18NCnNmYyBtYWlsaW5nIGxpc3QNCnNmY0BpZXRmLm9yZzxtYWlsdG86c2ZjQGlldGYu
b3JnPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCg0K

--_000_7347100B5761DC41A166AC17F22DF1122194A461eusaamb103erics_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_7347100B5761DC41A166AC17F22DF1122194A461eusaamb103erics_--


From nobody Sat Nov 28 08:39:35 2015
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17C641B31B3; Sat, 28 Nov 2015 08:39:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.2
X-Spam-Level: 
X-Spam-Status: No, score=-104.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ozQV5AXyVmkR; Sat, 28 Nov 2015 08:39:32 -0800 (PST)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B61971B30E3; Sat, 28 Nov 2015 08:39:31 -0800 (PST)
X-AuditID: c6180641-f799c6d000007d66-c1-5659d8c0ab36
Received: from EUSAAHC002.ericsson.se (Unknown_Domain [147.117.188.78]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 88.E5.32102.0C8D9565; Sat, 28 Nov 2015 17:39:29 +0100 (CET)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC002.ericsson.se ([147.117.188.78]) with mapi id 14.03.0248.002; Sat, 28 Nov 2015 11:39:30 -0500
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "lime@ietf.org" <lime@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Alia Atlas (akatlas@gmail.com)" <akatlas@gmail.com>
Thread-Topic: [Lime] Fwd: [sfc] New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRKBuDtET1bUtm7ESfHAPvl6TSH56xo3wggAAC2wA=
Date: Sat, 28 Nov 2015 16:39:29 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF1122194A478@eusaamb103.ericsson.se>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com> 
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.12]
Content-Type: multipart/alternative; boundary="_000_7347100B5761DC41A166AC17F22DF1122194A478eusaamb103erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrIIsWRmVeSWpSXmKPExsUyuXSPn+7BG5FhBqfniVp8eniJ2eLTux0s Fv9bZrBZdGzbzmTx5MFWdouWlnwHNo8pvzeyeuycdZfdY8mSn0wBzFFcNimpOZllqUX6dglc GXfnHWcqWLKeseLntStMDYwXVjF2MXJySAiYSMy+u4QdwhaTuHBvPRuILSRwhFHiy+0CCHs5 o8TJMwogNpuAkcSLjT1A9VwcIgIbGCXenXzNApJgFiiTeDNxKxOILSwQLbH0+xKwQSICMRJ/ vr1hh7CtJE6cnA+2mEVAVeLcstfMIDavgK9E75x+ZpChQgKdjBKfFh8Fa2AEuuj7qTVMEAvE JW49mc8EcamAxJI955khbFGJl4//sULYShJzXl9jhqjPl5h64TobxAJBiZMzn7BMYBSZhWTU LCRls5CUzWLkAIprSqzfpQ9RoigxpfshO4StIdE6Zy47svgCRvZVjBylxQU5uelGhpsYgRF3 TILNcQfj3l7PQ4wCHIxKPLwbJCLDhFgTy4orcw8xSnAwK4nw1i4HCvGmJFZWpRblxxeV5qQW H2KU5mBREudlZGBgEBJITyxJzU5NLUgtgskycXBKNTC6Hpsg7FL1/qXJB4tK07raqSWeLAkt wp9kb5SZeBxx+nRqoklhUeL2o4dfHfLiDXsSo/Hwz5HpAa/8Um+adc67//hTYMPzvB0h0/8u 3xnTfp+L30X/5saCvSc2FxnJP3M/v7Nr1lmDwmO/BT5GuH9zPpzg0v2xaopZPZPk6re/gr5b vz7zvOu2EktxRqKhFnNRcSIAJqp1eLQCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PEGuEkBIpsjn-hb6r0Z-Vy1Q0Bc>
Cc: "yang-coord@ietf.org" <yang-coord@ietf.org>, "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>
Subject: Re: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Nov 2015 16:39:34 -0000

--_000_7347100B5761DC41A166AC17F22DF1122194A478eusaamb103erics_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_7347100B5761DC41A166AC17F22DF1122194A478eusaamb103erics_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6eD0idXJuOnNjaGVtYXMtbWljcm9z
b2Z0LWNvbTpvZmZpY2U6ZXhjZWwiIHhtbG5zOm09Imh0dHA6Ly9zY2hlbWFzLm1pY3Jvc29mdC5j
b20vb2ZmaWNlLzIwMDQvMTIvb21tbCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnL1RSL1JFQy1o
dG1sNDAiPg0KPGhlYWQ+DQo8bWV0YSBodHRwLWVxdWl2PSJDb250ZW50LVR5cGUiIGNvbnRlbnQ9
InRleHQvaHRtbDsgY2hhcnNldD11dGYtOCI+DQo8bWV0YSBuYW1lPSJHZW5lcmF0b3IiIGNvbnRl
bnQ9Ik1pY3Jvc29mdCBXb3JkIDE0IChmaWx0ZXJlZCBtZWRpdW0pIj4NCjxzdHlsZT48IS0tDQov
KiBGb250IERlZmluaXRpb25zICovDQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkhlbHZldGlj
YTsNCglwYW5vc2UtMToyIDExIDYgNCAyIDIgMiAyIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQt
ZmFtaWx5OiJNUyBNaW5jaG8iOw0KCXBhbm9zZS0xOjIgMiA2IDkgNCAyIDUgOCAzIDQ7fQ0KQGZv
bnQtZmFjZQ0KCXtmb250LWZhbWlseTpQTWluZ0xpVTsNCglwYW5vc2UtMToyIDIgNSAwIDAgMCAw
IDAgMCAwO30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6TWluZ0xpVTsNCglwYW5vc2UtMToy
IDIgNSA5IDAgMCAwIDAgMCAwO30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6TWluZ0xpVTsN
CglwYW5vc2UtMToyIDIgNSA5IDAgMCAwIDAgMCAwO30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1p
bHk6Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNl
DQoJe2ZvbnQtZmFtaWx5OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9
DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJcQE1pbmdMaVUiOw0KCXBhbm9zZS0xOjIgMiA1
IDkgMCAwIDAgMCAwIDA7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiXEBQTWluZ0xpVSI7
DQoJcGFub3NlLTE6MiAyIDUgMCAwIDAgMCAwIDAgMDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFt
aWx5OiJcQE1TIE1pbmNobyI7DQoJcGFub3NlLTE6MiAyIDYgOSA0IDIgNSA4IDMgNDt9DQovKiBT
dHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05v
cm1hbA0KCXttYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6
MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0KYTpsaW5r
LCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1
ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBl
cmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0K
CXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5Nc29BY2V0YXRlLCBsaS5Nc29BY2V0YXRl
LCBkaXYuTXNvQWNldGF0ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxp
bms6IkJhbGxvb24gVGV4dCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAw
MDFwdDsNCglmb250LXNpemU6OC4wcHQ7DQoJZm9udC1mYW1pbHk6IlRhaG9tYSIsInNhbnMtc2Vy
aWYiO30NCnNwYW4uQmFsbG9vblRleHRDaGFyDQoJe21zby1zdHlsZS1uYW1lOiJCYWxsb29uIFRl
eHQgQ2hhciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJCYWxs
b29uIFRleHQiOw0KCWZvbnQtZmFtaWx5OiJUYWhvbWEiLCJzYW5zLXNlcmlmIjt9DQpzcGFuLmFw
cGxlLXRhYi1zcGFuDQoJe21zby1zdHlsZS1uYW1lOmFwcGxlLXRhYi1zcGFuO30NCnNwYW4uRW1h
aWxTdHlsZTIwDQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxp
YnJpIiwic2Fucy1zZXJpZiI7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVtYWlsU3R5bGUyMQ0K
CXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIs
InNhbnMtc2VyaWYiOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0
eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1zaXplOjEwLjBwdDt9DQpAcGFnZSBXb3JkU2Vj
dGlvbjENCgl7c2l6ZTo4LjVpbiAxMS4waW47DQoJbWFyZ2luOjEuMGluIDEuMGluIDEuMGluIDEu
MGluO30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3JkU2VjdGlvbjE7fQ0KLS0+PC9zdHls
ZT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlZGVmYXVsdHMgdjpleHQ9ImVkaXQi
IHNwaWRtYXg9IjEwMjYiIC8+DQo8L3htbD48IVtlbmRpZl0tLT48IS0tW2lmIGd0ZSBtc28gOV0+
PHhtbD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0PSJlZGl0Ij4NCjxvOmlkbWFwIHY6ZXh0PSJlZGl0
IiBkYXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5b3V0PjwveG1sPjwhW2VuZGlmXS0tPg0KPC9oZWFk
Pg0KPGJvZHkgbGFuZz0iRU4tVVMiIGxpbms9ImJsdWUiIHZsaW5rPSJwdXJwbGUiPg0KPGRpdiBj
bGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4mIzQzO3lhbmctY29vcmQ8bzpwPjwvbzpwPjwv
c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVv
dDs7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdj4NCjxk
aXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRk
aW5nOjMuMHB0IDBpbiAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDsiPiBHcmVnb3J5IE1pcnNreQ0KPGJyPg0KPGI+U2VudDo8L2I+IFNhdHVyZGF5LCBOb3Zl
bWJlciAyOCwgMjAxNSA4OjM4IEFNPGJyPg0KPGI+VG86PC9iPiAnQ2FybG9zIFBpZ25hdGFybyAo
Y3BpZ25hdGEpJzsgbGltZUBpZXRmLm9yZzsgJ3NmY0BpZXRmLm9yZyc7IEFsaWEgQXRsYXMgKGFr
YXRsYXNAZ21haWwuY29tKTxicj4NCjxiPkNjOjwvYj4gZHJhZnQteGlhLXNmYy15YW5nLW9hbUBp
ZXRmLm9yZzxicj4NCjxiPlN1YmplY3Q6PC9iPiBSRTogW0xpbWVdIEZ3ZDogW3NmY10gTmV3IFZl
cnNpb24gTm90aWZpY2F0aW9uIGZvciBkcmFmdC14aWEtc2ZjLXlhbmctb2FtLTA0LnR4dDxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5EZWFyIEFsbCw8bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29s
b3I6IzFGNDk3RCI+dGhpcyB3b3JrIHVuZGVybGluZXMsIGluIG15IG9waW5pb24sIG9uZSBmdW5k
YW1lbnRhbCBxdWVzdGlvbiB0aGF0IExJTUUgV0cgYmVlbiBkaXNjdXNzaW5nIGZvciBxdWl0ZSBz
b21lIHRpbWUuIElzIGRhdGEgbW9kZWwNCjxiPjx1Pm9mPC91PjwvYj4gdGhlIHBhcnRpY3VsYXIg
T0FNIG9yIDxiPjx1PiZuYnNwO2ZvciA8L3U+PC9iPnRoYXQgT0FNPyBJZiB0aGUgbGF0dGVyLCB0
aGVuIHdlIHdpbGwgYmUgZGV2ZWxvcGluZyBPQU0gcHJvdG9jb2xzIHRvIG11Y2ggd2hhdGV2ZXIg
ZGF0YSBtb2RlbCBiZWVuIGNyZWF0ZWQuIERvZXMgdGhhdCBzb3VuZCByaWdodD8gSSB0aGluayB0
aGF0IHdlIGZpcnN0IGJ1aWxkIHVwIE9BTSB0b29sIGJveCBhbmQgdGhlbiBkZXNjcmliZSBpdHMg
ZGF0YQ0KIG1vZGVsIHdpdGggWUFORy4gSWYgdGhhdOKAmXMgdGhlIG90aGVyIHdheSBhcm91bmQs
IHdlIG1heSBlbmQgdXAgd2l0aCBjYXJ0IGJlZm9yZSB0aGUgaG9yc2UuPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4mbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgUmVnYXJkcyw8bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29s
b3I6IzFGNDk3RCI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IEdyZWc8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFG
NDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdj4NCjxkaXYgc3R5bGU9ImJv
cmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0IDBp
biAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVvdDtzYW5zLXNlcmlm
JnF1b3Q7Ij5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPiBMaW1l
IFs8YSBocmVmPSJtYWlsdG86bGltZS1ib3VuY2VzQGlldGYub3JnIj5tYWlsdG86bGltZS1ib3Vu
Y2VzQGlldGYub3JnPC9hPl0NCjxiPk9uIEJlaGFsZiBPZiA8L2I+Q2FybG9zIFBpZ25hdGFybyAo
Y3BpZ25hdGEpPGJyPg0KPGI+U2VudDo8L2I+IFNhdHVyZGF5LCBOb3ZlbWJlciAyOCwgMjAxNSA2
OjUwIEFNPGJyPg0KPGI+VG86PC9iPiA8YSBocmVmPSJtYWlsdG86bGltZUBpZXRmLm9yZyI+bGlt
ZUBpZXRmLm9yZzwvYT48YnI+DQo8Yj5DYzo8L2I+IDxhIGhyZWY9Im1haWx0bzpkcmFmdC14aWEt
c2ZjLXlhbmctb2FtQGlldGYub3JnIj5kcmFmdC14aWEtc2ZjLXlhbmctb2FtQGlldGYub3JnPC9h
Pjxicj4NCjxiPlN1YmplY3Q6PC9iPiBbTGltZV0gRndkOiBbc2ZjXSBOZXcgVmVyc2lvbiBOb3Rp
ZmljYXRpb24gZm9yIGRyYWZ0LXhpYS1zZmMteWFuZy1vYW0tMDQudHh0PG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7
PC9vOnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkZZSS48bzpwPjwvbzpwPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8YmxvY2txdW90ZSBzdHlsZT0ibWFyZ2luLXRvcDo1LjBw
dDttYXJnaW4tYm90dG9tOjUuMHB0Ij4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5CZWdp
biBmb3J3YXJkZWQgbWVzc2FnZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij5Gcm9tOiA8L3NwYW4+DQo8L2I+PHNwYW4gc3R5bGU9ImZvbnQt
ZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij4mcXVv
dDtYaWFsaWFuZyAoRnJhbmspJnF1b3Q7ICZsdDs8YSBocmVmPSJtYWlsdG86ZnJhbmsueGlhbGlh
bmdAaHVhd2VpLmNvbSI+ZnJhbmsueGlhbGlhbmdAaHVhd2VpLmNvbTwvYT4mZ3Q7PC9zcGFuPjxv
OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNw
YW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij5EYXRlOiA8L3NwYW4+DQo8L2I+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZx
dW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5Ob3ZlbWJlciAyNiwg
MjAxNSBhdCAzOjEyOjE5IEFNIEVTVDwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVv
dDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+VG86IDwvc3Bhbj4NCjwv
Yj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LCZxdW90O3Nh
bnMtc2VyaWYmcXVvdDsiPiZxdW90OzxhIGhyZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciPnNmY0Bp
ZXRmLm9yZzwvYT4mcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciPnNmY0Bp
ZXRmLm9yZzwvYT4mZ3Q7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O0hlbHZl
dGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5TdWJqZWN0OiBbc2ZjXQ0KPC9zcGFu
PjwvYj48Yj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6TWluZ0xpVSI+6L2s5Y+RPC9zcGFuPjwv
Yj48Yj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjogTmV3IFZlcnNpb24gTm90aWZpY2F0aW9uIGZvciBkcmFmdC14
aWEtc2ZjLXlhbmctb2FtLTA0LnR4dDwvc3Bhbj48L2I+PG86cD48L286cD48L3A+DQo8L2Rpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5IaSBhbGwsPGJyPg0KV2UgdXBkYXRlIGEgbmV3IC0wNCB2
ZXJzaW9uIG9mIHRoaXMgZHJhZnQuIFVudGlsIG5vdywgdGhpcyBkcmFmdCBpcyBmb2N1c2VkIG9u
IHByb3Bvc2luZyB0aGUgU0ZDIHNwZWNpZmljIE9BTSBZQU5HIG1vZGVsIGJ5IGluaGVyaXRpbmcg
YW5kIGV4dGVuZGluZyB0aGUgZXhpc3Rpbmcgd29yayBvZiBTRkMgWUFORyBtb2RlbCBhbmQgTElN
RSBPQU0gWUFORyBtb2RlbC4gU28sIHRoaXMgZHJhZnQgd2lsbCBrZWVwIG9uIGJlaW5nIHN5bmNo
cm9uaXplZA0KIHdpdGggdGhlIGxhdGVzdCB1cGRhdGUgb2YgdGhlIHJlbGF0ZWQgd29yayBvZiBM
SU1FIGFuZCBTRkMgWUFORyBtb2RlbHMuIE1lYW53aGlsZSwgdGhlIHNmYyBvYW0gZnJhbWV3b3Jr
IGFuZCBzcGVjaWZpYyBmdW5jdGlvbnMgYXJlIGFsc28gdmVyeSBpbXBvcnRhbnQgdG8gYmUgY29u
c2lkZXJlZC48YnI+DQpZb3VyIHJldmlldyBhbmQgY29tbWVudHMgb24gdGhpcyBkcmFmdCBhcmUg
Z3JlYXRseSBhcHByZWNpYXRlZCE8YnI+DQo8YnI+DQpCLlIuPGJyPg0KRnJhbms8YnI+DQo8YnI+
DQotLS0tLTxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtQTWluZ0xpVSZxdW90OywmcXVv
dDtzZXJpZiZxdW90OyI+6YKu5Lu25Y6f5Lu2PC9zcGFuPi0tLS0tPGJyPg0KPHNwYW4gc3R5bGU9
ImZvbnQtZmFtaWx5OiZxdW90O1BNaW5nTGlVJnF1b3Q7LCZxdW90O3NlcmlmJnF1b3Q7Ij7lj5Hk
u7bkuro8L3NwYW4+OiA8YSBocmVmPSJtYWlsdG86aW50ZXJuZXQtZHJhZnRzQGlldGYub3JnIj4N
CmludGVybmV0LWRyYWZ0c0BpZXRmLm9yZzwvYT4gWzxhIGhyZWY9Im1haWx0bzppbnRlcm5ldC1k
cmFmdHNAaWV0Zi5vcmciPm1haWx0bzppbnRlcm5ldC1kcmFmdHNAaWV0Zi5vcmc8L2E+XQ0KPGJy
Pg0KPHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O1BNaW5nTGlVJnF1b3Q7LCZxdW90O3Nl
cmlmJnF1b3Q7Ij7lj5HpgIHml7bpl7Q8L3NwYW4+OiAyMDE1PHNwYW4gc3R5bGU9ImZvbnQtZmFt
aWx5OiZxdW90O01TIE1pbmNobyZxdW90OyI+5bm0PC9zcGFuPjExPHNwYW4gc3R5bGU9ImZvbnQt
ZmFtaWx5OiZxdW90O01TIE1pbmNobyZxdW90OyI+5pyIPC9zcGFuPjI2PHNwYW4gc3R5bGU9ImZv
bnQtZmFtaWx5OiZxdW90O01TIE1pbmNobyZxdW90OyI+5pelPC9zcGFuPiAxNToyNTxicj4NCjxz
cGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtNUyBNaW5jaG8mcXVvdDsiPuaUtuS7tuS6ujwv
c3Bhbj46IFhpYWxpYW5nIChGcmFuayk7IE1vaGFtZWQgQm91Y2FkYWlyOyBEZWVwYWsgS3VtYXI7
IFFpbiBXdTsgd2FuZ3ppdGFvPGJyPg0KPHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O01T
IE1pbmNobyZxdW90OyI+5Li7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtQ
TWluZ0xpVSZxdW90OywmcXVvdDtzZXJpZiZxdW90OyI+6aKYPC9zcGFuPjogTmV3IFZlcnNpb24g
Tm90aWZpY2F0aW9uIGZvciBkcmFmdC14aWEtc2ZjLXlhbmctb2FtLTA0LnR4dDxicj4NCjxicj4N
Cjxicj4NCkEgbmV3IHZlcnNpb24gb2YgSS1ELCBkcmFmdC14aWEtc2ZjLXlhbmctb2FtLTA0LnR4
dCBoYXMgYmVlbiBzdWNjZXNzZnVsbHkgc3VibWl0dGVkIGJ5IExpYW5nIFhpYSBhbmQgcG9zdGVk
IHRvIHRoZSBJRVRGIHJlcG9zaXRvcnkuPGJyPg0KPGJyPg0KTmFtZTo8c3BhbiBjbGFzcz0iYXBw
bGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3NwYW4+ZHJhZnQteGlhLXNmYy15
YW5nLW9hbTxicj4NClJldmlzaW9uOjxzcGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDwvc3Bhbj4wNDxicj4N
ClRpdGxlOjxzcGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5ZQU5HIERhdGEgTW9kZWwgZm9yIFNGQyBPcGVyYXRpb25zLCBB
ZG1pbmlzdHJhdGlvbiwgYW5kIE1haW50ZW5hbmNlIChPQU0pPGJyPg0KRG9jdW1lbnQgZGF0ZTo8
c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3NwYW4+MjAxNS0xMS0yNTxicj4NCkdyb3VwOjxz
cGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5JbmRpdmlk
dWFsIFN1Ym1pc3Npb248YnI+DQpQYWdlczo8c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyA8L3NwYW4+MjE8YnI+DQpVUkw6ICZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOzxhIGhyZWY9
Imh0dHBzOi8vd3d3LmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy9kcmFmdC14aWEtc2ZjLXlhbmct
b2FtLTA0LnR4dCI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvaW50ZXJuZXQtZHJhZnRzL2RyYWZ0LXhp
YS1zZmMteWFuZy1vYW0tMDQudHh0PC9hPjxicj4NClN0YXR1czogJm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7PGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tl
ci5pZXRmLm9yZy9kb2MvZHJhZnQteGlhLXNmYy15YW5nLW9hbS8iPmh0dHBzOi8vZGF0YXRyYWNr
ZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LXhpYS1zZmMteWFuZy1vYW0vPC9hPjxicj4NCkh0bWxpemVk
OiAmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDs8YSBocmVmPSJodHRwczovL3Rv
b2xzLmlldGYub3JnL2h0bWwvZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNCI+aHR0cHM6Ly90b29s
cy5pZXRmLm9yZy9odG1sL2RyYWZ0LXhpYS1zZmMteWFuZy1vYW0tMDQ8L2E+PGJyPg0KRGlmZjog
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7PGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRyYWZ0LXhpYS1z
ZmMteWFuZy1vYW0tMDQiPmh0dHBzOi8vd3d3LmlldGYub3JnL3JmY2RpZmY/dXJsMj1kcmFmdC14
aWEtc2ZjLXlhbmctb2FtLTA0PC9hPjxicj4NCjxicj4NCkFic3RyYWN0Ojxicj4NCiZuYnNwOyZu
YnNwO1RoaXMgZG9jdW1lbnQgZGVmaW5lcyBZQU5HIGRhdGEgbW9kZWwgZm9yIFNlcnZpY2UgRnVu
Y3Rpb24gQ2hhaW5pbmc8YnI+DQombmJzcDsmbmJzcDsoU0ZDIE9wZXJhdGlvbnMsIEFkbWluaXN0
cmF0aW9uLCBhbmQgTWFpbnRlbmFuY2UgKE9BTSkuICZuYnNwO0l0IGV4dGVuZHM8YnI+DQombmJz
cDsmbmJzcDtmcm9tIHRoZSBiYXNpYyBZQU5HIGRhdGEgbW9kZWwgZm9yIExheWVyIGluZGVwZW5k
ZW50IE9BTSBNYW5hZ2VtZW50PGJyPg0KJm5ic3A7Jm5ic3A7ZGVmaW5lZCBpbiBbSS1ELmlldGYt
bGltZS15YW5nLW9hbS1tb2RlbF0gd2l0aCBTRkMgdGVjaG5vbG9neTxicj4NCiZuYnNwOyZuYnNw
O3NwZWNpZmljcy4gJm5ic3A7SXQgaW5jbHVkZXMgU0ZDIE9BTSByZWxhdGVkIGNvbmZpZ3VyYXRp
b24sIHN0YXRlLCBhbmQgUlBDPGJyPg0KJm5ic3A7Jm5ic3A7aW5mb3JtYXRpb24gZGF0YS48YnI+
DQo8YnI+DQo8YnI+DQo8YnI+DQo8YnI+DQpQbGVhc2Ugbm90ZSB0aGF0IGl0IG1heSB0YWtlIGEg
Y291cGxlIG9mIG1pbnV0ZXMgZnJvbSB0aGUgdGltZSBvZiBzdWJtaXNzaW9uIHVudGlsIHRoZSBo
dG1saXplZCB2ZXJzaW9uIGFuZCBkaWZmIGFyZSBhdmFpbGFibGUgYXQNCjxhIGhyZWY9Imh0dHA6
Ly90b29scy5pZXRmLm9yZyI+dG9vbHMuaWV0Zi5vcmc8L2E+Ljxicj4NCjxicj4NClRoZSBJRVRG
IFNlY3JldGFyaWF0PGJyPg0KPGJyPg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX188YnI+DQpzZmMgbWFpbGluZyBsaXN0PGJyPg0KPGEgaHJlZj0ibWFpbHRv
OnNmY0BpZXRmLm9yZyI+c2ZjQGlldGYub3JnPC9hPjxicj4NCjxhIGhyZWY9Imh0dHBzOi8vd3d3
LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjIj5odHRwczovL3d3dy5pZXRmLm9yZy9tYWls
bWFuL2xpc3RpbmZvL3NmYzwvYT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Js
b2NrcXVvdGU+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+
PC9wPg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_7347100B5761DC41A166AC17F22DF1122194A478eusaamb103erics_--


From nobody Sat Nov 28 12:22:57 2015
Return-Path: <tom.taylor.stds@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 943D71B3588; Sat, 28 Nov 2015 12:22:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R2jJSqtm3aDr; Sat, 28 Nov 2015 12:22:53 -0800 (PST)
Received: from mail-qg0-x230.google.com (mail-qg0-x230.google.com [IPv6:2607:f8b0:400d:c04::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4AFAF1B3587; Sat, 28 Nov 2015 12:22:53 -0800 (PST)
Received: by qgeb1 with SMTP id b1so93723994qge.1; Sat, 28 Nov 2015 12:22:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-type:content-transfer-encoding; bh=YDmyvEgTyVTHaCoBqVb0VMmEhxIbUcYAVgJ9Q/pnSt0=; b=FxBtxCnqTKu1LTg35zMRK9cTXmdPl+IedHsl+14lWI5z3kuhYmhWSvx1himGMMHO8E O9+aRqMhHuoxOK6Pd3ODoj6K4HdWVN/B8NcXZNBveoKOdt7a4E2SOwWqi+Lzke/8di4p qnBORhTDK9Zs3CbCDVgukuYFByk2CiMp+YjH5abZP6YraN9IYrT6paLSbMe9j70mLldd HXpity8XnfsNNcTZbpDZB+FoyW5rUtPczGr3h4eKfUre0dLuhAvXOThWdkU81b923jkj 7Tbxj0Fkfg5lcettMlB0nrpCpqbirhtwCOMf1tRTzCUqq1YpzqHtvbj3TvEvhq2iu3tp 9cmg==
X-Received: by 10.140.172.3 with SMTP id s3mr66364357qhs.6.1448742172433; Sat, 28 Nov 2015 12:22:52 -0800 (PST)
Received: from [192.168.0.13] (CPEbc4dfba74ed1-CMbc4dfba74ed0.cpe.net.cable.rogers.com. [99.241.125.8]) by smtp.gmail.com with ESMTPSA id e184sm11887905qkb.40.2015.11.28.12.22.51 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 28 Nov 2015 12:22:52 -0800 (PST)
To: Gregory Mirsky <gregory.mirsky@ericsson.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "lime@ietf.org" <lime@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Alia Atlas (akatlas@gmail.com)" <akatlas@gmail.com>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com> <7347100B5761DC41A166AC17F22DF1122194A461@eusaamb103.ericsson.se>
From: Tom Taylor <tom.taylor.stds@gmail.com>
Message-ID: <565A0D1B.2050509@gmail.com>
Date: Sat, 28 Nov 2015 15:22:51 -0500
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <7347100B5761DC41A166AC17F22DF1122194A461@eusaamb103.ericsson.se>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/KOpH8m1uab9bvJ36NP01Xtr29J0>
Cc: "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>
Subject: Re: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Nov 2015 20:22:54 -0000

The charter as I understand it says that LIME shapes the tool 
development, which is the other way around from what you propose.

Tom Taylor

On 28/11/2015 11:38 AM, Gregory Mirsky wrote:
> Dear All,
> this work underlines, in my opinion, one fundamental question that LIME WG been discussing for quite some time. Is data model of the particular OAM or  for that OAM? If the latter, then we will be developing OAM protocols to much whatever data model been created. Does that sound right? I think that we first build up OAM tool box and then describe its data model with YANG. If thatâ€™s the other way around, we may end up with cart before the horse.
>
>                  Regards,
>                                  Greg
>
> From: Lime [mailto:lime-bounces@ietf.org] On Behalf Of Carlos Pignataro (cpignata)
> Sent: Saturday, November 28, 2015 6:50 AM
> To: lime@ietf.org
> Cc: draft-xia-sfc-yang-oam@ietf.org
> Subject: [Lime] Fwd: [sfc] New Version Notification for draft-xia-sfc-yang-oam-04.txt
>
> FYI.
>
>
> Begin forwarded message:
>
> From: "Xialiang (Frank)" <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>
> Date: November 26, 2015 at 3:12:19 AM EST
> To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
> Subject: [sfc] è½¬å‘: New Version Notification for draft-xia-sfc-yang-oam-04.txt
>
> Hi all,
> We update a new -04 version of this draft. Until now, this draft is focused on proposing the SFC specific OAM YANG model by inheriting and extending the existing work of SFC YANG model and LIME OAM YANG model. So, this draft will keep on being synchronized with the latest update of the related work of LIME and SFC YANG models. Meanwhile, the sfc oam framework and specific functions are also very important to be considered.
> Your review and comments on this draft are greatly appreciated!
>
...


From nobody Sat Nov 28 17:50:34 2015
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E9221B3913; Sat, 28 Nov 2015 17:50:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.2
X-Spam-Level: 
X-Spam-Status: No, score=-104.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nvzZfr4quAIJ; Sat, 28 Nov 2015 17:50:30 -0800 (PST)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91A091B3911; Sat, 28 Nov 2015 17:50:30 -0800 (PST)
X-AuditID: c6180641-f799c6d000007d66-52-565a59e3a04c
Received: from EUSAAHC002.ericsson.se (Unknown_Domain [147.117.188.78]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 74.7E.32102.3E95A565; Sun, 29 Nov 2015 02:50:27 +0100 (CET)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC002.ericsson.se ([147.117.188.78]) with mapi id 14.03.0248.002; Sat, 28 Nov 2015 20:50:28 -0500
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: Tom Taylor <tom.taylor.stds@gmail.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "lime@ietf.org" <lime@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Alia Atlas (akatlas@gmail.com)" <akatlas@gmail.com>
Thread-Topic: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRKhqRDy+o9sXnFkGwAACFqeWDY56yOnqg
Date: Sun, 29 Nov 2015 01:50:28 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF1122194A7F9@eusaamb103.ericsson.se>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com> <7347100B5761DC41A166AC17F22DF1122194A461@eusaamb103.ericsson.se> <565A0D1B.2050509@gmail.com>
In-Reply-To: <565A0D1B.2050509@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.11]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprEIsWRmVeSWpSXmKPExsUyuXSPn+7jyKgwg6eNthafHl5itvj0bgeL xf+WGWwWHdu2M1k8ebCV3eLC+l8sDmweU35vZPXYOesuu8eSJT+ZApijuGxSUnMyy1KL9O0S uDIW3oksWCBb0dH9hKWB8YBMFyMnh4SAicTT+ydYIGwxiQv31rN1MXJxCAkcYZR49vI5K4Sz nFFi87kXzCBVbAJGEi829rCDJEQEbjBK3Nz/khEkwSzgLvFj1VawImGBaInLL9czdTFyABXF SNy84g0SFgHq/XD8Idg2FgFViWNTe8FaeQV8JVa/6oFa9ppR4srOlYwgvZwCmhKtU/VAahiB rvt+ag0TxCpxiVtP5jNBXC0gsWTPeWYIW1Ti5eN/rBC2ksTH3/PZQcYwA41Zv0sfolVRYkr3 Q3aItYISJ2c+YZnAKDYLydRZCB2zkHTMQtKxgJFlFSNHaXFBTm66keEmRmBMHZNgc9zBuLfX 8xCjAAejEg/vBonIMCHWxLLiytxDjBIczEoivP2sUWFCvCmJlVWpRfnxRaU5qcWHGKU5WJTE eRkZGBiEBNITS1KzU1MLUotgskwcnFINjAY7X1+Zk7Ax9++D1awTD8X3xxTLTd8z0yB12V1L 1qz++jAj1ZXHb01fyN1ylud2WItKhBEPc4iIA+O7ztq/Jvlepw9P4Be6OEv1geax5E3z90rr 8qptDz/Yc89YyVQ46n+EQDLXRn+x/2vCrB82lX421H++IOdXrNjqZwcuTli1Smnu+Wux+5VY ijMSDbWYi4oTAWkQU0KlAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cPc-NxBHTbdMDNRq7bq5DrBFgxE>
Cc: "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>
Subject: Re: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Nov 2015 01:50:32 -0000
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From nobody Mon Nov 30 16:50:32 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75B881B34CE; Mon, 30 Nov 2015 16:50:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GEdmrC4TSsMj; Mon, 30 Nov 2015 16:50:20 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0F011B34D0; Mon, 30 Nov 2015 16:50:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25079; q=dns/txt; s=iport; t=1448931019; x=1450140619; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=gstaCFs8IYC3JTN+zp4bDHpce9JqchzqIlqmCB7qg60=; b=VjSl8wEMiPkRavLTVTLFmaIFLLVM1FDb1RaUn1lTlJjW7rOWOPn0z7VL zvmADMvmdQnOAIXjje0MdO+w/rapwkWh3dJZZGEYgWY+YmwRDbAhV1C6g m7BOGOw8l4nSp7QyxgdJ/15bwggRGPoDd5+iFHZuR7iRQGENO/DTXaS+a A=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DAAgBq7VxW/4QNJK1egm5NU28GviwOg?= =?us-ascii?q?WYXAQmFbgKBODgUAQEBAQEBAYEKhDQBAQEDAQEBASBLCQIFCwIBBgIRAwEBAQE?= =?us-ascii?q?gBwMCAiEGCxQJCAIEDgUOiAsDCggNjWudNYwZDYRXAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBDwmGVIIQgm6CU4IoDQkIglwvgRUBBI0iiTUBgl2BYmqGF4F3gVtJg3m?= =?us-ascii?q?Na4ECg2WDcQERDgFDhARyAYRpgQcBAQE?=
X-IronPort-AV: E=Sophos;i="5.20,366,1444694400";  d="asc'?scan'208,217";a="51462870"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 01 Dec 2015 00:50:18 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id tB10oIBd015436 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 1 Dec 2015 00:50:18 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 30 Nov 2015 19:50:17 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Mon, 30 Nov 2015 19:50:17 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Gregory Mirsky <gregory.mirsky@ericsson.com>
Thread-Topic: [Lime] [sfc] New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRK9I/FSGx9N11wUGyGKVx3bSXVg==
Date: Tue, 1 Dec 2015 00:50:17 +0000
Message-ID: <7F42DD05-8A43-493B-B7D7-B193A32A1D18@cisco.com>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com> <7347100B5761DC41A166AC17F22DF1122194A478@eusaamb103.ericsson.se>
In-Reply-To: <7347100B5761DC41A166AC17F22DF1122194A478@eusaamb103.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.224.185]
Content-Type: multipart/signed; boundary="Apple-Mail=_F2916CC4-1A10-49FC-8532-14A1A002AC5F"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/f-waF2pGYqE9I23kGygzUcypM40>
Cc: "yang-coord@ietf.org" <yang-coord@ietf.org>, "lime@ietf.org" <lime@ietf.org>, "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [sfc] [Lime] New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2015 00:50:24 -0000

--Apple-Mail=_F2916CC4-1A10-49FC-8532-14A1A002AC5F
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_932F8BD3-34E8-49C2-832A-3BF3F4CF971D"


--Apple-Mail=_932F8BD3-34E8-49C2-832A-3BF3F4CF971D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Greg,

Given the right abstraction, the cart and the horse can go in parallel.

The existence of a YANG model, if well designed, should not constrained =
the potential future development of a new protocol (it might =
modify/augment the model, or not). Conversely, a (potential) design of a =
new protocol should not stop the development of the data model.

Thanks,

=E2=80=94 Carlos.

> On Nov 28, 2015, at 11:39 AM, Gregory Mirsky =
<gregory.mirsky@ericsson.com> wrote:
>=20
> +yang-coord
>=20
> From: Gregory Mirsky
> Sent: Saturday, November 28, 2015 8:38 AM
> To: 'Carlos Pignataro (cpignata)'; lime@ietf.org =
<mailto:lime@ietf.org>; 'sfc@ietf.org <mailto:sfc@ietf.org>'; Alia Atlas =
(akatlas@gmail.com <mailto:akatlas@gmail.com>)
> Cc: draft-xia-sfc-yang-oam@ietf.org =
<mailto:draft-xia-sfc-yang-oam@ietf.org>
> Subject: RE: [Lime] Fwd: [sfc] New Version Notification for =
draft-xia-sfc-yang-oam-04.txt
>=20
> Dear All,
> this work underlines, in my opinion, one fundamental question that =
LIME WG been discussing for quite some time. Is data model of the =
particular OAM or  for that OAM? If the latter, then we will be =
developing OAM protocols to much whatever data model been created. Does =
that sound right? I think that we first build up OAM tool box and then =
describe its data model with YANG. If that=E2=80=99s the other way =
around, we may end up with cart before the horse.
>=20
>                 Regards,
>                                 Greg
>=20
> From: Lime [mailto:lime-bounces@ietf.org =
<mailto:lime-bounces@ietf.org>] On Behalf Of Carlos Pignataro (cpignata)
> Sent: Saturday, November 28, 2015 6:50 AM
> To: lime@ietf.org <mailto:lime@ietf.org>
> Cc: draft-xia-sfc-yang-oam@ietf.org =
<mailto:draft-xia-sfc-yang-oam@ietf.org>
> Subject: [Lime] Fwd: [sfc] New Version Notification for =
draft-xia-sfc-yang-oam-04.txt
>=20
> FYI.
>=20
>=20
> Begin forwarded message:
>=20
> From: "Xialiang (Frank)" <frank.xialiang@huawei.com =
<mailto:frank.xialiang@huawei.com>>
> Date: November 26, 2015 at 3:12:19 AM EST
> To: "sfc@ietf.org <mailto:sfc@ietf.org>" <sfc@ietf.org =
<mailto:sfc@ietf.org>>
> Subject: [sfc] =E8=BD=AC=E5=8F=91: New Version Notification for =
draft-xia-sfc-yang-oam-04.txt
>=20
> Hi all,
> We update a new -04 version of this draft. Until now, this draft is =
focused on proposing the SFC specific OAM YANG model by inheriting and =
extending the existing work of SFC YANG model and LIME OAM YANG model. =
So, this draft will keep on being synchronized with the latest update of =
the related work of LIME and SFC YANG models. Meanwhile, the sfc oam =
framework and specific functions are also very important to be =
considered.
> Your review and comments on this draft are greatly appreciated!
>=20
> B.R.
> Frank
>=20
> -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
> =E5=8F=91=E4=BB=B6=E4=BA=BA: internet-drafts@ietf.org =
<mailto:internet-drafts@ietf.org> [mailto:internet-drafts@ietf.org =
<mailto:internet-drafts@ietf.org>]
> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2015=E5=B9=B411=E6=9C=8826=E6=97=A5=
 15:25
> =E6=94=B6=E4=BB=B6=E4=BA=BA: Xialiang (Frank); Mohamed Boucadair; =
Deepak Kumar; Qin Wu; wangzitao
> =E4=B8=BB=E9=A2=98: New Version Notification for =
draft-xia-sfc-yang-oam-04.txt
>=20
>=20
> A new version of I-D, draft-xia-sfc-yang-oam-04.txt has been =
successfully submitted by Liang Xia and posted to the IETF repository.
>=20
> Name:              draft-xia-sfc-yang-oam
> Revision:         04
> Title:                YANG Data Model for SFC Operations, =
Administration, and Maintenance (OAM)
> Document date:          2015-11-25
> Group:             Individual Submission
> Pages:              21
> URL:            =
https://www.ietf.org/internet-drafts/draft-xia-sfc-yang-oam-04.txt =
<https://www.ietf.org/internet-drafts/draft-xia-sfc-yang-oam-04.txt>
> Status:         =
https://datatracker.ietf.org/doc/draft-xia-sfc-yang-oam/ =
<https://datatracker.ietf.org/doc/draft-xia-sfc-yang-oam/>
> Htmlized:       https://tools.ietf.org/html/draft-xia-sfc-yang-oam-04 =
<https://tools.ietf.org/html/draft-xia-sfc-yang-oam-04>
> Diff:           =
https://www.ietf.org/rfcdiff?url2=3Ddraft-xia-sfc-yang-oam-04 =
<https://www.ietf.org/rfcdiff?url2=3Ddraft-xia-sfc-yang-oam-04>
>=20
> Abstract:
>   This document defines YANG data model for Service Function Chaining
>   (SFC Operations, Administration, and Maintenance (OAM).  It extends
>   from the basic YANG data model for Layer independent OAM Management
>   defined in [I-D.ietf-lime-yang-oam-model] with SFC technology
>   specifics.  It includes SFC OAM related configuration, state, and =
RPC
>   information data.
>=20
>=20
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission until the htmlized version and diff are available at =
tools.ietf.org <http://tools.ietf.org/>.
>=20
> The IETF Secretariat
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>

--Apple-Mail=_932F8BD3-34E8-49C2-832A-3BF3F4CF971D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Greg,<div class=3D""><br class=3D""></div><div class=3D"">Given=
 the right abstraction, the cart and the horse can go in =
parallel.</div><div class=3D""><br class=3D""></div><div class=3D"">The =
existence of a YANG model, if well designed, should not constrained the =
potential future development of a new protocol (it might modify/augment =
the model, or not). Conversely, a (potential) design of a new protocol =
should not stop the development of the data model.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Thanks,</div><div =
class=3D""><br class=3D""></div><div class=3D"">=E2=80=94 =
Carlos.</div><div class=3D""><br class=3D""><div><blockquote type=3D"cite"=
 class=3D""><div class=3D"">On Nov 28, 2015, at 11:39 AM, Gregory Mirsky =
&lt;<a href=3D"mailto:gregory.mirsky@ericsson.com" =
class=3D"">gregory.mirsky@ericsson.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D"">+yang-coord<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div class=3D""><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;" class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><b class=3D""><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif;" class=3D"">From:</span></b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif;" =
class=3D""><span class=3D"Apple-converted-space">&nbsp;</span>Gregory =
Mirsky<span class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><b=
 class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Saturday, November 28, 2015 =
8:38 AM<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>'Carlos Pignataro =
(cpignata)';<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:lime@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">lime@ietf.org</a>; '<a href=3D"mailto:sfc@ietf.org"=
 style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc@ietf.org</a>'; Alia Atlas (<a =
href=3D"mailto:akatlas@gmail.com" style=3D"color: purple; =
text-decoration: underline;" class=3D"">akatlas@gmail.com</a>)<br =
class=3D""><b class=3D"">Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:draft-xia-sfc-yang-oam@ietf.org" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">draft-xia-sfc-yang-oam@ietf.org</a><br class=3D""><b =
class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>RE: [Lime] Fwd: [sfc] New =
Version Notification for draft-xia-sfc-yang-oam-04.txt<o:p =
class=3D""></o:p></span></div></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D"">Dear All,<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" class=3D"">this work underlines, in my opinion, one =
fundamental question that LIME WG been discussing for quite some time. =
Is data model<span class=3D"Apple-converted-space">&nbsp;</span><b =
class=3D""><u class=3D"">of</u></b><span =
class=3D"Apple-converted-space">&nbsp;</span>the particular OAM or<span =
class=3D"Apple-converted-space">&nbsp;</span><b class=3D""><u =
class=3D"">&nbsp;for<span =
class=3D"Apple-converted-space">&nbsp;</span></u></b>that OAM? If the =
latter, then we will be developing OAM protocols to much whatever data =
model been created. Does that sound right? I think that we first build =
up OAM tool box and then describe its data model with YANG. If that=E2=80=99=
s the other way around, we may end up with cart before the horse.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; Regards,<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Greg<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div class=3D""><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;" class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><b class=3D""><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif;" class=3D"">From:</span></b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif;" =
class=3D""><span class=3D"Apple-converted-space">&nbsp;</span>Lime [<a =
href=3D"mailto:lime-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mailto:lime-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b class=3D"">On Behalf =
Of<span class=3D"Apple-converted-space">&nbsp;</span></b>Carlos =
Pignataro (cpignata)<br class=3D""><b class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Saturday, November 28, 2015 =
6:50 AM<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:lime@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">lime@ietf.org</a><br class=3D""><b =
class=3D"">Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:draft-xia-sfc-yang-oam@ietf.org" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">draft-xia-sfc-yang-oam@ietf.org</a><br class=3D""><b =
class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>[Lime] Fwd: [sfc] New =
Version Notification for draft-xia-sfc-yang-oam-04.txt<o:p =
class=3D""></o:p></span></div></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">FYI.<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
class=3D""><blockquote style=3D"margin-top: 5pt; margin-bottom: 5pt;" =
class=3D""><div class=3D""><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">Begin =
forwarded message:<o:p class=3D""></o:p></div></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><b class=3D""><span style=3D"font-family: =
Helvetica, sans-serif;" class=3D"">From:<span =
class=3D"Apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">"Xialiang =
(Frank)" &lt;<a href=3D"mailto:frank.xialiang@huawei.com" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">frank.xialiang@huawei.com</a>&gt;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Date:<span =
class=3D"Apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">November 26, =
2015 at 3:12:19 AM EST</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><b class=3D""><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">To:<span =
class=3D"Apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">"<a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">sfc@ietf.org</a>" &lt;<a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">sfc@ietf.org</a>&gt;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Subject: [sfc]<span =
class=3D"Apple-converted-space">&nbsp;</span></span></b><b =
class=3D""><span style=3D"font-family: MingLiU;" =
class=3D"">=E8=BD=AC=E5=8F=91</span></b><b class=3D""><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">: New Version =
Notification for draft-xia-sfc-yang-oam-04.txt</span></b><o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">Hi all,<br class=3D"">We update a new -04 =
version of this draft. Until now, this draft is focused on proposing the =
SFC specific OAM YANG model by inheriting and extending the existing =
work of SFC YANG model and LIME OAM YANG model. So, this draft will keep =
on being synchronized with the latest update of the related work of LIME =
and SFC YANG models. Meanwhile, the sfc oam framework and specific =
functions are also very important to be considered.<br class=3D"">Your =
review and comments on this draft are greatly appreciated!<br =
class=3D""><br class=3D"">B.R.<br class=3D"">Frank<br class=3D""><br =
class=3D"">-----<span style=3D"font-family: PMingLiU, serif;" =
class=3D"">=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6</span>-----<br =
class=3D""><span style=3D"font-family: PMingLiU, serif;" =
class=3D"">=E5=8F=91=E4=BB=B6=E4=BA=BA</span>:<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:internet-drafts@ietf.org" style=3D"color: purple; =
text-decoration: underline;" class=3D"">internet-drafts@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:internet-drafts@ietf.org" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mailto:internet-drafts@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><span =
style=3D"font-family: PMingLiU, serif;" class=3D"">=E5=8F=91=E9=80=81=E6=97=
=B6=E9=97=B4</span>: 2015<span style=3D"font-family: 'MS Mincho';" =
class=3D"">=E5=B9=B4</span>11<span style=3D"font-family: 'MS Mincho';" =
class=3D"">=E6=9C=88</span>26<span style=3D"font-family: 'MS Mincho';" =
class=3D"">=E6=97=A5</span><span =
class=3D"Apple-converted-space">&nbsp;</span>15:25<br class=3D""><span =
style=3D"font-family: 'MS Mincho';" class=3D"">=E6=94=B6=E4=BB=B6=E4=BA=BA=
</span>: Xialiang (Frank); Mohamed Boucadair; Deepak Kumar; Qin Wu; =
wangzitao<br class=3D""><span style=3D"font-family: 'MS Mincho';" =
class=3D"">=E4=B8=BB</span><span style=3D"font-family: PMingLiU, serif;" =
class=3D"">=E9=A2=98</span>: New Version Notification for =
draft-xia-sfc-yang-oam-04.txt<br class=3D""><br class=3D""><br =
class=3D"">A new version of I-D, draft-xia-sfc-yang-oam-04.txt has been =
successfully submitted by Liang Xia and posted to the IETF =
repository.<br class=3D""><br class=3D"">Name:<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>draft-xia-sfc-yang-oam=
<br class=3D"">Revision:<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<=
span class=3D"Apple-converted-space">&nbsp;</span></span>04<br =
class=3D"">Title:<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>YANG Data Model for =
SFC Operations, Administration, and Maintenance (OAM)<br =
class=3D"">Document date:<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>2015-11-25<br =
class=3D"">Group:<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>Individual =
Submission<br class=3D"">Pages:<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>21<br class=3D"">URL: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/internet-drafts/draft-xia-sfc-yang-oam-04.txt=
" style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/internet-drafts/draft-xia-sfc-yang-oam-04.=
txt</a><br class=3D"">Status: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-xia-sfc-yang-oam/" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://datatracker.ietf.org/doc/draft-xia-sfc-yang-oam/</a><br=
 class=3D"">Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-xia-sfc-yang-oam-04" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://tools.ietf.org/html/draft-xia-sfc-yang-oam-04</a><br =
class=3D"">Diff: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-xia-sfc-yang-oam-04" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-xia-sfc-yang-oam-04</=
a><br class=3D""><br class=3D"">Abstract:<br class=3D"">&nbsp;&nbsp;This =
document defines YANG data model for Service Function Chaining<br =
class=3D"">&nbsp;&nbsp;(SFC Operations, Administration, and Maintenance =
(OAM). &nbsp;It extends<br class=3D"">&nbsp;&nbsp;from the basic YANG =
data model for Layer independent OAM Management<br =
class=3D"">&nbsp;&nbsp;defined in [I-D.ietf-lime-yang-oam-model] with =
SFC technology<br class=3D"">&nbsp;&nbsp;specifics. &nbsp;It includes =
SFC OAM related configuration, state, and RPC<br =
class=3D"">&nbsp;&nbsp;information data.<br class=3D""><br class=3D""><br =
class=3D""><br class=3D""><br class=3D"">Please note that it may take a =
couple of minutes from the time of submission until the htmlized version =
and diff are available at<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://tools.ietf.org/" style=3D"color: purple; text-decoration: =
underline;" class=3D"">tools.ietf.org</a>.<br class=3D""><br =
class=3D"">The IETF Secretariat<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a></div></div></div>=
</blockquote></div></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_932F8BD3-34E8-49C2-832A-3BF3F4CF971D--

--Apple-Mail=_F2916CC4-1A10-49FC-8532-14A1A002AC5F
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=yfW2
-----END PGP SIGNATURE-----

--Apple-Mail=_F2916CC4-1A10-49FC-8532-14A1A002AC5F--


From nobody Mon Nov 30 16:59:17 2015
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D6261B3506; Mon, 30 Nov 2015 16:59:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n3IZICMJYTl0; Mon, 30 Nov 2015 16:59:12 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCA501B3505; Mon, 30 Nov 2015 16:59:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12843; q=dns/txt; s=iport; t=1448931551; x=1450141151; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Q/XJ8Fpn+JvAa9BffLjILBh0oPW98/ir6+lS88ma2xs=; b=ERNJLJxVO173rexe9T3E3o7952ynToFXi+JKsBDVK7zHiHsjWiDap/kA I02/xhAsbHHl4yfTVX7Mj+RXokc5Rg0o36fvWMOKovUQkniH7jlLbdklw q2xF+stzHElB0NU0ik8JgwAnrqO3rGccioR8ENXMOXaaMqA17uP2r/9jS 8=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AkBQAw8FxW/40NJK1egzuBQga+OoFmh?= =?us-ascii?q?g8CgTg5EwEBAQEBAQGBCoQ0AQEBAwEjVAIFBwQCAQYCEQMBAQEBJwMCAiERFAk?= =?us-ascii?q?IAgQOBQ6ICwMKCI1snTWMGg2EVwEBAQEBAQEBAQEBAQEBAQEBAQEBAQ8JhlSCE?= =?us-ascii?q?IJuglOCKBaCZC+BFQEEkm+DaAGCXYFihwGBd4Fbki2BAoNlg3EBIwE/gkSBQHI?= =?us-ascii?q?BhGmBBwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.20,366,1444694400";  d="asc'?scan'208,217";a="213482802"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 01 Dec 2015 00:59:10 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id tB10xAWP014375 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 1 Dec 2015 00:59:10 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 30 Nov 2015 19:59:09 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.000; Mon, 30 Nov 2015 19:59:09 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Gregory Mirsky <gregory.mirsky@ericsson.com>
Thread-Topic: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRKhqQOpxvFMYDJUmlyT6Azh2+iJ6ykEEAgAMWU4A=
Date: Tue, 1 Dec 2015 00:59:09 +0000
Message-ID: <DBCAE596-39BB-4E78-BCE3-888EDDBCC45C@cisco.com>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com> <7347100B5761DC41A166AC17F22DF1122194A461@eusaamb103.ericsson.se> <565A0D1B.2050509@gmail.com> <7347100B5761DC41A166AC17F22DF1122194A7F9@eusaamb103.ericsson.se>
In-Reply-To: <7347100B5761DC41A166AC17F22DF1122194A7F9@eusaamb103.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.224.185]
Content-Type: multipart/signed; boundary="Apple-Mail=_900347A0-533A-4019-9A63-1FBDA8CE7FDE"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AGRzgkvIlW8EBpEm95pBYXm-hlo>
Cc: Alia Atlas <akatlas@gmail.com>, "lime@ietf.org" <lime@ietf.org>, "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Tom Taylor <tom.taylor.stds@gmail.com>
Subject: Re: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2015 00:59:14 -0000

--Apple-Mail=_900347A0-533A-4019-9A63-1FBDA8CE7FDE
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_1F344FB1-5062-498F-8286-533C05C95FC5"


--Apple-Mail=_1F344FB1-5062-498F-8286-533C05C95FC5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Greg,

=E2=80=9CForcing=E2=80=9D seems like hyperbole. (force /f=C3=B4rs/verb =
2. make (someone) do something against their will.)

=E2=80=9CArbitrary=E2=80=9D seems like fallacy, (ar=C2=B7bi=C2=B7trar=C2=B7=
y, adjective: based on random choice or personal whim, rather than any =
reason or system)

A well designed data model can most certainly guide (guide /=C9=A1=C4=ABd/=
 1. show or indicate the way to (someone). 2. direct or have an =
influence on the course of action of (someone or something)) =E2=80=9Cothe=
r IETF working groups developing new OAM protocols or modifying existing =
OAM protocols, at any layer and for any technology=E2=80=9D (as per =
charter).

And as per charter, =E2=80=9CYANG model(s) specified in this working =
group must be usable and extensible by the existing OAM technologies=E2=80=
=9D

Works both ways.

My personal opinion wearing no hats.

Thanks,

=E2=80=94 Carlos.

> On Nov 28, 2015, at 8:50 PM, Gregory Mirsky =
<gregory.mirsky@ericsson.com> wrote:
>=20
> Hi Tom,
> "guidance" is neither defining OAM protocols, nor forcing arbitrary =
model onto ones that already had been developed at IETF WGs (in general =
I compare creation of YANG data model to writing MIB - ones protocol or =
service are stable, we start and do it fast). That's my interpretation =
of LIME WG charter and, AFAIK, being stressed by our AD and chairs. But =
I may be wrong. Let's listen to what others would like to add to the =
discussion.
>=20
> 	Regards,
> 		Greg
>=20
> -----Original Message-----
> From: Tom Taylor [mailto:tom.taylor.stds@gmail.com]
> Sent: Saturday, November 28, 2015 12:23 PM
> To: Gregory Mirsky; Carlos Pignataro (cpignata); lime@ietf.org; =
sfc@ietf.org; Alia Atlas (akatlas@gmail.com)
> Cc: draft-xia-sfc-yang-oam@ietf.org
> Subject: Re: [sfc] [Lime] Fwd: New Version Notification for =
draft-xia-sfc-yang-oam-04.txt
>=20
> The charter as I understand it says that LIME shapes the tool =
development, which is the other way around from what you propose.
>=20
> Tom Taylor
>=20
> On 28/11/2015 11:38 AM, Gregory Mirsky wrote:
>> Dear All,
>> this work underlines, in my opinion, one fundamental question that =
LIME WG been discussing for quite some time. Is data model of the =
particular OAM or  for that OAM? If the latter, then we will be =
developing OAM protocols to much whatever data model been created. Does =
that sound right? I think that we first build up OAM tool box and then =
describe its data model with YANG. If that=E2=80=99s the other way =
around, we may end up with cart before the horse.
>>=20
>>                 Regards,
>>                                 Greg
>>=20
>> From: Lime [mailto:lime-bounces@ietf.org] On Behalf Of Carlos
>> Pignataro (cpignata)
>> Sent: Saturday, November 28, 2015 6:50 AM
>> To: lime@ietf.org
>> Cc: draft-xia-sfc-yang-oam@ietf.org
>> Subject: [Lime] Fwd: [sfc] New Version Notification for
>> draft-xia-sfc-yang-oam-04.txt
>>=20
>> FYI.
>>=20
>>=20
>> Begin forwarded message:
>>=20
>> From: "Xialiang (Frank)"
>> <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>
>> Date: November 26, 2015 at 3:12:19 AM EST
>> To: "sfc@ietf.org<mailto:sfc@ietf.org>"
>> <sfc@ietf.org<mailto:sfc@ietf.org>>
>> Subject: [sfc] =E8=BD=AC=E5=8F=91: New Version Notification for
>> draft-xia-sfc-yang-oam-04.txt
>>=20
>> Hi all,
>> We update a new -04 version of this draft. Until now, this draft is =
focused on proposing the SFC specific OAM YANG model by inheriting and =
extending the existing work of SFC YANG model and LIME OAM YANG model. =
So, this draft will keep on being synchronized with the latest update of =
the related work of LIME and SFC YANG models. Meanwhile, the sfc oam =
framework and specific functions are also very important to be =
considered.
>> Your review and comments on this draft are greatly appreciated!
>>=20
> ...


--Apple-Mail=_1F344FB1-5062-498F-8286-533C05C95FC5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Greg,<div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=9CForcing=E2=80=9D seems like hyperbole. (force /<span =
class=3D"lr_dct_ph">f=C3=B4rs/</span><span class=3D"lr_dct_spkr =
lr_dct_spkr_off" title=3D"Listen" =
data-log-string=3D"pronunciation-icon-click" jsaction=3D"dob.p" =
style=3D"display: inline-block;"><i class=3D"">verb 2.&nbsp;</i>make =
(someone) do something against their will.)</span></div><div =
class=3D""><br class=3D""></div><div class=3D"">=E2=80=9CArbitrary=E2=80=9D=
 seems like fallacy, (ar=C2=B7bi=C2=B7trar=C2=B7y,&nbsp;<i =
class=3D"">adjective</i>:<b class=3D"">&nbsp;</b><div data-dobid=3D"dfn" =
style=3D"display: inline;" class=3D"">based on random choice or personal =
whim, rather than any reason or system</div>)</div><div class=3D""><br =
class=3D""></div><div class=3D"">A well designed data model can most =
certainly guide (guide /=C9=A1=C4=ABd/ 1. show or indicate the way to =
(someone). 2. direct or have an influence on the course of action of =
(someone or something)) =E2=80=9Cother IETF working groups developing =
new OAM protocols or modifying existing OAM protocols, at any layer and =
for any technology=E2=80=9D (as per charter).</div><div class=3D""><br =
class=3D""></div><div class=3D"">And as per charter, =E2=80=9CYANG =
model(s) specified in this working group must be usable and extensible =
by the existing OAM technologies=E2=80=9D</div><div class=3D""><br =
class=3D""></div><div class=3D"">Works both ways.</div><div class=3D""><br=
 class=3D""></div><div class=3D"">My personal opinion wearing no =
hats.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div><div class=3D""><br =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D"">On =
Nov 28, 2015, at 8:50 PM, Gregory Mirsky &lt;<a =
href=3D"mailto:gregory.mirsky@ericsson.com" =
class=3D"">gregory.mirsky@ericsson.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hi =
Tom,<br class=3D"">"guidance" is neither defining OAM protocols, nor =
forcing arbitrary model onto ones that already had been developed at =
IETF WGs (in general I compare creation of YANG data model to writing =
MIB - ones protocol or service are stable, we start and do it fast). =
That's my interpretation of LIME WG charter and, AFAIK, being stressed =
by our AD and chairs. But I may be wrong. Let's listen to what others =
would like to add to the discussion.<br class=3D""><br class=3D""><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Regards,<br class=3D""><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>Greg<br class=3D""><br =
class=3D"">-----Original Message-----<br class=3D"">From: Tom Taylor [<a =
href=3D"mailto:tom.taylor.stds@gmail.com" =
class=3D"">mailto:tom.taylor.stds@gmail.com</a>] <br class=3D"">Sent: =
Saturday, November 28, 2015 12:23 PM<br class=3D"">To: Gregory Mirsky; =
Carlos Pignataro (cpignata); <a href=3D"mailto:lime@ietf.org" =
class=3D"">lime@ietf.org</a>; <a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a>; Alia Atlas (<a =
href=3D"mailto:akatlas@gmail.com" class=3D"">akatlas@gmail.com</a>)<br =
class=3D"">Cc: <a href=3D"mailto:draft-xia-sfc-yang-oam@ietf.org" =
class=3D"">draft-xia-sfc-yang-oam@ietf.org</a><br class=3D"">Subject: =
Re: [sfc] [Lime] Fwd: New Version Notification for =
draft-xia-sfc-yang-oam-04.txt<br class=3D""><br class=3D"">The charter =
as I understand it says that LIME shapes the tool development, which is =
the other way around from what you propose.<br class=3D""><br =
class=3D"">Tom Taylor<br class=3D""><br class=3D"">On 28/11/2015 11:38 =
AM, Gregory Mirsky wrote:<br class=3D""><blockquote type=3D"cite" =
class=3D"">Dear All,<br class=3D"">this work underlines, in my opinion, =
one fundamental question that LIME WG been discussing for quite some =
time. Is data model of the particular OAM or &nbsp;for that OAM? If the =
latter, then we will be developing OAM protocols to much whatever data =
model been created. Does that sound right? I think that we first build =
up OAM tool box and then describe its data model with YANG. If that=E2=80=99=
s the other way around, we may end up with cart before the horse.<br =
class=3D""><br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;Regards,<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Greg<br class=3D""><br =
class=3D"">From: Lime [<a href=3D"mailto:lime-bounces@ietf.org" =
class=3D"">mailto:lime-bounces@ietf.org</a>] On Behalf Of Carlos <br =
class=3D"">Pignataro (cpignata)<br class=3D"">Sent: Saturday, November =
28, 2015 6:50 AM<br class=3D"">To: <a href=3D"mailto:lime@ietf.org" =
class=3D"">lime@ietf.org</a><br class=3D"">Cc: <a =
href=3D"mailto:draft-xia-sfc-yang-oam@ietf.org" =
class=3D"">draft-xia-sfc-yang-oam@ietf.org</a><br class=3D"">Subject: =
[Lime] Fwd: [sfc] New Version Notification for <br =
class=3D"">draft-xia-sfc-yang-oam-04.txt<br class=3D""><br =
class=3D"">FYI.<br class=3D""><br class=3D""><br class=3D"">Begin =
forwarded message:<br class=3D""><br class=3D"">From: "Xialiang (Frank)" =
<br class=3D"">&lt;<a href=3D"mailto:frank.xialiang@huawei.com" =
class=3D"">frank.xialiang@huawei.com</a>&lt;<a =
href=3D"mailto:frank.xialiang@huawei.com" =
class=3D"">mailto:frank.xialiang@huawei.com</a>&gt;&gt;<br =
class=3D"">Date: November 26, 2015 at 3:12:19 AM EST<br class=3D"">To: =
"<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a>&lt;<a =
href=3D"mailto:sfc@ietf.org" class=3D"">mailto:sfc@ietf.org</a>&gt;" <br =
class=3D"">&lt;<a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a>&lt;<a href=3D"mailto:sfc@ietf.org" =
class=3D"">mailto:sfc@ietf.org</a>&gt;&gt;<br class=3D"">Subject: [sfc] =
=E8=BD=AC=E5=8F=91: New Version Notification for <br =
class=3D"">draft-xia-sfc-yang-oam-04.txt<br class=3D""><br class=3D"">Hi =
all,<br class=3D"">We update a new -04 version of this draft. Until now, =
this draft is focused on proposing the SFC specific OAM YANG model by =
inheriting and extending the existing work of SFC YANG model and LIME =
OAM YANG model. So, this draft will keep on being synchronized with the =
latest update of the related work of LIME and SFC YANG models. =
Meanwhile, the sfc oam framework and specific functions are also very =
important to be considered.<br class=3D"">Your review and comments on =
this draft are greatly appreciated!<br class=3D""><br =
class=3D""></blockquote>...<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_1F344FB1-5062-498F-8286-533C05C95FC5--

--Apple-Mail=_900347A0-533A-4019-9A63-1FBDA8CE7FDE
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJWXPDdAAoJEIXgpQGOZny9G/kQAJbMsi+oDom084rgu3aZ0MMc
DUYE4vcdopDhjdVZdHi1wlMa/7PNpTGf5Xdhe93fsQc57xmPKEiTLkC+doM+159G
t716x36srhCo7iQbMUBJOl1ex9LyxCbjfUXh247zJ4SbaTlYPEI6rMaQ3/4ccw9x
Vkf5IXLL+J8vm7281JO9wTWmnka85RgFHGfGX7BUctzgRLjYd8nO3qAFO0VoR/7s
LQInJQ5xU2yFCJtYpQNzuICJEm3Q5pdW3c0no0xJ9wR4Zmx5pW6yPehet9Ev9I4i
RVJOYQDbKu/RmRZ5JLZ8Trhv975B4u8D8N3260O9EDShFrIQ/jbYUl8qfuGPPnzd
JsaQZBYs3APCF+fxPJDWyiKSzUxwaD2RWRIBEE2+cxUAc/8a+U+06rqmBYPGjMUd
JTc5YzdZMdD8XAU4s0GyyXMQlF7jqNi+cDDeinXdY31Efid+mJrYolin6y6bbZJg
1/92Z3LBjGAThmCbe+UMN5ohCPvrqKajNj6eabZTXTKmjAvAgbSli36e82OSmmP+
d4PYvO766PcaUQW83+JBJ4VhTmifXxO2yoS8TSA42O2/j2qJ25I0Qd/uaxO1L7kw
XUNA/0z1TheJ76fljnITKFa0eVewFqFIFBcJZaX39AA+0hpgdMcGn7bweid6NGbV
uFdHjr6Ib37sMP32rzQf
=NZsk
-----END PGP SIGNATURE-----

--Apple-Mail=_900347A0-533A-4019-9A63-1FBDA8CE7FDE--


From nobody Mon Nov 30 17:45:37 2015
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD59B1B3647; Mon, 30 Nov 2015 17:45:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.2
X-Spam-Level: 
X-Spam-Status: No, score=-104.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JM9g6kAaIRhZ; Mon, 30 Nov 2015 17:45:33 -0800 (PST)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23D611B3646; Mon, 30 Nov 2015 17:45:33 -0800 (PST)
X-AuditID: c6180641-f799c6d000007d66-17-565cfbb96a09
Received: from EUSAAHC001.ericsson.se (Unknown_Domain [147.117.188.75]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 74.2A.32102.9BBFC565; Tue,  1 Dec 2015 02:45:29 +0100 (CET)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC001.ericsson.se ([147.117.188.75]) with mapi id 14.03.0248.002; Mon, 30 Nov 2015 20:45:30 -0500
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
Thread-Index: AQHRKhqRDy+o9sXnFkGwAACFqeWDY56yOnqggANsGoD//7j7UA==
Date: Tue, 1 Dec 2015 01:45:29 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF1122194BE68@eusaamb103.ericsson.se>
References: <C02846B1344F344EB4FAA6FA7AF481F12AEBB8EB@SZXEMA502-MBS.china.huawei.com> <1FBAAA75-255C-4682-BE55-0FDEA213AA55@cisco.com> <7347100B5761DC41A166AC17F22DF1122194A461@eusaamb103.ericsson.se> <565A0D1B.2050509@gmail.com> <7347100B5761DC41A166AC17F22DF1122194A7F9@eusaamb103.ericsson.se> <DBCAE596-39BB-4E78-BCE3-888EDDBCC45C@cisco.com>
In-Reply-To: <DBCAE596-39BB-4E78-BCE3-888EDDBCC45C@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.10]
Content-Type: multipart/alternative; boundary="_000_7347100B5761DC41A166AC17F22DF1122194BE68eusaamb103erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrHIsWRmVeSWpSXmKPExsUyuXSPt+7O3zFhBhsfWFp8eniJ2eLTux0s Fv9bZrBZdGzbzmTx5MFWdosL63+xOLB5TPm9kdVj56y77B5LlvxkCmCO4rJJSc3JLEst0rdL 4Mq4NX8nU8GMFYwVC259Y2xgvLOYsYuRk0NCwETi4s6Z7BC2mMSFe+vZuhi5OIQEjjBKfO16 wgjhLGeUODNtEhtIFZuAkcSLjT1gHSICZhKNjycxgRQxC1xmlPh/7D0zSEJYIFri8sv1QAkO oKIYiZtXvCHqnSTeLb7DCmKzCKhIrL/1FczmFfCV6F20FWy+kMAjJokrT5JBbE4BW4mV976z gNiMQNd9P7WGCcRmFhCXuPVkPhPE1QISS/acZ4awRSVePv7HCmErSUxaeo4Voj5fonfJPBaI XYISJ2c+YZnAKDoLyahZSMpmISmbBfQBs4CmxPpd+hAlihJTuh+yQ9gaEq1z5rIjiy9gZF/F yFFaXJCTm25kuIkRGIvHJNgcdzDu7fU8xCjAwajEw/vhSkyYEGtiWXFl7iFGCQ5mJRFelSdA Id6UxMqq1KL8+KLSnNTiQ4zSHCxK4ryMDAwMQgLpiSWp2ampBalFMFkmDk6pBka+iun9YnMP 7hXoXrhqbq6h4Jr7J18nfb87NT7HXo29xnqu4RsX+aNxb+db6t/Lsdk/dQ2/rBT/Et0d181c Vr0VPcT70Mz8RqrDogyNndVcX3eclpSYNM83ch3Hwhi31XmhGstvyvokH8o6e6ZAMStWNMXq LPfrA5eLrE7YHLksdXaCyc+w4ntKLMUZiYZazEXFiQCdfjTXwQIAAA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6MCIJiMnlzKhcop46X0aCp_c7oY>
Cc: Alia Atlas <akatlas@gmail.com>, "lime@ietf.org" <lime@ietf.org>, "draft-xia-sfc-yang-oam@ietf.org" <draft-xia-sfc-yang-oam@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Tom Taylor <tom.taylor.stds@gmail.com>
Subject: Re: [sfc] [Lime] Fwd: New Version Notification for draft-xia-sfc-yang-oam-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2015 01:45:36 -0000

--_000_7347100B5761DC41A166AC17F22DF1122194BE68eusaamb103erics_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgQ2FybG9zLA0KbWFueSB0aGFua3Mg4pi6Lg0KDQogICAgICAgICAgICAgICAgUmVnYXJkcywN
CiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgR3JlZw0KDQpGcm9tOiBDYXJsb3MgUGln
bmF0YXJvIChjcGlnbmF0YSkgW21haWx0bzpjcGlnbmF0YUBjaXNjby5jb21dDQpTZW50OiBNb25k
YXksIE5vdmVtYmVyIDMwLCAyMDE1IDQ6NTkgUE0NClRvOiBHcmVnb3J5IE1pcnNreQ0KQ2M6IFRv
bSBUYXlsb3I7IGxpbWVAaWV0Zi5vcmc7IHNmY0BpZXRmLm9yZzsgQWxpYSBBdGxhczsgZHJhZnQt
eGlhLXNmYy15YW5nLW9hbUBpZXRmLm9yZw0KU3ViamVjdDogUmU6IFtzZmNdIFtMaW1lXSBGd2Q6
IE5ldyBWZXJzaW9uIE5vdGlmaWNhdGlvbiBmb3IgZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNC50
eHQNCg0KR3JlZywNCg0K4oCcRm9yY2luZ+KAnSBzZWVtcyBsaWtlIGh5cGVyYm9sZS4gKGZvcmNl
IC9mw7Rycy92ZXJiIDIuIG1ha2UgKHNvbWVvbmUpIGRvIHNvbWV0aGluZyBhZ2FpbnN0IHRoZWly
IHdpbGwuKQ0KDQrigJxBcmJpdHJhcnnigJ0gc2VlbXMgbGlrZSBmYWxsYWN5LCAoYXLCt2Jpwrd0
cmFywrd5LCBhZGplY3RpdmU6DQpiYXNlZCBvbiByYW5kb20gY2hvaWNlIG9yIHBlcnNvbmFsIHdo
aW0sIHJhdGhlciB0aGFuIGFueSByZWFzb24gb3Igc3lzdGVtDQopDQoNCkEgd2VsbCBkZXNpZ25l
ZCBkYXRhIG1vZGVsIGNhbiBtb3N0IGNlcnRhaW5seSBndWlkZSAoZ3VpZGUgL8mhxKtkLyAxLiBz
aG93IG9yIGluZGljYXRlIHRoZSB3YXkgdG8gKHNvbWVvbmUpLiAyLiBkaXJlY3Qgb3IgaGF2ZSBh
biBpbmZsdWVuY2Ugb24gdGhlIGNvdXJzZSBvZiBhY3Rpb24gb2YgKHNvbWVvbmUgb3Igc29tZXRo
aW5nKSkg4oCcb3RoZXIgSUVURiB3b3JraW5nIGdyb3VwcyBkZXZlbG9waW5nIG5ldyBPQU0gcHJv
dG9jb2xzIG9yIG1vZGlmeWluZyBleGlzdGluZyBPQU0gcHJvdG9jb2xzLCBhdCBhbnkgbGF5ZXIg
YW5kIGZvciBhbnkgdGVjaG5vbG9neeKAnSAoYXMgcGVyIGNoYXJ0ZXIpLg0KDQpBbmQgYXMgcGVy
IGNoYXJ0ZXIsIOKAnFlBTkcgbW9kZWwocykgc3BlY2lmaWVkIGluIHRoaXMgd29ya2luZyBncm91
cCBtdXN0IGJlIHVzYWJsZSBhbmQgZXh0ZW5zaWJsZSBieSB0aGUgZXhpc3RpbmcgT0FNIHRlY2hu
b2xvZ2llc+KAnQ0KDQpXb3JrcyBib3RoIHdheXMuDQoNCk15IHBlcnNvbmFsIG9waW5pb24gd2Vh
cmluZyBubyBoYXRzLg0KDQpUaGFua3MsDQoNCuKAlCBDYXJsb3MuDQoNCk9uIE5vdiAyOCwgMjAx
NSwgYXQgODo1MCBQTSwgR3JlZ29yeSBNaXJza3kgPGdyZWdvcnkubWlyc2t5QGVyaWNzc29uLmNv
bTxtYWlsdG86Z3JlZ29yeS5taXJza3lAZXJpY3Nzb24uY29tPj4gd3JvdGU6DQoNCkhpIFRvbSwN
CiJndWlkYW5jZSIgaXMgbmVpdGhlciBkZWZpbmluZyBPQU0gcHJvdG9jb2xzLCBub3IgZm9yY2lu
ZyBhcmJpdHJhcnkgbW9kZWwgb250byBvbmVzIHRoYXQgYWxyZWFkeSBoYWQgYmVlbiBkZXZlbG9w
ZWQgYXQgSUVURiBXR3MgKGluIGdlbmVyYWwgSSBjb21wYXJlIGNyZWF0aW9uIG9mIFlBTkcgZGF0
YSBtb2RlbCB0byB3cml0aW5nIE1JQiAtIG9uZXMgcHJvdG9jb2wgb3Igc2VydmljZSBhcmUgc3Rh
YmxlLCB3ZSBzdGFydCBhbmQgZG8gaXQgZmFzdCkuIFRoYXQncyBteSBpbnRlcnByZXRhdGlvbiBv
ZiBMSU1FIFdHIGNoYXJ0ZXIgYW5kLCBBRkFJSywgYmVpbmcgc3RyZXNzZWQgYnkgb3VyIEFEIGFu
ZCBjaGFpcnMuIEJ1dCBJIG1heSBiZSB3cm9uZy4gTGV0J3MgbGlzdGVuIHRvIHdoYXQgb3RoZXJz
IHdvdWxkIGxpa2UgdG8gYWRkIHRvIHRoZSBkaXNjdXNzaW9uLg0KDQogICAgICAgICAgICBSZWdh
cmRzLA0KICAgICAgICAgICAgICAgICAgICAgICAgR3JlZw0KDQotLS0tLU9yaWdpbmFsIE1lc3Nh
Z2UtLS0tLQ0KRnJvbTogVG9tIFRheWxvciBbbWFpbHRvOnRvbS50YXlsb3Iuc3Rkc0BnbWFpbC5j
b21dDQpTZW50OiBTYXR1cmRheSwgTm92ZW1iZXIgMjgsIDIwMTUgMTI6MjMgUE0NClRvOiBHcmVn
b3J5IE1pcnNreTsgQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpOyBsaW1lQGlldGYub3JnPG1h
aWx0bzpsaW1lQGlldGYub3JnPjsgc2ZjQGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5vcmc+OyBB
bGlhIEF0bGFzIChha2F0bGFzQGdtYWlsLmNvbTxtYWlsdG86YWthdGxhc0BnbWFpbC5jb20+KQ0K
Q2M6IGRyYWZ0LXhpYS1zZmMteWFuZy1vYW1AaWV0Zi5vcmc8bWFpbHRvOmRyYWZ0LXhpYS1zZmMt
eWFuZy1vYW1AaWV0Zi5vcmc+DQpTdWJqZWN0OiBSZTogW3NmY10gW0xpbWVdIEZ3ZDogTmV3IFZl
cnNpb24gTm90aWZpY2F0aW9uIGZvciBkcmFmdC14aWEtc2ZjLXlhbmctb2FtLTA0LnR4dA0KDQpU
aGUgY2hhcnRlciBhcyBJIHVuZGVyc3RhbmQgaXQgc2F5cyB0aGF0IExJTUUgc2hhcGVzIHRoZSB0
b29sIGRldmVsb3BtZW50LCB3aGljaCBpcyB0aGUgb3RoZXIgd2F5IGFyb3VuZCBmcm9tIHdoYXQg
eW91IHByb3Bvc2UuDQoNClRvbSBUYXlsb3INCg0KT24gMjgvMTEvMjAxNSAxMTozOCBBTSwgR3Jl
Z29yeSBNaXJza3kgd3JvdGU6DQoNCkRlYXIgQWxsLA0KdGhpcyB3b3JrIHVuZGVybGluZXMsIGlu
IG15IG9waW5pb24sIG9uZSBmdW5kYW1lbnRhbCBxdWVzdGlvbiB0aGF0IExJTUUgV0cgYmVlbiBk
aXNjdXNzaW5nIGZvciBxdWl0ZSBzb21lIHRpbWUuIElzIGRhdGEgbW9kZWwgb2YgdGhlIHBhcnRp
Y3VsYXIgT0FNIG9yICBmb3IgdGhhdCBPQU0/IElmIHRoZSBsYXR0ZXIsIHRoZW4gd2Ugd2lsbCBi
ZSBkZXZlbG9waW5nIE9BTSBwcm90b2NvbHMgdG8gbXVjaCB3aGF0ZXZlciBkYXRhIG1vZGVsIGJl
ZW4gY3JlYXRlZC4gRG9lcyB0aGF0IHNvdW5kIHJpZ2h0PyBJIHRoaW5rIHRoYXQgd2UgZmlyc3Qg
YnVpbGQgdXAgT0FNIHRvb2wgYm94IGFuZCB0aGVuIGRlc2NyaWJlIGl0cyBkYXRhIG1vZGVsIHdp
dGggWUFORy4gSWYgdGhhdOKAmXMgdGhlIG90aGVyIHdheSBhcm91bmQsIHdlIG1heSBlbmQgdXAg
d2l0aCBjYXJ0IGJlZm9yZSB0aGUgaG9yc2UuDQoNCiAgICAgICAgICAgICAgICBSZWdhcmRzLA0K
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBHcmVnDQoNCkZyb206IExpbWUgW21haWx0
bzpsaW1lLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBDYXJsb3MNClBpZ25hdGFybyAo
Y3BpZ25hdGEpDQpTZW50OiBTYXR1cmRheSwgTm92ZW1iZXIgMjgsIDIwMTUgNjo1MCBBTQ0KVG86
IGxpbWVAaWV0Zi5vcmc8bWFpbHRvOmxpbWVAaWV0Zi5vcmc+DQpDYzogZHJhZnQteGlhLXNmYy15
YW5nLW9hbUBpZXRmLm9yZzxtYWlsdG86ZHJhZnQteGlhLXNmYy15YW5nLW9hbUBpZXRmLm9yZz4N
ClN1YmplY3Q6IFtMaW1lXSBGd2Q6IFtzZmNdIE5ldyBWZXJzaW9uIE5vdGlmaWNhdGlvbiBmb3IN
CmRyYWZ0LXhpYS1zZmMteWFuZy1vYW0tMDQudHh0DQoNCkZZSS4NCg0KDQpCZWdpbiBmb3J3YXJk
ZWQgbWVzc2FnZToNCg0KRnJvbTogIlhpYWxpYW5nIChGcmFuaykiDQo8ZnJhbmsueGlhbGlhbmdA
aHVhd2VpLmNvbTxtYWlsdG86ZnJhbmsueGlhbGlhbmdAaHVhd2VpLmNvbT48bWFpbHRvOmZyYW5r
LnhpYWxpYW5nQGh1YXdlaS5jb20+Pg0KRGF0ZTogTm92ZW1iZXIgMjYsIDIwMTUgYXQgMzoxMjox
OSBBTSBFU1QNClRvOiAic2ZjQGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5vcmc+PG1haWx0bzpz
ZmNAaWV0Zi5vcmc+Ig0KPHNmY0BpZXRmLm9yZzxtYWlsdG86c2ZjQGlldGYub3JnPjxtYWlsdG86
c2ZjQGlldGYub3JnPj4NClN1YmplY3Q6IFtzZmNdIOi9rOWPkTogTmV3IFZlcnNpb24gTm90aWZp
Y2F0aW9uIGZvcg0KZHJhZnQteGlhLXNmYy15YW5nLW9hbS0wNC50eHQNCg0KSGkgYWxsLA0KV2Ug
dXBkYXRlIGEgbmV3IC0wNCB2ZXJzaW9uIG9mIHRoaXMgZHJhZnQuIFVudGlsIG5vdywgdGhpcyBk
cmFmdCBpcyBmb2N1c2VkIG9uIHByb3Bvc2luZyB0aGUgU0ZDIHNwZWNpZmljIE9BTSBZQU5HIG1v
ZGVsIGJ5IGluaGVyaXRpbmcgYW5kIGV4dGVuZGluZyB0aGUgZXhpc3Rpbmcgd29yayBvZiBTRkMg
WUFORyBtb2RlbCBhbmQgTElNRSBPQU0gWUFORyBtb2RlbC4gU28sIHRoaXMgZHJhZnQgd2lsbCBr
ZWVwIG9uIGJlaW5nIHN5bmNocm9uaXplZCB3aXRoIHRoZSBsYXRlc3QgdXBkYXRlIG9mIHRoZSBy
ZWxhdGVkIHdvcmsgb2YgTElNRSBhbmQgU0ZDIFlBTkcgbW9kZWxzLiBNZWFud2hpbGUsIHRoZSBz
ZmMgb2FtIGZyYW1ld29yayBhbmQgc3BlY2lmaWMgZnVuY3Rpb25zIGFyZSBhbHNvIHZlcnkgaW1w
b3J0YW50IHRvIGJlIGNvbnNpZGVyZWQuDQpZb3VyIHJldmlldyBhbmQgY29tbWVudHMgb24gdGhp
cyBkcmFmdCBhcmUgZ3JlYXRseSBhcHByZWNpYXRlZCENCi4uLg0KDQo=

--_000_7347100B5761DC41A166AC17F22DF1122194BE68eusaamb103erics_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_7347100B5761DC41A166AC17F22DF1122194BE68eusaamb103erics_--

